CHIRP-BASED OVER-THE-AIR COMPUTATION FOR PRIVACY-PRESERVING DISTRIBUTED LOCALIZATION

Information

  • Patent Application
  • 20240236657
  • Publication Number
    20240236657
  • Date Filed
    December 27, 2023
    a year ago
  • Date Published
    July 11, 2024
    6 months ago
Abstract
The disclosure deals with method and system for an over-the-air computation (OAC) approach for privacy-preserving localization in a sensor network. The disclosed approach relies on a voting-based distributed localization and the computation of the majority votes (MVs) with OAC. In this method, the anchor node (AN)'s votes encoding the potential location of a server node (SN) are mapped to a circularly-shifted chirp (CSC) signal and all AN simultaneously transmit their CSC signals. The aggregated signal is received at the SN and the MV votes are detected non-coherently without requiring an ideal time-synchronization or channel state information (CSI). We further disclose an iterative refinement procedure to increase the localization performance. The CSCs result in spectral-efficient and power-efficient transmission, while disclosed iterative refinements and repetitions decrease the gap between the root-mean-square error (RMSE) and the quantization bound.
Description
BACKGROUND OF THE PRESENTLY DISCLOSED SUBJECT MATTER

The presently disclosed subject matter generally relates to methodologies and corresponding apparatus for over-the-air computation (OAC) approaches for privacy-preserving localization in a sensor network.


I. Introduction

Distributed localization in wireless sensor networks (WSNs) is one of the fundamental applications of the Internet-of-Things (IOT) networks. Privacy preservation and localization accuracy are the key aspects of distributed localization. Also, several communication-related metrics like power efficiency, latency, and spectral efficiency play important roles in the design. In the literature, many studies investigate distributed localization from the perspective of security, e.g., [1]-[4]. In [1], the authors propose a range-free localization as a cost-effective solution for low-complexity WSN. However, the privacy issue is not addressed. The authors in [2] propose a voting-based localization that can withstand malicious beacon nodes. However, the target node needs to store all the local data, which undermines privacy and requires a storage overhead. The authors of [3] propose a cryptographic encryption based privacy preservation for localization. However, such encryption scheme is not suitable for low-complexity sensors. In [4], a resilient privacy-preserving distributed localization algorithm that provides robustness against malicious nodes and preserves privacy is proposed. However, the computation complexity increases with the number of nodes. Another concern with the schemes in [1]-[4] is that the latency increases linearly with the number of sensors. In this presently disclosed subject matter, we disclose an over-the-air computation (OAC)-based solution that can mitigate the latency problems while promoting the privacy of the data at the sensors for localization.


OAC has been recently investigated in the literature for distributed learning applications (e.g., federated edge learning (FEEL)). In [5], an analog aggregation framework is proposed, where the neural network parameters are transmitted over orthogonal frequency division multiplexing (OFDM) subcarriers and aggregated over the air. To mitigate the impact of multi-path fading, truncated-channel inversion (TCI) is used, in which the symbols on the OFDM subcarriers are multiplied by the inverse of the channel coefficients, and the fading subcarriers are avoided. In [6], distributed training based on majority vote (MV) is considered. Similarly, TCI is adopted in this presently disclosed subject matter. In [7], [8], the authors propose to use orthogonal signaling for MV computation, where the MV is calculated with a non-coherent energy accumulation over orthogonal resources. The presently disclosed methods do not rely on channel state informations (CSIs) and therefore, are resistant to time-synchronization issues. However, there is a cause for concern due to the high peak-to-mean envelope power ratio (PMEPR) of the OFDM transmissions. In [9], a low PMEPR circularly-shifted chirp (CSC)-based OAC is investigated for FEEL to improve power efficiency. However, such prior scheme has relatively low spectral efficiency which can jeopardize the advantages of OAC. We believe OAC is not utilized for distributed localization.


Some prior literature discloses anchor-based localization techniques. However, unlike the presently disclosed methodology, they do not address the privacy, accuracy, latency, power efficiency, and spectral efficiency concerns of the wireless sensor networks at the same time.


SUMMARY OF THE PRESENTLY DISCLOSED SUBJECT MATTER

Generally, the presently disclosed subject matter addresses the privacy-preservation and latency problem in a distribution localization scenario over wireless sensor networks. In particular, the presently disclosed subject matter utilizes over-the-air computation to preserve privacy and reduce latency. The power and spectral efficiency of the presently disclosed subject matter makes it suitable for low-power devices. Another advantage is that the computational complexity of the presently disclosed subject matter is simple as it does not rely on perfect time synchronization of the devices or availability of the channel state information, which makes the presently disclosed subject matter suitable for very low-complexity IoT sensors.


The presently disclosed systems and corresponding and/or associated methodology disclose an over-the-air computation (OAC) approach for privacy-preserving localization in a sensor network. The disclosed approach relies on a voting-based distributed localization and the computation of the majority votes (MVs) with OAC. In the presently disclosed method, the anchor node (AN)'s votes encoding the potential location of a server node (SN) are mapped to a circularly-shifted chirp (CSC) signal and all AN simultaneously transmit their CSC signals. The aggregated signal is received at the SN and the MV votes are detected non-coherently without requiring an ideal time-synchronization or channel state information (CSI). An iterative refinement procedure is also disclosed to increase the localization performance. The CSCs result in spectral-efficient and power-efficient transmission, while the disclosed iterative refinements and repetitions decrease the gap between the root-mean-square error (RMSE) and the quantization bound.


