Method for intrusion detection based on wireless signal characters

An intrusion detection and wireless signal technology, applied in wireless communication, electrical components, security devices, etc., can solve the problems of intrusion detection system light conditions that cannot achieve wall penetration, cumbersome system layout, and inapplicability.

Pending Publication Date: 2013-12-18
DALIAN UNIV OF TECH
View PDF3 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the system layout is relatively cumbersome. The intrusion detection system requires good light conditions and cannot penetrate walls. At the same time, image processing technology involves privacy issues and is not suitable for some monitoring occasions.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for intrusion detection based on wireless signal characters
  • Method for intrusion detection based on wireless signal characters
  • Method for intrusion detection based on wireless signal characters

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The present invention will be described in detail below in conjunction with specific technical solutions and accompanying drawings, but the present invention is not limited to specific embodiments. Example: as attached figure 1 As shown, the system adopted by the intrusion detection method is composed of wireless scanning nodes, wireless convergence nodes, general-purpose PCs, and intrusion detection algorithms. The system is set up with 8 wireless scanning nodes J1, J2, ... J8 and wireless sink node 1, all of which are designed based on the wireless module working at 433MHz, with a transmission power of 20dBm and an antenna gain of 1dB. The wireless scanning nodes J1, J2, ... J8 are placed on the four sides of a 10m×10m rectangular area, and a wireless scanning node is placed at an interval of 5m on each side, and the placement height is 1m. The wireless aggregation node 1 and the PC 2 are placed on one side of the monitoring area or inside the monitoring area, within...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for intrusion detection based on wireless signal characters, and belongs to the field of security and protection technology and wireless network application. According to the method for the intrusion detection, the state that whether object intrusion exists or not can be detected through the influence on the wireless link signal strength from an intrusion object. According to the intrusion detection algorithm, the signal strength information of all wireless links serves as input information, whether intrusion exists or not can be detected through the two-dimensional statistical properties of the mean value and the variance of the signal strength information. A system in which the method is adopted is composed of wireless scanning nodes, a wireless aggregation node, a general PC and the intrusion detection algorithm. The intrusion detection algorithm is installed in the general PC, and the wireless scanning nodes, the wireless aggregation node and the general PC are communicated wirelessly. The method is suitable for intrusion detection at wall shielding, dark environment and other severe environments. Whether a target intrudes or not can be detected through the change, caused by the fact that the intrusion object shields a wireless signal, of the wireless link signal strength.

Description

technical field [0001] The invention belongs to the field of security technology and wireless network application, and relates to an intrusion detection method based on wireless signal characteristics. Background technique [0002] Intrusion detection technology has broad application prospects in border monitoring, bank monitoring, core area monitoring and other fields. With the development of society, people pay more and more attention to security. It can be predicted that in the near future, intrusion detection technology will be widely used in military, industry and our daily life. [0003] Currently widely used intrusion detection technology is camera-based detection technology. Many scholars have carried out in-depth research on the use of cameras and image processing technology to achieve intrusion detection, such as: Zhu J, Lao Y, et al. "Object tracking in structured environments for video surveillance applications”, IEEE Transactions on Circuits and Systems for Vid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/12H04W12/121
Inventor 王洁高庆华王洪玉孙立奎吴力飞
Owner DALIAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products