Wireless_Network_Analytics_for_the_New_Era_of_Spectrum_Patrolling_and_Monitoring
Wireless_Network_Analytics_for_the_New_Era_of_Spectrum_Patrolling_and_Monitoring
net/publication/380548812
Wireless Network Analytics for the New Era of Spectrum Patrolling and
Monitoring
CITATIONS READS
2 45
2 authors:
All content following this page was uploaded by Andrea Giorgetti on 15 July 2024.
Digital Object Identifier: 10.1109/MWC.012.2300374 The authors are with the University of Bologna, Italy.
1 1536-1284/24/$25.00
Authorized licensed use limited to: Universita © Downloaded
degli Studi di Bologna. 2024 IEEE on July 15,2024 at 12:10:40
IEEE UTC
Wireless from IEEE Xplore.
Communications Restrictions
• Accepted apply.
for Publication
Radio spectrum mon-
itoring is a complex
process that aims to
obtain a high-level
logical representation
of the radio frequency
environment, its users,
and their behavior.
FIGURE 1. A depiction of a 6G wireless network disrupted by an intelligent jamming device. A UAV, acting as spectrum
patrol, monitors the RF environment and applies advanced analytics extraction techniques to gain valuable insights from
the data, aiming to obtain as much information as possible about the situation and eventually identify the jammer. The
extracted analytics are then forwarded to the authority in charge so that it can secure the environment.
statistical signal processing can be used for effec- with almost 100% reliability, the monitoring of our
tive monitoring, including classification and local- shared resource, the spectrum, is still reliant on
ization of threats, interference mitigation, and regulators using costly and energy-intensive lab-
detection of violations of spectrum access rules. grade spectrum analyzers. This approach makes
• We define the fundamental ingredients for the spectrum monitoring inefficient, slow, outdated,
composition of a spectrum management tool- sporadic, and unsuitable for scalability. Converse-
kit. In this context, AI plays an ambivalent role: ly, to bolster the security of forthcoming wireless
on the one hand, it will be pervasive in future systems, there is a pressing need for ongoing and
devices and networks, making it necessary to comprehensive spectrum patrolling, that is vital to
monitor the spectrum more attentively and rig- enable rapid responses and ensure comprehen-
orously; on the other hand, it will be a valuable sive coverage across time, frequency, and space
tool to amplify spectrum patrolling capabilities. dimensions [8, 9].
• Numerical results illustrate how it is possible To start with a concrete example, Fig. 1 depicts
to extract wireless network analytics after per- a wireless network scenario in which a spectrum
forming blind source separation (BSS) from raw patroller, represented by a UAV, collects the data
measurement acquired by radio-frequency (RF) about the RF scene and extracts a set of wireless
sensors with remarkable accuracy. network analytics. Such analytics are then forward-
ed to the authority that, according to the spec-
What Is Spectrum Monitoring trum utilization rules defined by the regulator (e.g.,
Radio spectrum monitoring is a complex process European Telecommunications Standards Institute
that aims to obtain a high-level logical representa- (ETSI) or Federal Communications Commission
tion of the radio frequency environment, its users, (FCC)), proceeds to identify anomalies or malicious
and their behavior. It involves three main phases. users (e.g., the jammer) that threaten the network.
Initially, a collection of data in the frequency, time, Spectrum patrolling with UAVs has the potential
and spatial domains through spectrum sensing and to revolutionize the way we manage and protect
patrolling mechanisms is necessary. Then, the mul- our wireless communication infrastructure. Drones
tidimensional data are processed to extract a set of equipped with specialized sensors and software
logical features (or analytics) that give a detailed can fly over large areas, quickly identifying and
representation of the spectrum usage and its users. locating any unauthorized use of the RF spectrum.