Distributed localization can enable new positioning and location awareness-based applications for Internet of things (IOT) in wireless sensor networks (WSNs). For distributed localization, many anchor nodes participate in estimating the location of a target node. Privacy and latency are some of the key challenges of distributed localization. Over-the-air computation (OAC), which takes advantage of the wireless multiple access channel's signal superposition feature, can be utilized for privacy-preserving low latency localization. There are other communication concerns like power efficiency, spectral efficiency, and time-synchronization issues. We presently disclose an OAC approach to overcome these concerns through circularly-shifted chirp (CSC). The presently disclosed scheme also does not rely on the availability of channel state information (CSI) that can significantly reduce complexity of the design.


One exemplary embodiment disclosed herewith relates to an over-the-air computation methodology for privacy-preserving localization in a sensor network without using channel state information (CSI) at a plurality of anchor nodes (ANs) or at a server node (SN).


It is to be understood that the presently disclosed subject matter equally relates to associated and/or corresponding methodologies. One exemplary such method relates to methodology for privacy-preserving localization in a sensor network without using channel state information (CSI) at a plurality of anchor nodes (ANs) or at a server node (SN). Such exemplary methodology preferably comprises providing an over-the-air computation network with update vectors received at a server node (SN) as transmitted from a plurality of anchor nodes (ANs); providing one or more processors; and providing one or more non-transitory computer-readable media that store instructions that, when executed by the one or more processors, cause the one or more processors to perform operations. Such operations preferably comprise transmitting local vectors as votes from each respective of the plurality of anchor nodes (ANs), receiving the superposed update vector at the server node (SN), and determining the majority vote (MV) for each element of the update vector at the server node (SN). Further preferably, the transmitted local vectors comprise respective circularly-shifted chirp (CSC) signals, each transmitted simultaneously from all of the ANs.


Other example aspects of the present disclosure are directed to systems, apparatus, tangible, non-transitory computer-readable media, user interfaces, memory devices, and electronic devices for over-the-air computation for privacy-preserving distributed localization. To implement methodology and technology herewith, one or more processors may be provided, programmed to perform the steps and functions as called for by the presently disclosed subject matter, as will be understood by those of ordinary skill in the art.


Another exemplary embodiment of presently disclosed subject matter relates to a system for over-the-air computation system for privacy-preserving localization in a sensor network without using channel state information (CSI) at a plurality of anchor nodes (ANs) or at a server node (SN). Such system preferably comprises an over-the-air computation network to process update vectors received at a server node (SN) as transmitted from a plurality of anchor nodes (ANs); one or more processors; and one or more non-transitory computer-readable media that store instructions that, when executed by the one or more processors, cause the one or more processors to perform operations, the operations comprising transmitting local vectors as votes from each respective of the plurality of anchor nodes (ANs), receiving the superposed update vector at the server node (SN), and determining the majority vote (MV) for each element of the update vector at the server node (SN). Further, the transmitted local vectors preferably comprise respective circularly-shifted chirp (CSC) signals, each transmitted simultaneously from all of the ANs.


Additional objects and advantages of the presently disclosed subject matter are set forth in, or will be apparent to, those of ordinary skill in the art from the detailed description herein. Also, it should be further appreciated that modifications and variations to the specifically illustrated, referred and discussed features, elements, and steps hereof may be practiced in various embodiments, uses, and practices of the presently disclosed subject matter without departing from the spirit and scope of the subject matter. Variations may include, but are not limited to, substitution of equivalent means, features, or steps for those illustrated, referenced, or discussed, and the functional, operational, or positional reversal of various parts, features, steps, or the like.


Still further, it is to be understood that different embodiments, as well as different presently preferred embodiments, of the presently disclosed subject matter may include various combinations or configurations of presently disclosed features, steps, or elements, or their equivalents (including combinations of features, parts, or steps or configurations thereof not expressly shown in the figures or stated in the detailed description of such figures). Additional embodiments of the presently disclosed subject matter, not necessarily expressed in the summarized section, may include and incorporate various combinations of aspects of features, components, or steps referenced in the summarized objects above, and/or other features, components, or steps as otherwise discussed in this application. Those of ordinary skill in the art will better appreciate the features and aspects of such embodiments, and others, upon review of the remainder of the specification, and will appreciate that the presently disclosed subject matter applies equally to corresponding methodologies as associated with practice of any of the present exemplary devices, and vice versa.


These and other features, aspects and advantages of various embodiments will become better understood with reference to the following description and appended claims. The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the present disclosure and, together with the description, serve to explain the related principles.





BRIEF DESCRIPTION OF THE FIGURES

A full and enabling disclosure of the present subject matter, including the best mode thereof to one of ordinary skill in the art, is set forth more particularly in the remainder of the specification, including reference to the accompanying figures in which:



FIG. 1 is a graph of an example of majority vote (MV)-based localization for a 2D case;



FIG. 2 is an example of a presently disclosed algorithm for localization;



FIG. 3 is a graph of an example of the number of votes per symbol versus the number of circularly-shifted chirps (CSCs) for the CSC-based-majority vote (MV) presently disclosed scheme as compared to the scheme in reference Item No. [9];



FIG. 4 is a graph of examples of several peak-to-mean envelope power ratio (PMEPR) distributions of transmissions for the presently disclosed scheme (EPA, N=400, K=50);



FIG. 5 is a graph of exemplary root-mean-square error (RMSE) versus signal-to-noise ratio (SNR) performance of the presently disclosed localization strategy for Nr={1, 3}, K={16, 36, 64}, and NIt=3;



FIG. 6 is a graph of exemplary RMSE versus NIt (Iteration) performance compared for K={16, 64} and Nr={1, 3, 5} along with the quantization bound; and



FIG. 7 is a graph of exemplary cumulative distribution function (CCDF) of error probability for Nr={1, 3, 5, 7}, with K={16, 100} for SNR=0 dB in accordance with the presently disclosed subject matter.





