CN103458413A - Method for intrusion detection based on wireless signal characters - Google Patents

Method for intrusion detection based on wireless signal characters Download PDF

Info

Publication number
CN103458413A
CN103458413A CN2013102053051A CN201310205305A CN103458413A CN 103458413 A CN103458413 A CN 103458413A CN 2013102053051 A CN2013102053051 A CN 2013102053051A CN 201310205305 A CN201310205305 A CN 201310205305A CN 103458413 A CN103458413 A CN 103458413A
Authority
CN
China
Prior art keywords
wireless
centerdot
intrusion detection
prime
intrusion
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013102053051A
Other languages
Chinese (zh)
Inventor
王洁
高庆华
王洪玉
孙立奎
吴力飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dalian University of Technology
Original Assignee
Dalian University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dalian University of Technology filed Critical Dalian University of Technology
Priority to CN2013102053051A priority Critical patent/CN103458413A/en
Publication of CN103458413A publication Critical patent/CN103458413A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Burglar Alarm Systems (AREA)

Abstract

The invention relates to a method for intrusion detection based on wireless signal characters, and belongs to the field of security and protection technology and wireless network application. According to the method for the intrusion detection, the state that whether object intrusion exists or not can be detected through the influence on the wireless link signal strength from an intrusion object. According to the intrusion detection algorithm, the signal strength information of all wireless links serves as input information, whether intrusion exists or not can be detected through the two-dimensional statistical properties of the mean value and the variance of the signal strength information. A system in which the method is adopted is composed of wireless scanning nodes, a wireless aggregation node, a general PC and the intrusion detection algorithm. The intrusion detection algorithm is installed in the general PC, and the wireless scanning nodes, the wireless aggregation node and the general PC are communicated wirelessly. The method is suitable for intrusion detection at wall shielding, dark environment and other severe environments. Whether a target intrudes or not can be detected through the change, caused by the fact that the intrusion object shields a wireless signal, of the wireless link signal strength.

Description

Intrusion detection method based on the wireless signal feature
Technical field
The invention belongs to security and guard technology, wireless network application, relate to a kind of intrusion detection method based on the wireless signal feature.
Background technology
Intrusion Detection Technique has a wide range of applications in fields such as border monitoring, bank's monitoring, nucleus monitorings.Along with social development, people are more and more higher to the concern of safety, can predict in the near future, and Intrusion Detection Technique will be used widely in military affairs, industry and our daily life.
The Intrusion Detection Technique extensively adopted at present is based on the detection technique of camera, numerous scholars are to utilizing camera, based on image processing techniques, realizing that intrusion detection conducts in-depth research, as: Zhu J, Lao Y, " Object tracking in structured environments for video surveillance applications " Deng the people, IEEE Transactions on Circuits and Systems for Video Technology, 2010, the 20th volume, the 2nd phase, the P223-235 page.But system layout is more loaded down with trivial details, intruding detection system needs light condition well and can't realize that simultaneously, image processing techniques relates to privacy concern, inapplicable in some monitoring occasion to the penetrating of body of wall etc.In recent years, along with the development of wireless technology, make to utilize the wireless measurement between radio node cheaply to realize that intrusion detection becomes possibility.Due to the inherent characteristic of electric wave, when there being intrusion object to cause while covering certain wireless links, the received signal strength information potential of this link must change.Based on this, when having multi wireless links to exist, by the received signal strength information of each wireless link, can realize whether there being the object invasion to judge in the wireless link overlay area simultaneously.
With traditional intrusion detection method based on camera, compare, because radio node can cover larger zone, so the Intrusion Detection Technique based on the wireless signal feature can complete the security monitor to large scene; Because the radio node cost is lower, so the Intrusion Detection Technique based on the wireless signal feature can be in the application of the field of numerous cost sensitivities; Because wireless signal can penetrate veil, so the Intrusion Detection Technique based on the wireless signal feature can be applied under the scene more at indoor barrier; Because radio node is insensitive to illumination, humiture, so the field that the Intrusion Detection Technique based on the wireless signal feature can be more severe in environmental condition application.These characteristics has determined that the Intrusion Detection Technique based on the wireless signal feature has application prospect more widely.
Summary of the invention
The objective of the invention is to overcome the defect of prior art, invent a kind of intrusion detection method based on the wireless signal feature, with the wireless measurement signal between radio node as metrical information, adopt intrusion detection algorithm to detect the impact of intrusion object on the wireless measurement signal, the variation of the wireless link signals intensity covering of wireless signal caused according to intrusion object, realize whether the detection of target invasion is arranged.
Technical scheme of the present invention is a kind of intrusion detection method based on the wireless signal feature, intrusion detection algorithm is to utilize the impact of intrusion object on wireless link signals intensity, whether realization to there being the state-detection of object invasion, it is input message that intrusion detection algorithm be take the signal strength information of each wireless links, utilize its average, variance Two-dimensional Statistical Characteristics Detection whether to have invasion to occur, when the amplitude changed when the two-dimensional space characteristic information is greater than certain threshold value, judgement has the object invasion, and concrete steps are as follows:
A) N wireless scan node J1, J2, JN is placed on four limits of intrusion object 3 outer rectangular areas, every limit keeps at a certain distance away and places a wireless scan node, wireless aggregation node 1, general purpose PC 2 are placed on monitored area on one side or in inside, monitored area, carry out radio communication between wireless scan node, each node sends wireless signal successively, and other node receives wireless signal and records received signal strength;
B) wireless aggregation node 1 collects by wireless mode the wireless link signals strength information that all wireless scan nodes measure; Simultaneously, the information of collection is sent to general purpose PC 2;
C) on general purpose PC 2, the intrusion detection algorithm of operation is realized whether the detection of object invasion is arranged according to the wireless link strength information; Algorithm is usingd wireless link received signal strength information as input message, the intrusion target position of output estimation; Average, the variance Two-dimensional Statistical characteristic of intrusion detection algorithm based on wireless link signals intensity realizes intrusion detection; Suppose between each wireless scan node to form the n wireless links, obtain respectively in t-1 and the t moment eigenmatrix A and B that average m and variance v by this n wireless links received signal strength form as follows:
A = m 11 v 12 m 21 v 22 · · · · · · m n 1 v n 2 , B = m 11 ′ v 12 ′ m 21 ′ v 22 ′ · · · · · · m n 1 ′ v n 2 ′
Wherein, the average m that eigenmatrix A and B have comprised wireless link signals intensity and variance v feature, m n1and v n2represent respectively signal strength signal intensity average and the variance of n wireless links; In intrusion detection algorithm calculated characteristics matrix A and B, to obtain similarity matrix C as follows for the big or small similarity degree of corresponding element value:
C = ( m 11 - m 11 ′ ) 2 d 1 ( v 12 - v 12 ′ ) 2 d 1 ( m 21 - m 21 ′ ) 2 d 2 ( v 22 - v 22 ′ ) 2 d 2 · · · · · · ( m n 1 - m n 1 ′ ) 2 d n ( v n 2 - v n 2 ′ ) 2 d n
Wherein, m n1-m' n1represented the difference of the average of n bar link, v n1-v' n1represented the difference of the variance of n bar link, d nrepresented the length of n bar link.When each element sum of similarity matrix C is greater than the threshold value of setting, intrusion detection algorithm will be judged the object invasion.
The system that this intrusion detection method adopts is by wireless scan node J1, J2, JN, wireless aggregation node 1, general purpose PC 2 and intrusion detection algorithm form, and intrusion detection algorithm is arranged in general purpose PC 2, between wireless scan node, wireless aggregation node, general purpose PC, carries out radio communication.
Beneficial effect of the present invention is: 1) can utilize the wireless measurement signal to realize whether the judgement of object invasion is arranged; 2) can utilize the radio node of a large amount of cheapnesss to realize fast the intrusion detection of scene on a large scale; 3) size, illumination condition, the condition of covering that detects scene do not had to particular requirement; 4) do not relate to privacy concern; 5) utilize multi wireless links to be detected, improved the robustness of detection system.
The accompanying drawing explanation
Fig. 1 is system architecture diagram of the present invention.In figure: J1 to J8 is wireless scan node, and 1 is wireless aggregation node; 2 is general purpose PC, the operation intrusion detection algorithm; 3 is intrusion object.
Fig. 2 intrusion detection algorithm flow process.
Embodiment
Elaborate the present invention below in conjunction with concrete technical scheme and accompanying drawing, but the present invention is not limited to specific embodiment.Embodiment: as shown in Figure 1, the system that this intrusion detection method adopts is comprised of wireless scan node, wireless aggregation node, general purpose PC, intrusion detection algorithm.System arranges 8 wireless scan node J1, J2 ... J8 and wireless aggregation node 1 be the wireless module design based on being operated in 433MHz all, transmitting power 20dBm, antenna gain 1dB.Wireless scan node J1, J2 ... four ,Mei Bian interval, the limit 5m that J8 is placed on 10m * 10m rectangular area place a wireless scan node, and placing height is 1m.Wireless aggregation node 1, PC 2 are placed on monitored area on one side or in inside, monitored area, the wireless scan node J1 of distance, and J2 ... in J8100m.Wireless scan node J1 ... J8 forms queue, sends successively wireless signal, other wireless signal that the wireless scan node reception current time sending node of transmitted signal does not send, and measure received signal strength information.Wireless aggregation node 1 is intercepted the wireless signal information of each wireless link, and the received signal strength information of each link is delivered to general purpose PC 2.
Fig. 2 means the intrusion detection algorithm flow process, and concrete steps are as follows:
A) can carry out radio communication between wireless scan node, each node sends wireless signal successively, and other node receives wireless signal and records received signal strength;
B) wireless aggregation node can be collected the wireless link signals strength information that all wireless scan nodes measure by wireless mode; Simultaneously, the information of collection is sent to general purpose PC;
C) intrusion detection algorithm moved on general purpose PC is realized whether the detection of object invasion is arranged according to the wireless link strength information; Algorithm is usingd wireless link received signal strength information as input message, the intrusion target position of output estimation.Average, the variance Two-dimensional Statistical characteristic of intrusion detection algorithm based on wireless link signals intensity realizes intrusion detection.Suppose between each wireless scan node to form the n wireless links, constantly obtain at t-1 the eigenmatrix A that average m and variance v by this n wireless links received signal strength form as follows:
A = m 11 v 12 m 21 v 22 · · · · · · m n 1 v n 2
Constantly obtain at t the eigenmatrix B that average m and variance v by this n wireless links received signal strength form as follows:
B = m 11 ′ v 12 ′ m 21 ′ v 22 ′ · · · · · · m n 1 ′ v n 2 ′
Wherein, the average m that eigenmatrix A and B have comprised wireless link signals intensity and variance v feature, m n1and v n2represent respectively signal strength signal intensity average and the variance of n wireless links; In intrusion detection algorithm calculated characteristics matrix A and B, to obtain similarity matrix C as follows for the big or small similarity degree of corresponding element value:
C = ( m 11 - m 11 ′ ) 2 d 1 ( v 12 - v 12 ′ ) 2 d 1 ( m 21 - m 21 ′ ) 2 d 2 ( v 22 - v 22 ′ ) 2 d 2 · · · · · · ( m n 1 - m n 1 ′ ) 2 d n ( v n 2 - v n 2 ′ ) 2 d n
Wherein, m n1-m' n1represented the difference of the average of n bar link, v n1-v' n1represented the difference of the variance of n bar link, d nrepresented the length of n bar link.When each element sum of similarity matrix C is greater than the threshold value of setting, intrusion detection algorithm will be judged the object invasion, as shown in Figure 2.
Using the wireless link metrical information as input, average, the variance of the signal strength signal intensity of each wireless link are carried out to On-line Estimation, the construction feature matrix B at the intrusion detection algorithm based on mean variance associating two-dimensional detection technology of the upper operation of PC (2); Afterwards, eigenmatrix B and the upper one eigenmatrix A constantly built are analyzed, calculate similarity matrix C, calculate its mould value, and then to whether having target to occur being adjudicated, and court verdict is exported to the screen of general purpose PC (2).
Test shows, in 10m * 10m rectangular area, and 8 wireless scan node J1 of system layout, J2 ... .J8, can realize the detection to intrusion object, success rate is 98%, and false alarm rate is 1%.
The method is applicable to the intrusion detection under the adverse circumstances such as body of wall covers, ambient black, and whether the variation of the wireless link signals intensity of utilizing intrusion object to cause covering of wireless signal realizes having the target invasion to be detected.

Claims (2)

1. the intrusion detection method based on the wireless signal feature, it is characterized in that, intrusion detection algorithm is to utilize the impact of intrusion object on wireless link signals intensity, whether realization to there being the state-detection of object invasion, it is input message that intrusion detection algorithm be take the signal strength information of each wireless links, utilize its average, variance Two-dimensional Statistical Characteristics Detection whether to have invasion to occur, when the amplitude changed when the two-dimensional space characteristic information is greater than certain threshold value, judgement has the object invasion, and concrete steps are as follows:
A) N wireless scan node (J1, J2, JN) be placed on four limits of the outer rectangular area of intrusion object (3), every limit keeps at a certain distance away and places a wireless scan node, wireless aggregation node (1), general purpose PC (2) are placed on monitored area on one side or in inside, monitored area, carry out radio communication between wireless scan node, each node sends wireless signal successively, and other node receives wireless signal and records received signal strength;
B) wireless aggregation node (1) collects by wireless mode the wireless link signals strength information that all wireless scan nodes measure; Simultaneously, the information of collection is sent to general purpose PC (2);
C) intrusion detection algorithm of the upper operation of general purpose PC (2) is realized whether the detection of object invasion is arranged according to the wireless link strength information; Algorithm is usingd wireless link received signal strength information as input message, the intrusion target position of output estimation; Average, the variance Two-dimensional Statistical characteristic of intrusion detection algorithm based on wireless link signals intensity realizes intrusion detection; Suppose between each wireless scan node to form the n wireless links, obtain respectively in t-1 and the t moment eigenmatrix A and B that average m and variance v by this n wireless links received signal strength form as follows:
A = m 11 v 12 m 21 v 22 · · · · · · m n 1 v n 2 , B = m 11 ′ v 12 ′ m 21 ′ v 22 ′ · · · · · · m n 1 ′ v n 2 ′
Wherein, the average m that eigenmatrix A and B have comprised wireless link signals intensity and variance v feature, m n1and v n2represent respectively signal strength signal intensity average and the variance of n wireless links; In intrusion detection algorithm calculated characteristics matrix A and B, to obtain similarity matrix C as follows for the big or small similarity degree of corresponding element value:
C = ( m 11 - m 11 ′ ) 2 d 1 ( v 12 - v 12 ′ ) 2 d 1 ( m 21 - m 21 ′ ) 2 d 2 ( v 22 - v 22 ′ ) 2 d 2 · · · · · · ( m n 1 - m n 1 ′ ) 2 d n ( v n 2 - v n 2 ′ ) 2 d n
Wherein, m n1-m' n1represented the difference of the average of n bar link, v n1-v' n1represented the difference of the variance of n bar link, d nrepresented the length of n bar link; When each element sum of similarity matrix C is greater than the threshold value of setting, intrusion detection algorithm will be judged the object invasion.
2. a kind of intrusion detection method based on the wireless signal feature according to claim 1, it is characterized in that: this system of invading the detection method employing is by wireless scan node (J1, J2, JN), wireless aggregation node (1), general purpose PC (2) and intrusion detection algorithm form, intrusion detection algorithm is arranged in general purpose PC (2), between wireless scan node, wireless aggregation node, general purpose PC, carries out radio communication.
CN2013102053051A 2013-05-28 2013-05-28 Method for intrusion detection based on wireless signal characters Pending CN103458413A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013102053051A CN103458413A (en) 2013-05-28 2013-05-28 Method for intrusion detection based on wireless signal characters

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013102053051A CN103458413A (en) 2013-05-28 2013-05-28 Method for intrusion detection based on wireless signal characters

Publications (1)

Publication Number Publication Date
CN103458413A true CN103458413A (en) 2013-12-18

Family

ID=49740284

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013102053051A Pending CN103458413A (en) 2013-05-28 2013-05-28 Method for intrusion detection based on wireless signal characters

Country Status (1)

Country Link
CN (1) CN103458413A (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104184501A (en) * 2014-08-28 2014-12-03 北京睿仁医疗科技有限公司 Pairing method of low-power-consumption Bluetooth thermometers
CN104678770A (en) * 2015-01-23 2015-06-03 小米科技有限责任公司 Displacement accident detection method and system
CN105242549A (en) * 2015-09-02 2016-01-13 小米科技有限责任公司 Equipment control method and device
CN105894703A (en) * 2016-05-11 2016-08-24 大博(武汉)科技有限公司 Intelligent monitoring method, device and system based on WiFi
TWI602407B (en) * 2016-09-13 2017-10-11 微波資訊科技有限公司 An invading detecting system and method based on the sinr estimation
CN108173975A (en) * 2018-03-12 2018-06-15 杨光亚 A kind of intelligent security guard monitoring system and method based on RSSI signal detections
CN108521652A (en) * 2018-03-28 2018-09-11 清华大学 A kind of WiFi validated users automatic identifying method and device
CN109274440A (en) * 2018-10-10 2019-01-25 重庆邮电大学 Passive intrusion detection method based on environmental characteristic adaptive selection
CN109461295A (en) * 2018-12-07 2019-03-12 连尚(新昌)网络科技有限公司 A kind of household reporting method and apparatus
CN111132008A (en) * 2019-12-19 2020-05-08 重庆大学 Intrusion object detection positioning system based on wireless local area network signals
CN111245538A (en) * 2018-11-29 2020-06-05 华为技术有限公司 Link quality detection method and related equipment
CN111901758A (en) * 2015-09-16 2020-11-06 伊万尼有限责任公司 Detecting location within a network
US11323845B2 (en) 2015-09-16 2022-05-03 Ivani, LLC Reverse-beacon indoor positioning system using existing detection fields
US11350238B2 (en) 2015-09-16 2022-05-31 Ivani, LLC Systems and methods for detecting the presence of a user at a computer
US11423968B2 (en) 2015-09-16 2022-08-23 Ivani, LLC Detecting location within a network
US11800319B2 (en) 2015-09-16 2023-10-24 Ivani, LLC Building system control utilizing building occupancy

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030027550A1 (en) * 2001-08-03 2003-02-06 Rockwell Laurence I. Airborne security manager
CN101436336A (en) * 2007-11-15 2009-05-20 中国科学院自动化研究所 Intrusion detection system and method
CN102970687A (en) * 2012-11-02 2013-03-13 中国科学院微电子研究所 Method for deploying detection nodes and detecting invasion in wireless sensor network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030027550A1 (en) * 2001-08-03 2003-02-06 Rockwell Laurence I. Airborne security manager
CN101436336A (en) * 2007-11-15 2009-05-20 中国科学院自动化研究所 Intrusion detection system and method
CN102970687A (en) * 2012-11-02 2013-03-13 中国科学院微电子研究所 Method for deploying detection nodes and detecting invasion in wireless sensor network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
孙立奎,王洪玉,吴力飞,王洁: "基于信号差分特性的被动入侵检测方法", 《传感技术学报》 *

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104184501B (en) * 2014-08-28 2018-04-03 北京睿仁医疗科技有限公司 A kind of matching method of low-power consumption bluetooth clinical thermometer
CN104184501A (en) * 2014-08-28 2014-12-03 北京睿仁医疗科技有限公司 Pairing method of low-power-consumption Bluetooth thermometers
CN104678770B (en) * 2015-01-23 2019-03-01 小米科技有限责任公司 It is displaced event detecting method and system
CN104678770A (en) * 2015-01-23 2015-06-03 小米科技有限责任公司 Displacement accident detection method and system
CN105242549B (en) * 2015-09-02 2018-05-08 小米科技有限责任公司 A kind of method and apparatus being controlled to equipment
CN105242549A (en) * 2015-09-02 2016-01-13 小米科技有限责任公司 Equipment control method and device
CN111901758A (en) * 2015-09-16 2020-11-06 伊万尼有限责任公司 Detecting location within a network
CN111901758B (en) * 2015-09-16 2022-08-09 伊万尼有限责任公司 Detecting location within a network
US11350238B2 (en) 2015-09-16 2022-05-31 Ivani, LLC Systems and methods for detecting the presence of a user at a computer
US11423968B2 (en) 2015-09-16 2022-08-23 Ivani, LLC Detecting location within a network
US11800319B2 (en) 2015-09-16 2023-10-24 Ivani, LLC Building system control utilizing building occupancy
US11323845B2 (en) 2015-09-16 2022-05-03 Ivani, LLC Reverse-beacon indoor positioning system using existing detection fields
US11711667B2 (en) 2015-09-16 2023-07-25 Ivani, LLC Detecting location within a network
CN105894703A (en) * 2016-05-11 2016-08-24 大博(武汉)科技有限公司 Intelligent monitoring method, device and system based on WiFi
CN105894703B (en) * 2016-05-11 2019-03-08 优乐(武汉)健康科技有限公司 A kind of intelligent monitoring method based on WiFi, apparatus and system
TWI602407B (en) * 2016-09-13 2017-10-11 微波資訊科技有限公司 An invading detecting system and method based on the sinr estimation
CN108173975A (en) * 2018-03-12 2018-06-15 杨光亚 A kind of intelligent security guard monitoring system and method based on RSSI signal detections
CN108173975B (en) * 2018-03-12 2020-09-08 杨光亚 Intelligent security monitoring system and method based on RSSI signal detection
CN108521652A (en) * 2018-03-28 2018-09-11 清华大学 A kind of WiFi validated users automatic identifying method and device
CN109274440B (en) * 2018-10-10 2021-05-18 重庆邮电大学 Passive intrusion detection method based on environmental characteristic self-adaptive screening
CN109274440A (en) * 2018-10-10 2019-01-25 重庆邮电大学 Passive intrusion detection method based on environmental characteristic adaptive selection
CN111245538A (en) * 2018-11-29 2020-06-05 华为技术有限公司 Link quality detection method and related equipment
CN109461295A (en) * 2018-12-07 2019-03-12 连尚(新昌)网络科技有限公司 A kind of household reporting method and apparatus
CN109461295B (en) * 2018-12-07 2021-06-11 连尚(新昌)网络科技有限公司 Household alarm method and equipment
CN111132008A (en) * 2019-12-19 2020-05-08 重庆大学 Intrusion object detection positioning system based on wireless local area network signals

Similar Documents

Publication Publication Date Title
CN103458413A (en) Method for intrusion detection based on wireless signal characters
US11842613B2 (en) System and methods for smart intrusion detection using wireless signals and artificial intelligence
Yang et al. Performing joint learning for passive intrusion detection in pervasive wireless environments
JP4920031B2 (en) Intruding object identification method, intruding object identification device, and intruding object identification sensor device
CN106646457A (en) Person behavior detection method and device based on microwaves
CN101236605B (en) Human body intelligent recognition method and system based on infrared signal
JP2011523106A (en) Image sensor, alarm system and method for classifying objects and events
KR101909024B1 (en) Perimeter Intrusion Detection System using multifunctional complex fence sensor
CN104700543B (en) Microwave-induced detection method and device used for safety protection
CN109740411A (en) Intelligent monitor system, monitoring method based on recognition of face and quickly go out alarm method
US20090201146A1 (en) Remote activity detection or intrusion monitoring system
CN108198402A (en) Region Intelligent unattended machine detecting system
CN103152558A (en) Intrusion detection method based on scene recognition
Hsieh et al. Device-free indoor human activity recognition using Wi-Fi RSSI: Machine learning approaches
Prasanna et al. LoRa network based high performance forest fire detection system
Nakkach et al. Smart border surveillance system based on deep learning methods
Lee et al. Wireless sensing without sensors—An experimental approach
Prajapati et al. A novel approach towards a low cost peripheral security system based on specific data rates
CN105451235A (en) Wireless sensor network intrusion detection method based on background updating
Dibitonto et al. Fusion of radio and video localization for people tracking
Ushasree et al. Intrusion Detection System using Machine Learning and Microwave Doppler Radar
KR101959142B1 (en) Fence Intrusion Detection System and Method with Ultra High Frequency Signal
RU129283U1 (en) RADIOROUBEZH PERIMETER PROTECTION SYSTEM
CN105635653A (en) Video monitoring system
Raja et al. Detecting spying activities from the sky via deep learning

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination