The systems and methods disclosed herein are directed to detecting, monitoring, and mitigating the presence of a drone. More particularly, the systems and methods detect, demodulate, and decode a radio-frequency (RF) signal transmitted between the drone and a drone controller.
Unmanned Aircraft Systems (UAS), more commonly known as drones, are used extensively in a large number of exciting and creative applications, ranging from aerial photography, agriculture, product delivery, infrastructure inspection, aerial light shows, and hobbyist drone racing. Despite the usefulness of drones in many applications they also pose increasing security, safety, and privacy concerns. Drones are being used to smuggle weapons and drugs across borders. The use of drones near airports presents safety concerns, which may require airports to shut down until the surrounding airspace is secured. Drones are also used as a tool of corporate and state espionage activities. Thus, there is demand for an effective Counter-Unmanned Aircraft System (CUAS) solution to detect and monitor drones and mitigate the threat of drones when necessary.
The systems, methods and devices of this disclosure each have several innovative aspects, no single one of which is solely responsible for the desirable attributes disclosed herein.
A system and method for detecting communication between a drone and a controller are described. In one embodiment, the system comprises a radio-frequency (RF) receiver configured to receive an RF signal transmitted between the drone and a controller. The RF signal includes scrambled data r based on known scramblers with an unknown scrambling seed s. The system further comprises a memory device in communication with a hardware processor and having stored computer-executable instructions to cause the hardware processor to obtain a predetermined matrix based at least in part on a state transition matrix F of the known scramblers, and determine the unknown scrambling seed s based on a function including the predetermined matrix, segments of a scrambler output sequence f with known initial states, and segments of the scrambled data r.
In another embodiment, the method comprises receiving a radio frequency (RF) signal transmitted between a drone and a controller. The RF signal including scrambled data r based on known scramblers and an unknown scrambling seed s. The method further comprises obtaining by a hardware processor a predetermined matrix based at least in part on a state transition matrix F of the known scramblers; and determining by the hardware processor the unknown scrambling seed s based on a function including the predetermined matrix, segments of a scrambler output sequence f with known initial states, and segments of the scrambled data r.
The fast growth of drone applications in industrial, commercial and consumer domains in recent years has caused great security, safety and privacy concerns. For this reason, demand has been growing for systems and technique for drone detection, monitoring, and mitigation.
CUAS systems (or simply “drone detection systems”) may operate using multiple stages. In a first stage, the drone detection system detects the presence of a drone and determine whether the drone is a friend or a foe. The drone detection system can accomplish this by eavesdropping the signals exchanged between the drone and the controller. For example, certain aspects of this disclosure may relate to detecting the presence of drones which communicate with the controller using an RF signal including a synchronization signal such as a Zadoff-Chu (ZC) sequence for synchronization of the RF signal.
In certain aspect, the detection of the drone can involve receiving a sequence of samples of an RF signal transmitted between a drone and a drone controller, the RF signal including a synchronization signal for synchronization of the RF signal, obtaining a double differential of the received sequence of samples, calculating a running sum of a defined number of the double differential of the received sequence of samples, and detecting the presence of the drone based on the running sum.
For certain types of synchronization signals (e.g., ZC sequences), by detecting the presence of a drone employing a synchronization signal as described herein, the drone detection system can detect the synchronization signal without knowledge of a root of the synchronization signal. As used herein, the root of these types of synchronization signals generally refers to a unique value that is used to generate and decode the synchronization signals. The use of a unique root can prevent the synchronization signal from interfering with other RF communication signals generated using a different root. Moreover, the drone detection system can be implemented with low-complexity and can be cost effective compared to techniques which run detection in parallel using every possible root value.
In certain embodiments, each of the drones 103A-103N is configured to communicate to a corresponding one of the controllers 105A-105N via an RF signal 107A-107N. Although not illustrated, in some embodiments, a single one of the controllers 105A-105N may be configured to control more than one of the drones 103A-103N.
The drone detection system 101 is configured to receive eavesdrop 109A109N on the communications between the drones 103A-103N and the controllers 105A-105N in order to detect the presence of the drones 103A-103N. For example, the drone detection system 101 may be configured to receive the RF signals 107A-107N being sent between the drones 103A-103N and the controllers 105A-105N in order to eavesdrop 109A-109N on the communication between the drones 103A-103N and the controllers 105A-105N. In certain embodiments, once the drone detection system 101 is able to decode the RF signals 107A107N, the drone detection system 101 may monitor the drones 103A-103N and take certain actions in order to mitigate the potential threat of the drones 103A-103N. For example, the drone detection system 101 may transmit a jamming RF signal to disrupt communication between the detected drone 103A-103N and the controller 105A-105N, and/or spoof the controller 105A-105N by sending a command to the drone 103A103N to land or otherwise leave the environment 100.
I. Introduction
Many of the drone 103A-103N, also known as unmanned aerial vehicles (UAV), in the industrial, commercial, and consumer sectors utilize 3GPP Long-Term Evolution (LTE), modified LTE, or LTE-like wireless protocols for communications between drones and their control devices or controllers 105A-105N such as radio controllers and goggles. In the physical layer (PHY) of these LTE-based drone systems, the baseband processing at the transmitter (TX) includes a scrambler to randomize the channel coded data before modulation, which provides a certain level of security and data privacy in addition to other benefits. A scrambling sequence is typically generated by a linear feedback shift registers (LFSR) with a scrambling seed, also called scrambling offset, to initialize the states of the LFSR. Since the receiver (RX) of the drone systems knows the seed, it can generate the same scrambling sequence to descramble the received data without the need for blind detection. However, the seed is unknown to any device outside the drone systems. Moreover, the scrambling seed is strongly tied to the identification of the drone devices. Detecting the seed assists in decoding important information and revealing the identity of a drone 103A-103N. Therefore, the scrambling seed is essential for counter-unmanned aircraft systems (CUAS) and drone detection/monitoring systems to blindly detect the scrambling seed within critical time constraints. It is a nontrivial task to blindly detect the scrambling seed in real time. In LTE-based drones, the scrambling seed is the combination of two 31-bit Gold sequences generated by two LFSRs of length 31 with one known seed and the other unknown for blind detection. As a result, the unknown seed cannot be determined immediately in real time by any brute-force method because there are 2,147,483,648 (=231) possible choices. Moreover, the seed can change regularly, which poses a strict time limit for seed detection. The blind seed detection can be further complicated by the noise and other channel impairments that may result in bit errors in the received scrambled data. The combining of multiple copies of descrambled data performed by regular RX cannot be directly applied to the noisy scrambled data in order to maximize the received signal-to-noise ratio (SNR) because the received data are randomized by scrambling. The studies on the reconstruction of scrambler LFSR polynomials and initial states including the secret keys of stream ciphers are rich in literature. However, there are only a few solutions capable of handling errors in received bits due to channel noise. A conventional blind scrambling seed estimation scheme using the redundancy introduced by channel coding in the scrambled data may be used. This scheme requires the knowledge of the coding scheme used at the TX (e.g., drone). Further, a method for reconstructing scrambler polynomials from data streams received in the presence of noise. However, this method does not reconstruct scrambler seeds. It is possible to enhance the performance of the foregoing method with the reconstruction of scrambler's initial state. Nevertheless, this enhancement requires a large number of samples and the knowledge of coding knowledge, which may take a long time to run especially when the degree of the polynomials is high.
It is desirable to use an efficient and fast method for blind scrambling seed estimation in noisy channel environment that can meet strict time requirements. Thus, in this disclosure, a blind scrambling seed detection method is described using the soft combining of scrambled repetitive rate matched data to enhance the detection performance in noisy channel. Rate matching is the mechanism specified in LTE standard to place transmitted coded data into the allocated OFDM resources in order to achieve the required data rate.
When the transmitted data size is small (e.g. control information or small transport blocks), the interleaved codeword will be placed repeatedly in the resources. Although this repetitive structure disappears after scrambling, it is utilized in one embodiment to soft combine the received data after algebraic manipulations. If the channel coding scheme is known, similar to a blind scrambling seed estimation scheme using the redundancy introduced by channel coding in the scrambled data, the method of this embodiment uses this knowledge to remove the coding effect in the null subspace of coding to reveal the scrambling states. When the coding scheme is unknown, the method in this embodiment utilizes the repetitive structure to remove the effect of transmitted data to facilitate the seed detection. As described below, one point of novelty lies in the algebraic derivations making the soft combining of scrambled data feasible with the rate matching structure. Simulation results show that such seed detection method with coding knowledge significantly improves the detection performance over conventional approaches. This method with no coding knowledge also compensates the performance loss due to the lack of that knowledge. As will be further described herein, the system model for blind detection is provided. Further, the method of blind seed detection with the knowledge of encoding is described. The method of blind seed detection with no knowledge of encoding is also described.
In certain embodiments, the drone detection system 101 is configured to receive an RF signal (e.g., the RF signals 107A-107N of
In certain embodiments, the memory 113 can store computer readable instructions for causing the processor 111 to detect the presence of a drone (e.g., the drones 103A-103N of
There are a number of different techniques that the drone detection system 101 can use to detect the presence of the drones 103A-103N. For example, the drone detection system 101 can scan the airwaves at frequencies known to be used by particular model(s) of the drones 103A-103N. If a known protocol is identified, the drone detection system 101 can then decode the signal as if it was the intended receiver/controller 105A-105N. Depending on the embodiment, these decoding steps can include: synchronization, channel estimation, de-interleaving, descrambling, demodulation, and error control decoding. In certain embodiments, the drone detection system 101 can be configured to perform some of the aforementioned steps blindly due to lack of knowledge (such as device id) on information known by the controller 105A-105N. As described below, the blind detection of the drones 103A-103N using certain communication protocols (e.g., a synchronization signal) are provided herein. Once detected, the drone detection system 101 can provide alert(s) regarding the presence of the one or more drones 103A-103N.
The drone detection system 101 can monitor the presence of the one or more drones 103A-103N. As part of monitoring, a position of the one or more drones 103A-103N relative to the environment 100 can be monitored in real-time to determine if the position of the one or more drones 103A-103N strays inside or outside acceptable airspace.
In certain embodiments, the motor controller(s) 123 are configured to receive instructions from the processor 129 (e.g., based on instructions stored in the memory 127 and the RF signal 107 received from the controller 105) to move the drone 103 to a specific point in the airspace and translate the received instructions into motor position commands which are provided to the propeller(s) 121. In certain embodiments, the battery 125 provides power to each of the components of the drone 103 and has sufficient power storage to enable the propellers 121 to maneuver the drone 103 for a predetermined length of time. The camera 135 can capture images in real-time and provide the captured images to the controller 105 via the antenna 133 which can aid a user in controlling movement of the drone 103.
II. System Model
In R, c is typically interleaved to v stored in a circular buffer. The cyclically rotated version of v, denoted by w, is then used repeatedly to fill up the allocated OFDM resources, the rate matching output d of length r. For simplicity, assume that r=Nr·c where Nr assumed to be ≥2 is the number of copies of w in d. That is, d=[wT wT . . . wT]T. This is a reasonable assumption when message m contains control information or transport blocks of small size. Typically multiple copies of codewords are transmitted to facilitate the decoding in low SNR. Thus, the length of a codeword is much smaller than the size of resources allocated.
The rate matched data d are then scrambled by scrambling sequence f. As in Clause 7.2 of [1], assume that f is the exclusive-OR (addition in Galois Field of two elements denoted by GF(2)) of two L-bit linear feedback shift register (LFSR)-based scrambler outputs starting from state n. The initial state (scrambling seed) and state transition matrix of scrambler i are denoted by s0i and Fi, respectively, i=1, 2. In this embodiment, assume that s01 is known (e.g. as defined in the 3GPP Standard [1]) whereas s02 is the seed intended to blindly detect from the received scrambled data. Also, assuming that the polynomials of both scramblers are known (e.g. as defined in [1]), state transition matrices Fi are known and can be easily constructed. Since the scrambling starts from state n, an r by n+r extraction matrix En=[0r×n Ir] extracts the sequence from state n to state n+r. Hence, the scrambling sequence of scrambler i from state n to state n+r−1 is
fni=Enf0i=EnFis0i=Fnis0i (1)
where Fni=EnFi is the transition matrix of scrambler i starting from state n. The scrambled data r is then given by
r=d⊕fn=RCm⊕F01s01⊕F02s02 (2)
where ⊕ is the element-wise addition in GF(2).
Scrambled data r are then mapped to data symbols followed by the modulation on OFDM subcarriers. The OFDM modulated signal x is sent through the channel. The received signal y at the receiver is given by
y=hx+n (3)
where h is channel gain and n˜(0, σ2) is circularly complex additive white Gaussian noise (AWGN) with variance σ2. After OFDM demodulation and modulation demapping, the received scrambled bits, {tilde over (r)} are obtained. For blind detection, {tilde over (r)} are typically obtained in the form of log-likelihood ratio (LLR), denoted by ({tilde over (r)})llr by soft modulation demapping. If the unknown scrambing seed s02 is correctly detected and {tilde over (r)}=r, message m can be successfully decoded after descrambling and de-rate matching.
III. Blind Scrambling Seed Detection with the Knowledge of Coding
In this section, a blind scrambling seed detection method is described to soft combine the scrambling seeds using the repetitive rate matched structure in the received scrambled data with the knowledge of the channel encoding scheme. The described method can significantly improve the detection performance over the non-combining and the hard combining approaches.
A. Blind Scrambling Seed Detection in Noise-Free Channel
Eq. (2) can be re-arranged as
Fn2s02=r⊕Fn1s01⊕Gm (4)
Consider left-multiplying Eq. (4) by {tilde over (G)} and using {tilde over (G)}G=0, to obtain
If both sides of Eq. (6) are multiplied by ({tilde over (G)}Fn2)T, and ({tilde over (G)}Fn2)T GFn2 is invertible, then s02 can be uniquely obtained as
s02=(({tilde over (G)}Fn2)TGFn2)−1({tilde over (G)}Fn2)T{tilde over (G)}(r⊕fn1) (7)
Eq. (7) can only be used when {tilde over (r)}=r, that is, all scrambled bits are received correctly.
On the other hand, when any bit in {tilde over (r)} received in error, {tilde over (r)}≠r in a noisy channel. In this case, if ({tilde over (G)}Fn2)TGFn2 is still invertible, Eq. (7) becomes
{tilde over (s)}02=(({tilde over (G)}Fn2)TGFn2)−1({tilde over (G)}Fn2)T{tilde over (G)}({tilde over (r)}⊕fn1)≠s02. (8)
Thus, an incorrect seed is obtained from Eq. (8) if any bit is received in error. This problem will be addressed by the description of the method in Section III-B below. Another issue with this approach is that when the type of encoder used at the transmitter is unknown, C cannot be constructed to find the null subspace {tilde over (G)} of G=RC. This issue will be solved by the method described in Section IV.