Repeat use of reference characters in the present specification and drawings is intended to represent the same or analogous features, elements, or steps of the presently disclosed subject matter.


Detailed Description of the Presently Disclosed Subject Matter

Reference will now be made in detail to various embodiments of the disclosed subject matter, one or more examples of which are set forth below. Each embodiment is provided by way of explanation of the subject matter, not limitation thereof. In fact, it will be apparent to those skilled in the art that various modifications and variations may be made in the present disclosure without departing from the scope or spirit of the subject matter. For instance, features illustrated or described as part of one embodiment, may be used in another embodiment to yield a still further embodiment.


In general, the present disclosure is directed to a system which is a circularly-shifted chirp (CSC)-based over-the-air computation (OAC) for privacy-preserving distributed localization.


In particular, we disclose an OAC approach based on CSCs and utilize it to achieve privacy-preserving distributed localization. Presently disclosed contributions summarized in certain respects may be listed as follows:

    • Spectrally-efficient chirp-based OAC: Motivated by the constant envelope nature of the chirp waveforms for WSNs, we develop a CSC-based OAC method to aggregate the local votes transmitted from anchor nodes (ANs) and compute the MV. The presently disclosed encoder improves the encoder in [9] to utilize the CSCs as efficiently as possible by encoding multiple votes into a CSC. The presently disclosed scheme is also based on non-coherent energy detection and does not rely on the availability of CSI at the AN or server node (SN). It also does not require phase synchronization, making it useful in practical systems.
    • Privacy-preserving localization: Based on the presently disclosed OAC scheme, we present a localization method for WSN. We also incorporate multiple iterations and repetitions to enhance the resolution of the localization and increase the detection probability, respectively. We demonstrate that we can minimize the root-mean-square error (RMSE) that is comparable to the quantization bound.


II. System Model
A. Localization Scenario and Problem Formulation

Consider an L×L rectangular area with K ANs and an SN, where L is the length in meters on the x-axis and y-axis. Assume that each AN and SN are equipped with a single antenna. We also assume that each AN is aware of its location, e.g., through a Global Positioning System (GPS) or fixed configuration. The ANs can also measure their distance from the SN, e.g., by using methods based on the received signal strength indicator (RSSI), time of arrival (ToA) or time difference of arrival (TDoA) [10]. We assume that SN is mobile and desires to identify its location via the feedback signals from ANs without accessing the local information at the ANs to promote the privacy of the local data.


In this present disclosure, we consider the voting-based localization discussed in [2]. In this approach, the area is first divided into Ng×Ng cells. Each AN takes part in a voting process occurring at the SN and votes for the potential cells where the SN may be located in. To elaborate the voting process rigorously, let Ax (a, b, Ng) denote an arithmetic sequence of Ng elements with the first element a and the last element b. Since each AN is aware of its position and its distance from the target, it can determine whether a cell is a potential candidate for the SN's location. Each cell is assigned to either 1 or 0 if it is a candidate cell or not, respectively. Let vnx,nyk be the assigned value for the cell with the indices nx∈{0, . . . , Ng−1} and ny∈{0, . . . , Ng−1} on the x-axis and y-axis for the kth AN, respectively. Also, let i be the linear cell index that assigns a unique integer to each cell as i=nx+Ngny, ∀i∈{0, . . . , Ng2−1}. We then equivalently express the vote for the ith cell of the kth AN as vnx,nyk.


The difference between the number of ANs that vote for 1 and 0 for the ith cell can be calculated as










Δ
i


=







k
=
1

K


2


v

k
,
i




-
1.





(
1
)








FIG. 1 is a graph of an example of majority vote (MV)-based localization for a 2D case. As illustrated in FIG. 1, the cell with the highest number of votes is called the MV cell and its index can be obtained as










i
max


=




arg


max

i


{

0
,


,


N
g
2

-
1


}





Δ
i

.






(
2
)







In [2], the SN obtains the votes for each AN and each cell through orthogonal channels. Hence, the SN is aware of the local data of ANs to calculate (2). As opposed to the method in [2], our main objective is to calculate Δi by using an OAC method that inherently promotes privacy via the signal superposition property of multiple access channels.


