Next Article in Journal
Automotive Radar in a UAV to Assess Earth Surface Processes and Land Responses
Previous Article in Journal
Design of a Practical Underwater Sensor Network for Offshore Fish Farm Cages
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Detection of Transmitted Power Violation Based on Geolocation Spectrum Database in Satellite-Terrestrial Integrated Networks

1
College of Communications Engineering, Army Engineering University, Nanjing 210007, China
2
Jiangnan Institute of Computing Technology, Wuxi 214083, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Sensors 2020, 20(16), 4462; https://doi.org/10.3390/s20164462
Submission received: 29 July 2020 / Revised: 4 August 2020 / Accepted: 5 August 2020 / Published: 10 August 2020
(This article belongs to the Section Sensor Networks)

Abstract

:
This paper investigates the detection of the transmitted power violation (TPV) in the satellite-terrestrial integrated network, where the terrestrial base station may break the spectrum policies so that severe damages are made to the satellite systems. Due to the lack of prior information on specific abnormal behaviors, this problem is complex and challenging. To tackle it, we first turn to the geolocation spectrum database based detecting framework, where not only the tasks of each segment but also the spectrum policies are specified. Then, the ternary hypothesis test and the generalized Neyman–Pearson (GMNP) test criterion are applied to maximize the detection probability under the false-alarm constraint. What is more, the Abnormal after Normal (AaN) detector is developed to simplify the analysis. Finally, simulations are conducted to demonstrate that the proposed detector can realize the detection of TPV in most cases at the expense of less than 10% detection probability.

1. Introduction

1.1. Background and Motivation

With the rapid development of satellite communication, the satellite-terrestrial integrated network has become a new way to enhance the spectrum efficiency [1,2,3,4,5,6,7,8]. However, in the satellite-terrestrial integrated network, the terrestrial networks from different sources have different requirements and diversified states, which is very easy to breed abnormal spectrum using behavior. The order of spectrum usage is seriously disrupted. Therefore, to maintain the order of the spectrum, it is necessary to monitor the abnormal spectrum behavior in the satellite-terrestrial integrated network.
Spectrum policies are designed to achieve full-spectrum use with acceptable interference by the geolocation spectrum database [9,10,11,12]. However, spectrum usage can be optimally realized only by strict implementation of spectrum policies. Considering malicious attacks, selfish motivations, equipment failures, and many other factors, the spectrum order may be attacked by spectrum misuse [13], such as illegal access, abnormal power transmission, etc. TPV is a typical abnormal spectrum behavior, which has many inducing factors, resulting in the terrestrial base station transmitting power deviating from the established transmitting power. From the perspective of selfish drive or equipment failures, the illegal behaviors of TPV can be divided into the following two categories.
One is aggressive power transmission; to achieve a higher data rate and improve their own benefits or the equipment is out of order, the selfish or faulty terrestrial base station may violate the limits of transmitted power and work at a higher transmitted power level. However, the satellite earth station and other terrestrial base stations may be subject to more interference, and consequently, the overall performance of the network shows a downward trend. The other is passive power transmission; this occurs when terrestrial stations operate with lower power than allocated. According to Shannon’s capacity formula [14], the result of this behavior is a decrease in the transmission rate. As a result, it takes longer to transmit the specified content, and the extended transmission time allows the ground station to obtain an exaggerated duty cycle. Therefore, it can apply to the geolocation spectrum database for more spectrum access opportunities [15]. At the same time, it prevents other terrestrial base stations from obtaining the spectrum access opportunities which they deserve. When it comes to the detection of the TPV, the existing studies mainly focus on the detection in the scenario of terrestrial spectrum sharing rather than terrestrial-satellite spectrum sharing, however, considering the appearance of satellite signal, which may bring extra difficulty to the detection. What is worse, in the scenario of terrestrial-satellite spectrum sharing, aiming at protecting the spectrum order, the existing work mainly focuses on the available transmitted power level rather than the detection of TPV. Motivated by the above observation, it is of great importance to detect the TPV in the scenario of terrestrial-satellite spectrum sharing to prevent this relatively covert behavior from jeopardizing the whole network.
In general, in the satellite-terrestrial integrated network, the terrestrial network can apply for spectrum resources from the satellite system with the help of the geolocation spectrum database to realize satellite-terrestrial spectrum sharing. However, when the transmission power of the terrestrial base station is abnormal, it may affect the normal work of other terrestrial base stations or satellite earth stations, or hinder the normal application of other ground base stations to access, and eventually reduce the spectrum efficiency of the whole network.

1.2. Related Work

Spectrum policies are under the premise that the geo-spectrum database authorizes the users who have a requirement to utilize the spectrum. What is more, no business can be conducted on these premises lest incurring heavy penalties. However, there always will be some users who may break these rules to improve their own benefits and further cause severe damages to the authorized user. Existing studies about the detection of the TPV mainly concentrate on the joint detection and estimation of spectrum misuse [16,17,18,19]. In ref. [16], generalized multi-hypothesis Neyman–Pearson (GMNP) criterion is utilized to detect the illegal access in the terrestrial networks where violating the spectrum access schedule is defined as opportunistic illegal access. In ref. [17], a hybrid binary hypothesis test is adopted to detect the abnormal power emission of the secondary user and further ensure the communication of other secondary users rather than the primary user. In ref. [18], aiming at determining the legitimacy of the working secondary users, a new cooperative spectrum sensing scheme is proposed to solve this problem in the presence of a primary user emulation attack (PUEA). In ref. [19], outage probability which can reflect the impact of secondary transmissions on the primary receiver is used to evaluate the performance of the spectrum sensing techniques. Note that in those studies, the spectrum sharing scenario mainly focuses on terrestrial networks rather than satellite-terrestrial integrated networks.
While in the scenario of satellite-terrestrial integrated networks, the authors propose the cognitive satellite-terrestrial radios for satellite-terrestrial integrated systems [20] for the first time. In ref. [8], aiming at protecting the communication of the satellite, the concept of the protected area is proposed by means of accumulating the interference of terrestrial base stations, and furthermore, the protection radius is deduced. According to the interference power level, the models of interference in the satellite-terrestrial integrated networks have been formulated in ref. [21]. The available transmitted power levels are figured out by analyzing the interference between geostationary (GEO) satellite systems and non-geostationary (NGEO) satellite systems, where the GEO satellite is regarded as the primary user and NGEO satellite is regarded as the secondary user, respectively [7]. Note that, however, some studies analyze the available transmitted power levels but few on detection of the TPV in the satellite-terrestrial integrated networks.
To the best of the authors’ knowledge, there are no existing studies considering the detection of TPV in the satellite-terrestrial integrated networks. In the scenario of satellite-terrestrial spectrum sharing, the existence of satellite signals, which interferes with the detection of TPV, bringing great difficulties to the distinction of abnormal signals from normal signals. However, to protect the communication of the whole network, it is of great importance to propose and study the behavior of TPV.

1.3. Contributions

In this paper, we investigate the geolocation spectrum database-based detection of TPV in a satellite-terrestrial integrated network, where every sensing node allocated in this network collects and processes the sensing data. In particular, the main contributions of this paper can be summarized as follows:
  • Formulate a generalized model for spectrum sharing in the satellite-terrestrial integrated networks, where the terrestrial base station can apply to the geolocation spectrum database for the available spectrum of the satellite.
  • Propose a detection framework based on geolocation spectrum database, which specifies the tasks and roles of the satellite-terrestrial integrated network, surveillance network, and geolocation spectrum database no matter when the terrestrial base station operates at the single power level or multiple power level.
  • Analyze the optimization problem under both single and multiple transmitted power level scenarios, and further the AaN detector is derived.
  • Provide comprehensive simulations under various parameter configurations, which represent that the superiority and effectiveness of the proposed detecting framework.
The remainder of this paper is organized as follows. The system model of TPV is formulated in Section 2. Section 3 derives the test statistics under both single and multiple transmitted power levels. Simulation is given in Section 4, followed by the conclusion in Section 5.

2. System Model

2.1. Database-Based Detection Framework

In this paper, terrestrial base stations are considered to apply for the downlink spectrum opportunities from satellite networks through the geolocation spectrum database, as shown in Figure 1.
Firstly, the terrestrial base station forwards the spectrum usage requirements to the geolocation spectrum database, and then the geolocation spectrum database allocates the corresponding spectrum resources and formulates the corresponding spectrum utilization rules. At the same time, the geolocation spectrum database shares the spectrum utilization information of the spectrum users which includes the allocated channel, the optional transmitted power levels, and the working state of satellite with surveillance network. Next, the spectrum surveillance network distributes the monitoring task to the sensing nodes by combining the monitoring target and the relative positions of the sensing nodes. Each sensing node monitors the allocated channel, determines whether the target user violates the spectrum using rules according to the observation of a certain time slot, and reports the judgment result to the fusion center. Finally, according to the reported data of the sensing nodes, the fusion center feedbacks the detection result of the TPV after the integration and the analysis of the data to the management center.

2.2. Hybrid Hypothesis Testing Model

For normal spectrum usage, when the satellite (PU-T) is working, the channel is occupied by the satellite signal ( N 0 ) or the terrestrial base station (SU-T) with the permitted L level transmitted power ( N l ), and the spectrum sharing state is expressed as follows:
N 0 : y k ( m ) = h 0 , k P 0 s k ( m ) + w k ( m ) , N l : y k ( m ) = h 0 , k P 0 s k ( m ) + h 1 , k P t ( l ) s k ( m ) + w k ( m ) , l = 1 , 2 , , L ,
where y k ( m ) is the sampling of the m - th signal received by the k - th sensing node, m = 1 , 2 , , M , M denotes the number of samples, h 0 , k is the gain from the satellite to the k - th sensing node, and h 1 , k is the channel gain from the terrestrial base station to the k - th sensing node, P t ( l ) represents the l - th transmitted power level of L power levels, w k ( m ) N 0 , σ w 2 denotes the Gaussian white noise, s k ( m ) is the sampling of transmitted signals (normalized to unit power), i.e., s k ( m ) N 0 , 1 .
P 0 , k denotes the signal received power of the primary user at the k - th sensing node, satisfying [22]
P 0 , k = P 0 h 0 , k ( θ 0 , k ) ( c 4 π f c d 0 , k ) 2 1 0 A g 10 1 0 A c 10 ,
where P 0 represents the transmitted power of the primary user (satellite), and h 0 , k ( θ 0 , k ) represents the antenna gain of the satellite at the direction of θ 0 , k , with d 0 , k as the distance between the transmitter of the primary user and the k - th sensing node, with propagation factor A g as gaseous absorption and A c as cloud or fog attenuation [23,24,25]. A g can be further given by A g = A o + A w = 0.182 f N ( f ) , where A o and A w are the specific attenuations due to water vapor and dry air, respectively, and the imaginary part of the frequency-dependent complex refractivity N ( f ) is referred to [26]. What’s more, the specific attenuation within a cloud or fog A c [27] can be represented as A c = K l C , with K l = 0.89 f / [ ε ( 1 + η ) ] as the specific attenuation coefficient η = 2 + ε / ε , ε and ε denote are the imaginary part and real part of the dielectric permittivity ε of water C represents liquid water density in the cloud or fog. As shown in Figure 2, θ 0 , k is the off-axis angle of the GEO satellite in the direction of the k - th sensing node and can be further calculated by θ 0 , k = arctan ( d 0 , k h ) . Moreover, the GEO satellite antenna gain h 0 , k ( θ 0 , k ) refers to the standard in ITU-R.S.672-4 [28] can be described as:
h 0 , k ( θ 0 , k ) = h s , max 3 ( θ 0 , k θ s , b ) 2 , θ s , b < θ 0 , k < b θ s , b , h s , max + L n , b θ s , b < θ 0 , k < c θ s , b , h s , max + L n + 20 25 log ( θ 0 , k θ s , b ) , c θ s , b < θ 0 , k < θ 1 , 0 , θ 1 < θ 0 , k < 90 , 3 , 90 < θ 0 , k < 180 ,
where h s , max is the maximum gain of the GEO satellite antenna, θ s , b is the one half the 3 dB beamwidth, L n is the desired side-lobe level relative to peak gain. θ 1 is the value of θ 0 , k , when Equation (4) is valid. For L n = 20 , the values of b and c are 2.58 and 6.32, respectively.
h 0 , k ( θ 0 , k ) = h s , max + L n + 20 25 log ( θ 0 , k θ s , b ) = 0 dB .
Quite different from the conventional terrestrial heterogeneous networks, h 0 , k ( θ 0 , k ) represents the characteristics of satellite communication, while the antenna of the transmitter in terrestrial heterogeneous networks is the omni-directional antenna, that is, the gain is always constant.
It is important to note that there is only one option for normal transmitted power, namely L = 1 , in most of the literature. However, users may work as multiple discrete transmit power levels, i.e., L 2 , in practice. Therefore, the diversity of the normal state of the spectrum will make the detection of TPV more difficult. What is worse, in the actual usage of the spectrum, there are a variety of uncertain factors, such as equipment failure, selfish drive, malicious attack, etc., which make the transmission power abnormal. As a result, there are abnormal use states in addition to normal use states of the above spectrum usage.
A : y k ( m ) = h 0 , k P 0 s k ( m ) + h 1 , k P a s k ( m ) + w k ( m ) , P a P t ( 0 ) , P t ( 1 ) , , P t ( L ) ,
where P a denotes the abnormal transmitted power, P t ( 0 ) = 0 represents only PU is working ( H 0 ). The deviation of P a and the permitted power level which can be measured denotes the degree of abnormality of the transmitted power.
It is necessary to distinguish the abnormal use state from the normal use state to realize the orderly spectrum use in the satellite and terrestrial integrated network. The detection problem can be modeled as the following mixed binary hypothesis test problem:
O 0 : y k ( m ) = h 0 , k P 0 s k ( m ) + h 1 , k P n s k ( m ) + w k ( m ) , P n P t ( 0 ) , P t ( 1 ) , , P t ( L ) , O 1 : y k ( m ) = h 0 , k P 0 s k ( m ) + h 1 , k P a s k ( m ) + w k ( m ) , P a P t ( 0 ) , P t ( 1 ) , , P t ( L ) ,
where null hypothesis O 0 contains all the normal spectrum states N 0 , N 1 , , N L . The alternative hypothesis O 1 is equal to A , where P a distributes over a certain range. However, P n contains a lot of cases. Both O 0 and O 1 are composite consequently. At present, most detection algorithms focus on the test problem under the simple null hypothesis, while few studies involve multiple discrete components. The uncertain normal state and unknown abnormal power increase the difficulty of detection, especially in the above problems. Therefore, the current method cannot be directly applied to the problem in Equation (6). Based on the above observations, it is necessary to design an effective detector for the mixed binary hypothesis testing problem. What needs to be pointed out, in particular, is that there are two possible errors, false alarm, and omission, in the process of detecting the TPV. Specifically, as for false alarm, misjudging the existence of violations may cause the target users to suffer undeserved punishment, and the omission of violations will encourage the offending users, which will seriously weaken the efficiency of spectrum usage. Therefore, it is necessary to reduce the occurrence probability of two kinds of errors, that is, to reduce the probability of missed detection and false alarm. However, there is a trade-off between missed detection probability and false alarm probability. Next, according to the compromise problem, the detection criteria under different performance requirements are analyzed, and the corresponding detection methods are derived.

3. Detection of TPV under Heterogeneous False Alarm Constraint

3.1. Detection Criteria under Heterogeneous False Alarm Constraint

Before expanding to the multi-power level scenario, this subsection considers the detection of abnormal transmission power behavior at the power level L = 1 . Therefore, the question can be reformulated as:
O 0 : y k ( m ) = h 0 , k P 0 s k ( m ) + h 1 , k P n s k ( m ) + w k ( m ) , P n 0 , P t ( 1 ) , O 1 : y k ( m ) = h 0 , k P 0 s k ( m ) + h 1 , k P a s k ( m ) + w k ( m ) , P a 0 , P t ( 1 ) .
Considering the difference in sensitivity of different normal states to abnormal behaviors in some scenarios, it is necessary to differentiate performance constraints. Therefore, the optimization objective adopted in this section can be expressed as:
max Pr O 1 | O 1 , s . t . Pr ( O 1 | O 0 , P n = 0 α 0 , Pr O 1 | O 0 , P n = P t ( l ) α 1 ,
where, α 0 and α 1 are false alarm constraint constants, Pr O i | O j represents the probability of being judged as α i when α j is true. To facilitate the subsequent expression, the above problems can be equivalent to the Ternary Hypothesis test problem as follows:
H 0 : σ 2 = σ 0 2 , H 1 : σ 2 = σ 1 2 , H 2 : σ 2 σ 0 2 , σ 1 2 σ 1 2 , + ,
where σ 0 2 = σ ω 2 + P 0 h 0 , k 2 , and σ 1 2 = σ ω 2 + P 0 h 0 , k 2 + h 1 , k 2 P t ( 1 ) . Therefore, the optimization objective in Equation (8) can be reformulated as:
max Pr H 2 | H 2 , s . t . Pr ( H 2 | H 0 , P n = 0 α 0 , Pr H 2 | H 1 , P n = P t ( l ) α 1 ,
where Pr H 2 | H j , j 0 , 1 , 2 represents the probability of being judged to be H 2 if the actual state is H 1 .

3.2. Hybrid Hypothesis Testing Model

3.2.1. Single-Node Detection under Heterogeneous False-Alarm Constraint

Noted that this is an optimal problem with multiple constraints, so the Lagrange multiplier method is adopted to establish the objective function as follows:
F = Pr H 2 | H 2 j ( 0 , 1 ) ρ j Pr H 2 | H j α j = C p y ; H 2 d y j ( 0 , 1 ) ρ j C p y ; H j d y a j = C p y ; H 2 j [ 0 , 1 ) ρ j p y ; H j d y + j ( 0 , 1 ) ρ j α j ,
where y = [ y k ( 1 ) , y k ( 2 ) , , y k ( M ) ] , and C is the judgment domain that determines the existence of violation behaviors, satisfying Pr H 2 | H i = Δ y C p y ; H i d y . Therefore, to maximize Pr H 2 | H 2 , as for any y C , p y ; H 2 ρ 0 p y ; H 0 ρ 1 p y ; H 1 > 0 , i.e.,
f ( y ) = i { 0 , 1 } ρ i p y ; H i p y ; H 2 = i { 0 , 1 } ρ i σ 2 2 σ i 2 N 2 exp n = 0 N 1 y n 2 2 σ 2 2 n = 0 N 1 y n 2 2 σ i 2 < 1 ,
where σ 2 2 is the variance of observed data in the case of TPV ( H 2 ). The test statistic is T = n = 0 N 1 y n 2 . Therefore, the sensing node adopts the energy detection method. Next, R is used to represent the judgment domain about T where the violation behavior exists, which is equivalent to the judgment domain about y .
However, due to various factors, there is no prior information on abnormal behavior, and the key parameters, σ 2 2 , are unknown consequently. Therefore, for the detection problem of a lack of prior information, the generalized likelihood ratio test is a solution.
First of all, the maximum likelihood estimation of the unknown parameter σ 2 2 is obtained through σ 2 2 = arg max σ 2 2 p y ; σ 2 2 = n = 0 N 1 y n 2 / N , which can be substituted into Equation (12) to obtain:
g G L R T ( T ) = i { 0 , 1 } λ i T N 2 exp T 2 σ i 2 < 1 ,
where λ i = ρ i e N σ i 2 N 2 , due to the presence of abnormal power, σ 2 2 > σ 0 2 . Therefore, in R , T > N σ 0 2 . Hence, the judgment domain can be expressed as:
R = T | i { 0 , 1 } λ i T N 2 exp T 2 σ i 2 < 1 , T > N σ 0 2 ,
where λ i is determined by the false alarm constraint in the target function. As a result, the result of the judgment on the abnormal behavior can be expressed as d = 1 T R 0 T R , where d = 1 indicates the existence of abnormal transmission power.
When H i is true, the test statistics obey the Chi-Square distribution: T = n = 0 N 1 y n 2 χ N 2 σ i 2 . Therefore, the detection probability can be derived from the following equation:
Pr H 2 | H i = y A 1 2 π σ i 2 N 2 exp n = 0 N 1 y n 2 2 σ i 2 d y = T R 1 2 N 2 Γ N 2 T σ i 2 N 2 1 exp T 2 σ i 2 d T .
By introducing equation g i ( T ) = λ i T N 2 exp T 2 σ i 2 , i ( 0 , 1 ) , the derivative with respect to T can be: when T > N σ i 2 , g i ( T ) > 0 , otherwise g i ( T ) 0 . Therefore, there a η 2 that makes g 0 η 2 + g 1 η 2 = 1 , i.e., T | T > η 2 R . Meanwhile, in the region ( N σ 0 2 , N σ 1 2 ) , g 0 ( T ) > 0 , g 1 ( T ) < 0 . This region may partly belong to the decision domain, but it’s closely related to the SNR under normal conditions, i.e., σ 1 2 σ 0 2 σ ω 2 . Specifically, this part of the decision domain can be divided into two situations:
  • When the SNR is small, R = η 2 , . At this time, the introduced function i [ 0 , 1 ] g i ( T ) = 1 , T > N σ 0 2 only holds one solution. Therefore, Pr H 2 | H i = Pr T > η 2 | H i = Γ N 2 , η 2 σ i 2 Γ N 2 α i . To satisfy two false alarm constraints, η 2 = max ( Γ 1 N 2 , ( α ) Γ ( N 2 ) σ 0 2 , Γ 1 N 2 , β Γ ( N 2 ) σ 0 2 ) .
  • When the SNR is large, R = η 0 , η 1 η 2 , , N σ 0 2 < η 0 < η 1 < N σ 1 2 < η 2 , where η 0 , η 1 , η 2 are the three solutions of the introduced function i [ 0 , 1 ] g i ( T ) = 1 , T > N σ 0 2 . At this point, the two false alarm probabilities Pr ( H 2 | H 0 and Pr H 2 | H 1 reach the upper limit, respectively, which satisfies Pr ( H 2 | H 0 = α 0 , Pr H 2 | H 1 = α 1 .

3.2.2. Multi-Node Detection under Heterogeneous False-Alarm Constraint

To further improve detection performance, this subsection considers the collaborative detection of multiple nodes. Specifically, after N nodes make their decisions, the decision results will be reported to the fusion center, which will conduct data fusion and further give a global decision. At this time, aiming at weakening the influence of the PU-T on the sensing data, the node selection mechanism based on SINR is chosen because SINR can well reflect the influence of PU-T on the sensing data. Specifically, the SINR at the k - th sensing node can be represented as:
S I N R = p 1 d 1 d 1 , k α p 0 d 0 d 0 , k α + W k ,
where α is the path fading factor, d 1 is the reference distance, p 1 is the estimated power at the reference distance, d 1 , k is the distance from the secondary user to the k - th node and W k is the noise power at the k - th node. Therefore, the set of the sensing nodes which participate in the global decision can be obtained by:
K = k | 1 P 0 , k + W k d 0 d 1 , k α > χ ,
where the threshold χ is a changeable constant and the value of χ can be adjusted slightly according to the detection performance. Further, the ‘L out of K’ is adopted as a decision rule, i.e., k = 1 K d k > < D = 0 D = 1 L , with d k { 0 , 1 } represents the decision result of the k - th sensing node, and L is the global decision threshold.
Consistent with single-node detection, multi-node detection adopts the similar detection criteria, namely maximizing detection probability under the constraint of global false alarm probability:
max L Pr D = H 2 | H 2 s . t . Pr D = H 2 | H 0 β 0 , Pr D = H 2 | H 1 β 1 ,
where β 0 and β 1 are global false alarm probability constraints, 0 < β 0 α 0 , 0 < β 1 α 1 . When the distance between nodes is much less than the distance between nodes and users, the detection performance of each node is close. Therefore, assuming that the performance of each node is the same, the false alarm constraint can be expressed as:
Pr D = H 2 | H i = l = L K C K l Pr H 2 | H i l 1 Pr H 2 | H i K l β i .
From the above equation, when the global decision threshold increases, the two false alarm probabilities increase, and the global detection probability also increases. Therefore, to maximize the detection probability, the optimal global decision threshold should be set to the minimum value satisfying two constraints. Therefore, Equation (19) can be solved respectively, which can be further simplified as L L 0 , L L 1 , where L 0 and L 1 is the minimum solution of the equation when i = 0 , 1 , respectively. Finally, the larger one will be chosen as the global decision threshold.

3.3. Detection of TPV at Multiple Power Levels

Different from the heterogeneous false alarm constraint in Equation (8) in the previous subsection, the Neyman–Pearson criterion is used in this section, that is, maximizing detection probability under the constraint of false alarm probability. Specifically, the criterion can be expressed as follows:
max Pr O 1 | O 1 s . t . Pr O 1 | O 0 α ,
where Pr O 1 | O 0 = l = 0 L Pr O 1 | H l Pr H l | O 0 , α represents the false-alarm constraint.

3.3.1. Generalized Maximum Likelihood Detection

For the above problems, the likelihood ratio detection is derived as follows:
p y | O 1 p y | O 0 = P a P t ( 0 ) , P t ( 1 ) , , P t ( L ) p y | P a p P a | O 1 d P a l = 0 L p y | P t ( l ) Pr P t ( l ) | O 0 > < O 0 O 1 λ B ,
where p P a | O 1 is the probability density function of abnormal power, Pr P t ( l ) | O 0 denotes the conditional distribution of normal channel state, and the value of decision threshold λ B is determined by the false alarm constraint in Equation (20). The temporary symbol P r is introduced to represent any transmitted power, and the conditional probability of the sample under the transmitted power is expressed as follows:
p y | P r = 1 2 π h 1 , k 2 P r + σ 0 2 M 2 exp m = 1 M y 2 ( m ) 2 h 1 , k 2 P r + σ 0 2 .
Replace P r with P a and P t ( l ) , and substitute them into Equation (21) respectively, the test statistics can be obtained as T = m = 1 M y 2 ( m ) . This means that the energy detector is optimal for detecting emission power anomalies when the information is fully known. However, the probability density function of abnormal power p P a | O 1 is often unknown, so the detector mentioned above cannot be realized. Hence, a more practical detection method needs to be designed.
To solve the problem of detecting abnormal transmission power under unknown distribution, the generalized likelihood ratio (GLR) detector is derived by maximum likelihood estimation of unknown parameters in this section. Firstly, we can take the derivative of p y | P a with respect to P a , and the maximum likelihood estimation of P a can be obtained:
P ^ a = arg max P a p y | P a = T / M σ 0 2 h 1 , k 2 .
And then we can get
p y | P ^ a , O 1 p y | O 0 = 1 2 π h 1 , k 2 P ^ a + σ n 2 M 2 exp m = 1 M y 2 ( m ) 2 h 1 , k 2 P ^ a + σ n 2 l = 0 L Pr P t ( l ) | O 0 2 π h 1 , k 2 P t ( l ) + σ 0 2 M 2 exp m = 1 M y 2 ( m ) 2 h 1 , k 2 P t ( l ) + σ 0 2 = 1 l = 0 L T / M h 1 , k 2 P t ( l ) + σ 0 2 exp 1 T / M h 1 , k 2 P t ( l ) + σ 0 2 M 2 Pr P t ( l ) | O 0 .
By introducing C T , P t ( l ) = T / M h 1 , k 2 P t ( l ) + σ 0 2 , the GLR detector can be expressed as
l = 0 L C T , P t ( l ) e 1 C T , P t ( l ) M 2 Pr P t ( l ) | O 0 > < O 1 O 0 λ G .
It should be noted that the detector can achieve the optimization objective in Equation (20) approximately optimally, however, it is difficult to carry out theoretical analysis due to the existence of the sum of several higher-order components.

3.3.2. The AaN Detector

To simplify the GLR detector, a detector that is easy to analyze theoretically is designed. This subsubsection proposes a two-step detector, the AaN detector, whose core idea is to first select the most likely normal state, and then determine whether there is abnormal behavior.
Specifically, in the first step, the maximum a posterior (MAP) criterion is adopted to select the most likely one from multiple normal power levels, which can be expressed as:
P t l 0 = arg max P t ( l ) p P t ( l ) | y , O 0 = arg max P t ( l ) p y | P t ( l ) Pr P t ( l ) | O 0 .
In the second step, the likelihood ratio between the normal state and the abnormal state is derived. The power in the abnormal state is estimated by Equation (23), and the power in the normal state is the power level selected by Equation (26). Specifically, the likelihood ratio is expressed as follows:
p y | P ^ a , O 1 p y | P t l 0 Pr P t l 0 | O 0 = p y | P ^ a , O 1 max l { 0 , 1 , L } p y | P t ( l ) Pr P t ( l ) | O 0 = 1 max l { 0 , 1 , L } T / M h 1 , k 2 P t ( l ) + σ 0 2 e 1 T l / M h 1 , k 2 R t ( l ) + σ 0 2 M 2 Pr P t ( l ) | O 0 .
We also have:
max l { 0 , 1 , L } C T , P t ( l ) e 1 C T , P t ( l ) M 2 Pr P t ( l ) | O 0 = max l { 0 , 1 , L } C T , P t ( l ) e 1 C T , P t ( l ) · Pr P t ( l ) | O 0 2 M M 2 > < O 1 O 0 λ m .
As C T , P t ( l ) > 0 , the AaN detector is finally expressed as:
max l { 0 , 1 , L } C T , P t ( l ) e 1 C T , P t ( l ) p 0 ( l ) > < O 1 O 0 λ m ,
where p 0 ( l ) = Pr P t ( l ) | O 0 2 M , λ M = λ m 2 M . In particular, in the AaN detector, this subsubsection simplifies the expression of detector through two-step decomposition, thus making detection performance analysis possible. Furthermore, based on this, the threshold can be set more reasonably.

3.3.3. Threshold Setting

By introducing f l ( T ) = C T , P t ( l ) exp 1 C T , P t ( l ) p 0 ( l ) , the detector in Equation (29) can be re-expressed as F ( T ) = max l { 0 , 1 , L } f l ( T ) > < O 1 O 0 λ M . Further, as shown in Figure 3, due to the existence of multiple normal power levels, the decision domain is divided into N + 1 small intervals as follows:
R = R 0 R 1 R N ,
where R n = T | F ( T ) λ M , F η 0 ( n ) = F η 1 ( n ) = λ M , n = 0 , 1 , 2 , , N , η 0 ( n ) T η 1 ( n ) , η 1 ( n ) < η 0 ( n + 1 ) and R i R j = , n , i , j { 0 , 1 , , N } , i j . Further, there are three special statements about the decision domain as follows:
  • η 0 ( n ) > M σ 0 2 , when the terrestrial user is working, its actual transmitted power P r > 0 . The variance of the observed quantity y k ( m ) must be greater than σ 0 2 , so the estimated variance of the observed data should be greater than M σ 0 2 ;
  • η 1 ( N ) = , because when T > M h 1 , k 2 P t ( l ) + σ 0 2 , f l ( T ) is monotonically decreasing. Therefore, there is T u > M h 1 , k 2 P t ( l ) + σ 0 2 such that for all T > T u , it satisfies F ( T ) < λ M , i.e., O 1 is true.
  • N is determined by the false alarm constraint.
As T | P t ( l ) χ M 2 σ l 2 , where σ l 2 = σ 0 2 + h 1 , k 2 P t ( l ) . Therefore, the detection probability can be obtained from the following equation:
Pr O 1 | O 1 = n = 0 N R n p T | O 1 d T = n = 0 N Γ M 2 , η 0 ( n ) σ a 2 Γ M 2 Γ M 2 , η 1 ( n ) σ a 2 Γ M 2 ,
where σ a 2 = σ 0 2 + h 1 , k 2 P a ( l ) . The false alarm probability can be obtained by Equation (32):
Pr O 1 | O 0 = n = 0 N R n l = 1 L p T | P t ( l ) , O 0 Pr P t ( l ) | O 0 d T = n = 0 N l = 1 L Γ M 2 , η 0 ( n ) σ l 2 Γ M 2 Γ M 2 , η 1 ( n ) σ l 2 Γ M 2 Pr P t ( l ) | O 0 .
Next, to understand the inner mechanism of the detector more clearly and deeply, an approximate estimation of the AaN detector is made based on the following points:
  • T = M h 1 , k 2 P t ( l ) + σ 0 2 is the peak point of f l ( T ) , where f l ( T ) = 0 , f l ( T ) = P 0 ( l ) ;
  • When the number of samples M is large enough, p 0 ( l ) = Pr P t ( l ) | O 0 2 M approaches 1;
  • The distance between each power level is always reasonably set so that each power level can be distinguished. Finally, between the two adjacent peak points, namely, in the interval D l = M h 1 , k 2 P t ( l ) + σ n 2 , M h 1 , k 2 P t ( l + 1 ) + σ n 2 , the detector can be approximated as
    max k { 0 , 1 , L } C T , P t ( k ) exp 1 C T , P t ( k ) p 0 ( k ) > < O 1 O 0 λ m .
The decision field is given by Theorem 1:
Theorem 1.The intersection of decision field and interval D l cannot be an empty set, which is expressed as: R * = η 0 * , η 1 * , if and only if
F 0 ( l ) = C T 0 ( l ) , P t ( l ) exp 1 C T 0 ( l ) , P t ( l ) p 0 ( l ) < λ M ,
where T 0 ( l ) = M σ l 2 σ l + 1 2 ln σ l + 1 2 ln σ l 2 σ l + 1 2 σ l 2 ln p 0 ( l ) p 0 ( l + 1 ) , σ l 2 = h 1 , k 2 P t ( l ) + σ n 2 , hence, the two thresholds can be expressed as:
η 0 * = h 1 , k 2 P t ( l ) + σ 0 2 M · x 1 , η 1 * = h 1 , k 2 P t ( l + 1 ) + σ 0 2 M · x 0 ,
where, x 0 is the smaller solution to x e 1 x p 0 ( l + 1 ) = λ M , and x 1 is the larger solution to x e 1 x p 0 ( l ) = λ M .

4. Simulation Results

As for the simulations, the model of the GEO satellite refers to refer to Astra system and O3b (Other 3 billion) system. Specifically, the Equivalent isotropically radiated power (EIRP) of the satellite is set to be 62.7 dBW. The transmitted power of the satellite is set to be 37.15 W. The center frequency is 18.48 GHz. The path fading factor α = 3 in this subsection, which is usually between 2 and 4. The received noise power spectral density is –174 dBm/Hz, as shown in Table 1.

4.1. Performance of TPV Detection with Power Level L = 1

In this subsection, the detection probabilities of secondary users at different distances and power deviations are given. As shown in Figure 4, the detection performance is gradually improved as the distance between the SU and the PU-R becomes larger and larger. This is because of the greater the distance, the less the sensing data affected by the PU-T. At the same time, the detection performance is improved when the power deviation is gradually larger. This is because the larger the deviation, the larger the difference between the observed variance in the normal state of the model and the observed variance in the abnormal state, therefore, the detection performance will be improved. Noted that when the power deviation is large or small enough, the detection performance of different distances is very similar, and the fundamental reason is the variance difference between the observed data.
To reduce the influence of the primary user on the sensing data, the node selection scheme based on the selection mechanism of the SINR is proposed. As shown in Figure 5, the global detection performance is improved compared with Figure 4, indicating the effectiveness of the proposed scheme. What’s more, it also shows that the power deviation, namely the variance difference, is the most important factor which affects the detection performance. However, according to the simulation results, we find that the probability increases by 4.5% when R = 1500 m, 4.8% when R = 1000 m and 7.4% when R = 500 m, comparing to the Figure 4. Noted that the increased detection probability decreases when the distance between PU-T and SU-T increases, this is because the smaller the distance, the greater the impact on the sensing data, which also indicates the superiority of the node selection scheme.
Figure 6 depicts the changing relationship between global detection probability and the global decision threshold under different false alarm constraints. Similar to the conclusion obtained by Figure 4 and Figure 5, the detection probability is positively correlated with the power difference. With the weakening of false alarm constraint, the global decision threshold increases as well as the global detection probability, which well reflects the compromise between false alarm probability and detection probability. However, due to the limited number of sensing nodes, the discrete value of the global detection threshold has no obvious change in some intervals.

4.2. Performance of TPV Detection with Multiple Power Levels.

Figure 7 shows the detection probability under different abnormal power levels P a , in which, the level of transmitting power level is 4, and the false alarm constraint is 0.2. As shown in Figure 7, when the benchmark transmitting power increases, the performance of the detector is improved because it is easy to distinguish the normal power under different states. At the same time, it can be noted that when P a falls between two adjacent normal power levels, the greater the deviation of P a from the nearest normal power level, the more likely it is to be distinguished from the normal state. Therefore, the detection performance is improved. However, the exception occurs when P a P s 5 , 7 , the GLR detector shows an opposite trend. This is because according to theorem 1, the intersection of decision domain and interval D l is empty or very small. In addition, when the deviation of abnormal transmission power is certain, the detection performance deteriorates as the normal power level L increases from 1 to 3. When the transmitting power increases, the variance of the sensing data increases, making the minimum value F 0 ( l ) in Equation (34) increase. Therefore, as shown in Theorem 1, the intersection between this region and the decision domain shrinks and the performance deteriorates. Moreover, by comparing the performance of the two detectors at different emission power levels, it can be found that the GLR detector shows a better performance than the AaN detector in most cases except for P a P s 5 , 7 . This is because the AaN detector only considers the most likely probability level to do the likelihood ratio, which makes the test function F ( T ) sharper and further makes the overall performance worse and improves on some intervals. So we can come to the conclusion that the GLR detector can be replaced to some extent by the proposed detector, which can not only achieve better detection performance but also save operation cost.
Figure 8 shows the receiver operating characteristic (ROC) curve of the two detectors. It can be noted that with the enhancement of false alarm constraint, the detection probability also increases. Moreover, in most cases, the GLR detector shows a better detection performance than the AaN detector. However, as mentioned in Figure 6, when P a P s 5 , 7 , the two detectors perform in the opposite way. This is also because the intersection of the decision field and interval D l is small or even empty.

5. Conclusions

In this paper, we investigate the detection problem of TPV in satellite-terrestrial integrated networks via the geolocation spectrum database based detection framework, in which spectrum usage application, allocation information, spectrum monitoring requirements, and monitoring results are exchanged. Considering the uncertainty of the normal working state, the binary hybrid hypothesis testing model is established to identify abnormal transmitting power behavior. Based on this model, the single-node detection and multi-node cooperative detection methods under heterogeneous false alarm constraints are firstly derived. Then, the detection problem of TPV under multi-power levels is considered. To simplify the theoretical analysis in the scenario of TPV under multi-power levels, the AaN detector was developed. Finally, the simulation results demonstrate that the proposed detection method can not only improve the performance by nearly 5.6% in the scenario of single transmitted power level, but when it comes to multiple ones, it can approximately realize the detection of TPV in most cases at the expense of less than 10% detection probability.

Author Contributions

Conceptualization, N.Y. and G.D.; data curation, N.Y., P.L., and D.G.; formal analysis, N.Y.; investigation, N.Y.; methodology, N.Y.; validation, N.Y. and L.Z.; writing—original draft, N.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Natural Science Foundation for Distinguished Young Scholars of Jiangsu Province (No. BK20190030); The National Natural Science Foundation of China (No. 61871398 and No. 61931011); The National Key R&D Program of China under Grant 2018YFB1801103; The Equipment Advanced Research Field Foundation (No. 61403120304) and The Jiangsu Provincial Natural Science Foundation of China (No. BK20191328).

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.

Abbreviations

The following abbreviations are used in this manuscript:
TPVtransmitted power violation
GMNPgeneralized multi-hypothesis Neyman–Pearson
PUEAprimary user emulation attack
PU-Tprimary user’s transmitter
SU-Tsecondary user’s transmitter
GLRgeneralized likelihood ratio
AaNAbnormal after Normal

References

  1. Haykin, S. Cognitive radio: Brain-empowered wireless communications. IEEE J. Sel. Areas Commun. 2005, 23, 201–220. [Google Scholar] [CrossRef]
  2. Mitola, J.; Maguire, J.G.Q. Cognitive radio: Making software radios more personal. IEEE Pers. Commun. 1999, 6, 13–18. [Google Scholar] [CrossRef] [Green Version]
  3. Niyato, D.; Hossain, E.; Han, Z. Dynamic spectrum access in IEEE 802.22- based cognitive wireless networks: A game theoretic model for competitive spectrum bidding and pricing. IEEE Wireless Commun. 2009, 16, 16–23. [Google Scholar] [CrossRef]
  4. Li, H.; Guo, Q.; Li, Q. Satellite-based multi-resolution compressive spectrum detection in cognitive radio networks. In Proceedings of the 2nd International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC), Harbin, China, 8–10 December 2012; pp. 1081–1085. [Google Scholar]
  5. Li, Z.; Wang, D.; Qi, P.; Hao, B. Maximum eigenvalue based sensing and power recognition for multi-antenna cognitive radio system. IEEE Trans. Veh. Technol. 2016, 65, 8218–8229. [Google Scholar] [CrossRef]
  6. Ju, M.; Kang, K.-M. Cognitive radio networks with secondary network selection. IEEE Trans. Veh. Technol. 2015, 65, 966–972. [Google Scholar] [CrossRef]
  7. Chi, Z.; Jiang, C.; Jin, J.; Wu, S.; Kuang, L.; Guo, S. Spectrum sensing and recognition in satellite systems. IEEE Trans. Veh. Technol. 2019, 68, 2502–2516. [Google Scholar]
  8. Zhang, C.; Jiang, C.; Kuang, L.; Jin, J.; He, Y.; Han, Z. Spatial spectrum sharing for satellite and terrestrial communication networks. IEEE Trans. Aerosp. Electron. Syst. 2019, 55, 1075–1089. [Google Scholar] [CrossRef]
  9. Murty, R.; Chandra, R.; Moscibroda, T. Senseless: A databased-driven white spaces network. IEEE Trans. Mob. Comput. 2012, 11, 189–203. [Google Scholar] [CrossRef]
  10. Ding, G.; Wang, J.; Wu, Q. Cellular-based-station assisted device-to-device communications in TV white space. IEEE J. Sel. Areas Commun. 2016, 34, 107–121. [Google Scholar] [CrossRef] [Green Version]
  11. Höyhtyä, M.; Mämmelä, A.; Chen, X.; Hulkkonen, A.; Dunat, J.-C.; Gardey, J. Database-assisted spectrum sharing in satellite communications: A survey. IEEE Access 2017, 5, 25322–25341. [Google Scholar] [CrossRef]
  12. Yang, N.; Li, P.; Guo, D.; Zhang, L.; Ding, G. Detection of Interference Constraint Violation Based on Heterogeneous Data Fusion in Satellite-Earth Integrated Networks. IEEE Access 2020, 8, 37645–37656. [Google Scholar] [CrossRef]
  13. Liu, Y.; Zhang, B.; Guo, D.; Zhang, L.; Zhao, B.; Ding, G. Detection of Spectrum Misuse Behavior in Satellite-Terrestrial Spectrum Sensing Based on Multi-Hypothesis Tests. IEEE Access 2020, 8, 50399–50413. [Google Scholar] [CrossRef]
  14. Costello, D.J.; Forney, G.D. Channel coding: The road to channel capacity. Proc. IEEE 2007, 95, 1150–1177. [Google Scholar] [CrossRef] [Green Version]
  15. Ding, G.; Wang, J.; Wu, Q.; Song, F.; Chen, Y. Spectrum sensing in opportunity-heterogeneous cognitive sensor networks: How to cooperate? IEEE Sens. J. 2013, 13, 4247–4255. [Google Scholar] [CrossRef]
  16. Zhang, L.; Ding, G.; Wu, Q.; Han, Z. Spectrum sensing under spectrum misuse behaviors: A multi-hypothesis test perspective. IEEE Trans. Inf. Forensics Secur. 2018, 13, 993–1007. [Google Scholar] [CrossRef] [Green Version]
  17. Zhang, L.; Ding, G.; Wu, Q. Detecting Abnormal Power Emission for Orderly Spectrum Usage. IEEE Trans. Veh. Technol. 2019, 68, 1989–1992. [Google Scholar] [CrossRef]
  18. Chen, C.; Cheng, H.; Yao, Y.-D. Cooperative spectrum sensing in cognitive radio networks in the presence of the primary user emulation attacks. IEEE Trans. Wirel. Commun. 2011, 10, 2135–2141. [Google Scholar] [CrossRef] [Green Version]
  19. Menon, R.; Buehrer, R.; Reed, J. Outage probability based comparison of underlay and overlay spectrum sharing techniques. In Proceeding of the First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN), Baltimore, MD, USA, 8–11 November 2005; pp. 101–109. [Google Scholar]
  20. Sithamparanathan, K.; De Nardis, L.; Di Benedetto, M.G.; Guidotti, A.; Corazza, G.E. Cognitive satellite terrestrial radios. In Proceedings of the IEEE Global Telecommunications Conference GLOBECOM, Miami, FL, USA, 6–10 December 2010. [Google Scholar]
  21. Sharma, S.K.; Symeon, C.; Bjorn, O. Satellite cognitive communications: Interference modeling and techniques selection. In Proceedings of the 6th Advanced Satellite Multimedia Systems Conference (ASMS) and 12th Signal Processing for Space Communications Workshop (SPSC), Baiona, Spain, 5–7 September 2012. [Google Scholar]
  22. ITU-R. P.526-8, Propagation by diffraction. 2003. Available online: https://www.itu.int/rec/R-REC-P.526-8-200304-S/en (accessed on 9 August 2020).
  23. Dissanayake, A.; Allnutt, J.; Haidara, F. A prediction model that combines rain attenuation and other propagation impairments along earthsatellite paths. IEEE Trans. Antennas Propag. 1997, 45, 1546–1558. [Google Scholar] [CrossRef]
  24. Dissanayake, A. Ka-band propagation modeling for fixed satellite applications. Online J. Space Commun. 2002, 2, 1–5. [Google Scholar]
  25. ITU-R. P.618, Propagation Data and Prediction Methods Required for the Design of Earth-Space Telecommunication Systems. 2007. Available online: https://www.itu.int/rec/R-REC-P.618-9-200708-S/en (accessed on 9 August 2020).
  26. ITU-R. P.676-4, Attenuation by Atmospheric Gases. 1999. Available online: https://www.itu.int/rec/R-REC-P.676-4-199910-S/en (accessed on 9 August 2020).
  27. ITU-R. P.840-3, Attenuation Due to Clouds and Fog. 1999. Available online: https://www.itu.int/rec/R-REC-P.840-3-199910-S/en (accessed on 9 August 2020).
  28. ITU-R. S.672-4, Satellite Antenna Radiation Pattern for Use as a Design Objective in the Fixed-Satellite Service Employing Geostationary Satellites. 1997. Available online: https://www.itu.int/rec/R-REC-S.672-4-199709-I/en (accessed on 9 August 2020).
Figure 1. The generalized detection model for the transmitted power violation (TPV) in the downlink scenario of satellite-terrestrial spectrum sharing, which consisted of satellite-terrestrial integrated network, geolocation spectrum database, and surveillance network.
Figure 1. The generalized detection model for the transmitted power violation (TPV) in the downlink scenario of satellite-terrestrial spectrum sharing, which consisted of satellite-terrestrial integrated network, geolocation spectrum database, and surveillance network.
Sensors 20 04462 g001
Figure 2. The off-axis angle of the geostationary (GEO) satellite in the direction of the k - th sensing node, θ 0 , k .
Figure 2. The off-axis angle of the geostationary (GEO) satellite in the direction of the k - th sensing node, θ 0 , k .
Sensors 20 04462 g002
Figure 3. The decision field of AaN detector ( P a = 1 W ), which is divided into N + 1 small intervals due to the existence of multiple normal power levels.
Figure 3. The decision field of AaN detector ( P a = 1 W ), which is divided into N + 1 small intervals due to the existence of multiple normal power levels.
Sensors 20 04462 g003
Figure 4. Performance of TPV detection with a single node, which demonstrates that power deviations is the greatest factor.
Figure 4. Performance of TPV detection with a single node, which demonstrates that power deviations is the greatest factor.
Sensors 20 04462 g004
Figure 5. Performance of TPV detection with multiple nodes, which demonstrates that the “L out of K" can improve the performance by 5.6%.
Figure 5. Performance of TPV detection with multiple nodes, which demonstrates that the “L out of K" can improve the performance by 5.6%.
Sensors 20 04462 g005
Figure 6. Global detection performance under different false-alarm constraints, which can reflect the compromise between false alarm probability and detection probability.
Figure 6. Global detection performance under different false-alarm constraints, which can reflect the compromise between false alarm probability and detection probability.
Sensors 20 04462 g006
Figure 7. Detection probability under multiple power levels. The AaN detector can well replace the GLR detector in most intervals at the expense of less than 10% detection probability.
Figure 7. Detection probability under multiple power levels. The AaN detector can well replace the GLR detector in most intervals at the expense of less than 10% detection probability.
Sensors 20 04462 g007
Figure 8. Detection performance under different false-alarm constraints, which can reflect the compromise between false alarm probability and detection probability.
Figure 8. Detection performance under different false-alarm constraints, which can reflect the compromise between false alarm probability and detection probability.
Sensors 20 04462 g008
Table 1. Simulation Parameters.
Table 1. Simulation Parameters.
The NotationPhysical MeaningValue
f c Frequency band 18.48 GHz
hSatellite height35,786 Km
E I R P Satellite EIRP 62.7 dBW
L n Desired side-lobe level relative to peak gain 20 dB
h s , max Max satellite antenna gain 47 dBi
α The path fading factor3

Share and Cite

MDPI and ACS Style

Yang, N.; Li, P.; Guo, D.; Zhang, L.; Ding, G. Detection of Transmitted Power Violation Based on Geolocation Spectrum Database in Satellite-Terrestrial Integrated Networks. Sensors 2020, 20, 4462. https://doi.org/10.3390/s20164462

AMA Style

Yang N, Li P, Guo D, Zhang L, Ding G. Detection of Transmitted Power Violation Based on Geolocation Spectrum Database in Satellite-Terrestrial Integrated Networks. Sensors. 2020; 20(16):4462. https://doi.org/10.3390/s20164462

Chicago/Turabian Style

Yang, Ning, Pinghui Li, Daoxing Guo, Linyuan Zhang, and Guoru Ding. 2020. "Detection of Transmitted Power Violation Based on Geolocation Spectrum Database in Satellite-Terrestrial Integrated Networks" Sensors 20, no. 16: 4462. https://doi.org/10.3390/s20164462

APA Style

Yang, N., Li, P., Guo, D., Zhang, L., & Ding, G. (2020). Detection of Transmitted Power Violation Based on Geolocation Spectrum Database in Satellite-Terrestrial Integrated Networks. Sensors, 20(16), 4462. https://doi.org/10.3390/s20164462

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop