SlideShare uma empresa Scribd logo
1 de 53
Baixar para ler offline
A Low-Complexity Algorithm for Robust Intrusion
Detection in PIR-based Wireless Sensor Network

                Ramanathan Subramanian
              sramanathan@csa.iisc.ernet.in

       Under the guidance of Prof. P. Vijay Kumar

                        CSA Dept.
                     IISc, Bangalore


                     May 17, 2010
Outline




      Problem Description.
      PIR Sensor Operation.
      Intrusion Detection Algorithm Description.
      Simulation Results and Field Testing.
      Idealized Intruder Waveform Analysis.
      Intruder Tracking.
Introduction
      Wireless sensor networks find numerous applications. To name
      a few,
          Unattended Surveillance.
          Environmental applications.
          Precision Agriculture.
      Surveillance cameras are expensive and power hungry.
      Power outlets are not going to be available in the terrains of
      interest.
      Currently, Passive Infra-Red (PIR) sensors consume less power
      than cameras by up to two orders of magnitude.
      PIR sensors can be used as a low-power wake-up mechanism
      for cameras.
      PIR sensors are triggered by blowing debris, birds, animals,
      vegetation, hot air currents etc.
      The problem is challenging because intrusion is a rare event
      while clutter is always present.
      Frequent false alarms would effectively render the system
      useless.
Problem Description




      Detect an intruder in the presence of clutter with low false
      alarm rate.
      The intruder is a human traveling in the vicinity of the sensor.
      The term clutter is used to describe the waveform generated
      at the output of the sensor as a result of the movement of
      vegetation caused by the wind.
Objective




      Robust intruder detection algorithm.
      Minimize the energy spent in detection.
Challenges




      Handle various speeds of the intruder.
             Duration of the intruder signature could vary from 3s to 18s.
      Reject clutter from various forms of vegetation.
             Performance of the algorithm should not be terrain dependent.
      Low-complexity algorithm.
             Energy spent in the detection reflects in the number of
             operations performed.
PIR Sensor Operation


      The PIR sensors along with the optical filters are tuned to
      detect wavelengths in the range of 8 − 14µm.
      From Wien’s law we know that humans emit peak radiation at
      9.4µm (far Infra-Red).
      A PIR sensor converts the spatial and temporal variations of
      intensity of IR falling onto its sensitive element(s), into an
      electrical signal.
      Moving vegetation also causes variations in the ambient IR
      intensity perceived by the sensor, which leads to clutter. This
      is primarily due to varying occlusions of background IR
      emissions caused by moving vegetation.
Pyroelectricity


       A PIR sensor works on the principle of pyroelectricity.
Basic Sensing Model
Analog Panasonic Motion Sensor AMN24111




      The sensor produces an electrical potential proportional to
      differences in the rate of intensity variations across the two
      diagonals.
Golf Ball Lens




       Radiation received by each plano-convex lens from a zone in
       the field of view is focused in the sensing region for sensing
       by the infrared detector.
Cross Section Of The Beams




                  Figure: Virtual Pixel Array
Top View Of The Beams
Intruder Signature For 3m Slow Walk
Intruder Signature For (50◦ , 1.5m) Slow Walk
Choice Of Sensor
Transform Based Approach




  Figure: 256 Pt DFT Of Intruder And Clutter Data From Analog And
  Digital Sensor.

      The figure above pertaining to the analog sensor suggests
      separating intruder from clutter based on the spectral
      signature of their waveforms.
      It was decided to use Haar Transform (HT) for computing the
      spectral signature in preference to DFT as only additions and
      subtractions suffice to compute the HT.
The Haar Transform And Frequency Binning
      Since HT is a wavelet transform its coefficients are designed
      to provide both frequency and time localization information.
      As a result, the breakdown of N Haar coefficients is as follows:
      there is one coefficient assigned to frequency 0 (the DC
      component) and 2k coefficients attached to signals of
      frequency 2k , 0 ≤ k ≤ log(N) − 1. Thus, there are a total of
      log(N) + 1 frequencies or frequency ‘bins’ for which the
      energy is computed in the algorithm.
      The Haar signals associated with 8-sample transform are
      shown in the figure below:
The Fast Haar Transform




              Figure: 8-sample fast Haar transform.
Support Vector Machine




      LIBSVM library interfaced to MATLAB was used for support
      vector classification.
Functional Block Diagram Of The Algorithm
Computational Complexity
Intruder Data Collection

       Intruder data was collected in a laboratory (i.e., clutter-free)
       environment.




