CN103458413A - Method for intrusion detection based on wireless signal characters - Google Patents
Method for intrusion detection based on wireless signal characters Download PDFInfo
- Publication number
- CN103458413A CN103458413A CN2013102053051A CN201310205305A CN103458413A CN 103458413 A CN103458413 A CN 103458413A CN 2013102053051 A CN2013102053051 A CN 2013102053051A CN 201310205305 A CN201310205305 A CN 201310205305A CN 103458413 A CN103458413 A CN 103458413A
- Authority
- CN
- China
- Prior art keywords
- wireless
- centerdot
- intrusion detection
- prime
- intrusion
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Burglar Alarm Systems (AREA)
Abstract
The invention relates to a method for intrusion detection based on wireless signal characters, and belongs to the field of security and protection technology and wireless network application. According to the method for the intrusion detection, the state that whether object intrusion exists or not can be detected through the influence on the wireless link signal strength from an intrusion object. According to the intrusion detection algorithm, the signal strength information of all wireless links serves as input information, whether intrusion exists or not can be detected through the two-dimensional statistical properties of the mean value and the variance of the signal strength information. A system in which the method is adopted is composed of wireless scanning nodes, a wireless aggregation node, a general PC and the intrusion detection algorithm. The intrusion detection algorithm is installed in the general PC, and the wireless scanning nodes, the wireless aggregation node and the general PC are communicated wirelessly. The method is suitable for intrusion detection at wall shielding, dark environment and other severe environments. Whether a target intrudes or not can be detected through the change, caused by the fact that the intrusion object shields a wireless signal, of the wireless link signal strength.
Description
Technical field
The invention belongs to security and guard technology, wireless network application, relate to a kind of intrusion detection method based on the wireless signal feature.
Background technology
Intrusion Detection Technique has a wide range of applications in fields such as border monitoring, bank's monitoring, nucleus monitorings.Along with social development, people are more and more higher to the concern of safety, can predict in the near future, and Intrusion Detection Technique will be used widely in military affairs, industry and our daily life.
The Intrusion Detection Technique extensively adopted at present is based on the detection technique of camera, numerous scholars are to utilizing camera, based on image processing techniques, realizing that intrusion detection conducts in-depth research, as: Zhu J, Lao Y, " Object tracking in structured environments for video surveillance applications " Deng the people, IEEE Transactions on Circuits and Systems for Video Technology, 2010, the 20th volume, the 2nd phase, the P223-235 page.But system layout is more loaded down with trivial details, intruding detection system needs light condition well and can't realize that simultaneously, image processing techniques relates to privacy concern, inapplicable in some monitoring occasion to the penetrating of body of wall etc.In recent years, along with the development of wireless technology, make to utilize the wireless measurement between radio node cheaply to realize that intrusion detection becomes possibility.Due to the inherent characteristic of electric wave, when there being intrusion object to cause while covering certain wireless links, the received signal strength information potential of this link must change.Based on this, when having multi wireless links to exist, by the received signal strength information of each wireless link, can realize whether there being the object invasion to judge in the wireless link overlay area simultaneously.
With traditional intrusion detection method based on camera, compare, because radio node can cover larger zone, so the Intrusion Detection Technique based on the wireless signal feature can complete the security monitor to large scene; Because the radio node cost is lower, so the Intrusion Detection Technique based on the wireless signal feature can be in the application of the field of numerous cost sensitivities; Because wireless signal can penetrate veil, so the Intrusion Detection Technique based on the wireless signal feature can be applied under the scene more at indoor barrier; Because radio node is insensitive to illumination, humiture, so the field that the Intrusion Detection Technique based on the wireless signal feature can be more severe in environmental condition application.These characteristics has determined that the Intrusion Detection Technique based on the wireless signal feature has application prospect more widely.
Summary of the invention
The objective of the invention is to overcome the defect of prior art, invent a kind of intrusion detection method based on the wireless signal feature, with the wireless measurement signal between radio node as metrical information, adopt intrusion detection algorithm to detect the impact of intrusion object on the wireless measurement signal, the variation of the wireless link signals intensity covering of wireless signal caused according to intrusion object, realize whether the detection of target invasion is arranged.
