Ulf Wetzker’s research while affiliated with Fraunhofer Institute for Integrated Circuits IIS, Division Engineering of Adaptive Systems EAS and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (23)


Exploratory Data Analysis of Time Series Using Pre-segmented Clustering
  • Chapter

December 2024

·

3 Reads

·

Zihao Huang

·

Anna Richter

·

[...]

·

Time series clustering is an unsupervised method of organizing homogeneous time series in groups based on certain similarity criteria. As a result, it can be an essential step in Exploratory Data Analysis (EDA), especially for complex time series data. This applies specifically to industrial datasets for applications like predictive maintenance, energy consumption, etc., due to the heterogeneity and peculiarity of collected data sets. Understanding the underlying trends and patterns in such datasets could help strategize advanced analysis methods such as forecasting, regression testing, etc. In this paper, we present a case study on a real-world energy consumption dataset of 4G cells, where we perform a pre-segmented clustering based EDA to uncover hidden insights about the data. The empirical study demonstrates that performing pre-segmented clustering based EDA enhances data interpretation by revealing prevalent and infrequent patterns, empowering users to refine analyses such as prediction more precisely, leading to performance improvement.


AI-assisted Condition Monitoring and Failure Analysis for Industrial Wireless Systems
  • Chapter
  • Full-text available

July 2024

·

8 Reads

·

1 Citation

With the increasing proliferation of wireless devices and Internet-of- Things (IoT) applications in various fields, such as patient monitoring, vehicle-to everything (V2X) communication and industrial automation, there is a growing significance in developing robust methods and tools for evaluating and predicting link quality, monitoring information flow, as well as conducting failure analysis. This is particularly important in safety-critical industrial IoT (IIoT) environments such as smart factories, where challenging signal propagation conditions and interference from coexisting wireless technologies can severely impact network performance and application reliability. This contribution provides a comprehensive analysis of coexistence issues in industrial IIoT networks and highlights the complexities and challenges associated with performing failure analysis on a large scale. The necessity of using data-driven methods in the development of efficient and user-friendly failure analysis systems is discussed and the challenges regarding required datasets are highlighted.

Download


Figure 1: Concept of imputation: a) matrix-view and b) single-feature-view on MTS imputation.
Figure 2: graphical representation of the applied research strategy for this survey, where numbers inside arrows represent the number of publications left after the respective procedure.
Figure 4: Timeline of all models presented in this survey.
Figure 5: Multivariate Time Series -Generative Adversarial Network (MTS-GAN) proposed by Guo et al. [66]
Figure 6: Traffic Sensor Imputation Generative Adversarial Network (TSDIGAN) proposed by Huang et al. [36]

+7

A Survey on Multivariate Time Series Imputation Using Adversarial Learning

January 2024

·

29 Reads

IEEE Access

Multivariate time series (MTS) are captured in a great variety of real-world applications. However, analysing and modeling the data for classification and forecasting purposes can become very challenging if values are missing in the data set. The need for imputation methods, to fill the gaps in MTS, is well known. Thus, a great variaty of algorithms for solving this task has been proposed in the literature. However, the research community is constantly working on the development of advanced algorithms, that fulfill the special requirements of multidimensional temporal data, since most of the existing imputation methods treat MTS as ordinary structured data and fail to model the temporal relationships within and between sequences of observations. The main emphasis of MTS imputation research is currently put on deep learning (DL) models, especially those making use of generative adversarial networks (GANs). In our survey, we present our categorization of imputation algorithms, especially of GAN-models. We included eighteen different GAN-models designed for the MTS imputation task, which we introduce in detail. We provide a comparison of the models including their performance regarding MTS imputation, based on our findings in the literature. The following points can be considered the most important findings from our survey: The research on GAN-based imputation models for MTS has gained momentum in the last years across different domains, therewhile showing the effectiveness of these methods. The latest trend in the research area is the incorporation of attention mechanisms into the algorithms. Nevertheless, there are open research challenges, e.g. the transferability of models across data sets from different domains.


FIGURE 2. Registration phase.
FIGURE 3. Authentication phase.
FIGURE 4. Network model showing network entities, their capabilities, attacker's objective, and system setup used in SAP.
Figure 5(c) and 5(d) represent the Scyther execution results of the proposed protocol, which shows that no attack has been found in the protocol. Hence, the proposed protocol is secure from the network attacks.
FIGURE 6. Simulation setup for the proposed protocol.
SAP: A Secure Low-latency Protocol for Mitigating High Computation Overhead in WI-FI Networks

