Professional Documents
Culture Documents
Drone Detection 18
Drone Detection 18
Abstract amateur drone surveillance has become a very Drones, also known as
important but largely unexplored area. As one mini-unmanned aerial
Drones, also known as mini-unmanned aerial well-known effort, the FAA published more than vehicles, have attracted
vehicles, have attracted increasing attention due 200 facility maps on 27 April 2017 to streamline
to their boundless applications in communications, the commercial drone authorization process,
increasing attention
photography, agriculture, surveillance, and numer- where the maps depict areas and altitudes near due to their boundless
ous public services. However, the deployment airports in which drones may operate safely [2]. applications in commu-
of amateur drones poses various safety, security, To keep watch on potential misbehaved drones, nications, photography,
and privacy threats. To cope with these challeng- the FAA is coordinating with government and agriculture, surveillance,
es, amateur drone surveillance has become a very industry partners to evaluate technologies that
important but largely unexplored topic. In this arti- could be used to detect drones in and around
and numerous public
cle, we first present a brief survey to show the state- airports. In parallel, regulatory activities for drones services. However, the
of-the-art studies on amateur drone surveillance. have also started around the world, such as the deployment of amateur
Then we propose a vision, named Dragnet, tailor- regulation proposal from the European Aviation drones poses various
ing the recently emerging Cognitive Internet of Safety Agency (EASA), which defines the tech- safety, security, and priva-
Things framework for amateur drone surveillance. nical and operational requirements for drones.
Next, we discuss the key enabling techniques for Technical requirements refer, for example, to the
cy threats. To cope with
Dragnet in detail, accompanied by the technical remote identification of drones, while operation- these challenges, amateur
challenges and open issues. Furthermore, we pro- al requirements refer to a system that ensures drone surveillance has
vide an exemplary case study on the detection drones do not fly in a prohibited zone [3]. become a very important
and classification of authorized and unauthorized In this article, we first present a brief survey but largely unexplored
amateur drones, where, for example, an important on the state-of-the-art studies on amateur drone
event is being held and only authorized drones are surveillance, where the existing anti-drone tech-
topic.
allowed to fly over. nologies and well-known anti-drone systems are
discussed. Then we propose a vision named Drag-
Introduction net1 by tailoring the recent emerging Cognitive
During the past few years, mini-unmanned aeri- Internet of Things framework for amateur drone
al vehicles (UAVs), also known as drones, have surveillance. Next, we discuss the key enabling
received increasing interest worldwide for their techniques accompanied by the technical chal-
numerous applications in communications, surveil- lenges and open issues ahead. Furthermore, we
lance, agriculture, photography, public services, provide an exemplary case study on the detection This work is supported by
and so on [1]. For instance, the registered num- and classification of authorized and unauthorized the National Natural Science
Foundation of China (Grant
ber of drones in use in the United States exceeded amateur drones from a multi-hypothesis testing No. 61501510 and No.
200,000 just in the first 20 days of January 2016, perspective. 61631020), Natural Science
after the Federal Aviation Administration (FAA) Foundation of Jiangsu Prov-
started requiring owners to sign up. However, the ince (Grant No. BK20150717),
Amateur Drone Surveillance: China Postdoctoral Science
deployment of drones, especially amateur drones, Foundation Funded Project
poses critical challenges. First of all, drones that State of the Art (Grant No. 2016M590398),
enter the airspace around airports can pose serious It is well known that military UAVs have been and Jiangsu Planned Projects
safety threats to conventional air traffic via physical used in the battlefield for several decades; howev- for Postdoctoral Research
Funds (Grant No. 1501009A).
collisions or wireless interference. Similarly, they er, the boundless applications of civilian or com-
can also bring various public risks to national insti- mercial drones have received worldwide interest 1 In this article, Dragnet takes its
tutions and assets (e.g., nuclear power plants, his- just in the past few years. Consequently, amateur name from a famous American
torical sites, and government buildings) because of drone surveillance is a relatively new and largely radio, television, and motion
picture series, enacting the
their ability to carry explosive and other destructive unexplored area. Intuitively, one can take lessons cases of a dedicated Los Ange-
chemicals or agents. Moreover, amateur drones from military anti-drone technologies, where the les police detective, Sergeant
are increasingly being used for spying/reconnais- majority of the existing related studies can be gen- Joe Friday, and his partners,
sance applications that violate military secrets and erally grouped into four classes: in this work meaning a system
of coordinated measures for
personal privacy (e.g., by taking photos/videos • Warning technique, where various detection apprehending criminals or
without permission). In addition, drones may cause devices such as ground cameras, sensors, suspects, with a by-product of
physical harm to people on the ground. and radars are deployed to perform early earning praise for improving
In order to cope with these challenges, warning on the presence of any drone [4] the public opinion of drone
surveillance.
Guoru Ding (corresponding author) and Linyuan Zhang are with the Army Engineering University of PLA; Guoru Ding is also with Southeast University; Qihui
Wu is with Nanjing University of Aeronautics and Astronautics; Yun Lin is with Harbin Engineering University; Theodoros A. Tsiftsis is with Nazarbayev University; Digital Object Identifier:
Yu-Dong Yao is with Stevens Institute of Technology. 10.1109/MCOM.2017.1700452
Anti-UAV Defense System (AUDS) AUDS is a smart-sensor and effector package 1) It has an electronic-scanning radar for target detection, an elec-
(http://www.blighter.com/products/auds-anti-uav- capable of remotely detecting small UAVs tro-optical vedio for tracking and classification, and a software defined
defence-system.html) and then tracking and classifying them before intelligent directional RF inhibitor; 2) detection range: 10 km; 3)
providing the option to disrupt their activity. minimum target size: 0.01 ms2; 4) works in various weather conditions,
24 hours a day.
Dedrone: Automatic Anti-Drone Security Dedrone is an airspace security platform that 1) It enables airspace surveillance 24/7; 2) automated alarm and
(https://www.dedrone.com/en/) detects, classifies, and mitigates all drone notification; 3) multi-sensor analysis: RF sensor and video sensor;
threats. 4) DroneDNA analysis and pattern recognition capabilities for drone
classification.
The U.S. Army’s Enhanced Area Protection and The EAPS is a missile-based counter rocket, 1) It uses a 50 mm cannon to launch command guided interceptors,
Survivability (EAPS) Technology artillery, and mortar defence system, which and uses a precision tracking radar interferometer as a sensor, a fire
(http://www.army-technology.com/news/new- has been expanded to include threats from control computer, and an RF transmitter and receiver to launch the
sus-army-engineers-demonstrate-eaps-capabili- unmanned aircraft systems or drones. projectile into an engagement “basket”; 2) computations are done on
ty-to-counter-uas-threats-4688379) the ground, and the RF sends the information up to the round.
Boeing’s Compact Laser Weapons System CLWS is a laser weapon system that can be 1) It is portable and can be assembled in 15 minutes; 2) it can destroy
(CLWS) Tracks and Disables UAVs used to acquire, track, and identify a target, or targets such as UAVs from 22 miles away, 20 pounds in 10 seconds
(http://www.boeing.com/features/2015/08/ even destroy it. with an energy beam of up to 10 kW.
bds-compact-laser-08-15.page)
Table 1. A brief summary of several well-known anti-drone systems.
Sensing
where (physical/virtual) things or objects are inter- ...
connected and behave as agents, with minimum
human intervention, the things interact with each
other following a context-aware perception-ac- Fog nodes
tion cycle, use the methodology of understand-
ing-by-building to learn from both the physical
Data input
semantic and/or knowledge in kinds of databases,
and adapt themselves to changes or uncertainties
via resource-efficient decision-making mechanisms, System
orchestrator
with two primary objectives in mind: Data Data Decision
• Bridging the physical world (with objects, Cloud center storage processing making
resources, etc.) and the social world (with
human demand, social behavior, etc.), togeth-
er with themselves to form an intelligent
physical-cyber-social (iPCS) system
• Enabling smart resource allocation, automat- Figure 1. Illustration of a joint fog-to-cloud computing framework for Drag-
ic network operation, and intelligent service net-based amateur drone surveillance.
provisioning”
• The mobility of mobile devices enables ubiq-
The Vision: Dragnet uitous surveillance coverage.4
Now, we introduce a new vision for amateur Figure 2 presents the functional diagram of
drone surveillance, Dragnet, in order to empow- Dragnet-based amateur drone surveillance. Gen-
er amateur drone surveillance with a “brain” erally, Dragnet serves as a transparent bridge
for high-level intelligence by tailoring the recent between the physical world (with general phys-
advances in cognitive IoT. Dragnet refers to a sys- ical/virtual things, amateur drones, authorized
tem of coordinated measures for apprehending drones, birds, etc.) and the social world (human
criminals or suspects, with a by-product of earn- demand, social behavior, etc.), which, together
ing praise for improving public opinion of regula- with itself, form an intelligent amateur drone sur-
tion-obeying amateur drone operations. veillance system. With a synthetic methodology
As shown in Fig. 1, in the proposed Drag- of learning by understanding located at its heart,
net-based amateur drone surveillance, there is Dragnet consists of four key fundamental cogni-
a joint fog-to-cloud computing hardware frame- tive tasks, sequentially:
work. Specifically, various active and passive sur- • Sensing
veillance devices (e.g., cameras, sensors, radars, • Data analytics
and drones) or crowds of people serve as local • Semantic derivation and knowledge discov-
fog computing3 platforms to sense the environ- ery
ment and locally warn about the presence of • Intelligent decision making
amateur drone, while a cloud center acts as a Briefly, sensing is the most primitive cognitive
system orchestrator that integrates the data from task in Dragnet, which serves as the input from
various fog nodes, stores and analyzes these data, both the physical environment and the social
and makes global decision-making on the pres- networks via various active and passive surveil- 3 According to [10], fog com-
ence of amateur drone as well as actions (e.g., lance devices (e.g., cameras, sensors, radars) puting is a term for an alterna-
tive to cloud computing that
jamming, capturing or destroy) on them. Nota- or crowds of people. Data analytics is a core puts a substantial amount
bly, for the problem of amateur drone surveil- cognitive task that performs intruder detection, of storage, communication,
lance, we declare that both machine and human localization, and tracking of amateur drones via control, configuration, mea-
crowd intelligence can be employed to achieve mining kinds of surveillance data. Semantic deri- surement, and management at
the edge of a network, rather
hybrid surveillance diversity and enable full-time- vation and knowledge discovery is the cognitive than establishing channels for
full-space surveillance. Generally, machines (e.g., task that aims to make the objects in Dragnet centralized cloud storage and
cameras, sensors, radars) have relatively high self-understand and be aware, and to enable utilization, which extends the
surveillance accuracy, but the number of them is them to automatically derive the semantics from traditional cloud computing
paradigm to the network edge.
limited. A large crowd of people can contribute analyzed data; also, based on the analyzed data
surveillance data, for example, in mobile crowd- and semantics, some valuable patterns or rules 4 An interesting issue is the
sensing [11], where individuals with sensing and can be discovered as knowledge as well, which design of incentive mecha-
computing devices (e.g., smartphones, in-vehicle is a necessity for objects in Dragnet to be intel- nisms for mobile crowdsens-
ing. Similar issues have been
sensors) collectively share data and extract infor- ligent. Finally, decision making is another core extensively studied in the lit-
mation to measure and map phenomena on the cognitive task that makes global decisions on the erature, and the majority of
presence of any amateur drone. The unique fea- presence of amateur drones as well as actions existing mechanisms can be
tures of mobile crowdsensing include (but are not (e.g., jamming, capturing, or destroying) to con- broadly classified into four
groups: volunteer-based, inter-
limited to): trol them. est-based, honor-based, and
• The large population of mobile devices bring money-based. For the prob-
massive surveillance data, especially for Key Enabling Technologies for Dragnet lem of interests in this article,
large-scale events (e.g., a hot sports event) To enable the cognitive tasks in Dragnet, there the government agency can
probably distribute an app and
and activities (e.g., a festival or rally), where are many techniques. As shown in Fig. 3, among provide some honors or a little
each person has one or more mobile devic- many others, the key enabling technologies for money to encourage people to
es with which to acquire and report data. Dragnet mainly include detection, localization, share their surveillance data.
Sensing
(sensor, radars, cameras, Decision making
smartphones, . . .) (control, jamming, . . .)
Regulations
Cyber world
Learning-by-
understanding
Social networks
Social world (crowd of people, crowd sensing, incentive
mechanism, data quality, . . .)
2 )
0.8
2 |H
There are several unique features for the local- N = 600
0.8
Conclusion
This article develops an amateur drone surveil-
400 0.75 lance system based on cognitive IoT. We first pres-
ent a brief survey on the state-of-the-art studies on
0.7 anti-drone techniques. Then we propose a vision
0.65 named Dragnet by tailoring the recently emerg-
300 ing cognitive IoT framework for amateur drone
0.6 surveillance. Next, the key enabling techniques
accompanied with the technical challenges and
0.55 open issues ahead are discussed. Furthermore, an
200 exemplary simulation on the detection of an ille-
5 10 15 20 25 gal amateur drone is provided. We firmly believe
The number of sensors this important area will be a fruitful research
direction, and we have just touched the tip of the
Figure 5. The impact of the number of sensors and the number of samples on iceberg. We hope this article will stimulate much
the drone detection and classification performance. more research interest.
References
where Pr(Hi|Hi), i {0, 1} is the probability of Hi [1] N. H. Motlagh, T. Taleb, and O. Arouk, “Low-Altitude
being correctly detected. As shown in Eq. 1, the Unmanned Aerial Vehicles-Based Internet of Things Ser-
vices: Comprehensive Survey and Future Perspectives,” IEEE
objective is to maximize the probability of cor- Internet of Things J., vol. 3, no. 6, Dec. 2016.
rectly detecting the presence of the unauthorized [2] FAA, “FAA Publishes First Set of UAS Facility Maps,” FAA
amateur drone Pr(H2|H2), while the constraints News & Updates, Apr. 27, 2017; https://www.faa.gov/
are set to control the false alarms. Specifically, news/updates/?newsId=87945, accessed 13 Aug. 2017.
[3] EASA, “Proposal to Create Common Rules for Operating
the false alarm probability 1 – Pr(H 0|H 0) = Pr Drones,” Cologne, Germany, Sept. 2015; http://easa.
(H 1|H 0) + Pr(H 2|H 0) corresponds to the case europa.eu/newsroom-andevents/News/easa-regulatory-ap-
when an authorized or unauthorized drone is proach-remotely-piloted-aircraft-rpas, accessed 13 Aug.
falsely detected while there is no drone pres- 2017.
[4] S. Wong, R. Jassemi-Zargani, and B. Kim, “Counter-Measures
ent. Similarly, the false alarm probability 1 – Pr Against Drone Surveillance,” Defence Research and Devel-
(H1|H1) = Pr(H2|H1) + Pr(H0|H1) corresponds opment Canada-Ottawa Research Centre, ref. doc. DRDC-
to a false alarm when an unauthorized drone is RDDC-2016-D019, May 2016.
falsely detected or no drone is detected while [5] D. P. Shepard, J. A. Bhatti, and T. E. Humphreys, “Drone
Hack: Spoofing Attack Demonstration on a Civilian
there is an authorized drone present. Unmanned Aerial Vehicle,” GPS World, Aug. 2012; http://
Generally, we hope that the detection prob- gpsworld.com/drone-hack/, accessed 13 Aug. 2017.
ability Pr(H 2|H 2) is as large as possible, while [6] R. Altawy and A. M. Youssef, “Security, Privacy, and Safe-
the two false alarm probabilities are as small as ty Aspects of Civilian Drones: A Survey,” ACM Trans.
Cyber-Physical Systems, vol. 1, no. 2, Nov. 2016 , pp.
possible. However, there is a trade-off between 1–25.
them, as shown in the simulation results of Fig. 4. [7] N. Cohen and A. Shelman-Cohen, “Drone Mitigation
The probability of an unauthorized drone being Methods and Apparatus,” U.S. Patent Application No.
correctly detected increases always at the price 15/219,137, July 2016.
[8] A. A. Khan, M. H. Rehmani, and A. Rachedi, “Cognitive
of an increase of false alarms a and b, and vice Radio Based Internet of Things: Applications, Architectures,
versa. Specifically, in this figure, we propose a Spectrum Related Functionalities, and Future Research
generalized likelihood ratio test scheme (the Directions,” IEEE Wireless Commun., vol. 24, no. 3, June
“proposed scheme” in Fig. 4) to present a solu- 2017, pp. 17–25.
[9] Q. Wu et al., “Cognitive Internet of Things: A New Paradigm
tion to the optimization problem in Eq. 1, which Beyond Connection,” IEEE Internet of Things J., vol. 1, no. 2,
considers the fact that the unknown character- Apr. 2014, pp. 129–43.
istics of the unauthorized drones makes H 2 a [10] M. Peng et al., “Fog-Computing-Based Radio Access Net-
composite hypothesis. For the purpose of perfor- works: Issues and Challenges,” IEEE Network, vol. 30, no. 4,
July/Aug. 2016, pp. 46-53.
mance comparison, we also present a genie-adied [11] R. K. Ganti, F. Ye, and H. Lei, “Mobile Crowdsensing: Cur-
scheme where the distributions of the received rent State and Future Challenges,” IEEE Commun. Mag., vol.
signal strength from both the authorized drone 49, no. 11, Nov. 2011, pp. 32–39.
and the unauthorized drones are known a priori. [12] Y. Saleem and M. H. Rehmani, “Primary Radio User Activ-
ity Models for Cognitive Radio Networks: A Survey,” J.
We can see that the detection performance of Network and Computer Applications, vol. 43, 2014, pp.
both schemes can be improved by increasing the 1–16.
number of samples N, which corresponds to an [13] F. Akhtar, M. H. Rehmani, and M. Reisslein, “White Space:
increase of the detection delay. Definitional Perspectives and Their Role in Exploiting Spec-
trum Opportunities,” Telecommun. Policy, vol. 40, no. 4,
To further improve the drone detection and 2016, pp. 319–31.
classification performance, in the simulation results [14] S. G. Iyengar, P. K. Varshney, and T. Damarla, “A Paramet-
of Fig. 5, we study the impact of the number of ric Copula-Based Framework for Hypothesis Testing Using
sensors and the number of samples for the given Heterogeneous Data,” IEEE Trans. Signal Proc., vol. 59, no. 5,
May 2011, pp. 2308–19.
false alarm constraints. It is shown that as the [15] M. Amjad et al., “Full-Duplex Communication in Cognitive
number of samples and the number of sensors Radio Networks: A Survey,” IEEE Commun. Surveys & Tutori-
increase, the global detection probability increases. als; Early Access, IEEEXplore, 2017.