Technical scheme of the present invention is a kind of intrusion detection method based on the wireless signal feature, intrusion detection algorithm is to utilize the impact of intrusion object on wireless link signals intensity, whether realization to there being the state-detection of object invasion, it is input message that intrusion detection algorithm be take the signal strength information of each wireless links, utilize its average, variance Two-dimensional Statistical Characteristics Detection whether to have invasion to occur, when the amplitude changed when the two-dimensional space characteristic information is greater than certain threshold value, judgement has the object invasion, and concrete steps are as follows:
A) N wireless scan node J1, J2, JN is placed on four limits of intrusion object 3 outer rectangular areas, every limit keeps at a certain distance away and places a wireless scan node, wireless aggregation node 1, general purpose PC 2 are placed on monitored area on one side or in inside, monitored area, carry out radio communication between wireless scan node, each node sends wireless signal successively, and other node receives wireless signal and records received signal strength;
B) wireless aggregation node 1 collects by wireless mode the wireless link signals strength information that all wireless scan nodes measure; Simultaneously, the information of collection is sent to general purpose PC 2;
C) on general purpose PC 2, the intrusion detection algorithm of operation is realized whether the detection of object invasion is arranged according to the wireless link strength information; Algorithm is usingd wireless link received signal strength information as input message, the intrusion target position of output estimation; Average, the variance Two-dimensional Statistical characteristic of intrusion detection algorithm based on wireless link signals intensity realizes intrusion detection; Suppose between each wireless scan node to form the n wireless links, obtain respectively in t-1 and the t moment eigenmatrix A and B that average m and variance v by this n wireless links received signal strength form as follows:
Wherein, the average m that eigenmatrix A and B have comprised wireless link signals intensity and variance v feature, m
n1and v
n2represent respectively signal strength signal intensity average and the variance of n wireless links; In intrusion detection algorithm calculated characteristics matrix A and B, to obtain similarity matrix C as follows for the big or small similarity degree of corresponding element value:
Wherein, m
n1-m'
n1represented the difference of the average of n bar link, v
n1-v'
n1represented the difference of the variance of n bar link, d
nrepresented the length of n bar link.When each element sum of similarity matrix C is greater than the threshold value of setting, intrusion detection algorithm will be judged the object invasion.
The system that this intrusion detection method adopts is by wireless scan node J1, J2, JN, wireless aggregation node 1, general purpose PC 2 and intrusion detection algorithm form, and intrusion detection algorithm is arranged in general purpose PC 2, between wireless scan node, wireless aggregation node, general purpose PC, carries out radio communication.
Beneficial effect of the present invention is: 1) can utilize the wireless measurement signal to realize whether the judgement of object invasion is arranged; 2) can utilize the radio node of a large amount of cheapnesss to realize fast the intrusion detection of scene on a large scale; 3) size, illumination condition, the condition of covering that detects scene do not had to particular requirement; 4) do not relate to privacy concern; 5) utilize multi wireless links to be detected, improved the robustness of detection system.
The accompanying drawing explanation
Fig. 1 is system architecture diagram of the present invention.In figure: J1 to J8 is wireless scan node, and 1 is wireless aggregation node; 2 is general purpose PC, the operation intrusion detection algorithm; 3 is intrusion object.
Fig. 2 intrusion detection algorithm flow process.
