-
Non-Contact Acquisition of PPG Signal using Chest Movement-Modulated Radio Signals
Authors:
Israel Jesus Santos Filho,
Muhammad Mahboob Ur Rahman,
Taous-Meriem Laleg-Kirati,
Tareq Al-Naffouri
Abstract:
We present for the first time a novel method that utilizes the chest movement-modulated radio signals for non-contact acquisition of the photoplethysmography (PPG) signal. Under the proposed method, a software-defined radio (SDR) exposes the chest of a subject sitting nearby to an orthogonal frequency division multiplexing signal with 64 sub-carriers at a center frequency 5.24 GHz, while another S…
▽ More
We present for the first time a novel method that utilizes the chest movement-modulated radio signals for non-contact acquisition of the photoplethysmography (PPG) signal. Under the proposed method, a software-defined radio (SDR) exposes the chest of a subject sitting nearby to an orthogonal frequency division multiplexing signal with 64 sub-carriers at a center frequency 5.24 GHz, while another SDR in the close vicinity collects the modulated radio signal reflected off the chest. This way, we construct a custom dataset by collecting 160 minutes of labeled data (both raw radio data as well as the reference PPG signal) from 16 healthy young subjects. With this, we first utilize principal component analysis for dimensionality reduction of the radio data. Next, we denoise the radio signal and reference PPG signal using wavelet technique, followed by segmentation and Z-score normalization. We then synchronize the radio and PPG segments using cross-correlation method. Finally, we proceed to the waveform translation (regression) task, whereby we first convert the radio and PPG segments into frequency domain using discrete cosine transform (DCT), and then learn the non-linear regression between them. Eventually, we reconstruct the synthetic PPG signal by taking inverse DCT of the output of regression block, with a mean absolute error of 8.1294. The synthetic PPG waveform has a great clinical significance as it could be used for non-contact performance assessment of cardiovascular and respiratory systems of patients suffering from infectious diseases, e.g., covid19.
△ Less
Submitted 22 February, 2024;
originally announced February 2024.
-
Cuff-less Arterial Blood Pressure Waveform Synthesis from Single-site PPG using Transformer & Frequency-domain Learning
Authors:
Muhammad Wasim Nawaz,
Muhammad Ahmad Tahir,
Ahsan Mehmood,
Muhammad Mahboob Ur Rahman,
Kashif Riaz,
Qammer H. Abbasi
Abstract:
We develop and evaluate two novel purpose-built deep learning (DL) models for synthesis of the arterial blood pressure (ABP) waveform in a cuff-less manner, using a single-site photoplethysmography (PPG) signal. We train and evaluate our DL models on the data of 209 subjects from the public UCI dataset on cuff-less blood pressure (CLBP) estimation. Our transformer model consists of an encoder-deco…
▽ More
We develop and evaluate two novel purpose-built deep learning (DL) models for synthesis of the arterial blood pressure (ABP) waveform in a cuff-less manner, using a single-site photoplethysmography (PPG) signal. We train and evaluate our DL models on the data of 209 subjects from the public UCI dataset on cuff-less blood pressure (CLBP) estimation. Our transformer model consists of an encoder-decoder pair that incorporates positional encoding, multi-head attention, layer normalization, and dropout techniques for ABP waveform synthesis. Secondly, under our frequency-domain (FD) learning approach, we first obtain the discrete cosine transform (DCT) coefficients of the PPG and ABP signals, and then learn a linear/non-linear (L/NL) regression between them. The transformer model (FD L/NL model) synthesizes the ABP waveform with a mean absolute error (MAE) of 3.01 (4.23). Further, the synthesis of ABP waveform also allows us to estimate the systolic blood pressure (SBP) and diastolic blood pressure (DBP) values. To this end, the transformer model reports an MAE of 3.77 mmHg and 2.69 mmHg, for SBP and DBP, respectively. On the other hand, the FD L/NL method reports an MAE of 4.37 mmHg and 3.91 mmHg, for SBP and DBP, respectively. Both methods fulfill the AAMI criterion. As for the BHS criterion, our transformer model (FD L/NL regression model) achieves grade A (grade B).
△ Less
Submitted 8 June, 2024; v1 submitted 9 January, 2024;
originally announced January 2024.
-
Multi-class Network Intrusion Detection with Class Imbalance via LSTM & SMOTE
Authors:
Muhammad Wasim Nawaz,
Rashid Munawar,
Ahsan Mehmood,
Muhammad Mahboob Ur Rahman,
Qammer H. Abbasi
Abstract:
Monitoring network traffic to maintain the quality of service (QoS) and to detect network intrusions in a timely and efficient manner is essential. As network traffic is sequential, recurrent neural networks (RNNs) such as long short-term memory (LSTM) are suitable for building network intrusion detection systems. However, in the case of a few dataset examples of the rare attack types, even these…
▽ More
Monitoring network traffic to maintain the quality of service (QoS) and to detect network intrusions in a timely and efficient manner is essential. As network traffic is sequential, recurrent neural networks (RNNs) such as long short-term memory (LSTM) are suitable for building network intrusion detection systems. However, in the case of a few dataset examples of the rare attack types, even these networks perform poorly. This paper proposes to use oversampling techniques along with appropriate loss functions to handle class imbalance for the detection of various types of network intrusions. Our deep learning model employs LSTM with fully connected layers to perform multi-class classification of network attacks. We enhance the representation of minority classes: i) through the application of the Synthetic Minority Over-sampling Technique (SMOTE), and ii) by employing categorical focal cross-entropy loss to apply a focal factor to down-weight examples of the majority classes and focus more on hard examples of the minority classes. Extensive experiments on KDD99 and CICIDS2017 datasets show promising results in detecting network intrusions (with many rare attack types, e.g., Probe, R2L, DDoS, PortScan, etc.).
△ Less
Submitted 3 October, 2023;
originally announced October 2023.
-
Vascular Ageing and Smoking Habit Prediction via a Low-Cost Single-Lead ECG Module
Authors:
S. Anas Ali,
M. Saqib Niaz,
Mubashir Rehman,
Ahsan Mehmood,
M. Mahboob Ur Rahman,
Kashif Riaz,
Qammer H. Abbasi
Abstract:
This paper presents a novel low-cost method to predict: i) the vascular age of a healthy young person, ii) whether or not a person is a smoker, using only the lead-I of the electrocardiogram (ECG). We begin by collecting (lead-I) ECG data from 42 healthy subjects (male, female, smoker, non-smoker) aged 18 to 30 years, using our custom-built low-cost single-lead ECG module, and anthropometric data,…
▽ More
This paper presents a novel low-cost method to predict: i) the vascular age of a healthy young person, ii) whether or not a person is a smoker, using only the lead-I of the electrocardiogram (ECG). We begin by collecting (lead-I) ECG data from 42 healthy subjects (male, female, smoker, non-smoker) aged 18 to 30 years, using our custom-built low-cost single-lead ECG module, and anthropometric data, e.g., body mass index, smoking status, blood pressure etc. Under our proposed method, we first pre-process our dataset by denoising the ECG traces, followed by baseline drift removal, followed by z-score normalization. Next, we divide ECG traces into overlapping segments of five-second duration, which leads to a 145-fold increase in the size of the dataset. We then feed our dataset to a number of machine learning models, a 1D convolutional neural network, a multi-layer perceptron (MLP), and ResNet18 transfer learning model. For vascular ageing prediction problem, Random Forest method outperforms all other methods with an R2 score of 0.99, and mean squared error of 0.07. For the binary classification problem that aims to differentiate between a smoker and a non-smoker, XGBoost method stands out with an accuracy of 96.5%. Finally, for the 4-class classification problem that aims to differentiate between male smoker, female smoker, male non-smoker, and female non-smoker, MLP method achieves the best accuracy of 97.5%. This work is aligned with the sustainable development goals of the United Nations which aim to provide low-cost but quality healthcare solutions to the unprivileged population.
△ Less
Submitted 18 December, 2023; v1 submitted 8 August, 2023;
originally announced August 2023.
-
Pathloss-based non-Line-of-Sight Identification in an Indoor Environment: An Experimental Study
Authors:
Muhammad Asim,
Muhammad Ozair Iqbal,
Waqas Aman,
Muhammad Mahboob Ur Rahman,
Qammer H. Abbasi
Abstract:
This paper reports the findings of an experimental study on the problem of line-of-sight (LOS)/non-line-of-sight (NLOS) classification in an indoor environment. Specifically, we deploy a pair of NI 2901 USRP software-defined radios (SDR) in a large hall. The transmit SDR emits an unmodulated tone of frequency 10 KHz, on a center frequency of 2.4 GHz, using three different signal-to-noise ratios (S…
▽ More
This paper reports the findings of an experimental study on the problem of line-of-sight (LOS)/non-line-of-sight (NLOS) classification in an indoor environment. Specifically, we deploy a pair of NI 2901 USRP software-defined radios (SDR) in a large hall. The transmit SDR emits an unmodulated tone of frequency 10 KHz, on a center frequency of 2.4 GHz, using three different signal-to-noise ratios (SNR). The receive SDR constructs a dataset of pathloss measurements from the received signal as it moves across 15 equi-spaced positions on a 1D grid (for both LOS and NLOS scenarios). We utilize our custom dataset to estimate the pathloss parameters (i.e., pathloss exponent) using the least-squares method, and later, utilize the parameterized pathloss model to construct a binary hypothesis test for NLOS identification. Further, noting that the pathloss measurements slightly deviate from Gaussian distribution, we feed our custom dataset to four machine learning (ML) algorithms, i.e., linear support vector machine (SVM) and radial basis function SVM (RBF-SVM), linear discriminant analysis (LDA), quadratic discriminant analysis (QDA), and logistic regression (LR). It turns out that the performance of the ML algorithms is only slightly superior to the Neyman-Pearson-based binary hypothesis test (BHT). That is, the RBF-SVM classifier (the best performing ML classifier) and the BHT achieve a maximum accuracy of 88.24% and 87.46% for low SNR, 83.91% and 81.21% for medium SNR, and 87.38% and 86.65% for high SNR.
△ Less
Submitted 29 July, 2023;
originally announced July 2023.
-
Non-Contact Monitoring of Dehydration using RF Data Collected off the Chest and the Hand
Authors:
Hasan Mujtaba Buttar,
Kawish Pervez,
M. Mahboob Ur Rahman,
Kashif Riaz,
Qammer H. Abbasi
Abstract:
We report a novel non-contact method for dehydration monitoring. We utilize a transmit software defined radio (SDR) that impinges a wideband radio frequency (RF) signal (of frequency 5.23 GHz) onto either the chest or the hand of a subject who sits nearby. Further, another SDR in the closed vicinity collects the RF signals reflected off the chest (or passed through the hand) of the subject. Note t…
▽ More
We report a novel non-contact method for dehydration monitoring. We utilize a transmit software defined radio (SDR) that impinges a wideband radio frequency (RF) signal (of frequency 5.23 GHz) onto either the chest or the hand of a subject who sits nearby. Further, another SDR in the closed vicinity collects the RF signals reflected off the chest (or passed through the hand) of the subject. Note that the two SDRs exchange orthogonal frequency division multiplexing (OFDM) signal, whose individual subcarriers get modulated once it reflects off (passes through) the chest (the hand) of the subject. This way, the signal collected by the receive SDR consists of channel frequency response (CFR) that captures the variation in the blood osmolality due to dehydration. The received raw CFR data is then passed through a handful of machine learning (ML) classifiers which once trained, output the classification result (i.e., whether a subject is hydrated or dehydrated). For the purpose of training our ML classifiers, we have constructed our custom HCDDM-RF-5 dataset by collecting data from 5 Muslim subjects (before and after sunset) who were fasting during the month of Ramadan. Specifically, we have implemented and tested the following ML classifiers (and their variants): K-nearest neighbour (KNN), support vector machine (SVM), decision tree (DT), ensemble classifier, and neural network classifier. Among all the classifiers, the neural network classifier acheived the best classification accuracy, i.e., an accuracy of 93.8% for the proposed CBDM method, and an accuracy of 96.15% for the proposed HBDM method. Compared to prior work where the reported accuracy is 97.83%, our proposed non-contact method is slightly inferior (as we report a maximum accuracy of 96.15%); nevertheless, the advantages of our non-contact dehydration method speak for themselves.
△ Less
Submitted 16 June, 2023;
originally announced June 2023.
-
Your smartphone could act as a pulse-oximeter and as a single-lead ECG
Authors:
Ahsan Mehmood,
Asma Sarauji,
M. Mahboob Ur Rahman,
Tareq Y. Al-Naffouri
Abstract:
In the post-covid19 era, every new wave of the pandemic causes an increased concern among the masses to learn more about their state of well-being. Therefore, it is the need of the hour to come up with ubiquitous, low-cost, non-invasive tools for rapid and continuous monitoring of body vitals that reflect the status of one's overall health. In this backdrop, this work proposes a deep learning appr…
▽ More
In the post-covid19 era, every new wave of the pandemic causes an increased concern among the masses to learn more about their state of well-being. Therefore, it is the need of the hour to come up with ubiquitous, low-cost, non-invasive tools for rapid and continuous monitoring of body vitals that reflect the status of one's overall health. In this backdrop, this work proposes a deep learning approach to turn a smartphone-the popular hand-held personal gadget-into a diagnostic tool to measure/monitor the three most important body vitals, i.e., pulse rate (PR), blood oxygen saturation level (aka SpO2), and respiratory rate (RR). Furthermore, we propose another method that could extract a single-lead electrocardiograph (ECG) of the subject. The proposed methods include the following core steps: subject records a small video of his/her fingertip by placing his/her finger on the rear camera of the smartphone, and the recorded video is pre-processed to extract the filtered and/or detrended video-photoplethysmography (vPPG) signal, which is then fed to custom-built convolutional neural networks (CNN), which eventually spit-out the vitals (PR, SpO2, and RR) as well as a single-lead ECG of the subject. To be precise, the contribution of this paper is two-fold: 1) estimation of the three body vitals (PR, SpO2, RR) from the vPPG data using custom-built CNNs, vision transformer, and most importantly by CLIP model; 2) a novel discrete cosine transform+feedforward neural network-based method that translates the recorded video- PPG signal to a single-lead ECG signal. The proposed method is anticipated to find its application in several use-case scenarios, e.g., remote healthcare, mobile health, fitness, sports, etc.
△ Less
Submitted 21 May, 2023;
originally announced May 2023.
