【AIOT】BLE Paper Relative

news2025/1/11 5:44:55

Billah, Md Fazlay Rabbi Masum, et al. “BLE Can See: A Reinforcement Learning Approach for RF-based Indoor Occupancy Detection.” Proceedings of the 20th International Conference on Information Processing in Sensor Networks (co-located with CPS-IoT Week 2021). 2021. CCF_B


Paper: BLE Can See


BLE Can See: A Reinforcement Learning Approach for RF-based Indoor Occupancy Detection

Summary

  1. propose BLECS, a Bluetooth-dependent indoor occupancy detection system which can adapt itself in th edynamic environment.
  2. The system uses a reinforcement learning approach to predict the occupancy of an indoor environment and updates its decision policy by interacting with existing IoT devices and sensors in the room.

Proble Statement

  • signals propagating in an empty room follows a certain multipath pattern
  • the presence of a human can add additional multipath effect
  • the presence of human can also alter existing multipath effect
  • movement of objects can alter the pattern as well.

System overview

RF feature extraction

  • Time of flight(ToF): lack of synchronized clocks, adopts a round-trip time(RTT) based ToF measurement technique.
  • received signal strength indicator (RSSI)
  • packet drop effect (PDE): introduces a delay-based mechanism

Feedback generation:

  • takes feed-back from environmental sensors;
  • orchestrates this mechanism by receiving feedback from smart devices whenever an occupant interacts with a device.

Mewborne T, Zhang L, Tan S. A Wearable-based Distracted Driving Detection Leveraging BLE[C]//Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems. 2021: 365-366.


Paper: Distracted Driving


A Wearable-based Distracted Driving Detection Leveraging BLE

Summary

  1. present a wearable-based distracted driving detection system that leverages Bluetooth.
  2. the system exploits already in-vehicle BLE compatible devices to track the drivers's hand position and infer potential unsafe driving behaviors.
    • the wearable device records the received signal strength indicator (RSSI) and processes the data to infer its current position.
    • due to the unkown processing delay and unstable BLE signal, the system relies on the RSSIs from multiple devices to infer thhe relative position of the dirvers's hand with respect to the steering wheel.
  3. advantage:
    • not require any additional hardware or vehicle motion data separation.
    • consumes much less battery power

Liu R, Yin Z, Jiang W, et al. WiBeacon: expanding BLE location-based services via wifi[C]//Proceedings of the 27th Annual International Conference on Mobile Computing and Networking. 2021: 83-96. [pdf]

Liu R, Yin Z, Jiang W, et al. BLE Location-based Services via WiFi[C]//Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems. 2021: 353-354. [pdf]

Paper: WiBeacon


WiBeacon: expanding BLE location-based services via wifi

Summary

  1. present WiBeacon which repurposes ubiquitously depllyed WiFi access points into virtual beacons via corss-technology communication, which solves the high cost in BLE beacon deployment.
  2. the WiFi Aps installed with WiBeacon software periodically broadcast legitimate WiFi probe request frames, recognized as standard BLE packets by unmodified BLE devices.

Research Objective

  • Application Area: instant delivery(eg. real time courier tracking and order scheduling), a city-wide BLE system was deployed more than 10000 restaurants in Shanghai.
  • Purpose:
    • BLE location service must be strictly compatible with both hardware and software of mobile devices requiring zero modification
    • software upgrades of the AP should also be compatible with native WiFi services and transparent to WiFi clients.
  • Motivation
    • why are large-scale Deployments of BLE Beacon Challenging? dedicated beacons, deployment and administrative cost, battery
    • why cannot WiFi LBS replace iBeacon? the list of scanned WiFi APs are not accessible to developers on some mobile OS due to security concers; WiFi scans incur high power consumption to mobile devices, large latency. large low-cost smart devices only equipped with BLE chipsets.
    • Benifits of BLE LBS via Ubiquitous WiFi APs: large deployment already, remote management, battery.

Proble Statement

  • conventionally, BLE infrastrutures need to be massively installed and configud to brodcast BLE location identifiers. trmendous deployment costs, long-term maintenance burdens
  • BLE LBS requires periodic frequency hopping to increase the detection probability, how to accomplish th eservice-level integration iwthout scarificing WiFi networks
  • how to overcome commucation errors

previous work:

  • cross-technology communication(CTC): 31, 44, 48 enable direct communication among heterogeneous wirelss protocals

System overview:

【iBeacon Preliminary】

  • modulated using BLE 4.x 1 Mbps Gaussian Frequency Shift Key (GFSK)
  • transmitted at BLE advertising channels, each data bit is modulated to one BLE chip, 0,1 phase shift of 1us. to broadcast with zero chip error
  • mobile devices captures the broadcast signal at BLE advertising channels, and passes it through 1 MHz low pass filter.
  • demodulate the filtered signal via quadrature demodulation
  • the receiver interprets the sign of phase shifts into bits.

【Cross-technology communications Limitations】

  • the emulated sgnal inherently suffers from signal imperfections due to hardware restrictions of a WiFi radio, which cann’t satisfy the zero chip error for BLE becons.
  • each OFDM symbol has a cyclic prefix (CP), the first 0.8us signal of an 4 us OFDM symbol has to be exactly the same as the signal at the last 0.8us. the BLE signals do not have such repetition

【Modulation】

  • Amplitude Shift Keying: changing the power level of the waveform.
  • Frequency Shift Keying: changing the frequency of the waveform.
  • Phase Shift Keying: frequency stays constant but changes made to relative to a reference point.

  • Quadrature Amplitude Modulation (QAM)

[外链图片转存失败,源站可能有防盗链机制,建议将图片保存下来直接上传(img-FHMlN7Mq-1671195096247)(null)]

【PSK】

  • BPSK:

  • QPSK

调制器输入的数据是二进制数字序列,为了能和四进制的载波相位配合起来,则需要把二进制数据变换为四进制数据,这就是说需要把二进制数字序列中每两个比特分成一组,共有四种组合,即00,01,10,11,其中每一组称为双比特码元。

【OFDM】

将信道分成许多正交子信道,在每个子信道上进行窄带调制和传输,这样减少了子信道之间的相互干扰。每个子信道上的信号带宽小于信道的相关带宽,因此每个子信道上的频率选择性衰落是平坦的,大大消除了符号间干扰。

【CKC Preliminary】

  • every 8 bits are encoded into a codeword ( C i C_i Ci) containing 8 complex chips
  • the chips are modulated by Quadrature Phase Shift Keying (QPSK)(正交相移键控).
  • each QPSK chip C i , j C_{i,j} Ci,j takes one of the four values correspond to 4 quadrature phase(0,90,180,-90)
  • QPSK chips takes 1/11 us and 8/11us in total to transmit a CCK codeword of 8 chips.

【WiBeacon Broadcast】

using complementary code keying(CCK) modulation methods to produce no ship errors and is fully compatible with unmodified mobile devices.

  • the first 8 QPSK chips are desired to be eight consecutive value is not a vaid codeword in the codebook, and a close approximation like [1 1 1 -1 1 1 -1 1], cause 2/8 imperfections.
  • CCK codewords can be smoothed out b the low pass filter and thus incur zero chip error.

  1. create a standard iBeacon BLE frame with the location service information.
  2. generate the target BLE signal using Gaussian frequency shift keying( GFSK)
  3. conduct CCK emulation and misalignment compensation
  4. codewords are reverse engineered into WiFi payload.

[外链图片转存失败,源站可能有防盗链机制,建议将图片保存下来直接上传(img-TZKmHXPs-1671195096218)(null)]

to eliminate the imperfections of CCK signal without modifying mobile devices

  • ble receiver employs a low-pass filter at its front end for noise reduction, similar to moving average.