                     Figure: Experimental floor layout.
Intruder Data Collection
Clutter Data Collection

       Clutter data was collected across many outdoor locations in
       IISc over the period October 2008 to March 2009.




           Figure: ECE Dept. lawn with a variety of vegetation.
Clutter Data Collection




   Figure: A location in ECE Dept. lawn where a part of clutter data was
   accumulated.
Training Performance




      Performance: (112 Intruder data and 112 Clutter data)
          7/112 = 6.3% misses.
          4/112 = 3.6% false alarms.
Testing Performance




              Figure: Linear SVM: Intrusion detected.
Testing Performance




              Figure: Linear SVM: Clutter rejected.
Field Testing

       The field testing was conducted in the ECE Dept. lawn.
       Three sensors were mounted onto a single platform each with
       an angular spacing of 120◦ . This essentially gave each
       platform an omni-directional sensing range.
       Two identical, linear and parallel arrays of nodes spaced apart
       by 5m was laid. The inter-node distance in an array was
       chosen to maximize the area covered by a single node while
       ensuring that every point in the sensing range was covered by
       at least 3 nodes.
       When tested over a period of several hours the network
       performed flawlessly by detecting every intrusion at speeds
       ranging from that of a slow crawl to a sprint at 5m/sec.
       There were also no false alarms in the period over which
       testing was conducted.
Our Three Sensor Platform
A Field Location
Wireless Trip Wire




      We refer to the linear arrangement of nodes as a ‘wireless trip
      wire’.
      Let ∆, Rs and (a − p − n) be the inter-node distance, sensing
      radius of a node and area per node respectively.
      Let the trip wire provide us k-coverage for a width of ρ on
                                                             2
      either√sides with the (a − p − n) maximized.
             2Rs
      ∆=    k−1    maximizes the (a − p − n)
                                               2Rs2
                           (a − p − n)max =
                                                k
Limitations


       When field testing was carried out around noontime in April
       2009, at the height of the summer in Bangalore, a
       significantly larger false alarm rate was observed.
       When such summer noontime data was also included in the
       training set, linear SVM recorded a training performance of
       60/275 = 21.8% misses and 22/275 = 8% false alarms.
       Replacing the linear SVM with a quadratic SVM was able to
       improve the record on training data to 47/275 = 17% misses
       and 15/275 = 5.5% false alarms.
       The improvement with regard to testing data (simulation) was
       far more pronounced.
Quadratic SVM On Summer Clutter Data
Summary Of Training Performance
Factors Influencing Clutter




      Amplitude of clutter signal depends on
          Proximity and size of the vegetation.
          The ambient temperature.
      Frequency depends on
          Stem’s stiffness of the vegetation.
          The wind speed.
Idealized Intruder Waveform Analysis




         Figure: Geometry used for modeling intruder signature.
Analytical Model For Intruder Signature


      The instantaneous frequency f (t) of the intruder signature is
      then from OBC given by,

                                  v cos ψ(t)         κλ
             f (t) = κω(t) = κ               =
                                     r (t)     (λ(t − t0 ))2 + 1
                     v                 − cot(φ+θ)
      where λ =   d sin φ
                            and t0 =        λ     .
      The intruder signature is thus given by,
                                           t
             s(t) = sin 2π                     f (t)dt
                                       0
                                                                 λt
                    = sin 2πκ arctan
                                                     λ2 t   0 (t − t0 ) + 1
Intruder Signature For (v , d, φ) = (0.7, 3, 90◦ )
Intruder Signature For (v , d, φ) = (0.3, 2, 50◦ )
What Does The Model Suggest?

