This paper introduces SuperRF- which takes radio frequency (RF) signals from an off-the-shelf, low-cost, 77GHz mmWave radar and produces an enhanced 3D RF representation of a scene. SuperRF is useful in scenarios where camera and other types of sensors do not work, or not allowed due to privacy concerns, or their performance is impacted due to bad lighting conditions and occlusions, or an alternate RF sensing system like synthetic aperture radar (SAR) is too large, inconvenient, and costly. Applications of SuperRF includes navigation and planning of autonomous and semi-autonomous systems, human-robot interactions and social robotics, and elderly and/or patient monitoring in-home healthcare scenarios. We use low-cost, off-the-shelf parts to capture RF signals and to train SuperRF. The novelty of SuperRF lies in its use of deep learning algorithm, followed by a compressed sensing-based iterative algorithm that further enhances the output, to generate a fine-grained 3D representation of an RF scene from its sparse RF representation - which a mmWave radar of the same class cannot achieve without instrumenting the system with large sized multiple antennas or physically moving the antenna over a longer period in time. We demonstrate the feasibility and effectiveness through an in-depth evaluation.
{"title":"SuperRF: Enhanced 3D RF Representation Using Stationary Low-Cost mmWave Radar.","authors":"Shiwei Fang, Shahriar Nirjon","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>This paper introduces SuperRF- which takes radio frequency (RF) signals from an off-the-shelf, low-cost, 77GHz mmWave radar and produces an enhanced 3D RF representation of a scene. SuperRF is useful in scenarios where camera and other types of sensors do not work, or not allowed due to privacy concerns, or their performance is impacted due to bad lighting conditions and occlusions, or an alternate RF sensing system like synthetic aperture radar (SAR) is too large, inconvenient, and costly. Applications of SuperRF includes navigation and planning of autonomous and semi-autonomous systems, human-robot interactions and social robotics, and elderly and/or patient monitoring in-home healthcare scenarios. We use low-cost, off-the-shelf parts to capture RF signals and to train SuperRF. The novelty of SuperRF lies in its use of deep learning algorithm, followed by a compressed sensing-based iterative algorithm that further enhances the output, to generate a fine-grained 3D representation of an RF scene from its sparse RF representation - which a mmWave radar of the same class cannot achieve without instrumenting the system with large sized multiple antennas or physically moving the antenna over a longer period in time. We demonstrate the feasibility and effectiveness through an in-depth evaluation.</p>","PeriodicalId":93008,"journal":{"name":"International Conference on Embedded Wireless Systems and Networks (EWSN) ...","volume":"2020 ","pages":"120-131"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7377925/pdf/nihms-1603887.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"38185284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper introduces SuperRF- which takes radio frequency (RF) signals from an off-the-shelf, low-cost, 77GHz mmWave radar and produces an enhanced 3D RF representation of a scene. SuperRF is useful in scenarios where camera and other types of sensors do not work, or not allowed due to privacy concerns, or their performance is impacted due to bad lighting conditions and occlusions, or an alternate RF sensing system like synthetic aperture radar (SAR) is too large, inconvenient, and costly. Applications of SuperRF includes navigation and planning of autonomous and semi-autonomous systems, human-robot interactions and social robotics, and elderly and/or patient monitoring in-home healthcare scenarios. We use low-cost, off-the-shelf parts to capture RF signals and to train SuperRF. The novelty of SuperRF lies in its use of deep learning algorithm, followed by a compressed sensing-based iterative algorithm that further enhances the output, to generate a fine-grained 3D representation of an RF scene from its sparse RF representation - which a mmWave radar of the same class cannot achieve without instrumenting the system with large sized multiple antennas or physically moving the antenna over a longer period in time. We demonstrate the feasibility and effectiveness through an in-depth evaluation.