B. Signal Model: Circularly-Shifted Chirps Based OAC

In this presently disclosed subject matter, we use CSCs to compute MVs via OAC. In [11], it is shown that a chirp signal can be synthesized through a discrete Fourier transform (DFT)-spread OFDM (DFT-s-OFDM) transmitter with a special choice of frequency-domain spectral shaping (FDSS) with the motivation of its compatibility to 3GPP 4G LTE and 5G NR. By using this synthesis method, each AN generates the mth CSC symbol as











t

k
,
m


=


F
N
H



M
f


diag



{
f
}




D
M



d

k
,
m




,




(
3
)







where tk,mcustom-characterN is the mth transmitted baseband signal in discrete time for the kth AN, dk,mcustom-characterM contains the symbols on M bins, DMcustom-characterM×M is the orthonormal M-point DFT matrix, f∈custom-characterM is the FDSS vector to synthesize chirps, Mfcustom-characterN×M is the mapping matrix that maps the output of the DFT precoder to a set of subcarriers, and FNHcustom-characterN×N is the orthonormal N-point inverse DFT (IDFT) matrix. In [11], it is shown that tk,m is the baseband signal of a linear combination of linear CSCs where the amount of frequency sweep for each CSC is D/Tchirp for symbol duration Tchirp if the vector f is expressed as f=[cLd, . . . , cLu]T×√{square root over (M/Σj=LdLu|cj|2)}, where cj is given by











c
j

=


γ
j

(


C

(

α
j

)

+

C

(

β
j

)

+

jS

(

α
j

)

+

jS

(

β
j

)


)


,




(
4
)







where C(·) and S(·) are the Fresnel integrals with cosine and sine functions, respectively,








α
j

=


(


D
/
2

+

2

π

j


)

/


π

D




,


β
j

=


(


D
/
2

+

2

π

j


)

/


π

D




,


γ
j

=



π
D




e



-
j





(

2

π

j

)

2


2

D



-

j

π

j









for j∈{Ld, . . . , Lu}, Ld≤−D/2, Lu≥D/2, and Lu−Ld+1=M. The M input indices of the DFT-s-OFDM transmitter corresponds to the M CSCs within the symbol duration.


We assume that each individual AN transmission has an average received power of 1 Watt and the cyclic prefix (CP) duration is larger enough to compensate for the maximum delay of the channel and synchronization errors. Assuming that all ANs transmit simultaneously for OAC, the mth received baseband signal in discrete-time can be written as











r
m

=





k
=
0


K
-
1




H
k



t

k
,
m




+

n
m



,




(
5
)







where Hkcustom-characterN×N is a circular-convolution matrix based on the DFT of the channel impulse response (CIR) of the channel between k AN and SN, and nm˜Ccustom-character(0N, σn2IN) is the additive white Gaussian noise (AWGN). At the SN, the aggregated symbols on the bins of the mth OFDM symbol can be expressed as












d
~

m

=


D
M
H



M
f
H


diag


{

f
H

}



F
N



r
m



,




(
6
)







where {tilde over (d)}mcustom-characterM are the received symbols on the mth symbol.


In this present disclosure, we consider potential time synchronization errors at SN and ANs. The time synchronization of the ANs may not be precise, resulting in imprecise time-of-arrivals at the SN. The time-of-arrival of each AN is chosen randomly from 0 to Narr samples with equal probability. Thus, Tarr=NarrTsample is the maximum difference between the time-of-arrivals. We assume that the synchronization point at the SN can deviate by Nerr samples in the time domain. Thus, Terr=NerrTsample is the maximum time difference from the synchronization point at the SN. The maximum delay caused by the imperfect time-synchronization is Tsync=Tarr+Terr seconds. Since a translation in the time domain results in modulations in the frequency domain, we also introduce corresponding phase rotations in the frequency domain to model the impact of synchronization errors.


C. Notations for Functions and Sequences

Let ƒ be a binary function that maps custom-character22m={x1, x2, . . . , xm, y1, y2, . . . , ym|∀xj, yjcustom-character2} to custom-character2. Similarly, let g be a pseudo-Boolean function that maps custom-character2m to custom-character. In this present disclosure, to simplify the notation, we use {tilde over (·)} on top of a function to denote a function that maps the non-negative integers in i, j∈custom-character2m to the co-domain of ƒ as {tilde over (ƒ)}(i, j)custom-characterƒ(e−1(i), e−1(j)), where i=e(x)custom-characterΣj=1mxj2m-j and j=e(y)custom-characterΣy=1m yj2m-j for xcustom-character(x1, x2, . . . , xm) and ycustom-character(y1, y2, . . . , ym). In other words, i and j are the decimal representations of the binary numbers constructed by using all elements in the sequence x and the sequence y, where the most significant bits are x1 and y1, respectively. Similarly, {tilde over (g)} maps i∈custom-character2m to the co-domain of g as {tilde over (g)}(i)custom-characterg(e−1(i)).


III. Privacy-Preserving Distributed Localization with OAC


In this section, we first introduce the presently disclosed encoder that allows us to transmit more votes with CSCs for OAC as compared to the one in [9]. We then discuss the decoder for privacy-preserving distributed localization and methods that enhance the performance in practice.



FIG. 2 is an example of a presently disclosed algorithm for localization.


A. Transmitter

1) Encoding: At the kth AN, the Ng2 votes are partitioned into G group of length Nv, where the gth group is denoted by a sequence of votes vkcustom-character(vk, (g−1)Nv+1, . . . , vk, gNv) for g∈{0, 1, . . . , G−1} and the last group is padded with the vote 0 if Ng2 is not integer multiples of Nv. Without loss of generality, we focus on encoding the gth group of votes. Let skcustom-charactere(vk) be the decimal value of the binary representation vk. The representation vk can be encoded to a polynomial representation pk (z) such that only the skth term has a non-zero coefficient. The polynomial pk (z) can be expressed as












p
k

(
z
)


=
^





s
=
0



2

N
v


-
1





f
~

(

s
,

s
k


)




z
s




,




(
7
)







where {tilde over (ƒ)}(s, sk) is the coefficient of the sth term and the desired function {tilde over (ƒ)}(s, sk) is defined as











f
~

(

s
,

s
k


)

=

{





1
,




s
=

s
k







0
,




s


s
k





.