-
Heart Murmur and Abnormal PCG Detection via Wavelet Scattering Transform & a 1D-CNN
Authors:
Ahmed Patwa,
Muhammad Mahboob Ur Rahman,
Tareq Y. Al-Naffouri
Abstract:
Heart murmurs provide valuable information about mechanical activity of the heart, which aids in diagnosis of various heart valve diseases. This work does automatic and accurate heart murmur detection from phonocardiogram (PCG) recordings. Two public PCG datasets (CirCor Digiscope 2022 dataset and PCG 2016 dataset) from Physionet online database are utilized to train and test three custom neural n…
▽ More
Heart murmurs provide valuable information about mechanical activity of the heart, which aids in diagnosis of various heart valve diseases. This work does automatic and accurate heart murmur detection from phonocardiogram (PCG) recordings. Two public PCG datasets (CirCor Digiscope 2022 dataset and PCG 2016 dataset) from Physionet online database are utilized to train and test three custom neural networks (NN): a 1D convolutional neural network (CNN), a long short-term memory (LSTM) recurrent neural network (RNN), and a convolutional RNN (C-RNN). We first do pre-processing which includes the following key steps: denoising, segmentation, re-labeling of noise-only segments, data normalization, and time-frequency analysis of the PCG segments using wavelet scattering transform. We then conduct four experiments, first three (E1-E3) using PCG 2022 dataset, and fourth (E4) using PCG 2016 dataset. It turns out that our custom 1D-CNN outperforms other two NNs (LSTM-RNN and C-RNN). Further, our 1D-CNN model outperforms the related work in terms of accuracy, weighted accuracy, F1-score and AUROC, for experiment E3 (that utilizes the cleaned and re-labeled PCG 2022 dataset). As for experiment E1 (that utilizes the original PCG 2022 dataset), our model performs quite close to the related work in terms of weighted accuracy and F1-score.
△ Less
Submitted 24 May, 2024; v1 submitted 12 March, 2023;
originally announced March 2023.
-
Inferior Myocardial Infarction Detection from lead II of ECG: A Gramian Angular Field-based 2D-CNN Approach
Authors:
Asim Yousuf,
Rehan Hafiz,
Saqib Riaz,
Muhammad Farooq,
Kashif Riaz,
Muhammad Mahboob Ur Rahman
Abstract:
This paper presents a novel method for inferior myocardial infarction (MI) detection using lead II of electrocardiogram (ECG). We evaluate our proposed method on a public dataset, namely, Physikalisch Technische Bundesanstalt (PTB) ECG dataset from Physionet. Under our proposed method, we first clean the noisy ECG signals using db4 wavelet, followed by an R-peak detection algorithm to segment the…
▽ More
This paper presents a novel method for inferior myocardial infarction (MI) detection using lead II of electrocardiogram (ECG). We evaluate our proposed method on a public dataset, namely, Physikalisch Technische Bundesanstalt (PTB) ECG dataset from Physionet. Under our proposed method, we first clean the noisy ECG signals using db4 wavelet, followed by an R-peak detection algorithm to segment the ECG signals into beats. We then translate the ECG timeseries dataset to an equivalent dataset of gray-scale images using Gramian Angular Summation Field (GASF) and Gramian Angular Difference Field (GADF) operations. Subsequently, the gray-scale images are fed into a custom two-dimensional convolutional neural network (2D-CNN) which efficiently differentiates between a healthy subject and a subject with MI. Our proposed approach achieves an average classification accuracy of 99.68%, 99.80%, 99.82%, and 99.84% under GASF dataset with noise and baseline wander, GADF dataset with noise and baseline wander, GASF dataset with noise and baseline wander removed, and GADF dataset with noise and baseline wander removed, respectively. Most importantly, this work opens the floor for innovation in wearable devices to measure lead II ECG (e.g., by a smart watch worn on right wrist, along with a smart patch on left leg), in order to do accurate, real-time and early detection of inferior wall MI.
△ Less
Submitted 29 August, 2024; v1 submitted 25 February, 2023;
originally announced February 2023.
-
A Deep Learning & Fast Wavelet Transform-based Hybrid Approach for Denoising of PPG Signals
Authors:
Rabia Ahmed,
Ahsan Mehmood,
Muhammad Mahboob Ur Rahman,
Octavia A. Dobre
Abstract:
This letter presents a novel hybrid method that leverages deep learning to exploit the multi-resolution analysis capability of the wavelets, in order to denoise a photoplethysmography (PPG) signal. Under the proposed method, a noisy PPG sequence of length N is first decomposed into L detailed coefficients using the fast wavelet transform (FWT). Then, the clean PPG sequence is reconstructed as foll…
▽ More
This letter presents a novel hybrid method that leverages deep learning to exploit the multi-resolution analysis capability of the wavelets, in order to denoise a photoplethysmography (PPG) signal. Under the proposed method, a noisy PPG sequence of length N is first decomposed into L detailed coefficients using the fast wavelet transform (FWT). Then, the clean PPG sequence is reconstructed as follows. A custom feedforward neural network (FFNN) provides the binary weights for each of the wavelet sub-signals outputted by the inverse-FWT block. This way, all those sub-signals which correspond to noise or artefacts are discarded during reconstruction. The FFNN is trained on the Beth Israel Deaconess Medical Center (BIDMC) dataset under the supervised learning framework, whereby we compute the mean squared-error (MSE) between the denoised sequence and the reference clean PPG signal, and compute the gradient of the MSE for the back-propagation. Numerical results show that the proposed method effectively denoises the corrupted PPG and video-PPG signal.
△ Less
Submitted 16 January, 2023;
originally announced January 2023.
-
Energy Disaggregation & Appliance Identification in a Smart Home: Transfer Learning enables Edge Computing
Authors:
M. Hashim Shahab,
Hasan Mujtaba Buttar,
Ahsan Mehmood,
Waqas Aman,
M. Mahboob Ur Rahman,
M. Wasim Nawaz,
Haris Pervaiz,
Qammer H. Abbasi
Abstract:
Non-intrusive load monitoring (NILM) or energy disaggregation aims to extract the load profiles of individual consumer electronic appliances, given an aggregate load profile of the mains of a smart home. This work proposes a novel deep-learning and edge computing approach to solve the NILM problem and a few related problems as follows. 1) We build upon the reputed seq2-point convolutional neural n…
▽ More
Non-intrusive load monitoring (NILM) or energy disaggregation aims to extract the load profiles of individual consumer electronic appliances, given an aggregate load profile of the mains of a smart home. This work proposes a novel deep-learning and edge computing approach to solve the NILM problem and a few related problems as follows. 1) We build upon the reputed seq2-point convolutional neural network (CNN) model to come up with the proposed seq2-[3]-point CNN model to solve the (home) NILM problem and site-NILM problem (basically, NILM at a smaller scale). 2) We solve the related problem of appliance identification by building upon the state-of-the-art (pre-trained) 2D-CNN models, i.e., AlexNet, ResNet-18, and DenseNet-121, which are fine-tuned two custom datasets that consist of Wavelets and short-time Fourier transform (STFT)-based 2D electrical signatures of the appliances. 3) Finally, we do some basic qualitative inference about an individual appliance's health by comparing the power consumption of the same appliance across multiple homes. Low-frequency REDD dataset is used for all problems, except site-NILM where REFIT dataset has been used. As for the results, we achieve a maximum accuracy of 94.6\% for home-NILM, 81\% for site-NILM, and 88.9\% for appliance identification (with Resnet-based model).
△ Less
Submitted 14 March, 2024; v1 submitted 8 January, 2023;
originally announced January 2023.