{"title":"SuperRF: Enhanced 3D RF Representation Using Stationary Low-Cost mmWave Radar","authors":"Shiwei Fang, S. Nirjon","doi":"10.5555/3400306.3400321","DOIUrl":"https://doi.org/10.5555/3400306.3400321","url":null,"abstract":"This paper introduces SuperRF- which takes radio frequency (RF) signals from an off-the-shelf, low-cost, 77GHz mmWave radar and produces an enhanced 3D RF representation of a scene. SuperRF is useful in scenarios where camera and other types of sensors do not work, or not allowed due to privacy concerns, or their performance is impacted due to bad lighting conditions and occlusions, or an alternate RF sensing system like synthetic aperture radar (SAR) is too large, inconvenient, and costly. Applications of SuperRF includes navigation and planning of autonomous and semi-autonomous systems, human-robot interactions and social robotics, and elderly and/or patient monitoring in-home healthcare scenarios. We use low-cost, off-the-shelf parts to capture RF signals and to train SuperRF. The novelty of SuperRF lies in its use of deep learning algorithm, followed by a compressed sensing-based iterative algorithm that further enhances the output, to generate a fine-grained 3D representation of an RF scene from its sparse RF representation - which a mmWave radar of the same class cannot achieve without instrumenting the system with large sized multiple antennas or physically moving the antenna over a longer period in time. We demonstrate the feasibility and effectiveness through an in-depth evaluation.","PeriodicalId":93008,"journal":{"name":"International Conference on Embedded Wireless Systems and Networks (EWSN) ...","volume":"40 1","pages":"120-131"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84102870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-07-31DOI: 10.3844/JCSSP.2009.529.535
Bo Yang, M. Manohar, S. Kou
Problem statement: For a sensor network comprising autonomous and self-organizing data sources, efficient similarity-based search for semantic-rich resources (such as video data) has been considered as a challenging task due to the lack of infrastructures and the multiple limitations (such as band-width, storage and energy). While the past research discussed much on routing protocols for sensor networks, few works have been reported on effective data retrieval with respect to optimized data search cost and fairness across various environment setups. This study presented the design of progressive content prediction approaches to facilitate efficient similarity-based search in sensor networks. Approach: The study proposed fully dynamic, hierarchy-free and non-flooding approaches. Association rules and Bayesian probabilities were generated to indicate the content distribution in the sensor network. The proposed algorithms generated the interest node set for a node based on its query history and the association rules and Bayesian rule. Because in most cases the data content of a node was semantically related with its interest of queries, the sensor network was therefore partitioned into small groups of common interest nodes and most of the queries can be resolved within these groups. Consequently, blind search approach based on flooding could be replaced by the heuristic-based uni-casting or multicasting schemes, which drastically reduced the system cost of storage space, network bandwidth and computation power. Results: We verified the performance with experimental analysis. The simulation result showed that both Bayesian scheme and association scheme require much less message complexity than flooding, which drastically reduced the consumption of system resources. Conclusion: Content distribution knowledge could be used to improve the system performance of content-based data retrieval in sensor networks.
{"title":"Progressive Content-Sensitive Data Retrieval in Sensor Networks","authors":"Bo Yang, M. Manohar, S. Kou","doi":"10.3844/JCSSP.2009.529.535","DOIUrl":"https://doi.org/10.3844/JCSSP.2009.529.535","url":null,"abstract":"Problem statement: For a sensor network comprising autonomous and self-organizing data sources, efficient similarity-based search for semantic-rich resources (such as video data) has been considered as a challenging task due to the lack of infrastructures and the multiple limitations (such as band-width, storage and energy). While the past research discussed much on routing protocols for sensor networks, few works have been reported on effective data retrieval with respect to optimized data search cost and fairness across various environment setups. This study presented the design of progressive content prediction approaches to facilitate efficient similarity-based search in sensor networks. Approach: The study proposed fully dynamic, hierarchy-free and non-flooding approaches. Association rules and Bayesian probabilities were generated to indicate the content distribution in the sensor network. The proposed algorithms generated the interest node set for a node based on its query history and the association rules and Bayesian rule. Because in most cases the data content of a node was semantically related with its interest of queries, the sensor network was therefore partitioned into small groups of common interest nodes and most of the queries can be resolved within these groups. Consequently, blind search approach based on flooding could be replaced by the heuristic-based uni-casting or multicasting schemes, which drastically reduced the system cost of storage space, network bandwidth and computation power. Results: We verified the performance with experimental analysis. The simulation result showed that both Bayesian scheme and association scheme require much less message complexity than flooding, which drastically reduced the consumption of system resources. Conclusion: Content distribution knowledge could be used to improve the system performance of content-based data retrieval in sensor networks.","PeriodicalId":93008,"journal":{"name":"International Conference on Embedded Wireless Systems and Networks (EWSN) ...","volume":"6 1","pages":"63-68"},"PeriodicalIF":0.0,"publicationDate":"2009-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78435499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Effects of PRF and Slot Interval on the Data Throughput of PPM-Based Ultra Wide-Band Systems in Multi-Path Channels","authors":"Sungjun Kim, S. Im","doi":"10.1007/11751588_84","DOIUrl":"https://doi.org/10.1007/11751588_84","url":null,"abstract":"","PeriodicalId":93008,"journal":{"name":"International Conference on Embedded Wireless Systems and Networks (EWSN) ...","volume":"2 1","pages":"18-23"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78515572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-01-01DOI: 10.1002/9781118380642.ch3
Basar Kasim, Levent Ertaul
Mobile wireless networks are more vulnerable to unauthorised access and eavesdropping when compared with the traditional fixed wired networks due to the mobility of users, the transmission of signals through open-air and the requirement of low power consumption by a mobile user. This paper focuses on the security techniques used within the GSM standard. First, current GSM security system vulnerabilities are given. Security evaluations of two new security protocol proposals for GSM, using private and public key techniques, are also presented. Next, a new GSM security protocols which uses the Elliptic Curve Public Key Cryptography (ECC) technique is proposed. This is followed by a security analysis of the proposed protocols.
{"title":"GSM Security","authors":"Basar Kasim, Levent Ertaul","doi":"10.1002/9781118380642.ch3","DOIUrl":"https://doi.org/10.1002/9781118380642.ch3","url":null,"abstract":"Mobile wireless networks are more vulnerable to unauthorised access and eavesdropping when compared with the traditional fixed wired networks due to the mobility of users, the transmission of signals through open-air and the requirement of low power consumption by a mobile user. This paper focuses on the security techniques used within the GSM standard. First, current GSM security system vulnerabilities are given. Security evaluations of two new security protocol proposals for GSM, using private and public key techniques, are also presented. Next, a new GSM security protocols which uses the Elliptic Curve Public Key Cryptography (ECC) technique is proposed. This is followed by a security analysis of the proposed protocols.","PeriodicalId":93008,"journal":{"name":"International Conference on Embedded Wireless Systems and Networks (EWSN) ...","volume":"692 1","pages":"555-561"},"PeriodicalIF":0.0,"publicationDate":"2005-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76849570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Sen, Radu Handorean, Gregory Hackmann, G. Roman
In the proxy approach to Service Oriented Computing, a service advertises a proxy, which is searched for, retrieved and used by interested clients as a local handle to the service process that runs on a remote host. Due to software evolution, it becomes necessary at times to upgrade the service. Some of these upgrades may require an upgrade of the proxy software, in addition to the server itself. This paper addresses the issue of upgrading both the server and its proxy in a manner transparent to the client, and ensures only momentary interruption during the switching process. The model we propose is designed for ad hoc wireless networks, but can be used in other settings as well. We also describe a Java implementation of our model.
{"title":"An Architecture Supporting Run-Time Upgrade of Proxy-Based Services in Ad Hoc Networks","authors":"R. Sen, Radu Handorean, Gregory Hackmann, G. Roman","doi":"10.7936/K7319T70","DOIUrl":"https://doi.org/10.7936/K7319T70","url":null,"abstract":"In the proxy approach to Service Oriented Computing, a service advertises a proxy, which is searched for, retrieved and used by interested clients as a local handle to the service process that runs on a remote host. Due to software evolution, it becomes necessary at times to upgrade the service. Some of these upgrades may require an upgrade of the proxy software, in addition to the server itself. This paper addresses the issue of upgrading both the server and its proxy in a manner transparent to the client, and ensures only momentary interruption during the switching process. The model we propose is designed for ad hoc wireless networks, but can be used in other settings as well. We also describe a Java implementation of our model.","PeriodicalId":93008,"journal":{"name":"International Conference on Embedded Wireless Systems and Networks (EWSN) ...","volume":"1 1","pages":"689-695"},"PeriodicalIF":0.0,"publicationDate":"2004-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83450622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
OF THE THESIS A FRAMEWORK FOR POLICY BASED COORDINATED ADAPTATION IN
本文提出了一个基于政策的协调适应框架
{"title":"A Framework For Policy Based Coordinated Adaptation in Mobile Systems","authors":"S. Makki, N. Pissinou, S. Agrawal","doi":"10.25148/ETD.FI13101538","DOIUrl":"https://doi.org/10.25148/ETD.FI13101538","url":null,"abstract":"OF THE THESIS A FRAMEWORK FOR POLICY BASED COORDINATED ADAPTATION IN","PeriodicalId":93008,"journal":{"name":"International Conference on Embedded Wireless Systems and Networks (EWSN) ...","volume":"156 1","pages":"969-974"},"PeriodicalIF":0.0,"publicationDate":"2004-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82655113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the convergence of wireless data communication and the Internet, more and more Internet services are now being used in the wireless area. Mobile payment protocols are necessary for online transactions. A good payment protocol should balance the requirements of security and convenience. WAP (Wireless Application Protocol) is one of the prevalent wireless technologies being embraced by the banking sector. Compared with WLAN (Wireless Local Area Network), WAP can satisfy the strong security requirement of banking services. WPP (Wireless Payment Protocol) is a convenient lightweight protocol that supports both credit card and debit card transactions in wireless environment. The shortcoming of WPP is that it does not actually address security. In this paper, we propose a new wireless payment protocol, SWPP (Secure Wireless Payment Protocol), to address security and convenience based on WAP for WTLS (Wireless Transport Layer Security), WIM (Wireless Identity Module) and WMLScrypt, WPKI technology.
{"title":"Secure Wireless Payment Protocol","authors":"Hong Wang, E. Kranakis","doi":"10.22215/etd/2002-05265","DOIUrl":"https://doi.org/10.22215/etd/2002-05265","url":null,"abstract":"With the convergence of wireless data communication and the Internet, more and more Internet services are now being used in the wireless area. Mobile payment protocols are necessary for online transactions. A good payment protocol should balance the requirements of security and convenience. WAP (Wireless Application Protocol) is one of the prevalent wireless technologies being embraced by the banking sector. Compared with WLAN (Wireless Local Area Network), WAP can satisfy the strong security requirement of banking services. WPP (Wireless Payment Protocol) is a convenient lightweight protocol that supports both credit card and debit card transactions in wireless environment. The shortcoming of WPP is that it does not actually address security. In this paper, we propose a new wireless payment protocol, SWPP (Secure Wireless Payment Protocol), to address security and convenience based on WAP for WTLS (Wireless Transport Layer Security), WIM (Wireless Identity Module) and WMLScrypt, WPKI technology.","PeriodicalId":93008,"journal":{"name":"International Conference on Embedded Wireless Systems and Networks (EWSN) ...","volume":"7 1","pages":"576-582"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75356524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}