(
8
)







2) Modulation: Let Ns denote the total number of CSC symbols to transmit Ng2 votes and the symbols are indexed by m∈{0, 1, . . . , Ns-1}. Let M be an integer multiple of B. We then partition the CSC indices within one CSC symbol into B blocks indexed by b∈{0, 1, . . . , B−1} for Mb=M/B. Each block is further split into S=2Nv subblocks indexed by s∈{0, 1, . . . , S−1} for Msb=Mb/S. Let custom-character be a predefined function that maps the group index g to a distinct pair (mg, bg) for mgcustom-characterNs, and bgcustom-characterB. The coefficient {tilde over (ƒ)}(s, sk) of the sth term of the polynomial in (8) acts as a switch to activate or deactivate the sth subblock within the bgth block for the mgth symbol.


If the corresponding bin of a CSC index carries a symbol, it is designated as an active CSC; otherwise, it is designated as an inactive CSC. After activating the sk,gth subblock, only the first CSC of the corresponding subblock is activated and the rest of the Mg=Mb/S−1 CSCs are deactivated. Deactivating CSCs corresponding to the adjacent Mg indices provides a guard period of Tg=MgTchirp/M between the activated CSCs in the time domain. The guard period protects against interference due to the delay spread of the channel, and imperfect time synchronization. To ensure negligible interference, choosing Mg under the condition specified by











T
g

=




M
g



T
chirp


M




T
chn

+

T
sync




,




(
9
)







must be maintained, where Tchn is the maximum delay of the channel. For the kth AN, we denote the vector dm,b,s(k) to represent the symbols of the (1+Mg) bins for the sth subblock of a given symbol and block index pair (m, b). We set the following symbols as









d


m
g

,

b
g

,
s


(
k
)


=



M
b




p

k
,
g






[

1
,
0
,


,
0

]




M
g




;


g


,




where pk,g is a random symbol on the unit circle. Therefore each symbol can carry Mv=BNv votes in total.


B. Receivers

1) Demodulation: Without loss of generality, we focus on detecting the gth group of aggregated votes. The mapping function custom-character is assumed to be known at the receiver so that the corresponding symbol and block indices (mg, bg) are known. ∀s, we calculate the energy of the superposed symbols in the sth subblock as












g
~

sup




(
s
)



=
^







d
~



m
g

,

b
g

,
s




2

.





(
10
)







For the sake of analysis, assume a flat-fading Rayleigh channel that changes randomly for the next symbol. In this case, {tilde over (g)}sup(s) term is an exponential distribution.


2) Decoding: The polynomial presentation for the gth vote at the receiver can be expressed as















p
~

g

(
z
)

=





s
=
0



2

N
v


-
1











k
=
1

K



h
k




(


f
~

(

s
,

s
k


)

)



+

n
s




2



z
s










=





s
=
0



2

N
v


-
1











k
=
1

K



h
k




(

f

(

x
,

y
k


)

)



+

n
s




2



z
s




,







(
11
)







where hk is the corresponding channel coefficient for the kth user and ns is the noise term for the sth subblock.


Therefore, {tilde over (g)}sup(s)custom-charactergsup(x)=∥Σk=1K hk(ƒ(x,yk))+ns2. For the ith cell, assume that K+ ANs vote with 1 and K ANs vote with 0. By the definition of vk in Section III-A1, we can also obtain the ath element of vk as a=(g−1)Nv−i. The presently disclosed decoder then compares the energies of the subblocks for xa=0 with that of xa=1 to obtain the decision metric of the ith MV as











Δ
~

i

=








x



2

2

N
v










x
a

=
1







g
sup




(
x
)



-







x



2

2

N
v










x
a

=
0







g
sup





(
x
)

.








(
12
)







At the receiver side, the cell with the most votes is the most likely location for the server, and the SN can be assumed to be at the center of the cell. The index with the most votes can then be determined by










i
~

=

arg


max

i


{

0
,

,


N
g
2

-
1


}






Δ
~

i

.






(
13
)







From ĩ, we can determine the corresponding x-axis and y-axis indices of the target cell as ñx and ñy, respectively.


Equation (13) differs from (2) due to the incoherent nature of the presently disclosed scheme. From the identity custom-character[|X+Y|2]=custom-character[|X|2]+custom-character[|Y|2] for some normal distribution X and Y, and using (8), the expected value of the first term of the right-hand side of (12) can be expressed as













𝔼

[







x



2

2

N
v










x
a

=
0







g
sup




(
x
)



]

=






k


𝕂
a
+




𝔼

[




h
k



2

]


+


2


N
v

-
1




𝔼

[




n
s



2

]









=



2


K
a
+


+


2


N
v

-
1





σ
n
2

.










(
14
)







Similarly,










𝔼

[







x



2

2

N
v










x
a

=
1







g
sup




(
x
)



]

=


2


K
a
-


+


2


N
v

-
1





σ
n
2

.







(
15
)







By using (14) and (15), we can then show










𝔼

[


Δ
~

i

]

=


2


(


K
a
+

-

K
a
-


)


=

2




Δ
~

i

.







(
16
)







Hence, (12) is an unbiased estimate of Δi and the presently disclosed scheme obtains the cell SN located, probabilistically.


