Next Article in Journal
Ring-Shaped Sensitive Element Design for Acceleration Measurements: Overcoming the Limitations of Angular-Shaped Sensors
Next Article in Special Issue
A Novel Multi-Input Bidirectional LSTM and HMM Based Approach for Target Recognition from Multi-Domain Radar Range Profiles
Previous Article in Journal
Performance Analysis of a Modernized Z-Source Inverter for Robust Boost Control in Photovoltaic Power Conditioning Systems
Previous Article in Special Issue
A Multi-Mode Sensor Management Approach in the Missions of Target Detecting and Tracking
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multi-Sensor Optimization Scheduling for Target Tracking Based on PCRLB and a Novel Intercept Probability Factor

1
Shijiazhuang Campus, Army Engineering University of PLA, Shijiazhuang 050003, China
2
Department of mechanical engineering, Shijiazhuang Tiedao University, Shijiazhuang 050003, China
*
Author to whom correspondence should be addressed.
Electronics 2019, 8(2), 140; https://doi.org/10.3390/electronics8020140
Submission received: 21 January 2019 / Accepted: 26 January 2019 / Published: 29 January 2019
(This article belongs to the Special Issue Radar Sensor for Motion Sensing and Automobile)

Abstract

:
In order to improve the survivability of active sensors, the problem of low probability of intercept (LPI) for a multi-sensor network system is studied in this paper. Two kinds of operational requirements are taken into account, the first of which is to ensure the survivability of sensors and the second is to improve the tracking accuracy of targets as much as possible. Firstly, the sensor tracking model and the posterior Carmér-Rao lower bound (PCRLB) of the target are presented to evaluate the sensor tracking benefits in next time. Then, a novel intercept probability factor (IPF) is proposed for multi-sensor multi-target tracking scenarios. At the basis of PCRLB and IPF, a myopic multi-sensor scheduling model for target tracking is set up to control the intercepted probability of sensors and improve the target tracking accuracy. At last, a fast solution algorithm based on an improved particle swarm optimization (PSO) algorithm is given to obtain the optimal scheduling actions. Simulation of experimental results show that the proposed model can effectively control the intercepted risk of every sensor, which can also obtain better target tracking performance than existing multi-sensor scheduling methods.

1. Introduction

In recent decades, multi-sensor networks have been widely used in many fields [1,2,3,4,5], such as battlefield surveillance, traffic control, healthcare, and environment monitoring. As a typical application in battlefield surveillance, target tracking by multi-sensor networks has been a research hotspot in recent years, especially in modern network warfare. Multi-sensor resource management has been proved to improve the performance of multi-sensor systems effectively. Multi-sensor resource management technology is able to make full use of sensor ability by scientific and reasonable scheduling of sensor resources [3]. By collaborative management of multi-sensor resources, the detection range and target tracking accuracy of the sensor network can be expanded.
However, when the active sensor detects a target, it will radiate the electromagnetic wave outward, which can expose itself [6]. At the same time, with the development of electronic technology, many anti-radiation weapons have been invented to attack active sensors, which poses a great challenge to the battlefield survivability of active sensors, especially radars. Therefore, the traditional sensor scheduling method, which only maximizes target tracking accuracy in most research, can no longer meet the operational requirements of the complex battlefield environment. When improving target tracking accuracy, the survivability of sensor network should also be considered. It requires us to study new sensor scheduling methods considering both target tracking accuracy and battlefield survivability.
Currently, there are four existing methods for active sensors to counter anti-radiation weapons: LPI waveform design technology [6,7,8], bistatic and distributed sensor technology [9,10], decoy and jamming technology [11], and sensor management technology [12,13,14]. Among them, the sensor management technology works through the cooperative work of multiple sensors. To realize the low intercepted probability of sensors, the key idea of sensor management technology is dynamically managing the existing sensor resources. It gives anti-radiation weapons difficulty in identifying the sensor or tracking the sensor for a long, continuous time. In this way, the anti-radiation weapon will not be able to position sensors or attack sensors further. This technology can reduce the intercepted probability of active sensors without increasing the hardware cost, which has become a research hotspot in this field. Reference [13] proposed a LPI controlling method based on Bhattacharyya distance and Jeffreys divergence, which can effectively control the intercepted risk of the whole radar network by reasonably allocating the radar working power. In [14], a low interception probability control method for multi-sensor networks based on mutual information entropy was presented. In [15,16], the radiation degree is used to quantify the intercepted risk of sensors. The radiation risk and the tracking accuracy are considered by information fusion method. However, combination of radiation risk and tracking precision is a single index. It is difficult to ensure that both of them can reach the ideal value. Secondly, the selection of the balance coefficient is very difficult without a priori knowledge.
However, previous work has focused only on controlling the intercepted risk of the whole sensor network without considering the survivability of single sensors. When the intercept probability of a multi-sensor network is small, the intercept probability of single sensor may already be very great, which is a potential security hazard. Besides, the target tracking accuracy is usually ignored in existing methods.
In view of the above problems, considering the survivability of every sensor, the problem of LPI controlling for multi-sensor multi-target tracking is addressed in this paper. This paper introduces a multi-sensor scheduling method based on posterior Carmér-Rao lower bound (PCRLB) and novel intercept probability factor (IPF). The method can ensure low intercept risk of every sensor while minimizing the target tracking accuracy as much as possible. Simulation results show that the proposed method can effectively control the intercepted probability of sensors within the security threshold, and can also maintain the target tracking accuracy at a higher level.
The rest of this paper is organized as follows. Firstly, the problem formulation is described in Section 2, and the target tracking model and PCRLB of the target state are given in Section 2.1 and Section 2.2, respectively. In Section 3, a novel intercept probability factor is proposed. Based on the analysis in Section 2 and Section 3, we present a multi-sensor scheduling model in Section 4. Then, a fast solution algorithm of sensor scheduling problems is put forward in Section 5. Section 6 presents some simulation results for different scenarios. Finally, conclusions and future works are discussed in Section 7.