August 2023

·

62 Reads

p> The increase in popularity of wireless networks in industrial, embedded, medical and public sectors has made them an appealing attack surface for attackers who exploit the vulnerabilities in network protocols to launch attacks such as Evil Twin, Man-in-the-middle, sniffing, etc ., which may result in economic and non-economic losses. To protect wireless networks against such attacks, IEEE 802.11 keep updating the protocol standards with new and more secure versions. There has always been a direct correlation between attacks and the improvement of protocol standards. As the sophistication of attacks increases, protocol standards tend to move towards higher security, resulting in a significant rise in both latency and computational overhead, and severe degradation in the performance of low-latency applications such as Industrial Internet of Things ( IIoT ), automotive, robotics, etc . In this paper, we make the first attempt to highlight the importance of both latency and security in wireless networks from implementation and performance perspective. We make a review of existing IEEE 802.11 protocols in terms of security offered and overhead incurred to substantiate the fact that there is a need of a protocol which in addition to providing optimum security against attacks also maintains the latency and overhead. We also propose a secure and low-latency protocol known as Secure Authentication Protocol (SAP) which operates in two phases - registration and authentication, where the first phase is a one time process implemented using asymmetric cryptography and the second phase is implemented using symmetric cryptography. The protocol is structured in a way that it maintains the original structure of IEEE 802.11 protocols and performs both phases using fewer messages than existing protocols. By simulating the protocol using well-established OMNeT ++ simulator, we proved that the proposed protocol incurs a low computation overhead, making it ideal for low-latency applications. We extensively verified the security properties of the proposed protocol using formal verification through widely-accepted Scyther tool. Finally, we perform a comparative analysis of SAP with existing IEEE 802.11 wireless network protocols to highlight the improvement.</p


FIGURE 3. Network model showing Network entities, their capabilities, attacker's objective and system setup used in SAP.
Figure 4(a) and 4(b) represent the spdl scripts of registration and authentication phase of the proposed protocol, respectively. In Figure 4(b), the authentication phase represents the script used in reauthentication, where mk is replaced with k(C, AP) as in reauthentication phase mk acts as a symmetric key shared between client and AP.
FIGURE 5. Simulation setup for the proposed protocol.
FIGURE 6. Packet Size.
Timing Analysis
SAP: A Secure Low-latency Protocol for Mitigating High Computation Overhead in WI-FI Networks

April 2023

·

49 Reads

p> The increase in popularity of wireless networks in industrial, embedded, medical and public sectors has made them an appealing attack surface for attackers who exploit the vulnerabilities in network protocols to launch attacks such as Evil Twin, Man-in-the-middle, sniffing, etc ., which may result in economic and non-economic losses. To protect wireless networks against such attacks, IEEE 802.11 keep updating the protocol standards with new and more secure versions. There has always been a direct correlation between attacks and the improvement of protocol standards. As the sophistication of attacks increases, protocol standards tend to move towards higher security, resulting in a significant rise in both latency and computational overhead, and severe degradation in the performance of low-latency applications such as Industrial Internet of Things ( IIoT ), automotive, robotics, etc . In this paper, we make the first attempt to highlight the importance of both latency and security in wireless networks from implementation and performance perspective. We make a review of existing IEEE 802.11 protocols in terms of security offered and overhead incurred to substantiate the fact that there is a need of a protocol which in addition to providing optimum security against attacks also maintains the latency and overhead. We also propose a secure and low-latency protocol known as Secure Authentication Protocol (SAP) which operates in two phases - registration and authentication, where the first phase is a one time process implemented using asymmetric cryptography and the second phase is implemented using symmetric cryptography. The protocol is structured in a way that it maintains the original structure of IEEE 802.11 protocols and performs both phases using fewer messages than existing protocols. By simulating the protocol using well-established OMNeT ++ simulator, we proved that the proposed protocol incurs a low computation overhead, making it ideal for low-latency applications. We extensively verified the security properties of the proposed protocol using formal verification through widely-accepted Scyther tool. Finally, we perform a comparative analysis of SAP with existing IEEE 802.11 wireless network protocols to highlight the improvement.</p


FIGURE 1. Overview of the proposed protocol.
FIGURE 6. Simulation setup for the proposed protocol.
FIGURE 7. Packet Size. packet sizes of frames under SAP and default open network INET implementation during registration and authentication phases is approximately 71B and 35B. We agree that the dierence is not negligible, but if the trade-o between security oered by SAP in open networks and the packet sizes is considered, the dierence can be ignored.
Notations with their descriptions used in the verification of the proposed protocol using Scyther
Running time for primitive cryptographic operations
SAP: A Secure Low-latency Protocol for Mitigating High Computation Overhead in WI-FI Networks