C. Privacy Preservation and Security

The presently disclosed method promotes the privacy of the local data since the OAC superposes the ANs signal and SN only observes the aggregated signal [12]. Hence, SN cannot trivially decode the local data from the aggregated signal when a large number of ANs are involved in the voting process. The presently disclosed scheme also provides security against eavesdroppers as the aggregation depends on the positions of the ANs and the SN and the power alignment may not be maintained if the eavesdroppers and SN are not co-located. Hence, the attacker does not observe the same aggregated data at the SN. Also, the mapping function custom-character can be encrypted to improve the security of the system further. Lastly, the presently disclosed scheme provides immunity against Byzantine ANs as it relies on the MV principle as discussed in [2].


D. Enhancements

In this section, we presently disclose several methods to address the probabilistic nature of the presently disclosed scheme in order to enhance localization performance.


1) Multiple repetitions: To increase the probability of correct detection in (13), one of the strategies that we consider is to use repetitive transmissions of the votes and obtain the cell index through a median operation. For a total number of Nr repetitions, (13) can be expressed for the nrth repetition as












i
~


(

n
r

)


=

arg


max

i


{

0
,

,


N
g
2

-
1


}





Δ
~

i

(

n
r

)




,




(
17
)







where {tilde over (Δ)}i(nr) is the decision metric for the ith cell and the nrth repetition.


The coordinates of the cell with the highest number of votes can be determined as XSN=median(XSN1, . . . , XSNNr) and YSN=median(YSN1, . . . , YSNNr). Note that median is useful to eliminate outliers that occur in fading channel.


2) Iterative method: The resolution of the localization is determined by the selected grid size Ng and the length L. A larger grid size results in a smaller resolution but is computationally more demanding. We utilize an iterative procedure for further refinement. For the iterative procedure, the grid size is chosen small. After the first round of iteration, the SN estimates its location and broadcasts the coordinates to all ANs. For the next iteration, the AN focuses on a smaller area with the estimated location at the center. Let the zoomed region for each iteration be equal to the area of Nz×Nz cells. For the nith iteration, the grid size is then updated as







L

n
i


=


L


n
i

-
1


×



N
z


N
g


.






The AN updates the chosen axes as











X
ax

n
i


=


A
x




(



X
SN

n
i


-


L

n
i


2


,


X
SN

n
i


+


L

n
i


2


,

N
g


)



,




(
18
)








and









X
ax

n
i


=


A
x





(



Y
SN

n
i


-


L

n
i


2


,


Y
SN

n
i


+


L

n
i


2


,

N
g


)

.






(
19
)







The ANs continue the voting while taking the new grid into account. Note that the iterative method can also be utilized with multiple repetitions.


Note that there exists an inaccuracy owing to the grid quantization with the presently disclosed scheme. The bound on RMSE based on quantization can be obtained as Lb=LNzNIT−1/NgNh meters if SN is assumed to be randomly located in the area. The RMSE is given by RMSE=√{square root over (E[|e|2])}, where e is the localization error in meters.


IV. Numerical Results

We consider M=240 subcarriers and set the IDFT size as N=256. ITU Extended Pedestrian A (EPA) is considered for the fading channel with no mobility for each round and the channel variation is considered by regenerating the channel at each communication round. The root-mean-square (RMS) delay spread of the EPA channel is Trms=43.1 ns. We also consider that both Narr and Nerr can vary between zero and one sample. We set Mg=4 to make sure that the condition in (9) is maintained.



FIG. 3 is a graph of an example of the number of votes per symbol versus the number of circularly-shifted chirps (CSCs) for the CSC-based-majority vote (MV) presently disclosed scheme as compared to the scheme in reference Item No. [9]. Thus, in FIG. 3, the relation between the number of CSCs per symbol, i.e., B, and the number of votes per OFDM symbol, i.e., Mv, is given for both the presently disclosed encoder subject matter and the encoder mentioned in [9]. The figure shows that the presently disclosed encoders allow a CSC symbol to use more votes than the one in [9]. For instance, for B=2, it shows that the total number of votes per OFDM symbol Mv is 2 and 8 for the presently disclosed and the encoder in [9], respectively. This implies the presently disclosed encoder is four times faster than the one in [9] for B=2 in terms of computation rate. The gain decreases as B increases. For B≥13, both the new and the old encoder can carry the same number of votes.



FIG. 4 is a graph of examples of several peak-to-mean envelope power ratio (PMEPR) distributions of transmissions for the presently disclosed scheme (EPA, N=400, K=50). The CSCs result in low PMEPR. When B is 1, 2, or 6, the PMEPR is approximately 2 dB, 3 dB, and 8 dB, respectively. This is slightly higher than the theoretical PMEPR, i.e., log10 B dB. The synthesized signal is distorted due to the abrupt frequency change of the linear CSCs within a symbol duration [11]. However, PMEPR can be improved by choosing a very small D or by modifying the FDSS vector f [11].


Per FIG. 5 is a graph of exemplary root-mean-square error (RMSE) versus signal-to-noise ratio (SNR) performance of the presently disclosed localization strategy for Nr={1, 3}, K={16, 36, 64}, and NIt=3. The RMSE decreases as the number of repetitions Nr increases. This is because the probability of error lowers with the increasing number of repetitions. FIG. 5 further demonstrates that the RMSE performance increases with the number of devices K.