-
Hand-breathe: Non-Contact Monitoring of Breathing Abnormalities from Hand Palm
Authors:
Kawish Pervez,
Waqas Aman,
M. Mahboob Ur Rahman,
M. Wasim Nawaz,
Qammer H. Abbasi
Abstract:
In post-covid19 world, radio frequency (RF)-based non-contact methods, e.g., software-defined radios (SDR)-based methods have emerged as promising candidates for intelligent remote sensing of human vitals, and could help in containment of contagious viruses like covid19. To this end, this work utilizes the universal software radio peripherals (USRP)-based SDRs along with classical machine learning…
▽ More
In post-covid19 world, radio frequency (RF)-based non-contact methods, e.g., software-defined radios (SDR)-based methods have emerged as promising candidates for intelligent remote sensing of human vitals, and could help in containment of contagious viruses like covid19. To this end, this work utilizes the universal software radio peripherals (USRP)-based SDRs along with classical machine learning (ML) methods to design a non-contact method to monitor different breathing abnormalities. Under our proposed method, a subject rests his/her hand on a table in between the transmit and receive antennas, while an orthogonal frequency division multiplexing (OFDM) signal passes through the hand. Subsequently, the receiver extracts the channel frequency response (basically, fine-grained wireless channel state information), and feeds it to various ML algorithms which eventually classify between different breathing abnormalities. Among all classifiers, linear SVM classifier resulted in a maximum accuracy of 88.1\%. To train the ML classifiers in a supervised manner, data was collected by doing real-time experiments on 4 subjects in a lab environment. For label generation purpose, the breathing of the subjects was classified into three classes: normal, fast, and slow breathing. Furthermore, in addition to our proposed method (where only a hand is exposed to RF signals), we also implemented and tested the state-of-the-art method (where full chest is exposed to RF radiation). The performance comparison of the two methods reveals a trade-off, i.e., the accuracy of our proposed method is slightly inferior but our method results in minimal body exposure to RF radiation, compared to the benchmark method.
△ Less
Submitted 12 December, 2022;
originally announced December 2022.
-
Countering Active Attacks on RAFT-based IoT Blockchain Networks
Authors:
Hasan Mujtaba Buttar,
Waqas Aman,
M. Mahboob Ur Rahman,
Qammer H. Abbasi
Abstract:
This paper considers an Internet of Thing (IoT) blockchain network consisting of a leader node and various follower nodes which together implement the RAFT consensus protocol to verify a blockchain transaction, as requested by a blockchain client. Further, two kinds of active attacks, i.e., jamming and impersonation, are considered on the IoT blockchain network due to the presence of multiple {\it…
▽ More
This paper considers an Internet of Thing (IoT) blockchain network consisting of a leader node and various follower nodes which together implement the RAFT consensus protocol to verify a blockchain transaction, as requested by a blockchain client. Further, two kinds of active attacks, i.e., jamming and impersonation, are considered on the IoT blockchain network due to the presence of multiple {\it active} malicious nodes in the close vicinity. When the IoT network is under the jamming attack, we utilize the stochastic geometry tool to derive the closed-form expressions for the coverage probabilities for both uplink and downlink IoT transmissions. On the other hand, when the IoT network is under the impersonation attack, we propose a novel method that enables a receive IoT node to exploit the pathloss of a transmit IoT node as its fingerprint to implement a binary hypothesis test for transmit node identification. To this end, we also provide the closed-form expressions for the probabilities of false alarm, missed detection and miss-classification. Finally, we present detailed simulation results that indicate the following: i) the coverage probability improves as the jammers' locations move away from the IoT network, ii) the three error probabilities decrease as a function of the link quality.
△ Less
Submitted 2 April, 2022;
originally announced April 2022.
-
Underwater and Air-Water Wireless Communication: State-of-the-art, Channel Characteristics, Security, and Open Problems
Authors:
Waqas Aman,
Saif Al-Kuwari,
Ambrish Kumar,
Muhammad Mahboob Ur Rahman,
Muhammad Muzzammil
Abstract:
We present a first detailed survey on underwater and air-water (A-W) wireless communication networks (WCNs) that mainly focuses on the security challenges and the countermeasures proposed to date. For clarity of exposition, this survey paper is mainly divided into two parts. The first part of the paper focuses on the state-of-the-art underwater and A-W WCNs whereby we outline the benefits and draw…
▽ More
We present a first detailed survey on underwater and air-water (A-W) wireless communication networks (WCNs) that mainly focuses on the security challenges and the countermeasures proposed to date. For clarity of exposition, this survey paper is mainly divided into two parts. The first part of the paper focuses on the state-of-the-art underwater and A-W WCNs whereby we outline the benefits and drawbacks of the four promising underwater and A-W candidate technologies: radio frequency (RF), acoustic, optical and magnetic induction (MI), along with their channel characteristics. To this end, we also describe the indirect (relay-aided) and direct mechanisms for the A-W WCNs along with their channel characteristics. This sets the stage for the second part of the paper whereby we provide a thorough comparative discussion of a vast set of works that have reported the security breaches (as well as viable countermeasures) for many diverse configurations of the underwater and A-W WCNs. Specifically, we provide a detailed literature review of the various kinds of active and passive attacks which hamper the confidentiality, integrity, authentication and availability of both underwater and A-W WCNs. Finally, we highlight some research gaps in the open literature and identify security related some open problems for the future work.
△ Less
Submitted 3 September, 2022; v1 submitted 5 March, 2022;
originally announced March 2022.
-
Preventing Identity Attacks in RFID Backscatter Communication Systems: A Physical-Layer Approach
Authors:
Ahsan Mehmood,
Waqas Aman,
M. Mahboob Ur Rahman,
M. A. Imran,
Qammer H. Abbasi
Abstract:
This work considers identity attack on a radio-frequency identification (RFID)-based backscatter communication system. Specifically, we consider a single-reader, single-tag RFID system whereby the reader and the tag undergo two-way signaling which enables the reader to extract the tag ID in order to authenticate the legitimate tag (L-tag). We then consider a scenario whereby a malicious tag (M-tag…
▽ More
This work considers identity attack on a radio-frequency identification (RFID)-based backscatter communication system. Specifically, we consider a single-reader, single-tag RFID system whereby the reader and the tag undergo two-way signaling which enables the reader to extract the tag ID in order to authenticate the legitimate tag (L-tag). We then consider a scenario whereby a malicious tag (M-tag)---having the same ID as the L-tag programmed in its memory by a wizard---attempts to deceive the reader by pretending to be the L-tag. To this end, we counter the identity attack by exploiting the non-reciprocity of the end-to-end channel (i.e., the residual channel) between the reader and the tag as the fingerprint of the tag. The passive nature of the tag(s) (and thus, lack of any computational platform at the tag) implies that the proposed light-weight physical-layer authentication method is implemented at the reader. To be concrete, in our proposed scheme, the reader acquires the raw data via two-way (challenge-response) message exchange mechanism, does least-squares estimation to extract the fingerprint, and does binary hypothesis testing to do authentication. We also provide closed-form expressions for the two error probabilities of interest (i.e., false alarm and missed detection). Simulation results attest to the efficacy of the proposed method.
△ Less
Submitted 1 September, 2020;
originally announced September 2020.
-
On the Effective Capacity of IRS-assisted wireless communication
Authors:
Waqas Aman,
M. Mahboob Ur Rahman,
Shuja Ansari,
Ali Arshad Nasir,
Khalid Qaraqe,
M. Ali Imran,
Qammer H. Abbasi
Abstract:
We consider futuristic, intelligent reflecting surfaces (IRS)-aided communication between a base station (BS) and a user equipment (UE) for two distinct scenarios: a single-input, single-output (SISO) system whereby the BS has a single antenna, and a multi-input, single-output (MISO) system whereby the BS has multiple antennas. For the considered IRS-assisted downlink, we compute the effective cap…
▽ More
We consider futuristic, intelligent reflecting surfaces (IRS)-aided communication between a base station (BS) and a user equipment (UE) for two distinct scenarios: a single-input, single-output (SISO) system whereby the BS has a single antenna, and a multi-input, single-output (MISO) system whereby the BS has multiple antennas. For the considered IRS-assisted downlink, we compute the effective capacity (EC), which is a quantitative measure of the statistical quality-of-service (QoS) offered by a communication system experiencing random fading. For our analysis, we consider the two widely-known assumptions on channel state information (CSI) -- i.e., perfect CSI and no CSI, at the BS. Thereafter, we first derive the distribution of the signal-to-noise ratio (SNR) for both SISO and MISO scenarios, and subsequently derive closed-form expressions for the EC under perfect CSI and no CSI cases, for both SISO and MISO scenarios. Furthermore, for the SISO and MISO systems with no CSI, it turns out that the EC could be maximized further by searching for an optimal transmission rate $r^*$, which is computed by exploiting the iterative gradient-descent method. We provide extensive simulation results which investigate the impact of the various system parameters, e.g., QoS exponent, power budget, number of transmit antennas at the BS, number of reflective elements at the IRS etc., on the EC of the system.