[外链图片转存失败,源站可能有防盗链机制,建议将图片保存下来直接上传(img-u2xBJC0w-1671195096392)(null)]

【CCK Codeword Selection】

  • how to find CCK codewords that can take advantage of low-pass filtering and produce correct BLE chips.
    • a good CCK codeword is expected to produce phases that are as similar to desired ones as possible. computing the desired QPSK sequence with basic CCK method
    • iterate through the codebook to find the codeword C i Ci Ci that is closest to the desired sequence C d C^d Cd​​ in the phase domain.
    • the more separated unmatched QPSK chips are, the higher chances they can be eliminated by low-pass filtering. pick the codeword in the subset, such that the minimum interval between consecutive unmatched chips is maximized.

[外链图片转存失败,源站可能有防盗链机制,建议将图片保存下来直接上传(img-RvURyEQy-1671195096483)(null)]

【Misalignment Compensation】

  • 蓝牙:
    • 物理层(Physical Layer):通过2.4G无线电与外界连接,完成无线电信号的传输与接收工作即采用2.4G无线电,输出0和1的信号或解码无线电接受识别0和1。
    • 频段:低功耗蓝牙使用2.4GHz频段(2400MHz-2483.5MHz)
    • 调制方式:高斯频移键控(GFSK)。(以中心频率为基准,负频偏为比特0,正频偏为比特1)。
    • 信道:使用40个无线信道(3个广播信道,37个数据信道),信道中心频率计算公式为:fm=2402+2*K(MHz)(k:0,1…无线信道编号),即最低频率为2402MHz,最高频率为2480MHz,与ISM频段的最低频率有2MHz间隙,与最高频率有3.8MHz间隙。
  • assume that the center frequencies of WiFi and BLE are perfectly aligned, the detail channels are not aligned, like BLE channel 39 (2480 MHZ) and its nearest WiFi channel(2472 MHz).

when emulating a BLE waveform with a misaligned center frequency, the WiFi transmitter essentially performs the emulation with an adjusted codebook from the BLE receiver’s viewpoint.

  • WiBeacon adjusts the codebook to BLE’s viewpoint before conducting CCK method.
  • shift each codeword of the standard codebook in the frequency domain by Δ f = f w − f b \Delta f=f_w-f_b Δf=fwfb, by the dot-product of each codeword with a digital carrier.

[外链图片转存失败,源站可能有防盗链机制,建议将图片保存下来直接上传(img-x4NLKG3e-1671195096424)(null)]

[外链图片转存失败,源站可能有防盗链机制,建议将图片保存下来直接上传(img-VLtsfqDg-1671195096455)(null)]

【Shedule Service】

  • develop a dynamic WiBeacon scheduling algorithm to guarantee the reliability of iBeacon service while minimizing its impact on WiFi performance。
  • propose a methods that entirely uses standard features of 802.11 Ap.
    • Frequency hopping preparation: to avoid packet loss
      • disable the outgoing gate of data queue and buffer incoming data to prevent downlink WiFi packets
      • transmit cts-to-self-an 802.11 control frame to silent the clients for a specific short period of time.
    • frequency hopping: reuse offchannel function of WiFi APs to detect sources of interferene or unauthorized ad-hoc networks. offchannel function can switches th eradio to another WiFi channel for a small amount of time (10-15ms), while preserving entire states of the AP, avoids reset of the network and disconecting clients
    • frequency hopping completion: immediately switch WiFi radio back to the operating channel.
  • a WiBeacon scheduler to guarantee the reliability of LBS, while minimizing its impact on the performance of WiFi service.
    • iBeacon broadcast is the connection-less
    • the Internet data traffic through WiFi is bursty in nature, leaving plenty of temporal whitespace for WiBeacon.

  • in various advertising intervals the average detection latencies are not increased by the random delay.

Evaluation

  • Environment:

[外链图片转存失败,源站可能有防盗链机制,建议将图片保存下来直接上传(img-1lppa0MD-1671195096341)(null)]

[外链图片转存失败,源站可能有防盗链机制,建议将图片保存下来直接上传(img-ImsmZ52g-1671195096308)(null)]

deploys BLE beacons in the restaurants to detect the arrivals and departures of meal couriers for indoor navigation, courier scheduling, late delivery detection, map information correction, etc

Urano K, Hiroi K, Yonezawa T, et al. Basic study of BLE indoor localization using LSTM-based neural network (Poster)[C]//Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services. 2019: 558-559. [pdf]


Paper: BLE location


Basic study of BLE indoor localization using LSTM-based neural network

Summary

  1. LSTM-based neural network is applied to indoor localization using moblie BLE tag’s signal strength collected by multiple scanners.

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.coloradmin.cn/o/94878.html

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈,一经查实,立即删除!

相关文章

对象池模式

一、对象池模式 1、定义 对象池模式(Object Pool Pattern)是将对象预先创建并初始化后放入对象池中,对象提供者就能利用已有的对象来处理请求,减少频繁创建对象锁占用的内存空间和初始化时间。属于创建型设计模式。 一个对象池包…

python 模板注入

web 程序包括两个文件: flask-test.py 和 Config.py 文件 #!/usr/bin/env python # -*- coding:utf8 -*- import hashlib import logging from datetime import timedelta from flask import Flask from flask import request from flask import config from flask…

基于java(springboot)篮球竞赛预约管理系统(java毕业设计)

基于java(springboot)篮球竞赛预约管理系统 篮球竞赛管理系统是基于java编程语言,mysql数据库,springboot框架和idea工具开发,本系统分为用户和管理员两个角色,其中用户可以在线注册登陆,查看平台公告,查看…

JSP运动会信息网站

开发工具(eclipse/idea/vscode等): 数据库(sqlite/mysql/sqlserver等): 功能模块(请用文字描述,至少200字): 模块划分:通知类型、通知信息、裁判信息、运动员信息、项目类型、项目 信息、场地信息、项目安排、报名信息…

【记录】ubuntu20.04安装nvidia显卡驱动

新安装的Ubuntu20.04系统,如果想进行人工智能相关的学习,需要配置一系列的环境,这里我记录下具体的安装过程。 Nvidia显卡驱动的安装 1 安装前需要安装依赖(必须执行) sudo apt-get update #更新软件列表 #安装编译依赖 sudo apt-get inst…

Python urllib CRLF注入漏洞小结

Python urllib CRLF注入漏洞小结 CVE-2016-5699 https://www.suse.com/security/cve/CVE-2016-5699.html before 2.7.10 and 3.x before 3.4.4POC: http://127.0.0.1%0d%0aX-injected:%20header%0d%0ax-leftover:%20:12345/foo漏洞&patch源码:http…

音视频大合集最终篇;学废了

前言 加企鹅群:1079654574 解锁 《音视频八大板块资料》音视频大合集,从初中高到面试应有尽有;让学习更贴近未来实战。已形成PDF版 八个模块内容如下: 1.音视频基础2.FFmpeg实战3.流媒体客户端4.流媒体服务器5.WebRTC项目实战6.Android NDK开…

零时 || 警惕恶意聊天软件!聊天记录被劫持损失数千万资产追踪分析

事件背景 近期,零时科技安全团队收到大量用户因为同一个原因导致加密资产被盗的情况,经调查都是因为过程中使用了恶意Whatsapp的原因,通过与受害者沟通,了解到情况如下: 受害者在使用恶意Whatsapp进行沟通时&#xf…

173. 二叉搜索树迭代器

实现一个二叉搜索树迭代器类BSTIterator ,表示一个按中序遍历二叉搜索树(BST)的迭代器: BSTIterator(TreeNode root) 初始化 BSTIterator 类的一个对象。BST 的根节点 root 会作为构造函数的一部分给出。指针应初始化为一个不存在…

STM32F4 | PWM输出实验

文章目录一、PWM 简介二、硬件设计三、软件设计四、实验现象五、STM32CubeMX 配置定时器 PWM 输出功能上一章,我们介绍了 STM32F429 的通用定时器 TIM3,用该定时器的中断来控制 DS1 的闪烁,这一章,我们将向大家介绍如何使用 S…

CososCreator (Android)-AppLovin MAX 广告聚合平台接入+Firebase统计

CososCreator 2.2.4 Android Studio :4.2.1 接入SDK有:接max聚合及中介平台(Admob,FB, applovin,pangle,mintegral,vungle,unity),和Firebase 统计 1、构建Android工程 2、升级gr…

计算机SSM毕设推荐 40个高质量软件工程毕设项目分享【源码+论文】(一)

文章目录前言 题目1 : 基于SSM的毕业设计管理系统 <br /> 题目2 : 基于SSM的病人跟踪治疗信息管理系统 <br /> 题目3 : 基于SSM的大学生兼职跟踪系统 <br /> 题目4 : 基于SSM的大学生企业推荐系统 <br /> 题目5 : 基于SSM的电影院在线售票系统 <br …

电感和磁珠的区别

电感和磁珠在我们电路设计中经常会用到&#xff0c;他们都属于磁性元器件&#xff0c;今天就来分享下电感和磁珠的区别 1.从构成原理来看 电感其实就是导线这样一圈一圈绕在磁芯上&#xff0c;这样就构成了电感&#xff0c;而磁珠(插件)的话则是导线外围包裹着一层铁氧体磁性材…

Linux中磁盘存储相关命令

du 命令 Linux du命令也是查看使用空间的&#xff0c;但是与df命令不同的是Linux du命令是对文件和目录磁盘使用的空间的查看&#xff0c;还是和df命令有一些区别的. **1&#xff0e;**命令格式&#xff1a; du [选项][文件] **2&#xff0e;**命令功能&#xff1a; 显示每…

javaHelloWorld

java语言介绍 ​ 目前大系统开发中&#xff0c;很少使用单一语言进行开发&#xff0c;现有语言也十分发达&#xff0c;包含Java\C\C\PHP\Python等等。通常情况下&#xff0c;一个大系统底层驱动部分都是使用C语言开发&#xff0c;而在上层用户交互层使用java语言开发。因此&am…

新型材料厂电动葫芦PLC无线通讯应用方案详解

一&#xff0e;应用背景 电动葫芦是一种安装在天车、龙门吊之上的特种起重设备&#xff0c;具有体积小&#xff0c;自重轻&#xff0c;操作简单&#xff0c;使用方便等特点&#xff0c;是起升搬运物品&#xff0c;最理想的起重设备之一。目前电动葫芦的控制部分都是由PLC完成的…

【Spring Cloud】Ribbon负载均衡原理与实战(源码级讲解)

本期目录1. 负载均衡原理1.1 总体流程1.2 源码解析2. 负载均衡策略2.1 负载均衡策略继承关系2.2 负载均衡策略描述1&#xff09;ZoneAvoidanceRule2&#xff09;AvailabilityFilteringRule2.3 修改负载均衡策略方式1&#xff09;全局修改2&#xff09;局部修改3. 饥饿加载3.1 背…

使用VackBAS攻击模拟平台对抗勒索病毒

勒索病毒是一种恶意软件&#xff0c;它可以从一台主机直接感染到整个网络&#xff08;包括服务器&#xff09;并加密磁盘上的任何文件和文档&#xff0c;勒索软件会要求受害者缴纳赎金以取回对电脑的控制权&#xff0c;或取回受害者根本无从自行获取的密钥去解密文件。勒索病毒…

jsp+ssm计算机毕业设计宠物店管理系统【附源码】

项目运行 环境配置&#xff1a; Jdk1.8 Tomcat7.0 Mysql HBuilderX&#xff08;Webstorm也行&#xff09; Eclispe&#xff08;IntelliJ IDEA,Eclispe,MyEclispe,Sts都支持&#xff09;。 项目技术&#xff1a; JSPSSM mybatis Maven等等组成&#xff0c;B/S模式 Mave…

数论的一些小小的性质总结

gcd的一些套路&#xff1a; 1.设一些未知数&#xff0c;设gcd为k&#xff0c;换个角度去看问题&#xff0c;比如去枚举倍数 2.一堆数的gcd为1&#xff0c;等价于它们所有数的因子重合小于n&#xff1b;两个数的gcd1&#xff0c;它们的因子之间没有重合 3.相邻两数之间gcd1&a…