1. Introduction
Recently, drones have developed from the existing radio frequency (RF) signal control method to the combination of communication networks, such as LTE and 5G, thereby increasing the controllable distance and reducing the response time. Furthermore, the development of battery technology has increased flight time and, as satellite positioning technology has been developed, the accuracy of the positioning has been improved. Because of the development of drone technologies, the field of drones is increasingly diversified, and the drone market continues to grow [
1,
2,
3]. However, the diversity of using drones can carry out the abuse of drone technologies, such as crime or terrorism. As the demand for drones increases, the use of an unauthorized drone is also increasing. Unauthorized drones can cause accidents that collide with flying objects, damage property, or injure people for malicious purposes. Somebody can also use unauthorized drones in order to transport illegal objects and invade privacy, such as unlawful filming. Recently, with Saudi Arabia’s oil facilities under the threat of terrorism by drones, the need for investment and research into anti-drone technologies has emerged worldwide [
4,
5,
6,
7,
8,
9,
10,
11,
12]. Anti-drone stands for a system that detects, identifies, tracks, and incapacitates illegal drones. The anti-drone market is expected to grow from USD 499 million in 2018 to USD 2.27 billion in 2024 [
3]. The technique for the detection and tracking of unauthorized drones is the core technology in the anti-drone system [
13,
14].
The most widely used methods in drone detection are the techniques while using radar, radio frequency (RF) signals, and images [
13]. A typical drone detection method is a radar that detects the location of illegal drones by reflected radio waves [
4]. However, radar is expensive to install and maintain, and it is hard to detect small-size drones. As a radar replacement technology to solve this problem, various methods were considered, such as using the physical characteristics of a RF signal that is used for drone control distinguished from a mobile device [
5], and monitoring drones by camera images [
6,
7,
8], and detecting an acoustic signal that is generated by a drone [
9]. However, the method using the physical characteristics of the RF signal can be hard to detect illegal drones if drones use RF signals that resemble the RF characteristics of other mobile devices. In addition, the method of using the camera can be expensive, due to the high processing requirements for processing a large amount of image data, and the detection speed is relatively low. The acoustic array method can be hard to detect the drone’s acoustic signal, due to the self-interference. Furthermore, the method that is presented above has difficulty in distinguishing illegal drones hidden in authorized drone groups. The drone authentication system for identifying unauthorized drones has been actively investigated with the drone traffic management system [
11,
12]. Therefore, in this paper, we assume that drones transmit authentication information through RF signals aad consider RF-based detection that tracks the RF signal of the unauthenticated drone among the drone’s detected RF signals. RF signal-based anti-drone system while using the RF control signal that was exchanged between the drone, and its remote controller has already been studied [
10]. However, we propose an aerial solution while using a tracking drone, not the stationary solution above. Aerial solutions approach targets, so you can expect higher accuracy and reduce the threat to legitimate communication systems [
8].
In the anti-drone system, the core technology is the position tracking technology in order to detect and track unauthorized drones’ exact location. The positioning system has been steadily investigated, as interest in location-based services (LBS) has increased due to advances in IoT and mobile device technologies [
15,
16,
17]. Conventional positioning systems have been developed based on the GPS signal. However, the GPS based positioning system cannot be directly applied to the drone position tracking system, because it is hard to find GPS information from the unauthorized drones at the mobile tracker. Therefore, instead of the GPS based techniques, we consider the tracking that is based on Wi-Fi and Bluetooth low energy (BLE) technologies in a Wireless Personal Area Network (WPAN) [
16,
17]. Based on BLE technology development, the market of LBS using BLE has grown rapidly [
18,
19], and it application has been attempted in various environments, such as airports [
20] and museums [
21]. Furthermore, the battery life has been dramatically extended, and it makes it suitable for long-term monitoring and surveillance and easy to mount on drones at low prices and small. Thus, we consider the drone position tracking system that is based on BLE technology [
18,
19,
20,
21,
22,
23].
Research on existing BLE-based location tracking techniques is based on a fingerprinting approach while using the received signal strength indication (RSSI) database [
23,
24,
25], tracking an object’s position while using the trilateration method, and the RSSI-distance conversion formula using a propagation model [
26,
27,
28,
29,
30]. In [
16,
24,
31], the authors proposed location tracking techniques that combine the existing methods with various sensors to improve the performance. Fingerprinting based location tracking requires building a database in advance and investing time in maintenance. In particular, the fingerprinting cannot be applied to the tracking method using the autonomous flight drone, because the receiver moves dynamically, and the environment changes constantly and frequently. In addition, the method to enhance the precision of location tracking in combination with various sensors, such as gyro, acceleration, and inertial sensors, cannot be applied in the anti-drone system, because the target is the unauthorized drone that hides its identity. Thus, it is hard to receive sensor information from the target. Therefore, we apply the distance conversion formula while using the propagation model to the position tracking in the anti-drone system. However, the method that simply uses the propagation model has inferior positioning accuracy due to reflection and interference [
16]. In order to improve the accuracy, the refining algorithms that combine the calibration of RSSI coefficients, iterative trilateration, and smoothing algorithm to minimize the dynamic signal fluctuation were proposed in [
27]. In [
28], a method of using frequency diversity and spatial diversity to suppress RSSI fluctuation was proposed, and a Kalman filter was applied in order to improve the accuracy of trilateration [
29,
30]. However, the previous positioning algorithms directly estimate the target’s location based on RSSI and, hence, the performance seriously depends on the accuracy of RSSI. Furthermore, the algorithm has to consume a large amount of time to increase RSSI’s accuracy, thus decreasing the tracking speed. Therefore, we propose the position tracking algorithms that gradually approach the target and are robust to the RSSI accuracy and estimation error of the position.
In this paper, we propose the position tracking techniques while using multiple BLE receivers. In contrast to the existing algorithms, the tracker gradually tracks the target that is based on the estimated location that was obtained from RSSI values at multiple receivers. In the proposed algorithms, the tracker first determines the distance and angle for movement using RSSI values at receivers. Subsequently, it gradually moves toward the target according to the moving distance and angle. We propose two tracking algorithms, the constant distance and quantized angle constant distance and quantized angle (CDQA) algorithm and the adaptive distance and continues angle (adaptive distance and continues angle (ADCA)) algorithm, according to the method for determining the moving distance and angle. In order to reduce the effect of the estimation error that is caused by RSSI’s inaccuracy, we apply the memory process, which exploits the previous movement information, in the proposed algorithms.
The rest of the paper is organized, as follows. In
Section 2, we introduce a location tracking system while using multiple BLE receivers. In
Section 3, we propose position tracking algorithms and a method for improving the tracking algorithms’ performance.
Section 4 evaluates the performance of the position tracking algorithms proposed in this paper through simulations and compares the performance through numerical results. Finally, we will present conclusions in
Section 5.
2. System Model
We consider a tracking system where the tracker equips four Bluetooth receivers, as shown in
Figure 1. The tracker equips four receivers, and the physical distance between the tracker’s center and each receiver is
. The receivers are located on the vertical and horizontal axes with
. Because the tracker equips the fixed receivers, the distance between the tracker’s center and each receiver,
, is unchanged at each movement. In our tracking system, because the tracker does not know an initial location of the target before receiving RSSI, the receiver has to listen RSSI in all directions. Therefore, we assume that the radiation pattern is isotropic, and the antenna gain is the same. We define an initial location of the tracker as
and, thus, the locations of four receivers are given by
,
,
, and
, respectively. The tracking space for the drones is a three-dimensional space. However, in the indoor environment, the drones cannot fly at a high altitude. Thus, the altitude difference between the tracker and target is relatively small when compared to the distance between them. Therefore, we simplify the 3-dimensional tracking space to 2-dimensional tracking space. The target is located apart from the tracker the distance
and the angle
, which is an angle between the horizontal axis and target. The tracker does not know
and
before the completion of the tracking.
The tracker traces the target based on the RSSI values that were obtained from the target’s broadcasting signal at the receivers. In our tracking system, we assume that the target does not move during the tracking and thus, if the tracker cannot approach the target in a certain time, the tracking is failed. Because the tracker and target do not move during the collection for RSSI, we use a static channel model for RSSI. We assume the RSSI follows the Indoor Log-Distance path loss model [
32], as
where
n is the path loss exponent and
is a normal random variable in dB having a standard deviation of
dB. The path loss at the reference distance
m) is defined by
. At each movement, the tracker collects the RSSI values during the collection period and then calculates the average values of RSSI to track the target’s location. During the RSSI collection period, the tracker does not move and collect RSSI. The cycle of receiving the RSSI signal is defined by
T and the number of received RSSI during the collection period is given by
w. Thus, the total collection period is given by
. Based on the average RSSI values at receivers, the tracker determines the moving distance
and angle
and moves by the distance
in the direction
. The moving distance and angles are determined according to the tracking algorithms, which will be presented in
Section 3. The number of movement to track the target is defined by
and it is bounded by the maximum number of the movement
. Thus, if
, then the tracking is failed. Otherwise, for the case of
, when the tracker approaches within the threshold distance
from the target, i.e.,
, the tracking is successfully completed.
In the tracking system, it is important both how to fast track the target and how to successfully track the target. Therefore, as the performance measure, we provide the success rate that is based average tracking time, which considers both the success rate of the tracking and average tracking time for the success tracking event. The success rate based average tracking time is defined by the average tracking time divided by the success rate of the tracking as
For the case that the tracker successfully tracks the target
k times in the total
K attempts for the tracking, the success rate based average tracking time can be represented by
where
is the number of the movement for the completion of the
i-th tracking event and
is a summation of the total movement distance of tracker at the
i-th tracking event. The movement speed of the tracker is defined by
v.
In addition, we apply a memory process for the tracking algorithms, which stores the information of the previous movement steps and reduces the probability to move to the wrong direction that is based on the stored information.
Figure 2 presents the overall tracking process. In details of using the memory and the algorithms to determine the moving distance and moving angles are proposed in the following section.
4. Simulation Results
In this section, we evaluate the proposed algorithms’ performance in terms of
, the average tracking time based on the success rate given in (
3). The RSSI signal for estimating distances is generated by (
1), the path loss exponent is
, and the random variable
has
dB. The simulation parameters that are commonly used in the figures are given the following: the distance between the tracker and receiver is
m, the maximum number of the movement
, the cycle of receiving RSSI is
s, the number of received RSSI for averaging is
, the movement speed of the tracker is
m/s, and the threshold distance is
m. By considering the coverage and reception stability of RSSI, we set the distance between the tracker and target as
m. The path loss at the reference distance
dBm. Although the target can move, this paper assumes a scenario of tracking a fixed target. Additionally, we simulate 10,000 times for each scenario to obtain the simulation results by averaging.
In
Figure 5, we plot the average tracking time that is based on the success rate,
, of the proposed tracking algorithms according to the distance between the tracker and the target,
. In this figure, we can observe that the ADCA based tracking algorithm outperforms the CDQA based tracking algorithm for all
, because the ADCA algorithm has greater freedom to move to the target in terms of the distance and angle. For the CDQA algorithm, when the distance between the tracker and target is short, e.g.,
m, the algorithm with the short moving distance (
m) outperforms the algorithm with a long moving distance (
m). In this case, it is beneficial that the tracker moves elaborately to find the target. However, when the target is located far from the tracker, e.g.,
m, the algorithm with
m yields better performance than with
m. In this case, it is beneficial to approach the target with a long moving distance rapidly.
For the ADCA algorithm, the algorithm with outperforms that with . Because the moving distance with is twice longer than that with , the tracker has to conservatively approach the target in order to reduce the effect of moving in the wrong direction in the ADCA algorithm.
Figure 6 shows the performance improvement by applying the memory process in the ADCA tracking algorithm. In the ADCA algorithm, we take a heuristic conservative approach, such as a normalize factor
, because it has significantly reduced performance by moving in the wrong direction, as shown in
Figure 5. By applying the memory process, however, the tracker can go back to the previous location when it moves in the wrong direction. Thus, the tracker does not have to conservatively move to the target, i.e.,
. By comparing the ADCA with
and the memory applied ADCA (M-ADCA) with
, we can observe that the M-ADCA outperforms the ADCA for all distances, and the performance gap becomes larger as the distance increases. Therefore, the performance of the tracking system can be significantly improved by applying the memory process.
In
Figure 7, we compare the proposed tracking algorithms and the existing trilateration based algorithm and memory applied trilateration (M-Trilateration) algorithm in terms of the number of movement, total moving distance, and the success rate that is based on the average tracking time. In
Figure 7a,b, we plot the number of movements for tracking,
, the distance between the tracker and the target,
, and the number of that were received RSSIs during the collection period,
w, respectively. In these figures, we first observe the memory process improves the performance of the trilateration-based algorithm as well as the proposed algorithm.
Figure 7a shows that the proposed tracking algorithms, ADCA and M-ADCA, outperform the conventional trilateration based algorithms, Trilateration and M-Trilateration, respectively, for all
. In
Figure 7b, we observe that the proposed algorithms’ performance outperform the trilateration based algorithms for small and medium
w. However, the trilateration based algorithms approach to or outperform the proposed algorithms for large
w. When
w is large, the estimation error can be reduced and, thus, the conventional algorithms, which are sensitive to the estimation error, yield good performance. However, the system with large
w consumes a long time to receive the RSSIs and, thus, the overall tracking performance can be worse, due to the increased tracking time. In
Figure 7c,d, the total movement distances for tracking,
, are plotted according to
and
w, respectively. In these figures, we can observe the similar results with
Figure 7a,b. The proposed algorithms outperform the conventional algorithms for all
and the M-Trilateration algorithm yields better performance than M-ADCA for large
w, in terms of the total movement distance.
In
Figure 7e,f, we evaluate the overall performance of the proposed and conventional algorithms in terms of the success rate based tracking time,
, which considers both tracking accuracy and tracking speed. In
Figure 7e, by comparing the ADCA and M-ADCA, we first observe that the M-ADCA algorithm obtains a maximum gain of approximately
(
m), and the average gain about
by applying memory process. The proposed ADCA algorithm as compared to the conventional Trilateration obtains a maximum gain of about
(
m) and an overall average gain of about
for all distances. When comparing to the conventional M-Trilateration algorithm, the proposed M-ADCA algorithm can achieve a maximum gain of about
(
m) and an overall average gain of about
for all distances. In
Figure 7f, we can observe that there exists the optimal value of
w that minimizes
. For small
w, the algorithms’ success rate based tracking times decrease as
w increases, because the increased
w reduces the estimation error. However, for large
w, the algorithms’ performance worsens as
w increases, due to the increased total tracking time. Because
w is a system design parameter, we can optimize
w to minimize
. Hence, we can evaluate the performance of the algorithms by comparing the optimal points of
, which are marked by green circles in
Figure 7f. Consequently, by comparing the optimal
, the proposed M-ADCA algorithm obtains
gain as compared to the conventional M-Trilateration algorithm for
m.