2. Problem Formulation

With the development of electronic technology, there are many sensors in air defense systems, such as radar, infrared detectors, and video trackers. As is shown in Figure 1, the main objective of this paper is to investigate the multi-sensor scheduling method for multi-target tracking. We assume that the centralized management method is utilized to manage multi-sensor resources, and the target information obtained by every sensor can be shared with the control center. The following parts in this section are the target tracking model and optimization objectives of multi-sensor scheduling.

2.1. Target Tracking Model

Supposing that there are N active sensors distributed in a sensor field to track M targets in two-dimensions space. Then, the target tracking mode in discrete time can be described as Equation (1).
x m ( k ) = F m x m ( k 1 ) + Γ m ν m ( k )
where the x is target state, the state of target m ( m = 1 , 2 , M ) at time k is x m ( k ) = [ x m ( k )          x ˙ m ( k )         y m ( k )         y ˙ m ( k ) ] T , and x m ( k ) , x ˙ m ( k ) denotes the position and speed at x direction; y m ( k ) , y ˙ m ( k ) denote the position and speed at y direction, respectively. F m is the state transition matrix, Γ m and ν m are the noise gain matrix and target state transition noise, which is Gauss white noise with zero mean and covariance Q . For a maneuvering target, the motion model of the target is unknown. Thus, the system state transition law is described by a mixed motion model set { F i } i = 1 , 2 , , η , where η is the number of motion models, and there is F m { F i } . There are three common motion models: the nearly constant velocity (NCV) model, nearly left constant turn (NLCT) model, and nearly right constant turn (NRCT) model. The state transition matrices of NCV model and NCT model can be described as
F cv = [ 1 T s 0 0 0 1 0 0 0 0 1 T s 0 0 0 1 ] , F CT = [ 1 sin ω T s / ω 0 ( 1 cos ω T s ) / ω 0 cos ω T s 0 sin ω T s 0 ( 1 cos ω T s ) / ω 1 sin ω T s / ω 0 sin ω T s 0 cos ω T s ]
where T s is the sampling interval, ω denotes the turn rate of the target.
In general, the slope distance and azimuth angles are usually chosen as the measurement values of active sensors, and the measurement equation is as follows:
z m , n ( k ) = h n ( x m ( k ) ) + w n ( k ) = [ r m , n ( k ) θ m , n ( k ) ] + [ w n , r ( k ) w n , θ ( k ) ]
where z represents the target measurement, h n is a nonlinear measurement equation sensor n    ( n = 1 , 2 , N ) , w is measurement noise which is also Gauss white noise with zero mean and covariance R ; w k n , r , w k n , θ denote the measurement noise of slope distance r m , n ( k ) and azimuth angle θ m , n ( k ) , respectively. In particular, the calculation methods of r m , n ( k ) , θ m , n ( k ) are as shown in Equations (4) and (5), respectively.
r m , n ( k ) = ( x m ( k ) x s n ) 2 + ( y m ( k ) y s n ) 2
θ m , n ( k ) = tan 1 y m ( k ) y s n x m ( k ) x s n
where x s n and y s n are position coordinates of sensor n.

2.2. PCRLB of Target State

The purpose of the sensor optimization scheduling in this paper is to reduce the risk of interception and achieve higher target tracking accuracy during the sensor scheduling process. Therefore, in order to select appropriate sensors to track targets in advance, it is necessary to predict and analyze the future tracking performance of sensors. By this approach, the control center can make a decision ahead of time. According to Equation (6), PCRLB can provide a lower bound of the estimation error of the target state without knowing the sensors real measurements in the future, which is suitable for the problem of sensor scheduling. Compared with Carmér-Rao lower bound (CRLB), PCRLB is more precise. That is because the measurement value can provide more target information. Therefore, PCRLB is used to evaluate the sensor tracking benefits in our study. In [17], PCRLB is defined to be the inverse of the posterior Fisher information matrix (FIM). Let x ^ k + 1 m be an unbiased estimator of x k + 1 m , and the PCRLB for the estimator x k + 1 m satisfies the following inequality.
Ε { [ x ^ k + 1 m x k + 1 m ] [ x ^ k + 1 m x k + 1 m ] Τ } ( J k + 1 m ) 1
where J k + 1 m is the posterior FIM, which meets the following recursive Equation (7).
J k + 1 m = D k m , 22 D k m , 21 ( J k m + D k m , 11 ) 1 D k m , 12
and
{ D k m , 11 = Ε    [ x k m x k m log p ( x k + 1 m | x k m ) ] D k m , 12 = [ D k m , 21 ] Τ                          = Ε    [ x k m x k + 1 m log p ( x k + 1 m | x k m ) ] D k m , 22 = Ε    [ x k + 1 m x k + 1 m log p ( x k + 1 m | x k m ) ] +                               Ε    [ x k + 1 m x k + 1 m log p ( z k + 1 m , n | x k + 1 m ) ]
where x k m x k m denotes the second-order partial derivatives, Ε    [ x k + 1 m x k + 1 m log p ( z k + 1 m , n | x k + 1 m ) ] is the future information gain by the sensor measurements. For the model in Section 2.1, D k m , 11 , D k m , 12 , D k m , 22 can be calculated by the following equations.
{ D k m , 11 = ( F m ) Τ ( Q m ) 1 F m D k m , 12 = ( F m ) Τ ( Q m ) 1 D k m , 22 = ( Q m ) 1 + ( H k + 1 n ) Τ ( R n ) 1 H k + 1 n
where H k + 1 n is the Jacobi matrix of nonlinear measurement equation h n . Assuming that sensor n is used to track target m, the nonlinear measurement function is h n ( x m ( k + 1 ) ) . It is known from Equations (2)–(4) that h n ( x m ( k + 1 ) ) can be rewritten as
h n ( x m ( k + 1 ) ) = [ r m , n ( k + 1 ) θ m , n ( k + 1 ) ] = [ ( x m ( k + 1 ) x s n ) 2 + ( y m ( k + 1 ) y s n ) 2 tan 1 y m ( k + 1 ) y s n x m ( k + 1 ) x s n ]
and then the H k + 1 m , n can be given by
H k + 1 m , n = [ r m , n ( k + 1 ) x r m , n ( k + 1 ) y θ m , n ( k + 1 ) x θ m , n ( k + 1 ) y ] = [ x m ( k + 1 ) x s n d m n y m ( k + 1 ) y s n d m n y m ( k + 1 ) y s n ( d m n ) 2 x m ( k + 1 ) x s n ( d m n ) 2 ]
where d m n is the Euclidean distance between sensor n and target m, and calculated method is given by
d m n = ( x m ( k + 1 ) x s n ) 2 + ( y m ( k + 1 ) y s n ) 2
However, x m ( k + 1 ) and y m ( k + 1 ) are not known at time k. We can use x ^ m ( k + 1 ) and y ^ m ( k + 1 ) instead of x m ( k + 1 ) and y m ( k + 1 ) . In this paper, according to the Equation (1), we use the one-step prediction value to approximate x m ( k + 1 ) and y m ( k + 1 ) , and
x ^ m ( k + 1 ) = F m x m ( k )
For maneuvering target, target motion model is unknown. Considering the continuity of target motion, the motion model corresponding to the maximum distribution probability at the current time is used as the target motion model, that is
F m = F i = arg    max i = 1 , , η μ k i
where μ k i represents distribution probability of target motion model i at time k.
Here, the posterior FIM J k + 1 m , n of target m from sensor n can be obtained by Equation (7). Furthermore, when N sensors are used to track the target m at the same time, assuming that the processes of sensor measurement are independent to each other, the measurement results will not interfere with each other. Then, the total posterior FIM J k + 1 m can be expressed as
J k + 1 m = n = 1 N J k + 1 m , n
In the process of target tracking, we pay more attention to the position of targets. Hence, the error boundary component of target position in J k + 1 m is selected as the tracking benefits. Let ϒ k ( X k , A k + 1 ) be the predicted tracking benefit function, which is given by
ϒ k ( X k , A k + 1 ) = m = 1 M { ( J k + 1 m ) 1 [ 1 , 1 ] + ( J k + 1 m ) 1 [ 3 , 3 ] } = m = 1 M { ( n = 1 N a m n J k + 1 m , n ) 1 [ 1 , 1 ] + ( n = 1 N a m n J k + 1 m , n ) 1 [ 3 , 3 ] }
where X k = { X k 1 , X k 2 , , X k M } , and A k + 1 represent the scheduling actions of sensors at time k+1, A k + 1 = [ a m n ] M N , a m n { 0 , 1 } , which denotes that the sensor n is used to track target m when a m n = 1 ; the sensor n is not used to track target m when a m n = 0 .

