Bistatic Radar
Bistatic Radar
Bistatic Radar
ABSTRACT
Continuing advances in radar technology are driven both
by new application regimes and technological innovations.
A family of applications of increasing importance is detection of a mobile target intruding into a protected area, and
one type of radar system architecture potentially well suited
to this type of application entails a network of cooperating
radars. In this paper, we study optimal radar deployment for
intrusion detection, with focus on network coverage. In contrast to the disk-based sensing model in a traditional sensor
network, the detection range of a bistatic radar depends
on the locations of both the radar transmitter and radar
receiver, and is characterized by Cassini ovals. Furthermore, in a network with multiple radar transmitters and receivers, since any pair of transmitter and receiver can potentially form a bistatic radar, the detection ranges of different bistatic radars are coupled and the corresponding
network coverage is intimately related to the locations
of all transmitters and receivers, making the optimal deployment design highly non-trivial. Clearly, the detectability of an intruder depends on the highest SNR received by
all possible bistatic radars. We focus on the worst-case intrusion detectability, i.e., the minimum possible detectability along all possible intrusion paths. Although it is plausible to deploy radars on a shortest line segment across the
field, it is not always optimal in general, which we illustrate
via counter-examples. We then present a sufficient condition
on the field geometry for the optimality of shortest line deployment to hold. Further, we quantify the local structure
of detectability corresponding to a given deployment order
and spacings of radar transmitters and receivers, building on
which we characterize the optimal deployment to maximize
the worst-case intrusion detectability. Our results show that
the optimal deployment locations exhibit a balanced structure. We also develop a polynomial-time approximation algorithm for characterizing the worse-case intrusion path for
any given locations of radars under random deployment.
Keywords
bistatic radar networks, network coverage, optimal deployment, worst-case intrusion path
c4
c3
c2
c1
c1
1. INTRODUCTION
1.1 Motivation
An active radar system consists of a collection of
transmitters and receivers in which transmitters emit
RF signals and the receivers capture signals resulting
from scattering of the transmitted signals reflected by
objects of interest (targets). A monostatic radar is one
in which a single transmitter and single receiver are collocated. A bistatic radar is also comprised of a single
transmit-receive pair, but the transmitter and receiver
are at different locations. Multistatic radar refers to a
configuration that consists of multiple receivers at different locations. Although physical-layer issues in radar
have been extensively studied [1], very limited attention has been paid to radar network design [24]. Notably, [2] considered a network of monostatic radars,
and [3, 4] studied a multistatic radar with one transmitter. We are thus motivated to consider a network of
multiple radar transmitters and receivers where any pair
of transmitter and receiver can form a bistatic radar.
Unlike traditional passive sensors, one salient feature
of radar sensing is that it actively emits signals to illuminate the target. Further, radar technology provides
superior penetration capability by using radio waves.
Worth mentioning is that the cost of radars can be much
higher than traditional sensors.
The problem of detecting intrusion into a protected
area, across a border or security perimeter, is of increasing interest for numerous applications, and has great potential in several regimes of growing importance, such
as border monitoring, industrial and airport security,
and drug interdiction. Worst-case coverage [5] is a common criterion of efficacy in intrusion detection that has
been applied extensively in the context of sensor networks [69]. It is intimately related to the minimum
possible detectability of an intruder (target) traversing a monitored field. In a bistatic radar network, the
worst-case coverage is quite different and more difficult to quantify than traditional sensor networks, because 1) departing from the disk-based sensing range
of a traditional sensor, the detection range of a bistatic
radar depends on the locations of both radar transmitter and receiver and is characterized by the Cassini oval
(in scenarios where intruder detectability is dominated
by SNR). Formally, a Cassini oval is a locus of points
for which the distances to two fixed points (foci) have
a constant product (as illustrated in Figure 1); 2) the
sensing ranges of different bistatic radars are coupled
with each other, since each transmitter (or receiver) can
pair with other receivers (or transmitters) to form multiple bistatic radars, indicating that its location would
impact multiple bistatic radars.
2. SYSTEM MODEL
Basic Setting. We consider a bistatic radar network
deployed in a field of interest F . The field F is a
bounded and connected region enclosed by four curves:
a left boundary Fl , a right boundary Fr , an entrance
side, and a destination side (see Figure 2). Note that
we allow the boundary curves of the field to be arbitrary. An intruder (target) can traverse through F
along any intrusion path P F from a point on the
entrance to a point on the destination. Specifically, the
bistatic radar network consists of M radar transmitters
Ti T , i M , {1, , M } and N radar receivers
Rj R, j N , {1, , N }. We assume that each
pair of transmitter and receiver can potentially form
a bistatic radar. We further assume that orthogonal
min
Ti T ,Rj R
(2)
(3)
3.
Fr
(4)
Fl
H
Fr
entrance
H
(b)
entrance
(a)
We consider both deterministic deployment and random deployment scenarios, in the same spirit as the
arbitrary/random network models in the seminal work
by Gupta and Kumar [10]. In the deterministic deployment case, our goal is to find optimal deployment
locations of radar nodes (i.e., M transmitters and N
receivers) in F such that WID is maximized, i.e.,
minimize B(P )
Fl
destination
DETERMINISTIC DEPLOYMENT
Ti F,Rj F
destination
(5)
Intuitively, we expect to attain the best coverage quality by deploying radars along a shortest barrier which
an intruder must pass through. We make the following
assumption on the geometry of field F .
Assumption 1. There exists a shortest line segment
H connecting Fl and Fr such that H F .
Although a shortest line segment connecting Fl and Fr
always exists, it is critical to assume that it lies in the
field F (see Figure 2). We refer such an H as the shortcut barrier (SCB) and let h denote its length. In other
words, h is the shortest distance between a point in Fl
and a point in Fr . Note that a shortcut barrier is always
a shortest barrier that has the shortest length among all
barriers, but the converse is not true (as illustrated in
Figure 2). Assumption 1 captures a large class of field
geometry, e.g., any F of convex shape belongs to this
class.
The next result shows that the SCB-based deployment is indeed optimal if the shortcut barrier exists.
(All proofs of the theorems and lemmas in the sequel
are relegated to Appendix).
Theorem 1. Under Assumption 1, it is optimal to
deploy radars on the shortcut barrier H, in order to
maximize the worse-case intrusion detectability.
Although Theorem 1 appears intuitive, we caution
that it is non-trivial since the proof hinges on the existence of a shortcut barrier such that a line barrier with
no greater vulnerability can be constructed from any
arbitrary barrier. In other words, if the shortcut barrier does not exist, the optimal deployment may not be
on a shortest barrier (see Figure 2(b)).
Let Hl and Hr denote the end points of H with
Hl Fl and Hr Fr . Note that the worst-case intrusion detectability under a line-based deployment is
no greater than, but not necessarily equal to, the vulnerability of the line segment. However, the equality
holds for the SCB-based deployment as we show in the
next result.
Theorem 2. Under Assumption 1, if radars are deployed on the shortcut barrier H, the worst-case intrusion detectability amounts to the vulnerability of H, i.e.,
B(P ) = Q(H).
Combining Theorem 1 and 2, we conclude that the
problem (4) is equivalent to finding the radar deployment on the shortcut barrier H such that Q(H) is minimized.
(6)
where miniM,jN |x ti ||x rj | represents the detectability of a point p H with kHl pk = x. It can
be easily checked that the objective function of problem (6) is neither differentiable nor convex in general.
minimize
ti ,rj
subject to
max
min
0xh iM,jN
|x ti ||x rj |
0 ti h, i M
0 rj h, j N
I(p)
local vulnerable value
(a)
Hl
Hr
R1
I(p)
T1 R2
R3
T2
R4
(b)
Hl
Hr
R1
T1
R2
R3
T2
R4
Table 1:
c
e0 (c)
1
2.0000
5
4.4721
10 6.3246
20 8.9443
S1
z }| {
z
}|
{
S = (Hl , R1 , R2 , T1 , R3 , R4 , R5 , T2 , R6 , T3 , T4 , Hr ).