In FIG. 6, the RMSE versus NIt performance is compared for K={16, 64} and Nr={1, 3, 5} along with the quantization bound. For the given parameter set, the RMSE performance is best for K=64 and Nr=5 and it performs worst when K=16 and Nr=1. The figure shows that the RMSE performance can be improved by either increasing the K or Nr. From FIG. 5 and FIG. 6, we can see that the localization strategy fails for Nr=1 as the RMSE is high.



FIG. 7 is a graph of exemplary cumulative distribution function (CCDF) of error probability for Nr={1, 3, 5, 7}, with K={16, 100} for SNR=0 dB in accordance with the presently disclosed subject matter. The error is within the range of the bound with a probability of 99.99%. The overall RMSE is however impacted by a very small percentage of outlier errors that result in a significant amount of inaccuracy. The probability of getting an outlier drops substantially as the number of repetitions Nr increases.


V. Concluding Remarks

In this present disclosure, we disclose a CSC-based OAC for privacy-preserving distributed localization. The key benefit of the presently disclosed encoder is that it improves the spectral efficiency of the encoder in [9] while maintaining the power efficiency of chirps along with the non-coherent detection method that does not rely on CSI and perfect time synchronization. Numerical results show that increasing the number of ANs, iterations, and/or repetitions achieves higher localization accuracy. The presently disclosed concept can be extended to 3D localization. In the future, the presently disclosed concept will be tested and fortified against various types of adversarial attacks.


While certain embodiments of the disclosed subject matter have been described using specific terms, such description is for illustrative purposes only, and it is to be understood that changes and variations may be made without departing from the spirit or scope of the subject matter.


REFERENCES



  • [1] T. Hc. C. Huang. B. M. Blum. J. A. Stankovic, and T. Abdelzaher. “Range-free localization schemes for large scale sensor networks.” in Proc. ACM International Conference on Mobile Computing and Networking. New York, NY, USA: Association for Computing Machinery, 2003, pp. 81-95.

  • [2] D. Liu. P. Ning. and W. K. Du. “Attack-resistant location estimation in sensor networks.” in IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005. IEEE, 2005, pp. 99-106.

  • [3] T. Shu. Y. Chen. J. Yang, and A. Williams. “Multi-lateral privacy-preserving localization in pervasive environments.” in IEEE INFOCOM 2014-IEEE Conference on Computer Communications. IEEE, 2014, pp. 2319-2327.

  • [4] X. Shi, F. Tong, W.-A. Zhang. and L. Yu. “Resilient privacy-preserving distributed localization against dishonest nodes in internet of things.” IEEE Internet of Things Journal, vol. 7, no. 9, pp. 9214-9223, 2020.

  • [5] G. Zhu. Y. Wang. and K. Huang. “Broadband analog aggregation for low-latency federated edge learning.” IEEE Trans. Wireless Commun., vol. 19, no. 1, pp. 491-506, January 2020.

  • [6] G. Zhu. Y. Du. D. Gunduz, and K. Huang. “One-bit over-the-air aggregation for communication-efficient federated edge learning: Design and convergence analysis.” IEEE Trans. Wireless Commun., vol. 20, no. 3, pp. 2120-2135, November 2021.

  • [7] A. Sahin. B. Everette, and S. Hoque. “Distributed learning over a wireless network with FSK-based majority vote.” in Proc. IEEE International Conference on Advanced Communication Technologies and Networking (CommNet), December 2021, pp. 1-9.

  • [8], “Over-the-air computation with DFT-spread OFDM for federated edge learning,” in Proc. IEEE Wireless Communications and Networking Conf. (WCNC), April 2022, pp. 1-6.

  • [9] S. Hoque, M. H. Adeli, and A. Sahin, “Chirp-based over-the-air computation for long-range federated edge learning,” in Proc. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), September 2022, pp. 1-7.

  • [10] J. D. Gibson, Mobile communications handbook. CRC press, 2012.

  • [11] A. Sahin, N. Hosseini, H. Jamal, S. S. M. Hoque, and D. W. Matolak, “DFT-Spread-OFDM-based chirp transmission,” IEEE Communications Letters, vol. 25, no. 3, pp. 902-906, 2021.

  • [12] H. Hellstrom, J. M. B. da Silva Jr., M. M. Amiri, M. Chen, V. Fodor, H. V. Poor, and C. Fischione, “Wireless for machine learning: A survey,” Foundations and Trends in Signal Processing, vol. 15, no. 4, pp. 290-399, 2022.


Claims
  • 1. An over-the-air computation methodology for privacy-preserving localization in a sensor network without using channel state information (CSI) at a plurality of anchor nodes (ANs) or at a server node (SN), comprising: providing an over-the-air computation network with update vectors received at a server node (SN) as transmitted from a plurality of anchor nodes (ANs);providing one or more processors; andproviding one or more non-transitory computer-readable media that store instructions that, when executed by the one or more processors, cause the one or more processors to perform operations, the operations comprising:transmitting local vectors as votes from each respective of the plurality of anchor nodes (ANs),receiving the superposed update vector at the server node (SN), anddetermining the majority vote (MV) for each element of the update vector at the server node (SN),wherein the transmitted local vectors comprise respective circularly-shifted chirp (CSC) signals, each transmitted simultaneously from all of the ANs.
  • 2. The over-the-air computation methodology according to claim 1, wherein the operations further comprise aggregating the local vectors through superposition at the SN, for computing the MV votes using non-coherent energy detection for voting-based distributed localization determination without requiring an ideal time-synchronization or channel state information (CSI).
  • 3. The over-the-air computation methodology according to claim 2, the operations further comprising: providing a distributed learning application; andinputting the MVs into the distributed learning application for updating the application.
  • 4. The over-the-air computation methodology according to claim 3, wherein the distributed learning application comprises federated edge learning (FEEL).
  • 5. The over-the-air computation methodology according to claim 1, wherein the sensor network comprises a wireless sensor network (WSN) comprising a portion of an Internet-of-Things (IoT) network.
  • 6. The over-the-air computation methodology according to claim 1, wherein the operations further comprise the anchor node (AN) votes encoding the potential location of the server node (SN) by mapping to the circularly-shifted chirp (CSC) signals.
  • 7. The over-the-air computation methodology according to claim 6, wherein the SN is mobile and the operations further comprise using increased numbers of ANs, multiple transmit iterations, and multiple transmit repetitions to enhance localization resolution and increase detection probability.
  • 8. The over-the-air computation methodology according to claim 1, wherein the server node and each anchor node are respectively equipped with a single antenna.
  • 9. The over-the-air computation methodology according to claim 1, wherein the operations further comprise that each AN is aware of its location through us of a Global Positioning System (GPS) or through having a fixed location configuration.
  • 10. The over-the-air computation methodology according to claim 9, wherein the operations further comprise that each AN can respectively measure its distance from the SN.
  • 11. The over-the-air computation methodology according to claim 10, wherein the operations further comprise that the ANs respectively measure distance from the SN by using methodology based on one of (1) received signal strength indicator (RSSI), (2) time of arrival (ToA), or (3) time difference of arrival (TDoA).
  • 12. The over-the-air computation methodology according to claim 1, wherein the operations further comprise that the respective circularly-shifted chirp (CSC) signals are synthesized at the respective ANs through a discrete Fourier transform (DFT)-spread OFDM (DFT-s-OFDM) transmitter using frequency-domain spectral shaping (FDSS).
  • 13. An over-the-air computation system for privacy-preserving localization in a sensor network without using channel state information (CSI) at a plurality of anchor nodes (ANs) or at a server node (SN), comprising: an over-the-air computation network to process update vectors received at a server node (SN) as transmitted from a plurality of anchor nodes (ANs);one or more processors; andone or more non-transitory computer-readable media that store instructions that, when executed by the one or more processors, cause the one or more processors to perform operations, the operations comprising:transmitting local vectors as votes from each respective of the plurality of anchor nodes (ANs),receiving the superposed update vector at the server node (SN), anddetermining the majority vote (MV) for each element of the update vector at the server node (SN),wherein the transmitted local vectors comprise respective circularly-shifted chirp (CSC) signals, each transmitted simultaneously from all of the ANs.
  • 14. The over-the-air computation system according to claim 13, wherein the operations further comprise aggregating the superposed update vector received at the SN, for computing the MV votes using non-coherent energy detection for voting-based distributed localization determination without requiring an ideal time-synchronization or channel state information (CSI).
  • 15. The over-the-air computation system according to claim 14, the operations further comprising: providing a distributed learning application; andinputting the MVs into the distributed learning application for updating the Model parameters.
  • 16. The over-the-air computation system according to claim 15, wherein the distributed learning application comprises federated edge learning (FEEL).
  • 17. The over-the-air computation system according to claim 13, wherein the sensor network comprises a wireless sensor network (WSN) comprising a portion of an Internet-of-Things (IoT) network.
  • 18. The over-the-air computation system according to claim 13, wherein the operations further comprise the anchor node (AN) votes encoding the potential location of the server node (SN) by mapping the votes to the circularly-shifted chirp (CSC) signals.
  • 19. The over-the-air computation system according to claim 18, wherein the SN is mobile and the operations further comprise using increased numbers of ANs, multiple transmit iterations, and multiple transmit repetitions to enhance localization resolution and increase detection probability.
  • 20. The over-the-air computation system according to claim 13, wherein the server node and each anchor node are respectively equipped with a single antenna.
  • 21. The over-the-air computation system according to claim 13, wherein the operations further comprise that each AN is aware of its location through us of a Global Positioning System (GPS) or through having a fixed location configuration.
  • 22. The over-the-air computation system according to claim 21, wherein the operations further comprise that each AN can respectively measure its distance from the SN.
  • 23. The over-the-air computation system according to claim 22, wherein the operations further comprise that the ANs respectively measure distance from the SN by using methodology based on one of (1) received signal strength indicator (RSSI), (2) time of arrival (ToA), or (3) time difference of arrival (TDoA).
  • 24. The over-the-air computation system according to claim 13, wherein the operations further comprise that the respective circularly-shifted chirp (CSC) signals are synthesized at the respective ANs through a discrete Fourier transform (DFT)-spread OFDM (DFT-s-OFDM) transmitter using frequency-domain spectral shaping (FDSS).
PRIORITY CLAIMS

The present application claims the benefit of priority of U.S. Provisional Patent Application No. 63/437,774, filed Jan. 9, 2023, entitled Methods for Privacy-Preserving Distributed Localization with Chirp-Based Over-The-Air Computation, and the benefit of priority of U.S. Provisional Patent Application No. 63/594,597, filed Oct. 31, 2023, entitled Chirp-Based Over-The-Air Computation for Privacy-Preserving Distributed Localization, and both of which are fully incorporated herein by reference for all purposes.

Provisional Applications (2)
Number Date Country
63594597 Oct 2023 US
63437774 Jan 2023 US