A Coverage Theory of Bistatic Radar Networks: Worst-Case Intrusion Path and Optimal Deployment
نویسندگان
چکیده
Continuing advances in radar technology are driven both by new application regimes and technological innovations. A family of applications of increasing importance is detection of a mobile target intruding into a protected area, and one type of radar system architecture potentially well suited to this type of application entails a network of cooperating radars. In this paper, we study optimal radar deployment for intrusion detection, with focus on network coverage. In contrast to the disk-based sensing model in a traditional sensor network, the detection range of a bistatic radar depends on the locations of both the radar transmitter and radar receiver, and is characterized by Cassini ovals. Furthermore , in a network with multiple radar transmitters and receivers , since any pair of transmitter and receiver can potentially form a bistatic radar, the detection ranges of different bistatic radars are coupled and the corresponding network coverage is intimately related to the locations of all transmitters and receivers, making the optimal deployment design highly non-trivial. Clearly, the detectabil-ity of an intruder depends on the highest SNR received by all possible bistatic radars. We focus on the worst-case intrusion detectability, i.e., the minimum possible detectabil-ity along all possible intrusion paths. Although it is plausible to deploy radars on a shortest line segment across the field, it is not always optimal in general, which we illustrate via counterexamples. We then present a sufficient condition on the field geometry for the optimality of shortest line deployment to hold. Further, we quantify the local structure of detectability corresponding to a given deployment order and spacings of radar transmitters and receivers, building on which we characterize the optimal deployment to maximize the worst-case intrusion detectability. Our results show that the optimal deployment locations exhibit a balanced structure. We also develop a polynomial-time approximation algorithm for characterizing the worse-case intrusion path for any given locations of radars under random deployment.
منابع مشابه
Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm
Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...
متن کاملCoverage Problems in Wireless Ad-hoc Sensor Networks
Wireless ad-hoc sensor networks have recently emerged as a premier research topic. They have great long term economic potential, ability to transform our lives, and pose many new system building challenges. Sensor networks also pose a number of new conceptual and optimization problems. Some, such as location, deployment, and tracking, are fundamental issues, in that many applications rely on th...
متن کاملHF Radar Bistatic Measurement of Surface Current Velocities: Drifter Comparisons and Radar Consistency Checks
We describe the operation of a bistatic HF radar network and outline analysis methods for the derivation of the elliptical velocity components from the radar echo spectra. Bistatic operation is illustrated by application to a bistatic pair: Both remote systems receive backscattered echo, with one remote system in addition receiving bistatic echoes transmitted by the other. The pair produces ell...
متن کاملDesign and evaluation of two distributed methods for sensors placement in Wireless Sensor Networks
Adequate coverage is one of the main problems for distributed wireless sensor networks and The effectiveness of that highly depends on the sensor deployment scheme. Given a finite number of sensors, optimizing the sensor deployment will provide sufficient sensor coverage and save power of sensors for movement to target location to adequate coverage. In this paper, we apply fuzzy logic system to...
متن کاملPassive Bistatic Radar and Waveform Diversity
This tutorial describes the basis of passive bistatic radar (PBR) systems, and in particular the nature of the waveforms of illuminators of opportunity that they exploit. It shows that there is a wide variety of such waveforms, from broadcast, communications and radionavigation transmissions, and that in general they are not optimum for radar purposes. In addition, they usually vary significant...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1206.1355 شماره
صفحات -
تاریخ انتشار 2012