January 2023

·

67 Reads

·

1 Citation

IEEE Access

The increase in popularity of wireless networks in industrial, embedded, medical and public sectors has made them an appealing attack surface for attackers who exploit the vulnerabilities in network protocols to launch attacks such as Evil Twin, Man-in-the-middle, sniffing, etc., which may result in economic and non-economic losses. To protect wireless networks against such attacks, IEEE 802.11 keep updating the protocol standards with new and more secure versions. There has always been a direct correlation between attacks and the improvement of protocol standards. As the sophistication of attacks increases, protocol standards tend to move towards higher security, resulting in a significant rise in both latency and computational overhead, and severe degradation in the performance of low-latency applications such as Industrial Internet of Things (IIoT), automotive, robotics, etc. In this paper, we make an attempt to highlight the importance of both latency and security in wireless networks from implementation and performance perspective. We make a review of existing IEEE 802.11 protocols in terms of security offered and overhead incurred to substantiate the fact that there is a need of a protocol which in addition to providing optimum security against attacks also maintains the latency and overhead. We also propose a secure and low-latency protocol known as Secure Authentication Protocol (SAP) which operates in two phases - registration and authentication, where the first phase is a one time process implemented using asymmetric cryptography and the second phase is implemented using symmetric cryptography. The protocol is structured in a way that it maintains the original structure of IEEE 802.11 protocols and performs both phases using fewer messages than existing protocols. By simulating the protocol using well-established OMNeT++ simulator, we proved that the proposed protocol incurs a low computation overhead, making it ideal for low-latency applications. We extensively verified the security properties of the proposed protocol using formal verification through widely-accepted Scyther tool. Finally, we perform a comparative analysis of SAP with existing IEEE 802.11 wireless network protocols to highlight the improvement.


FIGURE 5. Box plot comparing the F1-scores obtained from basic DTW, ADTW and VADTW methods at various frame drop percentages.
FIGURE 6. Number of comparisons made by various approaches to find warp path -(a) basic DTW, (b) ADTW and (c) VADTW. VOLUME 10, 2022
Robustness scores obtained for synchronization using VADTW in different real-world setups
A Dynamic Time Warping Based Method to Synchronize Spectral and Protocol Domains for Troubleshooting Wireless Communication

January 2023

·

33 Reads

·

6 Citations

IEEE Access

An increase in popularity of wireless networks, mainly in industrial automation and manufacturing has escalated the need of reliable wireless networks. One subtle way of achieving reliability is early diagnosis of transmission failures and taking preventive measures against it. However, it is difficult to achieve as these failures mainly arise by challenging signal propagation conditions and interference from co-existing networks, which is hard to diagnose. This leads to Quality-of-service degradation and faulty applications which may result in system breakdown and financial distress. In this paper, we propose a novel Dynamic Time Warping (DTW) based method known as Variable Adaptive DTW (VADTW) for synchronizing spectral and protocol domains to obtain precise and complete information about collisions and co-existing links causing interference and further utilize it for troubleshooting. VADTW divides the spectral and protocol sequences in adaptive time bins and calculates variable window limits for each frame to perform synchronization. To prove the efficiency of the proposed approach, we tested it in a Wi-Fi network as a proof-of-concept. The experiments are performed with real-time data traffic captured in different scenarios. VADTW successfully synchronizes sequences even with a frame loss ratio of 50% in both cases. We also perform comparative analysis of VADTW with other DTW based approaches on the basis of performance, computational cost and execution time.


Spectrogram Data Set for Deep-Learning-Based RF Frame Detection

November 2022

·

537 Reads

·

7 Citations

Automated spectrum analysis serves as a troubleshooting tool that helps to diagnose faults in wireless networks such as difficult signal propagation conditions and coexisting wireless networks. It provides a higher monitoring coverage while requiring less expertise compared with manual spectrum analysis. In this paper, we introduce a data set that can be used to train and evaluate deep learning models, capable of detecting frames from different wireless standards as well as interference between single frames. Since manually labeling a high variety of frames in different environments is too challenging, an artificial data generation pipeline was developed. The data set consists of 20,000 augmented signal segments, each containing a random number of different Wi-Fi and Bluetooth frames, their spectral image representations and labels that describe the position and type of frame within the spectrogram. The data set contains results of intermediate processing steps that enable the research or teaching community to create new data sets for specific requirements or to provide new interesting examination examples.