{z
} |
{z
}
|
S2
S4
(a) Hl
Hr
(b) Hl
Hr
(c) Hl
Hr
}|
{ zM1r
}| { q
q z
N = ( , q + 1, , q + 1, q, , q, );
2
2
N = (
q + 1 z }| { q 1
, q, , q,
);
2
2
}|
{ z Mr
}| { q + 1
q+1 z
N =(
, q + 1, , q + 1, q, , q,
).
2
2
4. RANDOM DEPLOYMENT
Next, we consider random deployment that can also
be of great interest. In this scenario, given arbitrary locations of radars resulted from random deployment, we
aim to find the worst-case intrusion path P and the
worst-case intrusion detectability B(P ). Due to the
complex geometry of bistatic radar SNR, it is difficult
to find P accurately. Therefore, we design an efficient
algorithm for finding an intrusion path P whose detectability is arbitrarily close to B(P ). Our algorithm
partitions the field F into sub-regions based on a novel
2-site Voronoi diagram, and then constructs a weighted
graph G for the sub-regions to search for an approximate worst-case intrusion path PG .
Given a set of points S, the Voronoi region VS (s) of
a point s S is the set of points which are closer to s
than to any other point in S, i.e.,
VS (s) , {p| min
kps k = kpsk}.
s S
(7)
(8)
a
v5
v4
R1
v2
d
e
Hr
(b) Hl
Hr
b
v1
T1
(a) Hl
v3
(9)
5. PERFORMANCE EVALUATION
In this section, we present some numerical results to
illustrate the effectiveness of our proposed optimal radar
deployment scheme.
We examine the vulnerability of a line segment H under the line-based deployment. In particular, we compare the optimal deployment scheme (OPT) with two
heuristic deployment schemes. The first heuristic (HEU1) is to deploy radar transmitters (or receivers, respectively) with uniform spacings such that the maximum
distance from a point on H to its closet transmitter
(or receiver, respectively) is minimized (see Figure 6).
Specifically, HEU-1 results in 2kHl T1 k = kT1 T2 k
= = kTM1 TM k = 2kTM Hr k and 2kHl R1 k =
kR1 R2 k = = kRN 1 RN k = 2kRN Hr k, where transmitters and receivers are indexed by their orders in S,
respectively. It can be easily verified that this scheme is
optimal if we treat radar transmitters (or receivers, respectively) as traditional sensors with disk-based sensing model. The second heuristic (HEU-2) is to deploy
radar transmitters and receivers according to an optimal order S from OPT but with uniform spacings
such that the maximum distance from a point on H
to its closet transmitter or receiver is minimized (see
Figure 6). Specifically, HEU-2 results in 2kHl S1 k =
kS1 S2 k = = kSM1
SM
k = 2kSM
Hr k.
Figure 7, Figure 8 and Figure 9 depict the vulnerability of H versus the number of radar receivers for 3,
5, and 10 radar transmitters, respectively, where we set
h = 100. We note that HEU-2 results in considerably
lower vulnerability than HEU-1. This is because HEU-1
deploys transmitters and receivers independently, while
HEU-2 takes into account the joint design of transmitters and receivers. We observe that OPT further outperforms HEU-2 significantly. This suggests that optimal spacings is critical for improving the performance
due to the complex geometry of bistatic radar SNR.
Next, we evaluate the worst-case intrusion detectabil-
300
30
OPT
HEU1
HEU2
200
150
100
50
0
3
6
9
12
15
Number of radar receivers
15
10
0
10
18
13
16
19
22
Number of radar receivers
25
OPT
HEU1
HEU2
80
60
40
20
8
11
14
17
Number of radar receivers
20
Worstcase Invisibility
100
Vunerability
20
0
5
OPT
HEU1
HEU2
25
Vunerability
Vunerability
250
1000
OPT
RAN
800
600
400
200
0
3 4 5 6 7 8 9 101112131415161718
Number of radar receivers
ity under random deployment using our proposed approximate algorithm. We consider a square field F of
size 100 100, where two opposite sides are entrance
and destination, respectively, and the other two opposite sides are left and right boundaries, respectively.
We consider deploying transmitters and receivers in the
field randomly (RAN) with uniform distribution.
Figure 10, Figure 11 and Figure 12 depict the worstcase intrusion detectability versus the number of radar
receivers for 3, 5, and 10 radar transmitters, respectively, where we also plot the shortcut barrier-based optimal deployment scheme (OPT). The results for RAN
are averaged over 100 simulation runs. We observe that
OPT performs significantly better than RAN. The reason is that deployment on a barrier is essentially much
more efficient than deployment in the full field for worstcase coverage.
barrier coverage has been introduced in [13], where critical condition of weak barrier coverage is obtained for
random deployment. The critical condition of strong
barrier coverage is derived in [14] using percolation theory. An effective metric of barrier coverage quality is
proposed in [15]. [16] studies constructing barrier by
sensors with limited mobility after initial deployment.
A novel full-view coverage model is proposed in [17] for
constructing barrier in camera sensor networks.
6.
RELATED WORK
7. CONCLUSION
Radar technology has great potential in many applications, such as border monitoring, security surveillance. In this paper, we studied the worst-case coverage
for a bistatic radar network consisting of multiple radar
transmitters and radar receivers, where each pair of
radar transmitter and receiver can form a bistatic radar.
The problem of optimal radar deployment is highly nontrivial since 1) the detection range of a bistatic radar
is characterized by Cassini oval which presents complex
geometry; 2) the detection ranges of different bistatic
radars are coupled and the network coverage is intimately related to the locations of all radar nodes. We
present a general assumption on the field geometry under which it is optimal to deploy radars on a shortest
line segment across the field, for maximizing the worstcase intrusion detectability. Further, we characterized
the corresponding optimal deployment locations along
this shortest line segment. Specifically, the optimal deployment locations exhibits a balanced structure. We
also developed a polynomial-time approximation algorithm for characterizing the worst-case intrusion path
for any given deployment of radars.
To the best of our knowledge, the optimality of line-
Worstcase Invisibility
800
OPT
RAN
600
[9]
400
200
0
5 6 7 8 9 1011121314151617181920
Number of radar receivers
[10]
[11]
Worstcase Invisibility
300
250
OPT
RAN
200
[12]
150
100
50
[13]
0
10111213141516171819202122232425
Number of radar receivers
8.
REFERENCES
[14]
[15]
[16]
[17]
APPENDIX
A. PROOF OF THEOREM 1
Proof: Consider any given deployment locations {T , R}.
It suffices to show that there exist deployment locations
{T , R } on H such that B(P ) B (P ), where indicates that the deployment locations are {T , R }. It
follows from Property 1 that there exists a curve barrier
U with U A(B(P )). Let Ul and Ur be the end points
of curve U with Ul Fl and Ur Fr . We will show
that the deployment at {T , R } forms a line barrier
Ul Ur with Q (Ul Ur ) Q(U ) (see Figure 13).
Let U be the line passing through Ul and Ur . Then
we can find the projection of any Ti T and Rj R
onto line U , denoted by Ti and Rj , such that Ti Ti U
and Rj Rj U . Consider any p Ul Ur . Since curve U
is a path from Ul to Ur , we can find a p U such that
p is the projection of p onto line U . Then it follows
from the property of projection that kTi pk kTi p k and
kRj pk kRj p k for all i, j. Hence, from (2) we have
I(p) I (p ), and it follows that Q (Ul Ur ) Q(U )
due to (5). Since H is the shortcut barrier, we have
h kUl Ur k. Thus, we can translate the line-based de-
Ti
OHl (h)
Rj
Ur
Ul
Ti
Rj
B. PROOF OF THEOREM 2
Proof: Consider any given deployment locations {T , R}
on H. From the definition of barrier we have B(P )
Q(H). Suppose B(P ) < Q(H). The proof is based
on contradiction. It follows from Property 1 that there
exists a barrier U with U A(B(P )) A(Q(H)).
We will show that barrier U must intersect with H (see
Figure 14).
Step 1: Consider a point p H with I(p) = Q(H).
Suppose p 6= Hl and p 6= Hr . Let H be the line passing
through p such that H H. Consider any p H with
p 6= p. Since kTi p k > kTi pk and kRj p k > kRj pk for
all i, j, we have I(p ) > I(p) and hence p
/ A(Q(H)).
Thus H intersects with A(Q(H)) at a unique point p.
Step 2: Let Al (Q(H)) and Ar (Q(H)) denote the subsets of A(Q(H)) on the left and right side of H , respectively (see Figure 14). Define Oc (r) as an open disk
centered at point c with radius r. We will show that
Al (Q(H)) OHl (h) and Ar (Q(H)) OHr (h).
Let O Hl (h) denote the circle centered at Hl with ral
dius h. Then let OHl (h) denote the subset of OHl (h)
Rj
Hr
p
Al (Q(H)) Ar (Q(H))
Hl
Ti
Figure 14: Any barrier with possibly lower vulnerability than the shortcut barrier H must lie
in the detection range A(Q(H)) (grey area) and
pass through a line H which has a unique intersection p with A(Q(H)).
that Q(U ) B(P ) < Q(H).
C. PROOF OF LEMMA 1
We start with an observations which is used repeatedly
in this proof. Clearly, for any p H, I(p) only depends on the distances of p to its closest transmitter
and receiver, say Ti and Rj , respectively. If p
/ Ti Rj ,
I(p) = kTi pkkRj pk decreases as p moves towards Ti and
Rj ; if p Ti Rj , since kTi pk + kpRj k = kTi Rj k is a constant, it can be easily verified that I(p) = kTi pkkpRj k
increases as p moves towards YTi Rj , and hence attains
maximum when p = YTi Rj .
The main idea of this proof is to divide the line segment between each pair of neighbor nodes into intervals
such that all points on an interval have the same pair of
closest transmitter and receiver, and then we examine
the structure of detectability on each interval using the
observation presented above. Due to space limitation,
we only prove the case when Sk and Sk+1 have different
types (transmitter type and receiver type) for some k.
The same idea is used to prove other cases.
Suppose Sk and Sk+1 have different types. Without
loss of generality (WLOG), let Sk = Ti and Sk+1 = Rj .
1) Suppose the closest transmitter and receiver are Ti
and Rj for any p Ti Rj . Since I(p) = kTi pkkpRj k
for p Ti Rj , I(p) increases as p moves towards YTi Rj .
2) Suppose there exists some Rm Hl Ti such that
YRm Rj Ti YTi Rj . Then I(p) = kRm pkkTi pk for p
Ti YRm Rj , and I(p) = kTi pkkpRj k for p YRm Rj YTi Rj .
For each case of p, I(p) increases as p moves towards
YTi Rj . Similarly, if there exists some Tn Rj Hr such
that YTi Tn YTi Rj Rj , we can also show that I(p) increases as p moves towards YTi Rj for p YTi Rj Rj .
D. PROOF OF LEMMA 2
Due to space limitation, we only prove the case of Si
with pattern P1 , and the same idea is used to prove
other cases. The main idea is to determine the spacing
E. PROOF OF LEMMA 3
Consider any given candidate order S. Clearly, S consists of suborders S1 , , SM+1 where S1 = (Hl , , T1 ),
, Si = (Ti1 , , Ti ), , SM+1 = (TM , , Hr ).
Suppose DS is balanced with kHl Hr k = h and Q(Hl Hr )
= c.
The proof has two steps. In step 1, we suppose the
conditions given in the claim do not hold, and then we
can find a new order S from S with some spacings DS
such that Q (Hl Hr ) c and kHl Hr k kHl Hr k, where
Q (Hl Hr ) denote the vulnerability of Hl Hr under S .
This implies that S is no worse than S. Repeating
this argument, we can eventually find a new order S
satisfying the conditions in the claim and is no worse
than S. In step 2, we show that all candidate orders
satisfying the conditions in the claim are equivalently
good. This implies that they are all optimal orders.
Due to space limitation, we only prove step 1 for the
case nTi1 Ti nTj1 Tj + 2 and nTj1 Tj 2. The same
idea is used to prove other cases in step 1 although more
intricate arguments are needed for some cases.
Suppose nTi1 Ti nTj1 Tj + 2 and nTj1 Tj 2.
Clearly, Si and Sj must be local suborders. We can
construct a new order S from S by moving a receiver
from between Ti1 and Ti in Si to between Tj1 and Tj
in Sj . Then we set the spacings DSi and DSj balanced
and Q(ZSi ) = Q(ZSj ) = c, and we keep the spacings of
any other suborder unchanged, i.e., DSm = DSm for all
m 6= i, j. Therefore, we must have Q (Hl Hr ) = c.
We observe from Lemma 2 that we have LSj LSj =
e(nTj1 Tj +1)/2 (c) if nTj1 Tj is odd or enTj1 Tj /2 (c) if
nTj1 Tj is even. Also, we have LSi LSi = e(nTi1 Ti 1)/2 (c)
if nTi1 Ti is odd or enTi1 Ti /2 (c) if nTi1 Ti is even. Since
e0 (c) > e1 (c) > e2 (c) > for any c, in any case, we
have kHl Hr kkHl Hr k = (LSj LSj )(LSi LSi ) > 0.
F. PROOF OF LEMMA 4
Suppose S = (Hl , , T1 , T2 , R1 , R2 , , Hr ) with any
spacings. We can construct a new order of locations
S = (Hl , , T1 , R1 , T2 , R2 , , Hr ) from S by swapping the locations of nodes T2 and R1 . Let I (p) denote
the detectability of p after the swapping. We observe
that for any local vulnerable point p Hl T1 , the closest transmitter is not T2 , and for any local vulnerable point p R2 Hr , kT2 pk kT2 pk. Similar observations can be made for R1 and R1 . Thus we can
see that I (p) I(p) for any local vulnerable point
p Hl T1 or p R2 Hr . We also observe that I(YT1 T2 )
(kT1 T2 k/2)2 = (kT1 R1 k/2)2 = I (YT1 R1 ). Similarly,
we can obtain I(YR1 R2 ) I (YT2 R2 ). Furthermore,
we have I(YT2 R1 ) = (kT2 R1 k/2)2 = (kR1 T2 k/2)2 =
I (YR1 T2 ). Thus we have shown that I (p) I(p) for
any local vulnerable point p Hl Hr , and hence,
Q(Hl Hr ) is not increased after the swapping. Simi-
G. PROOF OF THEOREM 3
Suppose DS is balanced with Q(Hl Hr ) = c. We have
shown that S consists of a series of local suborders
S1 , , Sm . Suppose S is the same order as S and with
spacings DS such that Q (Hl Hr ) c, where Q (Hl Hr )
denote the vulnerability of Hl Hr under S . Then S
also consists of a series of local suborders S1 , , Sm
such that Sj and Sj are the same local suborders for
all j = 1, , m. It is clear that Q (ZSj ) c, j.
Then Lemma 3 implies that LSi LSj , j. Since
Pm
Pm
Recall that we have shown Q (Hl Hr ) = c. Then the desired result follows.