
We address the two fundamental problems of spatial field reconstruction and
sensor selection in het erogeneous sensor networks. We consider the case where
two types of sensors are deployed: the first consists of expensive, high
quality sensors; and the second, of cheap low quality sensors, which are
activated only if the intensity of the spatial field exceeds a predefined
activation threshold (eg. wind sensors). In addition, these sensors are powered
by means of energy harvesting and their time varying energy status impacts on
the accuracy of the measurement that may be obtained. We account for this
phenomenon by encoding the energy harvesting process into the second moment
properties of the additive noise, resulting in a spatial heteroscedastic
process. We then address the following two important problems: (i) how to
efficiently perform spatial field reconstruction based on measurements obtained
simultaneously from both networks; and (ii) how to perform query based sensor
set selection with predictive MSE performance guarantee. We first show that the
resulting predictive posterior distribution, which is key in fusing such
disparate observations, involves solving intractable integrals. To overcome
this problem, we solve the first problem by developing a low complexity
algorithm based on the spatial best linear unbiased estimator (SBLUE). Next,
building on the SBLUE, we address the second problem, and develop an efficient
algorithm for query based sensor set selection with performance guarantee. Our
algorithm is based on the Cross Entropy method which solves the combinatorial
optimization problem in an efficient manner. We present a comprehensive study
of the performance gain that can be obtained by augmenting the highquality
sensors with lowquality sensors using both synthetic and real insurance storm
surge database known as the Extreme Wind Storms Catalogue.

We develop a new location spoofing detection algorithm for geospatial
tagging and locationbased services in the Internet of Things (IoT), called
Enhanced Location Spoofing Detection using Audibility (ELSA) which can be
implemented at the backend server without modifying existing legacy IoT
systems. ELSA is based on a statistical decision theory framework and uses
twoway timeofarrival (TWTOA) information between the user's device and the
anchors. In addition to the TWTOA information, ELSA exploits the implicit
available audibility information to improve detection rates of location
spoofing attacks. Given TWTOA and audibility information, we derive the
decision rule for the verification of the device's location, based on the
generalized likelihood ratio test. We develop a practical threat model for
delay measurements spoofing scenarios, and investigate in detail the
performance of ELSA in terms of detection and false alarm rates. Our extensive
simulation results on both synthetic and realworld datasets demonstrate the
superior performance of ELSA compared to conventional nonaudibilityaware
approaches.

With the rise of cheap smallcells in wireless cellular networks, there are
new opportunities for third party providers to service local regions via
sharing arrangements with traditional operators. In fact, such arrangements are
highly desirable for large facilitiessuch as stadiums, universities, and
minesas they already need to cover property costs, and often have fibre
backhaul and efficient power infrastructure. In this paper, we propose a new
network sharing arrangement between large facilities and traditional operators.
Our facility network sharing arrangement consists of two aspects: leasing of
core network access and spectrum from traditional operators; and service
agreements with users. Importantly, our incorporation of a user service
agreement into the arrangement means that resource allocation must account for
financial as well as physical resource constraints. This introduces a new
nontrivial dimension into wireless network resource allocation, which requires
a new evaluation frameworkthe data rate is no longer the only main
performance metric. Moreover, despite clear economic incentives to adopt
network sharing for facilities, a business case is lacking. As such, we develop
a general sociotechnical evaluation framework based on ruintheory, where the
key metric for the sharing arrangement is the probability that the facility has
less than zero revenue surplus. We then use our framework to evaluate our
facility network sharing arrangement, which offers guidance for leasing and
service agreement negotiations, as well as design of the wireless network
architecture, taking into account network revenue streams.

In this paper we address the challenging problem of multiple source
localization in Wireless Sensor Networks (WSN). We develop an efficient
statistical algorithm, based on the novel application of Sequential Monte Carlo
(SMC) sampler methodology, that is able to deal with an unknown number of
sources given quantized data obtained at the fusion center from different
sensors with imperfect wireless channels. We also derive the Posterior
Cram\'erRao Bound (PCRB) of the source location estimate. The PCRB is used to
analyze the accuracy of the proposed SMC sampler algorithm and the impact that
quantization has on the accuracy of location estimates of the sources.
Extensive experiments show that the benefits of the proposed scheme in terms of
the accuracy of the estimation method that are required for model selection
(i.e., the number of sources) and the estimation of the source characteristics
compared to the classical importance sampling method.

