Detection Capabilities of Randomly-Deployed Sensor Fields

0 downloads 0 Views 2MB Size Report
detection capabilities of a network of randomly-deployed sensors with varying ... the region as a function of the number of sensors deployed and the statistical ...
International Journal of Distributed Sensor Networks, 5: 708–728, 2009 Copyright # Taylor & Francis Group, LLC ISSN: 1550-1329 print / 1550-1477 online DOI: 10.1080/15501320902768609

Detection Capabilities of Randomly-Deployed Sensor Fields JILL K. NELSON1, ERROL G. ROWE2, and G. CLIFFORD CARTER2 1

Department of Electrical and Computer Engineering, George Mason University, Fairfax, VA, USA 2 Naval Undersea Warfare Center, Newport, RI, USA Distributed sensor fields have recently gained popularity as a means for detecting intruders moving through a protected area of the ocean. We characterize the detection capabilities of a network of randomly-deployed sensors with varying sensing capabilities. We develop a framework for analytically approximating the probability that such a sensor field detects a constant course target moving through the region as a function of the number of sensors deployed and the statistical properties that govern the sensing range. Analytical and empirical results indicate that, when the total sensing area is fixed, a set of smaller distributed sensors can achieve significantly improved detection performance relative to a single large sensor. We also study the relationship between coverage of a region of interest and likelihood of detecting a constant course intruder moving through that region. We derive expressions for the average number of sensors required to achieve a prescribed likelihood of detection and level of coverage and conclude that detection and coverage are fundamentally different characterizations of the capabilities of a sensor field. In fact, the number of sensors required to achieve a particular detection level may be several orders of magnitude smaller than that required to achieve the same level of coverage. Keywords Distributed Sensor Networks; Heterogeneous Sensor Field; Spatial Poisson Process; Detection Versus Coverage

1. Introduction The first line of defense for protecting a defined region of the ocean, often called a sea base, is a system consisting of sensors and the associated signal processing that perform detection, classification, localization, and tracking (DCLT). We are engaged in the basic research needed to inform the development of SONAR system technology that can be used to determine if underwater objects (fish, mines, submarines, or underwater vehicles) are present in the volume of water constrained within, for example, a square area of the ocean. Traditionally, DCLT tasks have been performed by large, expensive sensor platforms with sophisticated signal processing capabilities that result in long detection ranges. Recent advances in the detection capabilities of commercial networks composed of small, low-cost wireless sensors [1,2] have raised the possibility of similar approaches in an underwater environment. These This work was supported by the Office of Naval Research (ONR) and the In-House Laboratory Independent Research Program of the Naval Undersea Warfare Center, Newport, RI. Address correspondence to Jill K. Nelson, George Mason University, Fairfax, VA 22030, USA. E-mail: [email protected]

708

Detection Capabilities of Randomly-Deployed Sensor Fields

709

approaches, called undersea distributed networked systems (UDNS), are becoming a research topic of significant interest in the underwater community [3]. A chief goal of our work is to characterize the performance of randomly-distributed sensor fields for detection of an intruder moving through the region of interest. Much of the existing research on the capabilities of such sensor fields has focused on coverage, or equivalently, the probability that a particular point in the region is within the sensing region of at least 1 (or perhaps at least k) sensors. Onur et al. [4] present an analytical expression for the probability that a random point in a rectangular region is detected by at least one of N identical randomly-deployed sensors. Additional coverage measures such as breach and support are defined in [5], and algorithms for identifying paths that achieve maximum breach and minimum support under known sensor placement are developed in [5] and [6]. In [7], the concept of coverage is extended to consider moving targets by quantifying the coverage along an arbitrary path through the region of interest. Liu et al. [8] compute the probability that an object moving between two points in a region can be detected by a homogeneous network of randomly-deployed sensors as a function of the length of the path traveled. In both [7] and [8], an infinite region of interest is assumed in generating analytical results, and hence edge effects are not incorporated. Clouqueur et al. [9] also consider detection capabilities for moving targets but with a focus on algorithmic strategies for deploying sensors in the region of interest. Our work differs from that described above in that it focuses purely on quantifying the probability of detecting a moving target (rather than on coverage statistics for the region or for a target path) within a bounded region of interest using a field of randomly-deployed sensors, directly addressing the effects of boundary conditions on detection capabilities. In work that has studied detection directly, analysis has focused on the detection capabilities of sparsely distributed sensors whose sensing regions are assumed not to overlap [10]. In [11], for example, Traweek and Wettergren characterize the sensing range that optimizes the detection vs. cost trade-off in a sparse sensor field. In contrast to previous work, we consider how to choose the number and sophistication of sensors to maximize detection performance when sensor placement is random. Such a model is particularly relevant when small, low-cost sensors are used, since deployment may be as simple as dropping sensors from a moving platform, such as a plane or surface ship. Once deployed in the ocean environment, floating sensors will be relocated by waves, tides, and other ocean forces. An additional complexity occurs when individual sensors within the network vary with respect to detection capabilities, specifically the sensing range. Such variability may be introduced intentionally when sensors of differing sophistication are incorporated in a heterogeneous network. Consider, for example, a network composed of submarines, unmanned vehicles, sonobuoys, and low-cost floating (un-tethered) sensors. Each type of sensor is expected to provide different detection capabilities, in correlation with their respective costs of production and operation. Alternatively, variability may be introduced through manufacturing uncertainties, e.g., variations in the performance of a batch of sensors designed to meet certain specifications. In many scenarios, especially when a large number of sensors are deployed, it is impractical to test each sensor prior to deployment, and hence sensors with varying capabilities will be used. Even if testing of all sensors is possible, removing sensors that fail to meet design specifications is an inefficient approach, since even lowerperforming sensors (whose cost of production has already been paid) can contribute to the overall detection capabilities of the network. In our work, we explore detection performance as a function of both the number of sensors deployed and their individual detection radii. We are interested in exploring the performance of such systems in the limit as the number of sensors grows and their respective sophistication/cost decreases. A related

710

J. K. Nelson et al.

engineering and production challenge, of course, is to deliver small, reliable sensors at low cost, an important topic beyond the scope of this article. The remainder of the article is organized as follows. A model for the system under consideration is presented in Section 2. The likelihood of detection using a single sensor placed at the center of a square sea base is derived in Section 3. The likelihood of detection for randomly-distributed heterogeneous sensors is derived in Section 4, and the generalization beyond a square sea base to arbitrary convex regions is discussed. The relationship between coverage and detection for randomly placed sensors is discussed in Section 5, and conclusions are drawn in Section 6.

