A Combined Sensing System for Intrusion Detection Using Anti-Jamming Random Code Signals

被引:3
作者
Xu, Hang [1 ,2 ]
Li, Yingxin [1 ,2 ]
Ma, Cheng [1 ,2 ]
Liu, Li [1 ,2 ]
Wang, Bingjie [1 ,2 ]
Li, Jingxia [1 ,2 ]
机构
[1] Taiyuan Univ Technol, Key Lab Adv Transducers & Intelligent Control Sys, Minist Educ & Shanxi Prov, Taiyuan 030024, Peoples R China
[2] Taiyuan Univ Technol, Coll Phys & Optoelect, Taiyuan 030024, Peoples R China
基金
中国国家自然科学基金;
关键词
intrusion detection; sensing system; random code signal; leaky coaxial cable (LCX) sensor; radar sensor; LEAKY COAXIAL-CABLE; SENSOR; FMCW;
D O I
10.3390/s22114307
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In order to prevent illegal intrusion, theft, and destruction, important places require stable and reliable human intrusion detection technology to maintain security. In this paper, a combined sensing system using anti-jamming random code signals is proposed and demonstrated experimentally to detect the human intruder in the protected area. This sensing system combines the leaky coaxial cable (LCX) sensor and the single-transmitter-double-receivers (STDR) radar sensor. They transmit the orthogonal physical random code signals generated by Boolean chaos as the detection signals. The LCX sensor realizes the early intrusion alarm at the protected area boundary by comparing the correlation traces before and after intrusion. Meanwhile, the STDR radar sensor is used to track the intruder's moving path inside the protected area by correlation ranging and ellipse positioning, as well as recognizing intruder's activities by time-frequency analysis, feature extraction, and support vector machine. The experimental results demonstrate that this combined sensing system not only realizes the early alarm and path tracking for the intruder with the 13 cm positioning accuracy, but also recognizes the intruder's eight activities including squatting, picking up, jumping, waving, walking forward, running forward, walking backward, and running backward with 98.75% average accuracy. Benefiting from the natural randomness and auto-correlation of random code signal, the proposed sensing system is also proved to have a large anti-jamming tolerance of 27.6 dB, which can be used in the complex electromagnetic environment.
引用
收藏
页数:18
相关论文
共 50 条
[21]   Using data correlation to build an intrusion detection system [J].
Romano, L. ;
Vianello, V. ;
Antonio, S. D' ;
Giordano, S. .
RECENT ADVANCES IN AUTOMATION & INFORMATION: PROCEEDINGS OF THE 10TH WSEAS INTERNATIONAL CONFERENCE ON AUTOMATION & INFORMATION (ICAI'09), 2009, :342-+
[22]   Intrusion Detection System Using FKNN and Improved PSO [J].
Wazirali, Raniyah .
CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 67 (02) :1429-1445
[23]   Intrusion Detection System using Fuzzy Genetic Algorithm [J].
Danane, Yogita ;
Parvat, Thaksen .
2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
[24]   Intrusion Detection System for Applications Using Linux Containers [J].
Abed, Amr S. ;
Clancy, Charles ;
Levy, David S. .
SECURITY AND TRUST MANAGEMENT (STM 2015), 2015, 9331 :123-135
[25]   Intrusion Detection System using Bagging Ensemble Selection [J].
Sreenath, M. ;
Udhayan, J. .
2015 IEEE INTERNATIONAL CONFERENCE ON ENGINEERING AND TECHNOLOGY (ICETECH), 2015, :4-7
[26]   An advanced method for detection of botnet traffic using Intrusion Detection System [J].
Koli, Manoj S. ;
Chavan, Manik K. .
PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2017, :481-485
[27]   Intrusion Detection Framework for the Internet of Things Using a Dense Random Neural Network [J].
Latif, Shahid ;
Huma, Zil e ;
Jamal, Sajjad Shaukat ;
Ahmed, Fawad ;
Ahmad, Jawad ;
Zahid, Adnan ;
Dashtipour, Kia ;
Aftab, Muhammad Umar ;
Ahmad, Muhammad ;
Abbasi, Qammer Hussain .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) :6435-6444
[28]   Mining a Ubiquitous Time and Attendance Schema using Random Forests for Intrusion detection [J].
Promod, K., V ;
Jacob, Binu .
INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, SCIENCE AND TECHNOLOGY (ICETEST - 2015), 2016, 24 :1226-1231
[29]   Intrusion Detection in NEAR System by Anti-denoising Traffic Data Series using Discrete Wavelet Transform [J].
Vancea, Florin .
Advances in Electrical and Computer Engineering, 2014, 14 (04) :43-48
[30]   Research on network intrusion detection method of power system based on random forest algorithm [J].
Zhu, Guowei ;
Yuan, Hui ;
Zhuang, Yan ;
Guo, Yue ;
Zhang, Xianfei ;
Qiu, Shuang .
2021 13TH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2021), 2021, :374-379