3. Novel Intercept Probability Factor

In an actual battlefield environment, even the signal power of a sensor is very high, and an anti-radiation weapon may not be able to intercept the sensor signal. As is shown in Figure 2, an interception event will occur only when overlaps happen to multiple window functions [18,19]. Here, in the process of intercepting, four window functions are considered for experimentation, which include the window functions of search direction and pulse signal for a sensor, and the window functions of search direction and search frequency for an anti-radiation weapon.
It is assumed that the width of each window is τ i and the repetition interval of each window is T i . Then, the coincident width of L windows at the same time is 1 τ ¯ 0 = i = 1 L 1 τ i , and the coincident repetition interval is given by
T ¯ 0 = i = 1 L ( T i / τ i ) / i = 1 L ( 1 / τ i )
We now analyze the probability of an interception event for a sensor. Because the interception event has independence and is without after-effect, Poisson distribution can effectively describe the process of an interception event. Assuming that k coincidental events of L windows happened in t time, the probability of an interception event is obtained by
{ P ( T 0 , k ) = P 0 ( P 0 / T ¯ 0 ) k 1 ( k 1 ) ! e t / T ¯ 0 s +    ( 1 P 0 ) ( t / T ¯ 0 ) k k ! e t / T ¯ 0 P ( t , 0 ) = ( 1 P 0 ) e t / T ¯ 0 , t 0 , k = 1 , 2 , 3
where P 0 is the probability of an interception event in the initial time. When the number of coincidental events is k or more than k, the interception event will happen, then the probability P k ( t ) of k interception events can be calculated as
P k ( t ) = i = k P ( t , i ) = 1 i = 0 k 1 P ( t , i )
On further simplification in actual cases, when k = 1, the interception event will happen. Let the novel interception probability factor (IPF) η n e w be equal to P k ( t ) when k = 1, the η n e w is given by
η n e w = P 1 ( t ) = i = 1 P ( t , i ) = 1 P ( t , 0 ) = 1 ( 1 P 0 ) e t / T ¯ 0
In general, P 0 0 , then η n e w can be simplified as η n e w 1 e t / T ¯ 0 . When T 0 = 5 , the change curve of η n e w is shown in Figure 3. It can be seen that the new IPF η n e w is a time-dependent function. The longer the tracking time is, the greater the η n e w is. Moreover, if the target number is M, the joint IPF η n e w is given by
η n e w = 1 i = 1 M ( 1 η n e w i ) 1 i = 1 M [ 1 ( 1 e t / T ¯ 0 ) ] = 1 e M t / T ¯ 0
Figure 4 shows change curves of joint IPF η n e w when a sensor is used to track more than one target at the same time. It can be seen that the intercepted probability by anti-radiation weapon will further increase when the targets number increases. Therefore, in the process of target tracking, we should not only control the tracking time of the same sensor, but also try to avoid tracking multiple targets with the same sensor.

