-
Experimental Validation of Cooperative RSS-based Localization with Unknown Transmit Power, Path Loss Exponent, and Precise Anchor Location
Authors:
Yingquan Li,
Bodhibrata Mukhopadhyay,
Jiajie Xu,
Mohamed-Slim Alouini
Abstract:
Received signal strength (RSS)--based cooperative localization has gained significant attention due to its straightforward system architectures and cost-effectiveness. In this paper, we propose Cooperative Localization Techniques (with Unknown Parameters), referred to as CTUP(s), which consider uncertainty in anchor nodes' locations and assume the transmit power and \textcolor{blue}{path loss expo…
▽ More
Received signal strength (RSS)--based cooperative localization has gained significant attention due to its straightforward system architectures and cost-effectiveness. In this paper, we propose Cooperative Localization Techniques (with Unknown Parameters), referred to as CTUP(s), which consider uncertainty in anchor nodes' locations and assume the transmit power and \textcolor{blue}{path loss exponent (PLE)} to be unknown. Unlike prior studies, CTUP(s) address unknowns by estimating these parameters, along with the location of target nodes. The non-convex and non-linear nature of the maximum likelihood (ML) estimator of the problem is addressed through relaxation techniques, employing Taylor series expansion, semidefinite relaxation (SDR), and the epigraph method. The resulting problem is solved using semidefinite second-order cone programming (SDP-SOCP), leveraging the precision of SDP and the simplicity of SOCP. We deployed an extensive network comprising 50 BLE nodes covering an area of 640~m $\times$ 180~m to gather RSS data. The precise location of the nodes is obtained using real-time kinematics global positioning system (RTK-GPS), which is treated as the ground truth. Furthermore, to replicate real-world scenarios, we recorded the positions of the anchor nodes using a standard GPS, thereby introducing uncertainty into the anchor node locations. Extensive simulation and hardware experimentation demonstrate the superior performance of CTUP compared to existing techniques.
△ Less
Submitted 20 June, 2024;
originally announced June 2024.
-
RSSI-based Secure Localization in the Presence of Malicious Nodes in Sensor Networks
Authors:
Bodhibrata Mukhopadhyay,
Seshan Srirangarajan,
Subrat Kar
Abstract:
The ability of a sensor node to determine its location in a sensor network is important in many applications. The infrastructure for the location-based services is an easy target for malicious attacks. We address scenarios where malicious node(s) attempt to disrupt, in an uncoordinated or coordinated manner, the localization process of a target node. We propose four techniques for secure localizat…
▽ More
The ability of a sensor node to determine its location in a sensor network is important in many applications. The infrastructure for the location-based services is an easy target for malicious attacks. We address scenarios where malicious node(s) attempt to disrupt, in an uncoordinated or coordinated manner, the localization process of a target node. We propose four techniques for secure localization: weighted least square (WLS), secure weighted least square (SWLS), and $\ell_1$-norm based techniques LN-1 and LN-1E, in a network that includes one or more compromised anchor nodes. WLS and SWLS techniques are shown to offer significant advantage over existing techniques by assigning larger weights to the anchor nodes that are closer to the target node, and by detecting the malicious nodes and eliminating their measurements from the localization process. In a coordinated attack, the localization problem can be posed as a plane fitting problem where the measurements from non-malicious and malicious anchor nodes lie on two different planes. LN-1E technique estimates these two planes and prevents disruption of the localization process. The Cramer-Rao lower bound (CRLB) for the position estimate is also derived. The proposed techniques are shown to provide better localization accuracy than the existing algorithms.
△ Less
Submitted 13 December, 2019;
originally announced December 2019.
-
Person Identification using Seismic Signals generated from Footfalls
Authors:
Bodhibrata Mukhopadhyay,
Sahil Anchal,
Subrat Kar
Abstract:
Footfall based biometric system is perhaps the only person identification technique which does not hinder the natural movement of an individual. This is a clear edge over all other biometric systems which require a formidable amount of human intervention and encroach upon an individual's privacy to some extent or the other. This paper presents a Fog computing architecture for implementing footfall…
▽ More
Footfall based biometric system is perhaps the only person identification technique which does not hinder the natural movement of an individual. This is a clear edge over all other biometric systems which require a formidable amount of human intervention and encroach upon an individual's privacy to some extent or the other. This paper presents a Fog computing architecture for implementing footfall based biometric system using widespread geographically distributed geophones (vibration sensor). Results were stored in an Internet of Things (IoT) cloud. We have tested our biometric system on an indigenous database (created by us) containing 46000 footfall events from 8 individuals and achieved an accuracy of 73%, 90% and 95% in case of 1, 5 and 10 footsteps per sample. We also proposed a basis pursuit based data compression technique DS8BP for wireless transmission of footfall events to the Fog. DS8BP compresses the original footfall events (sampled at 8 kHz) by a factor of 108 and also acts as a smoothing filter. These experimental results depict the high viability of our technique in the realm of person identification and access control systems.
△ Less
Submitted 24 September, 2018;
originally announced September 2018.