Using Received Signal Strength Variation for Surveillance In Residential Areas



Similar documents
Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks

An Intelligent Car Park Management System based on Wireless Sensor Networks

2. SYSTEM ARCHITECTURE AND HARDWARE DESIGN

Real-time Traffic Monitoring with Magnetic Sensor Networks *

Original Research Articles

A Review of Security System for Smart Home Applications

Wireless Sensor Network: Challenges, Issues and Research

Intrusion Detection for Mobile Ad Hoc Networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

Totally Wireless Video Security

A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA

Indoor Surveillance System Using Android Platform

Motion Sensing without Sensors: Information. Harvesting from Signal Strength Measurements

AN INTERNET OF THINGS (IOT) BASED SECURITY ALERT SYSTEM USING RASPBERRY PI

SmartDiagnostics Application Note Wireless Interference

INFORMATION ON STANDARDS FOR ELECTRONIC SECURITY SYSTEMS

Automated Security System using ZigBee

BROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS

ÇANKAYA ÜNİVERSİTESİ ECE 491 SENIOR PROJECT I ERDİNÇ YILMAZ

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING

Wireless Video Best Practices Guide

Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks

AN INTERWORKING IMPLEMENTATION AND PERFORMANCE EVALUATION IN IEEE S BASED CAMPUS MESH NETWORKS

Figure 1. The Example of ZigBee AODV Algorithm

INTERNET OF THINGS 1

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

Remote Home Security System Based on Wireless Sensor Network Using NS2

Multisensor Data Fusion and Applications

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification

Load Balancing Routing Algorithm for Data Gathering Sensor Network

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

DAG based In-Network Aggregation for Sensor Network Monitoring

Research Article ISSN Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm

A wireless sensor network for traffic surveillance

Intelligent Home Automation and Security System

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

INTELLIGENT HOME MONITORING USING RSSI

Water Quality Monitoring System Using Zigbee Based Wireless Sensor Network

DEVELOPMENT OF VIBRATION REMOTE MONITORING SYSTEM BASED ON WIRELESS SENSOR NETWORK

Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART

An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network

- Monitoring Array: a seismic or infrasound array, including from 1(4) to 20 Remote Elements (RE) and one Central Recording Facility (CRF).

International Journal of Advanced Engineering Research and Applications (IJAERA) ISSN: Vol. 1, Issue 6, October Big Data and Hadoop

Applying Mesh Networking to Wireless Lighting Control

Fall Detection System based on Kinect Sensor using Novel Detection and Posture Recognition Algorithm

Tnet WIRELESS MESH SENSOR NETWORKS

International Journal of Recent Trends in Electrical & Electronics Engg., Feb IJRTE ISSN:

SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Development of Docking System for Mobile Robots Using Cheap Infrared Sensors

ZigBee Propagation for Smart Metering Networks

System Design in Wireless Communication. Ali Khawaja

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

Antenna Deployment Technical Brief

Defending Wireless Sensor Networks Against Adversarial Localization

Sensors and Cellphones

Thank you for the opportunity and privilege to introduce the services offered by Silver Space Electro Mechanical Works L.L.C.

Design of Remote data acquisition system based on Internet of Things

High-Frequency Distributed Sensing for Structure Monitoring

Introduction to Wireless Sensor Network Security

Metrics for Detection of DDoS Attacks

SmartMesh Wireless Sensor Networking for Industrial IoT

EPMOSt: An Energy-Efficient Passive Monitoring System for Wireless Sensor Networks

An apparatus for P2P classification in Netflow traces

Automatic Docking System with Recharging and Battery Replacement for Surveillance Robot

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

Energy Consumption analysis under Random Mobility Model

ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD

Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities. Dr. William Kao

A Domestic Robot for Security Systems by Video Surveillance Using Zigbee Technology

Optimization Problems in Infrastructure Security

MCTA: Target Tracking Algorithm based on

Portable Wireless Mesh Networks: Competitive Differentiation

Intrusion Detection System using Log Files and Reinforcement Learning

Surveillance and Security Technologies for Bridges and Tunnels

Surveillance System Using Wireless Sensor Networks

Keywords: Wireless Sensor Networks (WSN), Micro Electronics Mechanic System (MEMS), Genetic Algorithm (GA), applications, Energy Efficiency.