Embodiment
Elaborate the present invention below in conjunction with concrete technical scheme and accompanying drawing, but the present invention is not limited to specific embodiment.Embodiment: as shown in Figure 1, the system that this intrusion detection method adopts is comprised of wireless scan node, wireless aggregation node, general purpose PC, intrusion detection algorithm.System arranges 8 wireless scan node J1, J2 ... J8 and wireless aggregation node 1 be the wireless module design based on being operated in 433MHz all, transmitting power 20dBm, antenna gain 1dB.Wireless scan node J1, J2 ... four ,Mei Bian interval, the limit 5m that J8 is placed on 10m * 10m rectangular area place a wireless scan node, and placing height is 1m.Wireless aggregation node 1, PC 2 are placed on monitored area on one side or in inside, monitored area, the wireless scan node J1 of distance, and J2 ... in J8100m.Wireless scan node J1 ... J8 forms queue, sends successively wireless signal, other wireless signal that the wireless scan node reception current time sending node of transmitted signal does not send, and measure received signal strength information.Wireless aggregation node 1 is intercepted the wireless signal information of each wireless link, and the received signal strength information of each link is delivered to general purpose PC 2.
Fig. 2 means the intrusion detection algorithm flow process, and concrete steps are as follows:
A) can carry out radio communication between wireless scan node, each node sends wireless signal successively, and other node receives wireless signal and records received signal strength;
B) wireless aggregation node can be collected the wireless link signals strength information that all wireless scan nodes measure by wireless mode; Simultaneously, the information of collection is sent to general purpose PC;
C) intrusion detection algorithm moved on general purpose PC is realized whether the detection of object invasion is arranged according to the wireless link strength information; Algorithm is usingd wireless link received signal strength information as input message, the intrusion target position of output estimation.Average, the variance Two-dimensional Statistical characteristic of intrusion detection algorithm based on wireless link signals intensity realizes intrusion detection.Suppose between each wireless scan node to form the n wireless links, constantly obtain at t-1 the eigenmatrix A that average m and variance v by this n wireless links received signal strength form as follows:
Constantly obtain at t the eigenmatrix B that average m and variance v by this n wireless links received signal strength form as follows:
Wherein, the average m that eigenmatrix A and B have comprised wireless link signals intensity and variance v feature, m
n1and v
n2represent respectively signal strength signal intensity average and the variance of n wireless links; In intrusion detection algorithm calculated characteristics matrix A and B, to obtain similarity matrix C as follows for the big or small similarity degree of corresponding element value:
Wherein, m
n1-m'
n1represented the difference of the average of n bar link, v
n1-v'
n1represented the difference of the variance of n bar link, d
nrepresented the length of n bar link.When each element sum of similarity matrix C is greater than the threshold value of setting, intrusion detection algorithm will be judged the object invasion, as shown in Figure 2.
Using the wireless link metrical information as input, average, the variance of the signal strength signal intensity of each wireless link are carried out to On-line Estimation, the construction feature matrix B at the intrusion detection algorithm based on mean variance associating two-dimensional detection technology of the upper operation of PC (2); Afterwards, eigenmatrix B and the upper one eigenmatrix A constantly built are analyzed, calculate similarity matrix C, calculate its mould value, and then to whether having target to occur being adjudicated, and court verdict is exported to the screen of general purpose PC (2).
Test shows, in 10m * 10m rectangular area, and 8 wireless scan node J1 of system layout, J2 ... .J8, can realize the detection to intrusion object, success rate is 98%, and false alarm rate is 1%.
The method is applicable to the intrusion detection under the adverse circumstances such as body of wall covers, ambient black, and whether the variation of the wireless link signals intensity of utilizing intrusion object to cause covering of wireless signal realizes having the target invasion to be detected.
