Advancing Wireless Link Signatures for Location Distinction

Slides:



Advertisements
Similar presentations
OFDM Transmission over Wideband Channel
Advertisements

Air Force Technical Applications Center 1 Subspace Based Three- Component Array Processing Gregory Wagner Nuclear Treaty Monitoring Geophysics Division.
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
Fast Bayesian Matching Pursuit Presenter: Changchun Zhang ECE / CMR Tennessee Technological University November 12, 2010 Reading Group (Authors: Philip.
Exploring timing based side channel attacks against i CCMP Suman Jana, Sneha K. Kasera University of Utah Introduction
Advancing Wireless Link Signatures for Location Distinction J. Zhang, M. H. Firooz, N. Patwari, S. K. Kasera MobiCom’ 08 Presenter: Yuan Song.
1 Synchronization for OFDMA System Student: 劉耀鈞 Advisor: Prof. D. W. Lin Time: 2006/3/16.
High Frequency Ultrasonic Characterization of Carrot Tissue Christopher Vick Advisor: Dr. Navalgund Rao Center for Imaging Science Rochester Institute.
Efficient Estimation of Emission Probabilities in profile HMM By Virpi Ahola et al Reviewed By Alok Datar.
Angle Modulation Objectives
Data Selection In Ad-Hoc Wireless Sensor Networks Olawoye Oyeyele 11/24/2003.
Managing Multi-Configuration Hardware via Dynamic Working Set Analysis By Ashutosh S.Dhodapkar and James E.Smith Presented by Kyriakos Yioutanis.
1 Techniques to control noise and fading l Noise and fading are the primary sources of distortion in communication channels l Techniques to reduce noise.
POWER CONTROL IN COGNITIVE RADIO SYSTEMS BASED ON SPECTRUM SENSING SIDE INFORMATION Karama Hamdi, Wei Zhang, and Khaled Ben Letaief The Hong Kong University.
EE 6332, Spring, 2014 Wireless Communication Zhu Han Department of Electrical and Computer Engineering Class 3 Jan. 22 nd, 2014.
Non-Linear Models. Non-Linear Growth models many models cannot be transformed into a linear model The Mechanistic Growth Model Equation: or (ignoring.
Courses of Wireless Communication at Aalto University Hilsinki, Finland Bingli JIAO, Prof. Dr.rer. Dept. of Electronics Peking University Oct , 2010.
Multiuser Detection (MUD) Combined with array signal processing in current wireless communication environments Wed. 박사 3학기 구 정 회.
Chapter 21 R(x) Algorithm a) Anomaly Detection b) Matched Filter.
A Novel one-tap frequency domain RLS equalizer combined with Viterbi decoder using channel state information in OFDM systems Advisor: Yung-an Kao Student:
Medicaps Institute of Technology & Management Submitted by :- Prasanna Panse Priyanka Shukla Savita Deshmukh Guided by :- Mr. Anshul Shrotriya Assistant.
Estimation of Number of PARAFAC Components
S MART A NTENNA B.GANGADHAR 08QF1A1209. ABSTRACT One of the most rapidly developing areas of communications is “Smart Antenna” systems. This paper deals.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
Chapter 2 Signals and Spectra (All sections, except Section 8, are covered.)
CSpy: Finding the Best Quality Channel without Probing Souvik Sen, Bozidar Radunovic, Jeongkeun Lee, Kyn-Han Kim MobiCom’13 1.
A Trust Based Distributed Kalman Filtering Approach for Mode Estimation in Power Systems Tao Jiang, Ion Matei and John S. Baras Institute for Systems Research.
Advancing Wireless Link Signatures for Location Distinction Mobicom 2008 Junxing Zhang, Mohammad H. Firooz Neal Patwari, Sneha K. Kasera University of.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Space Time Codes. 2 Attenuation in Wireless Channels Path loss: Signals attenuate due to distance Shadowing loss : absorption of radio waves by scattering.
OFDM Based WLAN System Song Ziqi Zhang Zhuo.
Chapter 20 Classification and Estimation Classification – Feature selection Good feature have four characteristics: –Discrimination. Features.
Constellation Diagram
L. Xiao, L. Greenstein, N. Mandayam, W. Trappe WINLAB, Dept. ECE, Rutgers University CISS 2008 This work is supported in part.
Spectrum Sensing In Cognitive Radio Networks
September 28, 2000 Improved Simultaneous Data Reconciliation, Bias Detection and Identification Using Mixed Integer Optimization Methods Presented by:
Chapter 7: Hypothesis Testing. Learning Objectives Describe the process of hypothesis testing Correctly state hypotheses Distinguish between one-tailed.
EEE 441 Wireless And Mobile Communications
Small-Scale Fading Prof. Michael Tsai 2016/04/15.
Antenna Developments for WiFi Phase Applications Diversity MIMO.
Mobile Radio Propagation - Small-Scale Fading and Multipath
Shadowing.
Bayesian Semi-Parametric Multiple Shrinkage
The Impact of Concurrent Coverage Metrics on Testing Effectiveness
Computing and Compressive Sensing in Wireless Sensor Networks
A review of audio fingerprinting (Cano et al. 2005)
Methods in Brain Research: psychophysics
DIRECT SEQUENCE SPREAD SPECTRUM WITH FREQUENCY HOPPING
Advanced Wireless Networks
Advanced Wireless Networks
Equalization in a wideband TDMA system
Dynamical Statistical Shape Priors for Level Set Based Tracking
Concept of Power Control in Cellular Communication Channels
Presenter: Xudong Zhu Authors: Xudong Zhu, etc.
A Review in Quality Measures for Halftoned Images
Efficient Distribution-based Feature Search in Multi-field Datasets Ohio State University (Shen) Problem: How to efficiently search for distribution-based.
Important Concepts at the Physical Layer
I. Statistical Tests: Why do we use them? What do they involve?
Radio Propagation Review
Information Security CS 526
On the Design of RAKE Receivers with Non-uniform Tap Spacing
March 2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security vs. Sequence Length Considerations]
Inferential Statistics
Signals and Systems Revision Lecture 1
E-MiLi: Energy-Minimizing Idle Listening in Wireless Networks
Data Pre-processing Lecture Notes for Chapter 2
Spot Localization using PHY Layer Information
Presenter: Shih-Hsiang(士翔)
Missouri University of Science and Technology
Srinivas Neginhal Anantharaman Kalyanaraman CprE 585: Survey Project
Presentation transcript:

