Skip to main content

Information Theory Based Opportunistic Sensing in Radar Sensor Networks

  • Conference paper
  • 2059 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 8491))

Abstract

In this paper, we propose to use information theory to automatically select the best sensors in a Ultra Wide Band (UWB) Radar Sensor Networks (RSN) to detect target in foliage environment. Information theoretic algorithms such as entropy and mutual information are proven methods that can be applied to data collected by various sensors for target detection. However, the complexity of the environment brings uncertainty in fusion center and the big data collected by sensors can have huge processing load. In this paper, we propose to use another information theoretical criterion known as Chernoff information that can provide the best error exponent of detection in Bayesian approach. We also used Chernoff Stein Lemma for fusing the data to optimize the performance. The performance of the algorithm was evaluated, based on real world data. Results show that our opportunistic sensing (OS) algorithm does efficient utilization of sensing assets and provide same performance while it is compared with the existing method without OS.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Maherin, I., Liang, Q.: An Entropy Based Approach for Sense- through Foliage Target Detection using UWB Radar. In: Cheng, Y., Eun, D.Y., Qin, Z., Song, M., Xing, K. (eds.) WASA 2011. LNCS, vol. 6843, pp. 180–189. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  2. Maherin, I., Liang, Q.: A mutual information based approach for target detection through foliage using UWB radar. In: IEEE Int. Conf. Commun. (ICC), June 10-15, pp. 6406–6410 (2012)

    Google Scholar 

  3. Fabeck, G., Mathar, R.: Chernoff information-based optimization of sensor networks for distributed detection. In: IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), December 14-17, pp. 606–611 (2009)

    Google Scholar 

  4. Misra, S., Tong, L., Ephremides, A.: Error Exponents for Target-Class Detection in a Sensor Network. In: IEEE Conf. Military Commun. (MILCOM), October 23-25, pp. 1–7 (2006)

    Google Scholar 

  5. Sadler, B.M., Swami, A.: On the performance of episodic UWB and direct-sequence communication systems. IEEE Transactions on Wireless Communications 3(6), 2246–2255 (2004)

    Article  Google Scholar 

  6. Lee, Y., Sung, Y.: Generalized Chernoff Information for Mismatched Bayesian Detection and Its Application to Energy Detection. IEEE Signal Processing Letters 19(11), 753–756 (2012)

    Article  Google Scholar 

  7. Liang, Q.: Radar Sensor Wireless Channel Modeling in Foliage Environment: UWB Versus Narrowband. IEEE Sensors J. 11(6), 1448–1457 (2011)

    Article  Google Scholar 

  8. Liang, Q.: Automatic Target Recognition Using Waveform Diversity in Radar Sensor Networks. Pattern Recognition Letters (Elsevier) 29(2), 377–381 (2008)

    Google Scholar 

  9. Liang, Q., Cheng, X.: KUPS: Knowledge-based Ubiquitous and Persistent Sensor networks for Threat Assessment. IEEE Transactions on Aerospace and Electronic Systems 44(3) (July 2008)

    Google Scholar 

  10. Carbunar, B., Grama, A., Vitek, J., Carbunar, O.: “Coverage Preserving Redundancy Elimination in Sensor Networks. In: IEEE SECON 2004 (October 2004)

    Google Scholar 

  11. Liang, Q., Wang, L.: Redundancy Reduction in Wireless Sensor Networks Using SVD-QR. In: IEEE Military Communication Conference, Atlantic City, NJ (October 2005)

    Google Scholar 

  12. Liang, Q., Cheng, X., Chen, D.: Opportunistic Sensing in Wireless Sensor networks: Theory and Application. In: IEEE Global Telecommunications Conference (GLOBECOM 2011), pp. 1–5 (December 2011)

    Google Scholar 

  13. Liang, Q., Cheng, X., Huang, S., Chen, D.: Opportunistic Sensing in Wireless Sensor networks: Theory and Application. Accepted by IEEE Trans. on Computers

    Google Scholar 

  14. Aughenbaugh, J.M., La Cour, B.R.: Metric selection for information theoretic sensor management. In: 11th Int. Conf. Information Fusion, June 30-July 3, pp. 1–8 (2008)

    Google Scholar 

  15. Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley-Interscience Press, New York (1991)

    Book  MATH  Google Scholar 

  16. Dill, C.: Foliage Penetration (phase II) Field Test Narrow band vesus Wideband Foliage Penetration. Final report of contract number F41624-03-D-700/04 (July to February 2006)

    Google Scholar 

  17. Liang, J., Liang, Q.: Sense-through-foliage target detection using uwb radar sensor networks. Pattern Recognition Letters 31, 1412–1421 (2010)

    Article  Google Scholar 

  18. Liang, Q., Samn, S.W., Cheng, X.: UWB radar sensor networks for sensethrough-foliage target detection. In: IEEE International Conference on Communications, pp. 2228–2232 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Maherin, I., Liang, Q. (2014). Information Theory Based Opportunistic Sensing in Radar Sensor Networks. In: Cai, Z., Wang, C., Cheng, S., Wang, H., Gao, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2014. Lecture Notes in Computer Science, vol 8491. Springer, Cham. https://doi.org/10.1007/978-3-319-07782-6_63

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07782-6_63

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07781-9

  • Online ISBN: 978-3-319-07782-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics