Timing-Based Localization using Multipath Information

Timing-Based Localization using Multipath Information PDF Author: Andreas Bergström
Publisher: Linköping University Electronic Press
ISBN: 9179299172
Category :
Languages : en
Pages : 119

Get Book

Book Description
The measurements of radio signals are commonly used for localization purposes where the goal is to determine the spatial position of one or multiple objects. In realistic scenarios, any transmitted radio signal will be affected by the environment through reflections, diffraction at edges and corners etc. This causes a phenomenon known as multipath propagation, by which multiple instances of the transmitted signal having traversed different paths are heard by the receiver. These are known as Multi-Path Components (MPCs). The direct path (DP) between transmitter and receiver may also be occluded, causing what is referred to as non-Line-of-Sight (non-LOS) conditions. As a consequence of these effects, the estimated position of the object(s) may often be erroneous. This thesis focuses on how to achieve better localization accuracy by accounting for the above-mentioned multipath propagation and non-LOS effects. It is proposed how to mitigate these in the context of positioning based on estimation of the DP between transmitter and receiver. It is also proposed how to constructively utilize the additional information about the environment which they implicitly provide. This is all done in a framework wherein a given signal model and a map of the surroundings are used to build a mathematical model of the radio environment, from which the resulting MPCs are estimated. First, methods to mitigate the adverse effects of multipath propagation and non-LOS conditions for positioning based on estimation of the DP between transmitter and receiver are presented. This is initially done by using robust statistical measurement error models based on aggregated error statistics, where significant improvements are obtained without the need to provide detailed received signal information. The gains are seen to be even larger with up-to-date real-time information based on the estimated MPCs. Second, the association of the estimated MPCs with the signal paths predicted by the environmental model is addressed. This leads to a combinatorial problem which is approached with tools from multi-target tracking theory. A rich radio environment in terms of many MPCs gives better localization accuracy but causes the problem size to grow large—something which can be remedied by excluding less probable paths. Simulations indicate that in such environments, the single best association hypothesis may be a reasonable approximation which avoids the calculation of a vast number of possible hypotheses. Accounting for erroneous measurements is crucial but may have drawbacks if no such are occurring. Finally, theoretical localization performance bounds when utilizing all or a subset of the available MPCs are derived. A rich radio environment allows for good positioning accuracy using only a few transmitters/receivers, assuming that these are used in the localization process. In contrast, in a less rich environment where basically only the DP/LOS components are measurable, more transmitters/receivers and/or the combination of downlink and uplink measurements are required to achieve the same accuracy. The receiver’s capability of distinguishing between multiple MPCs arriving approximately at the same time also affects the localization accuracy.

Timing-Based Localization using Multipath Information

Timing-Based Localization using Multipath Information PDF Author: Andreas Bergström
Publisher: Linköping University Electronic Press
ISBN: 9179299172
Category :
Languages : en
Pages : 119

Get Book

Book Description
The measurements of radio signals are commonly used for localization purposes where the goal is to determine the spatial position of one or multiple objects. In realistic scenarios, any transmitted radio signal will be affected by the environment through reflections, diffraction at edges and corners etc. This causes a phenomenon known as multipath propagation, by which multiple instances of the transmitted signal having traversed different paths are heard by the receiver. These are known as Multi-Path Components (MPCs). The direct path (DP) between transmitter and receiver may also be occluded, causing what is referred to as non-Line-of-Sight (non-LOS) conditions. As a consequence of these effects, the estimated position of the object(s) may often be erroneous. This thesis focuses on how to achieve better localization accuracy by accounting for the above-mentioned multipath propagation and non-LOS effects. It is proposed how to mitigate these in the context of positioning based on estimation of the DP between transmitter and receiver. It is also proposed how to constructively utilize the additional information about the environment which they implicitly provide. This is all done in a framework wherein a given signal model and a map of the surroundings are used to build a mathematical model of the radio environment, from which the resulting MPCs are estimated. First, methods to mitigate the adverse effects of multipath propagation and non-LOS conditions for positioning based on estimation of the DP between transmitter and receiver are presented. This is initially done by using robust statistical measurement error models based on aggregated error statistics, where significant improvements are obtained without the need to provide detailed received signal information. The gains are seen to be even larger with up-to-date real-time information based on the estimated MPCs. Second, the association of the estimated MPCs with the signal paths predicted by the environmental model is addressed. This leads to a combinatorial problem which is approached with tools from multi-target tracking theory. A rich radio environment in terms of many MPCs gives better localization accuracy but causes the problem size to grow large—something which can be remedied by excluding less probable paths. Simulations indicate that in such environments, the single best association hypothesis may be a reasonable approximation which avoids the calculation of a vast number of possible hypotheses. Accounting for erroneous measurements is crucial but may have drawbacks if no such are occurring. Finally, theoretical localization performance bounds when utilizing all or a subset of the available MPCs are derived. A rich radio environment allows for good positioning accuracy using only a few transmitters/receivers, assuming that these are used in the localization process. In contrast, in a less rich environment where basically only the DP/LOS components are measurable, more transmitters/receivers and/or the combination of downlink and uplink measurements are required to achieve the same accuracy. The receiver’s capability of distinguishing between multiple MPCs arriving approximately at the same time also affects the localization accuracy.

Decentralized Estimation Using Conservative Information Extraction

Decentralized Estimation Using Conservative Information Extraction PDF Author: Robin Forsling
Publisher: Linköping University Electronic Press
ISBN: 9179297242
Category :
Languages : en
Pages : 110

Get Book

Book Description
Sensor networks consist of sensors (e.g., radar and cameras) and processing units (e.g., estimators), where in the former information extraction occurs and in the latter estimates are formed. In decentralized estimation information extracted by sensors has been pre-processed at an intermediate processing unit prior to arriving at an estimator. Pre-processing of information allows for the complexity of large systems and systems-of-systems to be significantly reduced, and also makes the sensor network robust and flexible. One of the main disadvantages of pre-processing information is that information becomes correlated. These correlations, if not handled carefully, potentially lead to underestimated uncertainties about the calculated estimates. In conservative estimation the unknown correlations are handled by ensuring that the uncertainty about an estimate is not underestimated. If this is ensured the estimate is said to be conservative. Neglecting correlations means information is double counted which in worst case implies diverging estimates with fatal consequences. While ensuring conservative estimates is the main goal, it is desirable for a conservative estimator, as for any estimator, to provide an error covariance which is as small as possible. Application areas where conservative estimation is relevant are setups where multiple agents cooperate to accomplish a common objective, e.g., target tracking, surveillance and air policing. The first part of this thesis deals with theoretical matters where the conservative linear unbiased estimation problem is formalized. This part proposes an extension of classical linear estimation theory to the conservative estimation problem. The conservative linear unbiased estimator (CLUE) is suggested as a robust and practical alternative for estimation problems where the correlations are unknown. Optimality criteria for the CLUE are provided and further investigated. It is shown that finding an optimal CLUE is more complicated than finding an optimal linear unbiased estimator in the classical version of the problem. To simplify the problem, a CLUE that is optimal under certain restrictions will also be investigated. The latter is named restricted best CLUE. An important result is a theorem that gives a closed form solution to a restricted best CLUE. Furthermore, several conservative estimation methods are described followed by an analysis of their properties. The methods are shown to be conservative and optimal under different assumptions about the underlying correlations. The second part of the thesis focuses on practical aspects of the conservative approach to decentralized estimation in configurations where the communication channel is constrained. The diagonal covariance approximation is proposed as a data reduction technique that complies with the communication constraints and if handled correctly can be shown to preserve conservative estimates. Several information selection methods are derived that can reduce the amount of data being transmitted in the communication channel. Using the information selection methods it is possible to decide what information other actors of the sensor network find useful.

On Complexity Certification of Active-Set QP Methods with Applications to Linear MPC

On Complexity Certification of Active-Set QP Methods with Applications to Linear MPC PDF Author: Daniel Arnström
Publisher: Linköping University Electronic Press
ISBN: 9179296920
Category :
Languages : en
Pages : 45

Get Book

Book Description
In model predictive control (MPC) an optimization problem has to be solved at each time step, which in real-time applications makes it important to solve these efficiently and to have good upper bounds on worst-case solution time. Often for linear MPC problems, the optimization problem in question is a quadratic program (QP) that depends on parameters such as system states and reference signals. A popular class of methods for solving such QPs is active-set methods, where a sequence of linear systems of equations is solved. The primary contribution of this thesis is a method which determines which sequence of subproblems a popular class of such active-set algorithms need to solve, for every possible QP instance that might arise from a given linear MPC problem (i.e, for every possible state and reference signal). By knowing these sequences, worst-case bounds on how many iterations, floating-point operations and, ultimately, the maximum solution time, these active-set algorithms require to compute a solution can be determined, which is of importance when, e.g, linear MPC is used in safety-critical applications. After establishing this complexity certification method, its applicability is extended by showing how it can be used indirectly to certify the complexity of another, efficient, type of active-set QP algorithm which reformulates the QP as a nonnegative least-squares method. Finally, the proposed complexity certification method is extended further to situations when enhancements to the active-set algorithms are used, namely, when they are terminated early (to save computations) and when outer proximal-point iterations are performed (to improve numerical stability).

Uncertainties in Neural Networks

Uncertainties in Neural Networks PDF Author: Magnus Malmström
Publisher: Linköping University Electronic Press
ISBN: 9179296807
Category :
Languages : en
Pages : 103

Get Book

Book Description
In science, technology, and engineering, creating models of the environment to predict future events has always been a key component. The models could be everything from how the friction of a tire depends on the wheels slip to how a pathogen is spread throughout society. As more data becomes available, the use of data-driven black-box models becomes more attractive. In many areas they have shown promising results, but for them to be used widespread in safety-critical applications such as autonomous driving some notion of uncertainty in the prediction is required. An example of such a black-box model is neural networks (NNs). This thesis aims to increase the usefulness of NNs by presenting an method where uncertainty in the prediction is obtained by linearization of the model. In system identification and sensor fusion, under the condition that the model structure is identifiable, this is a commonly used approach to get uncertainty in the prediction from a nonlinear model. If the model structure is not identifiable, such as for NNs, the ambiguities that cause this have to be taken care of in order to make the approach applicable. This is handled in the first part of the thesis where NNs are analyzed from a system identification perspective, and sources of uncertainty are discussed. Another problem with data-driven black-box models is that it is difficult to know how flexible the model needs to be in order to correctly model the true system. One solution to this problem is to use a model that is more flexible than necessary to make sure that the model is flexible enough. But how would that extra flexibility affect the uncertainty in the prediction? This is handled in the later part of the thesis where it is shown that the uncertainty in the prediction is bounded from below by the uncertainty in the prediction of the model with lowest flexibility required for representing true system accurately. In the literature, many other approaches to handle the uncertainty in predictions by NNs have been suggested, of which some are summarized in this work. Furthermore, a simulation and an experimental studies inspired by autonomous driving are conducted. In the simulation study, different sources of uncertainty are investigated, as well as how large the uncertainty in the predictions by NNs are in areas without training data. In the experimental study, the uncertainty in predictions done by different models are investigated. The results show that, compared to existing methods, the linearization method produces similar results for the uncertainty in predictions by NNs. An introduction video is available at https://youtu.be/O4ZcUTGXFN0 Inom forskning och utveckling har det har alltid varit centralt att skapa modeller av verkligheten. Dessa modeller har bland annat använts till att förutspå framtida händelser eller för att styra ett system till att bete sig som man önskar. Modellerna kan beskriva allt från hur friktionen hos ett bildäck påverkas av hur mycket hjulen glider till hur ett virus kan sprida sig i ett samhälle. I takt med att mer och mer data blir tillgänglig ökar potentialen för datadrivna black-box modeller. Dessa modeller är universella approximationer vilka ska kunna representera vilken godtycklig funktion som helst. Användningen av dessa modeller har haft stor framgång inom många områden men för att verkligen kunna etablera sig inom säkerhetskritiska områden såsom självkörande farkoster behövs en förståelse för osäkerhet i prediktionen från modellen. Neuronnät är ett exempel på en sådan black-box modell. I denna avhandling kommer olika sätt att tillförskaffa sig kunskap om osäkerhet i prediktionen av neuronnät undersökas. En metod som bygger på linjärisering av modellen för att tillförskaffa sig osäkerhet i prediktionen av neuronnätet kommer att presenteras. Denna metod är välbeprövad inom systemidentifiering och sensorfusion under antagandet att modellen är identifierbar. För modeller såsom neuronnät, vilka inte är identifierbara behövs det att det tas hänsyn till tvetydigheterna i modellen. En annan utmaning med datadrivna black-box modeller, är att veta om den valda modellmängden är tillräckligt generell för att kunna modellera det sanna systemet. En lösning på detta problem är att använda modeller som har mer flexibilitet än vad som behövs, det vill säga en överparameteriserad modell. Men hur påverkas osäkerheten i prediktionen av detta? Detta är något som undersöks i denna avhandling, vilken visar att osäkerheten i den överparameteriserad modellen kommer att vara begränsad underifrån av modellen med minst flexibilitet som ändå är tillräckligt generell för att modellera det sanna systemet. Som avslutning kommer dessa resultat att demonstreras i både en simuleringsstudie och en experimentstudie inspirerad av självkörande farkoster. Fokuset i simuleringsstudien är hur osäkerheten hos modellen är i områden med och utan tillgång till träningsdata medan experimentstudien fokuserar på jämförelsen mellan osäkerheten i olika typer av modeller.Resultaten från dessa studier visar att metoden som bygger på linjärisering ger liknande resultat för skattningen av osäkerheten i prediktionen av neuronnät, jämfört med existerande metoder.

