In an application involving Autonomous Underwater Vehicles (AUV) it is important to track the trajectory and spatially correlate the collected data. Relying on an Inertial Navigation System (INS) while factoring in the initial AUV position would not suffice given the major accumulated errors. Employing surface nodes is a logistically complicated option, especially for missions involving emerging events. This paper proposes a novel localization approach that offers both agility and accuracy. The idea is to exploit a communication mechanism across the air-water interface. In particular, we employ an airborne unit, e.g., a drone, that scans the area of interest and uses visual light communication (VLC) to reach the AUV. In essence, the airborne unit defines virtual anchors with known GPS coordinates. The AUV uses the light intensity of the received VLC transmissions to estimate the range relative to the anchor points and then determine its own global coordinates at various time instances. The proposed approach is validated through extensive simulation experiments. The simulation results demonstrate the viability of our approach and analyze the effect of the VLC parameters.
more »
« less
Machine learning regression-based RETRO-VLP for real-time and stabilized indoor positioning
Many real-world applications require real-time and robust positioning of Internet of Things (IoT) devices. In this context, visible light communication (VLC) is a promising approach due to its advantages in terms of high accuracy, low cost, ubiquitous infrastructure, and freedom from RF interference. Nevertheless, there is a growing need to improve positioning speed and accuracy. In this paper, we propose and prototype a VLC-based positioning solution using retroreflectors attached to the IoT device of interest. The proposed algorithm uses the retroreflected power received by multiple photodiodes to estimate the euclidean and directional coordinates of the underlying IoT device. In particular, the relative relationship between reflected light magnitude and reflected power is used as input to trainable machine learning regression models. Such models are trained to estimate the coordinates. The proposed algorithm excels in its simplicity and fast computation. It also reduces the need for sensory devices and active operation. Additionally, after regression, Kalman filtering is applied as a post-processing operation to further stabilize the obtained estimates. The proposed algorithm is shown to provide stable, accurate, and fast. This has been verified by extensive experiments performed on a prototype in real-world environments. Experiments confirm a high level of positioning accuracy and the added benefit of Kalman filtering stabilization.
more »
« less
- Award ID(s):
- 1757207
- PAR ID:
- 10418738
- Date Published:
- Journal Name:
- Cluster Computing
- ISSN:
- 1386-7857
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Advances in low-power electronics and machine learning techniques lead to many novel wearable IoT devices. These devices have limited battery capacity and computational power. Thus, energy harvesting from ambient sources is a promising solution to power these low-energy wearable devices. They need to manage the harvested energy optimally to achieve energy-neutral operation, which eliminates recharging requirements. Optimal energy management is a challenging task due to the dynamic nature of the harvested energy and the battery energy constraints of the target device. To address this challenge, we present a reinforcement learning-based energy management framework, tinyMAN, for resource-constrained wearable IoT devices. The framework maximizes the utilization of the target device under dynamic energy harvesting patterns and battery constraints. Moreover, tinyMAN does not rely on forecasts of the harvested energy which makes it a prediction-free approach. We deployed tinyMAN on a wearable device prototype using TensorFlow Lite for Micro thanks to its small memory footprint of less than 100 KB. Our evaluations show that tinyMAN achieves less than 2.36 ms and 27.75 μJ while maintaining up to 45% higher utility compared to prior approaches.more » « less
-
null (Ed.)Future healthcare systems require smart hospitals with system-wide wireless communications and positioning functions, which cannot be facilitated by existing radio-frequency (RF) wireless technologies. In this paper, we present integrated design of a novel low-complexity received signal strength (RSS) based hybrid visible light communication (VLC) and indoor positioning (VLP) system. This VLC/VLP tracking system consist of host optical transceivers embedded in existing light-emitting diode (LED) bulbs and user-end optical tags, which interface with the existing 120AVC power wiring in a building. The new hybrid VLC/PLC tracking system was validated by simulation and experimentation. This LED VLC tracking system will enable smart hospital operations to modernize next-generation intelligent healthcare systemsmore » « less
-
More than 150 cellular networks worldwide have rolled out LTE-M (LTE-Machine Type Communication) and/or NB-IoT (Narrow Band Internet of Things) technologies to support massive IoT services such as smart metering and environmental monitoring. Such cellular IoT services share the existing cellular network architecture with non-IoT (e.g., smartphone) ones. When they are newly integrated into the cellular network, new security vulnerabilities may happen from imprudent integration. In this work, we explore the security vulnerabilities of the cellular IoT from both system-integrated and service-integrated aspects. We discover several vulnerabilities spanning cellular standard design defects, network operation slips, and IoT device implementation flaws. Threateningly, they allow an adversary to remotely identify IP addresses and phone numbers assigned to cellular IoT devices, interrupt their power saving services, and launch various attacks, including data/text spamming, battery draining, device hibernation against them. We validate these vulnerabilities over five major cellular IoT carriers in the U.S. and Taiwan using their certified cellular IoT devices. The attack evaluation result shows that the adversary can raise an IoT data bill by up to $226 with less than 120 MB spam traffic, increase an IoT text bill at a rate of $5 per second, and prevent an IoT device from entering/leaving power saving mode; moreover, cellular IoT devices may suffer from denial of IoT services. We finally propose, prototype, and evaluate recommended solutions.more » « less
-
Recent advances in cyber-physical systems, artificial intelligence, and cloud computing have driven the wide deployments of Internet-of-things (IoT) in smart homes. As IoT devices often directly interact with the users and environments, this paper studies if and how we could explore the collective insights from multiple heterogeneous IoT devices to infer user activities for home safety monitoring and assisted living. Specifically, we develop a new system, namely IoTMosaic, to first profile diverse user activities with distinct IoT device event sequences, which are extracted from smart home network traffic based on their TCP/IP data packet signatures. Given the challenges of missing and out-of-order IoT device events due to device malfunctions or varying network and system latencies, IoTMosaic further develops simple yet effective approximate matching algorithms to identify user activities from real-world IoT network traffic. Our experimental results on thousands of user activities in the smart home environment over two months show that our proposed algorithms can infer different user activities from IoT network traffic in smart homes with the overall accuracy, precision, and recall of 0.99, 0.99, and 1.00, respectively.more » « less
An official website of the United States government

