Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

AMATEUR DRONE SURVEILLANCE: APPLICATIONS, ARCHITECTURES,

ENABLING TECHNOLOGIES, AND PUBLIC SAFETY ISSUES

An Amateur Drone Surveillance System


Based on the Cognitive Internet of Things
Guoru Ding, Qihui Wu, Linyuan Zhang, Yun Lin, Theodoros A. Tsiftsis, and Yu-Dong Yao

Abstract amateur drone surveillance has become a very Drones, also known as
important but largely unexplored area. As one mini-unmanned aerial
Drones, also known as mini-unmanned aerial well-known effort, the FAA published more than vehicles, have attracted
vehicles, have attracted increasing attention due 200 facility maps on 27 April 2017 to streamline
to their boundless applications in communications, the commercial drone authorization process,
increasing attention
photography, agriculture, surveillance, and numer- where the maps depict areas and altitudes near due to their boundless
ous public services. However, the deployment airports in which drones may operate safely [2]. applications in commu-
of amateur drones poses various safety, security, To keep watch on potential misbehaved drones, nications, photography,
and privacy threats. To cope with these challeng- the FAA is coordinating with government and agriculture, surveillance,
es, amateur drone surveillance has become a very industry partners to evaluate technologies that
important but largely unexplored topic. In this arti- could be used to detect drones in and around
and numerous public
cle, we first present a brief survey to show the state- airports. In parallel, regulatory activities for drones services. However, the
of-the-art studies on amateur drone surveillance. have also started around the world, such as the deployment of amateur
Then we propose a vision, named Dragnet, tailor- regulation proposal from the European Aviation drones poses various
ing the recently emerging Cognitive Internet of Safety Agency (EASA), which defines the tech- safety, security, and priva-
Things framework for amateur drone surveillance. nical and operational requirements for drones.
Next, we discuss the key enabling techniques for Technical requirements refer, for example, to the
cy threats. To cope with
Dragnet in detail, accompanied by the technical remote identification of drones, while operation- these challenges, amateur
challenges and open issues. Furthermore, we pro- al requirements refer to a system that ensures drone surveillance has
vide an exemplary case study on the detection drones do not fly in a prohibited zone [3]. become a very important
and classification of authorized and unauthorized In this article, we first present a brief survey but largely unexplored
amateur drones, where, for example, an important on the state-of-the-art studies on amateur drone
event is being held and only authorized drones are surveillance, where the existing anti-drone tech-
topic.
allowed to fly over. nologies and well-known anti-drone systems are
discussed. Then we propose a vision named Drag-
Introduction net1 by tailoring the recent emerging Cognitive
During the past few years, mini-unmanned aeri- Internet of Things framework for amateur drone
al vehicles (UAVs), also known as drones, have surveillance. Next, we discuss the key enabling
received increasing interest worldwide for their techniques accompanied by the technical chal-
numerous applications in communications, surveil- lenges and open issues ahead. Furthermore, we
lance, agriculture, photography, public services, provide an exemplary case study on the detection This work is supported by
and so on [1]. For instance, the registered num- and classification of authorized and unauthorized the National Natural Science
Foundation of China (Grant
ber of drones in use in the United States exceeded amateur drones from a multi-hypothesis testing No. 61501510 and No.
200,000 just in the first 20 days of January 2016, perspective. 61631020), Natural Science
after the Federal Aviation Administration (FAA) Foundation of Jiangsu Prov-
started requiring owners to sign up. However, the ince (Grant No. BK20150717),
Amateur Drone Surveillance: China Postdoctoral Science
deployment of drones, especially amateur drones, Foundation Funded Project
poses critical challenges. First of all, drones that State of the Art (Grant No. 2016M590398),
enter the airspace around airports can pose serious It is well known that military UAVs have been and Jiangsu Planned Projects
safety threats to conventional air traffic via physical used in the battlefield for several decades; howev- for Postdoctoral Research
Funds (Grant No. 1501009A).
collisions or wireless interference. Similarly, they er, the boundless applications of civilian or com-
can also bring various public risks to national insti- mercial drones have received worldwide interest 1 In this article, Dragnet takes its

tutions and assets (e.g., nuclear power plants, his- just in the past few years. Consequently, amateur name from a famous American
torical sites, and government buildings) because of drone surveillance is a relatively new and largely radio, television, and motion
picture series, enacting the
their ability to carry explosive and other destructive unexplored area. Intuitively, one can take lessons cases of a dedicated Los Ange-
chemicals or agents. Moreover, amateur drones from military anti-drone technologies, where the les police detective, Sergeant
are increasingly being used for spying/reconnais- majority of the existing related studies can be gen- Joe Friday, and his partners,
sance applications that violate military secrets and erally grouped into four classes: in this work meaning a system
of coordinated measures for
personal privacy (e.g., by taking photos/videos • Warning technique, where various detection apprehending criminals or
without permission). In addition, drones may cause devices such as ground cameras, sensors, suspects, with a by-product of
physical harm to people on the ground. and radars are deployed to perform early earning praise for improving
In order to cope with these challenges, warning on the presence of any drone [4] the public opinion of drone
surveillance.
Guoru Ding (corresponding author) and Linyuan Zhang are with the Army Engineering University of PLA; Guoru Ding is also with Southeast University; Qihui
Wu is with Nanjing University of Aeronautics and Astronautics; Yun Lin is with Harbin Engineering University; Theodoros A. Tsiftsis is with Nazarbayev University; Digital Object Identifier:
Yu-Dong Yao is with Stevens Institute of Technology. 10.1109/MCOM.2017.1700452

IEEE Communications Magazine • January 2018 0163-6804/18/$25.00 © 2018 IEEE 29


Systems Functions Advantages and Limitations

Anti-UAV Defense System (AUDS) AUDS is a smart-sensor and effector package 1) It has an electronic-scanning radar for target detection, an elec-
(http://www.blighter.com/products/auds-anti-uav- capable of remotely detecting small UAVs tro-optical vedio for tracking and classification, and a software defined
defence-system.html) and then tracking and classifying them before intelligent directional RF inhibitor; 2) detection range: 10 km; 3)
providing the option to disrupt their activity. minimum target size: 0.01 ms2; 4) works in various weather conditions,
24 hours a day.

Dedrone: Automatic Anti-Drone Security Dedrone is an airspace security platform that 1) It enables airspace surveillance 24/7; 2) automated alarm and
(https://www.dedrone.com/en/) detects, classifies, and mitigates all drone notification; 3) multi-sensor analysis: RF sensor and video sensor;
threats. 4) DroneDNA analysis and pattern recognition capabilities for drone
classification.

The U.S. Army’s Enhanced Area Protection and The EAPS is a missile-based counter rocket, 1) It uses a 50 mm cannon to launch command guided interceptors,
Survivability (EAPS) Technology artillery, and mortar defence system, which and uses a precision tracking radar interferometer as a sensor, a fire
(http://www.army-technology.com/news/new- has been expanded to include threats from control computer, and an RF transmitter and receiver to launch the
sus-army-engineers-demonstrate-eaps-capabili- unmanned aircraft systems or drones. projectile into an engagement “basket”; 2) computations are done on
ty-to-counter-uas-threats-4688379) the ground, and the RF sends the information up to the round.

Boeing’s Compact Laser Weapons System CLWS is a laser weapon system that can be 1) It is portable and can be assembled in 15 minutes; 2) it can destroy
(CLWS) Tracks and Disables UAVs used to acquire, track, and identify a target, or targets such as UAVs from 22 miles away, 20 pounds in 10 seconds
(http://www.boeing.com/features/2015/08/ even destroy it. with an energy beam of up to 10 kW.
bds-compact-laser-08-15.page)
Table 1. A brief summary of several well-known anti-drone systems.

• Spoofing technique, where electronic, opti- Dragnet: Cognitive-Internet-of-Things-


cal, and/or infrared technologies are used
to send false signals for abducting drones to Enabled Amateur Drone Surveillance
land, with GPS spoofing as a typical example The majority of related works have focused on
[5] how to enable various individual surveillance
• Jamming technique, where the control and devices or systems to see, hear, and sense the
navigation information is disturbed by posing physical world for drone surveillance. Connect-
strong interference via, for example, an elec- ing surveillance devices or systems to share
tromagnetic gun, which makes the automat- observations and accomplish information fusion
ic driving system and/or the communication represents a research trend. In this article, we
system of drones become invalid [6] argue that only being connected is not enough;
• Mitigation technique, where drones can be beyond that, surveillance devices should have the
destroyed or captured, mainly in emergen- capability to learn, think, and understand both
cies, by micro-missile, laser, arrest net, and so the physical and social worlds by themselves.
on [7] This practical need impels us to develop a new
More interestingly, there are already several vision, named Dragnet, that is, Cognitive-Inter-
anti-drone systems that utilize the above technol- net-of-Things-enabled amateur drone surveillance,
ogies. To facilitate general readers, in Table 1, we in order to empower amateur drone surveillance
present a brief summary of several well-known anti- with a “brain” for high-level intelligence.2 Before
drone systems, where the key functionalities and going deep into the new vision of Dragnet and
the useful link for each system are listed for refer- its enabling techniques, let us first share a brief
ence. Notably, we do not try to present a compre- background on the Cognitive Internet of Things to
hensive survey here; it is expected that many more facilitate general readers.
anti-drone systems are being developed all over the
world. Cognitive Internet of Things
Although the existing anti-drone technologies The Internet of Things (IoT) is a technological
and systems can serve as a good starting point revolution that brings us into a new ubiquitous
for the research on amateur drone surveillance, connectivity, computing, and communication
2 In this article, the terms
“brain,” “intelligence,” “learn-
there are still many issues open to solutions. era. In the past decade, we have witnessed
ing,” and “global decision” are First of all, amateur drones are generally small in worldwide efforts on the research and develop-
mentioned. As their names size and lightweight, and they appear suddenly, ment of IoT from the academic community, ser-
imply, they are closely related which makes them hard to detect. Second, the vice providers, network operators, and standards
with the hot fields of artificial
intelligence and machine learn-
integration of artificial intelligence and advanced development organizations. Technically, most
ing, where various mathematic materials into the design of future amateur drones of the attention has been focused on aspects
tools (statistics, optimization, will significantly improve their capability in count- such as communication, computing, control, and
game theory, etc.) have been er-capture and stealth. Third, most of the existing connectivity [8], which are indeed very import-
invoked to develop power-
ful algorithms, with Alphago
anti-drone technologies are designed for specific ant topics. However, without comprehensive
known as a recent big success drones or scenarios via relatively few technical cognitive capability, IoT is just like an awkward
to challenge and defeat the methods, which limits their applications and gen- stegosaurus: all brawn and no brains. To fulfill
human Go champion. Simi- eralization. The corresponding anti-drone systems its potential and deal with growing challeng-
larly, there is a clear trend to
bridge the research between
are designed in isolation for specific military or es, in our previous work [9], we proposed to
wireless communications and civilian purposes, which lack networked informa- take the cognitive capability into consideration
artificial intelligence. tion processing capability. and empower IoT with high-level intelligence,

30 IEEE Communications Magazine • January 2018


and develop an enhanced IoT paradigm (i.e., Amateur drone
Environment
brain-empowered IoT or cognitive IoT) as fol-
lows [9]:
“Cognitive IoT is a new network paradigm,

Sensing
where (physical/virtual) things or objects are inter- ...
connected and behave as agents, with minimum
human intervention, the things interact with each
other following a context-aware perception-ac- Fog nodes
tion cycle, use the methodology of understand-
ing-by-building to learn from both the physical

Control and feedback


Camera Radar Sensor Surveillance drone Crowd of people
environment and social networks, store the learned

Data input
semantic and/or knowledge in kinds of databases,
and adapt themselves to changes or uncertainties
via resource-efficient decision-making mechanisms, System
orchestrator
with two primary objectives in mind: Data Data Decision
• Bridging the physical world (with objects, Cloud center storage processing making
resources, etc.) and the social world (with
human demand, social behavior, etc.), togeth-
er with themselves to form an intelligent
physical-cyber-social (iPCS) system
• Enabling smart resource allocation, automat- Figure 1. Illustration of a joint fog-to-cloud computing framework for Drag-
ic network operation, and intelligent service net-based amateur drone surveillance.
provisioning”
• The mobility of mobile devices enables ubiq-
The Vision: Dragnet uitous surveillance coverage.4
Now, we introduce a new vision for amateur Figure 2 presents the functional diagram of
drone surveillance, Dragnet, in order to empow- Dragnet-based amateur drone surveillance. Gen-
er amateur drone surveillance with a “brain” erally, Dragnet serves as a transparent bridge
for high-level intelligence by tailoring the recent between the physical world (with general phys-
advances in cognitive IoT. Dragnet refers to a sys- ical/virtual things, amateur drones, authorized
tem of coordinated measures for apprehending drones, birds, etc.) and the social world (human
criminals or suspects, with a by-product of earn- demand, social behavior, etc.), which, together
ing praise for improving public opinion of regula- with itself, form an intelligent amateur drone sur-
tion-obeying amateur drone operations. veillance system. With a synthetic methodology
As shown in Fig. 1, in the proposed Drag- of learning by understanding located at its heart,
net-based amateur drone surveillance, there is Dragnet consists of four key fundamental cogni-
a joint fog-to-cloud computing hardware frame- tive tasks, sequentially:
work. Specifically, various active and passive sur- • Sensing
veillance devices (e.g., cameras, sensors, radars, • Data analytics
and drones) or crowds of people serve as local • Semantic derivation and knowledge discov-
fog computing3 platforms to sense the environ- ery
ment and locally warn about the presence of • Intelligent decision making
amateur drone, while a cloud center acts as a Briefly, sensing is the most primitive cognitive
system orchestrator that integrates the data from task in Dragnet, which serves as the input from
various fog nodes, stores and analyzes these data, both the physical environment and the social
and makes global decision-making on the pres- networks via various active and passive surveil- 3 According to [10], fog com-

ence of amateur drone as well as actions (e.g., lance devices (e.g., cameras, sensors, radars) puting is a term for an alterna-
tive to cloud computing that
jamming, capturing or destroy) on them. Nota- or crowds of people. Data analytics is a core puts a substantial amount
bly, for the problem of amateur drone surveil- cognitive task that performs intruder detection, of storage, communication,
lance, we declare that both machine and human localization, and tracking of amateur drones via control, configuration, mea-
crowd intelligence can be employed to achieve mining kinds of surveillance data. Semantic deri- surement, and management at
the edge of a network, rather
hybrid surveillance diversity and enable full-time- vation and knowledge discovery is the cognitive than establishing channels for
full-space surveillance. Generally, machines (e.g., task that aims to make the objects in Dragnet centralized cloud storage and
cameras, sensors, radars) have relatively high self-understand and be aware, and to enable utilization, which extends the
surveillance accuracy, but the number of them is them to automatically derive the semantics from traditional cloud computing
paradigm to the network edge.
limited. A large crowd of people can contribute analyzed data; also, based on the analyzed data
surveillance data, for example, in mobile crowd- and semantics, some valuable patterns or rules 4 An interesting issue is the
sensing [11], where individuals with sensing and can be discovered as knowledge as well, which design of incentive mecha-
computing devices (e.g., smartphones, in-vehicle is a necessity for objects in Dragnet to be intel- nisms for mobile crowdsens-
ing. Similar issues have been
sensors) collectively share data and extract infor- ligent. Finally, decision making is another core extensively studied in the lit-
mation to measure and map phenomena on the cognitive task that makes global decisions on the erature, and the majority of
presence of any amateur drone. The unique fea- presence of amateur drones as well as actions existing mechanisms can be
tures of mobile crowdsensing include (but are not (e.g., jamming, capturing, or destroying) to con- broadly classified into four
groups: volunteer-based, inter-
limited to): trol them. est-based, honor-based, and
• The large population of mobile devices bring money-based. For the prob-
massive surveillance data, especially for Key Enabling Technologies for Dragnet lem of interests in this article,
large-scale events (e.g., a hot sports event) To enable the cognitive tasks in Dragnet, there the government agency can
probably distribute an app and
and activities (e.g., a festival or rally), where are many techniques. As shown in Fig. 3, among provide some honors or a little
each person has one or more mobile devic- many others, the key enabling technologies for money to encourage people to
es with which to acquire and report data. Dragnet mainly include detection, localization, share their surveillance data.

IEEE Communications Magazine • January 2018 31


Physical environment
Physical world (amateur drones, authorized drones, birds, . . .)

Sensing
(sensor, radars, cameras, Decision making
smartphones, . . .) (control, jamming, . . .)

Regulations

Cyber world
Learning-by-
understanding

Semantic derivation and


Data anlytics knowledge discovery
(data fusion and intruder detection, (context, association analysis,
localization, tracking) outlier analysis, . . .)

