Document Type : Review Article

Authors

1 Democritus University of Thrace

2 Institute for Language and Speech Processing, Institute / 'Athena' Research Center

Abstract

The necessity to tackle the increasing common concern about safety issues, urges the scientific community to come up with the development of innovative intruder detection and early warning security systems. One of the most effective technological solutions is provided by the application of WSNs. In this endeavor, most solutions have already adopted supercomputers and other computer resource systems to process the enormous amount of data. Alternatively to this approach, simpler and more easily implementable solutions, such as the WSNmod method (previously published by our research group), are already being put to use. In particular, WSNmod is based on three key elements, the categorization of sensor inputs, the quantization of the inputs and a time-window processing. WSNmod was introduced as an advanced intrusion detection system that focused on the minimization of the false positive alerts. Building on the idea of WSNmod, in this paper we focus, identify and quantify measurable parameters that influence the detection reliability. In addition, the very promising test results of the method and the security system are presented in a range of environmental conditions.

Keywords

[1] JCGM 200:2012 (JCGM 200:2008 with minor corrections), International Vocabulary of Metrology – Basic and General Concepts and Associated Terms (VIM 3rd edition).
[2] JCGM 100:2008, (GUM 1995 with minor corrections), Evaluation of measurement data – Guide to the expression of uncertainty in measurement.
[3] Course: ME 458 “Engineering Noise Control,” Fall 2000, Instructor: J. S. Lamancusa, Lecture: 1:25 - 2:15 M W 217 Hammond, Chapter 10: Outdoor sound propagation, pp. 4-7.
[4] Gerard Honey, 3 – “Intruder alarm detection devices,” Intruder Alarms (Second Edition), edited by Gerard Honey, Newnes, Oxford, 2003, pp. 48-94.
[5] J. Lopez, R. Rios, F. Bao, G. Wang, “Evolving privacy: From sensors to the Internet of Things,” In Future Generation Computer Systems, vol. 75, Pages 46-57, 2017.
[6] Gupta, D. K., “A Review on Wireless Sensor Networks, Network and Complex Systems.” Network and Complex Systems, 3(1), pp. 18-23, 2013.
[7] C. C. Aggarwal, A. Bar-Noy, S. Shamoun, “On sensor selection in linked information networks,” In Computer Networks, vol. 126, pp 100-113, 2017.
[8] S.-L. Chua, L. K. Foo, “Sensor Selection in Smart Homes,” In Procedia Computer Science, vol. 69, pp 116-124, 2015.
[9] Va. Bapat, P. Kale, V. Shinde, N. Deshpande, A. Shaligram, “WSN application for crop protection to divert animal intrusions in the agricultural land,” In Computers and Electronics in Agriculture, vololume 133, pp 88-96, 2017.
[10] Honey, G., “Intruder alarm detection devices,” In: Intruder Alarms. Newnes: Oxford, pp. 48-94, 2003.
[11] Gopi K. and Sivaprakash S., “Cluster Based Intrusion Detection System for Wireless Sensor Networks,” International Journal of Innovative Research in Computer and Communication Engineering, 2(1), pp. 993-999, 2014.
[12] Li, Y.Y. and Parker, L.E., “Intruder detection using a wireless sensor network with an intelligent mobile robot response,” Huntsville, AL, Southeastcon, 2008. IEEE, pp. 37-42, 2008.
[13] Bokareva, T., Hu, W., Kanhere, S., Ristic, B., Gordon, N., Bessell, T., Rutten, M., and Jha, S., “Wireless Sensor Networks for Battlefield Surveillance,” s.l., Land Warfare Conference, 2006.
[14] Khan, B.A., Sharif, M., Raza, M., Umer, T., Hussain, K. and Khan, A.U., “An Approach for Surveillance Using Wireless Sensor Networks (WSN),” Journal of Information & Communication Technology, 1(2), pp. 35-42, 2007.
[15] Quaritsch, M., Kruggl, K., Wischounig-Strucl, D., Bhattacharya, S., Shah, M. and Rinner, B., “Networked UAVs as aerial sensor network for disaster management applications,” Elektrotechnik & Informationstechnik, 127(3), pp. 56-63, 2010.
[16] B. Dong, J. Hao, V. Paulose, “Armored-cable-based FBG security fence for perimeter intrusion detection with higher performance,” In Sensors and Actuators A: Physical, vol 180, Pages 15-18, 2012.
[17] T. Coelho Moreira, “The Electronic Control of the Employer in Portugal,” LLI, Vol. 2, No. 1, 2016.
[18] T. Coelho Moreira, “Every breath you take, every move you make: cybersurveillance in the workplace and the worker’s privacy,” in Masaryk University Journal of Law and Technology, volume 7, n.º 1, 2013.
[19] Charalampidou, Maria, George Pavlidis, and Spyridon G. Mouroutsos, “A novel modular wireless sensor networks approach for security applications,” International Journal of Security and Networks 12.1: 40-50, 2017.
[20] Akyildiz, I., Su, W., Sankarasubraniam, Y. and Cayirci, E., “A survey on sensor networks,” IEEE Communications Magazine, Vol. 40, No. 8, pp.102–114, 2002.
[21] Gopi K, Sivaprakash S, Cluster Based Intrusion Detection System for Wireless Sensor Networks, International Journal of Innovative Research in Computer and Communication Engineering, Vol.2, Special Issue 1, 2014.
[22] Li, Y.Y. and Parker, L.E. “Intruder detection using a wireless sensor network with an intelligent mobile robot response,” Southeastcon, IEEE, Huntsville, AL, pp.37–42, 2008.
[23] Bokareva, T., Hu, W., Kanhere, S., Ristic, B., Gordon, N., Bessell, T., Rutten, M. and Jha, S. “Wireless sensor networks for battlefield surveillance,” Land Warfare Conference, 2006.
[24] Khan, B.A., Sharif, M., Raza, M., Umer, T., Hussain, K. and Khan, A.U. “An approach for surveillance using wireless sensor networks (WSN),” Journal of Information and Communication Technology, Vol. 1, No. 2, pp.35–42., 2007.
[25] Quaritsch, M., Kruggl, K., Wischounig-Strucl, D., Bhattacharya, S., Shah, M. and Rinner, B. “Networked UAVs as aerial sensor network for disaster management applications,” Elektrotechnik and Informationstechnik, Vol. 127, No. 3, pp.56–63, 2010.
[26] Honey, G. “Intruder alarm detection devices,” Intruder Alarms. Newnes, Oxford, pp.48–94, 2003.
[27] Carullo, A. and Parvis, M. “An ultrasonic sensor for distance measurement in automotive applications,” Sensors Journal, Vol. 1, No. 2, p.143, 2001.
[28] Moffat, R.J. “Describing the uncertainties in experimental results,” Experimental Thermal and Fluid Science, Vol. 1, No. 1, pp.3–17, 1998
[29] Everest, F.A and Pohlmann, K. “Absorption,” Master Handbook of Acoustics, McGraw Hill, pp.180, 181, 2009.
[30] Northrop, R. “Applications of sensors to physical measurements,” Introduction to Instrumentation and Measurements, Taylor and Francis, pp.343–500, 2005.
[31] H. E. a. L. N. B. Bass, “Ultrasonic Background Noise in Industrial Environments,” The Journal of the Acoustical Society of America, vol. 78, no. 6: 2013-2016, 1985.
[32] K. Irgan, C. Ünsalan, S. Baydere, “Low-cost prioritization of image blocks in wireless sensor networks for border surveillance,” In Journal of Network and Computer Applications, Volume 38, 2014, Pages 54-64.
[33] M. Thiel, G. Flachenecker, W. Schade, C. Gorecki, A. Thoma, R. Rathje, “Planar ultra thin glass seals with optical fiber interface for monitoring tamper attacks on security eminent components,” In Optics and Lasers in Engineering, Volume 98, 2017, Pages 89-98.
[34] L. Gu, Kaishun W., Zhongwen G., H. Luo, L. M. Ni, “Ship Detection with Wireless Sensor Networks”, IEEE Transactions on Parallel & Distributed Systems, vol. 23, pp. 1336-1343, July 2012.
[35] L. Gu et al., “Lightweight Detection and Classification for Wireless Sensor Networks in Realistic Environments,” Proc. Third Int’l Conf. Embedded Networked Sensor Systems (SenSys ’05), pp. 205-217, 2005.
[36] A. Arora, P. Dutta, S. Bapat, V. Kulathumani, H. Zhang, V. Naik, V. Mittal, H. Cao, M. Demirbas, M. Gouda, Y. Choi, T. Herman, S. Kulkarni, U. Arumugam, M. Nesterenko, A. Vora, M. Miyashita, “A line in the sand: a wireless sensor network for target detection, classification, and tracking,” In Computer Networks, Volume 46, Issue 5, 2004, Pages 605-634.
[37] M. F Duarte, Y. H. Hu, “Vehicle classification in distributed sensor networks,” In Journal of Parallel and Distributed Computing, Volume 64, Issue 7, 2004, Pages 826-838.
[38] M. Fayyaz, “Classification of Object Tracking Techniques in Wireless Sensor Networks Wireless Sensor Network,” 2011, 3, 121-124.
[39] E. F. Nakamura, A. A. F. Loureiro, and A. C. Frery, “Information fusion for wireless sensor networks: Methods, models, and classifications,” ACM Computing Surveys, Vol. 39, No. 3, Article 9, Publication date: August 2007
[40] F. Viani, L. Lizzi, P. Rocca, M. Benedetti, M. Donelli and A. Massa, “Object tracking through RSSI measurements in wireless sensor networks,” in Electronics Letters, vol. 44, no. 10, pp. 653-654, May 8 2008.
[41] G. Blumrosen, B. Hod, T. Anker, D. Dolev, and B.s Rubinsky. 2013. “Enhancing RSSI-based tracking accuracy in wireless sensor networks,” ACM Trans. Sen. Netw. 9, 3, Article 29 (June 2013), 28 pages.
[42] I. Arfaoui, N. Boudriga and K. Trimche, “Resilience of thick-line WSN based surveillance systems under irregular crossings,” 2016 22nd Asia-Pacific Conference on Communications (APCC), Yogyakarta, 2016, pp. 307-314.
[43] S. Allali, H. Menouar and M. Benchaiba, “Grid architecture for lightweight WSN-based area monitoring and alerts dissemination,” 2016 International Symposium on Networks, Computers and Communications (ISNCC), Yasmine Hammamet, 2016, pp. 1-7.
[44] P. Rothenpieler, D. Kruger, D. Pfisterer, S. FischerInternational, FleGSens, “Secure Area Monitoring Using Wireless Sensor Networks,” Science Index, Electronics and Communication Engineering Vol:3, No:8, 2009.