In this work we propose and examine Location Verification Systems (LVSs) for
Vehicular Ad Hoc Networks (VANETs) in the realistic setting of Rician fading
channels. In our LVSs, a single authorized Base Station (BS) equipped with
multiple antennas aims to detect a malicious vehicle that is spoofing its
claimed location. We first determine the optimal attack strategy of the
malicious vehicle, which in turn allows us to analyze the optimal LVS
performance as a function of the Rician $K$factor of the channel between the
BS and a legitimate vehicle. Our analysis also allows us to formally prove that
the LVS performance limit is independent of the properties of the channel
between the BS and the malicious vehicle, provided the malicious vehicle's
antenna number is above a specified value. We also investigate how tracking
information on a vehicle quantitatively improves the detection performance of
an LVS, showing how optimal performance is obtained under the assumption of the
tracking length being randomly selected. The work presented here can be readily
extended to multiple BS scenarios, and therefore forms the foundation for all
optimal location authentication schemes within the context of Rician fading
channels. Our study closes important gaps in the current understanding of LVS
performance within the context of VANETs, and will be of practical value to
certificate revocation schemes within IEEE 1609.2.

In this work we examine the performance of a Location Spoofing Detection
System (LSDS) for vehicular networks in the realistic setting of Rician fading
channels. In the LSDS, an authorized Base Station (BS) equipped with multiple
antennas utilizes channel observations to identify a malicious vehicle, also
equipped with multiple antennas, that is spoofing its location. After deriving
the optimal transmit power and the optimal directional beamformer of a
potentially malicious vehicle, robust theoretical analysis and detailed
simulations are conducted in order to determine the impact of key system
parameters on the LSDS performance. Our analysis shows how LSDS performance
increases as the Rician Kfactor of the channel between the BS and legitimate
vehicles increases, or as the number of antennas at the BS or legitimate
vehicle increases. We also obtain the counterintuitive result that the
malicious vehicle's optimal number of antennas conditioned on its optimal
directional beamformer is equal to the legitimate vehicle's number of antennas.
The results we provide here are important for the verification of location
information reported in IEEE 1609.2 safety messages.

The verification of the location information utilized in wireless
communication networks is a subject of growing importance. In this work we
formally analyze, for the first time, the performance of a wireless Location
Verification System (LVS) under the realistic setting of spatially correlated
shadowing. Our analysis illustrates that anticipated levels of correlated
shadowing can lead to a dramatic performance improvement of a Received Signal
Strength (RSS)based LVS. We also analyze the performance of an LVS that
utilizes Differential Received Signal Strength (DRSS), formally proving the
rather counterintuitive result that a DRSSbased LVS has identical performance
to that of an RSSbased LVS, for all levels of correlated shadowing. Even more
surprisingly, the identical performance of RSS and DRSSbased LVSs is found to
hold even when the adversary does not optimize his true location. Only in the
case where the adversary does not optimize all variables under her control, do
we find the performance of an RSSbased LVS to be better than a DRSSbased LVS.
The results reported here are important for a wide range of emerging wireless
communication applications whose proper functioning depends on the authenticity
of the location information reported by a transceiver.

We develop a new Location Verification System (LVS) focussed on networkbased
Intelligent Transport Systems and vehicular ad hoc networks. The algorithm we
develop is based on an informationtheoretic framework which uses the received
signal strength (RSS) from a network of basestations and the claimed position.
Based on this information we derive the optimal decision regarding the
verification of the user's location. Our algorithm is optimal in the sense of
maximizing the mutual information between its input and output data. Our
approach is based on the practical scenario in which a noncolluding malicious
user some distance from a highway optimally boosts his transmit power in an
attempt to fool the LVS that he is on the highway. We develop a practical
threat model for this attack scenario, and investigate in detail the
performance of the LVS in terms of its input/output mutual information. We show
how our LVS decision rule can be implemented straightforwardly with a
performance that delivers nearoptimality under realistic threat conditions,
with informationtheoretic optimality approached as the malicious user moves
further from the highway. The practical advantages our new
informationtheoretic scheme delivers relative to more traditional Bayesian
verification frameworks are discussed.

