Sensor Localization for Location-Based Authentication Valliappan Annamalai And John Quintero.
-
Upload
jeffrey-wilkerson -
Category
Documents
-
view
212 -
download
0
Transcript of Sensor Localization for Location-Based Authentication Valliappan Annamalai And John Quintero.
![Page 1: Sensor Localization for Location-Based Authentication Valliappan Annamalai And John Quintero.](https://reader036.fdocuments.net/reader036/viewer/2022083009/5697bf761a28abf838c80932/html5/thumbnails/1.jpg)
Sensor Localization for Sensor Localization for Location-Based AuthenticationLocation-Based Authentication
Valliappan AnnamalaiValliappan AnnamalaiAndAnd
John Quintero John Quintero
![Page 2: Sensor Localization for Location-Based Authentication Valliappan Annamalai And John Quintero.](https://reader036.fdocuments.net/reader036/viewer/2022083009/5697bf761a28abf838c80932/html5/thumbnails/2.jpg)
Project GoalsProject Goals
Develop a localization mechanism for Develop a localization mechanism for use in location-based authentication.use in location-based authentication.
Location-based access to computing Location-based access to computing resources.resources.
Focus on determining location Focus on determining location indoors. indoors.
![Page 3: Sensor Localization for Location-Based Authentication Valliappan Annamalai And John Quintero.](https://reader036.fdocuments.net/reader036/viewer/2022083009/5697bf761a28abf838c80932/html5/thumbnails/3.jpg)
ChallengesChallenges
Indoor signal propagation subject to Indoor signal propagation subject to suffers from multipath propagation, suffers from multipath propagation, shadowing and scattering. shadowing and scattering.
Use scene analysis by constructing a Use scene analysis by constructing a signal-strength map of the lab.signal-strength map of the lab.
Antenna orientation and pedestrian Antenna orientation and pedestrian traffic cause local variation in signal traffic cause local variation in signal strength.strength.
![Page 4: Sensor Localization for Location-Based Authentication Valliappan Annamalai And John Quintero.](https://reader036.fdocuments.net/reader036/viewer/2022083009/5697bf761a28abf838c80932/html5/thumbnails/4.jpg)
Project ApplicationsProject Applications
BadgeBadge Base StationBase Station Serial ForwarderSerial Forwarder Tracker SenderTracker Sender Tracker ServerTracker Server
![Page 5: Sensor Localization for Location-Based Authentication Valliappan Annamalai And John Quintero.](https://reader036.fdocuments.net/reader036/viewer/2022083009/5697bf761a28abf838c80932/html5/thumbnails/5.jpg)
Example ArchitectureExample Architecture Six base stations are used to capture signal Six base stations are used to capture signal
strength information from a badge, which is strength information from a badge, which is compared to a pre-compiled mapping.compared to a pre-compiled mapping.• B: badge broadcasts id to establish its location.B: badge broadcasts id to establish its location.• BS: wireless base station captures badge signal BS: wireless base station captures badge signal
strength, forwards to base station.strength, forwards to base station.
BS
B
BSBS
BSBSBS
![Page 6: Sensor Localization for Location-Based Authentication Valliappan Annamalai And John Quintero.](https://reader036.fdocuments.net/reader036/viewer/2022083009/5697bf761a28abf838c80932/html5/thumbnails/6.jpg)
Application MessagingApplication MessagingBadge Base Station Tracker Server
Serial Forwarder
Tracker Sender
W/L MessageWith Bdg ID
Bdg Msg WithBS ID and SignalStrength
Forwards theMessages itReceives
UDP data packets withBS message
W/L MessageWith Bdg ID
1 Sec
One PCSecond PC