rf sensing based target detector for smart sensing within ... · technologies have made radio...

18
Received June 1, 2017, accepted July 6, 2017, date of publication July 20, 2017, date of current version August 8, 2017. Digital Object Identifier 10.1109/ACCESS.2017.2728372 RF Sensing Based Target Detector for Smart Sensing Within Internet of Things in Harsh Sensing Environments SIVA KARTEEK BOLISETTI 1 , (Student Member, IEEE), MOHAMMAD PATWARY 2 , (Senior Member, IEEE), ABDEL-HAMID SOLIMAN 1 , AND MOHAMED ABDEL-MAGUID 3 , (Senior Member, IEEE) 1 School of Creative Arts and Engineering, Staffordshire University, Stoke-on-Trent ST4 2DE, U.K. 2 School of Computing and Digital Technology, Birmingham City University, Birmingham B5 5JU, U.K. 3 Department of Science and Technology, University of Suffolk, Ipswich IP4 1QJ, U.K. Corresponding author: Siva Karteek Bolisetti ([email protected]) ABSTRACT In this paper, we explore surveillance and target detection applications of Internet of Things (IoT) with radio detection as the primary means of sensing. The problem of surveillance and target detection has found its place in numerous civilian and military applications, and IoT is well suited to address this problem. Radio frequency (RF) sensing techniques are the next generation technologies, which offer distinct advantages over traditional means of sensing used for surveillance and target detection applications of IoT. However, RF sensing techniques have yet to be widely researched due to lack of transmission and computational resources within IoT. Recent advancements in sensing, computing, and communication technologies have made radio detection enabled sensing techniques available to IoT. However, extensive research is yet to be done in developing reliable and energy efficient target detection algorithms for resource constrained IoT. In this paper, we have proposed a multi-sensor RF sensing-based target detection architecture for IoT. The proposed target detection architecture is adaptable to interference, which is caused due to the co-existence of sensor nodes within IoT and adopts smart sensing strategies to reliably detect the presence of the targets. A waveform selection criterion has been proposed to identify the optimum choice of transmit waveforms within a given set of sensing conditions to optimize the target detection reliability and power consumption within the IoT. A dual-stage target detection strategy has been proposed to reduce the computational burden and increase the lifetime of the sensor nodes. INDEX TERMS Energy efficiency, Internet of Things (IoT), multi-sensor, RF sensing, target detection. I. INTRODUCTION IoT consists of low cost, easy-to-use, easy-to-deploy network of active or passive sensor nodes, which are deployed within the sensing region. Depending on the nature of the sensing application, the sensor nodes can be deployed either ran- domly or in an organised fashion. Once deployed, the sensor nodes collect data, which can be used to perform tasks such as surveillance, remote monitoring, etc. The sensor nodes are equipped with one of more sensing devices with limited power, processing, and communication capabilities. Sensor nodes collectively monitor the sensing region and respond to the occurrence of unexpected events or relay the information to a centralised control centre. The control centre, which is usually equipped with additional power and processing resources, collects the data from all the sensor nodes and makes a decision regarding the occurrence of the event. In recent times, IoT [1], [2] have experienced increased attention in civilian, industrial, and military applications. Due to low-cost and cooperative nature of sensor nodes, IoT is well suited for surveillance applications [3], [4]. Some of the surveillance applications of IoT include battlefield surveil- lance, remote monitoring in urban environments, intrusion detection, etc. Sensor nodes can be deployed in hazardous battlefield environments to monitor enemy activities while keeping the human operator at safety. Depending on the nature of the sensing application, the sensor nodes can either actively interact with the sensing environment or passively monitor the same. Jaigirdar et al. [5] have discussed the 13346 2169-3536 2017 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. VOLUME 5, 2017

Upload: others

Post on 28-Aug-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: RF Sensing Based Target Detector for Smart Sensing Within ... · technologies have made radio detection enabled sensing techniques available to IoT. However, extensive research is

Received June 1, 2017, accepted July 6, 2017, date of publication July 20, 2017, date of current version August 8, 2017.

Digital Object Identifier 10.1109/ACCESS.2017.2728372

RF Sensing Based Target Detector for SmartSensing Within Internet of Things in HarshSensing EnvironmentsSIVA KARTEEK BOLISETTI1, (Student Member, IEEE),MOHAMMAD PATWARY2, (Senior Member, IEEE), ABDEL-HAMID SOLIMAN1,AND MOHAMED ABDEL-MAGUID3, (Senior Member, IEEE)1School of Creative Arts and Engineering, Staffordshire University, Stoke-on-Trent ST4 2DE, U.K.2School of Computing and Digital Technology, Birmingham City University, Birmingham B5 5JU, U.K.3Department of Science and Technology, University of Suffolk, Ipswich IP4 1QJ, U.K.

Corresponding author: Siva Karteek Bolisetti ([email protected])

ABSTRACT In this paper, we explore surveillance and target detection applications of Internet ofThings (IoT) with radio detection as the primary means of sensing. The problem of surveillance and targetdetection has found its place in numerous civilian and military applications, and IoT is well suited to addressthis problem. Radio frequency (RF) sensing techniques are the next generation technologies, which offerdistinct advantages over traditional means of sensing used for surveillance and target detection applicationsof IoT. However, RF sensing techniques have yet to be widely researched due to lack of transmissionand computational resources within IoT. Recent advancements in sensing, computing, and communicationtechnologies have made radio detection enabled sensing techniques available to IoT. However, extensiveresearch is yet to be done in developing reliable and energy efficient target detection algorithms forresource constrained IoT. In this paper, we have proposed a multi-sensor RF sensing-based target detectionarchitecture for IoT. The proposed target detection architecture is adaptable to interference, which is causeddue to the co-existence of sensor nodes within IoT and adopts smart sensing strategies to reliably detect thepresence of the targets. A waveform selection criterion has been proposed to identify the optimum choice oftransmit waveforms within a given set of sensing conditions to optimize the target detection reliability andpower consumption within the IoT. A dual-stage target detection strategy has been proposed to reduce thecomputational burden and increase the lifetime of the sensor nodes.

INDEX TERMS Energy efficiency, Internet of Things (IoT), multi-sensor, RF sensing, target detection.

I. INTRODUCTIONIoT consists of low cost, easy-to-use, easy-to-deploy networkof active or passive sensor nodes, which are deployed withinthe sensing region. Depending on the nature of the sensingapplication, the sensor nodes can be deployed either ran-domly or in an organised fashion. Once deployed, the sensornodes collect data, which can be used to perform tasks suchas surveillance, remote monitoring, etc. The sensor nodesare equipped with one of more sensing devices with limitedpower, processing, and communication capabilities. Sensornodes collectively monitor the sensing region and respond tothe occurrence of unexpected events or relay the informationto a centralised control centre. The control centre, whichis usually equipped with additional power and processing

resources, collects the data from all the sensor nodes andmakes a decision regarding the occurrence of the event.

In recent times, IoT [1], [2] have experienced increasedattention in civilian, industrial, and military applications.Due to low-cost and cooperative nature of sensor nodes, IoT iswell suited for surveillance applications [3], [4]. Some of thesurveillance applications of IoT include battlefield surveil-lance, remote monitoring in urban environments, intrusiondetection, etc. Sensor nodes can be deployed in hazardousbattlefield environments to monitor enemy activities whilekeeping the human operator at safety. Depending on thenature of the sensing application, the sensor nodes can eitheractively interact with the sensing environment or passivelymonitor the same. Jaigirdar et al. [5] have discussed the

133462169-3536 2017 IEEE. Translations and content mining are permitted for academic research only.

Personal use is also permitted, but republication/redistribution requires IEEE permission.See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

VOLUME 5, 2017

Page 2: RF Sensing Based Target Detector for Smart Sensing Within ... · technologies have made radio detection enabled sensing techniques available to IoT. However, extensive research is

S. K. Bolisetti et al.: RF Sensing-Based Target Detector for Smart Sensing Within IoT

introduction of active sensor nodes within the sensing region.While active sensor nodes allow aggressive sensing strategiesto achieve increased reliability, the increased power con-sumption within resource limited sensor nodes must be takeninto account while designing the network. Within the existingliterature, to the best of author’s knowledge, limited researchhas been done towards developing RF sensing based IoT.

For IoT deployed in harsh sensing environments, thereis a need to develop robust target detectors, which providereliable target detection rates while being computationallyefficient. Most often within IoT, the sensor nodes are requiredto operate in harsh sensing environments in the presenceof clutter and interfering signals. The sensor nodes whileco-existing with the other sensor nodes are required to pro-vide reliable target detection rates while using the limitedavailable power and processing capabilities. Our proposedtarget detector is expected to give an energy efficient solu-tion to the problem of target detection under these sensingconditions. To optimise the target detector, we divide thetarget detection procedure into initialisation and operationalstages. Preliminary time-invariant estimations are performedin initialisation stage and the final decisions are made usingthe received signal samples obtained during the operationalstage. Amount of data transfer between the sensor nodes andthe control centre has a severe impact on the lifetime of sensornodes. We proposed compressive sensing to reduce the trans-missions costs. Finally, we propose a waveform selectionstrategy to optimise the reliability and energy efficiency ofthe target detector. The main contributions of this paper areas follows:

1) RF sensing based target detection architecture forsurveillance applications of IoT has been proposed inthis paper.

2) An optimised dual-stage target detection strategy hasbeen proposed to improve the computational efficiencyof the target detector.

3) To increase the lifetime of the sensor nodes we proposecompressive sensing where the sensor nodes are onlyrequired to transmit reduced number of compressedreceived signal samples to the control centre.

4) We propose a waveform selection criterion to optimisethe energy efficiency and target detection reliabilityof the sensor nodes within the IoT while co-existingwith the other sensor nodes.

