SlideShare ist ein Scribd-Unternehmen logo
1 von 53
Downloaden Sie, um offline zu lesen
A Low-Complexity Algorithm for Robust Intrusion
Detection in PIR-based Wireless Sensor Network

                Ramanathan Subramanian
              sramanathan@csa.iisc.ernet.in

       Under the guidance of Prof. P. Vijay Kumar

                        CSA Dept.
                     IISc, Bangalore


                     May 17, 2010
Outline




      Problem Description.
      PIR Sensor Operation.
      Intrusion Detection Algorithm Description.
      Simulation Results and Field Testing.
      Idealized Intruder Waveform Analysis.
      Intruder Tracking.
Introduction
      Wireless sensor networks find numerous applications. To name
      a few,
          Unattended Surveillance.
          Environmental applications.
          Precision Agriculture.
      Surveillance cameras are expensive and power hungry.
      Power outlets are not going to be available in the terrains of
      interest.
      Currently, Passive Infra-Red (PIR) sensors consume less power
      than cameras by up to two orders of magnitude.
      PIR sensors can be used as a low-power wake-up mechanism
      for cameras.
      PIR sensors are triggered by blowing debris, birds, animals,
      vegetation, hot air currents etc.
      The problem is challenging because intrusion is a rare event
      while clutter is always present.
      Frequent false alarms would effectively render the system
      useless.
Problem Description




      Detect an intruder in the presence of clutter with low false
      alarm rate.
      The intruder is a human traveling in the vicinity of the sensor.
      The term clutter is used to describe the waveform generated
      at the output of the sensor as a result of the movement of
      vegetation caused by the wind.
Objective




      Robust intruder detection algorithm.
      Minimize the energy spent in detection.
Challenges




      Handle various speeds of the intruder.
             Duration of the intruder signature could vary from 3s to 18s.
      Reject clutter from various forms of vegetation.
             Performance of the algorithm should not be terrain dependent.
      Low-complexity algorithm.
             Energy spent in the detection reflects in the number of
             operations performed.
PIR Sensor Operation


      The PIR sensors along with the optical filters are tuned to
      detect wavelengths in the range of 8 − 14µm.
      From Wien’s law we know that humans emit peak radiation at
      9.4µm (far Infra-Red).
      A PIR sensor converts the spatial and temporal variations of
      intensity of IR falling onto its sensitive element(s), into an
      electrical signal.
      Moving vegetation also causes variations in the ambient IR
      intensity perceived by the sensor, which leads to clutter. This
      is primarily due to varying occlusions of background IR
      emissions caused by moving vegetation.
Pyroelectricity


       A PIR sensor works on the principle of pyroelectricity.
Basic Sensing Model
Analog Panasonic Motion Sensor AMN24111




      The sensor produces an electrical potential proportional to
      differences in the rate of intensity variations across the two
      diagonals.
Golf Ball Lens




       Radiation received by each plano-convex lens from a zone in
       the field of view is focused in the sensing region for sensing
       by the infrared detector.
Cross Section Of The Beams




                  Figure: Virtual Pixel Array
Top View Of The Beams
Intruder Signature For 3m Slow Walk
Intruder Signature For (50◦ , 1.5m) Slow Walk
Choice Of Sensor
Transform Based Approach




  Figure: 256 Pt DFT Of Intruder And Clutter Data From Analog And
  Digital Sensor.

      The figure above pertaining to the analog sensor suggests
      separating intruder from clutter based on the spectral
      signature of their waveforms.
      It was decided to use Haar Transform (HT) for computing the
      spectral signature in preference to DFT as only additions and
      subtractions suffice to compute the HT.
The Haar Transform And Frequency Binning
      Since HT is a wavelet transform its coefficients are designed
      to provide both frequency and time localization information.
      As a result, the breakdown of N Haar coefficients is as follows:
      there is one coefficient assigned to frequency 0 (the DC
      component) and 2k coefficients attached to signals of
      frequency 2k , 0 ≤ k ≤ log(N) − 1. Thus, there are a total of
      log(N) + 1 frequencies or frequency ‘bins’ for which the
      energy is computed in the algorithm.
      The Haar signals associated with 8-sample transform are
      shown in the figure below:
The Fast Haar Transform




              Figure: 8-sample fast Haar transform.
Support Vector Machine




      LIBSVM library interfaced to MATLAB was used for support
      vector classification.
Functional Block Diagram Of The Algorithm
Computational Complexity
Intruder Data Collection

       Intruder data was collected in a laboratory (i.e., clutter-free)
       environment.




                     Figure: Experimental floor layout.
Intruder Data Collection
Clutter Data Collection

       Clutter data was collected across many outdoor locations in
       IISc over the period October 2008 to March 2009.




           Figure: ECE Dept. lawn with a variety of vegetation.
Clutter Data Collection




   Figure: A location in ECE Dept. lawn where a part of clutter data was
   accumulated.
Training Performance




      Performance: (112 Intruder data and 112 Clutter data)
          7/112 = 6.3% misses.
          4/112 = 3.6% false alarms.
Testing Performance




              Figure: Linear SVM: Intrusion detected.
Testing Performance




              Figure: Linear SVM: Clutter rejected.
Field Testing

       The field testing was conducted in the ECE Dept. lawn.
       Three sensors were mounted onto a single platform each with
       an angular spacing of 120◦ . This essentially gave each
       platform an omni-directional sensing range.
       Two identical, linear and parallel arrays of nodes spaced apart
       by 5m was laid. The inter-node distance in an array was
       chosen to maximize the area covered by a single node while
       ensuring that every point in the sensing range was covered by
       at least 3 nodes.
       When tested over a period of several hours the network
       performed flawlessly by detecting every intrusion at speeds
       ranging from that of a slow crawl to a sprint at 5m/sec.
       There were also no false alarms in the period over which
       testing was conducted.
Our Three Sensor Platform
A Field Location
Wireless Trip Wire




      We refer to the linear arrangement of nodes as a ‘wireless trip
      wire’.
      Let ∆, Rs and (a − p − n) be the inter-node distance, sensing
      radius of a node and area per node respectively.
      Let the trip wire provide us k-coverage for a width of ρ on
                                                             2
      either√sides with the (a − p − n) maximized.
             2Rs
      ∆=    k−1    maximizes the (a − p − n)
                                               2Rs2
                           (a − p − n)max =
                                                k
Limitations


       When field testing was carried out around noontime in April
       2009, at the height of the summer in Bangalore, a
       significantly larger false alarm rate was observed.
       When such summer noontime data was also included in the
       training set, linear SVM recorded a training performance of
       60/275 = 21.8% misses and 22/275 = 8% false alarms.
       Replacing the linear SVM with a quadratic SVM was able to
       improve the record on training data to 47/275 = 17% misses
       and 15/275 = 5.5% false alarms.
       The improvement with regard to testing data (simulation) was
       far more pronounced.
Quadratic SVM On Summer Clutter Data
Summary Of Training Performance
Factors Influencing Clutter




      Amplitude of clutter signal depends on
          Proximity and size of the vegetation.
          The ambient temperature.
      Frequency depends on
          Stem’s stiffness of the vegetation.
          The wind speed.
Idealized Intruder Waveform Analysis




         Figure: Geometry used for modeling intruder signature.
Analytical Model For Intruder Signature


      The instantaneous frequency f (t) of the intruder signature is
      then from OBC given by,

                                  v cos ψ(t)         κλ
             f (t) = κω(t) = κ               =
                                     r (t)     (λ(t − t0 ))2 + 1
                     v                 − cot(φ+θ)
      where λ =   d sin φ
                            and t0 =        λ     .
      The intruder signature is thus given by,
                                           t
             s(t) = sin 2π                     f (t)dt
                                       0
                                                                 λt
                    = sin 2πκ arctan
                                                     λ2 t   0 (t − t0 ) + 1
Intruder Signature For (v , d, φ) = (0.7, 3, 90◦ )
Intruder Signature For (v , d, φ) = (0.3, 2, 50◦ )
What Does The Model Suggest?

      κ is the constant which corresponds to the density of the
      beams.
      Hence the analytical expression naturally extends to other
      differential PIR sensors in general as κ abstracts the lens.
      λ and t0 determine the intruder’s analytical waveform.
      λ for different triplets of (v , d, φ) can be the same. Hence
      velocity and direction of motion information from a single
      sensor cannot be extracted.
      λ corresponding to colocated sensors will be identical. Hence
      velocity and direction of motion information also cannot be
      obtained from multiple sensors on the same node.
      So to track the intruder, many sensing nodes spaced apart will
      be required.
Tracking



      Let the coordinates of the sensing nodes be (xi , yi ).
      Set ηi = 1/λi .
      Lets assume that the ith sensor node has available its reliable
      estimate of ηi .
      Let the intruder path equation be ax + by + c = 0.
                √
                    a2 +b 2                    a
      Set r =        c        and α = arctan   b   .
      The intruder path equation ax + by + c = 0 can be rewritten
      as: xr sin α + yr cos α + 1 = 0.
Tracking

      For a node at (x1 , y1 ),

                             ax1 + by1 + c
               dmin,1 =        √
                                 a2 + b 2
                             dmin,1   sin α      cos α      1
                ⇒ η1 =              =       x1 +       y1 +
                               v         v         v        vr
      We have 3 unknowns, r , α, v but just one equation. Thus we
      require two more equations to solve for r , α and v .
                                  sin α      cos α      1
                      η2 =              x2 +       y2 +
                                    v          v        vr
                                  sin α      cos α      1
                      η3 =              x3 +       y3 +
                                    v          v        vr
      Now we have 3 equations in 3 unknowns.
Tracking

      After some work, it can be shown that
                                 1
                         v   =    √
                                  + c2s2
                                     s
                         α = arctan
                                     c
                                      1
                         r =
                             v (η3 − sx3 − cy3 )

      where
                 sin α   (η1 − η2 )(y1 − y3 ) − (η1 − η3 )(y1 − y2 )
           s =         =
                   v     (x1 − x2 )(y1 − y3 ) − (x1 − x3 )(y1 − y2 )
                 cos α   −(η1 − η2 )(x1 − x3 ) + (η1 − η3 )(x1 − x2 )
           c =         =
                   v       (x1 − x2 )(y1 − y3 ) − (x1 − x3 )(y1 − y2 )

      Hence, 3 sensing nodes will suffice in reliably tracking the
      intruder.
Optimal Locationing Of The 3 Sensing Nodes


      Tracking involves the transformation: (η1 , η2 , η3 ) → (r , α, v ).
      The impact of error in the estimates of ηi ’s on r , α and v
      should be kept minimum for reliable tracking.
      Equivalently, the Jacobian of the transformation carrying out
      the mapping: (r , α, v ) → (η1 , η2 , η3 ) should be maximized.
                                   ∂η1   ∂η2   ∂η3
                                   ∂r    ∂r    ∂r
                             .     ∂η1   ∂η2   ∂η3
                            J=     ∂α    ∂α    ∂α
                                   ∂η1   ∂η2   ∂η3
                                   ∂v    ∂v    ∂v

      Without loss of generality lets assume a coordinate system
      whose origin is equidistant from the three sensors. Each
      sensor then is at a constant distance R from the origin.
Optimal Locationing Of The 3 Sensing Nodes

      Again we have a system of 3 equations in the 3 unknowns r , α
      and v :
                        sin α      cos α     1
                ηi =          xi +       yi + , 1 ≤ i ≤ 3.
                          v          v       vr
      Rewriting the above system of 3 equations with
                                                           y
      xi = R cos(βi ), yi = R sin(βi ), where βi = arctan( xii ), we have

                          R               1
                  ηi =      sin(α + βi ) + , 1 ≤ i ≤ 3.
                          v               vr
      After some work, it can be shown that this Jacobian is given
      by

                R2
         J=           [sin(β3 − β2 ) + sin(β1 − β3 ) + sin(β2 − β1 )] .
               r 2v 2
Optimal Locationing Of The 3 Sensing Nodes




      The value of J is clearly maximized when
      β3 − β2 = β1 − β3 = β2 − β1 = 2π and when R is made as
                                       3
      large as possible.
      This suggests that the nodes should be arranged in an
      equilateral triangle with R as large as possible, subject to
      the desired node density.
Other Issues




      With a good model for the clutter signature, this problem can
      be formulated into a proper detection problem.
      Sleep-wake cycling.
      Online training.
Conclusion




      We have reasonably met the challenges.
      This application will become sophisticated when ‘better’
      sensors become available.
References

      S. Oh, P. Chen, M. Manzo, and S. Sastry, “Instrumenting
      wireless sensor networks for real-time surveillance,” in Proc.
      of the International Conference on Robotics and Automation,
      May 2006.
      A. Arora, P. Dutta, S. Bapat, V. Kulathumani, H. Zhang, V.
      Naik, V. Mittal, H. Cao, M. Demirbas, M. Gouda, Y-R. Choi,
      T. Herman, S. S. Kulkarni, U. Arumugam, M. Nesterenko, A.
      Vora, and M. Miyashita, “A line in the sand: A wireless sensor
      network for target detection, classification, and tracking”,
      Ohio State University, 2003.
      MP Motion Sensor (AMN 1,2,4) data sheet, Panasonic
      Electric Works Corporation of America, New Jersey, USA.
      Sidney B. Lang, “Pyroelectricity: From Ancient Curiosity to
      Modern Imaging Tool”, Physics Today, pages 31-36, Aug.
      2005.
Questions
Low-Complexity Algorithm for Detecting Intruders in PIR Sensor Networks

Weitere ähnliche Inhalte

Was ist angesagt?

Automating the mundanity of technique IDs with ATT&CK Detections Collector
Automating the mundanity of technique IDs with ATT&CK Detections CollectorAutomating the mundanity of technique IDs with ATT&CK Detections Collector
Automating the mundanity of technique IDs with ATT&CK Detections CollectorMITRE ATT&CK
 
From Theory to Practice: How My ATTACK Perspectives Have Changed
From Theory to Practice: How My ATTACK Perspectives Have ChangedFrom Theory to Practice: How My ATTACK Perspectives Have Changed
From Theory to Practice: How My ATTACK Perspectives Have ChangedMITRE - ATT&CKcon
 
My Thesis Defense Presentation
My Thesis Defense PresentationMy Thesis Defense Presentation
My Thesis Defense PresentationOnur Taylan
 
Prepare your Ph.D. Defense Presentation
Prepare your Ph.D. Defense PresentationPrepare your Ph.D. Defense Presentation
Prepare your Ph.D. Defense PresentationChristian Glahn
 
【DL輪読会】Where do Models go Wrong? Parameter-Space Saliency Maps for Explainabi...
【DL輪読会】Where do Models go Wrong? Parameter-Space Saliency Maps for Explainabi...【DL輪読会】Where do Models go Wrong? Parameter-Space Saliency Maps for Explainabi...
【DL輪読会】Where do Models go Wrong? Parameter-Space Saliency Maps for Explainabi...Deep Learning JP
 
Slides_Deep_Radar_Perception_for_Autonomous_Driving.pdf
Slides_Deep_Radar_Perception_for_Autonomous_Driving.pdfSlides_Deep_Radar_Perception_for_Autonomous_Driving.pdf
Slides_Deep_Radar_Perception_for_Autonomous_Driving.pdfYi Zhou
 
It's just a jump to the left (of boom): Prioritizing detection implementation...
It's just a jump to the left (of boom): Prioritizing detection implementation...It's just a jump to the left (of boom): Prioritizing detection implementation...
It's just a jump to the left (of boom): Prioritizing detection implementation...MITRE ATT&CK
 
深層意味表現学習 (Deep Semantic Representations)
深層意味表現学習 (Deep Semantic Representations)深層意味表現学習 (Deep Semantic Representations)
深層意味表現学習 (Deep Semantic Representations)Danushka Bollegala
 
ATT&CK Updates- Campaigns
ATT&CK Updates- CampaignsATT&CK Updates- Campaigns
ATT&CK Updates- CampaignsMITRE ATT&CK
 
Kyle Jensen MIT Ph.D. Thesis Defense
Kyle Jensen MIT Ph.D. Thesis DefenseKyle Jensen MIT Ph.D. Thesis Defense
Kyle Jensen MIT Ph.D. Thesis DefenseKyle Jensen
 
[DL輪読会]ICLR2020の分布外検知速報
[DL輪読会]ICLR2020の分布外検知速報[DL輪読会]ICLR2020の分布外検知速報
[DL輪読会]ICLR2020の分布外検知速報Deep Learning JP
 
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...MITRE - ATT&CKcon
 
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat IntelligenceATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat IntelligenceMITRE - ATT&CKcon
 
文献紹介:Benchmarking Neural Network Robustness to Common Corruptions and Perturb...
文献紹介:Benchmarking Neural Network Robustness to Common Corruptions and Perturb...文献紹介:Benchmarking Neural Network Robustness to Common Corruptions and Perturb...
文献紹介:Benchmarking Neural Network Robustness to Common Corruptions and Perturb...Toru Tamaki
 
[招待講演] スピーカアレイを用いた空間フーリエ変換に基づく局所再生
[招待講演] スピーカアレイを用いた空間フーリエ変換に基づく局所再生[招待講演] スピーカアレイを用いた空間フーリエ変換に基づく局所再生
[招待講演] スピーカアレイを用いた空間フーリエ変換に基づく局所再生Takuma_OKAMOTO
 
Video Analytics At Scale: DL, CV, ML On Databricks Platform
Video Analytics At Scale: DL, CV, ML On Databricks PlatformVideo Analytics At Scale: DL, CV, ML On Databricks Platform
Video Analytics At Scale: DL, CV, ML On Databricks PlatformDatabricks
 
Deep-Learning-Based Environmental Sound Segmentation - Integration of Sound ...
Deep-Learning-Based  Environmental Sound Segmentation - Integration of Sound ...Deep-Learning-Based  Environmental Sound Segmentation - Integration of Sound ...
Deep-Learning-Based Environmental Sound Segmentation - Integration of Sound ...Yui Sudo
 

Was ist angesagt? (20)

研究内容
研究内容研究内容
研究内容
 
Automating the mundanity of technique IDs with ATT&CK Detections Collector
Automating the mundanity of technique IDs with ATT&CK Detections CollectorAutomating the mundanity of technique IDs with ATT&CK Detections Collector
Automating the mundanity of technique IDs with ATT&CK Detections Collector
 
From Theory to Practice: How My ATTACK Perspectives Have Changed
From Theory to Practice: How My ATTACK Perspectives Have ChangedFrom Theory to Practice: How My ATTACK Perspectives Have Changed
From Theory to Practice: How My ATTACK Perspectives Have Changed
 
My Thesis Defense Presentation
My Thesis Defense PresentationMy Thesis Defense Presentation
My Thesis Defense Presentation
 
Prepare your Ph.D. Defense Presentation
Prepare your Ph.D. Defense PresentationPrepare your Ph.D. Defense Presentation
Prepare your Ph.D. Defense Presentation
 
【DL輪読会】Where do Models go Wrong? Parameter-Space Saliency Maps for Explainabi...
【DL輪読会】Where do Models go Wrong? Parameter-Space Saliency Maps for Explainabi...【DL輪読会】Where do Models go Wrong? Parameter-Space Saliency Maps for Explainabi...
【DL輪読会】Where do Models go Wrong? Parameter-Space Saliency Maps for Explainabi...
 
Slides_Deep_Radar_Perception_for_Autonomous_Driving.pdf
Slides_Deep_Radar_Perception_for_Autonomous_Driving.pdfSlides_Deep_Radar_Perception_for_Autonomous_Driving.pdf
Slides_Deep_Radar_Perception_for_Autonomous_Driving.pdf
 
It's just a jump to the left (of boom): Prioritizing detection implementation...
It's just a jump to the left (of boom): Prioritizing detection implementation...It's just a jump to the left (of boom): Prioritizing detection implementation...
It's just a jump to the left (of boom): Prioritizing detection implementation...
 
深層意味表現学習 (Deep Semantic Representations)
深層意味表現学習 (Deep Semantic Representations)深層意味表現学習 (Deep Semantic Representations)
深層意味表現学習 (Deep Semantic Representations)
 
ATT&CK Updates- Campaigns
ATT&CK Updates- CampaignsATT&CK Updates- Campaigns
ATT&CK Updates- Campaigns
 
最新の異常検知手法(NIPS 2018)
最新の異常検知手法(NIPS 2018)最新の異常検知手法(NIPS 2018)
最新の異常検知手法(NIPS 2018)
 
Kyle Jensen MIT Ph.D. Thesis Defense
Kyle Jensen MIT Ph.D. Thesis DefenseKyle Jensen MIT Ph.D. Thesis Defense
Kyle Jensen MIT Ph.D. Thesis Defense
 
[DL輪読会]ICLR2020の分布外検知速報
[DL輪読会]ICLR2020の分布外検知速報[DL輪読会]ICLR2020の分布外検知速報
[DL輪読会]ICLR2020の分布外検知速報
 
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
 
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat IntelligenceATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
 
文献紹介:Benchmarking Neural Network Robustness to Common Corruptions and Perturb...
文献紹介:Benchmarking Neural Network Robustness to Common Corruptions and Perturb...文献紹介:Benchmarking Neural Network Robustness to Common Corruptions and Perturb...
文献紹介:Benchmarking Neural Network Robustness to Common Corruptions and Perturb...
 
20190804_icml_kyoto
20190804_icml_kyoto20190804_icml_kyoto
20190804_icml_kyoto
 
[招待講演] スピーカアレイを用いた空間フーリエ変換に基づく局所再生
[招待講演] スピーカアレイを用いた空間フーリエ変換に基づく局所再生[招待講演] スピーカアレイを用いた空間フーリエ変換に基づく局所再生
[招待講演] スピーカアレイを用いた空間フーリエ変換に基づく局所再生
 
Video Analytics At Scale: DL, CV, ML On Databricks Platform
Video Analytics At Scale: DL, CV, ML On Databricks PlatformVideo Analytics At Scale: DL, CV, ML On Databricks Platform
Video Analytics At Scale: DL, CV, ML On Databricks Platform
 
Deep-Learning-Based Environmental Sound Segmentation - Integration of Sound ...
Deep-Learning-Based  Environmental Sound Segmentation - Integration of Sound ...Deep-Learning-Based  Environmental Sound Segmentation - Integration of Sound ...
Deep-Learning-Based Environmental Sound Segmentation - Integration of Sound ...
 

Andere mochten auch

Numerical and experimental impact analysis of square crash box structure with...
Numerical and experimental impact analysis of square crash box structure with...Numerical and experimental impact analysis of square crash box structure with...
Numerical and experimental impact analysis of square crash box structure with...sahril afandi sitompul
 
Membrane - Plate - Shell
Membrane - Plate - ShellMembrane - Plate - Shell
Membrane - Plate - Shellneikrof
 
Rc bldg. modeling & analysis
Rc bldg. modeling & analysisRc bldg. modeling & analysis
Rc bldg. modeling & analysisRamil Artates
 
Book for Beginners, RCC Design by ETABS
Book for Beginners, RCC Design by ETABSBook for Beginners, RCC Design by ETABS
Book for Beginners, RCC Design by ETABSYousuf Dinar
 
Powerpoint presentation M.A. Thesis Defence
Powerpoint presentation M.A. Thesis DefencePowerpoint presentation M.A. Thesis Defence
Powerpoint presentation M.A. Thesis DefenceCatie Chase
 
Thesis Powerpoint
Thesis PowerpointThesis Powerpoint
Thesis Powerpointneha47
 
Thesis Power Point Presentation
Thesis Power Point PresentationThesis Power Point Presentation
Thesis Power Point Presentationriddhikapandya1985
 

Andere mochten auch (10)

Thesis presentation
Thesis presentationThesis presentation
Thesis presentation
 
Thesis Slides
Thesis SlidesThesis Slides
Thesis Slides
 
Numerical and experimental impact analysis of square crash box structure with...
Numerical and experimental impact analysis of square crash box structure with...Numerical and experimental impact analysis of square crash box structure with...
Numerical and experimental impact analysis of square crash box structure with...
 
Membrane - Plate - Shell
Membrane - Plate - ShellMembrane - Plate - Shell
Membrane - Plate - Shell
 
Rc bldg. modeling & analysis
Rc bldg. modeling & analysisRc bldg. modeling & analysis
Rc bldg. modeling & analysis
 
Book for Beginners, RCC Design by ETABS
Book for Beginners, RCC Design by ETABSBook for Beginners, RCC Design by ETABS
Book for Beginners, RCC Design by ETABS
 
Building Information Modeling (BIM)
Building Information Modeling (BIM)Building Information Modeling (BIM)
Building Information Modeling (BIM)
 
Powerpoint presentation M.A. Thesis Defence
Powerpoint presentation M.A. Thesis DefencePowerpoint presentation M.A. Thesis Defence
Powerpoint presentation M.A. Thesis Defence
 
Thesis Powerpoint
Thesis PowerpointThesis Powerpoint
Thesis Powerpoint
 
Thesis Power Point Presentation
Thesis Power Point PresentationThesis Power Point Presentation
Thesis Power Point Presentation
 

Ähnlich wie Low-Complexity Algorithm for Detecting Intruders in PIR Sensor Networks

An Overview of Array Signal Processing and Beam Forming TechniquesAn Overview...
An Overview of Array Signal Processing and Beam Forming TechniquesAn Overview...An Overview of Array Signal Processing and Beam Forming TechniquesAn Overview...
An Overview of Array Signal Processing and Beam Forming TechniquesAn Overview...Editor IJCATR
 
IR UWB TOA Estimation Techniques and Comparison
IR UWB TOA Estimation Techniques and ComparisonIR UWB TOA Estimation Techniques and Comparison
IR UWB TOA Estimation Techniques and Comparisoninventionjournals
 
1-Wang-FR1020-IGARSS11.pptx
1-Wang-FR1020-IGARSS11.pptx1-Wang-FR1020-IGARSS11.pptx
1-Wang-FR1020-IGARSS11.pptxgrssieee
 
Single Electron Spin Detection Slides For Uno Interview
Single Electron Spin Detection Slides For Uno InterviewSingle Electron Spin Detection Slides For Uno Interview
Single Electron Spin Detection Slides For Uno Interviewchenhm
 
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...Signal to-noise-ratio of signal acquisition in global navigation satellite sy...
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...Alexander Decker
 
Three Element Beam forming Algorithm with Reduced Interference Effect in Sign...
Three Element Beam forming Algorithm with Reduced Interference Effect in Sign...Three Element Beam forming Algorithm with Reduced Interference Effect in Sign...
Three Element Beam forming Algorithm with Reduced Interference Effect in Sign...IJMER
 
RADAR MEASUREMENTS LECTURE EECS BERKELY!
RADAR MEASUREMENTS LECTURE EECS BERKELY!RADAR MEASUREMENTS LECTURE EECS BERKELY!
RADAR MEASUREMENTS LECTURE EECS BERKELY!nagatic941
 
Suppression of Chirp Interferers in GPS Using the Fractional Fourier Transform
Suppression of Chirp Interferers in GPS Using the Fractional Fourier TransformSuppression of Chirp Interferers in GPS Using the Fractional Fourier Transform
Suppression of Chirp Interferers in GPS Using the Fractional Fourier TransformCSCJournals
 
Subsystems of radar and signal processing
Subsystems of radar and signal processing Subsystems of radar and signal processing
Subsystems of radar and signal processing Ronak Vyas
 
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...Mimo radar detection in compound gaussian clutter using orthogonal discrete f...
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...ijma
 
J0412261066
J0412261066J0412261066
J0412261066IOSR-JEN
 
Signal Integrity Asif
Signal Integrity AsifSignal Integrity Asif
Signal Integrity AsifMohammed Asif
 
Williams_FR1_TO4_5_2011_07_29v1.ppt
Williams_FR1_TO4_5_2011_07_29v1.pptWilliams_FR1_TO4_5_2011_07_29v1.ppt
Williams_FR1_TO4_5_2011_07_29v1.pptgrssieee
 
Design of matched filter for radar applications
Design of matched filter for radar  applicationsDesign of matched filter for radar  applications
Design of matched filter for radar applicationselelijjournal
 
Design of Linear Array Transducer Using Ultrasound Simulation Program Field-II
Design of Linear Array Transducer Using Ultrasound Simulation Program Field-IIDesign of Linear Array Transducer Using Ultrasound Simulation Program Field-II
Design of Linear Array Transducer Using Ultrasound Simulation Program Field-IIinventy
 
FPGA Implementation of Large Area Efficient and Low Power Geortzel Algorithm ...
FPGA Implementation of Large Area Efficient and Low Power Geortzel Algorithm ...FPGA Implementation of Large Area Efficient and Low Power Geortzel Algorithm ...
FPGA Implementation of Large Area Efficient and Low Power Geortzel Algorithm ...IDES Editor
 
Noise uncertainty effect on multi-channel cognitive radio networks
Noise uncertainty effect on multi-channel cognitive  radio networks Noise uncertainty effect on multi-channel cognitive  radio networks
Noise uncertainty effect on multi-channel cognitive radio networks IJECEIAES
 

Ähnlich wie Low-Complexity Algorithm for Detecting Intruders in PIR Sensor Networks (20)

Hr3114661470
Hr3114661470Hr3114661470
Hr3114661470
 
An Overview of Array Signal Processing and Beam Forming TechniquesAn Overview...
An Overview of Array Signal Processing and Beam Forming TechniquesAn Overview...An Overview of Array Signal Processing and Beam Forming TechniquesAn Overview...
An Overview of Array Signal Processing and Beam Forming TechniquesAn Overview...
 
IR UWB TOA Estimation Techniques and Comparison
IR UWB TOA Estimation Techniques and ComparisonIR UWB TOA Estimation Techniques and Comparison
IR UWB TOA Estimation Techniques and Comparison
 
1-Wang-FR1020-IGARSS11.pptx
1-Wang-FR1020-IGARSS11.pptx1-Wang-FR1020-IGARSS11.pptx
1-Wang-FR1020-IGARSS11.pptx
 
Single Electron Spin Detection Slides For Uno Interview
Single Electron Spin Detection Slides For Uno InterviewSingle Electron Spin Detection Slides For Uno Interview
Single Electron Spin Detection Slides For Uno Interview
 
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...Signal to-noise-ratio of signal acquisition in global navigation satellite sy...
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...
 
Three Element Beam forming Algorithm with Reduced Interference Effect in Sign...
Three Element Beam forming Algorithm with Reduced Interference Effect in Sign...Three Element Beam forming Algorithm with Reduced Interference Effect in Sign...
Three Element Beam forming Algorithm with Reduced Interference Effect in Sign...
 
RADAR MEASUREMENTS LECTURE EECS BERKELY!
RADAR MEASUREMENTS LECTURE EECS BERKELY!RADAR MEASUREMENTS LECTURE EECS BERKELY!
RADAR MEASUREMENTS LECTURE EECS BERKELY!
 
UWB IRF correlator
UWB IRF correlator UWB IRF correlator
UWB IRF correlator
 
Suppression of Chirp Interferers in GPS Using the Fractional Fourier Transform
Suppression of Chirp Interferers in GPS Using the Fractional Fourier TransformSuppression of Chirp Interferers in GPS Using the Fractional Fourier Transform
Suppression of Chirp Interferers in GPS Using the Fractional Fourier Transform
 
Subsystems of radar and signal processing
Subsystems of radar and signal processing Subsystems of radar and signal processing
Subsystems of radar and signal processing
 
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...Mimo radar detection in compound gaussian clutter using orthogonal discrete f...
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...
 
J0412261066
J0412261066J0412261066
J0412261066
 
Signal Integrity Asif
Signal Integrity AsifSignal Integrity Asif
Signal Integrity Asif
 
Williams_FR1_TO4_5_2011_07_29v1.ppt
Williams_FR1_TO4_5_2011_07_29v1.pptWilliams_FR1_TO4_5_2011_07_29v1.ppt
Williams_FR1_TO4_5_2011_07_29v1.ppt
 
Design of matched filter for radar applications
Design of matched filter for radar  applicationsDesign of matched filter for radar  applications
Design of matched filter for radar applications
 
DSP Lab 1-6.pdf
DSP Lab 1-6.pdfDSP Lab 1-6.pdf
DSP Lab 1-6.pdf
 
Design of Linear Array Transducer Using Ultrasound Simulation Program Field-II
Design of Linear Array Transducer Using Ultrasound Simulation Program Field-IIDesign of Linear Array Transducer Using Ultrasound Simulation Program Field-II
Design of Linear Array Transducer Using Ultrasound Simulation Program Field-II
 
FPGA Implementation of Large Area Efficient and Low Power Geortzel Algorithm ...
FPGA Implementation of Large Area Efficient and Low Power Geortzel Algorithm ...FPGA Implementation of Large Area Efficient and Low Power Geortzel Algorithm ...
FPGA Implementation of Large Area Efficient and Low Power Geortzel Algorithm ...
 
Noise uncertainty effect on multi-channel cognitive radio networks
Noise uncertainty effect on multi-channel cognitive  radio networks Noise uncertainty effect on multi-channel cognitive  radio networks
Noise uncertainty effect on multi-channel cognitive radio networks
 

Kürzlich hochgeladen

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Kürzlich hochgeladen (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Low-Complexity Algorithm for Detecting Intruders in PIR Sensor Networks

  • 1. A Low-Complexity Algorithm for Robust Intrusion Detection in PIR-based Wireless Sensor Network Ramanathan Subramanian sramanathan@csa.iisc.ernet.in Under the guidance of Prof. P. Vijay Kumar CSA Dept. IISc, Bangalore May 17, 2010
  • 2. Outline Problem Description. PIR Sensor Operation. Intrusion Detection Algorithm Description. Simulation Results and Field Testing. Idealized Intruder Waveform Analysis. Intruder Tracking.
  • 3. Introduction Wireless sensor networks find numerous applications. To name a few, Unattended Surveillance. Environmental applications. Precision Agriculture. Surveillance cameras are expensive and power hungry. Power outlets are not going to be available in the terrains of interest. Currently, Passive Infra-Red (PIR) sensors consume less power than cameras by up to two orders of magnitude. PIR sensors can be used as a low-power wake-up mechanism for cameras. PIR sensors are triggered by blowing debris, birds, animals, vegetation, hot air currents etc. The problem is challenging because intrusion is a rare event while clutter is always present. Frequent false alarms would effectively render the system useless.
  • 4. Problem Description Detect an intruder in the presence of clutter with low false alarm rate. The intruder is a human traveling in the vicinity of the sensor. The term clutter is used to describe the waveform generated at the output of the sensor as a result of the movement of vegetation caused by the wind.
  • 5. Objective Robust intruder detection algorithm. Minimize the energy spent in detection.
  • 6. Challenges Handle various speeds of the intruder. Duration of the intruder signature could vary from 3s to 18s. Reject clutter from various forms of vegetation. Performance of the algorithm should not be terrain dependent. Low-complexity algorithm. Energy spent in the detection reflects in the number of operations performed.
  • 7. PIR Sensor Operation The PIR sensors along with the optical filters are tuned to detect wavelengths in the range of 8 − 14µm. From Wien’s law we know that humans emit peak radiation at 9.4µm (far Infra-Red). A PIR sensor converts the spatial and temporal variations of intensity of IR falling onto its sensitive element(s), into an electrical signal. Moving vegetation also causes variations in the ambient IR intensity perceived by the sensor, which leads to clutter. This is primarily due to varying occlusions of background IR emissions caused by moving vegetation.
  • 8. Pyroelectricity A PIR sensor works on the principle of pyroelectricity.
  • 10. Analog Panasonic Motion Sensor AMN24111 The sensor produces an electrical potential proportional to differences in the rate of intensity variations across the two diagonals.
  • 11. Golf Ball Lens Radiation received by each plano-convex lens from a zone in the field of view is focused in the sensing region for sensing by the infrared detector.
  • 12. Cross Section Of The Beams Figure: Virtual Pixel Array
  • 13. Top View Of The Beams
  • 14. Intruder Signature For 3m Slow Walk
  • 15. Intruder Signature For (50◦ , 1.5m) Slow Walk
  • 17. Transform Based Approach Figure: 256 Pt DFT Of Intruder And Clutter Data From Analog And Digital Sensor. The figure above pertaining to the analog sensor suggests separating intruder from clutter based on the spectral signature of their waveforms. It was decided to use Haar Transform (HT) for computing the spectral signature in preference to DFT as only additions and subtractions suffice to compute the HT.
  • 18. The Haar Transform And Frequency Binning Since HT is a wavelet transform its coefficients are designed to provide both frequency and time localization information. As a result, the breakdown of N Haar coefficients is as follows: there is one coefficient assigned to frequency 0 (the DC component) and 2k coefficients attached to signals of frequency 2k , 0 ≤ k ≤ log(N) − 1. Thus, there are a total of log(N) + 1 frequencies or frequency ‘bins’ for which the energy is computed in the algorithm. The Haar signals associated with 8-sample transform are shown in the figure below:
  • 19. The Fast Haar Transform Figure: 8-sample fast Haar transform.
  • 20. Support Vector Machine LIBSVM library interfaced to MATLAB was used for support vector classification.
  • 21. Functional Block Diagram Of The Algorithm
  • 23. Intruder Data Collection Intruder data was collected in a laboratory (i.e., clutter-free) environment. Figure: Experimental floor layout.
  • 25. Clutter Data Collection Clutter data was collected across many outdoor locations in IISc over the period October 2008 to March 2009. Figure: ECE Dept. lawn with a variety of vegetation.
  • 26. Clutter Data Collection Figure: A location in ECE Dept. lawn where a part of clutter data was accumulated.
  • 27. Training Performance Performance: (112 Intruder data and 112 Clutter data) 7/112 = 6.3% misses. 4/112 = 3.6% false alarms.
  • 28. Testing Performance Figure: Linear SVM: Intrusion detected.
  • 29. Testing Performance Figure: Linear SVM: Clutter rejected.
  • 30. Field Testing The field testing was conducted in the ECE Dept. lawn. Three sensors were mounted onto a single platform each with an angular spacing of 120◦ . This essentially gave each platform an omni-directional sensing range. Two identical, linear and parallel arrays of nodes spaced apart by 5m was laid. The inter-node distance in an array was chosen to maximize the area covered by a single node while ensuring that every point in the sensing range was covered by at least 3 nodes. When tested over a period of several hours the network performed flawlessly by detecting every intrusion at speeds ranging from that of a slow crawl to a sprint at 5m/sec. There were also no false alarms in the period over which testing was conducted.
  • 31. Our Three Sensor Platform
  • 33. Wireless Trip Wire We refer to the linear arrangement of nodes as a ‘wireless trip wire’. Let ∆, Rs and (a − p − n) be the inter-node distance, sensing radius of a node and area per node respectively. Let the trip wire provide us k-coverage for a width of ρ on 2 either√sides with the (a − p − n) maximized. 2Rs ∆= k−1 maximizes the (a − p − n) 2Rs2 (a − p − n)max = k
  • 34. Limitations When field testing was carried out around noontime in April 2009, at the height of the summer in Bangalore, a significantly larger false alarm rate was observed. When such summer noontime data was also included in the training set, linear SVM recorded a training performance of 60/275 = 21.8% misses and 22/275 = 8% false alarms. Replacing the linear SVM with a quadratic SVM was able to improve the record on training data to 47/275 = 17% misses and 15/275 = 5.5% false alarms. The improvement with regard to testing data (simulation) was far more pronounced.
  • 35. Quadratic SVM On Summer Clutter Data
  • 36. Summary Of Training Performance
  • 37. Factors Influencing Clutter Amplitude of clutter signal depends on Proximity and size of the vegetation. The ambient temperature. Frequency depends on Stem’s stiffness of the vegetation. The wind speed.
  • 38. Idealized Intruder Waveform Analysis Figure: Geometry used for modeling intruder signature.
  • 39. Analytical Model For Intruder Signature The instantaneous frequency f (t) of the intruder signature is then from OBC given by, v cos ψ(t) κλ f (t) = κω(t) = κ = r (t) (λ(t − t0 ))2 + 1 v − cot(φ+θ) where λ = d sin φ and t0 = λ . The intruder signature is thus given by, t s(t) = sin 2π f (t)dt 0 λt = sin 2πκ arctan λ2 t 0 (t − t0 ) + 1
  • 40. Intruder Signature For (v , d, φ) = (0.7, 3, 90◦ )
  • 41. Intruder Signature For (v , d, φ) = (0.3, 2, 50◦ )
  • 42. What Does The Model Suggest? κ is the constant which corresponds to the density of the beams. Hence the analytical expression naturally extends to other differential PIR sensors in general as κ abstracts the lens. λ and t0 determine the intruder’s analytical waveform. λ for different triplets of (v , d, φ) can be the same. Hence velocity and direction of motion information from a single sensor cannot be extracted. λ corresponding to colocated sensors will be identical. Hence velocity and direction of motion information also cannot be obtained from multiple sensors on the same node. So to track the intruder, many sensing nodes spaced apart will be required.
  • 43. Tracking Let the coordinates of the sensing nodes be (xi , yi ). Set ηi = 1/λi . Lets assume that the ith sensor node has available its reliable estimate of ηi . Let the intruder path equation be ax + by + c = 0. √ a2 +b 2 a Set r = c and α = arctan b . The intruder path equation ax + by + c = 0 can be rewritten as: xr sin α + yr cos α + 1 = 0.
  • 44. Tracking For a node at (x1 , y1 ), ax1 + by1 + c dmin,1 = √ a2 + b 2 dmin,1 sin α cos α 1 ⇒ η1 = = x1 + y1 + v v v vr We have 3 unknowns, r , α, v but just one equation. Thus we require two more equations to solve for r , α and v . sin α cos α 1 η2 = x2 + y2 + v v vr sin α cos α 1 η3 = x3 + y3 + v v vr Now we have 3 equations in 3 unknowns.
  • 45. Tracking After some work, it can be shown that 1 v = √ + c2s2 s α = arctan c 1 r = v (η3 − sx3 − cy3 ) where sin α (η1 − η2 )(y1 − y3 ) − (η1 − η3 )(y1 − y2 ) s = = v (x1 − x2 )(y1 − y3 ) − (x1 − x3 )(y1 − y2 ) cos α −(η1 − η2 )(x1 − x3 ) + (η1 − η3 )(x1 − x2 ) c = = v (x1 − x2 )(y1 − y3 ) − (x1 − x3 )(y1 − y2 ) Hence, 3 sensing nodes will suffice in reliably tracking the intruder.
  • 46. Optimal Locationing Of The 3 Sensing Nodes Tracking involves the transformation: (η1 , η2 , η3 ) → (r , α, v ). The impact of error in the estimates of ηi ’s on r , α and v should be kept minimum for reliable tracking. Equivalently, the Jacobian of the transformation carrying out the mapping: (r , α, v ) → (η1 , η2 , η3 ) should be maximized. ∂η1 ∂η2 ∂η3 ∂r ∂r ∂r . ∂η1 ∂η2 ∂η3 J= ∂α ∂α ∂α ∂η1 ∂η2 ∂η3 ∂v ∂v ∂v Without loss of generality lets assume a coordinate system whose origin is equidistant from the three sensors. Each sensor then is at a constant distance R from the origin.
  • 47. Optimal Locationing Of The 3 Sensing Nodes Again we have a system of 3 equations in the 3 unknowns r , α and v : sin α cos α 1 ηi = xi + yi + , 1 ≤ i ≤ 3. v v vr Rewriting the above system of 3 equations with y xi = R cos(βi ), yi = R sin(βi ), where βi = arctan( xii ), we have R 1 ηi = sin(α + βi ) + , 1 ≤ i ≤ 3. v vr After some work, it can be shown that this Jacobian is given by R2 J= [sin(β3 − β2 ) + sin(β1 − β3 ) + sin(β2 − β1 )] . r 2v 2
  • 48. Optimal Locationing Of The 3 Sensing Nodes The value of J is clearly maximized when β3 − β2 = β1 − β3 = β2 − β1 = 2π and when R is made as 3 large as possible. This suggests that the nodes should be arranged in an equilateral triangle with R as large as possible, subject to the desired node density.
  • 49. Other Issues With a good model for the clutter signature, this problem can be formulated into a proper detection problem. Sleep-wake cycling. Online training.
  • 50. Conclusion We have reasonably met the challenges. This application will become sophisticated when ‘better’ sensors become available.
  • 51. References S. Oh, P. Chen, M. Manzo, and S. Sastry, “Instrumenting wireless sensor networks for real-time surveillance,” in Proc. of the International Conference on Robotics and Automation, May 2006. A. Arora, P. Dutta, S. Bapat, V. Kulathumani, H. Zhang, V. Naik, V. Mittal, H. Cao, M. Demirbas, M. Gouda, Y-R. Choi, T. Herman, S. S. Kulkarni, U. Arumugam, M. Nesterenko, A. Vora, and M. Miyashita, “A line in the sand: A wireless sensor network for target detection, classification, and tracking”, Ohio State University, 2003. MP Motion Sensor (AMN 1,2,4) data sheet, Panasonic Electric Works Corporation of America, New Jersey, USA. Sidney B. Lang, “Pyroelectricity: From Ancient Curiosity to Modern Imaging Tool”, Physics Today, pages 31-36, Aug. 2005.