Finally, the extracted features are analyzed to iden- This is especially important in large urban areas
tify behaviors or situations for which an action where traditional spectrum patrolling techniques
is required, for example, the intervention of the can be time-consuming and labor-intensive.
authority to interrupt a jammer or reorganize a Another advantage of using UAVs for spectrum
wireless network for more efficient spectrum reuse. patrolling is their ability to access hard-to-reach
areas, that is, flying over mountains, forests, and
Spectrum Sensing and Patrolling other remote zones.
The monitoring process begins with data acqui- The patroller can either be a dedicated device
sition through spectrum sensing techniques. It is, or an adhoc designed network (or fleet) provided
therefore, essential to ponder which actors should by the authority on charge (Fig. 1). Alternatively,
perform this primary task and how they should do patrolling can be performed via crowdsourcing in
it. Indeed, despite the demand for communication which the mobile devices periodically sense the
Authorized licensed use limited to: Universita degli Studi di Bologna. Downloaded on July 15,2024 at 12:10:40 UTC from IEEE Xplore. Restrictions apply.
3 IEEE Wireless Communications • Accepted for Publication
Spectrum Patrol
6G Network Nodes
Malicious User
FIGURE 2. An illustration of the proposed framework. The spectrum patrol gathers over-the-air traffic profiles produced by
the nodes of the 6G wireless network. Subsequently, source detection and BSS are performed to separate the received
signals. The final stage is the extraction of network analytics such as the topology of the observed network, the location of
active transmitters, and the type of application-level traffic generated.
System Setup and Common Assumptions Source Counting and Blind Source Separation
As an example, Fig. 2 shows a spectrum patrol Considering that the patrol will reasonably be com-
composed of a set of RF sensors monitoring posed of multiple devices equipped with antenna
a wireless environment and processing all the arrays, it is expected that a step toward radio envi-
observations to extract network analytics. The ronment monitoring could be identifying a set of
same scenario is illustrated in Fig. 3, where the unknown transmitters and extracting their transmit-
patrollers are UAVs, which survey the scenario ted power profiles. Hence, the first problem relies
by sensing and transmitting all the acquired data on estimating the number of active devices in the
to a fusion center, in charge of merging and pro- observed environment. This task can be accom-
cessing all the observations. The fusion center plished through model order selection using mini-
extracts the wireless network analytics and gets mum description length (MDL) criteria.
a detailed, comprehensive view of the observed The diagram in Fig. 2 represents the complete
RF environment. The listed analytics are the processing sequence. First, each RF sensor collects
main ones studied at the moment, and we are a mixture of over-the-air received powers from all
sure that others will emerge in the near future. the nodes of the observed network. Subsequently,
These features can be extracted without interact- all the gathered traffic profiles are transmitted to
ing with the observed network and the sensors. a fusion center, which can be either one of the
The processing can be accomplished without devices composing the patrol or the authority in
demodulating the received signals, employing charge. The received mixtures are processed to
methods such as a simple energy detector (ED) effectively separate and distinguish the traffic pro-
[11]. This approach does not require collabo- files generated by each network node.1 This recon-
ration between the network and the patrol and struction phase can lay the foundation for a more
preserves the users’ privacy. Conversely, if the effective analytics extraction procedure.
network is collaborative, these characteristics The identification and the separation of the
can be combined with the information made power profiles start from BSS, leveraging on spatial
available by the network itself to obtain more filtering, matrix factorization, tensor decomposition,
effective monitoring. The simulation results illus- and independent component analysis (ICA), to men-
trated in the following subsections are obtained tion a few state-of-the-art techniques, followed by
from the raw measurement of a set RF sensors statistical signal processing methods and ML [11].
deployed in the same area of an IEEE 802.11s The objective is to reconstruct the temporal traffic
ad-hoc network, operating at f 0 = 2.412 GHz. profiles as if they were measured at each transmit-
The propagation scenario is characterized by ting node of the network. Indeed, due to the wire-
omnidirectional antennas at the nodes and the less medium’s nature, the patrol sensors observe a
sensors, path-loss, log-normal shadowing, and mixture of signals emitted by the nodes. To extract
thermal noise. The simulations have been carried and distinguish the individual signals generated by
out for different shadowing intensities, simulat- each node, an unmixing operation is necessary. 1 The separation of signals
ing various urban scenarios. The number of RF The blind source separation algorithm used in would provide more informa-
sensors is greater than or equal to the number this work is based on the combination of princi- tion, but extraction of tempo-
ral power profiles has been
of network nodes, such that the problem of sep- pal component analysis (PCA) and Fast-ICA tech- shown to provide enough
arating the signals emitted by the nodes is over- niques, and is the starting point for the extraction information, for example, for
determined. of the following wireless network analytics. network topology inference.