Claims (2)
1. the intrusion detection method based on the wireless signal feature, it is characterized in that, intrusion detection algorithm is to utilize the impact of intrusion object on wireless link signals intensity, whether realization to there being the state-detection of object invasion, it is input message that intrusion detection algorithm be take the signal strength information of each wireless links, utilize its average, variance Two-dimensional Statistical Characteristics Detection whether to have invasion to occur, when the amplitude changed when the two-dimensional space characteristic information is greater than certain threshold value, judgement has the object invasion, and concrete steps are as follows:
A) N wireless scan node (J1, J2, JN) be placed on four limits of the outer rectangular area of intrusion object (3), every limit keeps at a certain distance away and places a wireless scan node, wireless aggregation node (1), general purpose PC (2) are placed on monitored area on one side or in inside, monitored area, carry out radio communication between wireless scan node, each node sends wireless signal successively, and other node receives wireless signal and records received signal strength;
B) wireless aggregation node (1) collects by wireless mode the wireless link signals strength information that all wireless scan nodes measure; Simultaneously, the information of collection is sent to general purpose PC (2);
C) intrusion detection algorithm of the upper operation of general purpose PC (2) is realized whether the detection of object invasion is arranged according to the wireless link strength information; Algorithm is usingd wireless link received signal strength information as input message, the intrusion target position of output estimation; Average, the variance Two-dimensional Statistical characteristic of intrusion detection algorithm based on wireless link signals intensity realizes intrusion detection; Suppose between each wireless scan node to form the n wireless links, obtain respectively in t-1 and the t moment eigenmatrix A and B that average m and variance v by this n wireless links received signal strength form as follows:
Wherein, the average m that eigenmatrix A and B have comprised wireless link signals intensity and variance v feature, m
n1and v
n2represent respectively signal strength signal intensity average and the variance of n wireless links; In intrusion detection algorithm calculated characteristics matrix A and B, to obtain similarity matrix C as follows for the big or small similarity degree of corresponding element value:
Wherein, m
n1-m'
n1represented the difference of the average of n bar link, v
n1-v'
n1represented the difference of the variance of n bar link, d
nrepresented the length of n bar link; When each element sum of similarity matrix C is greater than the threshold value of setting, intrusion detection algorithm will be judged the object invasion.
2. a kind of intrusion detection method based on the wireless signal feature according to claim 1, it is characterized in that: this system of invading the detection method employing is by wireless scan node (J1, J2, JN), wireless aggregation node (1), general purpose PC (2) and intrusion detection algorithm form, intrusion detection algorithm is arranged in general purpose PC (2), between wireless scan node, wireless aggregation node, general purpose PC, carries out radio communication.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013102053051A CN103458413A (en) | 2013-05-28 | 2013-05-28 | Method for intrusion detection based on wireless signal characters |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013102053051A CN103458413A (en) | 2013-05-28 | 2013-05-28 | Method for intrusion detection based on wireless signal characters |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103458413A true CN103458413A (en) | 2013-12-18 |
Family
ID=49740284
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2013102053051A Pending CN103458413A (en) | 2013-05-28 | 2013-05-28 | Method for intrusion detection based on wireless signal characters |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103458413A (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104184501A (en) * | 2014-08-28 | 2014-12-03 | 北京睿仁医疗科技有限公司 | Pairing method of low-power-consumption Bluetooth thermometers |
CN104678770A (en) * | 2015-01-23 | 2015-06-03 | 小米科技有限责任公司 | Displacement accident detection method and system |
CN105242549A (en) * | 2015-09-02 | 2016-01-13 | 小米科技有限责任公司 | Equipment control method and device |
CN105894703A (en) * | 2016-05-11 | 2016-08-24 | 大博(武汉)科技有限公司 | Intelligent monitoring method, device and system based on WiFi |
TWI602407B (en) * | 2016-09-13 | 2017-10-11 | 微波資訊科技有限公司 | An invading detecting system and method based on the sinr estimation |
CN108173975A (en) * | 2018-03-12 | 2018-06-15 | 杨光亚 | A kind of intelligent security guard monitoring system and method based on RSSI signal detections |
CN108521652A (en) * | 2018-03-28 | 2018-09-11 | 清华大学 | A kind of WiFi validated users automatic identifying method and device |
CN109274440A (en) * | 2018-10-10 | 2019-01-25 | 重庆邮电大学 | Passive intrusion detection method based on environmental characteristic adaptive selection |
CN109461295A (en) * | 2018-12-07 | 2019-03-12 | 连尚(新昌)网络科技有限公司 | A kind of household reporting method and apparatus |
CN111132008A (en) * | 2019-12-19 | 2020-05-08 | 重庆大学 | Intrusion object detection positioning system based on wireless local area network signals |
CN111245538A (en) * | 2018-11-29 | 2020-06-05 | 华为技术有限公司 | Link quality detection method and related equipment |
CN111901758A (en) * | 2015-09-16 | 2020-11-06 | 伊万尼有限责任公司 | Detecting location within a network |
US11323845B2 (en) | 2015-09-16 | 2022-05-03 | Ivani, LLC | Reverse-beacon indoor positioning system using existing detection fields |
US11350238B2 (en) | 2015-09-16 | 2022-05-31 | Ivani, LLC | Systems and methods for detecting the presence of a user at a computer |
US11423968B2 (en) | 2015-09-16 | 2022-08-23 | Ivani, LLC | Detecting location within a network |
US11800319B2 (en) | 2015-09-16 | 2023-10-24 | Ivani, LLC | Building system control utilizing building occupancy |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030027550A1 (en) * | 2001-08-03 | 2003-02-06 | Rockwell Laurence I. | Airborne security manager |
CN101436336A (en) * | 2007-11-15 | 2009-05-20 | 中国科学院自动化研究所 | Intrusion detection system and method |
CN102970687A (en) * | 2012-11-02 | 2013-03-13 | 中国科学院微电子研究所 | Method for deploying detection nodes and detecting invasion in wireless sensor network |
-
2013
- 2013-05-28 CN CN2013102053051A patent/CN103458413A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030027550A1 (en) * | 2001-08-03 | 2003-02-06 | Rockwell Laurence I. | Airborne security manager |
CN101436336A (en) * | 2007-11-15 | 2009-05-20 | 中国科学院自动化研究所 | Intrusion detection system and method |
CN102970687A (en) * | 2012-11-02 | 2013-03-13 | 中国科学院微电子研究所 | Method for deploying detection nodes and detecting invasion in wireless sensor network |
Non-Patent Citations (1)
Title |
---|
孙立奎,王洪玉,吴力飞,王洁: "基于信号差分特性的被动入侵检测方法", 《传感技术学报》 * |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104184501B (en) * | 2014-08-28 | 2018-04-03 | 北京睿仁医疗科技有限公司 | A kind of matching method of low-power consumption bluetooth clinical thermometer |
CN104184501A (en) * | 2014-08-28 | 2014-12-03 | 北京睿仁医疗科技有限公司 | Pairing method of low-power-consumption Bluetooth thermometers |
CN104678770B (en) * | 2015-01-23 | 2019-03-01 | 小米科技有限责任公司 | It is displaced event detecting method and system |
CN104678770A (en) * | 2015-01-23 | 2015-06-03 | 小米科技有限责任公司 | Displacement accident detection method and system |
CN105242549B (en) * | 2015-09-02 | 2018-05-08 | 小米科技有限责任公司 | A kind of method and apparatus being controlled to equipment |
CN105242549A (en) * | 2015-09-02 | 2016-01-13 | 小米科技有限责任公司 | Equipment control method and device |
CN111901758A (en) * | 2015-09-16 | 2020-11-06 | 伊万尼有限责任公司 | Detecting location within a network |
CN111901758B (en) * | 2015-09-16 | 2022-08-09 | 伊万尼有限责任公司 | Detecting location within a network |
US11350238B2 (en) | 2015-09-16 | 2022-05-31 | Ivani, LLC | Systems and methods for detecting the presence of a user at a computer |
US11423968B2 (en) | 2015-09-16 | 2022-08-23 | Ivani, LLC | Detecting location within a network |
US11800319B2 (en) | 2015-09-16 | 2023-10-24 | Ivani, LLC | Building system control utilizing building occupancy |
US11323845B2 (en) | 2015-09-16 | 2022-05-03 | Ivani, LLC | Reverse-beacon indoor positioning system using existing detection fields |
US11711667B2 (en) | 2015-09-16 | 2023-07-25 | Ivani, LLC | Detecting location within a network |
CN105894703A (en) * | 2016-05-11 | 2016-08-24 | 大博(武汉)科技有限公司 | Intelligent monitoring method, device and system based on WiFi |
CN105894703B (en) * | 2016-05-11 | 2019-03-08 | 优乐(武汉)健康科技有限公司 | A kind of intelligent monitoring method based on WiFi, apparatus and system |
TWI602407B (en) * | 2016-09-13 | 2017-10-11 | 微波資訊科技有限公司 | An invading detecting system and method based on the sinr estimation |
CN108173975A (en) * | 2018-03-12 | 2018-06-15 | 杨光亚 | A kind of intelligent security guard monitoring system and method based on RSSI signal detections |
CN108173975B (en) * | 2018-03-12 | 2020-09-08 | 杨光亚 | Intelligent security monitoring system and method based on RSSI signal detection |
CN108521652A (en) * | 2018-03-28 | 2018-09-11 | 清华大学 | A kind of WiFi validated users automatic identifying method and device |
CN109274440B (en) * | 2018-10-10 | 2021-05-18 | 重庆邮电大学 | Passive intrusion detection method based on environmental characteristic self-adaptive screening |
CN109274440A (en) * | 2018-10-10 | 2019-01-25 | 重庆邮电大学 | Passive intrusion detection method based on environmental characteristic adaptive selection |
CN111245538A (en) * | 2018-11-29 | 2020-06-05 | 华为技术有限公司 | Link quality detection method and related equipment |
CN109461295A (en) * | 2018-12-07 | 2019-03-12 | 连尚(新昌)网络科技有限公司 | A kind of household reporting method and apparatus |
CN109461295B (en) * | 2018-12-07 | 2021-06-11 | 连尚(新昌)网络科技有限公司 | Household alarm method and equipment |
CN111132008A (en) * | 2019-12-19 | 2020-05-08 | 重庆大学 | Intrusion object detection positioning system based on wireless local area network signals |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103458413A (en) | Method for intrusion detection based on wireless signal characters | |
US11842613B2 (en) | System and methods for smart intrusion detection using wireless signals and artificial intelligence | |
Yang et al. | Performing joint learning for passive intrusion detection in pervasive wireless environments | |
JP4920031B2 (en) | Intruding object identification method, intruding object identification device, and intruding object identification sensor device | |
CN106646457A (en) | Person behavior detection method and device based on microwaves | |
CN101236605B (en) | Human body intelligent recognition method and system based on infrared signal | |
JP2011523106A (en) | Image sensor, alarm system and method for classifying objects and events | |
KR101909024B1 (en) | Perimeter Intrusion Detection System using multifunctional complex fence sensor | |
CN104700543B (en) | Microwave-induced detection method and device used for safety protection | |
CN109740411A (en) | Intelligent monitor system, monitoring method based on recognition of face and quickly go out alarm method | |
US20090201146A1 (en) | Remote activity detection or intrusion monitoring system | |
CN108198402A (en) | Region Intelligent unattended machine detecting system | |
CN103152558A (en) | Intrusion detection method based on scene recognition | |
Hsieh et al. | Device-free indoor human activity recognition using Wi-Fi RSSI: Machine learning approaches | |
Prasanna et al. | LoRa network based high performance forest fire detection system | |
Nakkach et al. | Smart border surveillance system based on deep learning methods | |
Lee et al. | Wireless sensing without sensors—An experimental approach | |
Prajapati et al. | A novel approach towards a low cost peripheral security system based on specific data rates | |
CN105451235A (en) | Wireless sensor network intrusion detection method based on background updating | |
Dibitonto et al. | Fusion of radio and video localization for people tracking | |
Ushasree et al. | Intrusion Detection System using Machine Learning and Microwave Doppler Radar | |
KR101959142B1 (en) | Fence Intrusion Detection System and Method with Ultra High Frequency Signal | |
RU129283U1 (en) | RADIOROUBEZH PERIMETER PROTECTION SYSTEM | |
CN105635653A (en) | Video monitoring system | |
Raja et al. | Detecting spying activities from the sky via deep learning |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination |