1 event detection in wireless sensor networks in random … · event detection in wireless sensor...

13
1 Event Detection in Wireless Sensor Networks in Random Spatial Sensors Deployments Pengfei Zhang 1,2 , Ido Nevat 2 , Gareth Peters 3 , Gaoxi Xiao 1 , Hwee-Pink Tan 2 1. School of Electrical & Electronic Engineering, Nanyang Technological University, Singapore 2. Sense and Sense-abilities, Institute for Infocomm Research, Singapore 3. Department of Statistical Sciences, University College London (UCL), London, England Abstract—We develop a new class of event detection algorithms in Wireless Sensor Networks where the sensors are randomly deployed spatially. We formulate the detection problem as a binary hypothesis testing problem and design the optimal decision rules for two practical random deployment scenarios, namely the Poisson Point Process and Binomial Point Process deployments. To calculate the intractable marginal likelihood density under alternative hypothesis, we develop three types of series expansion methods which are based on an Askey-orthogonal polynomials. In addition we develop a novel framework to provide guidance on which series expansion is most suitable (ie. most accurate) to use for different system’s parameters. Extensive Monte Carlo simulations are carried out to illustrate the benefits of this framework as well as the quality of the series expansion methods, and the impact that different parameters have on detection performance via the Receiver Operating Curves (ROC). Keywords: Wireless sensor networks, Event Detection, Bi- nomial Point Process, Poisson Point Process, Series expansions I. I NTRODUCTION Wireless Sensor Networks (WSN) have attracted consider- able attention due to the large number of applications, such as environmental monitoring, weather forecasts [1]–[3], surveil- lance, health care, and home automation [3], [4]. WSN consists of a set of spatially distributed sensors which monitor a spatial physical phenomenon containing some desired attribute (e.g pressure, temperature, concentrations of substance, sound intensity, radiation levels, pollution concentrations etc.), and regularly communicate their observations to a Gateway (GW) [5]–[7]. The GW collects these observations and fuses them in order to perform event detection, based on which effective actions can be made [4]. The detection problem of the WSN can be cast as distinguishing between two hypotheses, such as the absence (Null Hypothesis), or presence (Alternative Hypothesis) of a certain event [8]–[10]. The ability of a WSN to perform such detection and decisions is crucial for various applications, for example the detection of the presence or absence of a target in a surveillance system, detection of missiles, detection of chemical, biological or nuclear plumes and many more [11]–[13]. It is therefore imperative for the WSN to be accurate in detecting a valid event (high detection rate) while maintaining as low as possible false detection (low false alarm). For example, in [14] the problem of distributed detection was considered, where the sensors transmit their local de- cisions over perfectly known wireless channels. In [15] the problem of distributed event detection under Byzantine attack was considered. Theoretical performance analysis was derived in [16] for detection fusion under conditionally dependent and independent local decisions. Distributed detection in sensor networks over fading channels with multiple receive antennas at the GW was considered in [17]. Previous works on event detection have concentrated on cases where the sensors deployment (ie. the locations of the sensors) is deterministic and known to the GW ( [4], [16]– [19] and references within). In contrast, the problem of event detection where the sensors are randomly deployed in the field has not been addressed before. This problem is of great practical interest because in many cases the locations of the sensors are unknown to the GW. The following are examples of such scenarios: 1) Surveillance: sensor nodes are dropped by airplanes, unmanned aerial vehicles or ships in order to survey a region of interest that is inaccessible from the ground. To increase life span and reduce costs of the sensors, they are not equipped with localisation device (ie. GPS) and their location is considered random and unknown [20], [21]. 2) Privacy-preserving participatory sensing: individuals share certain environmental information (eg. temperature readings, traffic conditions etc.) to produce aggregated models. In order to protect their privacy, the users do not share their location information [22]. In addition, in the wireless communication literature there has been great interest in random deployments of wireless networks, see for example [23], [24]. These works make use of tools from stochastic geometry to calculate parameters of interest, such as capacity, Signal-to-Noise-Ratio (SNR) of such systems. These works mainly consider homogeneous deployments, mainly due to the mathematical tractability. In practice however, it’s very unlikely that the sensors would be distributed in space in a spatially homogenous way, but instead a non-homogeneous behaviour is more likely to occur, see [25], [26]. To address these two practical aspects of random deploy- ment of inhomogeneous spatially deployed sensor networks, new models and algorithms for event detection need to be developed. In addition, it is important for network designers to understand how different parameters would affect the perfor- mance of the WSN before they deploy the WSN, (i.e., number

Upload: vothu

Post on 08-Jul-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 1 Event Detection in Wireless Sensor Networks in Random … · Event Detection in Wireless Sensor Networks in Random Spatial Sensors Deployments Pengfei Zhang 1, 2, Ido Nevat ,

1

Event Detection in Wireless Sensor Networks inRandom Spatial Sensors Deployments

Pengfei Zhang1,2, Ido Nevat2, Gareth Peters3, Gaoxi Xiao1, Hwee-Pink Tan21. School of Electrical & Electronic Engineering, Nanyang Technological University, Singapore

2. Sense and Sense-abilities, Institute for Infocomm Research, Singapore3. Department of Statistical Sciences, University College London (UCL), London, England

Abstract—We develop a new class of event detectionalgorithms in Wireless Sensor Networks where the sensorsare randomly deployed spatially. We formulate the detectionproblem as a binary hypothesis testing problem and design theoptimal decision rules for two practical random deploymentscenarios, namely the Poisson Point Process and Binomial PointProcess deployments. To calculate the intractable marginallikelihood density under alternative hypothesis, we developthree types of series expansion methods which are based on anAskey-orthogonal polynomials. In addition we develop a novelframework to provide guidance on which series expansion ismost suitable (ie. most accurate) to use for different system’sparameters. Extensive Monte Carlo simulations are carriedoutto illustrate the benefits of this framework as well as the qualityof the series expansion methods, and the impact that differentparameters have on detection performance via the ReceiverOperating Curves (ROC).

Keywords: Wireless sensor networks, Event Detection, Bi-nomial Point Process, Poisson Point Process, Series expansions

I. I NTRODUCTION

Wireless Sensor Networks (WSN) have attracted consider-able attention due to the large number of applications, suchasenvironmental monitoring, weather forecasts [1]–[3], surveil-lance, health care, and home automation [3], [4]. WSN consistsof a set of spatially distributed sensors which monitor aspatial physical phenomenon containing some desired attribute(e.g pressure, temperature, concentrations of substance,soundintensity, radiation levels, pollution concentrations etc.), andregularly communicate their observations to a Gateway (GW)[5]–[7]. The GW collects these observations and fuses themin order to perform event detection, based on which effectiveactions can be made [4]. The detection problem of the WSNcan be cast as distinguishing between two hypotheses, suchas the absence (Null Hypothesis), or presence (AlternativeHypothesis) of a certain event [8]–[10]. The ability of a WSNto perform such detection and decisions is crucial for variousapplications, for example the detection of the presence orabsence of a target in a surveillance system, detection ofmissiles, detection of chemical, biological or nuclear plumesand many more [11]–[13]. It is therefore imperative for theWSN to be accurate in detecting a valid event (high detectionrate) while maintaining as low as possible false detection (lowfalse alarm).

For example, in [14] the problem of distributed detectionwas considered, where the sensors transmit their local de-

cisions over perfectly known wireless channels. In [15] theproblem of distributed event detection under Byzantine attackwas considered. Theoretical performance analysis was derivedin [16] for detection fusion under conditionally dependentandindependent local decisions. Distributed detection in sensornetworks over fading channels with multiple receive antennasat the GW was considered in [17].

Previous works on event detection have concentrated oncases where the sensors deployment (ie. the locations of thesensors) isdeterministic and known to the GW ( [4], [16]–[19] and references within). In contrast, the problem of eventdetection where the sensors arerandomly deployed in thefield has not been addressed before. This problem is of greatpractical interest because in many cases the locations of thesensors are unknown to the GW. The following are examplesof such scenarios:

1) Surveillance: sensor nodes are dropped by airplanes,unmanned aerial vehicles or ships in order to surveya region of interest that is inaccessible from the ground.To increase life span and reduce costs of the sensors,they are not equipped with localisation device (ie. GPS)and their location is considered random and unknown[20], [21].

2) Privacy-preserving participatory sensing: individualsshare certain environmental information (eg. temperaturereadings, traffic conditions etc.) to produce aggregatedmodels. In order to protect their privacy, the users donot share their location information [22].

In addition, in the wireless communication literature therehas been great interest in random deployments of wirelessnetworks, see for example [23], [24]. These works make useof tools from stochastic geometry to calculate parametersof interest, such as capacity, Signal-to-Noise-Ratio (SNR) ofsuch systems. These works mainly consider homogeneousdeployments, mainly due to the mathematical tractability.Inpractice however, it’s very unlikely that the sensors wouldbedistributed in space in a spatially homogenous way, but insteada non-homogeneous behaviour is more likely to occur, see[25], [26].

To address these two practical aspects of random deploy-ment of inhomogeneous spatially deployed sensor networks,new models and algorithms for event detection need to bedeveloped. In addition, it is important for network designers tounderstand how different parameters would affect the perfor-mance of the WSN before they deploy the WSN, (i.e., number

Page 2: 1 Event Detection in Wireless Sensor Networks in Random … · Event Detection in Wireless Sensor Networks in Random Spatial Sensors Deployments Pengfei Zhang 1, 2, Ido Nevat ,

2of sensors, region of deployment, level of inhomogeneity ofthe deployment etc.) in order to obtain the optimal detectionperformance. It is therefore important to study the averageperformance of a network before a decision is made.

At the heart of distance based algorithms in WSN underrandom spatial deployment lies the understanding of thedistance distribution. Such quantities have been derived underspatial deployment such as Poisson Point Process (PPP) andBinomial Point Process (BPP) [27]–[30]. In [27], sensors areuniformly randomly distributed following a BPP. The authorsanalyzed various properties of such networks including thedistance distribution, moments of distance etc. In [28], theauthors considered a more general distribution, namely thePPP and provided analysis of the distance distributions forsuch networks. In [29] the authors discuss the deploymentof cognitive cellular wireless networks. In [30] the authorsconsidered distance distributions on mobile wireless networks.It is important to note that these papers have only tackledhomogeneous type deployments and the practical cases of non-homogeneous deployments have not been addressed.

In this paper, we develop novel event detection algorithms inWSN for the case where the sensors are randomly distributedin space and their locations are unknown to the GW. Whenthe target (event) is present/active, it emits energy (acoustic orelectromagnetic) which is measured by each of the sensors.All the measurements from the sensors are then aggregated tothe GW which makes the final decision whether the target ispresent or absent. We assume an energy decay model in whichthe amount of energy each sensor measures falls off withdistance and obeys an inverse power-law where the exponent isknown as the path loss exponent [24]. In contrast to previousworks which assumed that the locations of the sensors areknown to the GW [8], [17], [31], we assume a random spatialdeployment. That means that the distance from the target tothe sensors is now a random variable.

To obtain the optimal decision rule, the likelihood ratio test(LRT) for the two hypotheses (event present/ absent) needsto be evaluated. This involves the calculation of the marginallikelihood density under each of the hypotheses. While de-riving the marginal likelihood under the Null hypothesis istrivial, the derivation of the marginal likelihood under theAlternative hypothesis is not readily obtained in closed-form,since it involves a multi-variate convolution which cannotbe solved exactly. As such, we adopt instead a principledapproach to approximating the marginal likelihood under thealternative hypothesis. To do so we exploit stochastic geom-etry techniques to model the placement of the sensors [27].We then approximate the intractable distribution density viaseries expansions techniques which are based on an Askey-orthogonal polynomial expansion. The three series expansionswe develop are the Gram-Charlier, Gamma-Laguerre and Beta-Jacobi type series expansions. Since these expansions do notensure positivity of the density at all points, it is importantto characterise the system parameters for which the densityapproximation will remain positive. This characterisation canbe carried out by finding the appropriate regions in the Skew-Kurtosis plane (S-K plane) which generate positive support[32], [33]. This characterisation is important and should be

used as a guide to choosing the appropriate series expansion.We will illustrate the implications of not choosing the correctseries expansion via simulations. Importantly, the algorithmswe develop only require deriving the first four cumulantsand moments to obtain good detection performance and aretherefore of low computational complexity.

We summarize our three key contributions as follows.

1) We extend the distance distribution results of [27], [28]for Poisson Point Process and Binomial Point Processto the inhomogeneous deployment case (presented inTheorem 1). These results are required in order todevelop the optimal detection algorithm we derive.

2) We develop three different types of Askey-orthogonalpolynomial expansion methods to approximate themarginal likelihood density (presented in Section IV).The first is based on Hermite polynomials and is knownas the Gram-Charlier series expansion; the second isbased on Laguerre polynomials and is known as theGamma-Laguerre series expansion; the third expansionthat we derive for the first time is the Beta-Jacobi seriesexpansion and is based on Jacobi polynomials (presentedin Theorem 2 and Theorem 3).

3) We develop a novel analysis tool to characterise the con-ditions (Skew-Kurtosis region) at which each expansionhas a positive support (presented in Section IV). The newtool is of great importance as it provides a guidance asto which series expansion to use under different type ofsystem parameters, such as noise distribution, path-lossexponent parameter, SNR value etc.

4) We show that our proposed Beta-Jacobi series expansionprovides better detection performance that the standardGram-Charlier Gamma-Laguerre series expansions fordifferent practical scenarios.

II. SYSTEM MODEL AND PROBLEM FORMULATION

In this section we present the model assumptions. We beginwith a formal definition of the Finite Binomial Point Processand Infinite Poisson Point Process followed by system modelassumptions. These processes are special cases of spatial pointprocess. In general a spatial point process is a random patternof points, in our case in2-dimensional space.

One of the most useful ways to handle a spatial point pro-cess is to generalise the notion of one-dimensional spatialpointprocesses involving interval countsN(a, b] to the concept ofregion countsN(B) which is the number of points fallingin a setB ⊂ Ω ⊆ R

2. One may then characterize a spatialpoint process by two measures, the counts of points in sets,i.e., sets whereN(B) > 0 for regionsB and the vacancy setsV (B) = N(B) = 0 where there are no counts present. Thetwo most commonly used spatial point processes are the BPPand PPP as described below, see details in [34].Definition 1 (Finite Binomial Point Process (FBPP) [34],[35]). A Finite Binomial Point Process is defined by consid-ering a fixed number ofn points at random locations in abounded regionW ⊂ R

2. Define byX1, . . . , Xn the i.i.d.random locations with the intensity of the number of points ina small region around any locationx denoted asλ (x). This

Page 3: 1 Event Detection in Wireless Sensor Networks in Random … · Event Detection in Wireless Sensor Networks in Random Spatial Sensors Deployments Pengfei Zhang 1, 2, Ido Nevat ,

3produces a probability density of eachXi given by

fX(x) =

1

λ(W ) , if x ∈ W,

0, otherwise,(1)

whereλ(W ) denotes the area ofW . Each random pointXi isuniformly distributed inW so that for a bounded setB ∈ R

2

on has the distribution

Pr (Xi ∈ B) =

B

fX(x)dx =λ(B ∩W )

λ(W ). (2)

In this paper we will consider a general case involvingan inhomogeneous version of the finite domain spatial BPP(inhomogeneous FBPP). The distribution of the points willhave a densityfX(x) given by the decaying power law, relativeto the center ofW which is specified to be a disc in ourapplications. Therefore it will have a form given accordingto

fX(x) =

x−ν

1 (x) , if x ∈ W

0, otherwise,(3)

with reference to the center ofW .The second point process to be considered will be on an

infinite domain and will be considered to be a PPP definedaccording to Definition 2.Definition 2 (Infinite Poisson Point Process (IPPP) [35]).Consider a locally compact metric spaceW ⊆ R

2 andmeasureΛ on W which is finite on every compact set andcontains no atoms. Then the spatial PPP onW with intensitymeasureΛ is a point process onW such that

• for every compact setB ⊂ W , the countN(B) isdistributed according to a Poisson distribution withΛ(B)mean; and

• if B1, . . . , Bm are disjoint compact sets, thenN(B1), . . . , N(Bm) are independent.

In the examples considered in this paper we will utilise oneof two possibilities:

• Homogeneous IPPP (HIPPP), whenλ is constant.• Non-homogeneous IPPP (NIPPP), whenλ is not constant.

Without loss of generality, we also assumeλ(x) = x−ν

is a power law withν > 0.

The difference between the FBPP and the IPPP is thatthe number of pointsn within set V , is a known constantunder FBPP, and is arandom unknownunder IPPP. Fig. 1presents realisations from homogenous BPP, inhomogeneousBPP, homogenous PPP and inhomogeneous PPP, respectively.

A. Wireless Sensor Network Operation Model

We now present the system model for the wireless sensornetwork.

1) The source is present (H1) or absent (H0). UnderH1,the source transmits constant powerP0, and underH0,the source does not transmit any power (P0 = 0).

2) The location of the source (if present) is assumed knownxs = [x0, y0]. We assume without loss of generality, thatit is located at the center of circle of radiusR.

3) Consider a WSN consisting of sensors with locationsfollowing either a FBPP deployment (Definition 1) or

−10 −8 −6 −4 −2 0 2 4 6 8 10−10

−8

−6

−4

−2

0

2

4

6

8

10

x

y

Homogeneous Binomial point process, ν=0

−10 −8 −6 −4 −2 0 2 4 6 8 10−10

−8

−6

−4

−2

0

2

4

6

8

10

x

y

Inhomogeneous Binomial point process, ν=1

−10 −8 −6 −4 −2 0 2 4 6 8 10−10

−8

−6

−4

−2

0

2

4

6

8

10

x

y

Homogeneous Poisson point process, ν=0

−10 −8 −6 −4 −2 0 2 4 6 8 10−10

−8

−6

−4

−2

0

2

4

6

8

10

x

y

Inhomogeneous Poisson point process, ν=1

Fig. 1: Realisations from Homogenous BPP deployment (topleft), Non-homogenous BPP deployment (bottom left), Ho-mogenous PPP deployment (top right) and Non-homogenousPPP deployment (bottom right) .

an IPPP deployment (Definition 2) in a2 dimensionalregion.

a) For FBPP deployment,NB sensors are deployedin a circle with radiusR.

b) For IPPP deployment, an unknown random numberof sensors are deployed in a circle with radiusR.Note that for the case of IPPP, the number of pointsNP is not fixed.

The spatial density of the sensors is given byλ(x) =x−ν , ν 6= 0.

4) The unknown random location of thek-th sensor(k = 1, · · · , N) is Xk = [Xk, Yk].

5) The amount of energy thek-th sensor measures isinversely proportional to the Euclidean distance betweenthe source and the sensor and is given by

√P0R

−α/2k .

The random variableRk represents the random distancebetween thek-th sensor and the source. This distanceis defined as the minimum radius of the ball withcenterxs, that contains at leastk points in the ball,i.e., Rk = infr : R(1), R(2), · · · , R(k) ∈ Bxs(r).Bxs(r) is the ball with radiusr and center atxs.

6) Each sensor transmits its observation over a perfectchannel to the GW via a shared medium. The observedsignal at the GW in thel-th time slot(l = 1, · · · , L)is a linear combination of all the signals given by:

H0 : Yl = Wl

H1 : Yl =

Ni∑

k=1

√P0Rk

−α/2 +Wl,

whereWl is the i.i.d additive Gaussian noiseN (0, σ2Wl

).The parameterα is the path-loss coefficient.

We proceed by presenting the optimal decision rule forthe event detection. We then derive the various componentsrequired in order to evaluate the optimal decision rule.

Page 4: 1 Event Detection in Wireless Sensor Networks in Random … · Event Detection in Wireless Sensor Networks in Random Spatial Sensors Deployments Pengfei Zhang 1, 2, Ido Nevat ,

4B. Optimal Event Detection Decision Rule

The optimal decision rule is a threshold test based on thelikelihood ratio [36]. We consider a frame-by-frame detection,where the length of each frame isL. The decision rule is thengiven by:

Λ (Y1:L) ,p(Y1:L|xs,H0)

p (Y1:L|xs,H1)

H0

≷H1

γ, (4)

where the thresholdγ can be set to assure a fixed systemfalse-alarm rate under the Neyman-Pearson approach or canbe chosen to minimize the overall probability of detection errorunder the Bayesian approach [37]. We can decompose the fullmarginals under each hypothesis,p (Y1:L|xs,Hk), k = 0, 1,as

p(Y1:L|xs,Hk) =

L∏

l=1

p(Yl|xs,Hk).

This decomposition is useful as it allows us to work on alower dimensional space, resulting in efficiency gains for thealgorithm we develop and requiring no memory storage fordata.

III. E VENT DETECTION ALGORITHM UNDER RANDOM

POINT PROCESSSENSORDEPLOYMENT

The optimal decision rule in (4) involves calculating themarginal likelihood under each hypothesis,p (Y1:L|xs,Hk),k = 0, 1. The marginal likelihood underH0 can be easilycalculated as it follows a Normal distribution. The marginallikelihood under the alternative hypothesis,p (Yl|xs,H1), isnot attainable in closed form because it involves solving the(N +1)-fold convolution as we will show in this section (see(5)). We will therefore develop a novel approximation of themarginal likelihood under the alternative hypothesis, basedon an Askey-orthogonal polynomial expansion. In particular,we will derive the Gram-Charlier, Gamma-Laguerre and Beta-Jacobi type series expansions.

We begin with obtaining the distribution of the distancebetween thek-th sensor and the source location, denotedby fRk

(r|xs,H1). We derive this density for both BPP andIPPP deployments. To achieve that we extend the earlierwork of [27] who derived the distance distribution for thehomogeneous case, to the inhomogeneous case.Theorem 1. The density of the Euclidean distance betweenthe k-th sensor and the source,Rk, is given by:

1) BPP deployment:

fRk(r|xs,H1) =

(2− ν) Γ(k + 1−ν

2−ν

)Γ (NB + 1)

R Γ (k) Γ(NB + 1−ν

2−ν + 1)

× β

(( r

R

)2−ν

; k +1− ν

2− ν,NB − k + 1

).

2) IPPP deployment:

fRk(r|xs, n = NP ,H1)

=(2π)

k

Γ (k) (2− ν)k−1

r(2−ν)k−1 exp

(−2πr2−ν

2− ν

),

whereβ (x, α, β) := 1B(α,β)x

α−1 (1− x)β−1 is the β distri-

bution andΓ (n) := (n− 1)! is the Gamma function. For bothcases, the support ofRk is Zk ∈ R+.

Proof. See Appendix A.

Corollary 1. WhenN → +∞ and R → +∞, the non-homogenous BPP converges to a IPPP. Sincep = (r/R)

2−ν ,thenR = rp−

12−ν . Also,N =

∫W

λ(r)dr = 2π2−νR

2−ν . We

havep = (r/R)2−ν = 2πr2−ν

N(2−ν) . The densityfRkis given by:

fRk(r|xs,H1)

= limN→+∞

−ν + 2

r

(1− p)N−kpkΓ(N + 1)

Γ(N − k + 1)Γ(k)

=(2π)k

Γ(k)(2 − ν)k−1r(2−ν)k−1 exp

(−2πr2−ν

2− ν

)

× limN→+∞

∏k−1i=0 (N − i)

Nk

=(2π)k

Γ(k)(2 − ν)k−1r(2−ν)k−1 exp

(−2πr2−ν

2− ν

)O(

Nk

Nk)

=(2π)k

Γ(k)(2 − ν)k−1r(2−ν)k−1 exp

(−2πr2−ν

2− ν

).

Next, based on the result in Theorem 1, we derive thedensity distribution of each of the elements in the observa-tion under the alternative hypothesisYl. This involves thenon-linear transformation of the random distance, namelyfZk

(r−α/2|xs,H1

).

Lemma 1. The densityfZk(z|xs,H1) = fZk

(r−α/2|xs,H1

)

is given by:

1) BPP deployment:

fZk(z|xs,H1) =

2 (2− ν)

αR

Γ(k + 1−ν

2−ν

)Γ (NB + 1)

Γ (k) Γ(NB + 1−ν

2−ν + 1)

× β

((z−2/α

R

)2−ν

; k +1− ν

2− ν,NB − k + 1

)z−2/α−1.

2) IPPP deployment:

fZk(z|xs, n = NP ,H1) =

(2π)k

Γ (k) (2− ν)k−1

(2

α

)

× z−2/α((2−ν)k)−1 exp

(− 2π

2− νz−2/α(2−ν)

).

For both cases, the support ofZk is Zk ∈(R−α/2,∞

).

Proof. See Appendix B.

Now that we have derived the density and distribution ofeach of the elements inYl, we need to derive the density ofthe term

∑Ni

k=1

√P0Zk. We express this random sum ofY as

anN -fold convolution ofZk, k ∈ 1, . . . , N, given by

fY (y) = ∗Ni

i=1fZi(y) =

∫ ∞

−∞fZNi−1(y − w)fZNi

(w)dw,

(5)

where∗ represents the convolution operation. Each of theseconvolution integrals is intractable and cannot be solved

Page 5: 1 Event Detection in Wireless Sensor Networks in Random … · Event Detection in Wireless Sensor Networks in Random Spatial Sensors Deployments Pengfei Zhang 1, 2, Ido Nevat ,

5analytically in closed form. To approximate the marginallikelihood Yl we will utilise a series expansion approachpresented in the next section.

IV. PROBABILITY DENSITY APPROXIMATION VIA SERIES

EXPANSION METHODS

In order to evaluate the marginal likelihood in (5), we derivenovel approximation for the marginal likelihood. We developthree different series expansion methods for representingthemarginal likelihood using orthogonal basis functions [32],[33]. We will show how these expansions are applicableunder different scenarios. The series expansion we utilisearebased on a kernel density multiplied by polynomials, knownas Askey polynomials [38]. Typical Kernel densities includeGaussian density basis, Gamma density basis and Beta densitybasis. The respective Askey polynomials [38] are Hermitepolynomials, Laguerre polynomials and Jacobi polynomials.These series expansions for the scalar case can be genericallyexpressed as follows:

f (y) = g (y)

1 +

∞∑

j=1

djHj (y)

, (6)

whereg (y) is the kernel,dj is thej-th weight andHj (y) isthe j-th order basis function. All of these series expansionmethods use the basic properties of orthogonality betweendensity functions and polynomials. This property guaranteesthe integration of density to be equal to one [32], [33]. Eachof these series expansion has different properties and differentsupports. An important aspect of these expansions is thatthey do not ensure positivity of the density at all points (forexample, it can be negative for particular choices of Skew andKurtosis). It is therefore important to characterize thesevaluesthat produce the ”envelope” for the density approximation inwhich it will remain positive. This characterization can becarried out by finding the appropriate regions in the Skew-Kurtosis plane (S-K plane) which generate positive support[32], [33].

We will derive three series expansion methods, which willbe used for different practical scenarios (eg. different systemparameters). The first two are the Gram-Charlier and Gamma-Laguerre series expansions. We then develop a new seriesexpansion which we term the Beta-Jacobi series expansion.

A. Gram-Charlier Series Expansion

The Gram-Charlier series expansion utilises a Gaussiankernel,g (y), and Hermite polynomials,Hs (x), as basis func-tions. These polynomials are defined in terms of the derivativesof the normal density,g (y) as follows:

dsg (y)dsy

= (−1)s Hs (y) g (y) . (7)

The Gram-Charlier series expansion is given by:

fY (y) =1√2πκ2

exp

(− (y − κ1)

2

2κ22

) ∞∑

r=1

κr

r!

−dr (g (y))dry

,

(8)

g (y) is the normal density andκr is ther-th cumulant ofY .If we include only the first two correction terms to the

normal distribution we obtain theGram-Charlier A seriespresented next.Lemma 2 (Gram-Charlier A Series Expansion:). The fourthorder approximation of a probability distribution,fY (y), viathe Gram-Charlier A series is given by

fY (y) ≈1√2πκ2

exp

(− (y − κ1)

2

2κ22

)

×(1 +

κ3

6κ32

H3

(y − κ1

κ2

)+

κ4

24κ42

H4

(y − κ1

κ2

)),

(9)

whereH3(y) = y3 − 3y and H4(y) = y4 − 6y2 + 3 are theHermite polynomials, andκ1, κ2, κ3, κ4 are the first, second,third and fourth cumulants ofY .

As mentioned before, it is important to characterise theregions in the S-K plane which yield positive support of thedensity. This is presented in the following Lemma.Lemma 3 (Positive density conditions [32]:). The Gram-Charlier A series expansion yields positive values for thedensityfY (y) only if:

s (y) = −24H3(y)

d(y) ,

k (y) = 72H2(y)d(y) ,

whereY = Y−κ1

κ2and d (y) = 4H2

3 (y)− 3H2 (y)H4 (y) .

This region characterizes the positive density regions forthe Gram-Chalier series in terms of the Skew and Kurtosisproperties of the approximated distribution. The support ofthe Gram-Charlier expansion isy ∈ R.