      κ is the constant which corresponds to the density of the
      beams.
      Hence the analytical expression naturally extends to other
      differential PIR sensors in general as κ abstracts the lens.
      λ and t0 determine the intruder’s analytical waveform.
      λ for different triplets of (v , d, φ) can be the same. Hence
      velocity and direction of motion information from a single
      sensor cannot be extracted.
      λ corresponding to colocated sensors will be identical. Hence
      velocity and direction of motion information also cannot be
      obtained from multiple sensors on the same node.
      So to track the intruder, many sensing nodes spaced apart will
      be required.
Tracking



      Let the coordinates of the sensing nodes be (xi , yi ).
      Set ηi = 1/λi .
      Lets assume that the ith sensor node has available its reliable
      estimate of ηi .
      Let the intruder path equation be ax + by + c = 0.
                √
                    a2 +b 2                    a
      Set r =        c        and α = arctan   b   .
      The intruder path equation ax + by + c = 0 can be rewritten
      as: xr sin α + yr cos α + 1 = 0.
Tracking

      For a node at (x1 , y1 ),

                             ax1 + by1 + c
               dmin,1 =        √
                                 a2 + b 2
                             dmin,1   sin α      cos α      1
                ⇒ η1 =              =       x1 +       y1 +
                               v         v         v        vr
      We have 3 unknowns, r , α, v but just one equation. Thus we
      require two more equations to solve for r , α and v .
                                  sin α      cos α      1
                      η2 =              x2 +       y2 +
                                    v          v        vr
                                  sin α      cos α      1
                      η3 =              x3 +       y3 +
                                    v          v        vr
      Now we have 3 equations in 3 unknowns.
Tracking

      After some work, it can be shown that
                                 1
                         v   =    √
                                  + c2s2
                                     s
                         α = arctan
                                     c
                                      1
                         r =
                             v (η3 − sx3 − cy3 )

      where
                 sin α   (η1 − η2 )(y1 − y3 ) − (η1 − η3 )(y1 − y2 )
           s =         =
                   v     (x1 − x2 )(y1 − y3 ) − (x1 − x3 )(y1 − y2 )
                 cos α   −(η1 − η2 )(x1 − x3 ) + (η1 − η3 )(x1 − x2 )
           c =         =
                   v       (x1 − x2 )(y1 − y3 ) − (x1 − x3 )(y1 − y2 )

      Hence, 3 sensing nodes will suffice in reliably tracking the
      intruder.
Optimal Locationing Of The 3 Sensing Nodes


      Tracking involves the transformation: (η1 , η2 , η3 ) → (r , α, v ).
      The impact of error in the estimates of ηi ’s on r , α and v
      should be kept minimum for reliable tracking.
      Equivalently, the Jacobian of the transformation carrying out
      the mapping: (r , α, v ) → (η1 , η2 , η3 ) should be maximized.
                                   ∂η1   ∂η2   ∂η3
                                   ∂r    ∂r    ∂r
                             .     ∂η1   ∂η2   ∂η3
                            J=     ∂α    ∂α    ∂α
                                   ∂η1   ∂η2   ∂η3
                                   ∂v    ∂v    ∂v

      Without loss of generality lets assume a coordinate system
      whose origin is equidistant from the three sensors. Each
      sensor then is at a constant distance R from the origin.
Optimal Locationing Of The 3 Sensing Nodes

      Again we have a system of 3 equations in the 3 unknowns r , α
      and v :
                        sin α      cos α     1
                ηi =          xi +       yi + , 1 ≤ i ≤ 3.
                          v          v       vr
      Rewriting the above system of 3 equations with
                                                           y
      xi = R cos(βi ), yi = R sin(βi ), where βi = arctan( xii ), we have

