Intrusion detection system based on speckle pattern analysis

被引:0
作者
A. Dhall
J. K. Chhabra
N. S. Aulakh
机构
[1] Central Scientific Instruments Organisation,
来源
Experimental Techniques | 2005年 / 29卷
关键词
Speckle; Intrusion; Fiber optic; Security; Image processing;
D O I
暂无
中图分类号
学科分类号
摘要
Buried fiber intrusion detection by calculating the changes in the spatial distribution of energy in the output of a multimode optical fiber has been demonstrated. An analysis and experimental demonstrations of the system have been provided in which we observed that by using the very simple technique of speckle pattern analysis using image processing we could detect various intrusions. The system can be used to detect the passage of vehicles and personnel over buried sensing fibers. The non-electrical nature of the sensor would allow it to be undetectable by the intruder, and the low loss nature of fiber optics would allow the signal processing location to be located at a large distance from the actual sensor. The complete hardware utilized in this effort is one that can be realized at low cost. The same technique can be used in many other sensing applications like temperature sensing, pressure sensing, any kind of vibration sensing etc. Further improvements in the design can be planned using neural network and advanced image processing algorithms such that only human intrusions are separated from other (nuisance) intrusion signals.
引用
收藏
页码:25 / 31
页数:6
相关论文
共 50 条
  • [1] Intrusion detection system based on speckle pattern analysis
    Dhall, A
    Chhabra, JK
    Aulakh, NS
    EXPERIMENTAL TECHNIQUES, 2005, 29 (01) : 25 - 31
  • [2] General Study of Intrusion Detection System and Survey of Agent Based Intrusion Detection System
    Saxena, Aumreesh Ku.
    Sinha, Sitesh
    Shukla, Piyush
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 417 - 421
  • [3] An Intrusion Detection System Based on Hadoop
    Shi, Zhiguo
    An, Jianwei
    IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 826 - 830
  • [4] Grid-based intrusion detection system
    Choon, OT
    Samsudin, A
    APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, : 1028 - 1032
  • [5] Fuzzy based intrusion detection system in MANET
    Edwin Singh C.
    Celestin Vigila S.M.
    Measurement: Sensors, 2023, 26
  • [6] A Novel Similar Temporal System Call Pattern Mining for Efficient Intrusion Detection
    Radhakrishna, Vangipuram
    Kumar, Puligadda Veereswara
    Janaki, Vinjamuri
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2016, 22 (04) : 475 - 493
  • [7] A framework for multiagent-based system for intrusion detection
    Hegazy, IM
    Al-Arif, T
    Fayed, T
    Faheem, HM
    INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, 2003, : 117 - 125
  • [8] Intrusion Detection System Based on Plastic Optical Fiber
    Szolga, L. A.
    Galatus, R.
    Oltean, G.
    Ivanciu, L.
    2017 IEEE 23RD INTERNATIONAL SYMPOSIUM FOR DESIGN AND TECHNOLOGY IN ELECTRONIC PACKAGING (SIITME), 2017, : 403 - 408
  • [9] Smart Fluid Agent Based Intrusion Detection System
    Saha, Ankita
    Setua, S. K.
    PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015), 2015, : 1070 - 1073
  • [10] Comparative Analysis of Machine Learning Algorithms Based on the Outcome of Proactive Intrusion Detection System
    Abirami, Sivaprasad
    Palanikumar, S.
    HELIX, 2020, 10 (05): : 32 - 37