Optimal Detection of UAV's Transmission With Beam Sweeping in Covert Wireless Networks

被引:54
作者
Hu, Jinsong [1 ]
Wu, Yongpeng [2 ]
Chen, Riqing [3 ]
Shu, Feng [4 ,5 ]
Wang, Jiangzhou [6 ]
机构
[1] Fuzhou Univ, Fujian Key Lab Intelligent Proc & Wireless Transm, Coll Phys & Informat Engn, Fuzhou 350116, Peoples R China
[2] Shanghai Jiao Tong Univ, Dept Elect Engn, Shanghai 200240, Peoples R China
[3] Fujian Agr & Forestry Univ, Sch Comp & Informat Sci, Fuzhou 350002, Peoples R China
[4] Nanjing Univ Sci & Technol, Sch Elect & Opt Engn, Nanjing 210094, Peoples R China
[5] Hainan Univ, Sch Informat & Commun Engn, Haikou 570228, Hainan, Peoples R China
[6] Univ Kent, Sch Engn & Digital Arts, Canterbury CT2 7NT, Kent, England
基金
中国国家自然科学基金;
关键词
Optimal detector; detection error probability; beam sweeping; UAV networks; COMMUNICATION;
D O I
10.1109/TVT.2019.2950450
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this work, a detection strategy based on multiple antennas with beam sweeping is developed to detect the potential transmission of unmanned aerial vehicle (UAV) in wireless networks. Specifically, suspicious angle range where the UAV may present is divided into different sectors to potentially increase detection accuracy by using beamforming gain. We then develop the optimal detector and derive its detection error probability in a closed-form expression. We also utilize the Pinsker's inequality and Kullback-Leibler divergence to yield low-complex approximation for the detection error probability, based on which we obtain some significant insights on the detection performance. Our numerical results show that there exists an optimal number of sectors that can minimize the detection error probability in some scenarios (e.g., when the number of measurements is limited). Intuitively, this can be explained by the fact that there exists an optimal accuracy of the telescope used to find an object in the sky within limited time period.
引用
收藏
页码:1080 / 1085
页数:6
相关论文
共 20 条
[1]   3-D Placement of an Unmanned Aerial Vehicle Base Station for Maximum Coverage of Users With Different QoS Requirements [J].
Alzenad, Mohamed ;
El-Keyi, Amr ;
Yanikomeroglu, Halim .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2018, 7 (01) :38-41
[2]  
[Anonymous], 1982, Antenna Theory: Analysis and Design
[3]  
Güvenç I, 2017, IEEEAAIA DIGIT AVION
[4]   Covert Wireless Communication With a Poisson Field of Interferers [J].
He, Biao ;
Yan, Shihao ;
Zhou, Xiangyun ;
Jafarkhani, Hamid .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (09) :6005-6017
[5]   Covert Transmission With a Self-Sustained Relay [J].
Hu, Jinsong ;
Yan, Shihao ;
Shu, Feng ;
Wang, Jiangzhou .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (08) :4089-4102
[6]   Covert Communication Achieved by a Greedy Relay in Wireless Networks [J].
Hu, Jinsong ;
Yan, Shihao ;
Zhou, Xiangyun ;
Shu, Feng ;
Li, Jun ;
Wang, Jiangzhou .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (07) :4766-4779
[7]  
Liu F., 2019, ARXIV190600789
[8]   Developing a Distributed Real-Time Monitoring System to Track UAVs [J].
Ramos, Diogo Branquinho ;
Loubach, Denis Silva ;
da Cunha, Adilson Marques .
IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2010, 25 (09) :18-25
[9]   Delay-Constrained Covert Communications With a Full-Duplex Receiver [J].
Shu, Feng ;
Xu, Tingzhen ;
Hu, Jinsong ;
Yan, Shihao .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2019, 8 (03) :813-816
[10]  
Strang G, 2003, Introduction to linear algebra