△ Less
Submitted 21 January, 2021; v1 submitted 14 July, 2020;
originally announced July 2020.
-
Securing the Insecure: A First-Line-of-Defense for Nanoscale Communication Systems Operating in THz Band
Authors:
Waqas Aman,
M. Mahboob Ur Rahman,
Hassan T. Abbas,
Muhammad Arslan Khalid,
Muhammad A. Imran,
Akram Alomainy,
Qammer H. Abbasi
Abstract:
Nanoscale communication systems operating in Ter-ahertz (THz) band are anticipated to revolutionise the healthcaresystems of the future. Global wireless data traffic is undergoinga rapid growth. However, wireless systems, due to their broad-casting nature, are vulnerable to malicious security breaches. Inaddition, advances in quantum computing poses a risk to existingcrypto-based information secur…
▽ More
Nanoscale communication systems operating in Ter-ahertz (THz) band are anticipated to revolutionise the healthcaresystems of the future. Global wireless data traffic is undergoinga rapid growth. However, wireless systems, due to their broad-casting nature, are vulnerable to malicious security breaches. Inaddition, advances in quantum computing poses a risk to existingcrypto-based information security. It is of the utmost importanceto make the THz systems resilient to potential active and passiveattacks which may lead to devastating consequences, especiallywhen handling sensitive patient data in healthcare systems. Newstrategies are needed to analyse these malicious attacks and topropose viable countermeasures. In this manuscript, we presenta new authentication mechanism for nanoscale communicationsystems operating in THz band at the physical layer. We assessedan impersonation attack on a THz system. We propose usingpath loss as a fingerprint to conduct authentication via two-stephypothesis testing for a transmission device. We used hiddenMarkov Model (HMM) viterbi algorithm to enhance the outputof hypothesis testing. We also conducted transmitter identificationusing maximum likelihood and Gaussian mixture model (GMM)expectation maximization algorithms. Our simulations showedthat the error probabilities are a decreasing functions of SNR. At 10 dB with 0.2 false alarm, the detection probability was almostone. We further observed that HMM out-performs hypothesistesting at low SNR regime (10% increase in accuracy is recordedat SNR =5 dB) whereas the GMM is useful when groundtruths are noisy. Our work addresses major security gaps facedby communication system either through malicious breachesor quantum computing, enabling new applications of nanoscalesystems for Industry 4.0.
△ Less
Submitted 14 July, 2020;
originally announced July 2020.
-
On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack
Authors:
Waqas Aman,
Zeeshan Haider,
S. Waqas H. Shah,
M. Mahboob Ur Rahman,
Octavia A. Dobre
Abstract:
This paper investigates the impact of authentication on effective capacity (EC) of an underwater acoustic (UWA) channel. Specifically, the UWA channel is under impersonation attack by a malicious node (Eve) present in the close vicinity of the legitimate node pair (Alice and Bob); Eve tries to inject its malicious data into the system by making Bob believe that she is indeed Alice. To thwart the i…
▽ More
This paper investigates the impact of authentication on effective capacity (EC) of an underwater acoustic (UWA) channel. Specifically, the UWA channel is under impersonation attack by a malicious node (Eve) present in the close vicinity of the legitimate node pair (Alice and Bob); Eve tries to inject its malicious data into the system by making Bob believe that she is indeed Alice. To thwart the impersonation attack by Eve, Bob utilizes the distance of the transmit node as the feature/fingerprint to carry out feature-based authentication at the physical layer. Due to authentication at Bob, due to lack of channel knowledge at the transmit node (Alice or Eve), and due to the threshold-based decoding error model, the relevant dynamics of the considered system could be modelled by a Markov chain (MC). Thus, we compute the state-transition probabilities of the MC, and the moment generating function for the service process corresponding to each state. This enables us to derive a closed-form expression of the EC in terms of authentication parameters. Furthermore, we compute the optimal transmission rate (at Alice) through gradient-descent (GD) technique and artificial neural network (ANN) method. Simulation results show that the EC decreases under severe authentication constraints (i.e., more false alarms and more transmissions by Eve). Simulation results also reveal that the (optimal transmission rate) performance of the ANN technique is quite close to that of the GD method.
△ Less
Submitted 12 February, 2020;
originally announced February 2020.
-
Channel Impulse Response-based Physical Layer Authentication in a Diffusion-based Molecular Communication System
Authors:
Sidra Zafar,
Waqas Aman,
Muhammad Mahboob Ur Rahman,
Akram Alomainy,
Qammer H. Abbasi
Abstract:
Consider impersonation attack by an active malicious nano node (Eve) on a diffusion based molecular communication (DbMC) system---Eve transmits during the idle slots to deceive the nano receiver (Bob) that she is indeed the legitimate nano transmitter (Alice). To this end, this work exploits the 3-dimensional (3D) channel impulse response (CIR) with $L$ taps as device fingerprint for authenticatio…
▽ More
Consider impersonation attack by an active malicious nano node (Eve) on a diffusion based molecular communication (DbMC) system---Eve transmits during the idle slots to deceive the nano receiver (Bob) that she is indeed the legitimate nano transmitter (Alice). To this end, this work exploits the 3-dimensional (3D) channel impulse response (CIR) with $L$ taps as device fingerprint for authentication of the nano transmitter during each slot. Specifically, Bob utilizes the Alice's CIR as ground truth to construct a binary hypothesis test to systematically accept/reject the data received in each slot. Simulation results highlight the great challenge posed by impersonation attack--i.e., it is not possible to simultaneously minimize the two error probabilities. In other words, one needs to tolerate on one error type in order to minimize the other error type.
△ Less
Submitted 18 July, 2019;
originally announced July 2019.
-
Channel Impulse Response-based Source Localization in a Diffusion-based Molecular Communication System
Authors:
Henry Ernest Baidoo-Williams,
Muhammad Mahboob Ur Rahman,
Qammer Hussain Abbasi
Abstract:
This work localizes a molecular source in a diffusion based molecular communication (DbMC) system via a set of passive sensors and a fusion center. Molecular source localization finds its applications in future healthcare systems, including proactive diagnostics. In this paper, we propose two distinct methods which both utilize (the peak of) the channel impulse response measurements to uniquely lo…
▽ More
This work localizes a molecular source in a diffusion based molecular communication (DbMC) system via a set of passive sensors and a fusion center. Molecular source localization finds its applications in future healthcare systems, including proactive diagnostics. In this paper, we propose two distinct methods which both utilize (the peak of) the channel impulse response measurements to uniquely localize the source, under assumption that the molecular source of interest lies within the open convex-hull of the sensor/anchor nodes. The first method is a one-shot, triangulation-based approach which estimates the unknown location of the molecular source using least-squares method. The corresponding Cramer-Rao bound (CRB) is also derived. The second method is an iterative approach, which utilizes gradient descent law to minimize a non-convex cost function. Simulation results reveal that the triangulation-based method performs very close to the CRB, for any given signal- to-noise ratio. Additionally, the gradient descent-based method converges to the true optima/source location uniformly (in less than hundred iterations).
△ Less
Submitted 8 July, 2019;
originally announced July 2019.
-
Shared Secret Key Generation via Carrier Frequency Offsets
Authors:
Waqas Aman,
Aneeqa Ijaz,
M. Mahboob Ur Rahman,
Dushanta Nalin K. Jayakody,
Haris Pervaiz
Abstract:
This work presents a novel method to generate secret keys shared between a legitimate node pair (Alice and Bob) to safeguard the communication between them from an unauthorized node (Eve). To this end, we exploit the {\it reciprocal carrier frequency offset} (CFO) between the legitimate node pair to extract common randomness out of it to generate shared secret keys. The proposed key generation alg…
▽ More
This work presents a novel method to generate secret keys shared between a legitimate node pair (Alice and Bob) to safeguard the communication between them from an unauthorized node (Eve). To this end, we exploit the {\it reciprocal carrier frequency offset} (CFO) between the legitimate node pair to extract common randomness out of it to generate shared secret keys. The proposed key generation algorithm involves standard steps: the legitimate nodes exchange binary phase-shift keying (BPSK) signals to perform blind CFO estimation on the received signals, and do equi-probable quantization of the noisy CFO estimates followed by information reconciliation--to distil a shared secret key. Furthermore, guided by the Allan deviation curve, we distinguish between the two frequency-stability regimes---when the randomly time-varying CFO process i) has memory, ii) is memoryless; thereafter, we compute the key generation rate for both regimes. Simulation results show that the key disagreement rate decreases exponentially with increase in the signal to noise ratio of the link between Alice and Bob. Additionally, the decipher probability of Eve decreases as soon as either of the two links observed by the Eve becomes more degraded compared to the link between Alice and Bob.
△ Less
Submitted 28 February, 2019;
originally announced February 2019.
-
Modulation Mode Detection & Classification for in-Vivo Nano-Scale Communication Systems Operating in Terahertz Band
Authors:
M. Ozair Iqbal,
M. Mahboob Ur Rahman,
M. Ali Imran,
Akram Alomainy,
Qammer H. Abbasi
Abstract:
This work initiates the efforts to design an intelligent/cognitive nano receiver operating in Terahertz (THz) band. Specifically, we investigate two essential ingredients of an intelligent nano receiver---modulation mode detection (to differentiate between pulse based modulation and carrier based modulation), and modulation classification (to identify the exact modulation scheme in use). To implem…
▽ More
This work initiates the efforts to design an intelligent/cognitive nano receiver operating in Terahertz (THz) band. Specifically, we investigate two essential ingredients of an intelligent nano receiver---modulation mode detection (to differentiate between pulse based modulation and carrier based modulation), and modulation classification (to identify the exact modulation scheme in use). To implement modulation mode detection, we construct a binary hypothesis test in nano-receiver's passband, and provide closed-form expressions for the two error probabilities. As for modulation classification, we aim to represent the received signal of interest by a Gaussian mixture model (GMM). This necessitates the explicit estimation of the THz channel impulse response, and its subsequent compensation (via deconvolution). We then learn the GMM parameters via Expectation-Maximization algorithm. We then do Gaussian approximation of each mixture density to compute symmetric Kullback-Leibler divergence in order to differentiate between various modulation schemes (i.e., $M$-ary phase shift keying, $M$-ary quadrature amplitude modulation). The simulation results on mode detection indicate that there exists a unique Pareto-optimal point (for both SNR and the decision threshold) where both error probabilities are minimized. The main takeaway message by the simulation results on modulation classification is that for a pre-specified probability of correct classification, higher SNR is required to correctly identify a higher order modulation scheme.
On a broader note, this work should trigger the interest of the community in the design of intelligent/cognitive nano receivers (capable of performing various intelligent tasks, e.g., modulation prediction etc.).
△ Less
Submitted 28 July, 2018;
originally announced July 2018.
-
Maximizing Secrecy Rate of an OFDM-based Multi-hop Underwater Acoustic Sensor Network
Authors:
Waqas Aman,
M. Mahboob Ur Rahman,
Zeeshan Haider,
Junaid Qadir,
M. Wasim Nawaz,
Guftaar Ahmad Sardar Sidhu
Abstract:
In this paper, we consider an eavesdropping attack on a multi-hop, UnderWater Acoustic Sensor Network (UWASN) that consists of $M+1$ underwater sensors which report their sensed data via Orthogonal Frequency Division Multiplexing (OFDM) scheme to a sink node on the water surface. Furthermore, due to the presence of a passive malicious node in nearby vicinity, the multi-hop UnderWater Acoustic (UWA…
▽ More
In this paper, we consider an eavesdropping attack on a multi-hop, UnderWater Acoustic Sensor Network (UWASN) that consists of $M+1$ underwater sensors which report their sensed data via Orthogonal Frequency Division Multiplexing (OFDM) scheme to a sink node on the water surface. Furthermore, due to the presence of a passive malicious node in nearby vicinity, the multi-hop UnderWater Acoustic (UWA) channel between a sensor node and the sink node is prone to eavesdropping attack on each hop. Therefore, the problem at hand is to do (helper/relay) node selection (for data forwarding onto the next hop) as well as power allocation (across the OFDM sub-carriers) in a way that the secrecy rate is maximized at each hop. To this end, this problem of Node Selection and Power Allocation (NSPA) is formulated as a mixed binary-integer optimization program, which is then optimally solved via decomposition approach, and by exploiting duality theory along with the Karush-Kuhn-Tucker conditions. We also provide a computationally-efficient, sub-optimal solution to the NSPA problem, where we reformulate it as a mixed-integer linear program and solve it via decomposition and geometric approach. Moreover, when the UWA channel is multipath (and not just line-of-sight), we investigate an additional, machine learning-based approach to solve the NSPA problem. Finally, we compute the computational complexity of all the three proposed schemes (optimal, sub-optimal, and learning-based), and do extensive simulations to compare their performance against each other and against the baseline schemes (which allocate equal power to all the sub-carriers and do depth-based node selection). In a nutshell, this work proposes various (optimal and sub-optimal) methods for providing information-theoretic security at the physical layer of the protocol stack through resource allocation.
△ Less
Submitted 19 July, 2020; v1 submitted 4 July, 2018;
originally announced July 2018.
-
Power Imbalance Detection in Smart Grid via Grid Frequency Deviations: A Hidden Markov Model based Approach
Authors:
Shah Hassan,
Hadia Sajjad,
Muhammad Mahboob Ur Rahman
Abstract:
We detect the deviation of the grid frequency from the nominal value (i.e., 50 Hz), which itself is an indicator of the power imbalance (i.e., mismatch between power generation and load demand). We first pass the noisy estimates of grid frequency through a hypothesis test which decides whether there is no deviation, positive deviation, or negative deviation from the nominal value. The hypothesis t…
▽ More
We detect the deviation of the grid frequency from the nominal value (i.e., 50 Hz), which itself is an indicator of the power imbalance (i.e., mismatch between power generation and load demand). We first pass the noisy estimates of grid frequency through a hypothesis test which decides whether there is no deviation, positive deviation, or negative deviation from the nominal value. The hypothesis testing incurs miss-classification errors---false alarms (i.e., there is no deviation but we declare a positive/negative deviation), and missed detections (i.e., there is a positive/negative deviation but we declare no deviation). Therefore, to improve further upon the performance of the hypothesis test, we represent the grid frequency's fluctuations over time as a discrete-time hidden Markov model (HMM). We note that the outcomes of the hypothesis test are actually the emitted symbols, which are related to the true states via emission probability matrix. We then estimate the hidden Markov sequence (the true values of the grid frequency) via maximum likelihood method by passing the observed/emitted symbols through the Viterbi decoder. Simulations results show that the mean accuracy of Viterbi algorithm is at least $5$\% greater than that of hypothesis test.
△ Less
Submitted 2 July, 2018;
originally announced July 2018.
-
Impersonation Detection in Line-of-Sight Underwater Acoustic Sensor Networks
Authors:
Waqas Aman,
Muhammad Mahboob Ur Rahman,
Junaid Qadir,
Haris Pervaiz,
Qiang Ni
Abstract:
This work considers a line-of-sight underwater acoustic sensor network (UWASN) consisting of $M$ underwater sensor nodes randomly deployed according to uniform distribution within a vertical half-disc (the so-called trusted zone). The sensor nodes report their sensed data to a sink node on water surface on a shared underwater acoustic (UWA) reporting channel in a time-division multiple-access (TDM…
▽ More
This work considers a line-of-sight underwater acoustic sensor network (UWASN) consisting of $M$ underwater sensor nodes randomly deployed according to uniform distribution within a vertical half-disc (the so-called trusted zone). The sensor nodes report their sensed data to a sink node on water surface on a shared underwater acoustic (UWA) reporting channel in a time-division multiple-access (TDMA) fashion, while an active-yet-invisible adversary (so-called Eve) is present in the close vicinity who aims to inject malicious data into the system by impersonating some Alice node. To this end, this work first considers an additive white Gaussian noise (AWGN) UWA channel, and proposes a novel, multiple-features based, two-step method at the sink node to thwart the potential impersonation attack by Eve. Specifically, the sink node exploits the noisy estimates of the distance, the angle of arrival, and the location of the transmit node as device fingerprints to carry out a number of binary hypothesis tests (for impersonation detection) as well as a number of maximum likelihood hypothesis tests (for transmitter identification when no impersonation is detected). We provide closed-form expressions for the error probabilities (i.e., the performance) of most of the hypothesis tests. We then consider the case of a UWA with colored noise and frequency-dependent pathloss, and derive a maximum-likelihood (ML) distance estimator as well as the corresponding Cramer-Rao bound (CRB). We then invoke the proposed two-step, impersonation detection framework by utilizing distance as the sole feature. Finally, we provide detailed simulation results for both AWGN UWA channel and the UWA channel with colored noise. Simulation results verify that the proposed scheme is indeed effective for a UWA channel with colored noise and frequency-dependent pathloss.
△ Less
Submitted 7 August, 2018; v1 submitted 31 May, 2018;
originally announced May 2018.
-
Random Forest Resource Allocation for 5G Systems: Performance and Robustness Study
Authors:
Sahar Imtiaz,
Hadi Ghauch,
Muhammad Mahboob Ur Rahman,
George Koudouridis,
James Gross
Abstract:
Next generation cellular networks will have to leverage large cell densifications to accomplish the ambitious goals for aggregate multi-user sum rates, for which CRAN architecture is a favored network design. This shifts the attention back to applicable resource allocation (RA), which need to be applicable for very short radio frames, large and dense sets of radio heads, and large user populations…
▽ More
Next generation cellular networks will have to leverage large cell densifications to accomplish the ambitious goals for aggregate multi-user sum rates, for which CRAN architecture is a favored network design. This shifts the attention back to applicable resource allocation (RA), which need to be applicable for very short radio frames, large and dense sets of radio heads, and large user populations in the coordination area. So far, mainly CSI-based RA schemes have been proposed for this task. However, they have considerable complexity and also incur a significant CSI acquisition overhead on the system. In this paper, we study an alternative approach which promises lower complexity with also a lower overhead. We propose to base the RA in multi-antenna CRAN systems on the position information of user terminals only. We use Random Forests as supervised machine learning approach to determine the multi-user RAs. This likely leads to lower overhead costs, as the acquisition of position information requires less radio resources in comparison to the acquisition of instantaneous CSI. The results show the following findings: I) In general, learning-based RA schemes can achieve comparable spectral efficiency to CSI-based scheme; II) If taking the system overhead into account, learning-based RA scheme utilizing position information outperform legacy CSI-based scheme by up to 100%; III) Despite their dependency on the training data, Random Forests based RA scheme is robust against position inaccuracies and changes in the propagation scenario; IV) The most important factor influencing the performance of learning-based RA scheme is the antenna orientation, for which we present three approaches that restore most of the original performance results. To the best of our knowledge, these insights are new and indicate a novel as well as promising approach to master the complexity in future cellular networks.
△ Less
Submitted 30 March, 2017;
originally announced March 2017.
-
Channel Impulse Response-based Distributed Physical Layer Authentication
Authors:
Ammar Mahmood,
Waqas Aman,
M. Ozair Iqbal,
M. Mahboob Ur Rahman,
Qammer H. Abbasi
Abstract:
In this preliminary work, we study the problem of {\it distributed} authentication in wireless networks. Specifically, we consider a system where multiple Bob (sensor) nodes listen to a channel and report their {\it correlated} measurements to a Fusion Center (FC) which makes the ultimate authentication decision. For the feature-based authentication at the FC, channel impulse response has been uti…
▽ More
In this preliminary work, we study the problem of {\it distributed} authentication in wireless networks. Specifically, we consider a system where multiple Bob (sensor) nodes listen to a channel and report their {\it correlated} measurements to a Fusion Center (FC) which makes the ultimate authentication decision. For the feature-based authentication at the FC, channel impulse response has been utilized as the device fingerprint. Additionally, the {\it correlated} measurements by the Bob nodes allow us to invoke Compressed sensing to significantly reduce the reporting overhead to the FC. Numerical results show that: i) the detection performance of the FC is superior to that of a single Bob-node, ii) compressed sensing leads to at least $20\%$ overhead reduction on the reporting channel at the expense of a small ($<1$ dB) SNR margin to achieve the same detection performance.
△ Less
Submitted 24 March, 2017;
originally announced March 2017.
-
Distributed Beamforming with Wirelessly Powered Relay Nodes
Authors:
Muhammad Ozair Iqbal,
Ammar Mahmood,
Muhammad Mahboob Ur Rahman,
Qammer H. Abbasi
Abstract:
This paper studies a system where a set of $N$ relay nodes harvest energy from the signal received from a source to later utilize it when forwarding the source's data to a destination node via distributed beamforming. To this end, we derive (approximate) analytical expressions for the mean SNR at destination node when relays employ: i) time-switching based energy harvesting policy, ii) power-split…
▽ More
This paper studies a system where a set of $N$ relay nodes harvest energy from the signal received from a source to later utilize it when forwarding the source's data to a destination node via distributed beamforming. To this end, we derive (approximate) analytical expressions for the mean SNR at destination node when relays employ: i) time-switching based energy harvesting policy, ii) power-splitting based energy harvesting policy. The obtained results facilitate the study of the interplay between the energy harvesting parameters and the synchronization error, and their combined impact on mean SNR. Simulation results indicate that i) the derived approximate expressions are very accurate even for small $N$ (e.g., $N=15$), ii) time-switching policy by the relays outperforms power-splitting policy by at least $3$ dB.
△ Less
Submitted 6 March, 2017;
originally announced March 2017.
-
Exploiting Lack of Hardware Reciprocity for Sender-Node Authentication at the PHY Layer
Authors:
Muhammad Mahboob Ur Rahman,
Aneela Yasmeen
Abstract:
This paper proposes to exploit the so-called {\it reciprocity parameters} (modelling non-reciprocal communication hardware) to use them as decision metric for binary hypothesis testing based authentication framework at a receiver node Bob. Specifically, Bob first learns the reciprocity parameters of the legitimate sender Alice via initial training. Then, during the test phase, Bob first obtains a…
▽ More
This paper proposes to exploit the so-called {\it reciprocity parameters} (modelling non-reciprocal communication hardware) to use them as decision metric for binary hypothesis testing based authentication framework at a receiver node Bob. Specifically, Bob first learns the reciprocity parameters of the legitimate sender Alice via initial training. Then, during the test phase, Bob first obtains a measurement of reciprocity parameters of channel occupier (Alice, or, the intruder Eve). Then, with ground truth and current measurement both in hand, Bob carries out the hypothesis testing to automatically accept (reject) the packets sent by Alice (Eve). For the proposed scheme, we provide its success rate (the detection probability of Eve), and its performance comparison with other schemes.
△ Less
Submitted 9 October, 2016;
originally announced October 2016.
-
Learning-Based Resource Allocation Scheme for TDD-Based CRAN System
Authors:
Sahar Imtiaz,
Hadi Ghauch,
M. Mahboob Ur Rahman,
George Koudouridis,
James Gross
Abstract:
Explosive growth in the use of smart wireless devices has necessitated the provision of higher data rates and always-on connectivity, which are the main motivators for designing the fifth generation (5G) systems. To achieve higher system efficiency, massive antenna deployment with tight coordination is one potential strategy for designing 5G systems, but has two types of associated system overhead…
▽ More
Explosive growth in the use of smart wireless devices has necessitated the provision of higher data rates and always-on connectivity, which are the main motivators for designing the fifth generation (5G) systems. To achieve higher system efficiency, massive antenna deployment with tight coordination is one potential strategy for designing 5G systems, but has two types of associated system overhead. First is the synchronization overhead, which can be reduced by implementing a cloud radio access network (CRAN)-based architecture design, that separates the baseband processing and radio access functionality to achieve better system synchronization. Second is the overhead for acquiring channel state information (CSI) of the users present in the system, which, however, increases tremendously when instantaneous CSI is used to serve high-mobility users. To serve a large number of users, a CRAN system with a dense deployment of remote radio heads (RRHs) is considered, such that each user has a line-of-sight (LOS) link with the corresponding RRH. Since, the trajectory of movement for high-mobility users is predictable; therefore, fairly accurate position estimates for those users can be obtained, and can be used for resource allocation to serve the considered users. The resource allocation is dependent upon various correlated system parameters, and these correlations can be learned using well-known \emph{machine learning} algorithms. This paper proposes a novel \emph{learning-based resource allocation scheme} for time division duplex (TDD) based 5G CRAN systems with dense RRH deployment, by using only the users' position estimates for resource allocation, thus avoiding the need for CSI acquisition. This reduces the overall system overhead significantly, while still achieving near-optimal system performance; thus, better (effective) system efficiency is achieved. (See the paper for full abstract)
△ Less
Submitted 29 August, 2016;
originally announced August 2016.
-
Coordination and Antenna Domain Formation in Cloud-RAN systems
Authors:
Hadi Ghauch,
Muhammad Mahboob Ur Rahman,
Sahar Imtiaz,
James Gross
Abstract:
We study here the problem of Antenna Domain Formation (ADF) in cloud RAN systems, whereby multiple remote radio-heads (RRHs) are each to be assigned to a set of antenna domains (ADs), such that the total interference between the ADs is minimized. We formulate the corresponding optimization problem, by introducing the concept of \emph{interference coupling coefficients} among pairs of radio-heads.…
▽ More
We study here the problem of Antenna Domain Formation (ADF) in cloud RAN systems, whereby multiple remote radio-heads (RRHs) are each to be assigned to a set of antenna domains (ADs), such that the total interference between the ADs is minimized. We formulate the corresponding optimization problem, by introducing the concept of \emph{interference coupling coefficients} among pairs of radio-heads. We then propose a low-overhead algorithm that allows the problem to be solved in a distributed fashion, among the aggregation nodes (ANs), and establish basic convergence results. Moreover, we also propose a simple relaxation to the problem, thus enabling us to characterize its maximum performance. We follow a layered coordination structure: after the ADs are formed, radio-heads are clustered to perform coordinated beamforming using the well known Weighted-MMSE algorithm. Finally, our simulations show that using the proposed ADF mechanism would significantly increase the sum-rate of the system (with respect to random assignment of radio-heads).
△ Less
Submitted 28 June, 2016;
originally announced June 2016.
-
User Assignment in C-RAN Systems: Algorithms and Bounds
Authors:
Hadi Ghauch,
Muhammad Mahboob Ur Rahman,
Sahar Imtiaz,
James Gross,
Mikael Skoglund,
Christer Qvarfordt
Abstract:
In this work, we investigate the problem of mitigating interference between so called antenna domains of a cloud radio access network (C-RAN). In contrast to previous work, we turn to an approach utilizing primarily the optimal assignment of users to central processors in a C-RAN deployment. We formulate this user assignment problem as an integer optimization problem, and propose an iterative algo…
▽ More
In this work, we investigate the problem of mitigating interference between so called antenna domains of a cloud radio access network (C-RAN). In contrast to previous work, we turn to an approach utilizing primarily the optimal assignment of users to central processors in a C-RAN deployment. We formulate this user assignment problem as an integer optimization problem, and propose an iterative algorithm for obtaining a solution. Motivated by the lack of optimality guarantees on such solutions, we opt to find lower bounds on the problem, and the resulting interference leakage in the network. We thus derive the corresponding Dantzig-Wolfe decomposition, formulate the dual problem, and show that the former offers a tighter bound than the latter. We highlight the fact that the bounds in question consist of linear problems with an exponential number of variables, and adapt the column generation method for solving them. In addition to shedding light on the tightness of the bounds in question, our numerical results show significant sum-rate gains over several comparison schemes. Moreover, the proposed scheme delivers similar performance as W-MMSE with a significantly lower complexity (around 10 times less).
△ Less
Submitted 1 March, 2018; v1 submitted 27 June, 2016;
originally announced June 2016.
-
RRH clustering and transmit precoding for interference-limited 5G CRAN downlink
Authors:
Muhammad Mahboob Ur Rahman,
Hadi Ghauch,
Sahar Imtiaz,
James Gross
Abstract:
In this work, we consider cloud RAN architecture and focus on the downlink of an antenna domain (AD) exposed to external interference from neighboring ADs. With system sum-rate as performance metric, and assuming that perfect channel state information is available at the aggregation node (AN), we implement i) a greedy user association algorithm, and ii) a greedy remote radio-head (RRH) clustering…
▽ More
In this work, we consider cloud RAN architecture and focus on the downlink of an antenna domain (AD) exposed to external interference from neighboring ADs. With system sum-rate as performance metric, and assuming that perfect channel state information is available at the aggregation node (AN), we implement i) a greedy user association algorithm, and ii) a greedy remote radio-head (RRH) clustering algorithm at the AN. We then vary the size of individual RRH clusters, and evaluate and compare the sum-rate gains due to two distinct transmit precoding schemes namely i) zero forcing beamforming (ZFBF), ii) coordinated beamforming (CB), when exposed to external interference of same kind. From system-level simulation results, we learn that in an interference-limited regime: i) RRH clustering helps, i.e., {\it cost-adjusted} performance when RRHs cooperate is superior to the performance when they don't, ii) for transmit precoding, the CB scheme is to be preferred over the ZFBF scheme. Finally, we discuss in detail the cost of RRH clustering, i.e., the piloting overhead (and the elements driving it), incorporate its impact on system sum-rate, and discuss its implications on the baseband processing capabilities of the RRHs.
△ Less
Submitted 26 October, 2015;
originally announced October 2015.