A Combined Sensing System for Intrusion Detection Using Anti-Jamming Random Code Signals

被引:3
作者
Xu, Hang [1 ,2 ]
Li, Yingxin [1 ,2 ]
Ma, Cheng [1 ,2 ]
Liu, Li [1 ,2 ]
Wang, Bingjie [1 ,2 ]
Li, Jingxia [1 ,2 ]
机构
[1] Taiyuan Univ Technol, Key Lab Adv Transducers & Intelligent Control Sys, Minist Educ & Shanxi Prov, Taiyuan 030024, Peoples R China
[2] Taiyuan Univ Technol, Coll Phys & Optoelect, Taiyuan 030024, Peoples R China
基金
中国国家自然科学基金;
关键词
intrusion detection; sensing system; random code signal; leaky coaxial cable (LCX) sensor; radar sensor; LEAKY COAXIAL-CABLE; SENSOR; FMCW;
D O I
10.3390/s22114307
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In order to prevent illegal intrusion, theft, and destruction, important places require stable and reliable human intrusion detection technology to maintain security. In this paper, a combined sensing system using anti-jamming random code signals is proposed and demonstrated experimentally to detect the human intruder in the protected area. This sensing system combines the leaky coaxial cable (LCX) sensor and the single-transmitter-double-receivers (STDR) radar sensor. They transmit the orthogonal physical random code signals generated by Boolean chaos as the detection signals. The LCX sensor realizes the early intrusion alarm at the protected area boundary by comparing the correlation traces before and after intrusion. Meanwhile, the STDR radar sensor is used to track the intruder's moving path inside the protected area by correlation ranging and ellipse positioning, as well as recognizing intruder's activities by time-frequency analysis, feature extraction, and support vector machine. The experimental results demonstrate that this combined sensing system not only realizes the early alarm and path tracking for the intruder with the 13 cm positioning accuracy, but also recognizes the intruder's eight activities including squatting, picking up, jumping, waving, walking forward, running forward, walking backward, and running backward with 98.75% average accuracy. Benefiting from the natural randomness and auto-correlation of random code signal, the proposed sensing system is also proved to have a large anti-jamming tolerance of 27.6 dB, which can be used in the complex electromagnetic environment.
引用
收藏
页数:18
相关论文
共 50 条
[31]   A Design and Implementation of Intrusion Detection System by using Data Mining [J].
Sharma, Brijesh ;
Gupta, Huma .
2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, :700-704
[32]   Analysis on intrusion detection system using machine learning techniques [J].
Seraphim B.I. ;
Poovammal E. .
Lecture Notes on Data Engineering and Communications Technologies, 2021, 66 :423-441
[33]   A kind of multilayer intrusion detection system using mobile agent [J].
Xiong, JJ ;
Zhang, J .
2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, :1951-1955
[34]   Anomaly Intrusion Detection System Using Gaussian Mixture Model [J].
Bahrololum, M. ;
Khaleghi, A. .
THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, :1162-1167
[35]   Training of Intelligent Intrusion Detection System using Neuro Fuzzy [J].
Panja, Biswajit ;
Ogunyanwo, Olugbenga ;
Meharia, Priyanka .
2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2014, :95-100
[36]   Physical Intrusion Detection System Using Stereo Video Analytics [J].
Aravamuthan, G. ;
Rajasekhar, P. ;
Verma, R. K. ;
Shrikhande, S., V ;
Kar, S. ;
Babu, Suresh .
PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON COMPUTER VISION AND IMAGE PROCESSING, CVIP 2018, VOL 2, 2020, 1024 :173-182
[37]   Using fuzzy system to manage false alarms in intrusion detection [J].
Shajari, M ;
Ghorbani, AA .
SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 :241-252
[38]   An Adaptive and Robust Device-Free Intrusion Detection Using Ubiquitous WiFi Signals [J].
Jin, Yue ;
Tian, Zengshan ;
Zhou, Mu ;
Li, Ze ;
Zhang, Zhenyuan .
2018 IEEE 23RD INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (DSP), 2018,
[39]   A Survey on Intrusion Detection System Using Machine Learning Algorithms [J].
Gulghane, Shital ;
Shingate, Vishal ;
Bondgulwar, Shivani ;
Awari, Gaurav ;
Sagar, Parth .
INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 :670-675
[40]   Intrusion detection using system call sequences and construction of finite [J].
Kim, S ;
Wee, K .
8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTING TECHNIQUES, 2004, :532-537