Rest of the paper is organised as follows: The existing liter-ature related to our work is elaborated in Section II. Problemformulation for the proposed IoT and the expected receivedsignal models are discussed in Section III. Inverse covari-ance estimation procedure for target detection is discussedin Section IV and elaborated in Appendix. In Section Vwe derive the test statistic for the proposed target detector.In Section VI we discuss the waveform selection criterion forco-existence of sensor nodes within IoT. Simulation resultsare discussed in Section VII followed by conclusion andfuture work in Section VIII.

II. RELATED WORKSensing the presence or absence of a target is one ofthe primary objectives of IoT for surveillance applications.Traditionally, IoT used infrared, magnetic, seismic, acous-tics, optics, etc. as primary means of sensing. Intrusiondetection for surveillance applications is a problem, whichis well suited for IoT. However, RF sensing based targetdetection within IoT has not yet been widely researched.RF sensing involves transmitting RF signals into the sensingregion and detecting reflected components of the transmittedsignals to detect the presence of targets [6]–[8]. Some ofthe major advantages of using RF sensing are no line-of-sight requirement, ability to distinguish between targets andnon-targets, ability to operate through obstacles, ability toestimate range and velocity of the targets, etc. Commercialwidespread applications of RF sensing have not yet beenpossible due to limitations over power consumption andprocessing requirements. With the development of micro-power impulse radios, RF sensing based IoT has become apossibility. Ultra-Wideband (UWB) technology was devel-oped at Lawrence Livermore National Labs [9] which usesmicropower impulses as against to conventional narrowbandtransmissions. Micropower impulses in UWB technology aretransmitted for a short duration of time and hence containlittle energy. Ditzel and Elferink [7] designed a low-power RFsensing platform based on UWB technology and investigatedthe power budget and energy breakdown for the sensor node.These sensor nodes are compact and low powered whichmakes them ideal for IoT. Subsequent developments [10]resulted in designing RF sensing based autonomous networkof sensor nodes with significant improvements in sensingrange and power consumption. An autonomous sensor net-work is expected to have the ability to gather the sensing dataand use intelligent design framework to support autonomousdecision-making capabilities to detect and track targets withinthe sensing range.

Power consumption is one of the main design constraintswithin a sensor node. Ditzel and Elferink [7] have designeda sensor node for RF sensing based applications, whichconsumes 10mA at 3V and provides a sensing range upto 10m. While working prototypes have already been devel-oped, extensive research is yet to be done in develop-ing reliable and computationally efficient target detectors.Dutta et al. [6] have considered Neyman-Pearson basedbinary hypothesis detector to be a suitable target detector.Meguerdichian et al. [11] and Phipatanasuphorn andRamanathan [12] have proposed a target detector, whichuses the average signal strength as measured by the sensornodes to detect the presence of targets. While such methodsare simple to implement and computationally less complex,their target detection reliabilities are poor due to high falsealarm rates. Inmany of the practical surveillance applications,IoT are required to operate in harsh sensing environmentsand the low complexity target detectors proposed for IoTexhibit increased false detection rates and reduced reliability.Real time experiments on Mica2 motes showed that the false

VOLUME 5, 2017 13347

Page 3: RF Sensing Based Target Detector for Smart Sensing Within ... · technologies have made radio detection enabled sensing techniques available to IoT. However, extensive research is

S. K. Bolisetti et al.: RF Sensing-Based Target Detector for Smart Sensing Within IoT

alarm rates of the decisions taken based on the data froma single sensor can be as high as 60 percent [13]. In [10],authors have proposed an IoT with multiple sensor nodesdistributedwithin the sensing region. Varshney [14] discusseddata fusion to improve the target detection reliability. A net-work of distributed sensor nodes is designed in [15]–[17]where the sensors are grouped together by a control centrewhich can adopt joint scheduling approach [18]. The dis-tributed network can provide improved sensing coverage andconnectivity with efficient energy consumption. A distributednetwork of sensor nodes can be seen as a multiple-inputmultiple-output (MIMO) system that transmits a waveform ofknown shape and detects the reflected echoes from the target.The presence of multiple sensor nodes within the sensingregion increases the probability of detecting the presence oftargets. However, the signals transmitted from the neighbour-ing sensor nodes interfere with each other and reduce thetarget detection reliability. In the existing literature, varioustarget detectors [19]–[24] have been proposed by the authorsto provide improved target detection performance. However,the proposed target detectors are computationally intense andincompatible with resource constrained IoT. The presenceof objects within the sensing region, which interact withthe transmitted signal result in clutter returns. Since, clutterreturns appear similar to the target returns, the presence ofclutter leads to increased false detection rates and reducedreliability. In this paper, we design a target detector, whichoperates within the sensing and operational constraints of IoT.The proposed target detector is expected to provide an accept-able trade-of between power consumption, target detectionreliability and computational complexity.

III. PROBLEM FORMULATIONWe have considered a low power surveillance system,which is supported by IoT. To achieve increased reliabil-ity within the low power applications of IoT, we considerRF sensing as the primary means of sensing. The proposedIoT consist of clusters of sensor nodes, which are dis-tributed within the sensing region. Each cluster consists of acontrol centre and a group of receiving nodes, which aredistributed within the sensing region. It is assumed thatthe control centre is equipped with sufficient resources totransmit the desired RF-signal into the sensing region. Thereceived signal model at the receiving nodes is summarisedin Fig. 1. The receiving nodes co-ordinate among them-selves to detect the reflected components of the transmittedRF-signal.

Let there be a cluster of Ns sensor nodes. If the signal istransmitted for a time period of T sec 0≤ t ≤ T , at a samplingrate of fs, let s be aNt×1 vector representing the time-limited,finite energy transmit signal. Therefore, total energy allocatedto each transmission period is

E =∫ T

0s2(t)dt =

Nt∑i=1

s2(i) = sH s (1)

FIGURE 1. Proposed Sensing Scheme for Internet of Things.

When a waveform s(t) is transmitted, the receiving nodes areexpected to receive a direct arrival and reflected componentsof the transmitted signal where the reflected componentsare characterised by a time delay. It is assumed that thetransmitting and receiving nodes are synchronised so thatthe reflected signals can be distinguished from the directarrivals. The sensor nodes also receive interfering signalsfrom the neighbouring clusters. The control centre is assumedto have the knowledge of the transmitting waveforms fromthe neighbouring clusters. If yi(t) is the received signal at theith sensor node, then we can write,

yi(t) =tn∑k=1

s(t) ∗ aik (t)+bn∑k=1

hk (t) ∗ bik (t)

+

cn∑k=1

cik (t)+ wi(t), 0 ≤ t ≤ Ty (2)

Where ∗ denotes convolution operator. Ty is the total timeperiod over which the received signal samples are collected,s(t) is the reference transmit waveform, ak (t) is the impulseresponse corresponding to the k th target return and tn is thenumber of targets within the range bin. hk (t) is the is thek th interfering signal, bk (t) is the impulse response corre-sponding to the k th interfering signal and bn is the numberof interfering nodes. w(t) is the thermal noise.Let the impulse response of the target return be negligible

for a time duration of Ta. Hence the received signals have to

13348 VOLUME 5, 2017

Page 4: RF Sensing Based Target Detector for Smart Sensing Within ... · technologies have made radio detection enabled sensing techniques available to IoT. However, extensive research is

S. K. Bolisetti et al.: RF Sensing-Based Target Detector for Smart Sensing Within IoT

be observed for an extended duration of time which is givenby Ty = T + Ta. The discrete Ny × 1 received signal data atthe ith sensor node is represented as,

yi[n] =tn∑k=1

Saik [n]+bn∑k=1

Hkbik [n]+cn∑k=1

cik [n]+ wi[n]

ai = [a1, a2, . . . , aNa ]T , i = 1,2 . . .Ns

bi = [b1, b2, . . . , bNa ]T , i = 1,2 . . .Ns (3)

Where yi is the Ny×1 received signal data at the ith receivingnode, Ny = Nt + Na - 1. ai is the Na × 1 unknown impulseresponse associated with the target return at the ith receivingnode; bi is the Na × 1 unknown impulse response of theinterfering signal at the ith receiving node; ci is the clutterreturn at the ith receiving node. Noise is assumed to beAWGNwith unknown variance. S is the Ny × Na convolution matrixof s(t), H is the Ny × Na convolution matrix of h(t) and canbe written as in [25], [26],

S =

s(1) 0 . . . . . . 0

s(2) s(1). . . . . . 0

......

. . .. . . 0

s(Nt ) s(Nt − 1) . . . s(1) 00 s(Nt ) s(Nt − 1) . . . s(1)... 0 s(Nt ) . . . s(2)...

... 0. . .

...

0 0 . . . 0 s(Nt )

(4)

H=

h(1) h(0) h(−1) . . . h(2− Na)

h(2) h(1). . . . . .

......

.... . .

. . ....

h(Nt ) h(Nt − 1) . . . h(1)...

... h(Nt ) h(Nt − 1) . . . h(1)

... h(0) h(Nt ) . . . h(2)

...... h(0)

. . ....

h(Ny) h(Ny − 1) h(Ny − 2) h(0) h(Nt )

(5)

The convolution matrices S and H allow us to denote thecontinuous time convolution operator (∗) in (2) into discreteform. In (3) while the impulse responses a, b and noisevariance are unknown but deterministic however, clutter isunknown. Before proceeding to the target detector design, theproblem of unknown clutter has to be addressed.