0.6
p D , p FA
0.4
(a)
0.2
0
2 3 4 5
Network node Shadowing intensity (dB)
20
LSstd
(b)
5
0
1 1.4 1.8 2.2 2.6
Nodes/sensors ratio
Classification accuracy
Spectrum 0.8
Monitoring
0.6 PCA
KPCA
(c)
SVM
0.4 NN
Authority 10 20 30 40 50 60 70 80 90 100
Observation window (ms)
FIGURE 3. An example of a spectrum patrolling scenario where a wireless network is monitored by patrol units (i.e., UAVs)
equipped with RF sensors. The patrol units collect the over-the-air signals transmitted by the nodes and send them to the
fusion center. The fusion center extracts the analytics and gets a detailed network description. Such information can be
forwarded to the authority and used to secure the network from malicious users (i.e., jammers) and optimize spectrum
usage: a) Topology inference: performance of a set of topology inference algorithms, in terms of detection (pD) and false-
alarm (pFA) probabilities of the directed links of pairs of nodes of the monitored network; b) Nodes localization: results of LS
and MLE-based localization performances in terms of localization error varying the ratio between the number of sensors
and the number of network nodes; c) Traffic classification: performance comparison for different ML classifiers, namely
SVMs, NNs, PCA and KPCA, in the recognition of different user-level applications varying the observation time window.
Authorized licensed use limited to: Universita degli Studi di Bologna. Downloaded on July 15,2024 at 12:10:40 UTC from IEEE Xplore. Restrictions apply.
5 IEEE Wireless Communications • Accepted for Publication
random processes. Considering two time series Fig. 3(b) shows the results of the non-collabo- Since some devices
xi and xj , modeled as random processes, the TE rative localization procedure proposed in [14], can be malicious or
from i to j can be expressed as [12, 13] where a set of RF sensors perform a received sig- use a technology that
nal strength (RSS)-based localization of the nodes does not include a
𝑝𝑝(𝑥𝑥#,% |𝐱𝐱!– , 𝐱𝐱#– ) of an unknown wireless network through BSS and
TE!→# = I"𝑥𝑥#,% ; 𝐱𝐱!– , 𝐱𝐱#– ' = 𝔼𝔼 )log ' 1 least squares (LS) or maximum likelihood esti- localization procedure
𝑝𝑝(𝑥𝑥#,% |𝐱𝐱#– ) (e.g., Wi-Fi, 2G), the
mation (MLE). The performance indicator is the
(2) localization error, evaluated for different values patrol must manage
where x–i and x–j denote the past samples of xi and of the ratio between the density of RF sensors both collaborative
xj up to time instant k, respectively, and p(·|·) is and network nodes. As evident from the results, and non-collaborative
the conditional probability density function (p.d.f.). when this ratio increases, the error decreases,
The well-known GC is based on a relatively sim- indicating that a higher number of sensors posi- localization to form a
ple test grounded on AR models, an assumption tively impacts the localization performance. The comprehensive picture
that does not always hold. On the contrary, TE results demonstrated that the combination of BSS of the RF scene.
is model-free but requires the estimation of mul- and MLE have satisfactory performance in realistic
tidimensional p.d.f.s, known to be data-hungry channels with noise and shadowing, making the
and computationally demanding. In the context of blind localization of multiple unknown simultane-
topology inference, alternative solutions that rely ous transmitters possible.
on neural network (NN) have been found prac-
tical and computationally appealing after proper Traffic Classification
training [11]. However, causality detection is still The importance of identifying resource usage and
an open problem, and we expect to see interest- coordinating security operations, such as firewall-
ing developments in the coming years. ing and filtering out undesirable traffic, cannot be
Figure 3a illustrates an example of possible overstated in large-scale network infrastructures.
output for topology inference and a way to mea- Understanding the type of traffic generated by the
sure its performance as described in [11], where users of a wireless network is crucial for identifying
pD and pFA indicate the probability of detection malevolent transmitters. These activities encompass
and false alarm of the directed link from two the entire ISO-OSI stack, ranging from the physi-
nodes of the monitored wireless network, cal- cal layer to the application level. For instance, at
culated over a set of Monte Carlo trials. Figure one end, traffic profiles generated by a jammer can
3a shows a comparison between GC, TE, and be detected by identifying irregular transmission
a NN-based causality detection algorithm. Such patterns; on the other one, more in-depth knowl-
results, accounting for packet collisions and edge of how a network uses the wireless medium
realistic channel impairments, such as noise and may contribute to the development of much more
shadowing, revealed that wireless network topol- effective spectrum sharing strategies.
ogy inference of unknown networks is possible Although traffic classification in wired networks
and that the accuracy in detecting information has been extensively studied, few papers address
flows between nodes, that is, reconstructing this issue in wireless systems where the amount of
the adjacency matrix (hence network topology) accessible information is limited. In recent times,
can be quite good, especially for the proposed novel ML-based techniques for traffic classification
AI-based solution. In fact, the NN outperforms in non-collaborative wireless networks employing
the traditional solutions in a low shadowing affordable RF sensors have emerged [15]. These
regime, performing topology detection with approaches leverage machine learning algorithms
lower complexity [11]. to effectively classify the nature of network traf-
fic, even in scenarios where nodes do not actively
Transmitters Localization cooperate or exchange information, showcasing
An essential insight that a patroller can find while the potential of utilizing cost-effective RF sensing
monitoring a network is the spatial position of its for advanced network analysis.
nodes. This analytical data enables the authori- The approach developed in this work can classi-
ty to pinpoint potential sources of interference. fy different types of user-level applications, namely
By combining location information with other video streaming, web browsing, and chat.
extracted insights, the authority gains a compre- Figure 3c depicts a possible output of the clas-
hensive view that aids in effective interference sification stage and shows a performance compar-
mitigation and network security. ison for different classification techniques, such as
Since some devices can be malicious or use a support vector machines (SVMs), neural networks
technology that does not include a localization pro- (NNs), PCA and kernel principal component
cedure (e.g., Wi-Fi, 2G), the patrol must manage analysis (KPCA), that assess their ability to clas-
both collaborative and non-collaborative localization sify traffic patterns. The classifiers’ performance
to form a comprehensive picture of the RF scene. is evaluated in terms of accuracy, defined as the
Most of the works of the past decade assume fraction of correct classifications, as a function
that the targets can exchange information with of the acquisition time window. As a result, the
the patroller, actively contributing to the local- NN outperforms the other classifiers achieving
ization process. While this approach can be remarkable performance in the presence of prop-
exploited, considering that localization of users is agation impairments and with a short observation
a matter of fact in 5G, and even more so in 6G window (just 30 ms). Even in this context, while
networks, we should also envisage the localiza- simple linear PCA-based classifiers require longer
tion of non-collaborative devices either because observation time to distinguish between classes,
the monitored network does not share this type the NN provides the best performance thanks to
of data or because of the presence of malicious its capability of extracting features from heteroge-
users, which are not willing to be localized [14]. neous data and finding non-linear boundaries.
Authorized licensed use limited to: Universita degli Studi di Bologna. Downloaded on July 15,2024 at 12:10:40 UTC from IEEE Xplore. Restrictions apply.
7 IEEE Wireless Communications • Accepted for Publication
View publication stats