B. Gamma-Laguerre Series Expansion

The Gamma-Laguerre series expansion approximates aprobability distribution,fY (y), by utilising the orthogonalitybetween the Gamma density kernel and the Laguerre poly-nomials in order to obtain an efficient series expansion [33].In contrast to the Gram-Charlier series expansion where theHermite polynomials have support on the entire real line, theLaguerre polynomials only have support on the positive realline y ∈ R

+.Instead of directly working withy, we first rescale it to

a R.V. y by y = by, where b = E[y]Var[y] and seta = E[y]2

Var[y] .Denoting the density ofy asfy, we expressfy as follows:

fy (y) = g (y; a)

∞∑

n=1

AnL(a)n (y) ,

where the kernel is the Gamma density, ie.g (y; a) =ya−1 exp−y

Γ(a) , with shape = a and scale =1, and the orthonormalpolynomial basis (with respect to this kernel) is given by theLaguerre polynomials (in contrast to Hermite polynomials inthe Gaussian case of the Gram-Charlier expansion), defined as

L(α)n (x) = (−1)

nx1−a exp (−x)

dn

dxn

(xn+a−1 exp (−x)

).

Next we characterise the S-K region of the Gamma-Laguerre series expansion in which it yields positive support.These results are based on those derived in [33].

Page 6: 1 Event Detection in Wireless Sensor Networks in Random … · Event Detection in Wireless Sensor Networks in Random Spatial Sensors Deployments Pengfei Zhang 1, 2, Ido Nevat ,

6Lemma 4 (Positive density conditions:). The Gamma-Laguerre series expansion yields positive values for the densityfX(x) if:

s (x) = − 1

B1(µ4(x)B2 +B3) for x ∈ [0,+∞)

k (x) =(

B′

1B3

B1−B′

3

)(B′

2 − B′

1B2

B1

)−1

,,

whereB1, B2, B3, B′1, B′

2 andB′3 are defined in [33].

C. Beta-Jacobi Series Expansion

In this section we develop a novel series expansion thatis based on the Beta kernel. This new expansion is relevantfor cases whereY has a bounded support[a, b]. To achievethis, we construct the series based on a Beta kernel (insteadof Gamma or Normal kernels as before) and the Jacobipolynomials. It is important to note that the Jacobi polynomialsare only orthogonal on[−1, 1]. Hence, we need to transformY so that it also has support[−1, 1] . This is achieved via thetransformation

X =2

b− a

(Y − a+ b

2

). (10)

We now present our novel Beta-Jacobi density series expan-sion, see discussions in [39].Theorem 2 (Beta-Jacobi density series expansion). The Beta-Jacobi series expansion is given by:

fX(x) =(x+ 1)θ−1 (1− x)η−1

B(θ, η)2θ+η−1

d∑

i=0

aiP(η−1,θ−1)i (x) ,

where the coefficients,ai, and the Jacobi polynomials,P

(η−1,θ−1)i (x), are given by:

ai =

i∑

j=0

E[Xj] B (θ, η) (2i+ θ + η − 1) i!

Γ (i+ θ)

×i∑

m=j

Γ (η + θ + i +m− 1)

Γ (i−m+ 1)Γ (η +m)m!2m

(m

j

)(−1)

m−j

P(η−1,θ−1)i (x) =

Γ (η + i)

Γ (η + θ + i− 1)

×i∑

m=0

Γ (η + θ + i+m− 1)

Γ (i−m+ 1)Γ (η +m+ 1)m!

(x− 1

2

)m

.

Proof. See Appendix C.

The distribution ofY is obtained from the distribution ofX via the transformation

fY (y) =2

b+ afX

(2 (y + a)

b+ a− 1

), (11)

wherefX (x) is given in Theorem 2. The values ofθ, η need tobe chosen in order to find a good approximation ofX . We findapproximate values ofθ, η through K-S curve as mentionedbelow.

Next we find the Skew-Kurtosis conditions to guaranteepositive density:

Theorem 3 (Positive density conditions:). The Beta-Jacobiseries expansion yields positive values for the densityfX(x)if:

s (x) = − 1

B1(µ4(x)B2 +B3) for x ∈ [−1,+1)

k (x) =(

B′

1B3

B1−B′

3

)(B′

2 − B′

1B2

B1

)−1 ,

whereB1, B2, B3, B′1, B

′2, B

′3 are defined in Appendix D.

Proof. See Appendix D

Remark 1. To use the three series expansions above, we haveto calculate the first four cumulants and moments of the modelunder IBPP and IPPP, which will be presented this in the nextsection.

V. CALCULATION OF THE MOMENTS

As mentioned earlier, the series expansions we developedrequires the cumulants ofY under the alternative hypothesis.To obtain the cumulants we need to calculate the MomentGenerating Function (MGF) of the observationYl|H1, givenby

MYl|H1(t) = MZ1 (t)MZ2 (t) · · ·MZN (t)MWl

(t) .

Calculating the MGF of each of the elements,Zk, as presentedin Lemma 1 for BPP and IPPP, involves the following:

1) IBPP deployment:

MZk(t) = EfZk

[exp(tz)] =

∫w(k)z−2/α−1 exp(tz)

× β

((z−2/α

R

)2−ν

; k +−ν

1− ν,Ni − k + 1

)dz,

where

w(k) =2(2− ν)

αR

Γ(k + 1−ν

2−ν

)Γ(NB + 1)

Γ(k)Γ(NB + 1−ν

2−ν + 1) .

2) IPPP deployment:

MZk(t) = Ef(Zk) [exp(tZ)] =

∫(2π)k

Γ(k)(2− ν)k−1

×(2

α

)z−2/α((2−ν)k)−1 exp(− 2π

2− νz−2/α(2−ν))dz.

Solving both integral directly is difficult. Instead, an equivalentsolution can be obtained by calculating them-th moment forZk and then deriving the MGF based on the moments.Theorem 4. Them-th moment ofZk is given by:

1) BPP deployment:

E [Zmk ] =

R−mα/2 Γ(NB+1)Γ(k− mα

2(2−ν) )Γ(k)Γ(NB− mα

2(2−ν)+1)

, k − mα2(2−ν) /∈ Z≤0

∞, otherwise

2) IPPP deployment:

E [Zmk ] =

(ν+22π

)− αm2(ν+2)

Γ(k− αm2(ν+2))

Γ(k) , k − αm2(ν+2) /∈ Z≤0

∞, otherwise

Proof. See Appendix E

Page 7: 1 Event Detection in Wireless Sensor Networks in Random … · Event Detection in Wireless Sensor Networks in Random Spatial Sensors Deployments Pengfei Zhang 1, 2, Ido Nevat ,

7Based on the moments, we can calculate the cumulants and

moments.Lemma 5. The first four cumulants ofYl|xs,H1, κi, i =1, 2, 3, 4 are given by:

κ1 =

NB∑

k=1

√P0E [Zk] ,

κ2 =

NB∑

k=1

P0

(E[Z2k

]− (E [Zk])

2)+ σ2

W ,

κ3 =

NB∑

k=1

√P0

3(E[Z3k

]− 3E

[Z2k

]E [Zk] + 2 (E [Zk])

3),

κ4 =

NB∑

k=1

P 20

(E[Z4k

]− 4E

[Z3k

]E [Zk]− 3 (E [Zk])

2)

+(12E

[Z2k

](E [Zk])

2 − 6 (E [Zk])4).

The Moments can be expressed as polynomials of cumulants:

µ1 = κ1,

µ2 = κ2 + κ21,

µ3 = κ3 + 3κ2κ1 + κ31,

µ4 = κ4 + 4κ3κ1 + 3κ22 + 6κ2κ

21 + κ4

1.

Proof. See Appendix F.

Now that we have derived the four cumulants and moments,we use the series expansion methods in Section IV to ap-proximatepYl

(y|xs,H1) and derive the LRT in (4). Finally,the Event Detection algorithm under FBPP is presented inAlgorithm 1.

Algorithm 1 Event Detection in Sensor Networks with Ran-dom DeploymentInput: Yl, γ, NB, R, ν, α, σw

Output: Binary decision (H1, H0)

1) Calculate the first four moments according to Theorem4.

2) Calculateκi andµi according the Lemma 5.3) Perform S-K region analysis to assess the appropri-

ateness of each of the series expansions according toLemma 3, Lemma 4 and Theorem 3.

4) Choose the series expansion for which the S-K point isinside the K-S region.

5) Evaluate the series expansion chosen in Section IV tofind pYl

(y|xs,H1) according to (6).6) CalculateΛ(Yl) via (4) and compare to the thresholdγ.

VI. SIMULATION RESULTS

We present the performance of the proposed algorithmsvia Monte Carlo simulations. In particular we present thefollowings:

1) Moment calculation accuracy: the series expansionswe develop are based on fourth order moments andcumulants. Hence it is important to verify the accuracy

0 1 2 3 4 5 6 7 8 9100

0.1

0.2

0.3

0.4

0.5

0.6

First

Mome

nt

Sensor Number

Monte CarloTheory

0 1 2 3 4 5 6 7 8 9100

0.1

0.2

Seco

nd M

omen

t

Sensor Number

Monte CarloTheory

0 1 2 3 4 5 6 7 8 9100

0.1

0.2

Third

Mom

ent

Sensor Number

Monte CarloTheory

0 1 2 3 4 5 6 7 8 9100

0.1

Forth

Mom

ent

Sensor Number

Monte CarloTheory

(a) Homogenous BPP deployments. The parameters used:R = 100, α =

0.5, N = 10, ν = 0, 0.5.

0 1 2 3 4 5 6 7 8 9100.3

0.35

0.4

0.45

0.5

0.55

First

Mome

nt

Sensor Number

Monte CarloTheory

0 1 2 3 4 5 6 7 8 9100.1

0.12

0.14

0.16

0.18

0.2

0.22

0.24

0.26

0.28

Seco

nd M

omen

t

Sensor Number

Monte CarloTheory

0 1 2 3 4 5 6 7 8 9100.02

0.04

0.06

0.08

0.1

0.12

0.14

0.16

0.18

0.2

Third

Mom

ent

Sensor Number

Monte CarloTheory

0 1 2 3 4 5 6 7 8 9100

0.02

0.04

0.06

0.08

0.1

0.12

Forth

Mom

ent

Sensor Number

Monte CarloTheory

(b) Non-homogeneous BPP deployments. The parameters used:R =

100, α = 0.5, ν = 0, 0.5

Fig. 2: Comparison of the theoretical results of the first fourmoments per Theorem 4 and the corresponding Monte Carlosimulation results under BPP type deployment.

of the results which are based on the results derived inTheorem 1, Lemma 1, Theorem 4 and Lemma 5.

2) Positivity regions of the estimated density: we char-acterise the regions at which the density has positivesupport, based on Lemma 3, Lemma 4 and Theorem 3.We then show the implications of not choosing thecorrect series expansion.

3) Detection performance: we present the detection andfalse alarm probability via Receiver Operating Charac-teristics (ROC) curves under different scenarios.

The simulations setting is as follows: the results are ob-tained from50, 000 realizations for a given parameter set ofN, σw, ν, P0, R, α. The additive noise is assumed to be i.i.dGaussian distributed at each sensor.

A. Moments calculation

Figs. 2-3 present comparison of theoretical moments (The-orem 4) and Monte Carlo simulations for BPP and PPP,respectively. For both cases we consider both homogeneousand non-homogenous deployments. For both BPP and PPP ho-mogeneous deployments, the results show perfect agreement.For non-homogenous PPP, the result slightly disagrees. Thisis due to the generation of non-homogenous PPP. Specifically,

Remark 2. Given λ(x) = x−ν , within W , the expectednumber of points,E [W ] is calculated below:

E [W ] =

W

λ(x)dx =

∫ R

0

x−ν2πxdx =2π

ν + 2Rν+2

According to [40], pdf ofx is shown asg(x) = λxE[W ] =

rν(ν+2)2πRν+2 . Given a smallε, the range ofg(x) is given by[ν+22πR2 ,

εν(ν+2)2πRν+2

]. One way to generate the non-homogenous

BPP is to use the accept and reject method. The procedure togenerate NFBPP is below:

Page 8: 1 Event Detection in Wireless Sensor Networks in Random … · Event Detection in Wireless Sensor Networks in Random Spatial Sensors Deployments Pengfei Zhang 1, 2, Ido Nevat ,

8

0 1 2 3 4 5 6 7 8 9100.8

0.9

1

1.1

1.2

1.3

1.4

1.5

First

Mome

nt

Sensor Number

Monte CarloTheory

0 1 2 3 4 5 6 7 8 910

0.8

1

1.2

1.4

1.6

1.8

2

2.2

Seco

nd M

omen

t

Sensor Number

Monte CarloTheory

0 1 2 3 4 5 6 7 8 9100.5

1

1.5

2

2.5

3

3.5

4

Third

Mom

ent

Sensor Number

Monte CarloTheory

0 1 2 3 4 5 6 7 8 9100

1

2

3

4

5

6

7

Forth

Mom

ent

Sensor Number

Monte CarloTheory

(a) Homogeneous PPP deployments. The parameters used:R = 100, α =

0.5, N = 10, ν = 0, 0.5.

0 1 2 3 4 5 6 7 8 9100.8

0.9

1

1.1

1.2

1.3

1.4

1.5

First

Mome

nt

Sensor Number

Monte CarloTheory

0 1 2 3 4 5 6 7 8 910

0.8

1

1.2

1.4

1.6

1.8

2

2.2

Seco

nd M

omen

t

Sensor Number

Monte CarloTheory

0 1 2 3 4 5 6 7 8 9100.5

1

1.5

2

2.5

3

3.5

4Th

ird M

omen

t

Sensor Number

Monte CarloTheory

0 1 2 3 4 5 6 7 8 9100

1

2

3

4

5

6

7

Forth

Mom

ent

Sensor Number

Monte CarloTheory

(b) Non-homogeneous PPP deployments. The parameters used:R =

100, α = 0.5, ν = 0, 0.5Fig. 3: Comparison of the theoretical results of the first fourmoments per Theorem 4 and the corresponding Monte Carlosimulations under PPP type deployments

1) GenerateNs points within W , Ns should be largeenough.

2) Within theseNs, randomly selectsN points with prob-ability λ(x)

εc .

The value ofε will affect the approximation of theoreticalmoments. The smallerε, the better the approximation, how-ever, the more difficult to generate the points inside the region.In the simulation we selectε = 0.5.

B. Comparison of Critical Region

When the sensors are located close to the center of theregion, the empirical sample density and estimated densitydonot agree. This is because those points close to the centermay violate the probability density because they will resultin an inaccurate sample mean. Therefore, we remove a smallhole around the center. We user to represent the radius ofthe hole, which we call critical region. Figure 4a shows theeffect of removing those points for different critical regionsizes. In particular, we varyr ∈ 0.1, 0.5, 1, 5. We alsocompare the accuracy of series expansion methods with respectto differentr. Fig. 4b clearly shows the effect thatr has on theapproximation for all three series expansion methods. Fig 4bshowS the probability density function (PDF) for differentvalues ofr. From extensive numerical experiments, we havefound that the choicer = 5 yields accurate approximationsfor a range of moments and will be used in all simulations.

C. Marginal likelihood estimation via series expansion andS-K region

As discussed in Section IV, we use the Skew-Kurtosis curveto characterise regions where each of the series expansionwould yield a positive PDF, given set of system parameters.It is therefore a useful tool which helps choose which seriesexpansion to use. In this section, we present several examplesto show how this will affect the approximation under eachseries expansion. The different sets of parameters are presentedin Table I.

−100 0 100−100

−80

−60

−40

−20

0

20

40

60

80

100

x

y

−100 0 100−100

−80

−60

−40

−20

0

20

40

60

80

100

x

y

−100 0 100−100

−80

−60

−40

−20

0

20

40

60

80

100

x

y

−100 0 100−100

−80

−60

−40

−20

0

20

40

60

80

100

x

y

r=5r=1r=0.5

r=0.1

(a) Four different sensor deployments withr = 0.1, 0.5, 1, 5, R =

100, α = 2, ν = 0, σw = 0, P0 = 1, θ = 2, η = 2.

0 1 2−20

−10

0

10

20

30

40

y

probab

ility de

nsity f

unction

0 1 2−4

−2

0

2

4

6

8

y

probab

ility de

nsity f

unction

0 1 2−1

0

1

2

3

4

5

y

probab

ility de

nsity f

unction

0 1 2−0.5

0

0.5

1

1.5

2

2.5

3

3.5

4

y

probab

ility de

nsity f

unction

Gram−ChalierGamma−LaguerreBeta−JacobiMonte Carlo

(b) PDF estimation via Gram-Charlier, Gamma-Laguerre and Beta-Jacobi andMonte Carlo simulation.Fig. 4: Effect of critical region on marginal likelihood estima-tion as a function of the critical region

−4 −2 0 2 4−6

−4

−2

0

2

4

6

8

Skew

Kurto

sis

4 5 6 7 8 9

x 10−5

0

1

2

3

4

5

6

7x 10

−6

Skew

Kurto

sis

0.0435 0.044 0.0445 0.045 0.0455 0.046 0.04650.015

0.0155

0.016

0.0165

0.017

0.0175

0.018

0.0185

0.019

Skew

Kurto

sis

SK Point

SK Point SK Point

(a) Skew-Kurtosis curves

−4 −2 0 2 40

0.05

0.1

0.15

0.2

0.25

0.3

0.35

0.4

y

Prob

abilit

y den

sity f

uncti

on

Gram−ChalierMonto Carlo

0 0.05 0.1 0.15 0.2−10

0

10

20

30

40

50

y

Prob

abilit

y den

sity f

uncti

on

Gram−ChalierMonte Carlo

0 0.2 0.4 0.6 0.8 1−1

0

1

2

3

4

5

6

7

8

y

Prob

abilit

y den

sity f

uncti

on

Gram−ChalierMonte Carlo

Negative Support Region

(b) PDF estimation vs. Monte Carlo simulationFig. 5: Gram-Charlier series expansion for two different sys-tem parameters presented in Table I.

1) Gram-Charlier series expansion:In Fig. 5 we plot theS-K curve and PDF Gram-Charlier series expansion estimationfor three different sets of system parameters. The three setsof system parameters generate three different Skew-Kurtosisvalues, represented by the red dot in each of the figures. Inthe left figure, the S-K point falls at the region that satisfiesthe conditions in Lemma 3, while the other two do no satisfythe condition, which results in poor estimation of the PDF.This illustration shows the ability of the Gram-Charlier seriesexpansion to accurately approximate the true distribution,depending on system parameters. It is clearly shown that forlow SNR case, the approximation is good, but for high SNRcase, the approximation has a negative PDF approximation.