Advancing Wireless Link Signatures for Location Distinction J. Zhang, M. H. Firooz, N. Patwari, S. K. Kasera MobiCom’ 08 Presenter: Yuan Song

Introduction What we want to do: Detecting whether a transmitter is changing its location or not. Unlike localization or location estimation, location distinction does not attempt to determine where a transmitter is Useful in many applications, especially it can enforce physical security by identifying illegal transmitter

Methodology Basic Method Estimating Channel Impulse Response (CIR), called Signature of the channel, to checking whether multipath channel is changing or not. Multipath CIR (time-variant channel)

Methodology (cont.) Multipath CIR (time-invariant channel) Sending s(t), received signal r(t) will be In frequency domain

Methodology (cont.) Estimating methods Two methods (used in existing papers related to location distinction and this paper) 1 2 Both need S(f) to be known in receiver is nearly constant within the band

Previous Work in Location Distinction 1 Multi Tone Probing Signature K carrier waves are simultaneously transmitted to the receiver fk is separated by an amount greater than Channel Coherence Bandwidth, and thus each carrier wave is attenuated by the channel complex gain. Signature of the Channel (nth recorded signature), in frequency domain Based on the method

Previous Work in Location Distinction (Cont.) 1 Multi Tone Probing Metric (The paper also proposes a slightly modified version for enhancing detection stability) the Nth multiple tone signature h(N) is compared with each previously measured signature in the history Hi,j using a measure called the correlation statistic T(n) is the correlation of the nth and the Nth measurements

Previous Work in Location Distinction 2 Temporal CIR Signatures Using sampled CIR, in time domain Based on the method

Previous Work in Location Distinction (Cont Previous Work in Location Distinction (Cont.) 2 Temporal CIR Signatures Metric the difference between the Nth signature h(N) and those in the history Hi,j is given as the minimum normalized Euclidean distance between the new signature and any signature in the history set.

Comparison Between Two Previous Work Cons of Multi Tone Probing the channel frequency response is sensitive to each multipath. An impulse in the time domain is a constant in the frequency domain, and thus a change to a single path may change the entire multiple tone link signature. Temporal CIR signature use a time domain signature, and thus are more robust against small changes of channel. Cons of Temporal CIR Signature Lack of phase information limits its ability in uniquely identifying links. This paper addressed these two cons and made improvement. It proposes a new signature called complex temporal link signature

Complex Temporal Signature Slight modification to Temporal CIR Signature, “without taking the magnitude of each gain” Contrast to Signature of Temporal CIR Signature Special issues: Difficult to discriminate between channel response phase and oscillator drift, and thus some phase changes in the link signature have nothing to do with any changes in the link. Solution gived.

Complex Temporal Signature Metric (same as Temporal CIR Signature)

Performance Evaluation Framework of Location Distinction 1 For a given transmitter i and a receiver j, a history of N-1 link signatures is measured and stored 2 The Nth signature h(N) at j from an unknown transmitter in the neighborhood of j is then taken, and an evaluation criterion ei,j = sigEval(h(N); Hi,j ) is computed. 3 ei,j is compared to a threshold 4 When ei,j does not satisfy certain condional relationship with threshold, the new signature is determined to be from the same transmitter, i.e. h(N) = h(N)i,j , and we include it in history of H. For constant memory usage, the oldest measurement in H is then discarded. The algorithm returns to step 2 until enough measurements have been collected

Performance Evaluation Framework of Location Distinction (Cont.) 5 Final Step (Principles used to compare the algorithms) We first define the null and alternate hypotheses: Then we treat ei,j as a random variable and define

Performance Evaluation Multiple Tone and Temporal CIR

Performance Evaluation Multiple Tone, Temporal CIR and Complex Temporal CIR

Temporal Behavior of Link Signatures Introduction The multipath characteristics of a link can change with time. A link can thus be in different distinct states. A location distinction mechanism that does not consider the temporal changes in link behavior can significantly increase the probability of false alarms. The paper propose a Markov Model to further decrease the probability of false alarm

Temporal Behavior of Link Signatures Intuition 1 Using non-linear dimensionality reduction (a method in Statistics to visualize high dimensional data) to reduce the 100 dimension vectors to just 1-2 dimensions. Below is a 2-D embedding plotted with one set of 333 complex link signature measurements.

Temporal Behavior of Link Signatures Intuition Two States With 1D embedding of Isomap algorithm, from the total number of state changes, and the number of times we are in a state, we calculate the state transition probabilities and the limiting probabilities of the Markov chain

Temporal Behavior of Link Signatures Markov Model

Performance Evaluation Further Definitions of Probability of False Alarm 1. Same-State False Alarm (SSFA): A link signature is measured in state i while there exists in the history some other signatures of state i, however, the new measurement is far enough away from the measurements in the history that they are detected as different, thus a false alarm is raised. 2 Different-State False Alarm (DSFA): A link signature is measured in state i, but no signature previously measured in state i exists in the history. Because link signatures from states j <> i are very different from those measured in state i, this new measurement does not match any in the history, and a false alarm is raised.

Performance Evaluation Further Definitions of Probability of False Alarm (Cont.) Caculation of P[DSFA]

Performance Evaluation P[DSFA]

The END Thank You~~