Social networks
Social world (crowd of people, crowd sensing, incentive
mechanism, data quality, . . .)

Figure 2. Functional diagram of Dragnet-based amateur drone surveillance.

between a small drone and small birds or other


Detection Localization sources of clutter. Moreover, radar detection has
•Quickest detection
•Robust detection
•3D localization
•Passive localization
the requirement of continuous transmission of
•Heterogeneous data fusion •Cooperative positioning RF radiation. In an urban environment setting,
•... •... placing a radar transmitter close to where peo-
ple work and live may raise radiation health con-
Key enabling cerns. Using RF signals emitted by the drone is
techniques seen as another effective way to detect drones,
Amateur drone
surveillance
Machine
learning
while a drawback is that it must rely on targets to
transmit RF emissions.5
Heterogeneous Data Fusion: In order to
improve the drone detection performance, it is nat-
Control Tracking
•Directional jamming •Context-aware tracking ural to combine the capability of different detection
•Safe catching •Trajectory filtering approaches for achieving diversity gain. Howev-
•Drone classification •Behavior prediction er, one challenge is to perform data fusion with
•... •...
heterogeneous sensors. Mathematically, random
variables that characterize the data from hetero-
Figure 3. Key enabling techniques for amateur drone surveillance.
geneous sensors may follow disparate probability
distributions. Performing optimal data fusion needs
tracking, and control. In this section, we present the joint probability density function of the hetero-
an overview on each of the key enabling tech- geneous dataset. One often chooses to assume
niques accompanied with the technical challeng- simple models such as the product model or mul-
es and open issues ahead. tivariate Gaussian model, which lead to suboptimal
solutions. Copula theory shows another approach
Detection to tackle heterogeneous data fusion, where the
Considering the fact that amateur drones gen- copulas function couples multivariate joint distribu-
erally fly at low altitude, there are a number of tions to their marginal distribution functions [14].
different approaches to drone detection: audio Quickest Detection: Accuracy of detection is
detection, video detection, thermal detection, a basic requirement of an amateur drone surveil-
radar detection, RF detection, and so on [4]. lance system. However, accurate detection is gen-
However, each approach has its merits and lim- erally time-consuming. Moreover, amateur drones
itations. For instance, noise from spinning pro- generally appear suddenly and can bring public
pellers and electric motors can be detected by risks in a very short time (e.g., impose explosive
5 As a by-product, RF sig-
acoustic sensors such as microphones, but it and other destructive chemicals on national insti-
nal-based detection can check can only detect the presence of a drone in the tutions and assets). Thus, the quickest detection
the spectrum occupancy status vicinity. Video cameras and thermal detection is of great interest. As the name implies, quick-
of primary users with licensed also provide relatively short-range detection but est detection refers to real-time detection of any
spectrum bands and find white
spaces for secondary com-
are subject to weather conditions. Radars are intruder amateur drone as quickly as possible,
munications systems without well recognized as dominating drone detectors, which can be cast in the framework of optimal
licensed bands [12, 13]. but they also have difficulties in differentiating stopping theory.

32 IEEE Communications Magazine • January 2018


Localization
The next major step after detecting an amateur 1
drone is the localization of the amateur drone
intruder, which corresponds to a parameter esti- 0.9
N = 1000
mation process and serves as the basis of the
subsequent tracking and control operations.

2 )
0.8

2 |H
There are several unique features for the local- N = 600

The detection probability Pr(H


ization of the amateur drone intruder. The first 0.7
one is that 3D position estimation algorithms are
desired to accurately determine the position of
0.6
the amateur drone (including latitude, longitude, N = 300
and elevation), while the majority of the state-of- Genie-aided scheme
the-art studies on localization focus on 2D posi- 0.5 Proposed scheme
tion estimation. The second one is that passive
localization algorithms are desired since the ama- 0.4
teur drone intruder would not actively share its
position or signal feature with the amateur drone 0.3
surveillance system, which is quite different from
well-known GPS-based positioning and Blue-
0.2
tooth/WiFi/cellular network-based localization. 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4
Actually, the surveillance system should not need The constraints on the false alarm probabilities ()
the amateur drone to carry any responding/posi-
tioning equipment onboard. Figure 4. Trade-off between the detection probability and the constraints on
the false alarm probabilities (a = b).
Tracking
Drone localization and tracking are inseparable.
If localization is to obtain a location coordinate, ations. It is interesting and also challenging to
tracking is to obtain a sequence of location coor- exploit hybrid human and machine intelligence
dinates. On one hand, localization serves as the for highly efficient drone control.
input and the basis for tracking. On the other
hand, tracking can provide localization with prior Other Key Enabling Technologies
information to correct the error of localization There are also several other key enabling technol-
to some extent. For the tracking of the amateur ogies for Dragnet such as energy harvesting, full
drone, there are two vital techniques. One is duplex, and cognitive radio networks. Specifically,
context-aware tracking via trajectory filtering for energy harvesting and transfer is a promising tech-
moving/flying drones; the other is drone behavior nology to prolong the network lifetime, where tra-
prediction via mining of massive historical data on ditionally, batteries are the primary energy source,
amateur drone activities. and regularly recharging or replacement of bat-
For the surveillance of an amateur drone flying teries are costly and inconvenient. Full-duplex and
high, radar, video, and/or RF signal processing cognitive radio networks can be used to improve
can be used to perform localization and tracking the spectrum efficiency and spectrum utilization,
(see, e.g., [4]). As shown in Table 1, it is report- respectively [ 12, 15], especially when spectrum
ed that the well-known AUDS has an electron- shortage occurs or licensed spectrum is unavail-
ic-scanning radar for target detection of a 10 km able.
range and an electro-optical video for tracking
and classification of minimum target size 0.01 Case Study:
m2. In practice, each approach has its merits and
limitations. In order to improve the drone detec- Drone Detection and Classification
tion performance, it is natural to combine the Due to the page limit, here we only consider an
capability of different techniques for achieving example drone surveillance scenario in which
diversity gain. there may be unauthorized amateur drones
intruding on a certain protected region, where,
Control for example, an important event is being held and
When an amateur drone intruder is detected and only authorized drones are allowed to fly over. To
its location and flying trajectory is tracked, the last enable the drone surveillance, we propose a ter-
important step is to properly control the amateur nary hypothesis testing as follows: H0, H1, and H2
drone. There are several popular drone control denote the case where no drone exists, an autho-
approaches: rized drone exists, and an unauthorized amateur
• Directional jamming the remote control sig- drone exists, respectively. Then the problem of
nal or the navigation signal interest is drone detection and classification, that
• Safe catching/hunting a low-altitude drone is, to detect whether a drone exists (H 1/H 2) or
by a fishing net not (H 0), and if there is a drone, to identify or
• Destroy a drone of high threat via high-pow- classify whether it is an authorized drone (H1) or
er laser, electromagnetic gun, or micro-mis- an unauthorized amateur drone (H2). Mathemat-
sile. ically, we formulate an optimization problem as
Each approach has its application cases. Some- follows:
times, we should make a choice, while other max Pr(H2|H2),
times we should adopt a combination. Currently, subject to 1 – Pr(H0|H0)  a,
the drone control configuration of most drone
surveillance systems are based on human oper- 1 – Pr(H1|H1)  b, (1)

IEEE Communications Magazine • January 2018 33


This means that we can obtain better drone detec-
600
tion and classification performance at the cost of
0.95 increased detection delay and the coordination of
multiple sensors. Interestingly, the marginal gain is
0.9 minor as either the number of sensors or the num-
500 ber of samples is sufficiently large.
0.85
The number of samples

0.8
Conclusion
This article develops an amateur drone surveil-
400 0.75 lance system based on cognitive IoT. We first pres-
ent a brief survey on the state-of-the-art studies on
0.7 anti-drone techniques. Then we propose a vision
0.65 named Dragnet by tailoring the recently emerg-
300 ing cognitive IoT framework for amateur drone
0.6 surveillance. Next, the key enabling techniques
accompanied with the technical challenges and
0.55 open issues ahead are discussed. Furthermore, an
200 exemplary simulation on the detection of an ille-
5 10 15 20 25 gal amateur drone is provided. We firmly believe
The number of sensors this important area will be a fruitful research
direction, and we have just touched the tip of the
Figure 5. The impact of the number of sensors and the number of samples on iceberg. We hope this article will stimulate much
the drone detection and classification performance. more research interest.

References
where Pr(Hi|Hi), i  {0, 1} is the probability of Hi [1] N. H. Motlagh, T. Taleb, and O. Arouk, “Low-Altitude
being correctly detected. As shown in Eq. 1, the Unmanned Aerial Vehicles-Based Internet of Things Ser-
vices: Comprehensive Survey and Future Perspectives,” IEEE
objective is to maximize the probability of cor- Internet of Things J., vol. 3, no. 6, Dec. 2016.
rectly detecting the presence of the unauthorized [2] FAA, “FAA Publishes First Set of UAS Facility Maps,” FAA
amateur drone Pr(H2|H2), while the constraints News & Updates, Apr. 27, 2017; https://www.faa.gov/
are set to control the false alarms. Specifically, news/updates/?newsId=87945, accessed 13 Aug. 2017.
[3] EASA, “Proposal to Create Common Rules for Operating
the false alarm probability 1 – Pr(H 0|H 0) = Pr Drones,” Cologne, Germany, Sept. 2015; http://easa.
(H 1|H 0) + Pr(H 2|H 0) corresponds to the case europa.eu/newsroom-andevents/News/easa-regulatory-ap-
when an authorized or unauthorized drone is proach-remotely-piloted-aircraft-rpas, accessed 13 Aug.
falsely detected while there is no drone pres- 2017.
[4] S. Wong, R. Jassemi-Zargani, and B. Kim, “Counter-Measures
ent. Similarly, the false alarm probability 1 – Pr Against Drone Surveillance,” Defence Research and Devel-
(H1|H1) = Pr(H2|H1) + Pr(H0|H1) corresponds opment Canada-Ottawa Research Centre, ref. doc. DRDC-
to a false alarm when an unauthorized drone is RDDC-2016-D019, May 2016.
falsely detected or no drone is detected while [5] D. P. Shepard, J. A. Bhatti, and T. E. Humphreys, “Drone
Hack: Spoofing Attack Demonstration on a Civilian
there is an authorized drone present. Unmanned Aerial Vehicle,” GPS World, Aug. 2012; http://
Generally, we hope that the detection prob- gpsworld.com/drone-hack/, accessed 13 Aug. 2017.
ability Pr(H 2|H 2) is as large as possible, while [6] R. Altawy and A. M. Youssef, “Security, Privacy, and Safe-
the two false alarm probabilities are as small as ty Aspects of Civilian Drones: A Survey,” ACM Trans.
Cyber-Physical Systems, vol. 1, no. 2, Nov. 2016 , pp.
possible. However, there is a trade-off between 1–25.
them, as shown in the simulation results of Fig. 4. [7] N. Cohen and A. Shelman-Cohen, “Drone Mitigation
The probability of an unauthorized drone being Methods and Apparatus,” U.S. Patent Application No.
correctly detected increases always at the price 15/219,137, July 2016.
[8] A. A. Khan, M. H. Rehmani, and A. Rachedi, “Cognitive
of an increase of false alarms a and b, and vice Radio Based Internet of Things: Applications, Architectures,
versa. Specifically, in this figure, we propose a Spectrum Related Functionalities, and Future Research
generalized likelihood ratio test scheme (the Directions,” IEEE Wireless Commun., vol. 24, no. 3, June
“proposed scheme” in Fig. 4) to present a solu- 2017, pp. 17–25.
[9] Q. Wu et al., “Cognitive Internet of Things: A New Paradigm
tion to the optimization problem in Eq. 1, which Beyond Connection,” IEEE Internet of Things J., vol. 1, no. 2,
considers the fact that the unknown character- Apr. 2014, pp. 129–43.
istics of the unauthorized drones makes H 2 a [10] M. Peng et al., “Fog-Computing-Based Radio Access Net-
composite hypothesis. For the purpose of perfor- works: Issues and Challenges,” IEEE Network, vol. 30, no. 4,
July/Aug. 2016, pp. 46-53.
mance comparison, we also present a genie-adied [11] R. K. Ganti, F. Ye, and H. Lei, “Mobile Crowdsensing: Cur-
scheme where the distributions of the received rent State and Future Challenges,” IEEE Commun. Mag., vol.
signal strength from both the authorized drone 49, no. 11, Nov. 2011, pp. 32–39.
and the unauthorized drones are known a priori. [12] Y. Saleem and M. H. Rehmani, “Primary Radio User Activ-
ity Models for Cognitive Radio Networks: A Survey,” J.
We can see that the detection performance of Network and Computer Applications, vol. 43, 2014, pp.
both schemes can be improved by increasing the 1–16.
number of samples N, which corresponds to an [13] F. Akhtar, M. H. Rehmani, and M. Reisslein, “White Space:
increase of the detection delay. Definitional Perspectives and Their Role in Exploiting Spec-
trum Opportunities,” Telecommun. Policy, vol. 40, no. 4,
To further improve the drone detection and 2016, pp. 319–31.
classification performance, in the simulation results [14] S. G. Iyengar, P. K. Varshney, and T. Damarla, “A Paramet-
of Fig. 5, we study the impact of the number of ric Copula-Based Framework for Hypothesis Testing Using
sensors and the number of samples for the given Heterogeneous Data,” IEEE Trans. Signal Proc., vol. 59, no. 5,
May 2011, pp. 2308–19.
false alarm constraints. It is shown that as the [15] M. Amjad et al., “Full-Duplex Communication in Cognitive
number of samples and the number of sensors Radio Networks: A Survey,” IEEE Commun. Surveys & Tutori-
increase, the global detection probability increases. als; Early Access, IEEEXplore, 2017.

34 IEEE Communications Magazine • January 2018


Biographies the Army Engineering University of PLA. His research interests
include wireless communications and cognitive radio networks.
Guoru Ding (dr.guoru.ding@ieee.org) is an assistant professor
in the College of Communications Engineering and a post- Yun Lin (linyun@hrbeu.edu.cn) is an associate professor at the
doctoral research associate at the National Mobile Commu- College of Information and Communication Engineering, Harbin
nications Research Laboratory, Southeast University, Nanjing, Engineering University, China. He received his B.S. degree from
China. He received his B.S. degree from Xidian University in Dalian Maritime University in 2003, and his M.S. degree in 2005
2008 and his Ph.D. degree from the College of Communica- and Ph.D degree in 2010 from Harbin Engineering University.
tions Engineering, Nanjing, China, in 2014. His research inter- He was a visiting scholar at Wright State University from 2014
ests include cognitive radio networks, massive MIMO, machine to 2015. His research interests include machine learning, infor-
learning, and big data analytics over wireless networks. Corre- mation fusion, and cognitive and software defined radio.
sponding information: Southeast University, Nationall Mobile
Communications Research Laboratory, Nanjing 210008, Jiang- Theodoros A. Tsiftsis (theodoros.tsiftsis@nu.edu.kz) is an asso-
su, P. R. China. ciate professor of communication technologies with the School
of Engineering, Nazarbayev University, Astana, Kazakhstan. His
Qihui Wu (wuqihui2014@sina.com) is a professor in the College research interests include the broad areas of cooperative com-
of Electronic and Information Engineering, Nanjing University of munications, cognitive radio, communication theory, wireless
Aeronautics and Astronautics, China. From 2005 to 2007, he powered communication systems, and optical wireless com-
was an associate professor with the College of Communications munication systems. He is currently an Area Editor for Wireless
Engineering, PLA University of Science and Technology, Nan- Communications II of IEEE Transactions on Communications and
jing, China, where he served as a professor from 2008 to 2016. an Associate Editor of IEEE Transactions on Mobile Computing.
From March 2011 to September 2011, he was an advanced
visiting scholar at Stevens Institute of Technology, Hoboken, Yu-Dong Yao [F] (yyao@stevens.edu) has been with Stevens
New Jersey. Institute of Technology since 2000, and is currently a professor
and department director of electrical and computer engineer-
L inyuan Z hang (zhanglinyuan5@163.com) received his B.S. ing. He is a Fellow of the National Academy of Inventors and a
degree (with honors) in electronic engineering from Inner Mon- Fellow of the Canadian Academy of Engineering. His research
golia University, Hohhot, China, in 2012 and his M.S. degree in interests include wireless communications and networks, spread
communications and information systems from the College of spectrum and CDMA, antenna arrays and beamforming, cogni-
Communications Engineering, PLA University of Science and tive and software-defined radio, and digital signal processing for
Technology in 2015. He is currently pursuing a Ph.D. degree at wireless systems.

IEEE Communications Magazine • January 2018 35

You might also like