A Coverage Theory of Bistatic Radar Networks: Worst-Case Intrusion Path and Optimal Deployment
Source: Cornell University
Continuing advances in radar technology are driven both by new application regimes and technological innovations. A family of applications of increasing importance is detection of a mobile target intruding into a protected area, and one type of radar system architecture potentially well suited to this type of application entails a network of cooperating radars. In this paper, the authors study optimal radar deployment for intrusion detection, with focus on network coverage. In contrast to the disk-based sensing model in a traditional sensor network, the detection range of a bistatic radar depends on the locations of both the radar transmitter and radar receiver, and is characterized by Cassini ovals.