A Low-Complexity Intrusion Detection Algorithm For Surveillance Using PIR Sensors In A Wireless Sensor Network
A Wireless Sensor Network (WSN) is a dense network of autonomous devices (or motes) with sensors that cooperatively monitor some physical or environmental conditions. These devices are resource constrained -limited memory, power and computational resources. Thus, any algorithm developed for WSN shou...
Main Author: | |
---|---|
Other Authors: | |
Language: | en_US |
Published: |
2011
|
Subjects: | |
Online Access: | http://etd.iisc.ernet.in/handle/2005/1282 http://etd.ncsi.iisc.ernet.in/abstracts/1664/G23695-Abs.pdf |
id |
ndltd-IISc-oai-etd.ncsi.iisc.ernet.in-2005-1282 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-IISc-oai-etd.ncsi.iisc.ernet.in-2005-12822018-01-10T03:35:51ZA Low-Complexity Intrusion Detection Algorithm For Surveillance Using PIR Sensors In A Wireless Sensor NetworkSajana, Abu RWireless Sensor NetworksAlgorithmsIntrusion DetectionPassive Infra-Red SensorsPIR SensorsWireless NetworksSensorsIntrusion Detection AlgorithmIntrusion SignatureClutter SignatureWSNCommunication EngineeringA Wireless Sensor Network (WSN) is a dense network of autonomous devices (or motes) with sensors that cooperatively monitor some physical or environmental conditions. These devices are resource constrained -limited memory, power and computational resources. Thus, any algorithm developed for WSN should be deigned such that the algorithm consumes the resources as minimal as possible. The problem addressed in this thesis is developing a low-complexity algorithm for intrusion detection in the presence of clutter arising from moving vegetation, using Passive Infra-Red (PIR) sensors. The algorithm is based on a combination of Haar Transform (HT) and Support-Vector-Machine (SVM) based training. The spectral signature of the waveforms is used to separate between the intruder and clutter waveforms. The spectral signature is computed using HT and this is fed to SVM which returns an optimal hyperplane that separates the intruder and clutter signatures. This hyperplane obtained by offline training is used online in the mote for surveillance. The algorithm is field-tested in the Indian Institute of Science campus. Based on experimental observations about the PIR sensor and the lens system, an analytical model for the waveform generated by an intruder moving along a straight line with uniform velocity in the vicinity of the sensor is developed. Analysis on how this model can be exploited to track the intruder path by optimally positioning multiple sensor nodes is provided. Algorithm for tracking the intruder path using features of the waveform from three sensors mounted on a single mote is also developed.Vijay Kumar, P2011-07-12T05:16:00Z2011-07-12T05:16:00Z2011-07-122010-05Thesishttp://etd.iisc.ernet.in/handle/2005/1282http://etd.ncsi.iisc.ernet.in/abstracts/1664/G23695-Abs.pdfen_USG23695 |
collection |
NDLTD |
language |
en_US |
sources |
NDLTD |
topic |
Wireless Sensor Networks Algorithms Intrusion Detection Passive Infra-Red Sensors PIR Sensors Wireless Networks Sensors Intrusion Detection Algorithm Intrusion Signature Clutter Signature WSN Communication Engineering |
spellingShingle |
Wireless Sensor Networks Algorithms Intrusion Detection Passive Infra-Red Sensors PIR Sensors Wireless Networks Sensors Intrusion Detection Algorithm Intrusion Signature Clutter Signature WSN Communication Engineering Sajana, Abu R A Low-Complexity Intrusion Detection Algorithm For Surveillance Using PIR Sensors In A Wireless Sensor Network |
description |
A Wireless Sensor Network (WSN) is a dense network of autonomous devices (or motes) with sensors that cooperatively monitor some physical or environmental conditions. These devices are resource constrained -limited memory, power and computational resources. Thus, any algorithm developed for WSN should be deigned such that the algorithm consumes the resources as minimal as possible. The problem addressed in this thesis is developing a low-complexity algorithm for intrusion detection in the presence of clutter arising from moving vegetation, using Passive Infra-Red (PIR) sensors. The algorithm is based on a combination of Haar Transform (HT) and Support-Vector-Machine (SVM) based training. The spectral signature of the waveforms is used to separate between the intruder and clutter waveforms. The spectral signature is computed using HT and this is fed to SVM which returns an optimal hyperplane that separates the intruder and clutter signatures. This hyperplane obtained by offline training is used online in the mote for surveillance. The algorithm is field-tested in the Indian Institute of Science campus. Based on experimental observations about the PIR sensor and the lens system, an analytical model for the waveform generated by an intruder moving along a straight line with uniform velocity in the vicinity of the sensor is developed. Analysis on how this model can be exploited to track the intruder path by optimally positioning multiple sensor nodes is provided. Algorithm for tracking the intruder path using features of the waveform from three sensors mounted on a single mote is also developed. |
author2 |
Vijay Kumar, P |
author_facet |
Vijay Kumar, P Sajana, Abu R |
author |
Sajana, Abu R |
author_sort |
Sajana, Abu R |
title |
A Low-Complexity Intrusion Detection Algorithm For Surveillance Using PIR Sensors In A Wireless Sensor Network |
title_short |
A Low-Complexity Intrusion Detection Algorithm For Surveillance Using PIR Sensors In A Wireless Sensor Network |
title_full |
A Low-Complexity Intrusion Detection Algorithm For Surveillance Using PIR Sensors In A Wireless Sensor Network |
title_fullStr |
A Low-Complexity Intrusion Detection Algorithm For Surveillance Using PIR Sensors In A Wireless Sensor Network |
title_full_unstemmed |
A Low-Complexity Intrusion Detection Algorithm For Surveillance Using PIR Sensors In A Wireless Sensor Network |
title_sort |
low-complexity intrusion detection algorithm for surveillance using pir sensors in a wireless sensor network |
publishDate |
2011 |
url |
http://etd.iisc.ernet.in/handle/2005/1282 http://etd.ncsi.iisc.ernet.in/abstracts/1664/G23695-Abs.pdf |
work_keys_str_mv |
AT sajanaabur alowcomplexityintrusiondetectionalgorithmforsurveillanceusingpirsensorsinawirelesssensornetwork AT sajanaabur lowcomplexityintrusiondetectionalgorithmforsurveillanceusingpirsensorsinawirelesssensornetwork |
_version_ |
1718603083359977472 |