Estimation of Nonlinear Greybox Models for Marine Applications

Estimation of Nonlinear Greybox Models for Marine Applications PDF Author: Fredrik Ljungberg
Publisher: Linköping University Electronic Press
ISBN: 9179298400
Category :
Languages : en
Pages : 124

Get Book

Book Description
As marine vessels are becoming increasingly autonomous, having accurate simulation models available is turning into an absolute necessity. This holds both for facilitation of development and for achieving satisfactory model-based control. When accurate ship models are sought, it is necessary to account for nonlinear hydrodynamic effects and to deal with environmental disturbances in a correct way. In this thesis, parameter estimators for nonlinear regression models where the regressors are second-order modulus functions are analyzed. This model class is referred to as second-order modulus models and is often used for greybox identification of marine vessels. The primary focus in the thesis is to find consistent estimators and for this an instrumental variable (IV) method is used. First, it is demonstrated that the accuracy of an IV estimator can be improved by conducting experiments where the input signal has a static offset of sufficient amplitude and the instruments are forced to have zero mean. This two-step procedure is shown to give consistent estimators for second-order modulus models in cases where an off-the-shelf applied IV method does not, in particular when measurement uncertainty is taken into account. Moreover, it is shown that the possibility of obtaining consistent parameter estimators for models of this type depends on how process disturbances enter the system and on the amount of prior knowledge about the disturbances’ probability distributions that is available. In cases where the first-order moments are known, the aforementioned approach gives consistent estimators even when disturbances enter the system before the nonlinearity. In order to obtain consistent estimators in cases where the first-order moments are unknown, a framework for estimating the first and second-order moments alongside the model parameters is suggested. The idea is to describe the environmental disturbances as stationary stochastic processes in an inertial frame and to utilize the fact that their effect on a vessel depends on the vessel’s attitude. It is consequently possible to infer information about the environmental disturbances by over time measuring the orientation of a vessel they are affecting. Furthermore, in cases where the process disturbances are of more general character it is shown that supplementary disturbance measurements can be used for achieving consistency. Different scenarios where consistency can be achieved for instrumental variable estimators of second-order modulus models are demonstrated, both in theory and by simulation examples. Finally, estimation results obtained using data from a full-scale marine vessel are presented. I takt med att marina farkoster blir mer autonoma ökar behovet av noggranna matematiska farkostmodeller. Modellerna behövs både för att förenkla utvecklingen av nya farkoster och för att kunna styra farkosterna autonomt med önskad precision. För att erhålla allmängiltiga modeller behöver olinjära hydrodynamiska effekter samt systemstörningar, främst orsakade av vind- och vattenströmmar, tas i beaktning. I det här arbetet undersöks metoder för att skatta okända storheter i modeller för marina farkoster givet observerad data. Undersökningen gäller en speciell typ av olinjära modeller som ofta används för att beskriva marina farkoster. Huvudfokus i arbetet är att erhålla konsistens, vilket betyder att de skattade storheterna ska anta rätt värden när mängden observerad data ökar. För det används en redan etablerad statistisk metod som baseras på instrumentvariabler. Det visas först att noggrannheten i modellskattningsmetoden kan förbättras om datainsamlingsexperimenten utförs på ett sätt så att farkosten har signifikant nollskild hastighet och instrumentvariablernas medelvärde dras bort. Den här tvåstegslösningen påvisas vara fördelaktig vid skattning av parametrar i den ovan nämnda modelltypen, framför allt då mätosäkerhet tas i beaktning. Vidare så visas det att möjligheten att erhålla konsistenta skattningsmetoder beror på hur mycket kännedom om systemstörningarna som finns tillgänglig på förhand. I fallet då de huvudsakliga hastigheterna på vind- och vattenströmmar är kända, räcker den tidigare nämnda tvåstegsmetoden bra. För att även kunna hantera det mer generella fallet föreslås en metod för att skatta de huvudsakliga hastigheterna och de okända modellparametrarna parallellt. Denna idé baserar sig på att beskriva störningarna som stationära i ett globalt koordinatsystem och att anta att deras effekt på en farkost beror på hur farkosten är orienterad. Genom att över tid mäta och samla in data som beskriver en farkosts kurs, kan man således dra slutsatser om de störningar som farkosten påverkas av. Utöver detta visas det att utnyttjande av vindmätningar kan ge konsistens i fallet med störningar av mer generell karaktär. Olika scenarion där konsistens kan uppnås visas både i teori och med simuleringsexempel. Slutligen visas också modellskattningsresultat som erhållits med data insamlad från ett fullskaligt fartyg.

