A New Framework for Rapid Wireless Tracking Verifications Based on Optimized Trajectories in Received Signal Strength Measurements

Secure physical regions (e.g., border areas, nuclear zones, or military facilities) are often patrolled by networked robotic vehicles that require the capability to rapidly verify the advertised location of a potential intruder based on received signal strengths. In this paper, we develop novel algorithms by which mobile robots can coordinate their motions in order to minimize the time required to verify the advertised location for given accuracy bounds. Our specific contributions on this paper are threefold. Firstly, we develop a framework that uses a combination of the particle filters (for position estimation) and the Cramér-Rao lower bounds (for threshold of validation) to drive the motion models for rapid verification of the reported position. We believe our approach is the first in the literature that is accurate, easy to compute, and feasible for practical implementation. Secondly, we propose a centralized coordinated motion algorithm that is optimal at each sampling time. This provides a lower bound on detection time that can be used as a benchmark for practical considerations. Thirdly, we present a practical heuristic approach that allows for distributed protocol based on the concept of the gradient vectors. Subsequently, we also advocate a sub-optimal approach, derived from our heuristic approach, which provides a good trade-off between performance and computational resources. Our results are important for the development of secure access control schemes to prevent unauthorized access of communication networks from malicious users.

[1]  Robert A. Malaney,et al.  Tracking-Based Wireless Intrusion Detection for Vehicular Networks , 2011, 2011 IEEE Vehicular Technology Conference (VTC Fall).

[2]  Maxim Raya,et al.  Security Aspects of Inter-Vehicle Communications , 2005 .

[3]  Jorge Cortes,et al.  Distributed Control of Robotic Networks: A Mathematical Approach to Motion Coordination Algorithms , 2009 .

[4]  Fajar Santoso Sub-optimal decentralised control algorithms for blanket and k-barrier coverage in autonomous robotic wireless sensor networks , 2010, IET Commun..

[5]  Kaishun Wu,et al.  Ship Detection with Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[6]  Dan Simon,et al.  Optimal State Estimation: Kalman, H∞, and Nonlinear Approaches , 2006 .

[7]  Fredrik Gustafsson,et al.  Particle filters for positioning, navigation, and tracking , 2002, IEEE Trans. Signal Process..

[8]  Haibin Yu,et al.  Target tracking based on a distributed particle filter in underwater sensor networks , 2008 .

[9]  P. J. Pramod,et al.  Intelligent Intrusion Detection System (In2DS) using Wireless Sensor Networks , 2009, 2009 International Conference on Networking, Sensing and Control.

[10]  Anindya Iqbal,et al.  Attack-Resistant Sensor Localization under Realistic Wireless Signal Fading , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[11]  Tim Leinmüller,et al.  Improved security in geographic ad hoc routing through autonomous position verification , 2006, VANET '06.

[12]  Douglas W. Gage,et al.  Command Control for Many-Robot Systems , 1992 .

[13]  F. Gustafsson,et al.  Mobile positioning using wireless networks: possibilities and fundamental limitations based on available wireless network measurements , 2005, IEEE Signal Processing Magazine.

[14]  Dongmei Yang,et al.  Navigation algorithm for WSN mobile node on MH particle filtering improvement , 2013, Int. J. Sens. Networks.

[15]  Nalini Venkatasubramanian,et al.  Security Issues in a Future Vehicular Network , 2002 .

[16]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[17]  Victor C. M. Leung,et al.  Secure Location Verification for Vehicular Ad-Hoc Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[18]  Fendy Santoso A Decentralised Self-Dispatch Algorithm for Square-Grid Blanket Coverage Intrusion Detection Systems in Wireless Sensor Networks , 2011, 2011 IEEE Vehicular Technology Conference (VTC Fall).

[19]  Xiaoyan Li Designing localization algorithms robust to signal strength attacks , 2011, 2011 Proceedings IEEE INFOCOM.

[20]  Alfred O. Hero,et al.  Relative location estimation in wireless sensor networks , 2003, IEEE Trans. Signal Process..

[21]  Robert A. Malaney Wireless Intrusion Detection Using Tracking Verification , 2007, 2007 IEEE International Conference on Communications.

[22]  Tucker R. Balch,et al.  Behavior-based formation control for multirobot teams , 1998, IEEE Trans. Robotics Autom..

[23]  Howie Choset,et al.  Path Planning for Robotic Demining: Robust Sensor-Based Coverage of Unstructured Environments and Probabilistic Methods , 2003, Int. J. Robotics Res..

[24]  Panagiotis Papadimitratos,et al.  Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.

[25]  Yingying Chen,et al.  Robust wireless localization to attacks on access points , 2009, 2009 IEEE Sarnoff Symposium.

[26]  Wade Trappe,et al.  Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[27]  Azim Eskandarian,et al.  The threat of intelligent collisions , 2004, IT Professional.

[28]  Feng Liu,et al.  Wireless sensor intrusion detection system based on the theory of evidence , 2011, Proceedings of 2011 International Conference on Computer Science and Network Technology.