Figure 1: Generative Adversarial Network, proposed by Goodfellow et al. [31]
Figure 2: Multivariate Time Series -Generative Adversarial Network (MTS-GAN) proposed by Guo et al. [60]
Figure 3: Traffic Sensor Imputation Generative Adversarial Network (TSDIGAN) proposed by Huang et al. [35]
Figure 6: Divide-and-conquer strategy in Non-autoregressive Multiresolution Sequence Imputation (NAOMI), proposed by Liu et al. [39]
Figure 9: GLOW and GAN fur Multivariate Time Series Imputation (GlowImp), proposed by Liu et al. [37]
Multivariate Time Series Imputation: A Survey on available Methods with a Focus on hybrid GANs

November 2022

·

119 Reads

p>Multivariate time series (MTS) are captured in a great variety of real-world applications. However, analysing and modelling the data for classification and forecasting purposes can become very challenging if values are missing in the data set. The need for imputation methods, to fill the gaps in MTS, is well known. Thus, a great variaty of algorithms for solving this task has been proposed in the literature. However, research community is constantly working on the development of advanced algorithms, that fulfill the special requirements of multidimensional temporal data, since most of the existing imputation methods treat MTS as ordinary structured data and fail to model the temporal relationships within and between sequences of observations. The main emphasis of MTS imputation research is currently put on deep learning (DL) models, especially models making use of generative adversarial networks (GANs). In our survey, we present a general categorization of imputation algorithms and introduce groups of hybrid GAN-models used for the MTS imputation task, which we investigate and discuss in detail. A quantitative comparison of the hybrid GANs’ performance regarding MTS imputation is presented based on our findings in the literature. </p


Citations (11)


... adequately represent the features needed for detailed signal analysis [3]. Moreover, 5G systems are extremely complex, with a high density of devices and dynamic variability in channel conditions, which requires continuous adaptive capabilities [4]. In such scenarios, it is critical to have real data collected directly in the field to capture the variability and specific challenges associated with the operational context. ...

Reference:

RadioDL: Deep Learning-Based Signal Intelligence of IQ Captures
AI-assisted Condition Monitoring and Failure Analysis for Industrial Wireless Systems

... When applying models trained through transfer learning based on data collected from large-scale power plants to smallscale power generation systems, DTW can play an important role in compensating for temporal variability [41]. For example, in situations in which power generation may vary by time of day, DTW can help transfer learning models to maintain high forecast accuracy in different environments by handling temporal distortions [42]. ...

A Dynamic Time Warping Based Method to Synchronize Spectral and Protocol Domains for Troubleshooting Wireless Communication

IEEE Access

... There are several spectrogram datasets developed for RF signal detection and classification applications. In [8] the spectrogram dataset was used to train deep learning models to identify frames of Wi-Fi and Bluetooth signals, and to detect collisions between these signals. This dataset was generated by combining real data acquired using a software defined radio (SDR) and signals synthesized using a signal generator. ...

Spectrogram Data Set for Deep-Learning-Based RF Frame Detection

... If the absence of a sample within a sequence is considered abnormal behavior, data-driven methods such as autoencoders (AEs) can be used to determine the number of missing samples [13]. To implement this approach, COTS hardware can be used to capture the wireless frames. ...

Autoencoder-Based Characterisation of Passive IEEE 802.11 Link Level Measurements
  • Citing Conference Paper
  • June 2021

... and actuators [5][6][7][8]. The usage of smart wireless sensors especially offers a lot of potential for industrial manufacturing, for example, in the context of condition monitoring, process monitoring, and control [9][10][11][12]. ...

Wireless Control for Smart Manufacturing: Recent Approaches and Open Challenges

Proceedings of the IEEE

... Wireless network coordination and control was examined by (5) . Authors highlight the main technical challenges to reduce the gap between industry and smart manufacturing using real-world use scenarios. ...

Wireless Control for Smart Manufacturing: Recent Approaches and Open Challenges

... So far, the community has mostly focused on building prototypes showcasing the ability of carrying out CTC between diverse wireless standards and on highlighting potential applications [2], [8], [17]. Such proof-of-concepts are typically implemented using powerful software-defined radios [11], [12], [18] or hacked on specific hardware (HW) platforms [13], [19] and hardly describe any implementation detail. As the interest in CTC grows, there is a need to move away from feasibility studies in favour of general CTC solutions supporting multiple HW platforms by design. ...

Demo: Cross-Technology Communication between BLE and Wi-Fi using Commodity Hardware

... Since it is usually not possible to store data in large quantities on the embedded hardware of the network nodes, and the required effort for collecting and merging the resulting data is rather high, passive monitoring systems are used in the majority of all cases. In passive data capture, a dedicated monitoring node records all frames that are sent within reception range of the node [17]. This method is used often, since no special requirements are imposed on the network nodes and only the hardware and software of the monitoring node have to be extended accordingly. ...

Troubleshooting Wireless Coexistence Problems in the Industrial Internet of Things

... Due to the increasing popularity of wireless communications, users are encountering interference problems more frequently. Controversially, more applications with high Quality of Service (QoS) and reliability requirements are being deployed that are affected by interference [8]. Due to the complexity of a network failure analysis, experts are increasingly needed for the prevention and elimination of particular costly or safety-critical failures. ...

Requirements and current solutions of wireless communication in industrial automation