AUTOMATIC ACCIDENT DETECTION AND AMBULANCE RESCUE WITH INTELLIGENT TRAFFIC LIGHT SYSTEM

Industrial Robotics. Training Objective

An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus

Smart Mobility Management for D2D Communications in 5G Networks

Device-Free Passive Localization

A Sarsa based Autonomous Stock Trading Agent

Location management Need Frequency Location updating

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

Sam Docknevich, PSP, Security Service Portfolio Manager. Are You Prepared? The impending impact of Code on Servicing Security Systems

Transcription:

Using Received Signal Strength Variation for Surveillance In Residential Areas Sajid Hussain, Richard Peters, and Daniel L. Silver Jodrey School of Computer Science, Acadia University, Wolfville, Canada. ABSTRACT There are various uses of wireless sensor technology, ranging from medical, to environmental, to military. One possible usage is home security. A wireless sensor network could be used to detect the presence of an intruder. We have investigated the use of Received Signal Strength Indicator () values to determine the mobility of an intruder and have found that accurate intruder detection is possible for at least short distances (up to 20 feet). The results of interference monitoring show that a wireless sensor network could be a feasible alternative for security and surveillance of homes. Keywords: Wireless Sensor Networks, Security, Intruder,, LQI. 1. INTRODUCTION Wireless Sensor Networks (WSNs) have a diverse range of applications. This paper deals with the usage of wireless sensor networks for home security and surveillance. The objective is to determine if the interference between two sensor nodes caused by an intruder; the variation of received signal strength indicator (), is sufficient to detect the intruder. We use a light sensor to validate an intrusion event. The light from one sensor node is interrupted at the other node due to the intruder blocking the beam. Although this validation method is only feasible in a dark environment and requires an additional light source, it allows us to collect accurate intrusion data for testing our -based approach. The MicaZ processor boards and MTS 400CA sensor boards of Crossbow Technologies 1 are used in the experiments. 2. RELATED WORK Detection of physical objects is not a new field in wireless sensor networks. There have been several papers published that deal with the detection of human beings and of vehicles. Chen et al. (2006) provide experimental details to detect human movement within a field. The experiment relied on passive infrared motion detectors to detect intruders. Cheung et al. (2005) and He et al. (2006) detail experiments using magnetic sensors to detect vehicles and multiple properties of these vehicles, using magnetic fields. Although He et al. (2006) focus more on military usage; Cheung et al. (2005) provide emphasis on commercial usage. Ploetner and Trivedi (2006) combine wireless sensor network technology with other technologies such as video cameras and microphones to detect both human and vehicle traffic. For wireless sensor networks, both magnetic and passive infrared motion detectors are used. Schlessman et al. (2006) seek to detect human presence. The paper proposes using a camera sensor, combined with a passive infrared motion sensor or an ultrasonic distance sensor. All of the above related works used the sensors provided on the sensor nodes, and in some cases, combine these results with additional technology. On the other hand, the proposed method of using variation in values removes all but the bare minimum required equipment. This will reduce cost of equipment and the energy cost on the nodes themselves. Chen et al. (2005) use wireless LAN environment to develop RF-based surveillance system. Although Wireless LANs can be used for surveillance, they cannot be densely deployed because of cost. Further, the energy consumption of nodes of wireless LAN is significantly higher than the energy consumption of sensor nodes; hence, the WSN-based surveillance system would be more scalable, accurate, and easy to maintain. 1 http://www.xbow.com

3. PRELIMINARY TESTING Objective: Investigate the possibility of using the variation in Received Signal Strength Indicator () and Link Quality Indicator (LQI) values for intrusion detection. Method: For this test, two sensor nodes were placed 4 feet apart, with a beam of light going across both. The power level of both nodes was set to -15 dbm. A test subject then walked between the nodes, causing interference on both the beam of light and the signal itself. The light sensor is used to validate the results based on LQI and variation. The sensor nodes used for the experiment are programmed to detect light, and then send that information in a packet. The opposite node, upon receiving this packet, adds the and LQI values. The packet is then sent to the base station, to be logged. The experiment is conducted for 30 minutes and the sampling frequency is 1 sample/second. Results: A brief section of the results (one minute of collected data) are shown below, with the LQI results in Figure 1, and results in Figure 2. The horizontal axis shows the time scale and vertical axis provides the LQI or and light levels. 220 200 180 Node 1 LQI Node 2 LQI 0:00:05 0:00:10 0:00:15 0:00:20 0:00:25 0:00:30 0:00:35 0:00:40 0:00:45 0:00:50 0:00:55 0:01:00 Time Fig. 1. LQI variation is negligible and cannot be used to determine the intrusion. 235 215 195 175 155 135 115 Node 1 Node 2 95 75 0:00:05 0:00:10 0:00:15 0:00:20 0:00:25 0:00:30 0:00:35 0:00:40 0:00:45 0:00:50 0:00:55 0:01:00 Time Fig. 2. variation is significant and can be used for intrusion detection. A simple linear regression model was developed using LQI and as the independent variables and LIGHT as the dependent response variable marking the presence of an intruder. The model has correlation, r 2, of 0.149 that is due to the dependent variable (with significance p = 2.63E-79). The second independent variable LQI is a poor predictor

of an intruder s presence (p = 0.8531). These results agree with the graphs of Figure 2 showing a match in the reduction in and light levels as a person moves back and forth between the sensor nodes. Our conclusion is that cam be used on its own to determine the presence of an intruder. 4. THEORY The next step is to devise an algorithm for detecting abnormal deviation in levels that would strongly correlate with abnormal deviations in LIGHT levels as an indicator of presence of an intruder. A simple approach is to calculate the required deviation in the that indicates sufficient abnormality. We assumed that ambient noise in the could be modeled by a normal curve. We then examined the reduction in when an intruder was present and found that values one standard deviation below the mean (based on a window of several seconds) acted as a good indicator of an intruder. This can be compueted as follows: ALGORITHM // window size determines the number of samples considered // in mean and standard deviation calculations var WINDOW_SIZE; // total number of readings var TOTAL_ENTRIES; // keep track of total number of intruders intruder_count=0; // index for current sample t=0; // skip t entries in order to get a window of data t = t + WINDOW_SIZE; DO // compute mean over previous WINDOW_SIZE entries // i.e. mean is computed over samples: (t-window_size)... t Compute µ; // similarly, compute standard deviation over previous WINDOW_SIZE entries Compute σ; IF t < µ σ intruder_detected = TRUE; intruder_count++; ELSE intruder_detected = FALSE; t = t + 1; WHILE t < TOTAL_ENTRIES The above algorithm shows the computation details to identify an intruder s presence based on values. The mean and standard deviation are computed over a given number of samples, called WINDOW_SIZE. If the value is less than the deviation µ σ, an intruder is detected and the counter is incremented; otherwise, there is no intruder. A suitable window size can be determined based on some preliminary investigation of the deployment environment. Table 1 shows the results of applying the above algorithm for data obtained in the preliminary testing of Section 3. As the window size increases, the number of false alarms is reduced until a stable point is reached. As an example, based on the results shown below, a window size of 60 seconds would be used for the estimation of mean and standard deviation.

Window Size 10 20 30 50 60 80 False alarms 19 8 5 3 3 4 4 Missed Intruders 4 5 6 4 4 5 5 Table 1. Window Size Comparisons (220 intruders) 5. EXPERIMENT Objective: Investigate the effect of using our algorithm of Section 4 for detecting and intruder as the transmission distance between two sensor nodes is increased. Method: The sensors are deployed in a standard living room with typical furniture such as sofa, couch, dining table, and exercise machine. In order to avoid absorption of signals because of ground, the sensors are placed at the height of 3 feet, using stools. Two sensor nodes were used, both set to a power level of -15dBm. The nodes were tested at distances of 5, 10, 15, and 20 feet. The nodes were programmed as specified in Section 3, and the various distance tests were done for 20 minutes each. During the experiment, only one person was allowed in the area. The power levels for the nodes were maintained at a constant level by using fresh batteries for each run. Results: Graphs of the and LIGHT levels for a 5 minute interval of each tested distance are shown in Figures 3 to 6. The statistics from regression models for the runs are shown in Table 2. The level of correlation and significance of the with respect to LIGHT remains high (r 2 > 0.35 and p-value < 0.00001). We conclude that, with a power level of -15dBm, up to a distance of 10 feet there is consistently a good correlation between the and LIGHT levels and therefore presence of an intruder. Beyond 10 feet the relationship degrades slightly; however, even at 20 feet the correlation remains acceptable. The loss in accuracy due to distance is caused by at least two factors. First, as distance increases, the will decrease and this can lead to lost packets. At 5 feet, approximately packets were lost; whereas 520 packets were lost at distance 20 feet. The packet loss occurs more frequently when an intruder is present because the interference they cause can prevent packets from reaching to the opposite node, or to the base station. Second, as levels fall due to distance, the impact of the intruder on the signal falls below the one standard deviation limit. One can see the difference in the spikes caused by an intruder at a distance of 5 feet (Figure 3) as compared to that of an intruder at a distance of 20 feet (Figure 6). Distance (feet) 5 10 15 20 Observations 1150 1150 1 942 Multiple R 0.700766 0.686648 0.595782 0.696146 R Square 0.491073 0.471486 0.354957 0.48462 Standard Error 10.27314 6.764716 6.828552 5.317888 Significance F 1.4E-170 3.7E-161 1.2E-106 1.8E-137 Number of Intruders 35 40 37 37 False Alarm Rate 0 0 0.027 0.054 Missed Intruders Rate 0 0 0.108 0 Table 2. Regression Statistics: Y = light level, X = value.

195 175 155 135 115 95 75 0:00:20 0:00:42 0:01:01 0:01:21 0:01:43 0:02:04 0:02:25 0:02:45 0:03:06 0:03:27 0:03:47 0:04:07 0:04:27 0:04:49 Fig. 3. Sample of and readings at 5 feet. 180 170 150 130 110 90 80 0:00:22 0:00:41 0:01:01 0:01:22 0:01:42 0:02:02 0:02:22 0:02:42 0:03:04 0:03:25 0:03:48 0:04:08 0:04:30 0:04:52 Fig. 4. Sample of and readings at 10 feet. 180 170 150 130 110 90 80 0:00:13 0:00:34 0:00:54 0:01:15 0:01:36 0:01:56 0:02:18 0:02:40 0:03:08 0:03:27 0:03:51 0:04:14 0:04:37 0:04:57 Fig. 5. Sample of and readings at 15 feet. 150 130 110 90 0:00:23 0:00:51 0:01:13 0:01:37 0:01:59 0:02:25 0:02:47 0:03:15 0:03:42 0:04:09 0:04:36 Fig. 6. Sample of and readings at 20 feet.

6. CONCLUSION The results have shown that while the LQI of the sensor nodes has no significant relationship with the presence of an intruder, the does. This is because of the radio interference that is cause by the intruder s body. We have shown that this variation is significant enough to act as a detector for sensors placed up to 20 feet apart. Thus, intruder detection via could well become a cheap, quickly deployed security system. These findings could be the basis for many future endeavors. Such a usage of wireless sensor networks could extend beyond home security into military usage; such as setting up a perimeter to detect incoming enemies. On the industrial side, using a more complex setup and a little logic, it would be feasible to keep track of human traffic within a building or to identify the relative number of individuals in each room. For security, one could use paired keys between neighboring nodes to hinder the ability of intruders to hide themselves by injecting their own packets. Another possible enhancement is using relay nodes to carry the result packets back to a distant base station, or having redundant nodes that can be activated upon sensor node death to enhance the lifetime of the network. In future work, we plan to further study the relationship between an intruder s position and the effect on. More specifically, we will investigate the use of three or more sensors for intruder localization using triangulation strategies and possibly path traversal through a mesh network of sensors. This will require the use of more advanced modeling techniques from statistics and machine learning. REFERENCES [1] [2] [3] [4] [5] [6] P. Chen, S. Oh, M. Manzo, B. Sinopoli, C. Sharp, K. Whitehouse, G. Tolle, J. Jeong, P. Dutta, J. Hui, S. Shaert, S. Kim, J. Taneja, B. Zhu, T. Roosta, M. Howard, D. Culler, and S. Sastry Booth, N. and Smith, A. S., Experiments in instrumenting wireless sensor networks for real-time surveillance, IEEE International Conference on Robotics and Automation (ICRA), pp. 3128-3133 (2006). S. Y. Cheung, S. C. Ergen, and P. Varaiya, Traffic surveillance with wireless magnetic sensors," Proceedings of the 12 th World Congress on Intelligent Transport Systems (ITS), pages 13, (2005). T. He, S. Krishnamurthy, L. Luo, T. Yan, L. Gu, R. Stoleru, G. Zhou, Q. Cao, P. Vicaire, J. A. Stankovic, T. F. Abdelzaher, J. Hui, and B. Krogh, Vigilnet: An integrated sensor network system for energy-efficient surveillance, ACM Transactions on Sensor Networks (TOSN), v.2 n.1, p.1-38 (2006). J. Ploetner and M. M. Trivedi, A multimodal approach for dynamic event capture of vehicles and pedestrians, Proceedings of the 4th ACM international workshop on Video surveillance and sensor networks, pp. 203-210, (2006). J. Schlessman, J. Shim, I. Kim, Y. C. Baek, and W. Wolf, Low power, low cost, wireless camera sensor nodes for human detection, Proceedings of the 4th ACM international workshop on Video surveillance and sensor networks, pp. 363-364 (2006). J. Chen, Z. Safar, J. A. Sørensen, and K. J. Kristoffersen, An RF-based surveillance system using commercial offthe-shelf wireless LAN components, Proceedings of the 13 th European Signal Processing Conference, pages 4 (2005).