Control, Models and Industrial Manipulators

Control, Models and Industrial Manipulators PDF Author: Erik Hedberg
Publisher: Linköping University Electronic Press
ISBN: 9179297404
Category :
Languages : en
Pages : 64

Get Book

Book Description
The two topics at the heart of this thesis are how to improve control of industrial manipulators and how to reason about the role of models in automatic control. On industrial manipulators, two case studies are presented. The first investigates estimation with inertial sensors, and the second compares control by feedback linearization to control based on gain-scheduling. The contributions on the second topic illustrate the close connection between control and estimation in different ways. A conceptual model of control is introduced, which can be used to emphasize the role of models as well as the human aspect of control engineering. Some observations are made regarding block-diagram reformulations that illustrate the relation between models, control and inversion. Finally, a suggestion for how the internal model principle, internal model control, disturbance observers and Youla-Kucera parametrization can be introduced in a unified way is presented.

Multipath Exploitation for Emitter Localization using Ray-Tracing Fingerprints and Machine Learning

Multipath Exploitation for Emitter Localization using Ray-Tracing Fingerprints and Machine Learning PDF Author: Marcelo Nogueira de Sousa
Publisher: BoD – Books on Demand
ISBN: 3863602447
Category : Technology & Engineering
Languages : en
Pages : 270

Get Book

Book Description
The precise localization of radio frequency (RF) transmitters in outdoor environments has been an important research topic in various fields for several years. Nowadays, the functionalities of many electronic devices are based on the position data of a radiofrequency transmitter using a Wireless Sensor Network (WSN). Spatially separated sensor scan measure the signal from the transmitter and estimate its location using parameters such as Time Of Arrival (ToA), Time Difference Of Arrival (TDOA), Received Signal Strength (RSS) or Direction Of Arrival (DOA). However, certain obstacles in the environment can cause reflection, diffraction, or scattering of the signal. This so called multipath effect affects the measurements for the precise location of the transmitter. Previous studies have discarded multipath information and have not considered it valuable for locating the transmitter. Some studies used ray tracing (RT) to create position fingerprints, without reference measurements, in a simulated scenario. Others tested this concept with real measurement data, but this proved to be a more cumbersome method due to practical problems in the outdoor environment. This thesis exploits the concept of Channel Impulse Response (CIR) to address the problem of precision in outdoor localization environments affected by multipath. The study aims to fill the research gap by combining multipath information from simulation with real measurements in a machine learning framework. The research question was whether the localization could be improved by combining real measurements with simulations. We propose a method that uses the multipath fingerprint information from RT simulation with reference transmitters to improve the location estimation. To validate the effectiveness of the proposed method, we implemented a TDoA location system enhanced with multipath fingerprints in an outdoor scenario. This thesis investigated suburban and rural areas using well-defined reflective components to characterize the localization multipath pattern. The results confirm the possibility of using multipath effects with real measurements to enhance the localization in outdoor situations. Instead of rejecting the multipath information, we can use them as an additional source of information.

