A Low-Complexity Algorithm For Intrusion Detection In A PIR-Based Wireless Sensor Network

This thesis investigates the problem of detecting an intruder in the presence of clutter in a Passive Infra-Red (PIR) based Wireless Sensor Network (WSN). As one of the major objectives in a WSN is to maximize battery life, data transmission and local computations must be kept to a minimum as they a...

Full description

Bibliographic Details
Main Author: Subramanian, Ramanathan
Other Authors: Vijay Kumar, P
Language:en_US
Published: 2011
Subjects:
Online Access:http://etd.iisc.ernet.in/handle/2005/1384
http://etd.ncsi.iisc.ernet.in/abstracts/1790/G23598-Abs.pdf
id ndltd-IISc-oai-etd.ncsi.iisc.ernet.in-2005-1384
record_format oai_dc
spelling ndltd-IISc-oai-etd.ncsi.iisc.ernet.in-2005-13842018-01-10T03:35:55ZA Low-Complexity Algorithm For Intrusion Detection In A PIR-Based Wireless Sensor NetworkSubramanian, RamanathanWireless Sensor Network (WSN)AlgorithmsIntrusion DetectionIntruder Detection AlgorithmPassive Infra-Red (PIR)Intruder SignaturePIR SensorsSensorsWireless NetworksCommunication EngineeringThis thesis investigates the problem of detecting an intruder in the presence of clutter in a Passive Infra-Red (PIR) based Wireless Sensor Network (WSN). As one of the major objectives in a WSN is to maximize battery life, data transmission and local computations must be kept to a minimum as they are expensive in terms of energy. But, as intrusion being a rare event and cannot be missed, local computations expend more energy than data transmission. Hence, the need for a low-complexity algorithm for intrusion detection is inevitable. A low-complexity algorithm for intrusion detection in the presence of clutter arising from wind-blown vegetation, using PIR sensors is presented. The algorithm is based on a combination of Haar Transform (HT) and Support Vector Machine (SVM) based training. The amplitude and frequency of the intruder signature is used to differentiate it from the clutter signal. The HT was preferred to Discrete Fourier Transform (DFT) in computing the spectral signature because of its computational simplicity -just additions and subtractions suffice (scaling coefficients taken care appropriately). Intruder data collected in a laboratory and clutter data collected from various types of vegetation were fed into SVM for training. The optimal decision rule returned by SVM was then used to separate intruder from clutter. Simulation results along with some representative samples in which intrusions were detected and the clutter being rejected by the algorithm is presented. The implementation of the proposed intruder-detection algorithm in a network setting comprising of 20 sensing nodes is discussed. The field testing performance of the algorithm is then discussed. The limitations of the algorithm is also discussed. A closed-form analytical expression for the signature generated by a human moving along a straight line in the vicinity of the PIR sensor at constant velocity is provided. It is shown to be a good approximation by showing a close match with the real intruder waveforms. It is then shown how this expression can be exploited to track the intruder from the signatures of three well-positioned sensing nodes.Vijay Kumar, P2011-08-25T05:38:35Z2011-08-25T05:38:35Z2011-08-252010-05Thesishttp://etd.iisc.ernet.in/handle/2005/1384http://etd.ncsi.iisc.ernet.in/abstracts/1790/G23598-Abs.pdfen_USG23598
collection NDLTD
language en_US
sources NDLTD
topic Wireless Sensor Network (WSN)
Algorithms
Intrusion Detection
Intruder Detection Algorithm
Passive Infra-Red (PIR)
Intruder Signature
PIR Sensors
Sensors
Wireless Networks
Communication Engineering
spellingShingle Wireless Sensor Network (WSN)
Algorithms
Intrusion Detection
Intruder Detection Algorithm
Passive Infra-Red (PIR)
Intruder Signature
PIR Sensors
Sensors
Wireless Networks
Communication Engineering
Subramanian, Ramanathan
A Low-Complexity Algorithm For Intrusion Detection In A PIR-Based Wireless Sensor Network
description This thesis investigates the problem of detecting an intruder in the presence of clutter in a Passive Infra-Red (PIR) based Wireless Sensor Network (WSN). As one of the major objectives in a WSN is to maximize battery life, data transmission and local computations must be kept to a minimum as they are expensive in terms of energy. But, as intrusion being a rare event and cannot be missed, local computations expend more energy than data transmission. Hence, the need for a low-complexity algorithm for intrusion detection is inevitable. A low-complexity algorithm for intrusion detection in the presence of clutter arising from wind-blown vegetation, using PIR sensors is presented. The algorithm is based on a combination of Haar Transform (HT) and Support Vector Machine (SVM) based training. The amplitude and frequency of the intruder signature is used to differentiate it from the clutter signal. The HT was preferred to Discrete Fourier Transform (DFT) in computing the spectral signature because of its computational simplicity -just additions and subtractions suffice (scaling coefficients taken care appropriately). Intruder data collected in a laboratory and clutter data collected from various types of vegetation were fed into SVM for training. The optimal decision rule returned by SVM was then used to separate intruder from clutter. Simulation results along with some representative samples in which intrusions were detected and the clutter being rejected by the algorithm is presented. The implementation of the proposed intruder-detection algorithm in a network setting comprising of 20 sensing nodes is discussed. The field testing performance of the algorithm is then discussed. The limitations of the algorithm is also discussed. A closed-form analytical expression for the signature generated by a human moving along a straight line in the vicinity of the PIR sensor at constant velocity is provided. It is shown to be a good approximation by showing a close match with the real intruder waveforms. It is then shown how this expression can be exploited to track the intruder from the signatures of three well-positioned sensing nodes.
author2 Vijay Kumar, P
author_facet Vijay Kumar, P
Subramanian, Ramanathan
author Subramanian, Ramanathan
author_sort Subramanian, Ramanathan
title A Low-Complexity Algorithm For Intrusion Detection In A PIR-Based Wireless Sensor Network
title_short A Low-Complexity Algorithm For Intrusion Detection In A PIR-Based Wireless Sensor Network
title_full A Low-Complexity Algorithm For Intrusion Detection In A PIR-Based Wireless Sensor Network
title_fullStr A Low-Complexity Algorithm For Intrusion Detection In A PIR-Based Wireless Sensor Network
title_full_unstemmed A Low-Complexity Algorithm For Intrusion Detection In A PIR-Based Wireless Sensor Network
title_sort low-complexity algorithm for intrusion detection in a pir-based wireless sensor network
publishDate 2011
url http://etd.iisc.ernet.in/handle/2005/1384
http://etd.ncsi.iisc.ernet.in/abstracts/1790/G23598-Abs.pdf
work_keys_str_mv AT subramanianramanathan alowcomplexityalgorithmforintrusiondetectioninapirbasedwirelesssensornetwork
AT subramanianramanathan lowcomplexityalgorithmforintrusiondetectioninapirbasedwirelesssensornetwork
_version_ 1718603119397437440