You are on page 1of 10

ACCEPTED FROM OPEN CALL

Amateur Drone Monitoring: State-of-the-Art


Architectures, Key Enabling Technologies, and
Future Research Directions
Zeeshan Kaleem and Mubashir Husain Rehmani

Abstract how to detect, track, localize, jam, and hunt it


to stop harmful consequences in security-sensi-
The UAV or mini-drones equipped with sensors tive areas. In order to cope with these security
are becoming increasingly popular for various com- threats, monitoring drone (MDr) deployment is
mercial, industrial, and public-safety applications. required for surveillance, hunting, and jamming of
However, drones with uncontrolled deployment ADrs. The main motivation of deploying MDrs is
pose challenges for highly security-sensitive areas to keep an eye on ADrs, which can lead to seri-
such as a President’s house, nuclear plants, and ous disasters if no precautionary measures are
commercial areas because they can be used unlaw- taken in time. The most important aspect of MDr
fully. In this article, to cope with security-sensitive deployment is related to the MDr architecture
challenges, we propose point-to-point and FANET because it should be self-configured in case of
architectures to assist the efficient deployment of emergency situations without the help of a central
MDrs. To capture an ADr, an MDr must have the ground control station (GCS).
capability to efficiently and quickly detect, track, In this article, we propose MDr architectures for
jam, and hunt the ADr. We discuss the capabilities different security situations. For less security-sensi-
of the existing detection, tracking, localization, and tive areas, a point-to-point architecture is proposed,
routing schemes, and also present the limitations of which has only one MDr to detect, track, and jam
these schemes as further research challenges. More- ADrs. Moreover, for highly security-sensitive areas,
over, the future challenges related to co-channel the flying ad hoc network (FANET) architecture is
interference, channel model design, and coopera- proposed to intelligently estimate the situation and
tive schemes are discussed. Our findings indicate perform self-healing actions.
that MDr deployment is necessary for the care of
ADrs, and intensive research and development is
required to fill the gaps in the existing technologies.
Motivations and Problems in the
Existing MDr Schemes
Introduction The increasing usage of MDrs poses challenges
The development of mini-drones, officially called like robust and efficient detection, tracking, intrud-
unmanned airborne vehicles (UAVs), have cap- er localization, and jamming of ADrs. Accuracy of
tured the attention of hobbyists and investors [1]. detection is a basic requirement of the system. In
Drones have endless commercial applications, general, the accurate detection is time-consum-
due to their relatively small size and ability to fly ing. In fact, a precise moving object detection
without an onboard pilot, such as agriculture, method makes tracking more reliable and faster,
photography, surveillance, and numerous public and supports correct classification, which is quite
services, as shown in Fig. 1. With all these appli- important for MDr detection to be successful.
cations of drones, one question becomes obvi-
ous: How we know that these drones are safe? Industrial Aspects
Moreover, the number of media reports about To fulfill the demands discussed for amateur
incidents involving UAVs also increases with the drone surveillance, industrialists are developing
increase in drone usage. For example, they have efficient detection, tracking, localization, and
been used to bring smuggled goods into prisons; jamming solutions. For example, Dedrone has
a drone hit power lines in Hollywood, cutting off developed a cost-effective technical solution by
electricity for 600–700 customers; and the White developing a DroneTracker and counter drone
House reported security threats when a DJI Phan- system. DroneTracker effectively protects air
tom II quadcopter crashed on its grounds. Hence, space by providing early warning detection and
we need to find a way to make sure these drones alert after detecting a drone in the space. It con-
will not enter no-fly zones and to avoid collisions sists of arrays of sensors, high definition camer-
among drones. The other problem is what could as, analysis, and intelligent pattern recognition to
happen if terrorists attempted to use an amateur detect and classify the drones. Similarly, Telera-
drone (ADr) for evil purposes. Moreover, if an dio is a global technology leader in developing
ADr is found in a no-fly zone, we need to address advanced anti-terrorist security systems. It recently

Digital Object Identifier: Zeeshan Kaleem is with COMSATS Institute of Information Technology, Wah Campus;
10.1109/MWC.2018.1700152 Mubashir Husain Rehmani is with Waterford Institute of Technology.

150 1536-1284/18/$25.00 © 2018 IEEE IEEE Wireless Communications • April 2018


The optical-flow trans-
Construction monitoring Search & public safety applications
forms one image into
the next image in a
sequence of images.
Moreover, it tells
that how images in a
sequence change to
create the next image.
It is therefore necessary
to have two subse-
Traffic monitoring Railway surveillance quent images to calcu-
late optical-flow.

FIGURE 1. Drone applications: construction monitoring, public-safety, and traffic and railway monitoring.

developed the SkyDroner product, which has the as a benchmark analysis scheme for ADr motion
capability to detect, distract, and disable any ADr detection using the MDr camera.
from flying into a security-sensitive area. Hence, The existing motion detection algorithms
numerous ADr surveillance solutions exist in the have problem of high computational cost and
industry, but to improve their efficiency and accu- less robustness because of changing extrinsic
racy, more research and development is desired. and intrinsic camera parameters. These changing
parameters include pan, tilt, translation, rotation,
Research and Development Aspects and zooming. Hence, very accurate and cost-ef-
Detection techniques can be classified mainly by fective motion detection algorithms are desired
features, appearance, or motion. Based on these to take care of these parameters. To fill this gap,
characteristics, here we first discuss the motion adaptive algorithms using hybrid approaches need
detection scheme. In the literature [2], motion to be proposed for efficient motion detection.
detection schemes are categorized as: Thus, in general there must be two main parts of
1. Background subtraction the motion detection algorithm: first, the concept
2. Spatio-temporal filtering of artificial flow should be introduced based on
3. Optical flow the movement of the camera, and second, it must
Among these methods, background subtraction be compared with the real optical flow to cover
algorithms are most popular, because they are the image discrepancies. The choice of using two
relatively simple in computing a static scene. optical flows is motivated by the need to enhance
However, the background is assumed to be static the differences produced by dynamic objects.
in this method. Thus, shaking cameras, waving Moreover, machine learning algorithms using the
trees, and lighting changes quite probably cause characteristics of electromagnetic waves, sound,
serious problems to a background subtraction and images are also desired to efficiently detect
model. In addition, a successful background sub- the ADr.
traction method needs to model the background The next major step after detecting an ADr is
as accurately as possible and to adapt quickly to localization and tracking of the ADr and an intrud-
changes in the background. These requirements er. To accurately estimate the position of the ADr
add extra complexity to the computation of the and its intruder, 3D position estimation algorithms
model. Spatio-temporal filtering considers the are desired to be developed for more accurate
motion pattern of the moving object through- position estimation of the ADr. Existing works uti-
out the frame sequence, but is highly sensitive lized Kalman filtering to accurately determine the
to noise and variations in the movement pattern. position of the drones in case of global position-
The optical-flow-based approach is robust to the ing system (GPS) failure [4]. The importance of
motion of a camera and ADr movement because using Kalman filtering is highlighted in these works.
in this approach relative movements between Moreover, the utilization of the commercial fre-
the observer and the scene are considered. The quency bands for MDr also possess the challeng-
optical flow transforms one image into the next es of interference management with the existing
image in a sequence of images. Moreover, it indi- system.
cates how images in a sequence change to cre- The last important step after detection, local-
ate the next image. It is therefore necessary to ization, and tracking is the jamming and hunting
have two subsequent images to calculate opti- of the ADr. The detailed steps, which include the
cal flow. Hence, in [3] optical flow is suggested detection, localization, tracking, jamming, and

IEEE Wireless Communications • April 2018 151


The distinctive feature
of the proposed archi- Monitoring
tecture is that its func- drone (MDr)
tional capabilities are
tailored for the context
of meeting different Monitoring
devices
security-situations, as Ground control station (GCS)
well as efficient utili-
zation of the available Jamming commands
Thermal generated
spectrum. This architec-
camera
ture has the potential
to work in a central- Captured
ized and distributed 1. Sensing signal analysis amateur drone
2. Signal storage & processing (ADr)
manner. Sensor/
detector 3. Adhoc network control
4. Alarm generation (c)
5. Jamming signal generation
(a)
(b)

FIGURE 2. Amateur drone capturing system step-wise representation: a) data collection by using an MDr;
b) ground control station for detection and jamming signal generation; c) jamming and capturing of an ADr.

hunting of ADrs, is depicted in Fig. 2. The details Monitoring Drones Payload: An MDr carries
of jamming and hunting are also discussed later in payloads in terms of various types of sensors,
this article. thermal cameras, and other control information
processing units. These sensors are operated and
Potential Architectures and Deployment controlled from the ground. The data obtained is
utilized for accurate detection, tracking, and jam-
Scenarios for Monitoring Drones ming of ADrs.
A suitable architecture for deployed MDrs is nec- Internet Backhaul/Wireless Backhaul: A wired
essary for monitoring ADrs in no-fly zones. The Internet link such as Ethernet or fiber optics can
MDr architecture should be dynamic and can be be utilized to carry the data received from a wire-
created in an ad hoc manner anywhere and any- less radio access network (RAN) to the GCS, as
time with or without the help of any centralized shown in Fig. 3. This wired link can be replaced
infrastructure. The distinctive feature of the pro- by a wireless link by using high frequency, which
posed architecture is that its functional capabilities would have the capability to carry more data and
are tailored for the context of meeting different also can be more reliable because of less inter-
security situations, as well as efficient utilization of ference as it will operate in a different frequency
the available spectrum. This architecture has the band as the RAN link. Thus, the concept of flex-
potential to work in a centralized and distributed ible backhaul can be used, which is one future
manner. Based on this classification, we divide the research direction. Moreover, we discuss the four
MDr architecture into four main kinds: architectures mentioned above with their applica-
• Point-to-point (P2P) architecture with only a tions and suitability for different monitoring situa-
GCS for line-of-sight (LOS) communication tions.
(GCS-P2P)
• GCS with cellular or satellite stations assisted GCS-P2P: Point-to-Point Architecture with
network architecture (GCS-C/SA)
• GCS with mesh-network-based infrastructure Ground Control Station
(GCS-MA) The P2P architecture is proposed for MDrs, which
• GCS with software-defined networking-based only has an LOS communication link between
architecture (GCS-SDN) the MDr and the GCS shown in Fig. 3a. This
The important entities of these architectures are architecture can be deployed for the monitor-
introduced below. ing of less security-sensitive areas. For example,
Ground Control Station (GCS): MDr can P2P-GCS architecture is the simplest architecture
operate with different levels of controls, but usu- and is suitable when the MDr is located in LOS
ally they are remotely controlled from a GCS. The position and near the GCS, and only one MDr
GCS works as a central managing point of activ- would be enough to detect, control, and track
ity during MDr missions and provides necessary the ADr because of less security sensitivity of
capability to plan and execute security-sensitive the area. In this scenario, connectivity is main-
missions. The GCS has functions, such as mission tained over dedicated links to the MDr, so the
planning, image processing, modules for mobile control signal is more reliable with low latency.
and satellite communications management, and But unfortunately, the GCS-P2P architecture is not
displays to monitor progress. The GCS encap- suited for dynamically varying environments and
sulates high-speed processors for signal storage, non-line-of-sight (NLOS) communication. It is not
processing, and analysis of data received from suitable for NLOS communication because P2P
MDrs. It also generates alarm and jamming com- architecture is designed for low-range LOS com-
mands based on security alerts. munications. For NLOS communication, the walls