On Timing-Based Localization in Cellular Radio Networks

On Timing-Based Localization in Cellular Radio Networks PDF Author: Kamiar Radnosrati
Publisher: Linköping University Electronic Press
ISBN: 9176852695
Category :
Languages : en
Pages : 102

Get Book

Book Description
The possibilities for positioning in cellular networks has increased over time, pushed by increased needs for location based products and services for a variety of purposes. It all started with rough position estimates based on timing measurements and sector information available in the global system for mobile communication (gsm), and today there is an increased standardization effort to provide more position relevant measurements in cellular communication systems to improve on localization accuracy and availability. A first purpose of this thesis is to survey recent efforts in the area and their potential for localization. The rest of the thesis then investigates three particular aspects, where the focus is on timing measurements. How can these be combined in the best way in long term evolution (lte), what is the potential for the new narrow-band communication links for localization, and can the timing measurement error be more accurately modeled? The first contribution concerns a narrow-band standard in lte intended for internet of things (iot) devices. This lte standard includes a special position reference signal sent synchronized by all base stations (bs) to all iot devices. Each device can then compute several pair-wise time differences that corresponds to hyperbolic functions. Using multilateration methods the intersection of a set of such hyperbolas can be computed. An extensive performance study using a professional simulation environment with realistic user models is presented, indicating that a decent position accuracy can be achieved despite the narrow bandwidth of the channel. The second contribution is a study of how downlink measurements in lte can be combined. Time of flight (tof) to the serving bs and time difference of arrival (tdoa) to the neighboring bs are used as measurements. From a geometrical perspective, the position estimation problem involves computing the intersection of a circle and hyperbolas, all with uncertain radii. We propose a fusion framework for both snapshot estimation and filtering, and evaluate with both simulated and experimental field test data. The results indicate that the position accuracy is better than 40 meters 95% of the time. A third study in the thesis analyzes the statistical distribution of timing measurement errors in lte systems. Three different machine learning methods are applied to the experimental data to fit Gaussian mixture distributions to the observed measurement errors. Since current positioning algorithms are mostly based on Gaussian distribution models, knowledge of a good model for the measurement errors can be used to improve the accuracy and robustness of the algorithms. The obtained results indicate that a single Gaussian distribution is not adequate to model the real toa measurement errors. One possible future study is to further develop standard algorithms with these models.

Trust, Security and Privacy for Big Data

Trust, Security and Privacy for Big Data PDF Author: Mamoun Alazab
Publisher: CRC Press
ISBN: 1000619052
Category : Computers
Languages : en
Pages : 212

Get Book

Book Description
Data has revolutionized the digital ecosystem. Readily available large datasets foster AI and machine learning automated solutions. The data generated from diverse and varied sources including IoT, social platforms, healthcare, system logs, bio-informatics, etc. contribute to and define the ethos of Big Data which is volume, velocity and variety. Data lakes formed by the amalgamation of data from these sources requires powerful, scalable and resilient storage and processing platforms to reveal the true value hidden inside this data mine. Data formats and its collection from various sources not only introduce unprecedented challenges to different domains including IoT, manufacturing, smart cars, power grids etc., but also highlight the security and privacy issues in this age of big data. Security and privacy in big data is facing many challenges, such as generative adversary networks, efficient encryption and decryption algorithms, encrypted information retrieval, attribute-based encryption, attacks on availability, and reliability. Providing security and privacy for big data storage, transmission, and processing have been attracting much attention in all big data related areas. The book provides timely and comprehensive information for researchers and industry partners in communications and networking domains to review the latest results in security and privacy related work of Big Data. It will serve computer science and cybersecurity communities including researchers, academicians, students, and practitioners who have interest in big data trust privacy and security aspects. It is a comprehensive work on the most recent developments in security of datasets from varied sources including IoT, cyber physical domains, big data architectures, studies for trustworthy computing, and approaches for distributed systems and big data security solutions etc.

Device-Free Object Tracking Using Passive Tags

Device-Free Object Tracking Using Passive Tags PDF Author: Jinsong Han
Publisher: Springer
ISBN: 3319126466
Category : Computers
Languages : en
Pages : 66

Get Book

Book Description
This SpringerBrief examines the use of cheap commercial passive RFID tags to achieve accurate device-free object-tracking. It presents a sensitive detector, named Twins, which uses a pair of adjacent passive tags to detect uncooperative targets (such as intruders). Twins leverages a newly observed phenomenon called critical state that is caused by interference among passive tags. The author expands on the previous object tracking methods, which are mostly device-based, and reveals a new interference model and their extensive experiments for validation. A prototype implementation of the Twins-based intrusion detection scheme with commercial off-the-shelf reader and tags is also covered in this SpringerBrief. Device-Free Object Tracking Using Passive Tags is designed for researchers and professionals interested in smart sensing, localization, RFID and Internet of Things applications. The content is also useful for advanced-level students studying electrical engineering and computer science.