A general stochastic model is developed for the total interference in
wideband systems, denoted as the PNSC(alpha) Interference Model. It allows one
to obtain, analytic representations in situations where (a) interferers are
distributed according to either a homogeneous or an inhomogeneous in time or
space Cox point process and (b) when the frequency bands occupied by each of
the unknown number of interferers is also a random variable in the allowable
bandwidth. The analytic representations obtained are generalizations of Cox
processes to the family of subexponential models characterized by
distributions from the alphastable family. We develop general parametric
density representations for the interference models via doubly stochastic
Poisson mixture representations of Scaled Mixture of Normal's via the
NormalStable variance mixture. To illustrate members of this class of
interference model we also develop two special cases for a moderately impulsive
interference (alpha=3/2) and a highly impulsive interference (alpha=2/3) where
closed form representations can be obtained either by the SMiN representation
or via function expansions based on the Holtsmark distribution or Whittaker
functions. To illustrate the paper we propose expressions for the Capacity of a
BPSK system under a PNSC(alpha) interference, via analytic expressions for the
Likelihood Ratio Test statistic.

As locationbased applications become ubiquitous in emerging wireless
networks, Location Verification Systems (LVS) are of growing importance. In
this paper we propose, for the first time, a rigorous informationtheoretic
framework for an LVS. The theoretical framework we develop illustrates how the
threshold used in the detection of a spoofed location can be optimized in terms
of the mutual information between the input and output data of the LVS. In
order to verify the legitimacy of our analytical framework we have carried out
detailed numerical simulations. Our simulations mimic the practical scenario
where a system deployed using our framework must make a binary Yes/No
"malicious decision" to each snapshot of the signal strength values obtained by
base stations. The comparison between simulation and analysis shows excellent
agreement. Our optimized LVS framework provides a defence against location
spoofing attacks in emerging wireless networks such as those envisioned for
Intelligent Transport Systems, where verification of location information is of
paramount importance.

We present a flexible stochastic model for a class of cooperative wireless
relay networks, in which the relay processing functionality is not known at the
destination. In addressing this problem we develop efficient algorithms to
perform relay identification in a wireless relay network. We first construct a
statistical model based on a representation of the system using Gaussian
Processes in a nonstandard manner due to the way we treat the imperfect
channel state information. We then formulate the estimation problem to perform
system identification, taking into account complexity and computational
efficiency. Next we develop a set of three algorithms to solve the
identification problem each of decreasing complexity, tradingoff the
estimation bias for computational efficiency. The joint optimisation problem is
tackled via a Bayesian framework using the Iterated Conditioning on the Modes
methodology. We develop a lower bound and several suboptimal computationally
efficient solutions to the identification problem, for comparison. We
illustrate the estimation performance of our methodology for a range of widely
used relay functionalities. The relative total error attained by our algorithm
when compared to the lower bound is found to be at worst 9% for low SNR values
under all functions considered. The effect of the relay functional estimation
error is also studied via BER simulations and is shown to be less than 2dB
worse than the lower bound.

We develop a framework for spectrum sensing in cooperative
amplifyandforward cognitive radio networks. We consider a stochastic model
where relays are assigned in cognitive radio networks to transmit the primary
user's signal to a cognitive Secondary Base Station (SBS). We develop the
Bayesian optimal decision rule under various scenarios of Channel State
Information (CSI) varying from perfect to imperfect CSI. In order to obtain the
optimal decision rule based on a Likelihood Ratio Test (LRT), the marginal
likelihood under each hypothesis relating to presence or absence of
transmission needs to be evaluated pointwise. However, in some cases the
evaluation of the LRT can not be performed analytically due to the
intractability of the multidimensional integrals involved. In other cases, the
distribution of the test statistic can not be obtained exactly. To circumvent
these difficulties we design two algorithms to approximate the marginal
likelihood, and obtain the decision rule. The first is based on Gaussian
Approximation where we quantify the accuracy of the approximation via a
multivariate version of the BerryEsseen bound. The second algorithm is based
on Laplace approximation for the marginal likelihood, which results in a
nonconvex optimisation problem which is solved efficiently via Bayesian
ExpectationMaximisation method. We also utilise a Laguerre series expansion to
approximate the distribution of the test statistic in cases where its
distribution can not be derived exactly. Performance is evaluated via analytic
bounds and compared to numerical simulations.

We develop an efficient algorithm for cooperative spectrum sensing in a relay
based cognitive radio network. We consider a stochastic model where data is
sent from the Base Station (BS) of the Primary User (PU). The data is relayed
by the Secondary Users (SU) to the SU BS. The SU BS has only partial CSI
knowledge of the wireless channels. In order to obtain the optimal decision
rule based on Likelihood Ratio Test (LRT), the marginal likelihood under each
hypothesis needs to be evaluated pointwise. These, however, cannot be obtained
analytically due to the intractability of the integrals. Instead, we
approximate these quantities by utilising the Laplace method. Performance is
evaluated via numerical simulations and it is shown that the proposed spectrum
sensing scheme can achieve superior results to the energy detection scheme.

This paper deals with the challenging problem of spectrum sensing in
cognitive radio. We consider a stochastic system model where the the Primary
User (PU) transmits a periodic signal over fading channels. The effect of
frequency offsets due to oscillator mismatch, and Doppler offset is studied. We
show that for this case the Likelihood Ratio Test (LRT) cannot be evaluated
poitnwise. We present a novel approach to approximate the marginilisation of
the frequency offset using a single point estimate. This is obtained via a low
complexity Constrained Adaptive Notch Filter (CANF) to estimate the frequency
offset. Performance is evaluated via numerical simulations and it is shown that
the proposed spectrum sensing scheme can achieve the same performance as the
nearoptimal scheme, that is based on a bank of matched filters, using only a
fraction of the complexity required.

This paper presents a new approach for channel tracking and parameter
estimation in cooperative wireless relay networks. We consider a system with
multiple relay nodes operating under an amplify and forward relay function. We
develop a novel algorithm to efficiently solve the challenging problem of joint
channel tracking and parameters estimation of the Jakes' system model within a
mobile wireless relay network. This is based on \textit{particle Markov chain
Monte Carlo} (PMCMC) method. In particular, it first involves developing a
Bayesian state space model, then estimating the associated high dimensional
posterior using an adaptive Markov chain Monte Carlo (MCMC) sampler relying on
a proposal built using a RaoBlackwellised Sequential Monte Carlo (SMC) filter.

This paper presents a general stochastic model developed for a class of
cooperative wireless relay networks, in which imperfect knowledge of the
channel state information at the destination node is assumed. The framework
incorporates multiple relay nodes operating under general known nonlinear
processing functions. When a nonlinear relay function is considered, the
likelihood function is generally intractable resulting in the maximum
likelihood and the maximum a posteriori detectors not admitting closed form
solutions. We illustrate our methodology to overcome this intractability under
the example of a popular optimal nonlinear relay function choice and
demonstrate how our algorithms are capable of solving the previously
intractable detection problem. Overcoming this intractability involves
development of specialised Bayesian models. We develop three novel algorithms
to perform detection for this Bayesian model, these include a Markov chain
Monte Carlo Approximate Bayesian Computation (MCMCABC) approach; an Auxiliary
Variable MCMC (MCMCAV) approach; and a Suboptimal Exhaustive Search Zero
Forcing (SESZF) approach. Finally, numerical examples comparing the symbol
error rate (SER) performance versus signal to noise ratio (SNR) of the three
detection algorithms are studied in simulated examples.