Christopher Lai, Minh Tri Chau, Ryan Thai, Sandor Souvannakoumane, Chathurya Watagoda, Kaye Oda, Shanthi Robinson, Gabriel Gourmet Razungles, Maggie Hoang, S. Dobbs, Zhen Yu
{"title":"Methods of Automating Power Swapping Mechanisms for Extending UAV Flight Missions","authors":"Christopher Lai, Minh Tri Chau, Ryan Thai, Sandor Souvannakoumane, Chathurya Watagoda, Kaye Oda, Shanthi Robinson, Gabriel Gourmet Razungles, Maggie Hoang, S. Dobbs, Zhen Yu","doi":"10.1109/WTS202356685.2023.10131699","DOIUrl":"https://doi.org/10.1109/WTS202356685.2023.10131699","url":null,"abstract":"This paper describes a novel complete system for the autonomous replacement of lithium-polymer batteries (LiPo battery) in small-scale unmanned aerial vehicles (UAVs). A core mechanic of the system relies on a horizontal rotating battery chamber that is capable of storing, managing, and distributing eight drone-compliant batteries. The station dubbed the \"Battery Vending Machine\", or BVM for short is accompanied by solar power panels for a rapid power supply, detachable modules for mobile transport, and interlocking components to safeguard the batteries when not in use. Companion modules work with the BVM to allow compatibility with drone docking and battery swapping. A ground control station (GCS) with intricately placed fiducial markers and fast wireless charging technology operates to dock the drone safely in preparation for a power supply hot-swap procedure. A robotic arm system works to transfer the batteries from one station to another. The three stations work in unison to provide a faster and more optimized method to exchange depleted batteries on a flight vehicle with fully charged power sources. Results of physical experiments of each module in the automatic replacement system provide insight into the implementation of high-endurance fully-autonomous flight missions using remote landing, replenishing, and takeoff sequences.","PeriodicalId":405032,"journal":{"name":"2023 Wireless Telecommunications Symposium (WTS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122134512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VLC Indoor Positioning Using RFR and SVM Reduced Features Machine Learning Techniques","authors":"Affan Affan, H. M. Asif, N. Tarhuni","doi":"10.1109/WTS202356685.2023.10131742","DOIUrl":"https://doi.org/10.1109/WTS202356685.2023.10131742","url":null,"abstract":"Artificial intelligence algorithms require large datasets for better performance for all kinds of tasks such as classification and regression. In this paper, we explore the potential of the Random Forest Regression (RFR) algorithm and Support Vector Machine (SVM) algorithm with minimum features, such as signal power and its variants, for Visible Light Communication (VLC) based indoor positioning. We explore the performance of the RFR algorithm and SVM by using variations of the received signal power to increase the accuracy and reduce the computation complexity. The simulation results demonstrate that both techniques have estimated the location with high accuracy, however, RFR outperforms SVM in terms of mean error.","PeriodicalId":405032,"journal":{"name":"2023 Wireless Telecommunications Symposium (WTS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129231160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shadman Ahmed, Do gyu Lee, Jimmy Vong, Joseph Kurone-Ghariban, Cameron Joseph Matchinsky, Talia Kester, Matthew Cha, S. Dobbs, Zhen Yu
{"title":"Implementation and Investigation of High Endurance UAVs in a 4G LTE Network for Monitoring Power Lines","authors":"Shadman Ahmed, Do gyu Lee, Jimmy Vong, Joseph Kurone-Ghariban, Cameron Joseph Matchinsky, Talia Kester, Matthew Cha, S. Dobbs, Zhen Yu","doi":"10.1109/WTS202356685.2023.10131813","DOIUrl":"https://doi.org/10.1109/WTS202356685.2023.10131813","url":null,"abstract":"This paper aims to overview our further development of a high-endurance and efficient UAV (Unmanned Aerial Vehicle) for monitoring power lines. The connection between a UAV, GCS (Ground Control Station), and MEC (Mobile Edge Computing) station through a 4G LTE network will begin development for enhancing the high endurance system. The UAV will feature wireless video streaming capabilities via a camera mounted onto a custom-made gimbal. Computer vision will be implemented in this system for video processing, image filtering, and object avoidance purposes. Power line monitoring has been developed through the testing and application of contour and edge detection filters.","PeriodicalId":405032,"journal":{"name":"2023 Wireless Telecommunications Symposium (WTS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125558063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Federated/Deep Learning in UAV Networks for Wildfire Surveillance","authors":"Ahmed El Hoffy, Seok-Chul Sean Kwon, H. Yeh","doi":"10.1109/WTS202356685.2023.10131685","DOIUrl":"https://doi.org/10.1109/WTS202356685.2023.10131685","url":null,"abstract":"The unmanned aerial vehicle network (UAV- net) has been attracting substantial attention as a solution of wildfire surveillance. Application of federated learning (FL) for the UAV-net can provide an applaudable solution to mitigate wildfires. Each UAV can hover at different locations and obtain images with distinctive features. Therefore, it is regarded as an efficient methodology that each UAV fulfills different levels of deep learning (DL) in a distributed and collaborative fashion, which is a new paradigm raised by FL. This paper examines current state-of-the-art research works on detecting wildfire utilizing DL and UAVs. Further, this paper proposes utilizing FL for the UAV-net to monitor and detect wildfire. The impact of different convolutional neural network (CNN) models and layers with tailored model parameters on the performance of prediction accuracy, is addressed with simulations.","PeriodicalId":405032,"journal":{"name":"2023 Wireless Telecommunications Symposium (WTS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128100152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantifying and Improving Resilience in the Informal Social Networks of Organizations","authors":"J. Caddell, Roshi Rose Nilchiani","doi":"10.1109/WTS202356685.2023.10131676","DOIUrl":"https://doi.org/10.1109/WTS202356685.2023.10131676","url":null,"abstract":"Organizations spend a considerable amount of time designing their organizational structure. These structures generally reflect the priorities and functions of the organization and deserve attention. However, research has reinforced the power of informal networks to affect performance and communication. The ability of a person to leverage their weak ties to build a coalition, find a key piece of information, or signal a warning has appreciable impacts on an organization’s ability to perform. This paper explores an informal structure and offers methods to re-enforce its resilience. In this unique network, the nodes represent people and their edges represent the overlap of tenure throughout their career. We define the resilience of this organization by exploring its error tolerance and offer a procedure that leverages the ClusterRank centrality for improving resilience through targeted internal assignments and the strengthening of informal ties. Interventions demonstrate promising results with appreciable shifts in the critical threshold with minimal adjustments. By utilizing these tools, organizations can better understand and address possible deficiencies in their informal structure’s resilience and remain better postured to respond to perturbations.","PeriodicalId":405032,"journal":{"name":"2023 Wireless Telecommunications Symposium (WTS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133554564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Paulo Ricardo Branco da Silva, João Paulo S. H. Lima, Vitalii Afanasiev, Luiz Henrique M. Silva Eduardo Melão, M. S. P. Facina
{"title":"Demonstration of Open Radio Access Network Intelligent Controllers","authors":"Paulo Ricardo Branco da Silva, João Paulo S. H. Lima, Vitalii Afanasiev, Luiz Henrique M. Silva Eduardo Melão, M. S. P. Facina","doi":"10.1109/WTS202356685.2023.10131759","DOIUrl":"https://doi.org/10.1109/WTS202356685.2023.10131759","url":null,"abstract":"The control of the Open Radio Access Network (RAN) architecture via a RAN Intelligent Controller (RIC) is one of the main innovations in the next-generation mobile communication network. This paper analyzes three of the most significant RIC designs using apps that monitor key performance metrics. In this way, it is possible to compare these designs in terms of functionality, highlighting their potential for practical implementation.","PeriodicalId":405032,"journal":{"name":"2023 Wireless Telecommunications Symposium (WTS)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131088832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Encryption-Aware PHY Security for Wiretap Channels with Multiple Independent Jammers","authors":"Tarig Sadig, Mehdi Maleki, N. Tran, H. Bahrami","doi":"10.1109/WTS202356685.2023.10131796","DOIUrl":"https://doi.org/10.1109/WTS202356685.2023.10131796","url":null,"abstract":"In conventional physical layer security schemes no leakage of private information to adversary nodes is tolerated, and no assumption on the encryption