IV. CLUTTER ESTIMATIONWe consider clutter to be comprised of all the fixed scattererswithin the sensing region. Due to the nature of sensor nodeswith short range sensing capabilities, the dominant scatterersthat contribute to clutter are assumed to be non-varying overextended periods of time. The cluttered nature of the sens-ing environment produces additional transmit signal echoes,

which arrive at the sensor nodes along with the target returns.The vector ci in (3) is a Ny × 1 vector containing the clut-ter returns. In the existing literature, authors have proposedmodelling clutter as a Compound-Gaussian process [27]–[29]i.e., as a product of two independent random variables.

c =√ςg (6)

Here the speckle, g is a complex Gaussian with covariancematrix 6 and ς is the clutter texture component and isusually a real nonnegative scalar. Kraut et al. [30]–[32] andScharf and McWhorter [33] have addressed the problem oftarget detection in the presence of clutter with known covari-ance structure but unknown level. However, the presence ofa noise component whose power is independent of clutter islargely ignored. We consider a disturbance vector consistingof noise and clutter signals, which can be estimated fromsecondary data,

n =√ςg+ w (7)

Rd = ς6 + σ2I (8)

Where n is the disturbance vector and Rd is the disturbancecovariance matrix. I is a M × M identity matrix where Mis the length of the received signal vector. 6 is the cluttercovariance matrix which is unknown to the target detector.Noise variance σ 2 is deterministic and unknown. Estima-tion of these unknown parameters is addressed in the latersections. Clutter covariance estimation has been addressedby the authors in the existing literature [34]–[36]. If cluttertexture is gamma-distributedwithmeanµ and order ν, texturedistribution function can be written as,

f (ς ) =10(ν)

µ

)νςν−1e−

νµς

ς ≥ 0 (9)

Where 0(ν) is the gamma function of order ν. The uncon-ditional probability density function (pdf) of the disturbancevector n can be obtained by averaging f (n|ς ) with respect toits texture distribution f (ς ) [37].

f (n) =∫∞

0

1

πNyNs |ς6 + σ 2I|

× exp[− nH (ς6 + σ 2I)−1nH

]f (ς )dς (10)

However, the detection strategy based on this clutter modelis difficult to implement within resource constrained IoT asit involves unknown parameters and computationally intensenumerical integrations with respect to clutter texture distri-bution. It can be recalled that the disturbance covariancematrix Rd is the sum of unknown stationary clutter and ran-dom deterministic noise. We now derive a simple strategy toestimate clutter from the disturbance covariance matrix. Theclutter covariance matrix, ς6 is assumed to have a knownstructure whose rank r is significantly less than M which isusually true in many practical applications.

Let λdi and 8di (i = 1, 2 . . .M ) be the ith eigenvalueand the corresponding ith normalised eigenvector respectively

VOLUME 5, 2017 13349

Page 5: RF Sensing Based Target Detector for Smart Sensing Within ... · technologies have made radio detection enabled sensing techniques available to IoT. However, extensive research is

S. K. Bolisetti et al.: RF Sensing-Based Target Detector for Smart Sensing Within IoT

of the disturbance covariance matrix Rd . Since Rd is sym-metric, the disturbance covariance matrix can be expressedas 8dλd8

Hd . Similarly let λci and 8ci be the ith eigenvalue

and the corresponding ith normalised eigenvector respectivelyof the clutter covariance matrix 6. It must be noted that λcand 8c here are unknown. From (8) λd can be written as,λd = ςλc + σ

2I. Therefore, Rd can be expressed as,

Rd = 8d (ςλc + σ 2I)8Hd (11)

Finally, inverse covariance matrix is given by,

R−1d = (8Hd )−1(ςλc + σ 2I)−1(8d )−1

= 8d (ςλc + σ 2I)−18Hd (12)

To solve (12), we need to obtain the inverse of (ςλc + σ 2I).Clearly (σ 2I)−1 and (ςλc+σ 2I)−1 always exist. Fundamentalmatrix inversion lemma may be used to solve this problem ifthe rank of λc is 1. However, based on our previous assump-tion, when the rank of λc is r such that 1 ≤ r �M. Therefore,matrix inversion lemma may not always be applicable. Whenσ 2I and (σ 2I + ςλc) are non-singular, from [38] inverse of(σ 2I+ ςλc) is given by,

(σ 2I+ ςλc)−1 = κ−1r − vrκ−1r δrκ

−1r

vk =1

1+ tr(κ−1k δk )

κ−1k+1 = κ−1k − vkκ

−1k δkκ

−1k (13)

Where κ1 = σ 2I; Following the results from [38], thematrix ςλc can be decomposed into a sum of matrices of rankone i.e., ςλc =

∑ri=1 δi and rank of δi is one. Solving (12)

and (13) recursively gives us the inverse of the disturbancecovariance matrix as,

R−1d = σ−2C (14)

Detailed explanation is given in Appendix. Here C is theclutter projection matrix given by,

C ≈ I−r∑i=1

8di8Hdi (15)

When clutter returns are significantly stronger than the noisepower, the dominant eigenvalues in λd which correspondto the clutter returns can be easily distinguished from theremaining eigenvalues of λd . The clutter projection matrix Ccan be easily obtained from the eigenvectors correspondingto the dominant eigen values of Rd .

V. TARGET DETECTOR DESIGNThe performance measure of IoT as a surveillance system;while dedicated to detecting the existence or non-existence oftargets, is the degree of reliability on such decision-makingprocess. The two possible outcomes of this decision mak-ing process are occurrence and non-occurrence of the targetwhich is modelled as a binary hypothesis testing problem.The two possible hypotheses are H0 and H1; where H0 repre-sents the absence of a target and H1 represents the presence

of a target. The received signal models corresponding to thesehypothesis H0 and H1 at the control centre are,

H0 : y[n] =bn∑k=1

Hkbk [n]+ n[n]

H1 : y[n] =tn∑k=1

Sak [n]+bn∑k=1

Hkbk [n]+ n[n] (16)

Here, a = [a1, a2, . . . , aNs ]T and b = [b1, b2, . . . , bNs ]

T .Our objective is to develop a target detector which has theability to make a distinction between hypothesis H0 and H1based on the received signal samples which are corruptedby noise, clutter and interfering signals. A test statistic isgenerated which is measured against a predefined thresholdbased on which a decision is made regarding the existenceor absence of a target. The test statistic for the proposedtarget detector is generated from the likelihood ratio functionwithin which the unknown parameters are estimated usingMaximum Likelihood Estimator (MLE). The threshold γ isgenerated such that the maximum false alarm rate is restrictedto a permissible limit. To design a target detector, the pdfs ofthe received signal samples y[n] under hypothesis H0 and H1is required to be defined. Using the inverse covariance esti-mate from (14), the pdfs under hypothesis H0 (17) andH1 (17) are written as,

f (y|b, σ 2,H0)

=1

(πσ 2)NyNs |C−1|

×exp[−1σ 2

((y−

bn∑k=1

Hkbk )HC(y−bn∑k=1

Hkbk ))](17)

f (y|a,b, σ 2,H1)

=1

(πσ 2)NyNs |C−1|exp[−1σ 2

((y−

tn∑k=1

Sak

bn∑k=1

Hkbk )HC(y−tn∑k=1

Sak −bn∑k=1

Hkbk ))]

(18)

Case 1 (Detector Design With Known σ 2 and 1 InterferingNode): In this case we assume that the noise variance isknown to that target detector and only one neighbouringsensor node is contributing to interference i.e., bn = 1. Thisis applicable to the scenario where sensor nodes are widelyscattered and the interference from the other sensor nodes isnegligibly weak. The test statistic, T for the proposed targetdetector is obtained from the pdfs defined in (17) and (18)where the unknown parameters are replaced by their MLEsas,

T =maxa,b f (y|a,b,H1)maxb f (y|b,H0)

H1><H0

γ (19)

The MLEs of the unknown parameters are obtainedby differentiating the exponential arguments of the pdfs

13350 VOLUME 5, 2017

Page 6: RF Sensing Based Target Detector for Smart Sensing Within ... · technologies have made radio detection enabled sensing techniques available to IoT. However, extensive research is

S. K. Bolisetti et al.: RF Sensing-Based Target Detector for Smart Sensing Within IoT

in (17) and (18) with respect to the corresponding unknownparameter. The corresponding derivatives under hypothesisH0 and H1 are equated to zero to obtain the ML estimate.Since C is Hermitian, differentiating the exponential term inthe (18) with respect to b gives us,

HHCHb1 = HHCy−HHCStn∑k=1

ak (20)

Here, b1 denotes the ML estimate of interference impulseresponse under hypothesis H1 and a represents the ML esti-mate of the target impulse response, which is unknown atthis stage. Similarly, from (17) the ML estimate of b underhypothesis H0 can be obtained as,

HHCHb0 = HHCy (21)

Here, b0 denotes the ML estimate of b under hypothesis H0.With the knowledge of the transmit and the interfering wave-forms available to the control centre, the reference correlationmatrices are written as,

Rs = SHCS (22)

Rh = HHCH (23)

Rs and Rh can be interpreted as the transmit and interferingsignal correlation matrices respectively. Similarly we defineRhs which is the reference cross-correlation matrix betweenthe transmit and the interfering signals as,

Rhs = HHCS (24)

Finally, we define the cross-correlation matrices for receivedsignal with respect to the transmit and the interfering signalsas Rsy and Rhy which are given by,

Rhy = HHCy (25)

Rsy = SHCy (26)

Using the correlation matrices, (20) and (21) can be rewrittenas,

Rhb1 = Rhy − Rhsa (27)

Rhb0 = Rhy (28)

Using (27), the ML estimate of the unknown target impulseresponse is obtained by differentiating the exponential argu-ment in (18) with respect to a and equating it to zero. Solvingthis differential equation gives us,

SHQStn∑k=1

ak = SHQy (29)

Q =(I−HRh

−1HHC)H

C(I−HRh

−1HHC)

(30)

Here, a represents the ML estimate of the target impulseresponse under hypothesis H1. The test statistic for the pro-posed target detector in this case is obtained from (19) as,

T = exp[−1σ 2

((y−

tn∑k=1

Sak−Hb1)HC(y− tn∑

k=1

Sak −Hb1)

−(y−Hb0

)HC(y−Hb0))]H1

><H0

γ (31)

To solve (31) we apply logarithm on both sides, and use thecorrelation matrices defined in equations (23) to (26) whichgives us the desired test statistic,

ln T =−1σ 2

(aHRhs

HRh−1Rhsa− Rsy

H a− aHRsy +

×aHRsa+ RhyH b1 + bH1 Rhy − 2bH1 Rhb1

)H1><H0

ln γ

(32)

To optimise the test statistic derived in (32), we adopt a two-stage target detection model. The proposed two-stage designmodel for IoT is summarised in Fig. 2. Considering the oper-ational nature of IoT with static clutter and known interferingwaveforms, we perform target detection in two stages whichare, 1) Initialisation stage and 2) Operational stage as shownin Fig. 3. In the initialisation stage, the known knowledgeof clutter and interference statistics are exploited to generatethe measurement and test statistic coefficients. Since thesensing conditions are expected to be static over a significantperiod of time, the initialisation stage is only required to beperformed periodically. In the operational stage, the receivedsignal data is used along with the test statistic coefficients togenerate the actual measurable test statistic based on whicha final decision is made regarding the existence or absenceof the target. The measurement coefficients which are beestimated during the initialisation stage can be expressed as,∇1 ∇2

∇3 ∇4

= (QS)(SHQS)−1 Rh

−1HHC

∇1RhsH∇2 ∇1SHC

(33)

Using theML estimates of a and b and themeasurement coef-ficients in (33), the optimised test statistic for the proposedtarget detector can be obtained as,

ln T = yHχyH0><H1

− σ 2ln γ (34)

χ = (∇H3 +∇3)− (∇H

4 +∇4)− (∇3 −∇4)C−1∇H4

(35)

Where χ is the test statistic coefficient. Since χ and themeasurement coefficients are independent of the receivedsignal data, they can be generated during the initialisationstage which reduces the computational complexity during theoperational stage.

VOLUME 5, 2017 13351

Page 7: RF Sensing Based Target Detector for Smart Sensing Within ... · technologies have made radio detection enabled sensing techniques available to IoT. However, extensive research is

S. K. Bolisetti et al.: RF Sensing-Based Target Detector for Smart Sensing Within IoT

FIGURE 2. Proposed RF sensing Based IoT for Surveillance Applications. (a) Measurement of Estimation Coefficients inInitialisation stage. (b) Proposed Target detection Architecture in Operational Stage.

Case 2 (Detector Design With Unknown σ 2 and 1 Inter-fering Node): In this case, we assume that the noise varianceis unknown to the target detector. We consider the presenceof only one interfering node. The estimates of the unknownparameters a and b are obtained as explained in (27) to (29).The ML estimates of σ 2 under hypothesis H0 and H1 areobtained by differentiating (17) and (18) respectively withrespect to σ 2 as,

σ 20 =

1NyNs

(yHCy− Rhy

H b0 − bH0 Rhy − bH0 Rhb0

)(36)

σ 21 =

1NyNs

(yHCy− Rsy

H a− RhyH b1 + aH

(Rsa

+RhsH b1 − Rsy

)+ bH1

(Rhsa+ Rhb1 − Rhy

))(37)

Here, σ 20 and σ 2

1 are the MLEs of noise variance underhypothesis H0 and H1 respectively. Using σ 2, a and b,the test statistic for the proposed target detector is writtenas,

T =maxσ 2, a,b f (y|a,b, σ

2,H1)maxσ 2,b f (y|b, σ

2,H0)=

(σ 20

σ 21

)NyNsH1><H0

γ (38)

Substituting σ 20 and σ 2

1 and correlation matrices defined inequations (23) to (26) gives the desired test statistic as,

T =q0q1

H1><H0

NyNs√γ (39)

Where q0 and q1 are given by,

q0 = yHCy− RhyHR−1h Rhy (40)

q1 = yHCy− RhyHR−1h Rhy + aHRhs

HR−1h Rhsa

−RsyH a− aHRsy + aHRsa+ Rhy

H b1 (41)

+ bH1 Rhy − 2bH1 Rhb1

To optimise the test statistic in (39), we now solve (40)and (41) by using the measurement coefficients definedin (33). This leads us to generating the test statistic coeffi-cients given by,

χ0 = C−∇H2 Rh∇2 (42)

χ1 = χ0 + (∇H3 +∇3)− (∇H

4 +∇4)

− (∇3 −∇4)C−1∇H4 (43)

Here, q0 = yHχ0y and q1 = yHχ1y. Therefore, the opti-mised test statistic for the proposed target detector is,

T =(yHχ0yyHχ1y

)H1><H0

NyNs√γ (44)

Case 3 (Detector Design With Unknown σ 2 andn Interfering Nodes): Here we design a target detector for ageneralised scenario with unknown noise variance and multi-ple interfering nodes i.e., bn = n. Since the interfering wave-forms are mutually independent, estimating the unknownimpulse responses from each interfering waveform allows usto dynamically adopt to any changes in the choice of transmitwaveforms within the neighbourhood of the sensor node. Thepdfs of the received signal under hypothesis H0 (45) and

13352 VOLUME 5, 2017

Page 8: RF Sensing Based Target Detector for Smart Sensing Within ... · technologies have made radio detection enabled sensing techniques available to IoT. However, extensive research is

S. K. Bolisetti et al.: RF Sensing-Based Target Detector for Smart Sensing Within IoT

FIGURE 3. Operational Principle of the Proposed 2-Stage Target DetectionModel.

H1 (46) are given by,

f (y|b1,b2 . . . bn, σ 2,H0)

=1

(πσ 2)NyNs |C−1|

× exp[−1σ 2

((y−

bn∑k=1

Hkbk )HC(y−bn∑k=1

Hkbk ))]

(45)

f (y|b1,b2 . . . bn, a, σ 2,H1)

=1

(πσ 2)NyNs |C−1|exp[−1σ 2

((y−

tn∑k=1

Sak −bn∑k=1

Hkbk )HC

×(y−tn∑k=1

Sak −bn∑k=1

Hkbk ))]

(46)

The test statistic for the proposed detector in this scenario canbe written as,

T =max

σ 2, a,b1,b2 . . . bnf (y|σ 2, a,b1,b2 . . . bn,H1)

maxσ 2,b1,b2 . . . bn

f (y|σ 2,b1,b2 . . . bn,H0)(47)

The unknown estimates of b1,b2 . . . bn under hypothe-sis H0 and H1 are obtained by performing the proceduredescribed in (20) and (21) recursively for each interferingwaveform. However, this requires us to solve a complexnth order differential equation which is computationallyintense. Since it is necessary to estimate each interfering sig-nal independently, to obtain a generalised solution we definerecursive correlation matrices for the jth interfering signal as,Rhjk

RhjsRhjy

= HHj Kj

HkSy

(48)

Here, Kj is the projection matrix for jth interfering signalwhich is measured as,

Kj = (j∏

l=1

Ml−1)HC(j∏

l=1

Ml−1) (49)

Mn = I−HnRh−1nn H

Hn Kn n6=0 (50)

M0 = I (51)

Generalised solutions for the recursive impulse response esti-mates of the jth interfering signal under hypothesisH0 andH1are written as,

bj0 = (HHj KjHj)−1HH

j Kj(y−n∑

k=j+1

Hk bk )

= Rh−1jj (Rhjy −

n∑k=j+1

Rhjk bk ) (52)

bj1 = (HHj KjHj)−1HH

j Kj(y− Sa

n∑k=j+1

Hk bk )

= Rh−1jj (Rhjy − Rhsja−

n∑k=j+1

Rhjk bk ) (53)

Substituting the results in (45) and (46) respectively andsubsequent mathematical analysis reveals that a simple gener-alised solution for the respective pdfs can be obtained whichare rewritten as,

f (y|σ 2,H0)

=1

(πσ 2)NyNs |C−1|exp[−1σ 2

(yHKn+1y

)](54)

f (y|a, σ 2,H1)

=1

(πσ 2)NyNs |C−1|

× exp[−1σ 2

((y−

tn∑k=1

Sak )HKn+1(y−tn∑k=1

Sak ))]

(55)

VOLUME 5, 2017 13353

Page 9: RF Sensing Based Target Detector for Smart Sensing Within ... · technologies have made radio detection enabled sensing techniques available to IoT. However, extensive research is

S. K. Bolisetti et al.: RF Sensing-Based Target Detector for Smart Sensing Within IoT

From (49), the subscript n+ 1 for the interference projectionmatrix K is chosen to accommodate all n interfering wave-forms. The interference projection matrix can be obtainedduring the initialisation stage using the known informationregarding clutter and interfering waveforms. Hence, the num-ber of interfering nodes has no impact on the computationalcomplexity of the target detection procedure during the oper-ational stage. The control centre gathers the received signaldata from all the sensor nodes within its cluster to detect theexistence of targets. The amount of power consumed duringthe data transmission procedure between the sensor nodes andthe control centre has a significant impact on the lifetimeof the sensor nodes. To reduce the transmission costs, weconsider compressive sensing where the sensor nodes areonly required to transmit compressed received signal samplesto the control centre. The received signal data at the ith sensornode is compressed by projecting it onto a measurementmatrix φi such that yi = φiyi, where yi represents thecompressed data. The dimensions M × Ny of φi are chosensuch that M � Ny. φi is usually orthogonal i.e., φiφ

Hi = I.

We define compression ratio µ = MNy

which is a measureof compressibility. The choice of compression ratio µ ischosen as a trade-off between the transmission costs andtarget detection reliability. The compressed received signaldata at the control centre can be written as,

y = [y1, y2, . . . , yNs]T

= φ[y1, y2, . . . , yNs]T

φ =

φ1 0 . . . 0

0 φ2. . . 0

... 0. . .

...

0 . . . 0 φNs

(56)

Therefore, the pdfs under hypothesis H0 and H1 with thecompressed received signal samples are,

f (y|σ 2,H0)

=1

(πσ 2)MNs |C−1|exp[−1σ 2

(yHφKn+1φ

H y)]

(57)

f (y|a, σ 2,H1)

=1

(πσ 2)MNs |C−1|

× exp[−1σ 2

((y−

tn∑k=1

Sak )HφKn+1φH (y−

tn∑k=1

Sak ))](58)

Where S = φS and n is the number of interfering nodes.The ML estimates a and σ 2 can now be obtained as discussedpreviously.(SH (φKn+1φ

H )S) tn∑k=1

ak

= SH (φKn+1φH )y (59)

σ 20 =

1MNs

(yH (φKn+1φ

H )y)

(60)

σ 21 =

1MNs

((y−

tn∑k=1

Sak )H (φKn+1φH )(y−

tn∑k=1

Sak ))

(61)

Using (59-61) in (47) gives us the test statistic for the pro-posed target detector. To optimise the target detection pro-cedure, we define a measurement coefficient, ∇ for the teststatistic as,

∇ = (φKn+1φH )S

(SH (φKn+1φ

H )S)−1SH (φKn+1φ

H )

(62)

Therefore the optimised test statistic, T ,for the proposedtarget detector is expressed as,

T =(yHχ0yyHχ1y

)H1><H0

NyNs√γ (63)

Here, χ0 and χ1 are test statistic coefficients given by,

χ0 = φKn+1φH (64)

χ1 = χ0 − 2∇+∇(φKn+1φH )−1∇ (65)

VI. WAVEFORM SELECTIONTo meet the power constraints, the sensor nodes transmitshort, low power (mW) electromagnetic pulses into the sens-ing region and attempt to detect the reflected echoes from thetarget. The choice of an appropriate transmit waveform is animportant design parameter for RF sensing based surveillanceapplications of IoT. To achieve longevity, optimum choice ofa transmit waveform within IoT must fulfil the necessary cri-terion to achieve the desired target detection reliability whileoperating within the constraints of the available resources.Brevity of the transmit pulses is required to reduce the trans-mission costs. To reduce the signal processing complexities,the choice of a transmit waveform with good correlationproperties is desirable. Gaussian and Monocycle pulses arethe most commonly discussed UWB waveforms. Due tosimplicity and ease of generation, they can be used within IoTwith very low computational cost. However, within a largesensing region with multiple transmitting nodes, a degreeof diversity in the choice of transmit waveforms among thetransmitting nodes is desirable. Waveforms based on orthog-onal Gegenbauer and Hermite polynomials are discussedin [39]–[42]. Waveforms generated using modifiedGegenbauer functions and Hermite functions could be usedto produce ultra-short RF pulses and allow multiple access.They are also less complex compared to conventional multi-ple access communication systems.

Modified Gegenbauer polynomials are defined in theinterval [-1,1]. The recurrence relation for the nth order mod-ified Gegenbauer polynomial is written as,

Gn(β, t) = (1− t2)2β−14

(2(n+ β − 1)

ntGn−1(β, t)

−(n+ 2β − 2)

nGn−2(β, t)

)n 6= 0

G0(t) = 1 (66)

13354 VOLUME 5, 2017

Page 10: RF Sensing Based Target Detector for Smart Sensing Within ... · technologies have made radio detection enabled sensing techniques available to IoT. However, extensive research is

S. K. Bolisetti et al.: RF Sensing-Based Target Detector for Smart Sensing Within IoT

Where n is the order of the Gegenbauer polynomial and β isthe shape parameter and usually β > −12 . Modified Hermitepolynomials are defined in the interval [−∞ ,∞]. nth ordermodified Hermite polynomial is written as,

Hmn(t) = e−t24 (−1)ne

t22dn

dtn(e−t22 ) n 6= 0 (67)

Hm0(t) = 1

The transmit waveforms discussed in this section are easy togenerate and does not require complex transmitting devices.They also provide diversity within the choice of transmitwaveforms. However, due to event driven nature of IoT andspatial displacement of the sensor nodes, orthogonal wave-forms do not provide a generalised solution to optimise thetarget detection reliability. The necessary criteria for opti-mum choice of the transmit waveform is the ability to make aclear distinction between its presence and absence within thereceived signal components. To analyse the received signalproperties, hypothesis H0 and H1 in (16) are elaborated as,

H0 :

{H00: y(n) = w(n)H01: y(n) = Bh(n)+ n(n) (68)

H1 :

{H10: y(n) = As(n)+ n(n)H11: y(n) = As(n)+ Bh(n)+ w(n) (69)

Where A and B are the convolution matrices for target andinterfering signal impulse responses and can be expressedas shown in (4) and (5) respectively. (68) and (69) representpossible received signal models under hypothesis H0 and H1which are characterised by existence and absence of the targetand the interfering waveforms. For a matched filter impulseresponse f, a reliable decision regarding the existence orabsence of a target can be made when the matched filteroutputs under hypothesis H0 and H1 are clearly distinguish-able. To measure the ability of the matched filter to make thisdistinction, we define Ease of Detection Index (δ) in (70),as shown at the bottom of this page, which is measured at3dB SIR. Here ? represents correlation operator. When thesensing conditions are known, the transmit waveform whichmaximises δ gives optimum reliability among the avail-able choice of transmit waveforms. Within resource con-strained IoT, the transmit power has a significant impact onthe lifetime of the sensor nodes. The choice of transmit wave-form while achieving high δ, must also be energy efficient toensure longevity of the sensor nodes. The amount of transmitpower required to guarantee a desired SIR at the receiver isrelated to various factors such as prorogation losses, targetimpulse response, target range, etc. For a given set of sensingconditions, the energy efficiency of the transmit waveformis defined by the Energy Efficiency Index (η). η is the ratioof the amount of transmit power (PTm) required to guarantee

TABLE 1. Comparison of Gaussian and Monocycle pulses autocorrelationfunctions.

a desired SIR at the matched filter output to the amount oftransmit power (PTr ) required to guarantee the desired SIR atthe sensor node receiver which is given as,

η =PTmPTr=

max(fH ? Bh)(As)H (As)max(fH ? As)(Bh)H (Bh)

(71)

η denotes the factor by which the transmit power may bereduced while ensuring desired SIR at the matched filter out-put. The transmit waveform which provides optimal balancebetween δ and η is chosen based on the criterion given bythe ratio δ/η. Therefore, for a given set of sensing condi-tions the transmit waveform which maximises δ/η optimisesthe target detection reliability of IoT. When a Monocyclepulse is assumed to be the interfering waveform, δ and ηof the waveforms discussed in this section are summarisedin Table 1. It can be observed that for the given sensingconditions,G4 andHm4 waveforms generated high δ/η ratioscompared to the other waveforms. Similarly, δ/η ratio ofHm1 waveform is less than zero which indicates that Hm1waveform is unsuitable for transmission. In Fig. 4 and Fig. 5,the matched filter outputs of the received signal models underhypothesis H0 and H1 with transmit waveforms being G4and Hm1 respectively are plotted. The transmission periodsof individual sensor nodes within IoT are assumed to beunsynchronised. The matched filter outputs for all 4 cases ofreceived signal models in (68) and (69) are plotted. H00 indi-cates the received signal model under hypothesis H0 wherethe target and interfering waveforms are absent. Similarly,H01 refers to the received signal under hypothesis H0 in thepresence of interfering waveform. Similarly, H10 and H11refer to the received signal models under hypothesis H1 inthe absence and presence of interfering waveform. From the

δ =(max(fH ? As)− max(fH ? Bh))(max(fH ? (As+ Bh))− max(fH ? Bh))

max(fH ? Bh)(70)

VOLUME 5, 2017 13355

Page 11: RF Sensing Based Target Detector for Smart Sensing Within ... · technologies have made radio detection enabled sensing techniques available to IoT. However, extensive research is

S. K. Bolisetti et al.: RF Sensing-Based Target Detector for Smart Sensing Within IoT

FIGURE 4. Matched filter output for G4 transmit waveform andinterfering Monocycle pulse.

FIGURE 5. Matched filter output for Hm1 transmit waveform andinterfering Monocycle pulse.

plots, it can be observed that, whenG4 waveform is transmit-ted, a clear distinction existed between matched filter outputsunder hypothesisH0 andH1 which indicates greater detectionreliability. However, when Hm1 waveform is transmitted, nodistinction between matched filter outputs under hypothesisH0 and H1 can be observed which indicates an uncertainty inthe decision-making process. Hence, optimum choice of thetransmit waveforms among the neighbouring clusters can bemade by analysing the δ/η ratio of the available waveformsunder the give set of sensing conditions.

VII. PERFORMANCE ANALYSISIn this section, we demonstrate the target detection perfor-mance of the proposed target detector for IoT in the presenceof interference and clutter. Target detection performance isquantised in terms of Probability of Detection (Pd ) and Prob-ability of False alarm (Pfa). Pd is defined as the ability of thetarget detector to accurately make a decision regarding theexistence of a target within the sensing region. Pfa is the rateat which the target detector makes a faulty decision in the

FIGURE 6. Target detection performance of the proposed AIE detector vsconventional GLRT detector in the presence of interference at SIR = 3dB.

FIGURE 7. Target detection performance of the proposed AIE detector vsconventional GLRT detector in the presence of interference atSIR = −3dB.

absence of a target. Here we consider IoT where the clustersof transmitting and receiving nodes are deployed within thesensing region with each cluster accounting for surveillancewithin its range. Each cluster is assumed to consist of atransmitting primary node, which is referred to as a controlcentre and receiving nodes. We show through simulationresults that having multiple receiving nodes within each clus-ter increases the reliability with which the presence of targetscan be detected. For simulations, we consider moderate andaggressive sensor node deployment strategies. In a moderatedeployment strategy, the individual clusters are widely spacedand the interference caused by the neighbouring clusters isrelatively low. However, this is achieved as a trade-off withthe target detection reliability as this strategy results in poorcoverage within the sensing region and hence may lead toincreased miss detections. In aggressive deployment strat-egy, while better coverage within the sensing region maybeensured, however the sensor nodes experience increasedinterference from the neighbouring clusters. We also consider

13356 VOLUME 5, 2017

Page 12: RF Sensing Based Target Detector for Smart Sensing Within ... · technologies have made radio detection enabled sensing techniques available to IoT. However, extensive research is

S. K. Bolisetti et al.: RF Sensing-Based Target Detector for Smart Sensing Within IoT

FIGURE 8. Target detection performance of the proposed AIE detector inthe presence of clutter at SCR = 3dB.

FIGURE 9. Target detection performance of the proposed AIE detector inthe presence of clutter at SCR = −3dB.

the presence of a cluttered background environment. Existingthreshold based detection strategies for IoT fail to providereliable target detection performance in the presence of clut-ter. We show that our proposed target detector provides amore reliable target detection performance in the presenceof clutter. We compare the target detection performance ofthe proposed target detector with a simple GLRT detectorunder similar sensing conditions. For simulations, we resortto Monte-Carlo techniques and thresholds are evaluated toensure required maximum false alarm rate by resorting to100/Pfa independent simulations. Acceptable false alarm rateis assumed to be 10−4. The length Nt of the transmit signalvector s is assumed to be 32 samples within each cluster andNa is assumed to be 4. Due to cooperative nature of IoT,the control centre is assumed to have the knowledge ofthe transmit waveforms from the neighbouring sensor nodeswhich contribute to interference. However due to spatial dis-placement of the sensor nodes, the phase of the interferingwaveform is assumed to be unknown. We analyse the target

FIGURE 10. Target detection performance of the proposed AIE detector vsconventional GLRT detector in the presence of interference and clutter atSIR = 3dB and SCR = 3dB.

FIGURE 11. Target detection performance of the proposed AIE detector vsconventional GLRT detector in the presence of interference and clutter atSIR = 3dB and SCR = −3dB.

detection performances for three different scenarios relatedto the sensing conditions. In case1, we simulate the targetdetection performance of the proposed target detector in thepresence of interference and clutter respectively and compareits performancewith that of aGLRT detector in each scenario.In case2, we consider a harsh sensing environment with bothclutter and interference being present. In case3, we analysethe performance of the proposed detector with compressivesensing and its effect on target detection reliability.Case 1: In this case, the performances of the proposed

detector are analysed in the presence of interference and clut-ter respectively. In Fig. 6 the target detection performancesof the proposed Adaptive Interference Estimator (AIE) andGLRT detectors in the presence of interference and absenceof clutter are shown. Results are simulated for the caseof 1,2 and 3 receiving sensor nodes. Signal to Interfer-ence Ratio (SIR) is assumed to be 3dB and the interfer-ing waveform is assumed to be G4. SIR at the detector is

VOLUME 5, 2017 13357

Page 13: RF Sensing Based Target Detector for Smart Sensing Within ... · technologies have made radio detection enabled sensing techniques available to IoT. However, extensive research is

S. K. Bolisetti et al.: RF Sensing-Based Target Detector for Smart Sensing Within IoT

TABLE 2. Performance analysis of the proposed detector in case 1.

TABLE 3. Performance analysis of the proposed detector in case 2.

measured as,

SIR =‖Sa‖2

‖∑bn

k=1Hkbk‖2(72)

This is a relatively moderate sensing environment in theabsence clutter. The test statistic for AIE detector definedin (62)-(65) can be modified for this scenario as,

T =(yHχ0yyHχ1y

)H1><H0

NyNs√γ (73)

Where χ1 and χ2 are test statistic coefficients given in (64)and (65). The new measurement coefficients for this case are,

Kj = (j∏

l=1

Ml−1)H (j∏

l=1

Ml−1) (74)

Mn = I−HnRh−1nn H

Hn Kn n6=0 (75)

M0 = I (76)

In moderate sensing conditions with low interfering signalstrengths, the target detection performances of the proposedAIE detector andGLRTdetector are nearly identical withAIEdetector slightly outperforming the GLRT detector. In Fig. 7,the performances of AIE and GLRT detectors are comparedin relatively harsher sensing environment at SIR = -3dB.Under harsher sensing conditions, the proposed AIE detectorsignificantly outperformed the conventional GLRT detector.In Table 2 target detection performances of AIE and GLRTdetectors are summarised. It has been observed that deployingadditional receiving nodeswithin the sensing region increasesthe efficiency of the target detector. However, beyond a cer-tain upper threshold any additional receiving nodes yield nosignificant performance gain.Similarly, in In Fig. 8 and Fig. 9 we show the performances

of AIE and GLRT detectors in the presence of clutter withSignal to Clutter Ratio (SCR) of 3dB and -3dB respectively.While the GLRT detector experienced a severe deterioration

13358 VOLUME 5, 2017

Page 14: RF Sensing Based Target Detector for Smart Sensing Within ... · technologies have made radio detection enabled sensing techniques available to IoT. However, extensive research is

S. K. Bolisetti et al.: RF Sensing-Based Target Detector for Smart Sensing Within IoT

TABLE 4. Performance analysis of the proposed detector in case 3 at 40% compression.

TABLE 5. Performance analysis of the proposed detector in case 3 at 60% compression.

in the target detection performance in the presence of clutter,the target detection performance of the proposedAIE detectorremained robust. In Fig. 9 it can be seen that in the presenceof strong clutter, the GLRT detector completely failed toprovide reliable detection performance while the proposeddetector showed robust performance. This clearly validatesthe significance of the clutter projection matrix in (15) toachieve increased target detection performance. A detailedcomparison of AIE and GLRT detectors in the presence ofclutter is summarised in Table 2.Case 2: Here, we simulate a sensing environment which

consists of clutter and interference to analyse the performance

of the proposed target detector. In Fig. 10, we considered thepresence of relatively weak clutter and interfering signals andthe target detection performances of AIE and GLRT detectorsare compared. Similarly, in Fig. 11 and Fig. 12 we comparethe target detection performances of AIE and GLRT detectorsin the presence of strong clutter and interference respec-tively. GLRT detector failed to achieve reliable detection ratesin harsh sensing conditions and the proposed AIE detectoroutperformed the GLRT detector by a significant margin.The performance evaluations in this case are summarisedin Table. 3. In Fig. 13 and Fig. 14 the performance ofthe proposed detector in the presence of multiple interfering

VOLUME 5, 2017 13359

Page 15: RF Sensing Based Target Detector for Smart Sensing Within ... · technologies have made radio detection enabled sensing techniques available to IoT. However, extensive research is

S. K. Bolisetti et al.: RF Sensing-Based Target Detector for Smart Sensing Within IoT

FIGURE 12. Target detection performance of the proposed AIE detector vsconventional GLRT detector in the presence of interference and clutter atSIR = −3dB and SCR = 3dB.

FIGURE 13. Target detection performance of the proposed AIE detector inthe presence of multiple interfering nodes and 3 receiving nodes atSIR = 3dB and SCR = 3dB.

FIGURE 14. Target detection performance of the proposed AIE detector inthe presence of multiple interfering nodes and 3 receiving nodes atSIR = −3dB and SCR = 3dB.

nodes is shown. From the simulation results, performancedeterioration with increasing number of interfering nodes canbe observed. This has occurred due to unknown phase of theinterfering waveforms.

FIGURE 15. Target detection performance of the proposed AIE detector vsconventional GLRT detector using compressive sampling in the presenceof interference and clutter at SIR = 3dB and SCR = 3dB and 40 percentcompression.

FIGURE 16. Target detection performance of the proposed AIE detector vsconventional GLRT detector using compressive sampling in the presenceof interference and clutter at SIR = 3dB and SCR = 3dB and 60 percentcompression.

Case 3:Within resource constrained IoT, the sensor nodesare expected to operate independently with limited availablepower. The lifetime of the sensor nodes is of utmost impor-tance to ensure longevity of the IoT. It has already beenestablished in the existing literature that a major share ofthe available power is consumed during data transmissionbetween the sensor nodes and the control centre. Transmittingcompressed received signal samples to the control centreis observed to be a potential solution to reduce the powerconsumption. However, data compression is achieved as atrade-off with the target detection reliability. Here we inves-tigate the performance of the proposed target detector usingcompressed received signal samples.

In Fig. 15 we show the target detection performances of theAIE and GLRT detectors using compressed received signalsamples at 40% compression and the results are summarisedin Table. 4. The amount of detection performance loss whichoccurred due to compression is also shown in Table. 4.

13360 VOLUME 5, 2017

Page 16: RF Sensing Based Target Detector for Smart Sensing Within ... · technologies have made radio detection enabled sensing techniques available to IoT. However, extensive research is

S. K. Bolisetti et al.: RF Sensing-Based Target Detector for Smart Sensing Within IoT

Similarly in Fig. 16 performances of the AIE and GLRTdetectors are compared at 60% compression and corre-sponding summary of detection performances are shown inTable. 5. It can be observed from the simulation results thatby adjusting the compression ratio adaptively with respect tothe changes in the sensing conditions, compressive sensingcan be implemented without any significant loss in the targetdetection performance.

VIII. CONCLUSIONIn this paper, RF sensing based surveillance applications ofIoT have been addressed. An energy efficient target detectionarchitecture, which is suitable for resource constrained IoThas been proposed. The sensing environments in which IoTare expected to operate have been considered while deriv-ing the received signal models and the corresponding pdfs.We proposed a two-step detection model to optimise theenergy efficiency and detection reliability of the targetdetector. The proposed two-step detection scheme, whilereducing the computational burden also reduces the decision-making time. Our proposed target detection model esti-mates the interfering signal strengths from each interferingnode, which allows the sensor nodes to dynamically adoptto changes in interfering waveforms from the neighbour-ing clusters while providing reliable target detection per-formance. To reduce the transmission costs, we addressedcompressive sensing scheme where the sensor nodes are onlyrequired to transmit compressed received signal samples tothe control centre.We have shown through simulations resultsthat under suitable sensing conditions compressive sensingcan be used without any significant loss in target detectionreliability.Future Work: In our proposed target detection architecture,

the control centre gathers the received data from all thesensor nodes within its cluster to make a decision regardingthe existence or absence of a target. Using a simple low-complexity target detector at the individual sensor nodesmay be considered where the sensor nodes are capable ofmaking a preliminary decision before transmitting the datato the control centre. This reduces the frequency of dataexchange between the sensor nodes and the control centrethereby increasing the lifetime of the IoT.While the proposedtarget detector provides reliable target detection rates, authorsconsider addressing the unknown parameter estimation pro-cedure in the future work to achieve more reliable targetdetection rates.

APPENDIXINVERSE OF DISTURBANCE COVARIANCE MATRIXGiven Rd in (11), in this section we discuss the procedure toestimate R−1d . From (12), it can be observed that R−1d can beobtained by estimating the inverse of (ςλc+σ 2I)−1. Here σ 2Iis a full rank matrix and ςλc is a diagonal matrix of rank ri.e., ςλc can only have up to r non zero elements. Followingresults from [38], the matrix ςλc can be decomposed into a

sum of matrices of rank one i.e.,

ςλc =

r∑k=1

δk (77)

δiδj = 0M×M i 6= j

Here, δk is a null matrix where only the k th diagonal ele-ment is non-zero and the rank of δk is one. The solutionto (σ 2I+ςλc)−1 can be obtained by solving (13) recursively.Based on the initial conditions of (13), the first order recursiveinverse coefficients can be obtained as,

κ−11 = σ−2I (78)

v1 =1

1+ trace(κ−11 δ1)

Since, δ1 is a diagonal matrix with only one non-zero diago-nal element which is λc1, trace(κ

−11 δ1) = λc1/σ 2. Therefore,

the first order recursive inverse coefficient can be written as,

v1 =σ 2

σ 2 + λc1(79)

Substituting (79) in (13), the second order recursive inversecoefficients are obtained as,

κ−12 = κ−11 − v1κ

−11 δ1κ

−11

= σ−2I−σ−2

σ 2 + λc1δ1

= σ−2(I−

δ1

σ 2 + λc1

)v2 =

1

1+ trace(κ−12 δ2)

=1

1+ trace(σ−2

(I−

δ1

σ 2 + λc1

)δ2

) (80)

From (77), it may be recalled that δ1δ2 is a null matrix.Therefore, the second order recursive coefficient, v2 can beobtained as,

v2 =1

1+ trace(σ−2δ2)

=σ 2

σ 2 + λc2(81)

Similarly, from (80) and (81), the third order recursive inversecoefficients are obtained as,

κ−13 = σ−2(I−

δ1

σ 2 + λc1

)−

σ 2

σ 2 + λc2σ−2

×

(I−

δ1

σ 2 + λc1

)δ2σ−2(I−

δ1

σ 2 + λc1

)(82)

As mentioned previously in (77), since δiδj = 0Nc×Nc wheni 6= j, (82) can be simplified as,

κ−13 = σ−2(I−

δ1

σ 2 + λc1−

δ2

σ 2 + λc2

)(83)

VOLUME 5, 2017 13361

Page 17: RF Sensing Based Target Detector for Smart Sensing Within ... · technologies have made radio detection enabled sensing techniques available to IoT. However, extensive research is

S. K. Bolisetti et al.: RF Sensing-Based Target Detector for Smart Sensing Within IoT

To obtain (ςλc+σ 2I)−1, (r+1)th order recursive inverse coef-ficients are required. Observing Equations (83,80,78) andusing the principle of induction, the (r + 1)th order recursiveinverse coefficient can be obtained which gives the solutionto (ςλc + σ 2I)−1 which is,

(σ 2I+ ςλc)−1 = σ−2(I−

δ1

σ 2 + λc1−

δ2

σ 2 + λc2· · ·

−δr

σ 2 + λcr

)(84)

Substituting (84) in (12), R−1d can be written as,

R−1d = σ−28d

×

(I−

δ1

σ 2 + λc1−

δ2

σ 2 + λc2· · · −

δr

σ 2 + λcr

)8Hd

(85)

Usually the clutter returns are significantly stronger thannoise power at the sensing nodes. Under such scenarios, thefollowing approximation can be made; σ 2

+ λci ≈ λci. Since8d8

Hd = I, (85) can be rewritten as,

R−1d = σ−2(I−

r∑i=1

8di8Hdi

)(86)

REFERENCES[1] D. Estrin, R. Govindan, J. Heidemann, and S. Kumar, ‘‘Next century

challenges: Scalable coordination in sensor networks,’’ in Proc. 5th Annu.ACM/IEEE Int. Conf. Mobile comput. Netw., 1999, pp. 263–270.

[2] A. Arora et al., ‘‘A line in the sand: A wireless sensor network for targetdetection, classification, and tracking,’’ Comput. Netw., vol. 46, no. 5,pp. 605–634, 2004.

[3] M. Ali, A. Böhm, and M. Jonsson, ‘‘Wireless sensor networks for surveil-lance applications—A comparative survey of MAC protocols,’’ in Proc.4th Int. Conf. Wireless Mobile Commun., Jul. 2008, pp. 399–403.

[4] F. T. Jaigirdar and M. M. Islam, ‘‘A new cost-effective approach forbattlefield surveillance in wireless sensor networks,’’ in Proc. Int. Conf.Netw. Syst. Secur. (NSysS), Jan. 2016, pp. 1–6.

[5] F. T. Jaigirdar, M. M. Islam, and S. R. Huq, ‘‘An efficient and cost effectivemaximum clique analysis based approximation in military application ofwireless sensor network,’’ in Proc. 14th Int. Conf. Comput. Inf. Technol.,Dec. 2011, pp. 85–90.

[6] P. K. Dutta, A. K. Arora, and S. B. Bibyk, ‘‘Towards radar-enabled sensornetworks,’’ in Proc. 5th Int. Conf. Inf. Process. Sensor Netw., Apr. 2006,pp. 467–474.

[7] M. Ditzel and F. H. Elferink, ‘‘Low-power radar for wireless sensor net-works,’’ in Proc. Eur. Radar Conf., Sep. 2006, pp. 139–141.

[8] R. Kozma et al., ‘‘A radar-enabled collaborative sensor network integratingcots technology for surveillance and tracking,’’ Sensors, vol. 12, no. 2,p. 1336, 2012.

[9] S. Azevedo and T. E. McEwan, ‘‘Micropower impulse radar,’’ IEEE Poten-tials, vol. 16, no. 2, pp. 15–20, Apr. 1997.

[10] The Samraksh Company. User Manual for the Bumblebee: A Low-Power, Mote-Scale Pulsed Doppler Radar Sensor Board, accessedon Oct. 10, 2016. [Online]. Available: https://samraksh.com/index.php/products/sensors/32-product-pages/products-sensors/71-bumblebee-radar

[11] S. Meguerdichian, F. Koushanfar, G. Qu, and M. Potkonjak, ‘‘Exposurein wireless ad-hoc sensor networks,’’ in Proc. 7th Annu. Int. Conf. MobileComput. Netw., 2001, pp. 139–150.

[12] V. Phipatanasuphorn and P. Ramanathan, ‘‘Vulnerability of sensor net-works to unauthorized traversal and monitoring,’’ IEEE Trans. Comput.,vol. 53, no. 3, pp. 364–369, Mar. 2004.

[13] T. He et al., ‘‘Energy-efficient surveillance system using wireless sensornetworks,’’ in Proc. 2nd Int. Conf. Mobile Syst., Appl., Services, 2004,pp. 270–283.

[14] P. K. Varshney, Distributed Detection and Data Fusion, 1st ed. New York,NY, USA: Springer-Verlag, 1996.

[15] J. Liang and Q. Liang, ‘‘Design and analysis of distributed radar sen-sor networks,’’ IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 11,pp. 1926–1933, Nov. 2011.

[16] O. Younis and S. Fahmy, ‘‘Distributed clustering in ad-hoc sensor net-works: A hybrid, energy-efficient approach,’’ in Proc. 23rd Annu. JointConf. IEEEComput. Commun. Soc. (INFOCOM), vol. 1.Mar. 2004, p. 640.

[17] L. Ramaswamy, B. Gedik, and L. Liu, ‘‘A distributed approach to nodeclustering in decentralized peer-to-peer networks,’’ IEEE Trans. ParallelDistrib. Syst., vol. 16, no. 9, pp. 814–829, Sep. 2005.

[18] C. Liu, K. Wu, Y. Xiao, and B. Sun, ‘‘Random coverage with guaranteedconnectivity: Joint scheduling for wireless sensor networks,’’ IEEE Trans.Parallel Distrib. Syst., vol. 17, no. 6, pp. 562–575, Jun. 2006.

[19] S. K. Bolisetti, K. Ahmed, M. Patwary, and M. Abdel-Maguid, ‘‘Compres-sive parametric glrt detector for airborne mimo radar,’’ in Proc. Int. Conf.Wireless Commun. Signal Process. (WCSP), Nov. 2011, pp. 1–5.

[20] N. Pulsone and M. Zatman, ‘‘A computationally efficient two-step imple-mentation of the GLRT,’’ IEEE Trans. Signal Process., vol. 48, no. 3,pp. 609–616, Mar. 2000.

[21] E. Conte, A. De Maio, and G. Ricci, ‘‘GLRT-based adaptive detectionalgorithms for range-spread targets,’’ IEEE Trans. Signal Process., vol. 49,no. 7, pp. 1336–1348, Jul. 2001.

[22] B. Liu, B. Chen, and J. Michels, ‘‘A GLRT for radar detection in thepresence of compound-gaussian clutter and additive white gaussian noise,’’in Proc. Workshop Sensor Array Multichannel Signal Process., Aug. 2002,pp. 87–91.

[23] K. Ahmed, S. Kothuri, M. Patwary, and M. Abdel-Maguid, ‘‘Subspacecompressive GLRT detector for airborne MIMO radar,’’ in Proc. 16thAsia–Pacific Conf. Commun. (APCC), Nov. 2010, pp. 302–306.

[24] S. K. Bolisetti, M. Patwary, K. Ahmed, A.-H. Soliman, andM. Abdel-Maguid, ‘‘Subspace compressive GLRT detector for MIMOradar in the presence of clutter,’’ Sci. World J., vol. 2015, Aug. 2015,Art. no. 341619.

[25] N. A. Goodman, P. R. Venkata, and M. A. Neifeld, ‘‘Adaptive waveformdesign and sequential hypothesis testing for target recognition with activesensors,’’ IEEE J. Sel. Topics Signal Process., vol. 1, no. 1, pp. 105–113,Jun. 2007.

[26] D. A. Garren, M. K. Osborn, A. C. Odom, J. S. Goldstein, S. U. Pillai,and J. R. Guerci, ‘‘Enhanced target detection and identification via opti-mised radar transmission pulse shape,’’ IEE Proc.-Radar, Sonar Navigat.,vol. 148, no. 3, pp. 130–138, Jun. 2001.

[27] L. P. Roy and R. V. R. Kumar, ‘‘Accurate k-distributed clutter model forscanning radar application,’’ IET Radar, Sonar Navigat., vol. 4, no. 2,pp. 158–167, Apr. 2010.

[28] R. Kelmn, Principles of Space-Time Adaptive Processing. Stevenage,U.K.: The Institute of Electrical Engineers, 2002.

[29] L. P. Roy and R. V. R. Kumar, ‘‘A GLRT detector in partially cor-related texture based compound-Gaussian clutter,’’ in Proc. Nat. Conf.Commun. (NCC), Jan. 2010, pp. 1–5.

[30] S. Kraut, L. T. McWhorter, and L. L. Scharf, ‘‘A canonical representa-tion for distributions of adaptive matched subspace detectors,’’ in Proc.Conf. Rec. 31st Asilomar Conf. Signals, Syst. Comput., vol. 2. Nov. 1997,pp. 1331–1335.

[31] S. Kraut and L. L. Scharf, ‘‘The CFAR adaptive subspace detector isa scale-invariant GLRT,’’ IEEE Trans. Signal Process., vol. 47, no. 9,pp. 2538–2541, Sep. 1999.

[32] S. Kraut, L. L. Scharf, and L. T. McWhorter, ‘‘Adaptive subspace detec-tors,’’ IEEE Trans. Signal Process., vol. 49, no. 1, pp. 1–16, Jan. 2001.

[33] L. L. Scharf and L. T. McWhorter, ‘‘Adaptive matched subspace detectorsand adaptive coherence estimators,’’ in Proc. Conf. Rec. 13th AsilomarConf. Signals, Syst. Comput., vol. 2. Nov. 1996, pp. 1114–1117.

[34] W. L. Melvin and G. A. Showman, ‘‘An approach to knowledge-aidedcovariance estimation,’’ IEEE Trans. Aerosp. Electron. Syst., vol. 42, no. 3,pp. 1021–1042, Jul. 2006.

[35] A. G. Jaffer, B. Himed, and P. T. Ho, ‘‘Estimation of range-dependentclutter covariance by configuration system parameter estimation,’’ in Proc.IEEE Int. Radar Conf., May 2005, pp. 596–601.

[36] E. Conte, A. D. Maio, and G. Ricci, ‘‘Covariance matrix estimation foradaptive CFAR detection in compound-Gaussian clutter,’’ IEEE Trans.Aerosp. Electron. Syst., vol. 38, no. 2, pp. 415–426, Apr. 2002.

[37] F. Gini, ‘‘Sub-optimum coherent radar detection in a mixture ofK-distributed and Gaussian clutter,’’ IEE Proc.-Radar, Sonar Navigat.,vol. 144, no. 1, pp. 39–48, Feb. 1997.

13362 VOLUME 5, 2017

Page 18: RF Sensing Based Target Detector for Smart Sensing Within ... · technologies have made radio detection enabled sensing techniques available to IoT. However, extensive research is

S. K. Bolisetti et al.: RF Sensing-Based Target Detector for Smart Sensing Within IoT

[38] K. S. Miller, ‘‘On the inverse of the sum of matrices,’’Math. Mag., vol. 54,no. 2, pp. 67–72, 1981.

[39] F. Elbahhar, A. Rivenq-Menhaj, J. M. Rouvaen, M. Heddebaut, andT. Boukour, ‘‘Comparison between DS-CDMA and modifiedGegenbauer functions for a multiuser communication ultra-widebandsystem,’’ Commun., IEE Proceedings-, vol. 152, no. 6, pp. 1021–1027,Dec. 2005.

[40] L. B. Michael, M. Ghavami, and R. Kohno, ‘‘Multiple pulse generator forultra-wideband communication using Hermite polynomial based orthogo-nal pulses,’’ in Proc. IEEEConf. UltraWideband Syst. Technol., May 2002,pp. 47–51.

[41] L. Sakkila, A. Rivenq, C. Tatkeu, F. ElBahhar, J. Rouvaen, and Y. ElHillali,Short Range Radar Based on UWB Technology. Rijeka, Croatia: InTech,2010.

[42] L. Sakkila et al., ‘‘Performances of micropower UWB radar usingorthogonal waveforms,’’Wireless Eng. Technol., vol. 5, no. 3, p. 74, 2014.

SIVA KARTEEK BOLISETTI (S’17) receivedthe B.Tech. degree in electrical and electron-ics engineering from V. R. Siddhartha Engi-neering College, India, in 2008, and the M.Sc.degree in telecommunication engineering fromStaffordshire University, Stafford, U.K., in 2011,where he is currently pursuing the Ph.D. degreein electronic engineering. He is a member ofthe Sensing, Processing and CommunicationResearch Group, Staffordshire University. His

current research interests include Internet of Things (IoT), wireless com-munications, target detection, radar systems, channel estimation techniques,multi antenna systems, and wireless sensor networks.

MOHAMMAD PATWARY (SM’11) received theB.Eng. degree (Hons.) in electrical and elec-tronic engineering from the Chittagong Univer-sity of Engineering and Technology, Bangladesh,in 1998, and the Ph.D. degree in telecom-munication engineering from the University ofNew South Wales, Sydney, Australia, in 2005.He was with the General Electric Company ofBangladesh from 1998 to 2000 and with Southern-Poro Communications, Sydney Australia, from

2001 to 2002, as a Research and Development Engineer. He was with theUniversity of New South Wales as a Lecturer from 2005 to 2006; then withStaffordshire University, U.K., as a Senior Lecturer from 2006 to 2010;followed by being a Full Professor of wireless systems and digital produc-tivity and the Chair of the Centre of Excellence on Digital Productivity withConnected Services with Staffordshire University untill 2016. He is currentlya Full Professor of telecommunication networks and digital productivity andthe Head of Research at the Centre for Cloud Computing (CCC), School ofComputing and Digital Technologies, Birmingham City University.

His current research interests at CCC include digital productivity withwireless connectivity, sensing and processing for intelligent systems,e.g., manufacturing and healthcare; future network infrastructure, intelli-gence and QoE measures, wireless communication systems design andoptimization, signal processing and energy efficient systems, and futuregeneration of cellular network architecture; and integration of expertise withenergy joint source-channel characterization for wireless sensor networks(heterogeneous networks and IoT) and spatial diversity schemes for wirelesscommunications.

ABDEL-HAMID SOLIMAN received the B.Sc.degree in electronic and telecommunications, theM.Sc. degree in smart data acquisition systems,and the Ph.D. degree in image/video processingfrom Staffordshire University. He has a multi-disciplinary academic/research experience in dig-ital signal processing, telecommunications, dataacquisition systems, wireless sensor networks, andimage/video processing. In addition to his researchactivities, he is involved in several enterprise

projects and consultancy activities for national and international companies.Now, he is leading and involved in several European funded projects.

MOHAMED ABDEL-MAGUID (SM’11) rece-ived the B.Eng. degree (Hons.) in electronics andcommunications engineering (marine electronics)from AAST, Egypt, in 1992, the M.Sc. degreein telecommunications engineering from AAST,and the Ph.D. degree in electronic engineeringfrom Staffordshire University, U.K. He is currentlya Professional Engineer, an Entrepreneur, and aResearch and Enterprise focused Academic, withover 25 years of experience in both business and

academia. He is currently the founding Chair of the Department of Scienceand Technology, University of Suffolk, where he is at the forefront of a num-ber of regional STEM skills, research, and innovation agendas in Suffolk. Hisresearch spans the areas of telecommunications and intelligent multimodalsignal processing and their application to the development of smart systemsand intelligent environment. He is particularly interested in next generationnetworks, cognitive radio, Internet of Things, and data analytics for security,integrated care, and transport applications. He led a portfolio of successfuland award winning Applied Research and Business–University collaborationinitiatives. His work won the UHNS Clinical Innovation Award in 2010and the Lord Stafford Award Impact through Innovation in 2009. He held anumber of senior positions, both in the U.K. and internationally, and servedas a Senior Technology Advisor for government organizations, where headvised on the development of telemedicine initiatives, and the use of smarttechnologies to improve road safety and technology enhanced learning. He isan Adjunct Professor with theMaastricht School of Management, a fellow ofthe CharteredManagement Institute, and a Co-OptedMember of the BiNDT.

VOLUME 5, 2017 13363