2. System Model We consider sensors that have a disc-shaped detection region, e.g., omnidirectional sensing. The range of a sensor’s detection region is given by its sensing radius r0, which we assume is a random variable drawn from some known probability density function f(r). Thus the detection range, and hence the detection region, varies from sensor to sensor. A sensor network field of this type, with heterogeneous sensing radii, adds an additional level of complexity to the analysis: not only are the sensor locations random, but the actual coverage area of each sensor is also random. Variation in sensor range might occur, for example, as sensor performance degrades over shelf life or as new models are introduced with improved performance [12]. When all sensors are assumed to have the same known sensing radius r0, the probability density function simply reduces to f(r) ¼ (r - r0), where  denotes the Dirac delta function. In all cases, a Boolean sensing model is assumed [13]: a sensor detects a moving target with probability one if the intruder’s path intersects the sensing region of that sensor. Expanding the sensor operating model to characterize the effect of detection as a function of time spent in the sensing region and false alarm rates is an important topic but lies outside the scope of this paper. Randomly scattered sensors are assumed to be spatially distributed according to a Poisson point process [14] with parameter l. A spatial Poisson process provides a model for the number of points associated with a particular event over a region of space. For example, suppose  denotes an n-dimensional set, and let A  . Consider points scattered randomly throughout , and let N (A) denote the number of points that are contained in A. Then the random process N ¼ {N (A), A  } is called a point process in . Let ||A|| denote the volume of A. The stochastic process N ¼ {N (A), A  } is an n-dimensional Poisson counting process with parameter l > 0 if a. N (A) follows a Poisson distribution with mean l ||A||, and b. The number of points occurring in disjoint subsets of  are mutually independent. Thus, if N ¼ {N (A), A  } is an n-dimensional Poisson counting process with parameter l > 0, then the probability of k occurrences (of points) in the subset A is given by

PfN ðAÞ ¼ kg ¼

ðljjAjjÞk eljjAjj  k!

It follows from (a) that the average number of points in  is l||||, where |||| denotes the volume of the region . A more detailed description of spatial Poisson processes can be found in [14].

Detection Capabilities of Randomly-Deployed Sensor Fields

711

One of the main goals of our work is to draw a distinction between intruder detection and region coverage as metrics for quantifying the performance capabilities of randomlydistributed heterogeneous sensor fields. Hence, we introduce sensor coverage statistics based on a Poisson point process model. For a two-dimensional region (n ¼ 2), assuming that the sensing range for all sensors are independent of location and drawn from density f(r), the number of sensors that cover an arbitrary point x P  is a Poisson random variable with parameter (cf., [15])

 ¼ lp

Z

1

r 2 f ðrÞdr:

0

Hence, the probability that k or more sensors cover the point x P  is equal to k e-/k!, and the probability that x is covered by at least one sensor is given by



1 X k e k¼1

¼1  e

k!

(1)

:

We refer to the statistic r as the predicted coverage for the sensor network. The coverage statistic r can also be interpreted as the expected proportion of the space covered by at least one sensor. R 1 We should point out that for the three-dimensional problem, we have ¼ 43 lp 0 r 3 f ðrÞdr; however, for the remainder of this paper we will consider only the two-dimensional case. We model the region of interest (sea base) as a square with sides of length 2U, but the techniques employed and the corresponding results can be generalized to any convex region, as will be discussed further in Section 4.2. We employ a Cartesian coordinate system in which the sea base is centered at (x, y) ¼ (0, 0). An intruder is constrained to move at a constant course (straight line) through the sea base but can enter at any arbitrary point and travel on any arbitrary course that will take it through at least some portion of the region of interest. Without loss of generality, we assume that the intruder enters the sea base through the lower edge of the square. The intruder enters at point (u, -U) and with angle , where u P [-U, U], and  P [0, p]. An example trajectory through the sea base is shown in Fig. 1.

Figure 1. Example target trajectory through the sea base. Intruder enters at point (u, -U) on the lower edge of the square and with angle  relative to the horizontal.

712

J. K. Nelson et al.

Our analysis results in an expression for probability of detection that is independent of the particular path traveled by the intruder through the sea base. To obtain this result, we model both the point u at which the intruder enters the sea base and the angle  with which it enters as uniformly distributed random variables with probability density functions given by

fu ðuÞ ¼

8 1 < 2U ;

juj  U

: 0;

otherwise:

and

f ðÞ ¼

8 < p1 ; 0    p :0;

otherwise:

Figure 2 depicts four example scenarios in which heterogeneous sensors are randomly distributed over the surveillance region. While the four scenarios may appear quite different at first glance, the number of sensors and their locations are identical in each frame. What differs is the coverage, i.e., the actual sensing radius of each sensor varies from scenario to scenario. When the sensing range is a random variable, the answer to the question of whether or not an arbitrary sensor will detect a particular intruder is not binary. This can be seen in Fig. 2, as sensors at particular locations detect the intruder in some scenarios but not in others.

Figure 2. Four examples of heterogeneous sensors randomly distributed across the surveillance region. The sensor locations are identical in each of the four frames, but each sensor’s radius varies across the four scenarios.

Detection Capabilities of Randomly-Deployed Sensor Fields

713

3. Likelihood of Detection Using a Single Centered Sensor In this section, we consider the detection performance of a single sensor with sensing radius R whose center is located at the center of the sea base, e.g., (x, y) ¼ (0, 0). Such a scenario could be used to model, for example, a submarine monitoring a particular region of the ocean. We use the single centered sensor as a baseline representation of a traditional sophisticated sensor and compare its performance to that of a randomly-deployed sensor field. Using an analytic approach, we determine the probability that the single sensor will detect an intruder moving in a straight line through the square sea base. An intruder entering the sea base at point (x, y) ¼ (u, - U) will intersect the sensing region of the sensor if its angle of entry is within a particular range, as shown in Fig. 3. Since the distribution over the angle of entry is uniform, we need to determine (as a function of u) only the fraction of the range of entry angles from 0 to p that will result in an intersection. We denote this range of entry angles by f. Creating the right triangle, we see that

R tanðf=2Þ ¼ pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ; 2 U þ u2  R 2

0  R  U:

For a particular point of entry u, the probability that an intruder enters with an angle within the range f for which detection occurs can then be written as   2 R Prð 2 fjuÞ ¼ tan1 pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi : p U 2 þ u 2  R2

Figure 3. f denotes the extent of angles for which an intruder entering the sea base at point (x, y) ¼ (u, -U) will be detected by a single sensor centered in the sea base. The two dashed lines shown create a right triangle when combined with the rightmost solid line. The length of the hypotenuse is easily pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi computed as u2 þ U 2 , and the length of the side lying within the circle is R.

714

J. K. Nelson et al. Integrating over a uniform prior on u, we obtain the expression ðcÞ Pd ðRÞ

  Z U 1 R 1 pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi du ¼ tan 2 2 2 pU U  U þ u  R   1 R Ru pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi u tan1 pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi  U tanh1 ¼ pU U 2 þ u2  R2  U U 2 þ u 2  R2 pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi r  u¼U ln u þ U 2 þ u2  R2 ju¼U þ pU  ! pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi  2U 2  R2 þ R 2 1 R 1 pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi  ln pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ¼ tan p p 2U 2  R2  R 2U 2  R2 ! pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi 2U 2  R2 þ U R ln pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi þ : pU 2U 2  R2  U

(2)

It is insightful to evaluate the likelihood that an intruder traveling a straight line will be detected when the sensing radius of the single sensor is equal to half the length of the square, e.g., R ¼ U. In such a scenario, the sensing region is a circle inscribed in the square sea base, but intruders still avoid detection when traveling through a corner of the square, as shown in Fig. 4. In the limit as R approaches U from the left, we find that

Pcd ðUÞ

" ! pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi   2U 2  R2 þ R 2 R 1 1 pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi  ln pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ¼ lim tan p R!U p 2U 2  R2  R 2U 2  R2 !# pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi 2U 2  R2 þ U R ln pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi þ pU 2U 2  R2  U ¼

1 lnð2Þ þ  :72: 2 p

Figure 4. An intruder moving through the sea base in a straight line may avoid being detected by a sensor whose sensing radius R ¼ U if the intruder travels through a corner of the square region.

Detection Capabilities of Randomly-Deployed Sensor Fields

715

Thus, the probability that the intruder will travel through one of the corner regions and avoid detection is 1 – Pcd(U)  0.28. Note that this probability is independent of the size of the sea base. Note also that, because we are considering the likelihood of detecting a moving target, the probability of avoiding detection in this scenario is not equivalent to the fraction of the sea base area not covered by the sensing region of the single large sensor. In fact, the likelihood that the sensing region covers a randomly chosen point in the sea base is given by sensing area U2p ¼  0:785; sea base area 4U 2 and hence coverage of a randomly chosen point is more likely than detection of a target following a randomly chosen straight line. We will see that this relationship is reversed (e.g., detection becomes more likely than coverage) when a network of smaller sensors is employed. To corroborate our analytical results, the likelihood of detection for a single centered sensor has been simulated for U ¼ 1 R between 0 and 1. For each value of R, 106 independent simulations were conducted. Both the analytical and simulation results are plotted as a function of R in Fig. 5. The analytical and empirical results are nearly identical, providing two independent but consistent answers to the same question. As the sensing radius R increases beyond 1, Pd increases more slowly, reflecting the fact that much of the additional detection region falls outside the sea base.

4. Likelihood of Detection using a Heterogeneous Sensor Field 4.1. Detection Probability for a Single Sensor To derive the probability of detecting an intruder when a set of sensors with heterogeneous sensing range are randomly deployed in the sea base, we begin by deriving the probability

Figure 5. Probability that a straight-line target is detected by a single sensor with radius R centered in a square sea base with length 2U ¼ 2. The analytical expression is plotted as a solid line; stars denote empirical results for the same parameters.

716

J. K. Nelson et al.

of detection for a single randomly-placed sensor with constant sensing radius r. Let the sensor be centered at (xc, yc), where xc P [-U, U] and yc P [-U, U]. For an intruder entering the sea base at point (u, -U) and with angle , the equation of a line traveled by the target is given by y ¼ x tan   U  u tan : The probability of detection across all sensor locations for the path defined by u and  can be written as Pdj; u ðrÞ ¼

Z Z xc

Pdjðxc ; yc Þ; 0; u ðrÞ fxc ; yc ðxc ; yc Þdxc dyc ;

yc

where fxc ;yc ðxc ; yc Þ denotes the probability density function over the sensor location. The probability of detection for a sensor centered at (xc, yc) is given by  Pdjðxc ;yc Þ;; u ðrÞ ¼

1; dmin ðxc ; yc ; u; Þ  r ; 0; dmin ðxc ; yc ; u; Þ > r

where dmin(xc, yc, u, ) denotes the minimum distance between the sensor center and the closest point on the line traveled by the target. Assuming the sensor location is uniformly distributed across the square, e.g.,

fxc ;yc ðxc ; yc Þ ¼

8 < 4U1 2 ;

jxc j  U; jyc j  U

: 0;

otherwise

;

we can compute Pd for a given u and  as 1 Pdj; u ðrÞ ¼ 4U 2

Z dxc dyc ;