4. Multi-Sensor Scheduling Model

Based on the research in the above sections, considering PCRLB and the novel IPF, a multi-sensor scheduling model is set up. The basis of the proposed model is evaluating the joint IPF η n e w of sensors at each time. If the η n e w is greater than the intercepted probability threshold η t h , this sensor will quit tracking targets and maintain silence for a period of time. After the silence, this sensor will return to tracking targets. It is noted that the silence time is set up according to the actual battlefield requirement. Then, in the rest sensor group, the sensor scheduling scheme which has the smallest PCRLB will be selected in next time. At this point, the multi-sensor scheduling problem has been converted into the following optimization mathematical problem.
{ A k + 1 o p t = arg      min A k + 1    ϒ k ( X k , A k + 1 ) = m = 1 M { ( n = 1 N a m n J k + 1 m , n ) 1 [ 1 , 1 ] + ( n = 1 N a m n J k + 1 m , n ) 1 [ 3 , 3 ] } s . t . { n = 1 N a m n k C n ,      m = 1 M a m n k C m ,      η n e w n η t h m = 1 , 2 , , M      ,     n = 1 , 2 , , N
where ϒ ( X k , A k + 1 ) is the comprehensive tracking benefit, η t h is the intercepted probability threshold, η n e w n is the intercepted probability of sensor n, and C m is the maximum number of sensors allowed to track the same target m, C n is the tracking ability of sensor n. The specific steps of the multi-sensor with IPF scheduling model is shown in Algorithm 1, and the diagram of the multi-sensor scheduling process at time k is shown in Figure 5. To remind the reader, the sensor scheduling model proposed in this section is a myopic scheduling method, which only judges the tracking cost in next time. Compared with the non-myopic scheduling method, this method has less computation complexity and shorter optimization time, which can effectively meet the real-time requirement.
In order to quickly get the optimal scheduling actions A k + 1 o p t , we will use a heuristic search algorithm [20] to deal with it in next section.
Algorithm 1 Multi-sensor scheduling algorithm
Input: target state X k , sensor scheduling actions A k
Output: sensor scheduling actions A k + 1
Determine whether the silent sensors have reached the silence time
For (sensor in silent group)
If (off-time> silence time)
silent sensors start work
else
silent sensors keep silence
End
End
Predict the IPF of sensors which do not keep silence
For (sensor which don’t keep silence)
IF (Predictive IPF η n e w n > η t h )
Sensor will be not selected and turn to silence
End
End
Select the sensor-target combination which has the smallest PCRLB
Use particle swarm optimization (PSO) algorithm to search the optimal scheduling actions A k + 1 o p t
Output sensor scheduling actions A k + 1

5. Solution Algorithm of Multi-Sensor Scheduling Problem

According to Equation (22), by modeling, the sensor scheduling problem has been transformed into a nonlinear, multi-constrained NP-hard problem. In particular, when the numbers of sensors and targets are great, the computation complexity will increase greatly. It is very hard for traditional programming and analytic methods to solve this problem. Besides, the on-line planning must meet the real-time requirements. Therefore, a fast solution algorithm is needed. In response to the above problems, a fast solution algorithm based on the improved particle swarm optimization (PSO) algorithm is proposed. The PSO algorithm [21] is a kind of intelligent searching algorithm, which can obtain the optimal or suboptimal solution in a short time.

5.1. Solution Algorithm Based on Improved PSO Algorithm

The PSO algorithm [22] approximates the optimal solution by iterating a large number of particles. The renewal equation of particles is shown as
V i ( k + 1 ) = w V i ( k ) + c 1 r 1 [ P b i ( k ) P i ( k ) ] + c 2 r 2 [ P g b i ( k ) P i ( k ) ]
P i ( k + 1 ) = P i ( k ) + V i ( k + 1 )
where P i ( k ) is the position (hence the solution) of the ith particle at k time. It is a formal representation of the problem solution, which can be a vector or matrix. V i ( k + 1 ) is the movement speed of the ith particle, P b i ( k ) is the best of ith particle in the iterative history, P g b i ( k ) is the global best of all particles in the iterative history. w , c 1 , c 2 are weight coefficients, and w + c 1 + c 2 = 1 , where c 1 represents the important degree of the individual experience during the iterative process, and c 2 represents the important degree of the group experience.
In PSO, the convergence of particles is so strong that particles are easy to fall into the local optimal trap. In response to the problem, a multi-population cooperative search strategy [23] is introduced to improve the optimization performance of the PSO algorithm. This strategy improves the PSO algorithm from a new perspective, whose key idea is using L ( L 2 ) particle populations to search cooperatively. The L particle swarm is divided into two parts. The former L 1 particle populations search independently to expand the searching range, and the last particle population chases the global best solution of all particle populations to accelerate the convergence speed. Through cooperative searching by different populations, the global optimization ability of PSO will be improved significantly.
Here, we divide the particle swarm into four particle populations, as shown in Figure 6. Weight coefficients w ,      c 1 ,      c 2 in particle populations 2, 3, and 4 are set up differently. Under the circumstances, different particle populations will have different searching ability. In particle population 2, the w is greater than c 1 ,     c 2 , which means paying more attention to the value of the current particle itself. In particle population 3, the c 1 is greater than w ,      c 2 , which means that the individual experience of the particle is considered greater. In particle population 4, the c 2 is greater than w ,     c 1 , which means that the population experience is considered greater. Additionally, different particle populations can be computed in the parallel computing mode. In this way, a lot of computing time will be saved.

5.2. Particle Encoding in Improved PSO Algorithm

Particle encoding is the key technology in the improved PSO algorithm. A good encoding technique is helpful to improve the solving speed of the algorithm. Here, P i ( k ) is the exact sensor scheduling actions A k = [ a m n ] M N . Therefore, we can get A k + 1 o p t through iterative searching. It is important to note that the sensor scheduling actions are a binary discrete matrix. When the numbers of sensors and targets are both 3, the tracking capability C n of each sensor is 2, and the maximum number C m of sensors allowed to track the same target is 1; a legal example of A k is shown in Equation (24).
A k = [ 0 0 1 0 0 1 1 0 0 ] 3 × 3
The sensor scheduling actions in Equation (25) denote that sensor 1 is used to track target 3, sensor 3 is used to track target 1 and target 2, and sensor 2 is not used. However, because Equations (23) and (24) are calculated in the real number space, the elements of A k may become a real number out of {0, 1} during the iteration process. Therefore, the elements should be discretization and legalization during the iteration process. To solve the above problem, as is shown in Figure 7, a method of discretization and legalization is put forward. It can be seen that this method consists of two steps: discretization and legalization. The specific steps of discretization and legalization are shown in Algorithm 2. Through discretization and legalization, the illegal sensor scheduling actions can be legalized, which can reduce unnecessary searches and improve the searching speed effectively.
Algorithm 2 Multi-sensor scheduling algorithm
Input: illegal A k
Output: legal A k
For (each column of A k )
Sort elements in each column of the scheduling actions matrix A k from great to small.
Select the previous C n elements and then change the element value to 1
Change the rest elements value to 0
End
For (each row of A k )
Calculate the number M 1 m of the elements whose value is 1 in each row
If ( M 1 m > C m )
Randomly select M 1 m C m elements and then change the element value from 1 to 0
End
End
Output legal scheduling actions matrix A k

