A WIRELESS PERIMETER PROTECTION AND INTRUSION DETECTION SYSTEM

被引:3
|
作者
Libby, Vibeke [1 ]
机构
[1] Lockheed Martin Adv Technol Ctr, Palo Alto, CA 94062 USA
关键词
RF; Wireless; Perimeter Protection; Volumetric; Hidden Object Detection; Long Range; Real-time Intrusion Detection; Camera Cueing;
D O I
10.1109/CCST.2010.5678669
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Sensor systems with volumetric coverage of large areas are in high demand for general infrastructure protection. This paper describes a radio frequency communication system that allows for real-time evaluation of changes to established field patterns for the purpose of locating and tracking unwanted intruders. It is based on high confidence probabilistic algorithms and protocols that sample the environment every second. The protocols are implemented in firmware making the system capable of detecting disturbances in real-time. During a field test, system calibration and sensor performance were recorded, mapped, and displayed in a control room. For example, it is possible to simultaneous locate and track single and multiple intruders in a protected area of 100,000 square feet with a single unit. Left behind items and people in hiding are easily detected and all intrusions are verified by an automatically cued camera. The system described here is extremely effective where most fence-based systems fail.
引用
收藏
页码:364 / 368
页数:5
相关论文
共 50 条
  • [31] A Hierarchical Intrusion Detection System in Wireless Sensor Networks
    Islam, Md. Safiqul
    Khan, Razib Hayat
    Bappy, Dewan Muhammad
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (08): : 21 - 26
  • [32] Perimeter detection in wireless sensor networks
    Luthy, Kyle
    Grant, Edward
    Deshpande, Nikhil
    Henderson, Thomas C.
    [J]. ROBOTICS AND AUTONOMOUS SYSTEMS, 2012, 60 (02) : 266 - 277
  • [33] Component field testing for SWPIDS: a shallow-water perimeter intrusion detection system
    Burnett, David C.
    Sheaffer, Donald, Jr.
    [J]. FIBER OPTIC SENSORS AND APPLICATIONS VII, 2010, 7677
  • [34] Perimeter Intrusion Detection Based on Intelligent Video Analysis
    Zhang, Yong-Liang
    Zhang, Zhi-Qin
    Xiao, Gang
    Wang, Rui-Dong
    He, Xia
    [J]. 2015 15TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS (ICCAS), 2015, : 1199 - 1204
  • [35] Simulation of a modified dual Mach-Zehnder interferometric perimeter intrusion detection system
    Lin, Yu-Tang
    Jong, Tai-Lang
    Hsieh, Chi-Wen
    [J]. PROCEEDINGS OF THE 2018 7TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE), 2018, : 83 - 88
  • [36] Enhanced Perimeter Intrusion Detection System (PIDS) - Resilient to Environmental Variations for Military Applications
    Ravindranath, K., V
    Khan, Irfan Ahmad
    [J]. 18TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE, SYSCON 2024, 2024,
  • [37] Wireless Intrusion Detection: Not as easy as traditional network intrusion detection
    Tao, Zhiqi
    Ruighaver, A. B.
    [J]. TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, 2006, : 2513 - +
  • [38] Low - Cost Perimeter Intrusion Radar System Development
    Inanc, Ahmet
    Sahin, Asaf Behzat
    [J]. 2020 7TH INTERNATIONAL CONFERENCE ON ELECTRICAL AND ELECTRONICS ENGINEERING (ICEEE 2020), 2020, : 206 - 210
  • [39] A Global Hybrid Intrusion Detection System for Wireless Sensor Networks
    Maleh, Yassine
    Ezzati, Abdellah
    Qasmaoui, Youssef
    Mbida, Mohamed
    [J]. 6TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2015), THE 5TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2015), 2015, 52 : 1047 - 1052
  • [40] Design and implementation of an embedded intrusion detection system for wireless applications
    Ali, Q. I.
    Iazim, S.
    [J]. IET INFORMATION SECURITY, 2012, 6 (03) : 171 - 182