152 IEEE Wireless Communications • April 2018


and bad weather conditions can block the signal
to the MDr due to high penetration loss. Hence,
to use this architecture for NLOS communication
at longer ranges, the GCS requires a high-power
transmitter and steerable antennas. Therefore, this
will be an inefficient solution in terms of power
consumption and will also require costly hard-
ware. The other limiting factors for GCS-P2P
architecture is the significantly higher bandwidth
requirements to support more MDrs in the vicinity
of the GCS because each MDr will require an Point-to-point
network
independent LOS channel for connectivity. More- architecture
over, the communication among MDrs will always (GCS-P2P)
be from the GCS similar to a star network topol-
ogy that will not be able to exploit the benefits of
cooperation among MDr.

GCS-C/SA: GCS with Cellular or


Satellite Stations Assisted Network Architecture Ground control
Service provider network

The GCS-P2P architecture discussed previous- station


ly has the problem of smaller coverage and can-
not work well for monitoring of a large coverage (a)
area. For the GCS-C/SA architecture shown in
Fig. 3b, the cellular/satellite provides better cov-
erage for MDr as compared to GCS-P2P because
an MDr can handover to other GCSs, which also
enables the possibility of NLOS communication.
The GCS-C/SA-based MDr network can more effi-
ciently connect the MDrs in the vicinity by taking
advantage of the benefits of longer coverage and
licensed spectrum. However, this connectivity can Jam
m
result in severe co-channel interference among the sign ing
al
MDr and the cellular/satellite users using the same
bandwidth. Hence, it will result in relatively poor
data delivery using the cellular/satellite network.
This problem can be solved by deploying fifth gen-
eration (5G) ultra-dense cellular base stations [5], Cellular/satellite
but will result in increased system cost. network architecture
(GCS-C/SA)

GCS-MA: GCS with Service provider network


Mesh-Network-Based Architecture Ground control
station
The MDr can utilize the GCS with mesh-network- (b)
based architecture (GCS-MA) to solve the chal-
lenges raised in the GCS-C/SA architecture. In the
GCS-MA architecture shown in Fig. 3c, each node
(i.e., MDr) can act as a relay to forward data. The
communication between an MDr and a GCS can Amateur drone (ADr) Monitoring drone (MDr)
take place over several hops through an interme-
diate MDr. This will result in shorter communica-
tion range, which simplifies the link requirements,
and bandwidth can be reused more frequently
and thus more efficiently. This will result in more
efficient communication among MDrs because
of the possibility of direct links as well as using
mesh- network-based communications links. As Mesh network
architecture
a result, ADrs located among the MDrs can be (GCS-MA)
easily detected, tracked, localized, and jammed
with more accuracy. However, GCS-MA always
requires intermediate MDr nodes to serve as a
relay to communicate from the GCS. Hence, to
maintain such a link, efficient adaptive routing
Service provider network
algorithms are desired that can adopt themselves
Ground control
based on the quickly changing environment of station
the MDr. (c)
From these architectures, we conclude that for
security-sensitive areas we need to deploy GCS- FIGURE 3. Monitoring drone architecture for controlling amateur drones flying
MA architecture for MDrs because this can sup- in security-sensitive areas: a) GCS-P2P architecture; b) GCS-C/SA for large
port the ad hoc network of MDrs, which in turn coverage; c) GCS-MA for efficient detection and jamming.

IEEE Wireless Communications • April 2018 153


(GCS-SDN) assisted MDrs for dynamically varying
wireless environments as shown in Fig. 4b.
The SDN-based architecture partitions the con-
Monitoring trol and data plane of the network with all the con-
drones
trol functionalities moved to the cloud and run as
Control plane applications on top of the SDN controller in the
GCS-SDN. This can easily be managed central-
Data plane ly and updated easily from anywhere with more
efficiency. Moreover, this will allow operators to
centrally control and decide the travelling path
of MDrs based on the deployment situation. The
GCS-SDN can also work efficiently in conjunction
with the cellular networks because a centralized
Ground control SDN controller can enable efficient radio resource
station (GCS) and mobility management [7], which is important
(a) to efficiently utilize the available frequency band
by avoiding interference. Furthermore, the GCS-
SDN can be beneficial for public safety scenarios
where the malfunctioning base station traffic can
be bypassed by a properly working base station
because of having complete network information
in the cloud. Moreover, in the future the existing
MDr architecture discussed previously and shown
ol
toc

in Fig. 3 can also be upgraded to SDN-based


pro
w

architectures for more efficient operations of MDr


Flo
en

FANETs.
Op

Applications

MME/
P-GW
S-GW Policy RRM
& charging controller
Promising Key Technologies for
API ADr Monitoring
Virtualized control plane
Operational Frequency Bands for MDr Deployment
According to the latest reports from the Federal
SDN controller Aviation Administration (FAA) [8], there is a fore-
cast for 2020 that 7 million drones will fly in the
United States. This will result in intense competi-
tion for spectrum usage because drones are clas-
sified into two types based on their applications:
Software-defined networking based
ground control station (SDN-GCS) MDr and ADr. Thus, the frequency band selec-
tion for MDrs is more important for their secure
(b)
operation from jammer attacks and to have less
FIGURE 4. MDr deployment scenarios: a) conventional deployment scenario; interference from nearby drones. Moreover, there
b) SDN assisted MDr deployment scenario. are two main types of communication links: one
is for control commands, and the other is for pay-
load/data communications between MDrs and
have the benefits of low cost, high coverage, low GCSs. The control commands usually require low
latency, scalability, and high reliability as compared data rate communications links, whereas for pay-
to GCS-P2P and GCS-C/SA architectures. load communications high data rate is desired to
transfer information like videos and sensor data.
GCS-SDN: Software-Defined Networking Based Currently, no specific frequency allocations have
Ground Control Station Architecture for MDrs been made on an international level for control
and payload communications. Thus, the precise
The GCS for the three architectures discussed selection of operational frequency band for MDr
above has distributed control on all MDrs where deployment is too important as it can be differ-
each MDr controls its behavior as shown in Fig. ent according to the MDr deployment situation.
4a. The deployment of MDrs in a security-sensitive Usually, for less security-sensitive areas, MDrs can
area will be more beneficial if it can be controlled operate on freely available industrial, scientific,
and managed centrally rather than independently. and medical (ISM) frequency bands of 2.4 or
This deployment would facilitate flexible deploy- 5.8 GHz and remote control bands (433 MHz,
ment and management of new services and will 800 MHz) [9] for both control and payload/
help to have an overall view of the network situ- data communications. Since ISM band is used
ation. Previously, deployment of software-defined for wireless networks, it sometimes results in loss
networking (SDN) was focused on the infrastruc- of control over the MDrs in densely populated
ture-based static deployment scenario because areas because of interference with other wireless
it was believed that SDN was suitable only for signals.
static networks. But recent research results [6] For highly sensitive areas, it is recommended
proved that the SDN deployment is beneficial that MDr control and payload communication use
for a dynamically changing environment with the dedicated licsensed bands such as IEEE L-band
moving/flying base stations. Thus, based on these and IEEE S-band [10] to avoid interference among
results we propose to deploy SDN-based GCS other wireless communications systems. Addition-

154 IEEE Wireless Communications • April 2018


Frequency band Pros Cons

•Multiple channels available at one location for control and data


• Does not support broadcast of quality video
• Little multipath distortion
433 MHz [9] • Legally transmitted power inside band 433.050–434.79 MHz
• Range is less susceptible to weather conditions
restricted to 10 mW effective radiated power (ERP)
• Long transmission distance

• Expected interference in populated areas due to the wide use:


microwave ovens, cordless phones, wireless LAN
• Enables video broadcast • LOS operational requirements
2.4 GHz [9]
• Low-cost system • Range affected by humidity in the air
• Legal transmitting power restrictions (100 mW ERP) for the
802.11.b/g technology

• Severe multipath distortion causes


• Enables video broadcast
• Very poor performance in FM mode
5.8 GHz [9] • Small transmitting antennas
• LOS operational requirements
• Low multipath distortions in spread spectrum OFDM modulation
• Range affected by humidity in the air

1575.42 MHz (GPS L1) • Less interference with existing wireless communications system • Ionosphere and troposphere leads to slowdown of signal
1227.6 0MHz (GPS L2)[9] • High coverageavailable free of charge without any subscription or license propagation speed

• Dynamic spectrum access


Any bands using
• Suitable for public safety and emergency situations
cognitive radio • To handle the trade-off between sensing and transmission
• Opportunistic spectrum utilization based on commercial applications’
technology [10]
requirements
TABLE 1. Pros and cons of using different frequency bands for monitoring drone.

ally, if governmental organizations want to use sat- desired for the proposed architecture discussed
ellites to control their drones far from their own above for ADr detection.
territories, then in this case, MDr global positioning Linear Predictive Coding-Based Sound Detec-
services (GPS) bands (GPS L1 1575.42 MHz, GPS tion Scheme: Drones have distinct sound as com-
L2 1227.60 MHz) [9] can be used for MDr con- pared to the sound of cars, thunder, and other
trol and payload operation. The pros and cons of flying or moving objects. Thus, based on these
utilizing different frequency bands for MDrs are differentiating factors, sound can be used for ADr
summarized in Table 1. Moreover, we conclude detection. The main challenge in application of
that there is no dedicated spectrum available for sound detection schemes for ADr detection is
MDr deployment yet for security-sensitive areas, the noisy and complex environment because ADr
and thus based on the deployment situation, it can sound may not be easily separable from the noise.
be adopted. Hence, to internationally accommo- The existing sound detection scheme uses the
date the usage of MDrs for surveillance of ADrs, linear predictive coding (LPC) scheme for sound
significant efforts and research is desired to prop- detection. The LPC scheme is frequently used for
erly allocate the spectrum for MDr. Moreover, the speech recognition and works on the principle
frequency band could be decided in upcoming of detecting spikes in the frequency spectrum.
(2019) World Radio Communication conferences Drones have spikes as well; thus, it was chosen
(WRC), organized by the International Telecommu- as the basis for sound detection. The LPC is used
nication Union (ITU) every four years. such that the sound at a point can be approxi-
mated in time from past samples. These approx-
Detection Technologies for ADr Monitoring imated coefficients are called LPC coefficients,
Drones with numerous applications and their and can be trained for various speeds in time and
possible security threats are discussed above in stored in a database. Still, there is a chance that
detail. Hence, on-time detection of ADrs in no-fly similar sounds like drones could be falsely detect-
zones or national security-sensitive area is the first ed. To solve this problem, the authors in [11] also
and most important step of security. The detec- considered the slope of the frequency spectrum
tion schemes can be broadly divided into three to decrease the number of false alarms, and they
major groups: electromagnetic-wave-based detec- proved it was beneficial in terms of false alarm
tion, sound wave detection for drones that do reduction.
not emit any radio/electromagnetic waves, and Sound Feature Detection and Classifica-
drone detection using thermal imaging cameras. tion Algorithms: The sound detection scheme
These techniques can have the ability to detect works in two main phases. First, there is feature
small drones in low-flying zones and non-coop- extraction and then feature classification by using
erative targets in high clutter environments. The machine learning algorithms. For sound fea-
efficiency and range of detection schemes can ture extraction, the algorithms such as harmon-
be increased if sound sensing, imaging methods, ic line association (HLA), mel-frequency cepstral
and radio wave detection are properly com- coefficient (MFCC), and wavelet-based feature
bined. Conventional radar cannot be used for extraction are frequently used in audio signal pro-
ADr detection because it is usually designed for cessing. HLA arranges spectrum peaks with levels
large aircraft. Moreover, ADrs are mostly made of greater than noise level into families of harmoni-
plastic material that has dielectric property close cally related lines that exceed the noise level into
to air, and thus has little or no reflection back to families of harmonically related narrowband lines.
the transmitter. Hence, efficient algorithms are Thus, the HLA algorithm is also suitable for ADr

IEEE Wireless Communications • April 2018 155


The SPYNEL
360-degree camera Sound dataset training stage Feature vectors

head takes a panoram- Sounds Feature extraction


(ADr, birds, etc.)
ic image of an entire training set (HLA, MFCC)
Sound
wide area and built- in classification
advanced algorithms Sound labels
(SVM, HVM)
can automatically
detect and track an Trained classifiers
Sound prediction stage
unlimited number of
air, land, and maritime Recorded sound Feature extraction Sound label
(HLA, MFCC) prediction
targets including large
thermal engine UAVs. Feature vector
Expected
To further improve sound label
the performance, the (ADr, bird, etc.)
research on advanced (a)
algorithms are desired
which can efficiently -50
20 20 -40
-60
detect these targets.
-70 -60

Power/frequency (dB/Hz)

Power/frequency (dB/Hz)
15 -80 15

Frequency (kHz)
Frequency (kHz)

-90 -80
-100
10 10 -100
-110
-120 -120
5 -130 5
-140 -140
-150 0
0 1 2 3 4 5 6 7 8 9
1 2 3 4 5 6 7 8 9
Time (s) Time (s)
(b) (c)

x104

2
-40

-60
1.5
Frequency (Hz)

-80

1 -100

-120
0.5
-140

0
1 2 3 4 5 6 7 8 9
Time (s)
(d)

FIGURE 5. Machine-learning-based sound detection scheme and spectrograms for sound classifications: a)
sound detection using machine learning; b) drone spectrogram; c) car spectrogram; d) thunder spec-
trogram.

sound detection because ADrs also emit strong three different sounds — drone, car, and thunder
harmonic lines produced by propellers, and these — are plotted in Fig. 5. The horizontal axis of each
harmonic lines will prove the presence of ADrs. spectrogram represents time, the vertical axis is fre-
Similarly, MFCC is frequently used in speech rec- quency, and the intensity bar represents the ampli-
ognition systems, and increasingly finds uses in tude of a particular frequency in time.
applications such as sound similarity measures, These spectrograms can be analyzed through
which can be useful for feature detection. the HLA feature extraction algorithm by extract-
To detect and classify different sounds based on ing a set of feature vectors and comparing them
their features, short-time Fourier transform (STFT) against the acoustic target database to find the
is used to obtain the spectrogram of the drone, label of the object (i.e., ADr sound, car sound,
car, and thunder sounds stored in our database. or thunder sound). For classifying the extracted
The variations in spectrum of frequencies can be feature from the spectrogram, we use machine
seen by the spectrogram, which gives a visual rep- learning (ML) algorithms. In ML, different set of
resentation of the frequencies. By using these fre- algorithms are programmed in GCS that analyze
quencies we can extract features of sounds; this the data obtained from MDrs and try to make
can help to detect drones. The spectrograms of predictions about it. These algorithms are classi-

156 IEEE Wireless Communications • April 2018


fied based on how learning is performed, such for its tracking, hunting, and future process- Target tracking by
as supervised learning and unsupervised learning. ing. For localization, the MDr and GCS need using MDrs is an
In supervised learning, the algorithms are given a exact information about ADr altitude, ADr GPS important research area
set of input and output data, and then a model is coordinates, and intruder GPS coordinates. To after detecting ADrs,
developed based on the input-output relationship. accurately locate an ADr and the position of
Then a new set of input data from MDrs is gath- an intruder using low-quality inertial measure- especially the target
ered and fed into the learned model so that the ment unit (IMU) and global positioning system tracking in 3D space.
algorithm can make its predictions. The reason for (GPS) in bad weather would be a challenging MDr tracking capabil-
selecting supervised learning-based algorithms is task as GPS accuracy decreases in bad weather. ity depends on many
that it includes the trained dataset that consists of Although some robust inertial/GPS localization aspects, but we focus
both features and labels irrespective of unsuper- are proposed in [12], these schemes still have
vised learning models, which only have features. less precision, and nearby signal interference is on how accurately
Thus, by using these trained datasets, we have a not modeled in this proposal. In order to solve an MDr gets the ADr
task to use the set of features to predict the label this problem, we propose a solution to increase information using the
of an object. The supervised-learning-based ML the accuracy of localization by creating a FANET installed sensors on the
algorithms includes linear classifiers, support vec- of MDrs deployed for monitoring purposes. The MDr, and then how
tor machine (SVM), and hidden Markov model measured information from all the MDrs would
(HMM). In SVM, the situation is modeled by cre- be used to more accurately locate the position accurate and effective
ating a finite-dimensional vector space, where of the ADrs. Moreover, in order to increase the control commands are
each dimension represents a feature of a particular accuracy of the localization scheme, the images generated by ADrs to
object such as a bird or an ADr. HMM is the statis- taken from the installed camera on an MDr can achieve tracking.
tical Markov model where the states (bird or ADr) be used beside GPS to obtain more accurate
are hidden. Each state can emit an output (sound), localization results. But this poses more research
which is observed. By using the Bayes theorem, we challenges like image drift effect and is prone to
can obtain the probability of whether it was an ADr errors due to wrong estimation. They are also
or a bird. The detailed steps of feature extraction sensitive to illumination changes and environ-
through classification are depicted in Fig. 5. mental modifications. Hence, further research
From the above discussions and operators’ is needed to solve these localization challeng-
recommendations, we conclude that the sound es and to increase the reliability of the existing
detection technologies range is not a fixed value schemes.
but usually lies between 50 and 300 m. The exact
value of sound detection technologies depends on ADr Tracking Technologies
parameters such as selected operational frequency, Target tracking using MDrs is an important
noise volume, and the background noise of the research area after detecting ADrs, especial-
drone. ly the target tracking in 3D space. MDr track-
HGH Thermal Camera-Based ADr Detection ing capability depends on many aspects, but
Technology: Infrared (IR) thermal imaging has we focus on how accurately an MDr gets the
already been proved quite effective for indus- ADr information using the installed sensors on
trial applications. In order to detect small flying the MDr, and then how accurate and effective
drones, IR thermal imaging technology could control commands are generated by ADrs to
also be very effective. An infrared imaging cam- achieve tracking. The first important step in ADr
era works on the principle of detecting the target tracking is to get full channel state infor-
infrared heat energy and converting it into an mation of the ADr, but there is a chance that
electronic signal; then this signal is processed this information can be affected by external dis-
to produce a thermal image. Recently, HGH turbances such as wind and other factors. The
Infrared Systems has developed a number of IR channel state information desired for ADr track-
thermal cameras such as SPYNEL-X, SPYNEL-S, ing includes the location, range, azimuth, and
SPYNEL-C, and SPYNEL-U. These IR thermal elevation angles of the ADr. Numerous classical
cameras are equipped by sensors with differ- guidance and control algorithms have caught
ent sensitivity levels and cameras that can take researchers’ attention in recent years such as the
panoromic images of various qualities. Hence, vector field approach, Serret-Frenet represen-
the IR thermal cameras’ MDr detection range tation-based methods, line of sight algorithms,
suggested by different operator varies from 50 feedback linearization, and the back-stepping
to 400 m based on these factors. They also have approach. But these approaches have a problem
the capability to discriminate the target over in that they demand full and accurate channel
extremely large areas even in darkness, fog, or state information at the MDr. Since we do not
smoke. The SPYNEL 360° camera head takes have full state information available, to efficiently
a panoramic image of an entire wide area, and utilize these tracking algorithms estimation algo-
built- in advanced algorithms can automatical- rithms such as the Kalman filter approach and
ly detect and track an unlimited number of air, extended Kalman filter algorithms are desired
land, and maritime targets including large ther- because these can accurately track the target
mal engine UAVs. To further improve the per- without having full channel state information.
formance, research on advanced algorithms that Hence, more research is needed to design Kal-
can efficiently detect these targets is desired. man-filter-estimation-based control algorithms,
which can efficiently work with limited channel
ADr Localization Technologies state information and can track dynamic 3D
The main step after detecting the ADr is to moving targets. Moreover, they have the capa-
localize and track it. Localization means finding bility to cope with the environmental changes
the real-world position of an ADr in real time. such as the measurements corrupted by white
The accurate localization of an ADr is needed noise and stationary colored noise.

IEEE Wireless Communications • April 2018 157


For localization under MDr Routing Technologies drone should be landed outside a security-sensi-
tive area. Moreover, some efficient path planning
the GCS-MA architec-
ture, the technologies The FANET is also an ad hoc network for UAVs algorithms can be used to safely land the cap-
used for localization but its requirements are relatively different from tured ADr.
the traditional networking model, such as mobile
will be the same, but as ad hoc networks (MANETs) and vehicular ad hoc
a result of using known networks (VANETs). Hence, the FANET has dif- Challenges and
geographic positions ferent routing challenges based on the specific
scenario, network situation, and performance cri-
Future Research Trends in MDr
of the MDr network to
estimate the position teria as compared to the MANET and VANET. Interference Management Schemes for MDr
We are focusing on routing protocols for MDrs, For ADr monitoring, the MDr usually works on
of ADr, the results of which should also be secure in order to save ISM bands, resulting in high co-channel interfer-
localization would them from intruder attacks. Previously, the FANET ence with the existing wireless networks, which
be more reliable and communications protocols, which include phys- will significantly decrease the quality of service
resilient to localization ical (PHY), medium access control (MAC), and (QoS) for MDrs. Also, the jamming technologies
error. network layers, are discussed [13], but here the such as using excess power and GPS spoofing
survey of different routing protocols are provid- can generate high interference to the MDr sig-
ed without considering the MDr situations and nal. Thus, a jamming signal power control algo-
security issues. So, based on the lack of these, we rithm needs to be designed to avoid surrounding
present some challenges for future research. The MDr jamming. The existing schemes like inter-
main difference between the MDr FANET and the cell interference coordination (ICIC) and coor-
existing ad hoc networks is mobility. The speed dinated multipoint (CoMP) transmission would
of an MDr is between 30–460 km/h, which leads not be sufficient to cope with it. The main reason
to several routing challenges like frequent update is that the flying path of the MDr is not predict-
in MDr network topology because one MDr is in able as it is tracking the ADr whose flying path
outage or due to battery constraints. is not known in advance. In this situation, power
The notable point here is that except for the control schemes can work efficiently but need
routing technologies, as routing is only possible much modification according to the architecture
in GCS-MA architecture, the rest of the technolo- and environment. Hence, the future challenges
gies such as detection, localization, and tracking include the development of novel and dynamical-
are architecture independent. The main reason is ly adaptive architecture-independent interference
that they are mostly implemented in GCS on the management schemes.
ground, as shown in Fig. 2. That is, mostly the MDrs
flying for monitoring do the initial communications Channel Models for MDr
or necessary information processing, whereas Channel varies as the environment and operational
detailed analysis is done in the GCS due to power frequency changes. Hence, one important future
and hardware constraints. Hence, all the algorithms research challenge is to design channel models for
and technologies discussed here are equally valid MDr operational frequency band in order to test
for the four architectures discussed in this article. and validate different technologies under various
The only effect of varying the architecture is the architectures. The two main types of communica-
increase in accuracy and reliability. For example, tions links in MDrs are air-to-air and air-to-ground,
for localization under the GCS-MA architecture, and links should be reliable for safe operation of
the technologies used for localization will be the MDrs. Reliability of these links can be achieved if
same, but as a result of using known geograph- we know the channel characteristics in advance.
ic positions of the MDr network to estimate the There is a major difference between the channel
positions of ADrs, the results of localization would environment of air-to-ground and air-to-air com-
be more reliable and resilient to localization error. munications in relaying. The MDrs connected in a
Similarly, this will happen for all other technologies FANET have to relay their information to neighbor
discussed in this article. MDrs in the network. Some theoretical models are
proposed for air-to-air communications links, but
MDr Jamming and Hunting Technologies no properly tested and validated channel models
ADr jamming can be done by using excess power exist for air-to-air communications links with relay-
and GPS spoofing [14]. In the literature, numer- ing concepts. The existing channel models like two-
ous jamming methods such as the triangle meth- ray and Rician channel models could be suitable
od and genetic-algorithm-based jamming methods for this environment. But experiments and tests are
are proposed. Since the MDr is moving, these needed to select the proper value of line-of-sight
jamming methods are not too efficient. Hence, component factor K, to model the effect of Dop-
cooperative jamming is a hot topic, and it can pler effect for different MDr velocity as an MDr has
be more effective in MDr jamming because of high Doppler shift due to high velocity, and for dif-
its accuracy and efficiency. But these jamming ferent Doppler spread. Moreover, more research is
schemes can generate high interference to the desired to test these channel models for different
MDr signal. Thus, in order to reduce the effect ranges of frequencies such as 433 MHz, 1575.42
of jamming on MDrs, power control, interfer- MHz, and 2.4 GHz. Furthermore, the more accu-
ence management, and beamforming algorithms rate 3D channel model design for MDrs is an
are also desired to efficiently control the power important future research challenge.
of jamming signals. After jamming an ADr, the
hunting of the ADr can be done using nets by Cooperative Schemes for MDr
taking care of the security sensitivity of the sur- Cooperation in MDrs can be helpful to increase
rounding environment. For example, if the ADr reliability in detection, tracking, jamming, and mis-
is carrying some explosive material, the captured sion and path planning. Our proposed GCS-SDN

158 IEEE Wireless Communications • April 2018


architecture will be suitable to implement coop- [4] G. Mao, S. Drake, and B. D. Anderson, “Design of an Cooperation in MDr
Extended Kalman Filter for UAV Localization,” Information,
erative schemes in MDrs because of its ability to Decision and Control, 2007, pp. 224–29. can be helpful to
centrally control and manage technologies. By [5] X. Ge et al., “5G Ultra-Dense Cellular Networks,” IEEE Wire- increase the reliability
cooperation, MDrs can use path planning algo- less Commun., vol. 23, no. 1, 2016, pp. 72–79.
in detection, tracking,
rithms to produce a coordinated mission, which [6] Z. Kaleem and K. Chang, “Public Safety Priority-Based User
Association for Load Balancing and Interference Reduction jamming, and mission
can increase the detection and tracking chances in PS-LTE Systems,” IEEE Access, vol. 4, 2016, pp. 9775–85.
of ADrs flying in their vicinity. Moreover, coop- [7] A. Bradai et al., “Cellular Software Defined Networking: A and path planning. Our
erative MDrs can be fault-tolerant, increase the Framework,” IEEE Commun. Mag., vol. 53, no. 6, June 2015, proposed GCS-SDN
detection and tracking range, cooperatively local- pp. 36–43.
[8] “Aerospace Forecasts 2016-2036,” 2017; https://www.faa. architecture will be
ize moving radio frequency source (e.g., ADr) gov suitable to implement
with more accuracy [15], and reduce the inter- [9] B. Custers, The Future of Drone Use: Opportunities and
ference by using coordinated scheduling. Hence, Threats from Ethical and Legal Perspectives, Springer, 2016, cooperative schemes
cooperative schemes are an important future vol. 27. in MDr because of its
[10] Y. Saleem, M. H. Rehmani, and S. Zeadally, “Integration of
research challenge. Cognitive Radio Technology with Unmanned Aerial Vehi- ability to centrally con-
cles: Issues, Opportunities, and Future Research Challeng- trolled and managed
Conclusion es,” J. Network and Computer Applications, vol. 50, 2015,
pp. 15–31. technologies.
Drone deployment is posing some serious secu-
[11] L. Hauzenberger and E. Holmberg Ohlsson, Drone Detec-
rity challenges to national heritage and commer- tion Using Audio Analysis, Master’s thesis, 2015.
cial areas because they have the potential to carry [12] A. Nemra and N. Aouf, “Robust INS/GPS Sensor Fusion
explosive materials. In this article, to combat these for UAV Localization Using sdre Nonlinear Filtering,” IEEE
security challenges, we propose the concept of Sensors J., vol. 4, no. 10, 2010, pp. 789–98.
[13] O. K. Sahingoz, “Networking Models in Flying Ad-Hoc Net-
monitoring drones to detect, control, and jam works (FANETs): Concepts and Challenges,” J. Intelligent &
amateur drones. We also discuss the architecture Robotic Systems, vol. 74, no. 1-2, 2014, p. 513.
for monitoring drones and categorize it into three [14] D. He, S. Chan, and M. Guizani, “Communication Securi-
main types: point-to-point architecture, cellular or ty of Unmanned Aerial Vehicles,” IEEE Wireless Commun.,
2016.
satellite assisted architecture, and ad hoc network [15] F. Koohifar, A. Kumbhar, and I. Guvenc, “Receding Hori-
architecture based on security-sensitive situations. zon Multi-UAV Cooperative Tracking of Moving RF Source,”
Moreover, some of the existing key technologies IEEE Commun. Letters, vol. 21, no. 6, 2017, pp. 1433–36.
related to detection, tracking, routing, and jamming
are discussed with their future research directions. Biographies
Z eeshan K aleem is an assistant professor in the Department
Hence, the importance of deploying monitoring of Electrical Engineering, COMSATS Institute of information
drones along with some research and develop- Technology, Pakistan. He received his Ph.D. degree in elec-
ment challenges are highlighted in this article. tronics engineering from INHA University, Korea (2016). He
has authored several peer-reviewed Journal/conference papers
and holds 18 U.S./Korea patents. He is an Associate Editor of
References IEEE Access and IEEE Communications Magazine. His research
[1] Y. Zeng, R. Zhang, and T. J. Lim, “Wireless Communications interests include device-to-device communications/discovery,
with Unmanned Aerial Vehicles: Opportunities and Chal- unmanned airborne vehicles, and resource allocation in 5G
lenges,” IEEE Commun. Mag., vol. 54, no. 5, May 2016, pp. networks.
36–42.
[2] M. Paul, S. M. Haque, and S. Chakraborty, “Human Detec- Mubashir Husain Rehmani [M’ 14, SM’ 15] received his B.Eng.
tion in Surveillance Videos and Its Applications — A Review,” in computer systems engineering from MUET, Pakistan (2004),
EURASIP J. Advances in Signal Processing, vol. 2013, no. 1, his M.S. from the University of Paris XI, France (2008), and his
2013, p. 176. Ph.D. from the University Pierre and Marie Curie, Paris (2011).
[3] G. R. Rodrguez-Canosa et al., “A Real-Time Method to He is currently a post-doctoral researcher at Waterford Institute
Detect and Track Moving Objects (datmo) from Unmanned of Technology, Ireland. He received a certificate of appreciation,
Aerial Vehicles (UAVs) Using a Single Camera,” Remote “Exemplary Editor of IEEE Communications Surveys & Tutorials
Sensing, vol. 4, no. 4, 2012, pp. 1090–1111. for 2015,” from IEEE Communications Society.

IEEE Wireless Communications • April 2018 159

You might also like