(3)

A

where A ¼ fðxc ; yc Þ : dmin  r; x 2 ½U; U; y 2 ½U; Ug: The probability that the intruder intersects the sensing region of the sensor is equal to the probability that the distance from the sensor center to the closest point on the line is less than or equal to the sensing radius of the sensor. The closest point on the target path to the sensor center is the solution to d ðx  xc Þ2 þ ðyðxÞ  yc Þ2 ¼ 0; dx which is given by

Detection Capabilities of Randomly-Deployed Sensor Fields

717

xc þ yc tan  þ U tan  þ u tan2  ; and 1 þ tan2  xc tan  þ yc tan2   U  u tan  : y¼ 1 þ tan2 



The minimum distance between the sensor center and a point on the line traveled by the intruder is then computed as

dmin

sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi   myc  mb  m2 xc mxc þ b  yc 2 ¼ ; þ 1 þ m2 1 þ m2

(4)

where m ¼ tan  and b ¼ -U - u tan  are the slope and y-intercept, respectively, of the target path. Rearranging (4), the region of the sea base for which dmin  r can be expressed in terms of xc and yc as mxc þ b  r

pffiffiffiffiffiffiffiffiffiffiffiffiffiffi pffiffiffiffiffiffiffiffiffiffiffiffiffiffi 1 þ m2  yc  mxc þ b þ r 1 þ m2 :

pffiffiffiffiffiffiffiffiffiffiffiffiffiffi Graphically, the region of interest lies between the target path shifted upward by r 1 þ m2 pffiffiffiffiffiffiffiffiffiffiffiffiffiffi and the target path shifted downward by r 1 þ m2 , three examples of which are shown in Fig. 6. The perpendicular distance between the target path (center line of the shaded region) and either of the shifted paths (edge lines of the shaded region) is r. The result is intuitively pleasing, as it concludes that a sensor whose center is within distance r of the target path will detect the intruder. The region denoted by A is simply the region that falls between the shifted paths and within the sea base, e.g., all points (xc, yc) within the sea base for which dmin  r. The form of the region A depends upon which sides of the square are intersected by the ends of the shifted path segments that define the detection region; these are, in turn, determined by the point and angle at which the intruder enters the sea base, as well as by the radius, r of the sensor. Three possible scenarios are shown in Fig. 6. While it is possible to identify ranges of u and  that uniquely define the shape of the detection region, such an approach is tedious and cumbersome. Instead, we employ an approximate approach that, as we will show,

Figure 6. Possible target paths through the sea base and associated regions for which dmin  r. The target path within the sea base is represented by the center lines. The region for which dmin  r2 (darkly shaded) is between the edge lines, each of which is a shifted version of the target path. The cenarios shown are examples of case 1, 2, and 3, respectively, as defined to compute Pd(r).

718

J. K. Nelson et al.

Figure 7. Approximation to the area of the detection region defined by a rectangle whose longer central axis is defined by the length of the target path within the sea base. r is assumed to be significantly less than U.

yields results that are very similar to empirical results for the range of r in which we are interested. Rather than computing the exact area of the detection region, we compute the area of the rectangle whose central axis is given by the target path within the square and whose width is given by 2r, the perpendicular distance between the edge lines of the shaded region. We denote this region by A˜. Figure 7 shows the corresponding rectangle for each of the three scenarios given in Fig. 6. For ease of presentation, let U ¼ 1. To compute the length of the target path within the sea base (and hence the approximate area of the detection region), we consider three cases. For each case, the applicable ranges of u and , as well as the resulting area of the rectangle, are given below:  Case 1: Intruder exits right side of square. 0    tan1 ð2=ð1  uÞÞ ~ 1 jj ¼ jjA

2rð1  uÞ cos 

 Case 2: Intruder exits top of square. tan1 ð2=ð1  uÞÞ    tan1 ð2=ð1  uÞÞ ~ 2 jj ¼ 4r jjA sin   Case 3: Intruder exits left side of square. tan1 ð2=ð1  uÞÞ    p ~ 3 jj ¼ 2rðu þ 1Þ jjA cos  Note that Figs. 6 and 7 give examples from each of the three cases defined above.

Detection Capabilities of Randomly-Deployed Sensor Fields

719

The probability of detection across all u and  can be written as Pd ðrÞ ¼

Z Z

Pdj;u ðrÞ f ðÞ f ðuÞddu Z Z p 1 1 Pdj;u ðrÞddu: ¼ 2p u ¼ 1  ¼ 0 u



The function to be integrated displays symmetry across 0    p/2 and p/2    p, and hence we can equivalently compute 1 Pd ðrÞ ¼ p

Z

1

Z

p=2

Pdj; u ðrÞddu u¼1 0¼0 Z 1 Z tan1 ð2=ð1uÞÞ

Z Z 1u r 1 p=2 1 ddu þ ddu cos  p 1 tan1 ð2=ð1uÞÞ sin  1 0   pffiffiffi   pffiffiffi pffiffiffi 2 r r pffiffiffi ¼ 1  2 þ In 2  2 2 þ cosh1 ð3Þ þ p p 2þ 2  0:7098r: 

r 2p

(5)

The rectangle-based approach yields an approximation for likelihood of detection that is linear in sensing radius r. (For general values of U, the approximation to probability of detection is given by Pd(r)  0.7098r/U.) To evaluate the accuracy of the analytically-derived approximation to the probability of detection, we simulate the likelihood of detection for a single sensor randomly placed in the sea base for values of r between 0 and 1 and compare the results to our approximation for 0  r  1. Figure 8 shows the approximate and empirical values of Pd(r) as a function of r. The linear approximation generated via analytical means provides results nearly identical to those generated empirically for values of r below approximately 0.75, or equivalently for sensors whose diameter is less than 75% of the length of one side of the square. In many detection scenarios, the size of the region to be monitored will be

Figure 8. Probability that a straight-line target is detected by a single sensor with radius r and center randomly located within the sea base, U ¼ 1. The approximate analytical expression is plotted as a solid line; stars denote empirical results for the same parameters.

720

J. K. Nelson et al.

considerably larger than the sensing range of an individual sensor, even when sophisticated platform-based sensors are employed. Hence, we argue that the values of r of interest are those that are significantly less than U and thus the linear approximation to the probability of intersection can be employed with a minimal introduction of error. Now consider a scenario in which, rather than having a known sensing radius r, the radius of the randomly-placed sensor is a stochastic variable drawn from the probability density function f(r). (We continue to assume U ¼ 1 to simplify presentation.) The likelihood of detection in this case is given by Pd ¼

Z

1

Pd ðrÞf ðrÞdr Z 1  0:7098 rf ðrÞdr; 0

(6)

0

where the second line is obtained using the linear approximation (5) to Pd(r). Hence, the detection probability for a random sensor network with heterogeneous sensing radius varies directly as the mean of the sensing radii. As we will see shortly, the detection probability also varies inversely as the area of the surveillance region. Thus, (6) may be written as Pd 

2:8392

R1

0 rf ðrÞdr ; k k

(7)

where  is the surveillance region and |||| is its area. In our derivations and examples, we use  ¼ [-1, 1]  [-1, 1], hence (in this case) the result reduces to (6). For our work, we consider a system in which the sensor range to detection follows a beta-type density: f ðrÞ ¼

ða þ bÞ 1 ðr=cÞa1 ð1  r=cÞb1 ; ðaÞðbÞ c

r 2 ½0; c; a; b > 0;

R1 dt: Here, sensors have a maxwhere  denotes the Gamma function: ðzÞ ¼ 0 tz1 et R1 ac imum detection radius of c and a mean detection radius of 0 rf ðrÞdr ¼ aþb. As the ratio of R1 a to b increases, 0 rf ðrÞdr approaches c, and randomly-drawn values of r are concentrated near the maximum sensing radius. R 1 The shape of three example beta-type density functions, each with a mean value 0 rf ðrÞdr ¼ 0:1, are shown in Fig. 9. The beta-type density allows us to investigate the case where some sensors perform better than others. From a manufacturing standpoint, sensors may be designed to achieve a particular sensing radius, but some will fall short of that design parameter in practice. A heterogeneous model employing a beta-type distribution allows us to model such variability in manufactured specifications. Additionally, sensor sensitivity may decay over time due to power reduction, physical degradation, etc. For example, the detection range may deteriorate as the battery discharges, or the battery life might be extended by actively adjusting (reducing) the detection range, or limiting when the sensor transmits or processes results. As an extention, the distribution from which sensor radii are drawn may change as a function of time, thereby allowing us to model the evolution of detection capabilities. In Table 1, we compare the mean detection rate (obtained via 100,000 simulations) provided by a single randomly deployed sensor to the detection rate predicted by (6). Column one contains the predicted estimates. Columns two through four pertain to the

Detection Capabilities of Randomly-Deployed Sensor Fields

721

Figure 9. Examples of beta-type density functions with varying parameters a, b, and c. The three ac examples have the same mean value: aþb ¼ 0:1.

Table 1 Comparison of single sensor detection capability for homogeneous and heterogeneous systems. For each row, Pd is the predicted probability that a single randomly placed sensor will detect a random (constant course) target moving through the surveillance region Comparison of Single Sensor Detection Estimates R1 2:8392 rf ðrÞdr 0 Pd ðf Þ ¼ kk fHom ¼ (r - r0) Pd .0355 .0710 .1065 .1420 .1774 .2129 .2484 .2839 .3194 .3549

ðaþbÞ 1 a1 fHet ¼ ðaÞðbÞ ð1  r=cÞb1 ; r 2 ½0; c: c ðr=cÞ

r0

PHom (Sim)

% - Dif

c

PHet (Sim)

% - Dif

.0500 .0710 .1500 .2000 .2500 .3000 .3500 .4000 .4500 .5000

.0351 .0714 .1074 .1410 .1759 .2073 .2446 .2785 .3128 .3453

-1.13 .65 .89 -.67 -.90 -2.66 -1.53 -1.92 -2.07 -2.69

.0835 .1670 .2505 .3340 .4175 .5010 .5845 .6680 .7515 .8350

.0355 .0731 .1057 .1411 .1734 .2090 .2441 .2761 .3090 .3384

-.11 2.94 -.73 .63 -2.26 -1.84 -1.74 -2.77 -3.27 -4.66

detection rate for a homogeneous system, while columns five through seven pertain to a heterogeneous system with sensing radius drawn from a beta-type distribution. r0 is the radius of all sensors from the homogeneous system. c ¼ r0 aþb a is the maximum radius attained in the heterogeneous system. This value is used for c in order to keep the mean detection range for the heterogeneous system equal to that of the homogeneous system. The surveillance region  ¼ [-1, 1]  [-1, 1]. For the homogeneous system, predicted and

722

J. K. Nelson et al.

Table 2 Comparison of predicted and actual detection rate for a sensor field consisting of N randomly distributed sensors. The sensor radii are randomly drawn from a beta-type density with parameters a ¼ 1, b ¼ 0.67 and c ¼ 0.0167. The mean detection values, MD, were obtained by averaging the detection rate for 10,000 network field simulations Sensor Field Detection Comparison No. Sensors N 1 5 10 20 30 40 50 60 70 80 90 100

Predicted Detection (PD)

Mean Detection (MD)

% – Error

PD ¼ 1 – (1 – Pd)N

MD ¼ Mean Coverage

(MD – PD)/PD  100

.0071 .0350 .0688 .1328 .1924 .2479 .2996 .3478 .3926 .4344 .4733 .5095

.0075 .0345 .0668 .1298 .1944 .2485 .3084 .3590 .3967 .4349 .4730 .5012

5.60 –1.43 –2.91 –2.26 1.04 0.24 2.94 3.22 1.04 0.12 –0.06 –1.63

simulation detection propabilities differ by nomore than 2.7%. For the heterogeneous system, the maximum difference increases slightly to 4.67%. Table 2 compares the predicted detection rate, PD, of a randomly distributed sensor field to the estimate obtained via averaging over 10,000 simulations. For simulations of up to 40 sensors, the sensors are randomly deployed over the surveillance region. For more than 40 sensors, an equivalent (relative to surveillance region size) number of sensors were randomly distributed over a slightly larger surveillance space ([-1.05, 1.05]  [-1.05, 1.05]) to adjust for increased sensor detection area outside the surveillance region. Detection is still based on targets entering the original surveillance region; however, the coverage lost due to sensor coverage extending beyond the original surveillance region is counter-balanced by the coverage of the extra sensors that intrude into the surveillance region. Determining how much to increase the surveillance region is, at best, an art and needs further study. 4.2. Extension of Analysis to General Convex Regions Regions other than a square sea base may be of interest in detection applications. They include those defined as convex, i.e., regions for which any line segment drawn from one point on the closed perimeter to another remains inside the space. When a rectangular approximation is made to the detection region for a particular target path, the probability of detection for that path is dependent only upon the length of the path within the sea base and the mean sensing radius. Each path through the sea base is a chord in the convex region. Since the sensing radius r and the chord length c are independent random variables, the

Detection Capabilities of Randomly-Deployed Sensor Fields

723

R ~ ¼ 2c 1 rf ðrÞdr, average area of a rectangular detection region can be expressed as jjAjj 0 where c denotes the mean chord length for the convex region of interest. The detection probability is then approximated by the ratio of the mean detection region area to the total area: Pd 

2c

R1

rf ðrÞdr ; jjjj

0

where |||| denotes the area of the surveillance region .

5. Contrasting Detection and Coverage In designing or evaluating sensor networks for surveillance applications, coverage of the region by the sensor network is often chosen as a performance metric [12, 16–18]. In other words, what fraction of the region of interest lies within the detection region of at least one (or perhaps at least k) sensors? While a relationship undoubtedly exists between coverage and detection capabilities, our analysis shows that when the goal of the network is to detect intruders traveling a straight path through the sea base, the fraction of the region covered by the network of sensors underestimates the probability of detection. Additionally, under our assumptions, a given coverage provided by a single large sensor does not necessarily yield the same Pd as a set of smaller sensors with the same cumulative coverage area. To better understand this phenomenon, recall from R 1(1) that the coverage provided by a network of sensors is given by r¼ 1  expf  lp 0 r 2 f ðrÞdrg, where l is the mean number of sensors per unit volume. Thus, the average number of sensors deployed over |||| is Nðf Þ ¼ lkk. Therefore, on average, the number of smaller sensors required for the randomly deployed network to have the same coverage as a single large sensor (of sensor radius R) placed at the center of the surveillance region satisfies pNðf Þ

1e

 kk

R1 0

r2 f ðrÞdr

¼

pR2 : kk

Solving for N (f), we obtain the average number of randomly-deployed smaller sensors required to achieve the same coverage as a single large sensor:   pR2 jjjj log 1  jjjj R1 Nðf Þ ¼ : p 0 r 2 f ðrÞdr

(8)

Using L’Hoˆpital’s rule, one can show that, as the surveillance region grows large, i.e., in the limit as |||| approaches 1, (8) becomes 2 ^ Þ ¼ R1 R : Nðf 2 0 r f ðrÞdr

(9)

For the special case in which the system of small sensors have identical sensitivity range r0, ^ Nððr  r0 ÞÞ ¼ R2 =r02 . Expression (9) holds in the important case in which the surveillance region is large relative to the number and size of sensors in use and there is little chance of the randomly deployed sensors having regions of overlapping coverage.

724

J. K. Nelson et al.

Figure 10. Number of small sensors required to achieve the same coverage as a single sensor (centered at the origin) with radius R ¼ 1. Mean sensing range for the small sensors varies as the horizontal axis. Results for fixed small sensor radius are shown with a plus, and the results for small sensing radius drawn from a beta-type distribution are shown with a circle.

Figure 10 shows the number of smaller sensors required to achieve the same coverage as a single centered sensor with radius R. The number of small sensors required is plotted as a function of their mean sensing range. Both fixed sensing range and sensing range drawn from a beta-type distribution are considered. As the mean sensing radius decreases, the number of sensors required to achieve a particular coverage level increases exponentially. This can be attributed to two factors. First, the coverage area scales with the square of the sensing radius. Second, as the number of sensors deployed increases, the likelihood that the sensing regions overlap also increases, and hence additional sensors contribute less on average to the total sensing area. In contrast, the presence of the sensing area overlap does not pose the same detriment to detection capabilities. Figure 11 compares the detection performance of a single large sensor to two systems of smaller homogeneous sensors, one in which the sensing radius is r0 ¼ 0.05, and one in which the sensing radius is r1 ¼ 0.2. The sea base is assumed to have area 4 square units, e.g., U ¼ 1. The cumulative coverage of the random systems are ðcÞ adjusted so that they equal the total coverage of the single sensor. For example, Pd ðRÞ, ðMÞ detection probability for single sensor with sensing radius R, is compared to Pd ðrÞ for ffi

paffiffiffiffi M sensors with r ¼ R M . Note that the sensing areas of the M smaller sensors may overlap, and hence the total coverage provided by the M sensors may be smaller than that provided by the single large sensor. One can quickly glean that, despite the possibility for overlap, the detection performance improves as the number of sensors increases while the total sensing area is held constant. Let M(f) denote the number of small sensors (with range sensitivity density f(r)) needed to achieve a detection probability of at least Pd(R), where Pd(R) denotes the detection probability for a single centered sensor with radius R and is given by (2). That is, M(f) is the smallest value of M satisfying 1  ½1  Pd M Pd ðRÞ;

(10)

Detection Capabilities of Randomly-Deployed Sensor Fields

725

Figure 11. Likelihood of detection as a function of cumulative sensing area for homogeneous sensor fields with varying detection ranges. A single sensor with radius R and sensing area (or equivalently coverage) pR2 is compared to a field of M0 ¼ 400A/p sensors of radius r0 ¼ 0.05 and a field of M1 ¼ 25A/p sensors of radius r1 ¼ 0.2. The seabase is given by  ¼ [–1, 1]  [–1, 1]. For fixed cumulative sensing area, probability of detection increases as individual sensing range decreases.

where the left side of (10) is the probability of detection by at least one of M sensors with radii distributed according to f(r). Solving for M(f), we obtain log½1  Pd ðRÞ log½1  Pd  log½1  Pd ðRÞ R1  :  2:8392 rf ðrÞdr 0 log 1  jjjj

Mðf Þ

ð11Þ

Table 3 compares the number of smaller sensors required to achieve the same coverage as a single sensor (centered at the origin) with R ¼ 0.75 to the number of smaller sensors required to obtain the same detection probability as the single large sensor - both as a function of the sensing radii of the smaller sensors. Clearly, the number of sensors required to provide equivalent detection is significantly less than that required to provide equivalent coverage, and the magnitude of the difference increases as the sensing radii of the smaller sensors decrease. For example, for r ¼ 0.10, detection requires approximately 12% (9 versus 74) of the sensors required for coverage. For r ¼ 0.01, the detection requires only 1.2% (87 versus 7423) of the sensors required for coverage. Put briefly, increasing the detection probability requires significantly fewer sensors than increasing the expected coverage. A quick look at (8) and (11) reveals that while coverage scales with the square of the sensing radius, detection probability is approximately linear in sensing radius. One can consider this in the framework of comparison to a single large sensor.

6. Discussions and Conclusion We have developed a framework for analytically approximating the detection capabilities of a randomly-deployed heterogeneous sensor field. Using this framework, we have

726

J. K. Nelson et al.

Table 3 Comparison of the number, Nf, of small random sensors required to achieve the same ðkÞ coverage probability as a single large sensor centered at the origin, and the number, Mf , of small random sensors required so that the probability of detection (by at least k sensors) is at least as great as detection probability for a single large sensor centered at the origin. Surveillance region  ¼ ½1; 1  ½1; 1 Comparison of Sensor Requirements for Coverage and Detection Single Sensor ðcÞ

R ¼ 0.75

ðkÞ Mf

r .400 .200 .150 .100 .080 .060 .040 .030 .020 .010

Nf 5 19 33 74 116 206 464 825 1856 7423

Pd ðRÞ ¼ 0:462

Multiple Sensors n o Pk1 M ðcÞ ¼ minM 1  i¼0 ði Þð1  Pd ÞMi Pid Pd ðRÞ ð1Þ

Mf

2 5 6 9 11 15 22 29 44 87

ð2Þ

ð3Þ

ð4Þ

ð5Þ

Mf

Mf

Mf

Mf

6 11 15 22 28 37 55 73 110 220

9 18 24 36 45 59 89 119 178 356

13 25 33 49 62 82 123 164 246 492

16 32 42 63 79 105 158 210 315 630

derived an approximation to probability of detection that is a function of only the number of sensors deployed and the mean sensing radius. Empirical results confirm that our approximation yields very good results, with, in general, a small margin of error. The approximation provides a valuable tool for time-constrained decision making, as one can instantly estimate the necessary network size to achieve a desired detection performance without the need for any simulation or in-depth analysis. Additionally, we have shown how, using results from integral geometry, the simple approximation to Pd that we have derived for a square region of interest can be easily extended to any convex surveillance region. We have directly compared the coverage and detection capabilities of randomlydistributed heterogeneous sensors and have shown that, while the number of sensors required to achieve a given coverage level increases exponentially as the desired coverage level increases, the number of sensors required to achieve a desired detection probability increases much more slowly. These results are fundamental to the analysis of randomlydeployed sensor networks for surveillance applications, as they imply that, when detection of a moving target is the goal, coverage is not the metric that best indicates performance, and in fact, coverage greatly overestimates the network size required to achieve a particular probability of detection. The modest number of sensors required to achieve high detection probability in a heterogeneous sensor field, as well as the sensor field’s ability to achieve higher detection probability than a single sensor for the same cumulative sensing area, holds strong promise for randomly-distributed sensor networks as a practical approach to

Detection Capabilities of Randomly-Deployed Sensor Fields

727

surveillance at a more reasonable cost than traditional coverage-based analysis would suggest. Building on the framework developed here, future work will consider the tracking capabilities of the sensor field and the communication requirements for cooperative detection and tracking.

About the Authors Jill K. Nelson received a B.S. in electrical engineering and a B.A. in economics from Rice University, Houston, TX, in 1998. She received the M.S. and Ph.D. degrees in electrical engineering from the University of Illinois at Urbana-Champaign in 2001 and 2005, respectively. Since 2005, Dr. Nelson has been an Assistant Professor in the Department of Electrical and Computer Engineering at George Mason University. Her research interests include statistical and distributed signal processing, signal processing for communications, iterative algorithms, and detection and tracking. Dr. Nelson is a member of Phi Beta Kappa and has been the recipient of the NDSEG Graduate Fellowship and the Oak Ridge Associated Universities Ralph E. Powe Junior Faculty Enhancement Award. Errol G. Rowe received both B.S. and M.S. Degrees in Mathematics from The George Washington University, Washington, D.C. He received his Ph.D. Degree in Mathematics (with a concentration in Probability and Partial Differential Equations) from the University of Maryland at College Park in 1985. Prior to joining the warfare center, Dr. Rowe worked as a Mathematics professor at North Carolina Agricultural and Technical State University in Greensboro, NC and, as a Mathematical Statistician for the U.S. Department of Commerce. His research interests include distributed network systems for communications, large deviations and stochastic analysis. G. Clifford Carter received his B.S. degree in engineering science from the U.S. Coast Guard Academy and his M.S. and Ph.D. degrees from the University of Connecticut in electrical engineering. Dr. Carter has served as a technical area manager for the Office of the Chief of Naval Research. In 2002, he completed a tour at the Office of Naval Research where he managed the Sonar Automation Technology Program. He has authored numerous signal processing technical papers, holds more than nine U. S. patents, has co-authored work in the 1993 CRC Electrical Engineering Handbook and the 1996 CRC Electronics Engineering Handbook. He was author and editor for the benchmark IEEE text entitled Coherence and Time Delay Estimation, and has taught graduate level courses in electrical engineering. In addition, Dr. Carter is a Fellow of the Institute of Electrical and Electronics Engineers (IEEE) and a member of the Acoustical Society of America, the Senior Executive Association, the National Defense Industrial Association (NDIA), the U.S. Naval Institute, and the Navy Submarine League. Recently, he served on the organizing committee for the series of Submarine Acoustic Superiority Workshops hosted in Newport and cochaired the Signal Processing Working Group (SPWG), both of which efforts should have a significant impact in rapidly inserting processing improvements into fleet sonar systems. Dr. Carter was the recipient of the prestigious IEEE-USA Harry Diamond Award in March 2006 and was promoted in 2006 to the rank of ‘‘ST’’ the U. S. Government’s highest non-supervisory, senior technical professional position. Currently, he is employed at the Naval Undersea Warfare Center (NUWC) Division Newport.

728

J. K. Nelson et al.

References 1. D. Li, K. D. Wong, Y. H. Hu, and A. M. Sayeed, ‘‘Detection, classification, and tracking of targets,’’ IEEE Signal Processing Magazine, vol. 19, no. 2, pp. 17–29, March 2002. 2. J. -F. Chamberland and V. V. Veeravalli, ‘‘Wireless sensors in distributed detection applications,’’ IEEE Signal Processing Magazine, vol. 24, no. 3, pp. 16–25, 2007. 3. National Research Council, Distributed Remote Sensing for Naval Undersea Warfare, The National Academies Press, Washington, D.C., 2007. 4. E. Onur, C. Ersoy, and H. Delic, ‘‘Analysis of target detection probability in randomly deployed sensor networks,’’ IEEE Communications Letters, vol. 11, no. 10, October 2007. 5. S. Megerian, F. Koushanfar, M. Potkonjak, and M. B. Srivastava, ‘‘Worst and best-case coverage in sensor networks,’’ IEEE Transactions on Mobile Computing, vol. 4, no. 1, pp. 84–92, January/ February 2005. 6. D. P. Mehta, M. A. Lopez, and L. Lin, ‘‘Optimal coverage paths in ad-hoc sensor networks,’’ in Proceedings of the IEEE International Conference on Communications, May 2003, pp. 507–511. 7. S. S. Ram, D. Manjunath, S. K. Iyer, and D. Yogeshwaran, ‘‘On the path coverage properties of random sensor networks,’’ IEEE Transactions on Mobile Computing, vol. 6, no. 5, May 2007. 8. B. Liu and D. Towsley, ‘‘A study of the coverage of large-scale sensor networks,’’ in IEEE International Conference on Mobile Ad-hoc and Sensor Systems, October 2004, pp. 475–483. 9. T. Clouqueur, V. Phipatanasuphorn, P. Ramanathan, and K. K. Saluja, ‘‘Sensor deployment strategy for detection of targets traversing a region,’’ Mobile Networks and Applications, pp. 453–461, August 2003. 10. H. Cox, ‘‘Cumulative detection probabilities for a randomly moving source in a sparse field of sensors,’’ in Proceedings of the Twenty-Third Asilomar Conference on Signals, Systems, and Computers, October 1989, vol. 1, pp. 384–389. 11. C. M. Traweek and T. A. Wettergren, ‘‘Efficient sensor characteristic selection for cost-effective distributed sensor networks,’’ IEEE Journal of Oceanic Engineering, vol. 31, no. 2, pp. 480–486, April 2006. 12. E. G. Rowe and T. A. Wettergren, ‘‘Coverage and reliability of randomly distributed sensor systems with heterogeneous detection range,’’ International Journal on Distributed Sensor Networks, 2008, to appear. 13. S. Sakkottai, R. Srikant, and N. Shroff, ‘‘Unreliable sensor grids: Coverage, connectivity, and diameter,’’ in Proceedings of IEEE Infocom, 2003. 14. Peter Hall, Introduction to the Theory of Coverage Processes, John Wiley and Sons, New York, 1988. 15. S. Karlin and H. M. Taylor, A Second Course in Stochastic Processes, Academic Press, San Diego, CA, 1981. 16. N. Ahmed, S. S. Kanhere, and S. Jha, ‘‘Probabilistic coverage in wireless sensor networks,’’ in Proceedings of the IEEE Conference on Local Computer Networks, 2005. 17. S. S. Dhillon and K. Chakrabarty, ‘‘Sensor placement for effective coverage and surveillance in distributed sensor networks,’’ in Proceedings of IEEE Wireless Communications and Networking, March 2003, pp. 1609–1614. 18. S. Adlakha and M. Srivastava, ‘‘Critical density thresholds for coverage in wireless sensor networks,’’ in Proceedings of IEEE Wireless Communications and Networking, March 2003, pp. 1615–1620.