2) Gamma-Laguerre series expansion:In Fig. 6 we plot theS-K curve and PDF Gram-Charlier series expansion estimationfor three different sets of system parameters. In contrast withGram-Charlier series expansion, it is clearly shown that forhigh SNR, the approximation is good. However, for lowSNR, the approximation is not very accurate. This is because

Page 9: 1 Event Detection in Wireless Sensor Networks in Random … · Event Detection in Wireless Sensor Networks in Random Spatial Sensors Deployments Pengfei Zhang 1, 2, Ido Nevat ,

9Gram Charlier Gamma Laguerre Beta Jacobi

Parameters Set1 Set2 Set3 Set1 Set2 Set3 Set1 Set2 Set3

R 100 100 100 100 100 100 100 100 100

P0 1 1 1 1 1 1 1 1 1

N 50 10 10 10 10 10 10 10 10

α 2 2 1.5 2.5 1.7 3 2.5 1.7 3

ν 0 0 0.6 0 0 0 0 0 0

σw 0 0 0.4 1 0 0.4 1 0 0.4

TABLE I

8 8.5 9 9.5

x 10−3

1.4

1.6

1.8

2

2.2

2.4

2.6x 10

−3

Skew

Kurto

sis

0 0.5 1 1.5 2−4

−2

0

2

4

6

8

10

Skew

Kurto

sis

0.94 0.945 0.95 0.955 0.960.93

0.94

0.95

0.96

0.97

0.98

0.99

Skew

Kurto

sis

SK Point

SK Point

SK Point

(a) Skew-Kurtosis curves

0 0.2 0.4 0.6 0.8−2

0

2

4

6

8

10

12

y

Probab

ility de

nsity f

unction

Gamma−LaguerreMonto−Carlo

−1 0 1 2 3−0.2

0

0.2

0.4

0.6

0.8

1

1.2

1.4

1.6

y

Probab

ility de

nsity f

unction

Gamma−LaguerreMonte Carlo

0 0.5 1 1.5 2−0.5

0

0.5

1

1.5

2

2.5

3

3.5

4

y

Probab

ility de

nsity f

unction

Gamma−LaguerreMonte Carlo

(b) PDF estimation vs. Monte Carlo simulationFig. 6: Gamma-Laguerre series expansion for three differentsystem parameters in Table I.

−0.5 0 0.5 1−0.5

−0.4

−0.3

−0.2

−0.1

0

0.1

0.2

Skew

Kurto

sis

2 4 6 8 10 12−20

−10

0

10

20

30

40

50

Skew

kurto

sis

2 4 6 8 10 12 14−20

−10

0

10

20

30

40

50

Skew

Kurto

sis

SK PointSK Point

SK Point

(a) Skew-Kurtosis curves

−2 −1 0 1 2−0.2

0

0.2

0.4

0.6

0.8

1

1.2

y

Probab

ility de

nsity f

unction

Beta−JacobiMonto−Carlo

−2 0 2 4 6−0.1

0

0.1

0.2

0.3

0.4

0.5

0.6

y

probab

ility de

nsity f

unction

Beta−JacobiMonte Carlo

−2 0 2 4 6−0.1

0

0.1

0.2

0.3

0.4

0.5

0.6

y

Probab

ility de

nsity f

unction

Beta−JacobiMonte Carlo

Negative Support Regions

(b) PDF estimation vs. Monte Carlo simulationFig. 7: Beta-Jacobi series expansion for three different systemparameters in Table I.

Gamma-Laguerre series expansion only has positive support.3) Beta-Jacobi series expansion:In Fig. 6 we plot the S-

K curve and PDF Beta-Jacobi series expansion estimation forthree different sets of system parameters. For all three cases,the approximation is accurate. The only draw back for Beta-Jacobi estimation is the small fluctuations around the tail ofthe density.

D. Event detection performance comparison

We now present the detection performance of the algorithmsvia Receiver Operating characteristics (ROC) for different se-ries expansion methods. We select two representative scenarios

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 10

0.10.20.30.40.50.60.70.80.9

1

False alarm probability

De

te

ctio

n p

ro

ba

bility

Beta−Jacobi series expansion

Gamma−Laguerre series expansion

Gram−Charlier series expansion

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 10

0.10.20.30.40.50.60.70.80.9

1

False alarm probability

De

te

ctio

n p

ro

ba

bility

Beta−Jacobi series expansion

Gamma−Laguerre series expansion

Gram−Charlier series expansion

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 10

0.10.20.30.40.50.60.70.80.9

1

False alarm probability

De

te

ctio

n p

ro

ba

bility

Beta−Jacobi series expansion

Gamma−Laguerre series expansion

Gram−Charlier series expansion

0 1 2 3 4 5 6

x 10−5

−2

0

2

4

6x 10

−6

SkewK

urto

sis

0 0.5 1 1.5 2 2.5 3

x 10−5

−2

0

2

4x 10

−6

Skew

Ku

rto

sis

−2 0 2 4 6 8 10 12

x 10−6

−5

0

5

10

15x 10

−7

Skew

Ku

rto

sis

−0.5 0 0.5 1 1.5 2 2.5

x 10−4

−2

0

2

4

6x 10

−5

Skew

Ku

rto

sis

−1.5 −1 −0.5 0 0.5 1 1.5

x 10−4

−4

−2

0

2

4x 10

−5

SkewK

urto

sis

−2 −1 0 1 2 3

x 10−5

−5

0

5

10x 10

−6

Skew

Ku

rto

sis

0 1 2 3 4 5 6

x 10−4

0

1

2x 10

−4

Skew

Ku

rto

sis

0 1 2 3 4 5 6 7 8

x 10−4

0

1

2x 10

−4

Skew

Ku

rto

sis

0 1 2 3

x 10−4

0

2

4

6

8x 10

−5

SkewK

urto

sis

Fig. 8: ROC curves for the three series expansions for differentvalues of path-loss exponentα = 2, 2.2, 2.4.of high and low SNR to show the direct effect of the S-K curvehas on the performance of the series expansions.

Fig. 8 presents the ROC curve for high SNR,σw = 0.01and various values of the path-loss exponentα = 2, 2.2, 2.4.It can be seen from the ROC curves that Gram-Chalierexpansion performs the worst while our Beta-Jacobi expansionperforms best in these three cases. The S-K curves under eachcase is also plotted. It can be seen from these figures thatthe SK points are located outside the region for the Gram-Chalier expansion, while inside the region for Beta-Jacobiand Gamma-Laguerre expansions. The reason for the poorperformance of Gram-Chalier is that the scenario is of highSNR values. When the additive noise variance is very small,it is difficult for Gram-Chalier to approximate the marginallikelihood under the alternative hypothesis since the supportis quite narrow.

Fig. 9 presents the ROC curve for low SNR,σw = 0.4 andvarious values of the path-loss exponentα = 1.9, 2.1, 2.3. Inthis case our Beta-Jacobi expansion outperforms the Gamma-

Page 10: 1 Event Detection in Wireless Sensor Networks in Random … · Event Detection in Wireless Sensor Networks in Random Spatial Sensors Deployments Pengfei Zhang 1, 2, Ido Nevat ,

10

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 10

0.10.20.30.40.50.60.70.80.9

1

False alarm probability

De

te

ctio

n p

ro

ba

bility

Beta−Jacobi series expansion

Gamma−Laguerre series expansion

Gram−Charlier series expansion

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 10

0.10.20.30.40.50.60.70.80.9

1

False alarm probability

De

te

ctio

n p

ro

ba

bility

Beta−Jacobi series expansion

Gamma−Laguerre series expansion

Gram−Charlier series expansion

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 10

0.10.20.30.40.50.60.70.80.9

1

False alarm probability

De

te

ctio

n p

ro

ba

bility

Beta−Jacobi series expansion

Gamma−Laguerre series expansion

Gram−Charlier series expansion

0.3 0.32 0.34 0.36 0.38 0.40.1

0.2

0.3

0.4

0.5

Skew

Ku

rto

sis

0.12 0.14 0.16 0.18 0.2 0.220

0.05

0.1

0.15

0.2

Skew

Ku

rto

sis

0.04 0.05 0.06 0.07 0.08 0.09 0.1 0.11 0.12−0.05

0

0.05

0.1

0.15

SkewK

urto

sis

0.3 0.32 0.34 0.36 0.38 0.4 0.420

0.2

0.4

0.6

0.8

Skew

Ku

rto

sis

−0.1 −0.05 0 0.05 0.1 0.15 0.2 0.25 0.3−1

−0.5

0

0.5

Skew

Ku

rto

sis

0 0.05 0.1 0.15 0.2 0.25−0.5

0

0.5

1

Skew

Ku

rto

sis

0.2 0.25 0.3 0.35 0.4 0.45−0.2

0

0.2

0.4

0.6

Skew

Ku

rto

sis

0.12 0.14 0.16 0.18 0.2 0.220

0.05

0.1

0.15

0.2

Skew

Ku

rto

sis

0.04 0.05 0.06 0.07 0.08 0.09 0.1 0.11 0.12−0.05

0

0.05

0.1

0.15

Skew

Ku

rto

sis

Fig. 9: ROC curves for the three series expansions for differentvalues of path-loss exponentα = 1.9, 2.1, 2.3.Laguerre expansion and is comparable with the Gram-Chalierexpansion. The system parameters are:N−20, ν = 0.6, σw =0.4, R = 100. α is changing from1.9 to 2.3. It is shown thatGamma-Laguerre performs the worst for these cases. This isbecause when the support of the marginal density has negativevalues, which the Gamma-Laguerre can not obtain. The sameinterpretation can also be found in the S-K curves.

VII. C ONCLUSIONS

We developed new event detection algorithms in WirelessSensor Networks under two types of random spatial deploy-ments. We formulated the problem as a binary hypothesistesting problem and designed optimal decision rule for it. Wederived the marginal densities under two hypothesis. We usedlow complex and high accurate series expansion methods toapproximate the marginal density under alternative hypothesis.We showed the various series expansion methods are practicaland suitable for different practical scenarios. We also usedextensive simulation results to generate the Receiver OperatingCurves (ROC) under different set of parameters. We verifiedthe optimality of the series expansion methods and show theSkew-Kurtosis Curves for each method. Our schemes provideduseful benchmark for other centralized and distributed schemedesigns.

APPENDIX APROOF OFTHEOREM 1

Proof. We begin by calculatingp, as defined in Definition 1.According to [27], assume thatbd (x, r) is contained withinW andW is circle with RadiusR. We then obtain that

p =

bdx,r∩W

λ(x)dx =

∫bd(x,r)

λ(x)dx∫W

λ(x)dx

=

∫ r

0 x−ν2πxdx∫ R

0x−ν2πxdx

=

( r

R

)2−ν

, ν < 2

log r − log ε

logR− log ε, ν = 2

r2−ν − ε2−ν

R2−ν − ε2−ν, ν > 2,

whereε → 0+.Next, utilizing the results in [27], we can find the general

expression for distribution distribution under inhomogeneousdeployment. The procedure is same except that we use theexpression forp from the above equation. For BPP,NB isfinite number. ForIPPP , N is asymptotically+∞. we obtainthe following:BPP deployment:

fRk(r|xs,H1) =

dpdr

(1− p)NB−kpk−1

B(NB − k + 1, k)

=2− ν

R

(1− p)NB−k

pk−1+ 1−ν2−ν

B(NB − k + 1, k)

=2− ν

R

Γ(k + 1−ν

2−ν

)Γ(NB + 1)

Γ(k)Γ(NB + 1−ν

2−ν + 1)

× β(( r

R

)2−ν

; k +1− ν

2− ν,NB − k + 1).

IPPP deployment:

fRk(r|xs, N = NP ,H1) =

2− ν

R

(1− p)N−kpk−1+ 1−ν2−ν

B (N − k + 1, k)

=2− ν

R

(1 − p)N−kpk−1+ 1−ν2−ν Γ (N + 1)

Γ (N − k + 1)Γ (k).

APPENDIX BPROOF OFLEMMA 1

Proof. We utilize the results for transformation of randomvariables [] to obtain:BPP deployment:

fZk(z) = −f

(φ−1 (z)

) dφ−1 (z)

dz

=2(2− ν)

Γ(k + 1−ν

2−ν

)Γ(NB + 1)

Γ(k)Γ(NB + 1−ν

2−ν + 1) z−2/α−1

× β(

(z−2/α

R

)2−ν

; k +1− ν

2− ν,NB − k + 1)

Page 11: 1 Event Detection in Wireless Sensor Networks in Random … · Event Detection in Wireless Sensor Networks in Random Spatial Sensors Deployments Pengfei Zhang 1, 2, Ido Nevat ,

11IPPP deployment deployment:Let z = φ(r) = r−α/2, y ∈ (0,∞). Then

fZk(z) = −fRk

(φ−1 (z)

) dφ−1 (z)

dz

=(2π)k

Γ (k) (2− ν)k−1

(2

α

)z−2/α((2−ν)k)−1

× exp

(2π

2− νz−2/α(2−ν)

).

APPENDIX CPROOF OFTHEOREM 2

Proof. To obtain the coefficientsai, we need to solve thefollowing expression:

ai =B (θ, η) (2i+ θ + η − 1) Γ (i+ θ + η − 1) i!

Γ (i+ θ) Γ (i+ η)

×∫ 1

−1

f (x)P(η−1,θ−1)i (x) dx.

Using the following series expansion:(x− 1

2

)m

=1

2m

m∑

j=0

(m

j

)(−1)m−jxjdx,

and after some algebraic manipulations, we obtain that

ai =

i∑

j=0

µjB(θ, η) (2i+ θ + η − 1) i!

Γ (i+ θ)

×i∑

m=j

Γ (θ + η + i+m− 1)

Γ (i−m+ 1)Γ (η +m)m!2m

(m

j

)(−1)

m−j.

whereµj = E[Xj]=∫ 1

−1 f (x)xjdx.

APPENDIX DPROOF OFTHEOREM 3

Proof. We express the fourth order Beta-Jacobi series expan-sion as follows:

f(x) =(x+ 1)θ−1 (1− x)η−1

B(θ, η)2θ+η−1

4∑

i=0

aiP(η−1,θ−1)i (x)

= B1µ3 +B2µ4 +B3,

where

B1 = (C33P3 + C43P4)(x+ 1)

θ−1(1− x)

η−1

B(θ, η)2θ+η−1,

B2 = C44P4(x+ 1)

θ−1(1− x)

η−1

B(θ, η)2θ+η−1,

B3 =(x+ 1)

θ−1(1− x)

η−1

B(θ, η)2θ+η−1((C30 + C31µ1 + C32µ2)P3)

+(x+ 1)

θ−1(1− x)

η−1

B(θ, η)2θ+η−1

(2∑

i=0

aiPi + (C40 + C41µ1 + C42µ2)P4

),

Cij =B (θ, η) (2i+ θ + η − 1) i!

Γ (i+ θ)

i∑

m=j

(m

j

)(−1)

m−j

× Γ (η + θ + i+m− 1)

Γ (i−m+ 1)Γ (η +m)m!2m,

andµ1 = E [X ] , µ2 = E[X2].

In order to guarantee thatf (x) is positive, we obtain thefollowing set of equationsB1µ3 +B2µ4 +B3 = 0, (f (x) = 0)

B′1µ3 +B′

2µ4 +B′3 = 0, (f ′ (x) = 0)

for x ∈ [−1, 1]

Solving for the Skew and Kurtosis, we obtain that:µ3 (x) = − 1

B1(µ4(x)B2 +B3)

µ4 (x) =(

B′

1B3

B1−B′

3

)(B′

2 − B′

1B2

B1

)−1 , for;x ∈ [−1,+1)

where

B′1 = (C33P

′3 + C43P

′4)(x+ 1)

θ−1(1− x)

η−1

B(θ, η)2θ+η−1

+B1

(θ + 1

x+ 1− η − 1

1− x

),

B′2 = C44P

′4

(x+ 1)θ−1

(1− x)η−1

B(θ, η)2θ+η−1+B2

(θ + 1

x+ 1− η − 1

1− x

),

B′3 =

2∑

i=0

aiP′i + (C3 + C31µ1 + C32µ2)P

′3

+ (C4 + C41µ1 + C42µ2)P′4

(x+ 1)θ−1

(1− x)η−1

B(θ, η)2θ+η−1

+B3

(θ + 1

x+ 1− η − 1

1− x

),

and

P ′0 = 0

P ′i =

Γ (η + i)

Γ(η + θ + i− 1)

×(

i∑

m=1

Γ(η + θ + i+m− 1)

2Γ(i−m+ 1)Γ(η +m)(m− 1)!

(x− 1

2

)m−1)

.

APPENDIX EPROOF OFTHEOREM 4

Proof. 1) BPP deployment:We define the following change of variables:X =(

Z−2/α

R

)2−ν

. We now express them-th moment ofZk

as:

E [Zmk ] =

∫w(k)β

(x; k +

1− ν

2− ν,NB − k + 1

)

×(x− α

2(2−ν)R−α/2)− 2

α+m−1 dx− α2(2−ν)R−α/2

dxdx

= C1

∫ 1

0

1

B(k + 1−ν

2−ν , NB − k + 1)xk− mα

2(2−ν)−1

× (1− x)NB−k dx

= C1

B(k − mα

2(2−ν) , NB − k + 1)

B(k + 1−ν

2−ν , NB − k + 1) ,

Page 12: 1 Event Detection in Wireless Sensor Networks in Random … · Event Detection in Wireless Sensor Networks in Random Spatial Sensors Deployments Pengfei Zhang 1, 2, Ido Nevat ,

12whereB (·) is theβ function and

C1 = R−mα/2Γ(k + 1−ν

2−ν

)Γ(NB + 1)

Γ(k)Γ(NB + 1−ν

2−ν + 1) .

Finally we obtain that

E[Zmkl

]= R−mα/2

Γ (NB + 1)Γ(k − mα

2(2−ν)

)

Γ (k) Γ(NB − mα

2(2−ν) + 1) .

2) IPPP deployment: We express them-th moment asfollows:

E[Zmk ] =

∫ ∞

0

zmfZk(z)dz

=2

α

(2π)k

Γ(k)(2− ν)k−1

∫ ∞

0

zm−2(2−ν)k/α−1

× exp(− 2π

2− νz−2/α(c+2))dz.

Using the identityΓ (t) =∫∞0

xt−1 exp−x dx, and usingthe following change of variablesX = 2π

c+2Z−2/α(2−ν),

we obtain that

E [Zmk ] =

2

α

(2π)k

Γ (k) (2− ν)k−1

α

2 (2− ν)

(2− ν

)− αm2(2−ν)

+k

×∫ +∞

0

exp (−x)xk− αm2(2−ν)

−1dx

=

(2− ν

)− αm2(2−ν) Γ

(k − αm

2(2−ν)

)

Γ (k).

APPENDIX FPROOF OFLEMMA 5

Proof. 1) BPP deployments:Using the result in Theorem 4, MGF ofZk is given by:

MZk(t) = 1 +

∞∑

m=1

tm

m!R−mα/2

Γ(NB + 1)Γ(k − mα

2(2−ν)

)

Γ(k)Γ(NB − mα

2(2−ν) + 1)

Due to the conditional independence ofZk, and that theMGF of Wl is given byMWl

(t) = exp(12σ2wlt2), we

have that

MYl(t) =

NB∏

k=1

MZk(t)MWl

(t)

=

NB∏

k=1

1 +

∞∑

m=1

(√P0t)

m

m!R−mα/2

Γ(NB + 1)Γ(k − mα

2(2−ν)

)

Γ(k)Γ(NB − mα

2(2−ν) + 1)

× e12σ

2W t2 .

2) IPPP deployments:Using the result in Theorem 4, MGF ofZk is given by:

MZk(t) = 1 +

∞∑

m=1

tm

m!

(2− ν

)− αm2(2−ν) Γ

(k − αm

2(2−ν)

)

Γ(k)

Using the same procedure as before, we obtain that

MYl(t)

=

NP∏

k=1

1 +

∞∑

m=1

(√P0t)

m

m!

(2− ν

)− αm2(2−ν) Γ

(k − αm

2(2−ν)

)

Γ(k)

× σ2W t2.

In order to derive cumulants and moments, first we find thecumulant functiong (t) under both deployments.

1) BPP deployment:

g (t) = logMYl(t)

=

NB∑

k=1

log

(1 +

∞∑

m=1

(√P0t)

m

m!R−α

2 mh(k)

)+

1

2σ2wt

2,

where

h(k) := R−mα/2Γ(NB + 1)Γ

(k − mα

2(2−ν)

)

Γ(k)Γ(NB − mα

2(2−ν) + 1) .

Next we obtain the first cumulantκ1 as follows:

κ1 =dg (t)

dt|t=0

=

NB∑

k=1

√P0t

0

1 h(k) +∑∞

m=2 m(√P0)

mtm−1

m! h(k)

1 +∑∞

m=1(√P0t)m

m! h(k)|t=0 + σ2

W t|t=0

=

NB∑

k=1

√P0h(k)

=

NB∑

k=1

√P0E [Zk] .

Similarly, by taking the second, third and forth derivativeof g (t). We next find theκ2, κ3 and κ4 as shown inTheorem 5.

2) IPPP deployment:κ1, κ2, κ3 andκ4 are in the same form as in BPP de-ployment using the appropriate values for the moments.

REFERENCES

[1] A. Kottas, Z. Wang, and A. Rodrguez, “Spatial modeling for riskassessment of extreme values from environmental time series: a bayesiannonparametric approach,”Environmetrics, vol. 23, no. 8, pp. 649–662,2012.

[2] C. Fonseca and H. Ferreira, “Stability and contagion measures for spatialextreme value analyses,”arXiv preprint arXiv:1206.1228, 2012.

[3] J. P. French and S. R. Sain, “Spatio-temporal exceedancelocations andconfidence regions,”Annals of Applied Statistics. Prepress, 2013.

[4] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wirelesssensor networks: a survey,”Computer networks, vol. 38, no. 4, pp. 393–422, 2002.

[5] G. Anastasi, M. Conti, M. Di Francesco, and A. Passarella, “Energyconservation in wireless sensor networks: A survey,”Ad Hoc Networks,vol. 7, no. 3, pp. 537–568, 2009.

[6] F. Fazel, M. Fazel, and M. Stojanovic, “Random access sensor networks:Field reconstruction from incomplete data,” inIEEE Information Theoryand Applications Workshop (ITA), 2012, pp. 300–305.

[7] J. Matamoros, F. Fabbri, C. Anton-Haro, and D. Dardari,“On theestimation of randomly sampled 2d spatial fields under bandwidthconstraints,”IEEE Transactions on Wireless Communications,, vol. 10,no. 12, pp. 4184–4192, 2011.

Page 13: 1 Event Detection in Wireless Sensor Networks in Random … · Event Detection in Wireless Sensor Networks in Random Spatial Sensors Deployments Pengfei Zhang 1, 2, Ido Nevat ,

13[8] R. Viswanathan and P. K. Varshney, “Distributed detection with multiple

sensors i. fundamentals,”Proceedings of the IEEE, vol. 85, no. 1, pp.54–63, 1997.

[9] J.-J. Xiao and Z.-Q. Luo, “Universal decentralized detection in abandwidth-constrained sensor network,”IEEE Transactions on SignalProcessing,, vol. 53, no. 8, pp. 2617–2624, 2005.

[10] T. Aysal and K. Barner, “Constrained decentralized estimation over noisychannels for sensor networks,”IEEE Transactions on Signal Processing,,vol. 56, no. 4, pp. 1398–1410, 2008.

[11] M. Zhu, S. Ding, Q. Wu, R. R. Brooks, N. S. Rao, and S. S.Iyengar, “Fusion of threshold rules for target detection inwireless sensornetworks,”ACM Transactions on Sensor Networks (TOSN), vol. 6, no. 2,p. 18, 2010.

[12] M. Guerriero, L. Svensson, and P. Willett, “Bayesian data fusion fordistributed target detection in sensor networks,”IEEE Transactions onSignal Processing,, vol. 58, no. 6, pp. 3417–3421, 2010.

[13] J.-F. Chamberland and V. V. Veeravalli, “Wireless sensors in distributeddetection applications,”IEEE Signal Processing Magazine,, vol. 24,no. 3, pp. 16–25, 2007.

[14] X. Zhang, H. Poor, and M. Chiang, “Optimal power allocation fordistributed detection over mimo channels in wireless sensor networks,”IEEE Transactions on Signal Processing,, vol. 56, no. 9, pp. 4124–4140,2008.

[15] P. Zhang, J. Y. Koh, S. Lin, and I. Nevat, “Distributed event detectionunder byzantine attack in wireless sensor networks,” inIntelligentSensors, Sensor Networks and Information Processing (ISSNIP), 2014IEEE Ninth International Conference on. IEEE, 2014, pp. 1–6.

[16] D. Ciuonzo, G. Romano, and P. Rossi, “Performance analysis and designof maximum ratio combining in channel-aware mimo decision fusion,”IEEE Transactions on Wireless Communications,, vol. 12, no. 9, pp.4716–4728, 2013.

[17] I. Nevat, G. W. Peters, and I. Collings, “Distributed detection in sensornetworks over fading channels with multiple antennas at thefusioncentre,” IEEE Transactions on Signal Processing, vol. 62, no. 3, pp.671–683, 2014.

[18] P. Karumbu, V. K. Prasanthi, and A. Kumar, “Delay optimal eventdetection on ad hoc wireless sensor networks,”ACM Transactions onSensor Networks (TOSN), vol. 8, no. 2, p. 12, 2012.

[19] D. Bajovic, B. Sinopoli, and J. Xavier, “Sensor selection for event detec-tion in wireless sensor networks,”Signal Processing, IEEE Transactionson, vol. 59, no. 10, pp. 4938–4953, 2011.

[20] Y. Taniguchi, T. Kitani, and K. Leibnitz, “A uniform airdrop deploymentmethod for large-scale wireless sensor networks,”International Journalof Sensor Networks, vol. 9, no. 3, pp. 182–191, 2011.

[21] F. Oldewurtel and P. Mahonen, “Analysis of enhanced deploymentmodels for sensor networks,” inVehicular Technology Conference (VTC2010-Spring), 2010 IEEE 71st. IEEE, 2010, pp. 1–5.

[22] “Preserving privacy in participatory sensing systems,” Computer Com-munications, vol. 33, no. 11, pp. 1266 – 1280, 2010.

[23] J. G. Andrews, F. Baccelli, and R. K. Ganti, “A tractableapproachto coverage and rate in cellular networks,”Communications, IEEETransactions on, vol. 59, no. 11, pp. 3122–3134, 2011.

[24] J. G. Andrews, R. K. Ganti, M. Haenggi, N. Jindal, and S. Weber,“A primer on spatial modeling and analysis in wireless networks,”Communications Magazine, IEEE, vol. 48, no. 11, pp. 156–163, 2010.

[25] Y. Cho, A. Galstyan, J. Brantingham, and G. Tita, “Generative modelsfor spatial-temporal processes with applications to predictive criminol-ogy,” 2012.

[26] M. C. Guenther and J. T. Bradley, “On performance of gossip commu-nication in a crowd-sensing scenario.”

[27] M. Haenggi, “On distances in uniformly random networks,” IEEETransactions on Information Theory,, vol. 51, no. 10, pp. 3584–3586,Oct 2005.

[28] D. Moltchanov, “Distance distributions in random networks,” Ad HocNetworks, vol. 10, no. 6, pp. 1146 – 1166, 2012. [Online]. Available:http://www.sciencedirect.com/science/article/pii/S1570870512000224

[29] H. ElSawy, E. Hossain, and M. Haenggi, “Stochastic geometry formodeling, analysis, and design of multi-tier and cognitivecellularwireless networks: A survey,”Communications Surveys & Tutorials,IEEE, vol. 15, no. 3, pp. 996–1019, 2013.

[30] Z. Gong and M. Haenggi, “Interference and outage in mobile randomnetworks: Expectation, distribution, and correlation,”Mobile Computing,IEEE Transactions on, vol. 13, no. 2, pp. 337–349, 2014.

[31] J.-F. Chamberland and V. V. Veeravalli, “How dense should a sensornetwork be for detection with correlated observations?”InformationTheory, IEEE Transactions on, vol. 52, no. 11, pp. 5099–5106, 2006.

[32] E. Jondeau and M. Rockinger, “Gram charlier densities,” Journal ofEconomic Dynamics and Control, vol. 25, no. 10, pp. 1457 – 1483,2001. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0165188999000822

[33] R. S. Targino, G. W. Peters, G. Sofronov, and P. V. Shevchenko,“Optimal insurance purchase strategies via optimal multiple stoppingtimes,” arXiv preprint arXiv:1312.0424, 2013.

[34] “Spatial point processes and their applications,” vol. 1892,pp. 1–75, 2007. [Online]. Available: http://dx.doi.org/10.1007/978-3-540-38175-41

[35] S. Srinivasa and M. Haenggi, “Distance distributions in finite uniformlyrandom networks: Theory and applications,”Vehicular Technology, IEEETransactions on, vol. 59, no. 2, pp. 940–949, Feb 2010.

[36] H. Van Trees,Detection, estimation, and modulation theory.. part 1,.detection, estimation, and linear modulation theory. Wiley New York,1968.

[37] S. Kay, Fundamentals of Statistical Signal Processing, Volume 2:Detection Theory. Prentice Hall PTR, 1998.

[38] R. Askey and J. A. Wilson,Some basic hypergeometric orthogonal poly-nomials that generalize Jacobi polynomials. American MathematicalSoc., 1985, vol. 319.

[39] M. G. Cruz, G. W. Peters, and P. V. Shevchenko,Fundamental aspectsof operational risk and insurance analytics. Wiley, 2014.

[40] D. P. Kroese and Z. I. Botev, “Spatial process generation,” arXiv preprintarXiv:1308.0399, 2013.