6. Simulations

Effectiveness of the proposed sensor scheduling policy is validated through Monte Carlo simulations. In our simulations, the sampling interval is T = 1s, the simulate period is 80 s, and the silence time is 1 s. The coincident repetition interval is T0 = 8 s, and the security threshold is η t h = 0.5. The improved PSO algorithm is used to solve the optimal scheduling actions A k + 1 o p t .

6.1. Scenario 1

In this scenario, the number of targets is assumed to be M = 2 and the target motion model is a constant velocity model. Without loss of generality, the initial positions of 2 targets are (33 km, 37.5 km) and (35 km, 30 km), respectively, and the other experimental parameters are set up as follows
x 0 1 = [ 33000 90 37500 0 ] T m ,      x 0 2 = [ 35000 100 30000 50 ] T m
P 0 1 = P 0 2 = d i a g ( 1000 , 25 , 1000 , 25 )     m
F = [ 1 T 0 0 0 1 0 0 0 0 1 T 0 0 0 1 ] ,       Γ = [ T 2 / 2 T 0 0 0 0 T 2 / 2 T ] ,       Q 1 = [ 20 0 0 20 ] Q 2 = [ 20 0 0 20 ]
where Q 1 ,      Q 2 are covariance matrices of state transition noise. The number of sensors is assumed to be N = 3 , which are placed at (31 km, 39 km), (38 km, 27 km), and (42 km, 40 km), respectively. The covariance matrices of measurement noise of the 3 sensors are set up as follows. It is shown that the tracking ability of sensor 1 and 3 is better than sensor 2. The sensor positions and target trajectories in the battlefield are shown in Figure 8.
R 1 = d i a g ( [ 50 2 , 0.02 2 ] ) , R 2 = d i a g ( [ 100 2 , 0.02 2 ] ) , R 3 = d i a g ( [ 50 2 , 0.02 2 ] )
Meanwhile, to prove the advantages of our proposed IPF based sensor scheduling policy (IPFSP), the other two scheduling policies are used for comparison experiments. (1) Stationary scheduling policy (SSP): In this method, the sensor is fixed to track the specific target. (2) Bhattacharyya distance based scheduling policy (BDSP): It is proposed in [13] that the method can keep a small intercept probability of the whole sensor network by maximizing Bhattacharyya distance. Without loss of generality, sensor 1 is used to track target 1 and sensor 3 is used to track target 2 in SSP. Additionally, sensor 1 is used to track target 1 and sensor 2 is used to track target 2 at the beginning in BDSP and IPFSSP.
The number of Monte Carlo experiments is 150, and experimental results are shown in Figure 9, Figure 10, Figure 11 and Figure 12.
The sensor selection sequences obtained by BDSP and IPFSP methods for the 2 targets are shown in Figure 9 and Figure 10. The horizontal coordinate is the simulation time, and the vertical coordinate is the sensor number. It can be seen that the proposed IPFSP model can realize reasonable selection of sensors for tracking target. Moreover, the sensor switching frequency of IPFSP method is greater than BDSP method. The reason is that the sensor cannot track a target for a long time due to the limitation of IPF. In this way, the intercepted probability of sensors by enemies will be reduced greatly.
Figure 11 shows the root mean-square error (RMSE) curves of the target position under the SSP, MSP, and BDSP methods. We can see that the tracking accuracy under BDSP and IPFSP are better than that under SSP. The RMSE averages of target 1 under SSP, BDSP, and IPFSP are 34.27 m, 7.03 m and 8.56 m, respectively. It proves that although the sensor is frequently selected and switched in IPFSP method during the tracking process, the tracking accuracy of targets is still at a high level compared with SSP method.
Figure 12 shows the variation curves of sensor intercepted probability under different scheduling policies. The average intercepted probabilities of the sensor system under SSP, BDSP, and IPFSP are 0.60, 0.35 and 0.16, respectively. Besides, the intercepted probability of SSP increases over the simulation period, which is more than the security threshold η t h at most time. The intercepted probability of BDSP sometimes goes beyond the security threshold η t h . On the contrary, the IPFSP can effectively control the intercepted probability of the 3 sensors within the security threshold η t h the whole time, which shows the advancement of the proposed sensor scheduling method.

6.2. Scenario 2

In this scenario, the numbers of sensors and targets are set up in order to analyze the effectiveness of the proposed model and solving algorithm for large-scale tracking scenarios. The number of targets is assumed to be M = 4 and the target motion model is also the CV model. The initial states of 4 targets are set up as in Equation (26), and the other parameters are the same as in Scenario 1.
{ x 0 1 = [ 37300 80 40000 60 ] T m x 0 2 = [ 37000 60 29000 70 ] T m x 0 3 = [ 43000 60 35000 80 ] T m x 0 4 = [ 32000 80 30000 60 ] T m
In addition, the sensor numbers are assumed to be N = 6, which are placed at (31 km, 39 km), (37.5 km, 35 km), (37 km, 43 km), (32 km, 27 km), (44 km, 33 km), and (38 km, 27 km), respectively, and the measurement covariance matrices of the 6 sensors are set up as R 1 = R 2 = R 3 = R 4 = R 5 = R 6 = d i a g ( [ 50 2 , 0.02 2 ] ) . In SSP method and at the beginning of BDSP and IPFSP methods, sensor 1, sensor 2, sensor 3, and sensor 4 are used to track target 1, target 2, target 3, and target 4, respectively. Sensor positions and target trajectories in the battlefield are shown in Figure 13.
Furthermore, the number of Monte Carlo experiments is 150, and the simulation results are shown in Figure 14, Figure 15, Figure 16 and Figure 17.
Figure 14 and Figure 15 show the sensor selected sequence for target 2 and target 3 by BDSP and IPFSP methods, respectively. It can be seen that for sensor and target scheduling problems, the proposed method can also realize the effective scheduling of sensors to track targets in this scenario. Compared with BDSP, the sensor switching frequency of IPFSP is also greater than BDSP method, which is due to the limitation of novel IPF. In this way, the intercept probability of the sensors will be reduced greatly, which we can see in Figure 16. The results are the same for target 1 and target 4.
Figure 16 shows the variation curves of sensor intercept probability under different scheduling policies. The average intercept probabilities of the sensor system under SSP, BDSP, and IPFSP are 0.60, 0.37, and 0.15, respectively. Moreover, it can be seen from Figure 16 that when using SSP method, the intercept probabilities of sensor 1, 2, 3, and 4 are more than the security threshold at most times. When using BDSP method, the intercept probability of all sensors will be more than the security threshold sometimes. On the contrary, the proposed IPFSP method can control the intercept probability of all sensors within the security threshold η t h . It can be concluded that the proposed IPFSP method can effectively improve sensor battlefield survivability for different target tracking scenarios.
Figure 17 shows the running time of an experiment under different solution algorithms. Compared with the exhaustive search algorithm and traditional PSO algorithm, some experiments with different numbers of sensors and targets are carried out to verify the advancement of the proposed solution algorithm. We can see that with the increase of sensor and target numbers, the running time of the exhaustive search algorithm will grow rapidly, which cannot match the real-time requirement. However, the running time of the proposed algorithm in this paper is always less. Besides, Figure 16 shows that the running time of the improved PSO algorithm is less than that of the traditional PSO algorithm, which proves the effectiveness of the improvement strategy. Compared with the traditional PSO algorithm, when the sensor number is 4 and target number is 3, the running time is reduced by 14.87%. When the sensor number is 6 and target number is 4, it is reduced by 30.32%. When the sensor number is 10 and target number is 8, it is reduced by 47.51%. It can be concluded that the more complex the problem is, the more time will be saved by the proposed solution algorithm.

6.3. Scenario 3

In this scenario, two maneuverable targets are considered to verify the applicability of the proposed sensor scheduling method for the problem of maneuverable target tracking. As is shown in Figure 18, the initial position of target 1 is (34 km, 36 km), and target 1 turns left with ω = 2 rad / s during 30 s~50 s and maintains uniform motion during the other time. The initial positions of target 2 is (35 km, 30 km), and target 1 turns right with ω = 2 rad / s during 30 s~50 s and maintains uniform motion during the other time. The initial states of 2 targets are set up as x 0 1 = [ 34000 110 36000 60 ] T m , x 0 2 = [ 35000 80 30000 70 ] T m . The other parameters are the same as in Scenario 1.
There are 4 sensors which are placed at (33 km, 28 km), (33 km, 42 km), (42 km, 28 km), and (42 km, 42 km). The measurement covariance matrices of the 4 sensors are set up as R 1 = R 2 = R 3 = R 4 = d i a g ( [ 50 2 , 0.02 2 ] ) . In the SSP method and at the beginning of the BDSP and IPFSP methods, sensor 1 and sensor 2 are used to track target 1 and target 2, respectively. The number of Monte Carlo experiments is 150, and the simulation results are shown in Figure 19, Figure 20, Figure 21 and Figure 22.
Figure 19 and Figure 20 show the sensor selected sequence for the two maneuverable targets by BDSP and IPFSP methods, respectively. Obviously, in this scenario, the proposed method can also realize the effective scheduling of sensors to track maneuverable targets, which proves the wide applicability of the proposed sensor scheduling method.
Figure 21 shows the root mean-square error (RMSE) curves of the target position under the SSP, BDSP, and IPFSP methods in this scenario. The RMSE averages of target 1 under SSP, BDSP, and IPFSP are 74.20 m, 20.56 m, and 32.42 m, respectively. Compared with the uniform moving targets in scenario 1 and scenario 2, the tracking error under IPFSP method is still less than that under SSP method, but it is greater than that under BDSP method. Therefore, it can be concluded that for maneuvering targets, the target tracking accuracy of the proposed method will be declined.
Figure 22 shows the variation curves of sensor intercept probability under different scheduling policies in this scenario. The average intercept probabilities of the sensor system under SSP, BDSP, and IPFSP are 0. 49, 0.36, and 0.16, respectively. It can be seen from Figure 22 that the proposed IPFSP method can also control the intercept probability of all sensors within the security threshold η t h . The intercept probability of the other two methods will be more than the security threshold at most times. It is proved that the proposed method can perform well for maneuvering target tracking scenarios.

7. Conclusions

In this paper, in order to reduce the intercept risk and maintain the target tracking accuracy of radar sensor networks, an active multi-sensor scheduling method based on PCRLB and a novel IPF is proposed. Firstly, the target moving model and sensor measurement model are introduced. Then, the calculation methods of PCRLB for uniform moving targets and maneuvering targets are presented. Next, to accurately assess the intercepted risk of sensors, a novel intercept probability factor is given based on multiple window functions. Simulation results show that the proposed method can reasonably evaluate the intercept risk of all sensors in the future for different multi-target tracking scenarios. The minimum average intercept probability of the sensor network system is only 0.15 with better target tracking accuracy, which is much better than the existing SSP and BDSP methods. In addition, in order to quickly get the optimal scheduling actions, a fast solution algorithm based on the improved PSO algorithm is proposed. When the sensor number is 6 and target number is 5, the running times can be reduced by 30.32%, and more time will be saved by the proposed solution algorithm when the sensor and target numbers increase. For the other optimization problems, the improved PSO algorithm also has certain application value.
In the future, with combat situations becoming more complex and more diverse, sensor scheduling models aiming at an individual combat mission seem unlikely to meet combat requirements. The multi-task sensor scheduling problem will need to be considered, and further study will need to be conducted on combinations of target detection, target tracking, and target recognition. Besides, in actual situations, different targets have different threat levels, so the problem of target priority assessment will also need to be studied with the sensor scheduling problem.

Author Contributions

All authors contributed significantly to the writing or final editing of the manuscript. G.X. conceived the theoretical ideas and wrote the paper. C.P., G.S., and X.D. checked and corrected the paper.

Funding

This research was funded by NSFC (Natural Science Foundation of China), grant number 61573374, and DPRFC (Defense Pre-Research Fund Project of China), grant number 012015012600A2203.

Acknowledgments

We would like to express our gratitude to the laboratory of information fusion. A special acknowledgement should be shown to Qiao, who gave our kind encouragement and useful instructions. We also express our sincere gratitude to editors for their help to improve the quality of this paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. A survey on sensor networks. IEEE Commun. Mag. 2002, 40, 102–105. [Google Scholar] [CrossRef]
  2. Salvagnini, P.; Pernici, F.; Cristani, M.; Lisanti, G.; Del Bimbo, A.; Murino, V. Non-myopic information theoretic sensor management of a single pan-tilt-zoom camera for multiple object detection and tracking. Comput. Vis. Image Underst. 2015, 134, 74–88. [Google Scholar] [CrossRef]
  3. Zhang, Z.N.; Shan, G.L. Non-myopic sensor scheduling to track multiple reactive targets. Signal Process. IET 2015, 9, 37–47. [Google Scholar] [CrossRef]
  4. Gupta, R.; Sultania, K.; Singh, P.; Gupta, A. Security for wireless sensor networks in military operations. In Proceedings of the IEEE Fourth International Conference on Computing, Communications and Networking Technologies, Tiruchengode, India, 4–6 July 2013; pp. 1–6. [Google Scholar]
  5. Collotta, M.; Bello, L.L.; Pau, G. A novel approach for dynamic traffic lights management based on wireless sensor networks and multiple fuzzy logic controllers. Expert Syst. Appl. 2015, 42, 5403–5415. [Google Scholar] [CrossRef]
  6. Wu, H.; Shi, Z.Y.; Shen, W.D.; Wang, J.S.; Wang, W.Z. Design of LPI radar waveform based on chaos theory. Comput. Eng. Appl. 2017, 53, 241–244. [Google Scholar]
  7. Deng, H. Waveform design for MIMO radar with low probability of intercept (LPI) property. In Proceedings of the IEEE International Symposium on Antennas and Propagation, Spokane, WA, USA, 3–8 July 2011; pp. 305–308. [Google Scholar]
  8. Chen, J.; Wang, F.; Zhou, J. Information Content Based Optimal Radar Waveform Design: LPI’s Purpose. Entropy 2017, 19, 210. [Google Scholar] [CrossRef]
  9. Angley, D.; Ristic, B.; Suvorova, S.; Moran, B.; Fletcher, F.; Gaetjens, H.; Simakov, S. Non-myopic sensor scheduling for multi-static sonobuoy fields. IET Radar Sonar Navig. 2017, 11, 1770–1775. [Google Scholar] [CrossRef]
  10. Shi, C.; Wang, F.; Salous, S.; Zhou, J. Optimal Power Allocation Strategy in a Joint Bistatic Radar and Communication System Based on Low Probability of Intercept. Sensors 2017, 17, 2731. [Google Scholar] [CrossRef]
  11. Rim, J.W.; Jung, K.H.; Koh, I.S.; Baek, C.; Lee, S.; Choi, S.H. Simulation of Dynamic EADs Jamming Performance against Tracking Radar in Presence of Airborne Platform. Int. J. Aeronaut. Space Sci. 2015, 16, 475–483. [Google Scholar] [CrossRef] [Green Version]
  12. She, J.; Zhou, J.; Wang, F.; Li, H. LPI optimization framework for radar network based on Minimum mean-square error estimation. Entropy 2017, 19, 397. [Google Scholar] [CrossRef]
  13. Shi, C.; Wang, F.; Sellathurai, M.; Zhou, J. LPI optimization framework for target tracking in radar network architectures using information theoretic criteria. Int. J. Antennas Propag. 2014, 2014. [Google Scholar] [CrossRef]
  14. Zhang, Z.; Zhu, J.; Salous, S. A novel dwelling time design method for low probability of intercept in a complex radar network. Int. J. Des. Nat. Ecodyn. 2015, 10, 309–318. [Google Scholar] [CrossRef]
  15. Krishnamurthy, V. Emission management for low probability intercept sensors in network centric warfare. IEEE Trans. Aerosp. Electron. Syst. 2005, 41, 133–151. [Google Scholar] [CrossRef]
  16. Shan, G.L.; Zhang, Z.N. Non-myopic sensor scheduling for low radiation risk tracking using mixed POMDP. Trans. Inst. Meas. Control 2015, 39. [Google Scholar] [CrossRef]
  17. Tichavsky, P.; Muravchik, C.H.; Nehorai, A. Posterior Cramer-Rao bounds for discrete-time nonlinear filtering. IEEE Trans.Signal Process. 1998, 46, 1386–1396. [Google Scholar] [CrossRef] [Green Version]
  18. Stein, S.; Johansen, D. A Statistical Description of Coincidences among Random Pulse Trains. Proc. IRE 2007, 46, 827–830. [Google Scholar] [CrossRef]
  19. Self, A.G.; Smith, B.G. Intercept time and its prediction. IEE Proc. F Commun. Radar Signal Process. 2008, 132, 215–220. [Google Scholar] [CrossRef]
  20. Masdari, M.; Salehi, F.; Jalali, M.; Bidaki, M. A Survey of PSO-Based Scheduling Algorithms in Cloud Computing. J. Netw. Syst. Manag. 2017, 25, 122–158. [Google Scholar] [CrossRef]
  21. Geng, J.C.; Cui, Z.; Gu, X.S. Scatter search based particle swarm optimization algorithm for earliness/tardiness flow shop scheduling with uncertainty. Int. J. Autom. Comput. 2016, 13, 285–295. [Google Scholar] [CrossRef]
  22. Trelea, I.C. The particle swarm optimization algorithm: Convergence analysis and parameter selection. Inf. Process. Lett. 2003, 85, 317–325. [Google Scholar] [CrossRef]
  23. Naidu, Y.R.; Ojha, A.K. Solving Multi-objective Optimization Problems Using Hybrid Cooperative Invasive Weed Optimization With Multiple Populations. IEEE Trans. Syst. Man Cybern. Syst. 2016, 48, 821–832. [Google Scholar] [CrossRef]
Figure 1. Description of sensor scheduling problem.
Figure 1. Description of sensor scheduling problem.
Electronics 08 00140 g001
Figure 2. Basic window functions and the time overlap of them.
Figure 2. Basic window functions and the time overlap of them.
Electronics 08 00140 g002
Figure 3. Change curves of IPF η n e w with time.
Figure 3. Change curves of IPF η n e w with time.
Electronics 08 00140 g003
Figure 4. Change curves of IPF η n e w for different target numbers.
Figure 4. Change curves of IPF η n e w for different target numbers.
Electronics 08 00140 g004
Figure 5. Process of multi-sensor scheduling at time k.
Figure 5. Process of multi-sensor scheduling at time k.
Electronics 08 00140 g005
Figure 6. Multi-population cooperation searching strategy.
Figure 6. Multi-population cooperation searching strategy.
Electronics 08 00140 g006
Figure 7. An example of discretization and legalization processes.
Figure 7. An example of discretization and legalization processes.
Electronics 08 00140 g007
Figure 8. Sensor positions and target trajectories.
Figure 8. Sensor positions and target trajectories.
Electronics 08 00140 g008
Figure 9. Sensor selected sequences obtained by BDSP. (a) Target 1; (b) Target 2.
Figure 9. Sensor selected sequences obtained by BDSP. (a) Target 1; (b) Target 2.
Electronics 08 00140 g009
Figure 10. Sensor selected sequences obtained by IPFSP. (a) Target 1; (b) Target 2.
Figure 10. Sensor selected sequences obtained by IPFSP. (a) Target 1; (b) Target 2.
Electronics 08 00140 g010
Figure 11. RMSE of the target position under different scheduling policies. (a) Target 1; (b) Target 2.
Figure 11. RMSE of the target position under different scheduling policies. (a) Target 1; (b) Target 2.
Electronics 08 00140 g011
Figure 12. Sensor intercepted probability under different scheduling policies. (a) Sensor 1; (b) Sensor 2; (c) Sensor 3.
Figure 12. Sensor intercepted probability under different scheduling policies. (a) Sensor 1; (b) Sensor 2; (c) Sensor 3.
Electronics 08 00140 g012aElectronics 08 00140 g012b
Figure 13. Sensor positions and target trajectories.
Figure 13. Sensor positions and target trajectories.
Electronics 08 00140 g013
Figure 14. Sensor selected sequences obtained by BDSP. (a) Target 2; (b)Target 3.
Figure 14. Sensor selected sequences obtained by BDSP. (a) Target 2; (b)Target 3.
Electronics 08 00140 g014
Figure 15. Sensor selected sequences obtained by IPFSP. (a) Target 2; (b) Target 3.
Figure 15. Sensor selected sequences obtained by IPFSP. (a) Target 2; (b) Target 3.
Electronics 08 00140 g015
Figure 16. Sensor intercept probability under different scheduling policies. (a) Sensor 1; (b) Sensor 2; (c) Sensor 3; (d) Sensor 4; (e) Sensor 5; (f) Sensor 6.
Figure 16. Sensor intercept probability under different scheduling policies. (a) Sensor 1; (b) Sensor 2; (c) Sensor 3; (d) Sensor 4; (e) Sensor 5; (f) Sensor 6.
Electronics 08 00140 g016aElectronics 08 00140 g016b
Figure 17. Running time of an experiment under different solution algorithms.
Figure 17. Running time of an experiment under different solution algorithms.
Electronics 08 00140 g017
Figure 18. Sensor positions and target trajectories.
Figure 18. Sensor positions and target trajectories.
Electronics 08 00140 g018
Figure 19. Sensor selected sequences obtained by BDSP. (a) Target 1; (b) Target 2.
Figure 19. Sensor selected sequences obtained by BDSP. (a) Target 1; (b) Target 2.
Electronics 08 00140 g019aElectronics 08 00140 g019b
Figure 20. Sensor selected sequences obtained by IPFSP. (a) Target 1; (b) Target 2.
Figure 20. Sensor selected sequences obtained by IPFSP. (a) Target 1; (b) Target 2.
Electronics 08 00140 g020
Figure 21. RMSE of target position under different scheduling policies. (a) Target 1; (b) Target 2.
Figure 21. RMSE of target position under different scheduling policies. (a) Target 1; (b) Target 2.
Electronics 08 00140 g021aElectronics 08 00140 g021b
Figure 22. Sensor intercept probability under different scheduling policies. (a) Sensor 1; (b) Sensor 2; (c) Sensor 3; (d) Sensor 4.
Figure 22. Sensor intercept probability under different scheduling policies. (a) Sensor 1; (b) Sensor 2; (c) Sensor 3; (d) Sensor 4.
Electronics 08 00140 g022

Share and Cite

MDPI and ACS Style

Xu, G.; Pang, C.; Duan, X.; Shan, G. Multi-Sensor Optimization Scheduling for Target Tracking Based on PCRLB and a Novel Intercept Probability Factor. Electronics 2019, 8, 140. https://doi.org/10.3390/electronics8020140

AMA Style

Xu G, Pang C, Duan X, Shan G. Multi-Sensor Optimization Scheduling for Target Tracking Based on PCRLB and a Novel Intercept Probability Factor. Electronics. 2019; 8(2):140. https://doi.org/10.3390/electronics8020140

Chicago/Turabian Style

Xu, Gongguo, Ce Pang, Xiusheng Duan, and Ganlin Shan. 2019. "Multi-Sensor Optimization Scheduling for Target Tracking Based on PCRLB and a Novel Intercept Probability Factor" Electronics 8, no. 2: 140. https://doi.org/10.3390/electronics8020140

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop