scholarly journals A Generative Method for Indoor Localization Using Wi-Fi Fingerprinting

Sensors ◽  
2021 ◽  
Vol 21 (7) ◽  
pp. 2392
Author(s):  
Óscar Belmonte-Fernández ◽  
Emilio Sansano-Sansano ◽  
Antonio Caballer-Miedes ◽  
Raúl Montoliu ◽  
Rubén García-Vidal ◽  
...  

Indoor localization is an enabling technology for pervasive and mobile computing applications. Although different technologies have been proposed for indoor localization, Wi-Fi fingerprinting is one of the most used techniques due to the pervasiveness of Wi-Fi technology. Most Wi-Fi fingerprinting localization methods presented in the literature are discriminative methods. We present a generative method for indoor localization based on Wi-Fi fingerprinting. The Received Signal Strength Indicator received from a Wireless Access Point is modeled by a hidden Markov model. Unlike other algorithms, the use of a hidden Markov model allows ours to take advantage of the temporal autocorrelation present in the Wi-Fi signal. The algorithm estimates the user’s location based on the hidden Markov model, which models the signal and the forward algorithm to determine the likelihood of a given time series of Received Signal Strength Indicators. The proposed method was compared with four other well-known Machine Learning algorithms through extensive experimentation with data collected in real scenarios. The proposed method obtained competitive results in most scenarios tested and was the best method in 17 of 60 experiments performed.

2014 ◽  
Vol 2014 ◽  
pp. 1-7 ◽  
Author(s):  
Yanxue Zhang ◽  
Dongmei Zhao ◽  
Jinxing Liu

The biggest difficulty of hidden Markov model applied to multistep attack is the determination of observations. Now the research of the determination of observations is still lacking, and it shows a certain degree of subjectivity. In this regard, we integrate the attack intentions and hidden Markov model (HMM) and support a method to forecasting multistep attack based on hidden Markov model. Firstly, we train the existing hidden Markov model(s) by the Baum-Welch algorithm of HMM. Then we recognize the alert belonging to attack scenarios with the Forward algorithm of HMM. Finally, we forecast the next possible attack sequence with the Viterbi algorithm of HMM. The results of simulation experiments show that the hidden Markov models which have been trained are better than the untrained in recognition and prediction.


2021 ◽  
Vol 14 (3) ◽  
pp. 274-285
Author(s):  
Aji Gautama Putrada ◽  
Nur Ghaniaviyanto Ramadhan

Dynamic device pairing is a context-based zero-interaction method to pair end-devices in an IoT System based on Received Signal Strength Indicator (RSSI) values. But if RSSI detection is done in high level, the accuracy is troublesome due to poor sampling rates. This research proposes the Hidden Markov Model method to increase the performance of dynamic device pairing detection. This research implements an IoT system consisting an Access Point, an IoT End Device, an IoT Platform, and an IoT application and performs a comparison of two different methods to prove the concept. The results show that the precision of dynamic device pairing with HMM is better than without HMM and the value is 83,93%.


2018 ◽  
Vol 1 (1) ◽  
pp. 265-286 ◽  
Author(s):  
Wondimu Zegeye ◽  
Richard Dean ◽  
Farzad Moazzami

The all IP nature of the next generation (5G) networks is going to open a lot of doors for new vulnerabilities which are going to be challenging in preventing the risk associated with them. Majority of these vulnerabilities might be impossible to detect with simple networking traffic monitoring tools. Intrusion Detection Systems (IDS) which rely on machine learning and artificial intelligence can significantly improve network defense against intruders. This technology can be trained to learn and identify uncommon patterns in massive volume of traffic and notify, using such as alert flags, system administrators for additional investigation. This paper proposes an IDS design which makes use of machine learning algorithms such as Hidden Markov Model (HMM) using a multi-layer approach. This approach has been developed and verified to resolve the common flaws in the application of HMM to IDS commonly referred as the curse of dimensionality. It factors a huge problem of immense dimensionality to a discrete set of manageable and reliable elements. The multi-layer approach can be expanded beyond 2 layers to capture multi-phase attacks over longer spans of time. A pyramid of HMMs can resolve disparate digital events and signatures across protocols and platforms to actionable information where lower layers identify discrete events (such as network scan) and higher layers new states which are the result of multi-phase events of the lower layers. The concepts of this novel approach have been developed but the full potential has not been demonstrated.


2020 ◽  
Vol 12 (12) ◽  
pp. 1995
Author(s):  
David Sánchez-Rodríguez ◽  
Miguel A. Quintana-Suárez ◽  
Itziar Alonso-González ◽  
Carlos Ley-Bosch ◽  
Javier J. Sánchez-Medina

In recent years, indoor localization systems based on fingerprinting have had significant advances yielding high accuracies. Those approaches often use information about channel communication, such as channel state information (CSI) and received signal strength (RSS). Nevertheless, these features have always been employed separately. Although CSI provides more fine-grained physical layer information than RSS, in this manuscript, a methodology for indoor localization fusing both features from a single access point is proposed to provide a better accuracy. In addition, CSI amplitude information is processed to remove high variability information that can negatively influence location estimation. The methodology was implemented and validated in two scenarios using a single access point located in two different positions and configured in 2.4 and 5 GHz frequency bands. The experiments show that the methodology yields an average error distance of about 0.1 m using the 5 GHz band and a single access point.


Author(s):  
Sanjana Gawali ◽  
Prerana Agale ◽  
Sandhya Ghorpade ◽  
Rutuja Gawade ◽  
Prabodh Nimat

Security has been widely concerned and recognized as a critical issue in wireless communication networks recently, because the openness of the wireless medium allows unintended receivers i. e. intruders to potentially eavesdrop on the transmitted messages. Unauthorized access by an intruder can be monitored by Intrusion detection system. Machine learning algorithms such as Hidden Markov Model and Extreme gradient boost algorithm can be used for intrusion detection based on CICIDS dataset. Based on dataset, algorithms create classifiers of signatures of particular attack. These trained classifiers are tested against user data for intrusion detection. System reports attack in network. Here, XGBoost classifier gives higher accuracy compared to HMM classifier.


Sign in / Sign up

Export Citation Format

Share Document