Wireless Sensing Without Sensors – An Experimental Study of Motion/Intrusion Detection using RF Irregularity

نویسندگان

  • Pius W.Q. Lee
  • Winston K.G. Seah
  • Hwee-Pink Tan
  • Zexi Yao
چکیده

Motion and intrusion detection are often cited as Wireless Sensor Network (WSN) applications with typical configurations comprising clusters of wireless nodes equipped with motion sensors to detect human motion. Currently, WSN performance is subjected to several constraints, viz., radio irregularity and finite on-board computation/energy resources. Radio irregularity in Radio Frequency (RF) propagation rises to a higher level in the presence of human activity due to the absorption effect of the human body. In this paper, we investigate the feasibility of monitoring RF transmission for the purpose of intrusion detection through experimentation. With empirical data obtained from the Crossbow TelosB platform in several different environments, the impact of human activity on the signal strength of RF signals in a WSN is evaluated. We then propose a novel approach to intrusion detection by turning a constraint in WSN, namely radio irregularity, into an advantage for the purpose of intrusion detection, using signal fluctuations to detect the presence of human activity within the WSN. Unlike RF fingerprinting, the “intruders” here neither transmit nor receive any RF signals. By enabling existing wireless infrastructures to serve as intrusion detectors instead of deploying numerous costly sensors, this approach shows great promise for providing novel solutions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Wireless sensing without sensors - An experimental approach

Motion and intrusion detection are often cited among various Wireless Sensor Network (WSN) applications. A typical configuration comprises clusters of wireless nodes equipped with motion sensors to detect human motion. Currently, the performance of WSN is subject to several constraints, mainly the phenomenon of radio irregularity and finite onboard computation/energy resources. In Radio Frequen...

متن کامل

Wireless sensing without sensors

Motion and intrusion detection are often cited as wireless sensor network (WSN) applications with typical configurations comprising clusters of wireless nodes equipped with motion sensors to detect human motion. Currently, WSN performance is subjected to several constraints, namely radio irregularity and finite on-board computation/energy resources. Radio irregularity in radio frequency (RF) pr...

متن کامل

Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm

Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...

متن کامل

Two Layered Wireless Security System for Highly Secured Indoor Locations

This paper proposes a smart way of handling the Electronic Voting Machine (EVM) theft problem by having a wireless network based security and monitoring system using WPAN, RF signal strength, MEMS motion sensors and GSM technology. The proposed system consists of EVM units each equipped with a MEMS motion sensor forming a WPAN network based on star topology with the coordinator node acting as t...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010