Distributed Detection Systems. Hamidreza Ahmadi



Similar documents

Capacity Limits of MIMO Channels

Message-passing sequential detection of multiple change points in networks

Signal Detection. Outline. Detection Theory. Example Applications of Detection Theory

Introduction to Detection Theory

PHASE ESTIMATION ALGORITHM FOR FREQUENCY HOPPED BINARY PSK AND DPSK WAVEFORMS WITH SMALL NUMBER OF REFERENCE SYMBOLS

Time-frequency segmentation : statistical and local phase analysis

DSL Spectrum Management

Digital Modulation. David Tipper. Department of Information Science and Telecommunications University of Pittsburgh. Typical Communication System

MIMO detector algorithms and their implementations for LTE/LTE-A

PERFORMANCE ANALYSIS OF THRESHOLD BASED RELAY SELECTION TECHNIQUE IN COOPERATIVE WIRELESS NETWORKS

Multisensor Data Fusion and Applications

Statistical Machine Learning

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

Radar Systems Engineering Lecture 6 Detection of Signals in Noise

A Practical Scheme for Wireless Network Operation

Coding and decoding with convolutional codes. The Viterbi Algor

MIMO CHANNEL CAPACITY

Optimal Performance for Detection Systems in Wireless Passive Sensor Networks

Principled Reasoning and Practical Applications of Alert Fusion in Intrusion Detection Systems

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY

Likelihood Approaches for Trial Designs in Early Phase Oncology

The Advantages and Disadvantages of Network Computing Nodes

ALOHA Performs Delay-Optimum Power Control

2. Illustration of the Nikkei 225 option data

Cyber-Security Analysis of State Estimators in Power Systems

National Technical University of Athens School of Electrical and Computer Engineering

On Decentralized Detection with Partial Information Sharing among Sensors

Signal Detection C H A P T E R SIGNAL DETECTION AS HYPOTHESIS TESTING

ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING

Radio Resource Allocation Algorithm for Relay aided Cellular OFDMA System

Bi-directional Signalling Strategies for Dynamic TDD Networks

L4: Bayesian Decision Theory

Stochastic Models for Inventory Management at Service Facilities

A Framework for the Evaluation of Intrusion Detection Systems

IN RECENT years, there have been significant efforts to develop

Randomization Approaches for Network Revenue Management with Customer Choice Behavior

Logistic Regression. Jia Li. Department of Statistics The Pennsylvania State University. Logistic Regression

Probabilistic Models for Big Data. Alex Davies and Roger Frigola University of Cambridge 13th February 2014

Integer Programming: Algorithms - 3

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh

Online Appendix Feedback Effects, Asymmetric Trading, and the Limits to Arbitrage

CCNY. BME I5100: Biomedical Signal Processing. Linear Discrimination. Lucas C. Parra Biomedical Engineering Department City College of New York

Adaptive Training for Correlated Fading Channels with Feedback

The QOOL Algorithm for fast Online Optimization of Multiple Degree of Freedom Robot Locomotion

Dynamic Control of Interference Limited Underlay D2D Network

Linear Classification. Volker Tresp Summer 2015

VI. Introduction to Logistic Regression

Distributed Cooperative Spectrum Sensing in Mobile Ad Hoc Networks with Cognitive Radios

Introduction to Support Vector Machines. Colin Campbell, Bristol University

Statistical Machine Learning from Data

INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena *1, K. Upendra Chowdary 2

A New Interpretation of Information Rate

5 Capacity of wireless channels

Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control

Deriving Demand Functions - Examples 1

The CUSUM algorithm a small review. Pierre Granjon

Network Coding for Distributed Storage

WIRELESS communication channels have the characteristic

Towards a Structuralist Interpretation of Saving, Investment and Current Account in Turkey

Decentralized Utility-based Sensor Network Design

A Lightweight Rao-Cauchy Detector for Additive Watermarking in the DWT-Domain

THE NEED for higher data rates is increasing as a result

Efficient Network Marketing Strategies For Secondary Users

Teaching Convolutional Coding using MATLAB in Communication Systems Course. Abstract

Envelope Theorem. Kevin Wainwright. Mar 22, 2004

Imprecise probabilities, bets and functional analytic methods in Łukasiewicz logic.

a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol.

A Decentralized Bayesian Attack Detection Algorithm for Network Security

Capacity Limits of MIMO Systems

Mapping an Application to a Control Architecture: Specification of the Problem

ECE 555 Real-time Embedded System Real-time Communications in Wireless Sensor Network (WSN)

MODULATION Systems (part 1)

Part II Redundant Dictionaries and Pursuit Algorithms

Decentralization and Private Information with Mutual Organizations

Improved Algorithm for Throughput Maximization in MC-CDMA

University Dortmund. Robotics Research Institute Information Technology. Job Scheduling. Uwe Schwiegelshohn. EPIT 2007, June 5 Ordonnancement

Resource Optimization of Spatial TDMA in Ad Hoc Radio Networks: A Column Generation Approach

Privacy and Security in the Internet of Things: Theory and Practice. Bob Baxley; HitB; 28 May 2015

Foresighted Resource Scheduling in Software-Defined Radio Access Networks


Final Mathematics 5010, Section 1, Fall 2004 Instructor: D.A. Levin

CHAPTER 3 SECURITY CONSTRAINED OPTIMAL SHORT-TERM HYDROTHERMAL SCHEDULING

Three-Stage Phase II Clinical Trials

Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks

Tests for Two Survival Curves Using Cox s Proportional Hazards Model

University of Maryland Fraternity & Sorority Life Spring 2015 Academic Report

Achievable Transmission Rates and Self-Interference Channel Estimation in Hybrid Full-Duplex/Half-Duplex MIMO Relaying

Efficient Load Balancing by Adaptive Bypasses for the Migration on the Internet

Introduction to Optical Link Design

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

SIMULATING CANCELLATIONS AND OVERBOOKING IN YIELD MANAGEMENT

Power Control is Not Required for Wireless Networks in the Linear Regime

degrees of freedom and are able to adapt to the task they are supposed to do [Gupta].

Introduction to Money

Robust Optimization for Unit Commitment and Dispatch in Energy Markets

M-ary Symbol Error Outage Over Nakagami-m Fading Channels in Shadowing Environments

1. Then f has a relative maximum at x = c if f(c) f(x) for all values of x in some

Least-Squares Intersection of Lines

Transcription:

Channel Estimation Error in Distributed Detection Systems Hamidreza Ahmadi

Outline Detection Theory Neyman-Pearson Method Classical l Distributed ib t Detection ti Fusion and local sensor rules Channel Aware Distributed Detection Perfect and Estimated CSI in the FC Conclusion

Detection Theory y( (NP Method) Binary Hypotheses Testing Px ( H1) P ( x H 0) H0: x = n H1 :x= A + n Decision Rule: 2 n N(0, σ ) H1 x >τ γ (x) = H0 x <τ False Alarm Probability: P FA = Pr( γ(x) = H1 H0) = Pr(x > τ x = n) P( H0 H1) = 1 PD PH ( 1 H0) = PFA Detection Probability: P D = Pr( γ(x) = H1 H1) = Pr(x > τ x = S+ n)

Detection Theory y( (NP Method) Neyman-Pearson Method: Generally Detection probability and False alarm are changing by changing threshold. Max P D PFA α Likelihood Ratio Test (LRT) : L(x) H1 P(x H1) > = τ P(x H0) < H0 Algorithm: P = P( Λ>τ H 0) =α τ P ( τ) FA D

Classical Distributed Detection Parallel Topology Each Sensor based on its observation,independently, makes its own decision about the Hypotheses and sends it to the fusion center. u =γ (y ) i i i u =γ (u,u,...,u ) 0 0 1 2 N Applicable to Power and Bandwidth limited Networks Performance loss because of accessing to only partial information in the center as compared with centralized Globally y Optimal Sensor and fusion rules

Classical Distributed Detection NP Method in DD: For Fixed global false alarm, what are the Optimum local and fusion rules to Maximize global detection probability. Max P D0 ( γ, γ,..., γ ) 0 1 N Subject to PF0 α Optimal FC Rule: LRT H1 1 N P(U H 1) P(u i H 1) > Λ (U) = = τ P(U H 0) i= 1 P(u H 0) < i H0 Optimal Local Sensor rules: More complicated because of distributed nature. With Conditional independence of sensor observation: LRT H1 P(y i H 1) > Λ (y i) = τ P(y H 0) < i H0 i

Classical Distributed Detection Person by person optimization (PBPO) LRT thresholds at the sensors are coupled with each others and Fusion Center s. Each sensor threshold is optimized assuming fixed decision rules at all other sensors and the FC. This is iteratively done until we reach optima value. It gives a necessary but not sufficient condition for optimality, so several Initialization are necessary. Error Exponents: PBPO is intractable in networks with large number of sensors, So in asymptotic regime, threshold is selected such that gives the best error exponent.( identical thresholds)

Channel Aware Distributed Detection. Sources of uncertainty:noise, fading, Shadowing, interference in Observation and Transmission channel Separation Approach for DD with uncertainty: Communication schemes between sensors and center are separated from the SP algorithms in decision rules.

Channel Aware Distributed Detection Channel Aware Fusion rule: (1) The ultimate goal is not recovering Ui. (2) θ I( θ ; y,...,y ) I( θ ;u ˆ,...,u ˆ ) 1 k 1 k Optimal detector should consider Channel Conditions in the Fusion Rule. (LRT is optimum rule).

Channel Aware Distributed Detection Channel Aware local sensor rules: For globally optimal detection, transmission channel is considered in the local sensors. (Energy efficient) The sensor thresholds are different for different channels. ( Using channel statistics instead of instant CSI)

Channel Aware Distributed Detection Perfect CSI at the fusion center: Example: Independent transmission & observation channels, BPSK (ui= -1 or 1), coherent reception.

Channel Aware Distributed Detection Suboptimal Fusion Rules: High SNR (Chair-Varshney): Low SNR (MRC and EGC): Also can be used when detection indexes of sensors are not known in the FC.

Channel Aware Distributed Detection BPSK with perfect CSI in the FC, using optimal and suboptimal rules

Channel Aware Distributed Detection Estimated CSI in the Fusion center T sensor decisions are packed and sent with a training bit. Assume there is a block fading with coherence time less than the packet length. yk,1 = uthk + nk,1 (u = 1) LMMSE complex channel estimation: E ĥh = E(h y ) =α y, σ = (1 + ) σ 2 b 1 k k k1 k,1 k1 k,1 error 2 n σ = E σ +σ 2 2 2 w b error n t Λ BPSK K * Λ = Re(y h ) Λ 1 ˆ BPSK EGC = Re(y k,tφk ), φk = e K = K k = 1 K 1 ˆ * BPSK MRC k,t k K k 1 jϕ k

Channel Aware Distributed Detection Different Modulation with perfect and imperfect CSI using LRT

Channel Aware Distributed Detection BPSK with optimal and suboptimal fusion rules

Channel Aware Distributed Detection OOK modulation and the impact of Number of sensors on p Pd.

Channel Aware Distributed Detection BFSK, Sensors with different Pds

Conclusion Neyman-Pearson as a detection criterion for maximizing detection probability with the constraint on false alarm rate. Decentralized Detection,, a power and bandwidth efficient detection which uses LRT as an optimal rule in the sensors and FC. Transmission channel aware sensor and fusion rules can improve the detection performance of DD systems in fading channels. In high SNR rules using estimated CSI perform like the ones with In high SNR, rules using estimated CSI perform like the ones with perfect CSI.

Channel Estimation in DD Systems Thank You.