B. Blind Scrambling Seed Detection in Noisy Channel
When the received scrambled data contain errors, it is desirable to exploit the repetitive rate matching structure. Eq. (2) can be rearranged to d=r⊕f and obtain
d=r⊕Fn1s02⊕Fn2s02 (9)
Let rk and dk be the -bit segment k of the scrambled data r and unscrambled data d, respectively, starting from bit kc to bit kc+−1, c≤≤2c. Note that dk=w and N=Nr if =c, where N is the number of repetitive segments for combining. dk=[wT w0 . . . w−c−1]T and N=Nr−1 if c<≤2c, where wj is the j-th bit of w. From the repetitive structure in d, it is established that
d0=d1=d2= . . . =d(N−1) (10)
With a slight abuse of notations, let Fki and fki, i=1, 2 be the state transition matrix and the output sequence, respectively, of the scrambler i starting from the state n+kc to n+kc+−1. If {tilde over (r)}k=rk, for descrambling rk to dk, k=0, 1, . . . , N−1, this provides
dk=rk⊕Fk1s01⊕Fk2s02,k=0,1,. . . ,N−1. (11)
Recognize dk=RkCm where Rk is the rate matching transition matrix from state kc to kc+−1. Let Gk=RkC be the combined coding and rate matching matrix from state kc to kc+−1. {tilde over (G)}k can be defined as the null subspace matrix of Gk, such that {tilde over (G)}kGk=0, k=0, 1, . . . , N−1. Similar to Eq. (6), multiply Eq. (11) by {tilde over (G)}k and obtain
{tilde over (G)}kFk2s02={tilde over (G)}k(rk⊕fk1),k=0,1, . . . ,N−1. (12)
Multiplying both sides of Eq. (12) by ({tilde over (G)}kFk2)T, and finding the smallest such that the inverse of ({tilde over (G)}kFk2)T{tilde over (G)}kFk2 exists, then
s0,k2=Xk(rk⊕fk1) (13)
where Xk=(({tilde over (G)}kFk2)T GkFk2)−1 ({tilde over (G)}kFk2)T {tilde over (G)}k. All seeds detected from each segment of received data s0,k2 are identical and correct. This is, s0,02= . . . =s0,N−12=s02. However, if {tilde over (r)}k≠rk due to noise, s0,k2≠s02. Fortunately, the errors in {tilde over (r)}k occur independently. To mitigate the effect of receiving errors for seed detection, it is desirable to soft combine all detected seeds using the received scrambled data. At block 510, the method involves getting {tilde over (G)}k from {tilde over (G)}, and Fk2 from Fn2, and finding the smallest such that the matrix inverse in (13) exists and calculating Xk.
The received scrambled data {tilde over (r)}k are typically obtained in real-valued LLR form, ({tilde over (r)}k)llr ∈, after modulation demapping. Since the scrambled data cannot be combined directly, it is desirable to derive the seed estimate in terms of the LLR values of received scrambled data for each segment. Then the seed estimates of all segments can be soft combined. To facilitate the soft combining, it is desirable to first introduce the following definitions to convert binary values to soft values, and vice versa.
Definition 1: For a binary bit x ∈ {0, 1}, the soft bit of x, denoted by (x), is defined as y=(x)=1.0−2.0·x, y ∈ {+1.0, −1.0} ⊂ .
Definition 2: For any y ∈ , the binary value of y is defined as x=−1(y)=I{y<0}, x ∈ {0, 1}, where I {z} is an indicator function and returns 1 if z is true, 0 otherwise.
Definition 3: For a binary vector x of length n, x ∈ {0, 1}n, the soft vector of x, denoted by (x), is defined as y=(x)=1.0−2.0·x, y ∈ {+1.0, −1.0}n.
Definition 4: For real-valued vector y of length n, y ∈ , the binary vector of y is defined as x=−1(y)=[−1(y0) −1(y1) . . . −1(yn-1)]T=[I{y0<0} I{y1<0} . . . I{yn-1<0}]T={y<0}, x ∈ {0, 1}n, where {z} is an element-wise indicator function and, for reach element zi of z, returns 1 if zi is true, 0 otherwise, i=0, 1, . . . , ∥z∥−1.
Definition 1 simply maps {0, 1} to {+1.0, −1.0}. Definition 2 maps {+∪ {0}, −} to {0, 1} where + and − are positive real numbers and negative real numbers, respectively. Note that y=0 will be mapped to binary 0 according to Definition 2 though the mapping to 0 or 1 is arbitrary. Definition 3 and Definition 4 are vector versions of Definition 1 and Definition 2, respectively. Next, it is desirable to introduce Lemma 1 for algebraic manipulation between GF(2) and as follows:
Lemma 1: For a0, a1, . . . , aN−1 ϵ {0, 1}, (⊕i=0N−1ai)=Πi=0N−1(ai).
Proof: See Appendix A.
Lemma 2: For binary vectors a0, a1, . . . , aN−1 ϵ {0, 1}n, (⊕i=0N−1ai)=Πi=0N−1 (ai) where ⊕ and Π are element-wise addition in GF(2) and element-wise multiplication in , respectively.
Proof: The proof is similar to Appendix A.
Lemma 1 states that, for binary data ai, i=0, 1, . . . , N−1, the soft value of the addition of ai in GF(2) equals the product soft values of ai, (ai). Lemma 2 is the vector version of Lemma 1.
Using Definition 3 and replacing rk with {tilde over (r)}k, Eq. (13) may be converted to soft estimates as
({tilde over (s)}0,k2)=(Xk({tilde over (r)}k⊕fk1)),k=0,1, . . . ,N−1. (14)
where Xk is an L by matrix as defined in Eq. (13), {tilde over (p)}k{tilde over (r)}k ⊕fk1=[{tilde over (p)}k,0 . . . −1]T is a column vector of length , and {tilde over (p)}k,j={tilde over (r)}k,j ⊕fk,j1, j=0, 1, . . . , −1. From Eq. (14), the soft value of the i-th bit of s0,k2, i=0, 1, . . . , L−1, is given by
where xk,i=[xk,i,0 . . . −1] is the i-th row vector of Xk. The equality in Eq. (17) and in (19) follow Lemma 1. To further simplify Eq. (19), it is desirable to introduce the expression for the soft value of the AND function of the two binary bits in Lemma 3.
Lemma 3: For x, y ∈ {0, 1}, the soft value of x multiplied by y in GF(2), equivalently, the soft value of the logical AND of x and y is (xy)=(−1)
Proof: See Appendix B.
Applying Lemma 3 to Eq. (19), then
({tilde over (s)}k,i)=ak,i,j(bk,i,j){tilde over (r)}
where ak,i,j=(xk,i,jfk,j1) and bk,i,j=(−1)
({tilde over (s)}i)=Σk=0N−1ak,i,j(bk,i,−1(({tilde over (r)}
At block 516, the method involves softly combining N repetitions of soft values of the i-th bit of the seed using Eq. (21). Finally, the i-th bit of the scrambling seed estimate s02, i=0, 1, . . . , L−1, is obtained as
{tilde over (s)}i−1(Σk=0N−1Πj=0−1ak,i,j(bk,i,j)
where ak,i,j=(xk,i,jfk,j1), bk,i,j=(−1)
IV. Blind Scrambling Seed Detection with No Knowledge of Coding
In this section, a blind scrambling seed detection method is described utilizing the underlying repetitive structures in the received data without the prior knowledge of the channel encoding scheme.
dk=rk⊕Fk1s01⊕Fk2s02,k=0,1, . . . , N−1 (23)
It is desirable to first look at the noise-free case. If one adds two of these equations in GF(2), say k=u and k=v, u≠v, and using du ⊕ dv=0 based on Eq. (10), the following equation is obtained
Fuv2s02=ruv⊕Fuv1s01. (24)
where Fuvt=Fut ⊕ Fvt, t ∈ {1, 2}, and ruv=ru ⊕ rv. Since Fuv2, ruv, Fuv1 and s01 are known, if the smallest value of can be found as noted in block 606 such that the inverse of (Fuv2)TFuv2 exists, s02 can be obtained as follows:
s02=((Fuv2)TFuv2)−1(Fuv2)T(ruv⊕Fuv1s01) (25)
Similar to Eq. (7), Eq. (25) can only be used when {tilde over (r)}k=rk, that is, all scrambled bits are received correctly. If {tilde over (r)}k≠rk (e.g., in a noisy channel), Eq. (23) becomes
{tilde over (d)}k={tilde over (r)}k⊕Fk1s01⊕Fk2s02≠dk. (26)
For k=u, v, u≠v, {tilde over (d)}u ⊕ {tilde over (d)}v≠0 if any bit in {tilde over (r)}u or {tilde over (r)}v is received in error. Thus, both Eq. (24) and Eq. (25) are invalid.
For the noisy case, it is desirable to soft combine all detected seeds from each pair of rate matching repetitions using the received scrambled data as noted in block 608. Similar to the derivations in Section III, from Eq. (25), the soft value of s02 estimate is
({tilde over (s)}02)=(Yuv({tilde over (r)}uv⊕fuv1)) (27)
where Yuv=((Fuv2)TFuv2)−1(Fuv2)T, {tilde over (r)}uv={tilde over (r)}u ⊕ {tilde over (r)}v, fuv1=fuv1s01. From Eq. (27), the soft estimate of the i-th bit of s0,uv2, the addition of repetitions u and v in GF(2), i=0, 1, . . . , L−1, is given by
where yuv,i=[yuv,i,0 . . . yuv,i,−1]T is the i-th row vector of Yuv, auv,i,j=(yuv,i,jfuv,j1), buv,i,j=(−1)
At block 610, it is desirable to choose the pairs of repetitions for soft combining. There are many ways to choose the pairs of repetitions for soft combining. Let's simply let v=u+1, replace ({tilde over (r)}k,j) with ({tilde over (r)}k,j)llr, and {tilde over (r)}k,j with −1(({tilde over (r)}k,j)llr) in Eq. (33), sum over all N=Nr−1 repetitions, and obtain the soft combined estimate of the i-th bit of s02, i=0, 1, . . . L−1, given by
({tilde over (s)}i)=Σu=0N−1auu+1,i,j(buu+1,i,j)c
where cu,j=−1(({tilde over (r)}u,j)llr) ⊕ −1(({tilde over (r)}u+1,j)llr), and (du,j)llr=({tilde over (r)}u,j)llr({tilde over (r)}u+1,j)llr. Finally, as noted in block 612, the i-th bit of the scrambling seed estimate {tilde over (s)}02 is obtained as
{tilde over (s)}i=−1(auu+1,i,j(buu+1,i,j)c
The scrambling seed estimate using soft combining is {tilde over (s)}02=[{tilde over (s)}0 . . . {tilde over (s)}L−1]T. The method 600 ends at block 614.
V. Simulation Results
In this section, the performance of the described blind scrambling seed detection method is evaluated using Monte Carlo simulations with 10,000 iterations for each setting. The performance of the described method is compared to that of the hard combining approach and the conventional approach with no combining specified in [3] first with the knowledge of coding and then with no knowledge of coding.
A. Simulation Environment Settings
In each iteration, the message bits of length 20 are randomly generated and coded by the tail-biting convolutional codes. The 60-bit codeword is then rate matched to 720 bits (Nr=12) or 1440 bits (Nr=24). These rate matched bits are first scrambled with a randomly selected seed s02 and mapped to QPSK symbols by modulation mapping. The convolutional coding and rate matching follow the procedures specified in [2]. The scrambling and modulation mapping follow [1]. The QPSK symbols are then placed in equally spaced OFDM resources modulating subcarriers at specific locations of certain OFDM symbols. The rest of subcarriers are modulated by random data symbols. This arrangement of QPSK symbols in OFDM resources is similar to how the control information of certain consumer drones is placed in the resource elements (RE) for 10 MHz and 20 MHz channel bandwidths. The OFDM modulator then converts these frequency-domain symbols with guard band into time-domain samples by Inverse Fast Fourier Transform (IFFT) of size 1,024, add cyclic prefix (CP), and outputs the OFDM signals from TX to the channel where AWGN is added with variance σ2 to achieve the required SNR. The received signal at RX is first synchronized and demodulated by the OFDM demodulator. The QPSK symbols that carry the message are extracted from specific subcarrier locations of certain OFDM symbols. After modulation demapping, the LLR values of the scrambled data, ({tilde over (r)})llr, are sent to blind seed detector for detection. If the detected seed {tilde over (s)}02 is the same as the one randomly selected at TX, s02, the detection is successful, which can be verified by the recovered message {tilde over (m)} after descrambling using the detected seed, de-rate matching and decoding.
B. Hard Combining vs. Soft Combining
For performance comparison, the described soft combining approach with hard combining with the knowledge of coding are compared. For hard combining, let {tilde over (s)}k,i be the i-th bit of {tilde over (s)}0,k2, i=0, 1, . . . L−1. Choosing N to be an odd number and using Definitions 1 & 2, the hard combining of bit i of detected seeds is given by
{tilde over (s)}i=−1(Σk=0N−1({tilde over (s)}k,i)),i=0,1, . . . L−1. (36)
and the hard combined seed is {tilde over (s)}0,HC2=[{tilde over (s)}0{tilde over (s)}1 . . . {tilde over (s)}L−1]T. Here, Eq. (36) represents essentially the hard combining of {tilde over (s)}k,i in {tilde over (s)}0,k2, ∀i using the majority rule. It can be shown that, if N is an odd number, {tilde over (s)}i is j if at least
are j, j ∈ {0, 1}.
C. Coding Knowledge vs. No Coding Knowledge
Next, the performance of soft combining with and without the knowledge of coding is compared.
As described in this disclosure, a blind scrambling seed detection method is described utilizing the soft combining of repetitive rate matching structure in the received noisy scrambled data for counter-UAS systems to detect and decode the data transmitted by the LTE-based drones. The described method can be used with or without the knowledge of coding scheme. With the knowledge of coding scheme, the described method with soft combining achieves SNR gain in low SNR regions over hard combining and no combining cases. Even without the coding knowledge, the described soft combining method compensates the performance loss due to the lack of the coding knowledge compared to the case of no combining with coding knowledge. Thus, the described method significantly enhances the performance for blind scrambling seed detection in noisy channels.
The drone detection functions described herein may be stored as one or more instructions on a processor-readable or computer-readable medium. The term “computer-readable medium” refers to any available medium that can be accessed by a computer or processor. By way of example, and not limitation, such a medium may comprise RAM, ROM, EEPROM, flash memory, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to store desired program code in the form of instructions or data structures and that can be accessed by a computer. It should be noted that a computer-readable medium may be tangible and non-transitory. As used herein, the term “code” may refer to software, instructions, code or data that is/are executable by a computing device or processor.
The methods disclosed herein comprise one or more steps or actions for achieving the described method. The method steps and/or actions may be interchanged with one another without departing from the scope of the claims. In other words, unless a specific order of steps or actions is required for proper operation of the method that is being described, the order and/or use of specific steps and/or actions may be modified without departing from the scope of the claims.
As used herein, the term “plurality” denotes two or more. For example, a plurality of components indicates two or more components. The term “determining” encompasses a wide variety of actions and, therefore, “determining” can include calculating, computing, processing, deriving, investigating, looking up (e.g., looking up in a table, a database or another data structure), ascertaining and the like. Also, “determining” can include receiving (e.g., receiving information), accessing (e.g., accessing data in a memory) and the like. Also, “determining” can include resolving, selecting, choosing, establishing and the like.
The phrase “based on” does not mean “based only on,” unless expressly specified otherwise. In other words, the phrase “based on” describes both “based only on” and “based at least on.”
The various illustrative logical blocks and modules described in connection with the embodiments disclosed herein, e.g., functional block diagrams in
The elements of a method, process, or algorithm described in connection with the embodiments disclosed herein can be embodied directly in hardware, in a software module stored in one or more memory devices and executed by one or more processors, or in a combination of the two. A software module can reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of non-transitory computer-readable storage medium, media, or physical computer storage known in the art. An example storage medium can be coupled to the processor such that the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium can be integral to the processor. The storage medium can be volatile or nonvolatile. The processor and the storage medium can reside in an ASIC. The ASIC can reside in a user terminal. In the alternative, the processor and the storage medium can reside as discrete components in a user terminal.
Conditional language such as, among others, “can,” “could,” “might” or “may,” unless specifically stated otherwise, are otherwise understood within the context as used in general to convey that certain embodiments include, while other embodiments do not include, certain features, elements and/or blocks. Thus, such conditional language is not generally intended to imply that features, elements and/or blocks are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without user input or prompting, whether these features, elements and/or blocks are included or are to be performed in any particular embodiment.
Disjunctive language such as the phrase “at least one of X, Y, or Z,” unless specifically stated otherwise, is otherwise understood with the context as used in general to present that an item, term, and so forth, may be either X, Y, or Z, or any combination thereof (for example, X, Y, and/or Z). Thus, such disjunctive language is not generally intended to, and should not, imply that certain embodiments require at least one of X, at least one of Y, or at least one of Z to each be present.
Any process descriptions, elements or blocks in the flow diagrams described herein and/or depicted in the attached figures should be understood as potentially representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or elements in the process. Alternate implementations are included within the scope of the embodiments described herein in which elements or functions may be deleted, executed out of order from that shown, or discussed, including substantially concurrently or in reverse order, depending on the functionality involved as would be understood by those skilled in the art.
Unless otherwise explicitly stated, articles such as “a” or “an” should generally be interpreted to include one or more described items. Accordingly, phrases such as “a device configured to” are intended to include one or more recited devices. Such one or more recited devices can also be collectively configured to carry out the stated recitations. For example, “a processor configured to carry out recitations A, B and C” can include a first processor configured to carry out recitation A working in conjunction with a second processor configured to carry out recitations B and C.
It should be emphasized that many variations and modifications may be made to the above-described embodiments, the elements of which are to be understood as being among other acceptable examples. All such modifications and variations are intended to be included herein within the scope of this disclosure and protected by the following.
It is desirable to prove (⊕i=0N−1ai)=Πi=0N−1(ai). N can be an even or odd number:
Let z=x·y ∈ {0, 1}. From the multiplication table of GF(2) or the truth table of logical AND, z is 1 only if both x and y are 1. Equivalently, using Definition 1, (z)=−1.0 only if both (x)=−1.0 and (y)=−1.0. To express (z) in terms of (y), the following three cases are provided:
This application is a continuation application of U.S. patent application Ser. No. 17/073,053, filed Oct. 16, 2020, and entitled “SYSTEMS AND METHODS FOR DETECTING A SCRAMBLING SEED IN COMMUNICATION WITH AN UNMANNED AIRCRAFT SYSTEM”, which claims the benefit of U.S. Provisional Application No. 62/937,596, filed Nov. 19, 2019, each of which is hereby incorporated by reference in its entirety. Any and all priority claims identified in the Application Data Sheet, or any correction thereto, are hereby incorporated by reference under 37 CFR § 1.57.
Number | Name | Date | Kind |
---|---|---|---|
5345539 | Webb | Sep 1994 | A |
9275645 | Hearing et al. | Mar 2016 | B2 |
9529360 | Melamed et al. | Dec 2016 | B1 |
9763177 | Baskaran et al. | Sep 2017 | B1 |
9996079 | Magy et al. | Jun 2018 | B2 |
10051475 | Shattil | Aug 2018 | B2 |
10237743 | Shattil et al. | Mar 2019 | B2 |
10317506 | Seeber | Jun 2019 | B2 |
11218247 | Lo | Jan 2022 | B2 |
20060071671 | Tola | Apr 2006 | A1 |
20110255587 | Yoshikawa | Oct 2011 | A1 |
20140349666 | Sun | Nov 2014 | A1 |
20170148332 | Ziemba | May 2017 | A1 |
20170295551 | Sadiq | Oct 2017 | A1 |
20180017665 | Wittenberg | Jan 2018 | A1 |
20180081355 | Magy | Mar 2018 | A1 |
20180262900 | Moon | Sep 2018 | A1 |
20200382156 | Lo | Dec 2020 | A1 |
Number | Date | Country |
---|---|---|
3422038 | Jan 2019 | EP |
WO 2018125686 | Jul 2018 | WO |
WO 2019032162 | Feb 2019 | WO |
Entry |
---|
“Drone Market is Estimated to Expand at a Healthy CAGR in the Upcoming Forecast 2025,” [Online] Sep. 13, 2019, https://www.americanewshour.com/?s=Drone+Market+Is+Estimated+To+Expand+At+a+Healthy+CAGR+in+the+Upcoming+Forecast+2025. |
“Evolved Universal Terrestrial Radio Access (E-UTRA); Physical Channels and Modulation,” 3GPP TS 36.211 (2018) vol. 15.0. |
“FCC Part 15.247 Test Report for GL300A (FCC ID:SS3-GL3001501),” Tech. Rep., Apr. 2015. [Online]. Available: https://fccid .io/SS3-GL3001501/Test-Report/Test-Report-Rev-2599009. |
“FCC Part 15.247 Test Report for GL300C (FCC ID: SS3-GL3001510),” Tech. Rep., Oct. 2015. [Online]. Available: https://fccid.io/SS3-GL3001510/RF-Exposure-Info/SAR-Test-Report-2805129. |
“FCC Part 15.247 Test Report for GL300F (FCC ID:SS3-GL300F1609),” Tech. Rep., Sep. 2016. [Online]. Available: https://fccid .io/SS3-GL300F1609/Test-Report/Test-Report-3155813. |
Angelosante et al., “Estimating multiple frequency-hopping signal parameters via sparse linear regression,”IEEE Transactions on Signal Processing, vol. 58, No. 10, pp. 5044-5056, Oct. 2010. |
Beyme et al. “Efficient Computation of OFT of Zadoff-Chu sequences,” Elec. Letters (2009) vol. 45, No. 9, pp. 461-463. |
Federal Aviation Administration, “FAA aerospace forecasts fiscal years 2019-2039,” 2019. [Online]. Available: https://www.faa.gov/data research/aviation/aerospace forecasts/. |
Fischler et al., “Random sample consensus: A paradigm for model fitting with applications to image analysis and automated cartography,” Communications of the ACM, vol. 24, No. 6, pp. 381-395, Jun. 1981. |
Gul et al. “Timing and Frequency Synchronization for OFDM Downlink Transmissions Using Zadoff-Chu Sequences,” IEEE Trans. on Wireless Comm. (2015) vol. 14, No. 3, pp. 1716-1729. |
International Preliminary Report on Patentability issued in application No. PCT/US2020/032391, dated Jul. 19, 2021. |
International Search Report and Written Opinion issued in application No. PCT/US2021 /031801, dated Aug. 17, 2021. |
International Search Report dated Jul. 14, 2020, issued in corresponding International Application No. PCT/US2020/032391, filed May 11, 2020. |
International Search Report dated Feb. 2, 2021, corresponding to PCT Patent Application No. PCT/US2020/055944. |
International Search Report dated Sep. 8, 2020, issued in corresponding International Application No. PCT/US2020/034969, filed May 28, 2020. |
Kim et al. “A delay-robust random access preamble detection algorithm for LTE system,” Proc. RWS (2012) pp. 7578. |
Liang et al. “The Research on Random Access Signal Detection Algorithm in LTE Systems,” 2013 5th IEEE Intl. Symp. on Microwave, Ant. Prop. and EMC Tech. for Wireless Comm. (2013) pp. 115118. |
Liu et al., “Joint hop timing and frequency estimation for collision resolution in FH networks,” IEEE Transactions on Wireless Communications, vol. 4, No. 6, pp. 3063-3074, Nov. 2005. |
Lo, et al., “HopSAC: Frequency Hopping Parameter estimation Based on Random Sample Consensus for Counter-Unmanned Aircraft Systems”, MILCOM 2019-2019 IEEE Military Communications Conference (MILCOM), IEEE Nov. 12, 2019, pp. 355-360. |
Nelson et al. “The View From Above: A Survey of the Public's Perception of Unmanned Aerial Vehicles and Privacy,” J. of Urban Tech. (2019) vol. 26, issue 1, pp. 83-105. |
Simon et al., “On the Implementation and Performance of Single and Double Differential Detection Schemes”, IEEE Transactions on Communications, IEEE Service Center, Piscataway, NJ. USA, vol. 40, No. 2, Feb. 1, 1992 (Feb. 1, 1992), oaaes 278-291. |
Tao et al. “Improved Zadoff-Chu Sequence Detection in the Presence of Unknown Multipath and Carrier Frequency Offset,” IEEE Comm. Letters (2019) vol. 22, No. 5, pp. 922-925. |
Vo-Huu et al. “Fingerprinting Wi-Fi Devices Using Software Defined Radios” College of Computer and Information Science, Northeastern University. ACM. Jul. 18, 2016. pp. 3-13. |
Wang et al., “Frequency-hopping signal parameters estimation based on orthogonal matching pursuit and sparse linear regression,”IEEE Access, vol. 6, pp. 54 310-54 319, Sep. 2018. |
Yu et al. “Random access algorithm of LTE TDD system based on frequency domain detection,” Proc. Int. Conf. Semantics, Know1. Grid (2009) pp. 346350. |
Zhao et al., “Robust frequency-hopping spectrum estimation based on sparse bayesian method,” IEEE Transactions on Wireless Communications, vol. 14, No. 2, pp. 781-793, Feb. 2015. |
Number | Date | Country | |
---|---|---|---|
20220131640 A1 | Apr 2022 | US |
Number | Date | Country | |
---|---|---|---|
62937596 | Nov 2019 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 17073053 | Oct 2020 | US |
Child | 17646852 | US |