On the Application of a Sparse Data Observers (SDOs) Outlier Detection Algorithm to Mitigate Poisoning Attacks in UltraWideBand (UWB) Line-of-Sight (LOS)/Non-Line-of-Sight (NLOS) Classification
Abstract
:1. Introduction
2. Related Work
- This study proposes a novel analysis of poisoning attacks with ML to the problem of LOS/NLOS fading classification, which has not attempted in the literature yet.
- In the context of ML applied to wireless communication, this paper proposes the novel application of the (SDO) algorithm, which performs better than OD algorithms commonly used in the literature like iForest and OCSVM in most of the considered attack scenarios.
- A new type of poisoning attack is introduced, which is also based on OD algorithms or more specifically on their clustering function.
3. Methodology
3.1. Workflow
3.2. Threat Model
- The first attack is also called the label flipping attack, where the attacker has knowledge of the label and changes its value to the other class (e.g., LOS to NLOS or vice versa).
- The second attack is clean-label poisoning where the attacker cannot change the label but he/she can change the values of the features.
- The third attack is a variation of the second attack where the attacker has also knowledge of the most likely value of the feature for each sample.
Algorithm 1: Random label flipping algorithm |
|
Algorithm 2: Feature Scrambling Poisoning (FSP) algorithm |
|
Algorithm 3: Targeted Feature Scrambling Poisoning (TSP) algorithm |
|
3.3. Outlier Detection Algorithms
3.4. Evaluation Metrics
3.5. Classifier Algorithm
4. Data Set
5. Results
5.1. eWINE Data Set
5.1.1. Detection Rate of the Poisoned Samples
5.1.2. Performance of the LOS/NLOS Classification
5.2. Radar Data Set
5.2.1. Detection Rate of the Poisoned Samples
5.2.2. Performance of LOS/NLOS Classification
6. Conclusions and Future Developments
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
CIR | Channel Impulse Response |
CNN | Convolutional Neural Network |
DT | Decision Tree |
DL | Deep Learning |
FS | Feature Scrambling |
GAN | Generative Adversarial Network |
KNN | K-Nearest Neighbour |
IF | Isolation Forest |
LF | Label Flipping |
LOS | Line-of-Sight |
ML | Machine Learning |
NLOS | Non-Line-of-Sight |
OCSVM | One-Class Support Vector Machine |
OD | Outlier Detection |
Probability Density Function | |
RF | Radio Frequency |
SDO | Sparse Data Observers |
SVM | Support Vector Machine |
TDL | Tap-Delay-Line |
TSP | Targeted Feature Scrambling |
VMD | Variational Mode Decomposition |
UWB | UltraWideBand |
References
- Huang, C.; Molisch, A.F.; He, R.; Wang, R.; Tang, P.; Ai, B.; Zhong, Z. Machine learning-enabled LOS/NLOS identification for MIMO systems in dynamic environments. IEEE Trans. Wirel. Commun. 2020, 19, 3643–3657. [Google Scholar] [CrossRef]
- Yang, M.; Ai, B.; He, R.; Shen, C.; Wen, M.; Huang, C.; Li, J.; Ma, Z.; Chen, L.; Li, X.; et al. Machine-learning-based scenario identification using channel characteristics in intelligent vehicular communications. IEEE Trans. Intell. Transp. Syst. 2020, 22, 3961–3974. [Google Scholar] [CrossRef]
- Benedetto, F.; Giunta, G.; Toscano, A.; Vegni, L. Dynamic LOS/NLOS statistical discrimination of wireless mobile channels. In Proceedings of the 2007 IEEE 65th Vehicular Technology Conference-VTC2007-Spring, Dublin, Ireland, 22–25 April 2007; pp. 3071–3075. [Google Scholar]
- Guvenc, I.; Chong, C.C.; Watanabe, F. NLOS identification and mitigation for UWB localization systems. In Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, Hong Kong, China, 11–15 March 2007; pp. 1571–1576. [Google Scholar]
- Zhang, J.; Liu, L.; Fan, Y.; Zhuang, L.; Zhou, T.; Piao, Z. Wireless channel propagation scenarios identification: A perspective of machine learning. IEEE Access 2020, 8, 47797–47806. [Google Scholar] [CrossRef]
- Baldini, G.; Bonavitacola, F. Channel identification with improved variational mode decomposition. Phys. Commun. 2022, 55, 101871. [Google Scholar] [CrossRef]
- Liu, Q.; Yin, Z.; Zhao, Y.; Wu, Z.; Wu, M. UWB LOS/NLOS identification in multiple indoor environments using deep learning methods. Phys. Commun. 2022, 52, 101695. [Google Scholar] [CrossRef]
- Wang, Q.; Li, H.; Zhao, D.; Chen, Z.; Ye, S.; Cai, J. Deep neural networks for CSI-based authentication. IEEE Access 2019, 7, 123026–123034. [Google Scholar] [CrossRef]
- Wang, Z.; Ma, J.; Wang, X.; Hu, J.; Qin, Z.; Ren, K. Threats to training: A survey of poisoning attacks and defenses on machine learning systems. ACM Comput. Surv. 2022, 55, 1–36. [Google Scholar] [CrossRef]
- Huang, C.; He, R.; Ai, B.; Molisch, A.F.; Lau, B.K.; Haneda, K.; Liu, B.; Wang, C.X.; Yang, M.; Oestges, C.; et al. Artificial Intelligence Enabled Radio Propagation for Communications. Part II: Scenario Identification and Channel Modeling. IEEE Trans. Antennas Propag. 2022, 70, 3955–3969. [Google Scholar] [CrossRef]
- Seretis, A.; Sarris, C.D. An Overview of Machine Learning Techniques for Radiowave Propagation Modeling. IEEE Trans. Antennas Propag. 2022, 70, 3970–3985. [Google Scholar] [CrossRef]
- Xiao, Z.; Wen, H.; Markham, A.; Trigoni, N.; Blunsom, P.; Frolik, J. Non-line-of-sight identification and mitigation using received signal strength. IEEE Trans. Wirel. Commun. 2014, 14, 1689–1702. [Google Scholar] [CrossRef]
- Muqaibel, A.H.; Landolsi, M.A.; Mahmood, M.N. Practical evaluation of NLOS/LOS parametric classification in UWB channels. In Proceedings of the 2013 1st International Conference on Communications, Signal Processing, and their Applications (ICCSPA), Sharjah, United Arab Emirates, 12–14 February 2013; pp. 1–6. [Google Scholar]
- Tabaa, M.; Diou, C.; El Aroussi, M.; Chouri, B.; Dandache, A. LOS and NLOS identification based on UWB stable distribution. In Proceedings of the 2013 25th International Conference on Microelectronics (ICM), Beirut, Lebanon, 15–18 December 2013; pp. 1–4. [Google Scholar]
- Oualla, H.; Fateh, R.; Darif, A.; Safi, S.; Pouliquen, M.; Frikel, M. Channel Identification Based on Cumulants, Binary Measurements, and Kernels. Systems 2021, 9, 46. [Google Scholar] [CrossRef]
- Yang, G.; Zhang, Y.; He, Z.; Wen, J.; Ji, Z.; Li, Y. Machine-learning-based prediction methods for path loss and delay spread in air-to-ground millimetre-wave channels. IET Microw. Antennas Propag. 2019, 13, 1113–1121. [Google Scholar] [CrossRef]
- AlHajri, M.I.; Ali, N.T.; Shubair, R.M. Classification of indoor environments for IoT applications: A machine learning approach. IEEE Antennas Wirel. Propag. Lett. 2018, 17, 2164–2168. [Google Scholar] [CrossRef]
- Luo, X.; Qin, Q.; Gong, X.; Xue, M. A survey of adversarial attacks on wireless communications. In Proceedings of the International Conference on Edge Computing and IoT: Systems, Management and Security, ICECI, Virtual, 22–23 December 2021; Springer: Berlin/Heidelberg, Germany, 2021; pp. 83–91. [Google Scholar]
- Davaslioglu, K.; Sagduyu, Y.E. Trojan attacks on wireless signal classification with adversarial machine learning. In Proceedings of the 2019 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), Newark, NJ, USA, 11–14 November 2019; pp. 1–6. [Google Scholar]
- Zheng, T.; Li, B. Poisoning attacks on deep learning based wireless traffic prediction. In Proceedings of the IEEE INFOCOM 2022-IEEE Conference on Computer Communications, New York, NY, USA, 2–5 May 2022; pp. 660–669. [Google Scholar]
- Tian, Z.; Cui, L.; Liang, J.; Yu, S. A comprehensive survey on poisoning attacks and countermeasures in machine learning. ACM Comput. Surv. 2022, 55, 1–35. [Google Scholar] [CrossRef]
- Pitropakis, N.; Panaousis, E.; Giannetsos, T.; Anastasiadis, E.; Loukas, G. A taxonomy and survey of attacks against machine learning. Comput. Sci. Rev. 2019, 34, 100199. [Google Scholar] [CrossRef]
- Kristensen, J.B.; Ginard, M.M.; Jensen, O.K.; Shen, M. Non-line-of-sight identification for UWB indoor positioning systems using support vector machines. In Proceedings of the 2019 IEEE MTT-S International Wireless Symposium (IWS), Guangzhou, China, 19–22 May 2019; pp. 1–3. [Google Scholar]
- Li, W.; Zhang, T.; Zhang, Q. Experimental researches on an UWB NLOS identification method based on machine learning. In Proceedings of the 2013 15th IEEE International Conference on Communication Technology, Guilin, China, 17–19 November 2013; pp. 473–477. [Google Scholar]
- Biggio, B.; Nelson, B.; Laskov, P. Poisoning attacks against support vector machines. arXiv 2012, arXiv:1206.6389. [Google Scholar]
- Vázquez, F.I.; Zseby, T.; Zimek, A. Outlier detection based on low density models. In Proceedings of the 2018 IEEE International Conference on Data Mining Workshops (ICDMW), Singapore, 17–20 November 2018; pp. 970–979. [Google Scholar]
- Liu, F.T.; Ting, K.M.; Zhou, Z.H. Isolation forest. In Proceedings of the 2008 Eighth IEEE International Conference on Data Mining, Pisa, Italy, 15–19 December 2008; pp. 413–422. [Google Scholar]
- Amer, M.; Goldstein, M.; Abdennadher, S. Enhancing one-class support vector machines for unsupervised anomaly detection. In Proceedings of the ACM SIGKDD Workshop on Outlier Detection and Description, Chicago, IL, USA, 11 August 2013; pp. 8–15. [Google Scholar]
- Wolf, S.; Gamboa, W.; Borowczak, M. Jangseung: A guardian for machine learning algorithms to protect against poisoning attacks. In Proceedings of the 2021 IEEE International Smart Cities Conference (ISC2), Manchester, UK, 7–10 September 2021; pp. 1–7. [Google Scholar]
- Huang, S.; Bai, Y.; Wang, Z.; Liu, P. Defending against Poisoning Attack in Federated Learning Using Isolated Forest. In Proceedings of the 2022 2nd International Conference on Computer, Control and Robotics (ICCCR), Shanghai, China, 18–20 March 2022; pp. 224–229. [Google Scholar]
- Platt, J. Sequential Minimal Optimization: A Fast Algorithm for Training Support Vector Machines; Technical Report, Microsoft Research Technical Report; Microsoft: Albuquerque, NM, USA, 1998. [Google Scholar]
- Paudice, A.; Muñoz-González, L.; Gyorgy, A.; Lupu, E.C. Detection of adversarial training examples in poisoning attacks through anomaly detection. arXiv 2018, arXiv:1802.03041. [Google Scholar]
- Yerlikaya, F.A.; Bahtiyar, Ş. Data poisoning attacks against machine learning algorithms. Expert Syst. Appl. 2022, 208, 118101. [Google Scholar] [CrossRef]
- Dunn, C.; Moustafa, N.; Turnbull, B. Robustness evaluations of sustainable machine learning models against data poisoning attacks in the internet of things. Sustainability 2020, 12, 6434. [Google Scholar] [CrossRef]
- Bregar, K.; Hrovat, A.; Mohorcic, M. Nlos channel detection with multilayer perceptron in low-rate personal area networks for indoor localization accuracy improvement. In Proceedings of the 8th Jožef Stefan International Postgraduate School Students’ Conference, Ljubljana, Slovenia, 31 May–1 June 2016; Volume 31, pp. 1–8. [Google Scholar]
- Jiang, C.; Shen, J.; Chen, S.; Chen, Y.; Liu, D.; Bo, Y. UWB NLOS/LOS classification using deep learning method. IEEE Commun. Lett. 2020, 24, 2226–2230. [Google Scholar] [CrossRef]
- Musa, A.; Nugraha, G.D.; Han, H.; Choi, D.; Seo, S.; Kim, J. A decision tree-based NLOS detection method for the UWB indoor location tracking accuracy improvement. Int. J. Commun. Syst. 2019, 32, e3997. [Google Scholar] [CrossRef]
- Baldini, G.; Bonavitacola, F. Nakagami-m Fading Channel Identification Using Adaptive Continuous Wavelet Transform and Convolutional Neural Networks. Algorithms 2023, 16, 277. [Google Scholar] [CrossRef]
- 3GPP. Study on Channel Model for Frequencies from 0.5 to 100 GHz. 2017. Available online: https://www.3gpp.org/ftp//Specs/archive/38_series/38.901/38901-e00.zip (accessed on 4 October 2021).
- ETSI EN 301 893 V2.1.1 (2017-05); 5 GHz RLAN; Harmonised Standard Covering the Essential Requirements of Article 3.2 of Directive 2014/53/EU. ETSI: Sophia-Antipolis, France, 2020. Available online: https://www.etsi.org/deliver/etsi_en/301800_301899/301893/02.01.01_60/en_301893v020101p.pdf (accessed on 4 October 2021).
Hyper-Parameter | Description | Ranges | Notes |
---|---|---|---|
Percentage of poisoned samples | (0.1, 0.2, 0.3, 0.4, 0.5) | ||
Severity of the FSP and TFP attacks | (0.25, 0.5, 1, 4, 16) | This parameter does not apply to the LF attack | |
Percentage of data set for sanitization | (0.6, 0.7, 0.8, 0.9, 0.95) |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Baldini, G. On the Application of a Sparse Data Observers (SDOs) Outlier Detection Algorithm to Mitigate Poisoning Attacks in UltraWideBand (UWB) Line-of-Sight (LOS)/Non-Line-of-Sight (NLOS) Classification. Future Internet 2025, 17, 60. https://doi.org/10.3390/fi17020060
Baldini G. On the Application of a Sparse Data Observers (SDOs) Outlier Detection Algorithm to Mitigate Poisoning Attacks in UltraWideBand (UWB) Line-of-Sight (LOS)/Non-Line-of-Sight (NLOS) Classification. Future Internet. 2025; 17(2):60. https://doi.org/10.3390/fi17020060
Chicago/Turabian StyleBaldini, Gianmarco. 2025. "On the Application of a Sparse Data Observers (SDOs) Outlier Detection Algorithm to Mitigate Poisoning Attacks in UltraWideBand (UWB) Line-of-Sight (LOS)/Non-Line-of-Sight (NLOS) Classification" Future Internet 17, no. 2: 60. https://doi.org/10.3390/fi17020060
APA StyleBaldini, G. (2025). On the Application of a Sparse Data Observers (SDOs) Outlier Detection Algorithm to Mitigate Poisoning Attacks in UltraWideBand (UWB) Line-of-Sight (LOS)/Non-Line-of-Sight (NLOS) Classification. Future Internet, 17(2), 60. https://doi.org/10.3390/fi17020060