A Combined Sensing System for Intrusion Detection Using Anti-Jamming Random Code Signals

被引:3
作者
Xu, Hang [1 ,2 ]
Li, Yingxin [1 ,2 ]
Ma, Cheng [1 ,2 ]
Liu, Li [1 ,2 ]
Wang, Bingjie [1 ,2 ]
Li, Jingxia [1 ,2 ]
机构
[1] Taiyuan Univ Technol, Key Lab Adv Transducers & Intelligent Control Sys, Minist Educ & Shanxi Prov, Taiyuan 030024, Peoples R China
[2] Taiyuan Univ Technol, Coll Phys & Optoelect, Taiyuan 030024, Peoples R China
基金
中国国家自然科学基金;
关键词
intrusion detection; sensing system; random code signal; leaky coaxial cable (LCX) sensor; radar sensor; LEAKY COAXIAL-CABLE; SENSOR; FMCW;
D O I
10.3390/s22114307
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In order to prevent illegal intrusion, theft, and destruction, important places require stable and reliable human intrusion detection technology to maintain security. In this paper, a combined sensing system using anti-jamming random code signals is proposed and demonstrated experimentally to detect the human intruder in the protected area. This sensing system combines the leaky coaxial cable (LCX) sensor and the single-transmitter-double-receivers (STDR) radar sensor. They transmit the orthogonal physical random code signals generated by Boolean chaos as the detection signals. The LCX sensor realizes the early intrusion alarm at the protected area boundary by comparing the correlation traces before and after intrusion. Meanwhile, the STDR radar sensor is used to track the intruder's moving path inside the protected area by correlation ranging and ellipse positioning, as well as recognizing intruder's activities by time-frequency analysis, feature extraction, and support vector machine. The experimental results demonstrate that this combined sensing system not only realizes the early alarm and path tracking for the intruder with the 13 cm positioning accuracy, but also recognizes the intruder's eight activities including squatting, picking up, jumping, waving, walking forward, running forward, walking backward, and running backward with 98.75% average accuracy. Benefiting from the natural randomness and auto-correlation of random code signal, the proposed sensing system is also proved to have a large anti-jamming tolerance of 27.6 dB, which can be used in the complex electromagnetic environment.
引用
收藏
页数:18
相关论文
共 50 条
[1]   High-resolution and anti-jamming chaotic guided radar prototype for perimeter intrusion detection [J].
Qiao, Jun ;
Xu, Hang ;
Zhang, Jianguo ;
Han, Hong ;
Wang, Bingjie .
JOURNAL OF ELECTROMAGNETIC WAVES AND APPLICATIONS, 2019, 33 (08) :1060-1069
[2]   Network intrusion detection system using random projection technique [J].
Deng, HM ;
Zeng, QA ;
Agrawal, DP .
SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, :10-16
[3]   Random Forest Modeling for Network Intrusion Detection System [J].
Farnaaz, Nabila ;
Jabbar, M. A. .
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 :213-217
[4]   Intrusion Detection System Based on Conditional Random Fields [J].
Guleria, Deepa V. ;
Chavan, M. K. .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (12) :80-86
[5]   A hybrid network intrusion detection technique using random forests [J].
Zhang, Jiong ;
Zulkernine, Mohammad .
FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, :262-+
[6]   Layered Approach Using Conditional Random Fields for Intrusion Detection [J].
Gupta, Kapil Kumar ;
Nath, Baikunth ;
Kotagiri, Ramamohanarao .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2010, 7 (01) :35-49
[7]   Intrusion Detection Using Error Correcting Output Code Based Ensemble [J].
AbdElrahman, Shaza Merghani ;
Abraham, Ajith .
2014 14TH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS (HIS), 2014, :181-186
[8]   Intrusion Detection Using Error Correcting Output Code Based Ensemble [J].
AbdElrahman, Shaza Merghani ;
Abraham, Ajith .
JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2015, 10 (02) :72-79
[9]   Intrusion Detection System Using WoSAD Method [J].
Sridevi, R. ;
Nithya, N. .
INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 :423-430
[10]   Performance of Intrusion Detection System using GRNN [J].
Choudhary, Amit Kumar ;
Swarup, Akhilesh .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (12) :219-222