Indoor Tracking: Theory, Methods, and Technologies Dardari, Davide; Closas, Pau; Djuric, Petar M.
IEEE transactions on vehicular technology,
2015-April, 2015-4-00, 20150401, Letnik:
64, Številka:
4
Journal Article
Recenzirano
Odprti dostop
In the last decade, the research on and the technology for outdoor tracking have seen an explosion of advances. It is expected that in the near future, we will witness similar trends for indoor ...scenarios where people spend more than 70% of their lives. The rationale for this is that there is a need for reliable and high-definition real-time tracking systems that have the ability to operate in indoor environments, thus complementing those based on satellite technologies, such as the Global Positioning System (GPS). The indoor environments are very challenging, and as a result, a large variety of technologies have been proposed for coping with them, but no legacy solution has emerged. This paper presents a survey on indoor wireless tracking of mobile nodes from a signal processing perspective. It can be argued that the indoor tracking problem is more challenging than the problem on indoor localization. The reason is simple: From a set of measurements, one has to estimate not one location but a series of correlated locations of a mobile node. The paper illustrates the theory, the main tools, and the most promising technologies for indoor tracking. New directions of research are also discussed.
One of the main vulnerabilities of GNSS receivers is their exposure to intentional or unintentional jamming signals, which could even cause service unavailability. Several alternatives to counteract ...these effects were proposed in the literature, being the most promising those based on multiple antenna architectures. This is specially the case for high-grade receivers used in applications requiring reliability and robustness. This article provides an overview of the possible receiver architectures encompassing antenna arrays and the associated signal processing techniques. Emphasis is also put on the most typical implementation issues found when dealing with such technology. A thorough survey is complemented with a set of experiments, including real data processing by a working prototype, which exemplifies the above ideas.
Satellite-based navigation is prevalent in both commercial applications and critical infrastructures, providing precise position and time referencing. As a consequence, interference to such systems ...can have repercussions on a plethora of fields. Additionally, Privacy Preserving Devices (PPD)-jamming devices-are relatively inexpensive and easy to obtain, potentially denying the service in a wide geographical area. Current jamming mitigation technology is based on interference cancellation approaches, requiring the detection and estimation of the interference waveform. Recently, the Robust Interference Mitigation (RIM) framework was proposed, which leverages results in robust statistics by treating the jamming signal as an outlier. It has the advantage of rejecting jamming signals without detecting or estimating its waveform. In this paper, we extend the framework to situations where the jammer is sparse in some transformed domain other than the time domain. Additionally, we analyse the use of Huber's non-linearity within RIM and derive its loss of efficiency. We compare its performance to state-of-the-art techniques and to other RIM solutions, with both synthetic and real signals, showing remarkable results.
Deep Learning of GNSS Acquisition Borhani-Darian, Parisa; Li, Haoqing; Wu, Peng ...
Sensors,
02/2023, Letnik:
23, Številka:
3
Journal Article
Recenzirano
Odprti dostop
Signal acquisition is a crucial step in Global Navigation Satellite System (GNSS) receivers, which is typically solved by maximizing the so-called Cross-Ambiguity Function (CAF) as a hypothesis ...testing problem. This article proposes to use deep learning models to perform such acquisition, whereby the CAF is fed to a data-driven classifier that outputs binary class posteriors. The class posteriors are used to compute a Bayesian hypothesis test to statistically decide the presence or absence of a GNSS signal. The versatility and computational affordability of the proposed method are addressed by splitting the CAF into smaller overlapping sections, which are fed to a bank of parallel classifiers whose probabilistic results are optimally fused to provide a so-called probability ratio map from which acquisition is decided. Additionally, the article shows how noncoherent integration schemes are enabled through optimal data fusion, with the goal of increasing the resulting classifier accuracy. The article provides simulation results showing that the proposed data-driven method outperforms current CAF maximization strategies, enabling enhanced acquisition at medium-to-high carrier-to-noise density ratios.
In Global Navigation Satellite System (GNSS), a spoofing attack consists of forged signals which possibly cause the attacked receivers to deduce a false position, a false clock, or both. In contrast ...to simplistic spoofing, the induced spoofing captures the victim tracking loops by gradually adjusting it's parameters, e.g., code phase and power. Then the victims smoothly deviates from the correct position or timing. Therefore, it is more difficult to detect the induced spoofing than the simplistic one. In this paper, by utilizing the dynamic nature of such gradual adjustment process, an induced spoofing detection method is proposed based on the S-curve-bias (SCB). Firstly, SCB in the inducing process is theoretically derived. Then, in order to detect the induced spoofing, a detection metric is defined. After that, a series of experiments using the Texas spoofing test battery (TEXBAT) are performed to demonstrate the effectiveness of the proposed algorithm.
Detecting GNSS spoofing using deep learning Borhani-Darian, Parisa; Li, Haoqing; Wu, Peng ...
EURASIP Journal on Advances in Signal Processing,
12/2024, Letnik:
2024, Številka:
1
Journal Article
Recenzirano
Odprti dostop
Global Navigation Satellite System (GNSS) is pervasively used in position, navigation, and timing (PNT) applications. As a consequence, important assets have become vulnerable to intentional attacks ...on GNSS, where of particular relevance is spoofing transmissions that aim at superseding legitimate signals with forged ones in order to control a receiver’s PNT computations. Detecting such attacks is therefore crucial, and this article proposes to employ an algorithm based on deep learning to achieve the task. A data-driven classifier is considered that has two components: a deep learning model that leverages parallelization to reduce its computational complexity and a clustering algorithm that estimates the number and parameters of the spoofing signals. Based on the experimental results, it can be concluded that the proposed scheme exhibits superior performance compared to the existing solutions, especially under moderate-to-high signal-to-noise ratios.
Positioning is a key aspect for many applications in wireless sensor networks. In order to design practical positioning algorithms, employment of efficient algorithms that maximize the battery ...lifetime while achieving a high degree of accuracy is crucial. The number of participating anchor nodes and their transmit power have an important impact on the energy consumption of positoning a node. This paper proposes a game theoretical algorithm to optimize resource usage in obtaining location information in a wireless sensor network. The proposed method provides positioning and tracking of nodes using RSS measurements. We use the Geometric Dilution of Precision as an optimization metric for our algorithm, with the aim of minimizing the number and power of anchor nodes that collaborate in positioning, thus saving energy. The algorithm is shown to be a potential game, therefore convergence is guaranteed. A distributed low complexity solution for the implementation is presented. The game is applied to WSN and results show the trade-off between power saving and positioning error.
This paper discusses asynchronous distributed inference in object tracking. Unlike many studies, which assume that the delay in communication between partial estimators and the central station is ...negligible, our study focuses on the problem of asynchronous distributed inference in the presence of delays. We introduce an efficient data fusion method for combining the distributed estimates, where delay in communications is not negligible. To overcome the delay, predictions are made for the state of the system based on the most current available information from partial estimators. Simulation results show the efficacy of the methods proposed.
Global navigation satellite systems (GNSSs) play a key role in intelligent transportation systems such as autonomous driving or unmanned systems navigation. In such applications, it is fundamental to ...ensure a reliable precise positioning solution able to operate in harsh propagation conditions such as urban environments and under multipath and other disturbances. Exploiting carrier phase observations allows for precise positioning solutions at the complexity cost of resolving integer phase ambiguities, a procedure that is particularly affected by non-nominal conditions. This limits the applicability of conventional filtering techniques in challenging scenarios, and new robust solutions must be accounted for. This contribution deals with real-time kinematic (RTK) positioning and the design of robust filtering solutions for the associated mixed integer- and real-valued estimation problem. Families of Kalman filter (KF) approaches based on robust statistics and variational inference are explored, such as the generalized M-based KF or the variational-based KF, aiming to mitigate the impact of outliers or non-nominal measurement behaviors. The performance assessment under harsh propagation conditions is realized using a simulated scenario and real data from a measurement campaign. The proposed robust filtering solutions are shown to offer excellent resilience against outlying observations, with the variational-based KF showcasing the overall best performance in terms of Gaussian efficiency and robustness.
The issue of user privacy in the context of collaborative positioning is addressed in this work, wherein information is passed between and processed by multiple cooperative agents, with the goal of ...achieving high levels of positioning accuracy. In particular, this paper discusses three privacy-preserving schemes in the context of differential global navigation satellite system (GNSS)-based and GNSS-based cooperative positioning methods. The discussed architectures provide the same positioning results, while yielding different levels of privacy to the cooperative users. These architectures also involve increased complexity as privacy grows and as non-encrypted, encrypted, and homomorphically encrypted solutions are implemented. The latter scheme is the most computationally demanding; however, it provides the highest level of privacy by employing homomorphic encryption, whereby addition and multiplication operations may be performed on encrypted data to produce encrypted outputs, without revealing information about the collaborative agent’s location. The proposed privacy-preserving cooperative position schemes are shown to provide the same results as their non-privacy-preserving counterparts, while providing privacy guarantees. Based on this analysis, some of the proposed solutions can be considered for real-time applications, while homomorphic encryption is a valid solution for latency-tolerant applications. Advances in computing power will increase their overall usability in the near future.