of information is considered. This is a limiting assumption in physical layer security, which compromises the efficiency of such schemes. This paper introduces an approach in which a prior knowledge of encryption can be used to improve the security performance of cooperative jamming in Gaussian wiretap channels as an example of physical layer security approached. The proposed approach, however, is not limited to the considered scenario of cooperative jamming and can be applied to other scenarios. We consider a system composed of a transmitter, a receiver, and eavesdropper and several jamming nodes that work independently, and formulate an optimization problem to maximize the secrecy rate with the knowledge of encryption and attempt to solve it by driving the rate-equivocation region to constrain and determine the feasibility of the solution. We then exploit a linear approximation to solve the resulted nonconvex optimization problem to maximize the secure transmission rate. Our numerical results show that prior knowledge of encryption can be exploited to allocate the available power to the jamming nodes to significantly increase the secure transmission rate.","PeriodicalId":405032,"journal":{"name":"2023 Wireless Telecommunications Symposium (WTS)","volume":"12 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120814346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Generating True Random Numbers using Magnetoresistive RAM","authors":"Julian Dreyer, R. Tönjes, N. Aschenbruck","doi":"10.1109/WTS202356685.2023.10131866","DOIUrl":"https://doi.org/10.1109/WTS202356685.2023.10131866","url":null,"abstract":"Generating random numbers is a critical task in any security-related scenario, e.g., generating secure cryptographic keys for communication. Pseudo Random Number Generators (PRNG) do fulfill the task of generating numbers, though they are fundamentally dependent on a random seed or an entropy source. True Random Number Generators (TRNG) use other sources of entropy to generate a truly random number, e.g., by measuring the radioactive decay of an atom or electrostatic interference. This paper proposes a novel way of generating truly random numbers by leveraging the nondeterministic write behavior of Magnetoresistive Random Access Memory (MRAM) that occurs, if an external magnetic field is applied during operation. Since the MRAM chips are manufactured with nanoscale impurities on silicon level, it acts as a Physically Unclonable Function (PUF) and can be employed in security critical applications. For that, a formal description of the algorithm and technical details are thoroughly described. To show the true randomness of the operation, we provide a statistical significance evaluation which is based on real-world experiments. The results show that the MRAM behaves significantly nondeterministic while also providing an entropy of over 0.99 among all tested boards.","PeriodicalId":405032,"journal":{"name":"2023 Wireless Telecommunications Symposium (WTS)","volume":"48 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121211735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Pseudonym Changing in VANETs: How Privacy is Impacted Using factitious Beacons","authors":"Junchao Wang, Y. Sun, C. Phillips","doi":"10.1109/WTS202356685.2023.10131712","DOIUrl":"https://doi.org/10.1109/WTS202356685.2023.10131712","url":null,"abstract":"Pseudonym changing is the main challenge in the development and commercialization of the Vehicular Ad-hoc Network (VANET) as the latter requires the participation of all vehicles joining the network to share sensitive information, which may lead to a leak of their privacy. Currently, several researches are focusing on mix-zone based pseudonym changing schemes, but the performance worsens when the vehicle density is low since the adversary can analyse the beacons from vehicles and employ a tracking algorithm accordingly. We note that Road Side Units (RSUs) can be adapted to generate factitious beacons pretending to be real vehicles so that the vehicle density is artificially increased. We built a traffic simulator and a beacon- based malicious adversary to assess how the performance of privacy protection is influenced by the generation of factitious beacons for low vehicle density situations. In the assessment, we compared the factitious beacon scheme with a traditional mix-zone scheme, and we measured the factors influencing the effectiveness of the factitious beacons.","PeriodicalId":405032,"journal":{"name":"2023 Wireless Telecommunications Symposium (WTS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126198811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}