                          R               1
                  ηi =      sin(α + βi ) + , 1 ≤ i ≤ 3.
                          v               vr
      After some work, it can be shown that this Jacobian is given
      by

                R2
         J=           [sin(β3 − β2 ) + sin(β1 − β3 ) + sin(β2 − β1 )] .
               r 2v 2
Optimal Locationing Of The 3 Sensing Nodes




      The value of J is clearly maximized when
      β3 − β2 = β1 − β3 = β2 − β1 = 2π and when R is made as
                                       3
      large as possible.
      This suggests that the nodes should be arranged in an
      equilateral triangle with R as large as possible, subject to
      the desired node density.
Other Issues




      With a good model for the clutter signature, this problem can
      be formulated into a proper detection problem.
      Sleep-wake cycling.
      Online training.
Conclusion




      We have reasonably met the challenges.
      This application will become sophisticated when ‘better’
      sensors become available.
References

      S. Oh, P. Chen, M. Manzo, and S. Sastry, “Instrumenting
      wireless sensor networks for real-time surveillance,” in Proc.
      of the International Conference on Robotics and Automation,
      May 2006.
      A. Arora, P. Dutta, S. Bapat, V. Kulathumani, H. Zhang, V.
      Naik, V. Mittal, H. Cao, M. Demirbas, M. Gouda, Y-R. Choi,
      T. Herman, S. S. Kulkarni, U. Arumugam, M. Nesterenko, A.
      Vora, and M. Miyashita, “A line in the sand: A wireless sensor
      network for target detection, classification, and tracking”,
      Ohio State University, 2003.
      MP Motion Sensor (AMN 1,2,4) data sheet, Panasonic
      Electric Works Corporation of America, New Jersey, USA.
      Sidney B. Lang, “Pyroelectricity: From Ancient Curiosity to
      Modern Imaging Tool”, Physics Today, pages 31-36, Aug.
      2005.
Questions
Low-Complexity Algorithm for Detecting Intruders in PIR Sensor Networks

Mais conteúdo relacionado

Mais procurados

FSS PPT Final Show (2)
FSS PPT Final Show (2)FSS PPT Final Show (2)
FSS PPT Final Show (2)supriyoo
 
Neural Networks: Radial Bases Functions (RBF)
Neural Networks: Radial Bases Functions (RBF)Neural Networks: Radial Bases Functions (RBF)
Neural Networks: Radial Bases Functions (RBF)Mostafa G. M. Mostafa
 
Dsp U Lec08 Fir Filter Design
Dsp U   Lec08 Fir Filter DesignDsp U   Lec08 Fir Filter Design
Dsp U Lec08 Fir Filter Designtaha25
 
Communication Engineering
Communication EngineeringCommunication Engineering
Communication Engineeringadnanqayum
 
Dsp U Lec10 DFT And FFT
Dsp U   Lec10  DFT And  FFTDsp U   Lec10  DFT And  FFT
Dsp U Lec10 DFT And FFTtaha25
 
Channel estimation - F. Ling
Channel estimation - F. LingChannel estimation - F. Ling
Channel estimation - F. LingFuyun Ling
 
Numerical Problems on Ampitude Modulation
Numerical Problems on Ampitude ModulationNumerical Problems on Ampitude Modulation
Numerical Problems on Ampitude ModulationRenji K
 
Hyperparameter Optimization for Machine Learning
Hyperparameter Optimization for Machine LearningHyperparameter Optimization for Machine Learning
Hyperparameter Optimization for Machine LearningFrancesco Casalegno
 
Flat and curved earth propagation
Flat and curved earth propagationFlat and curved earth propagation
Flat and curved earth propagationShanmugaRajuS1
 
Empirical Mode Decomposition
Empirical Mode DecompositionEmpirical Mode Decomposition
Empirical Mode DecompositionEmine Can
 
MIMO Channel Capacity
MIMO Channel CapacityMIMO Channel Capacity
MIMO Channel CapacityPei-Che Chang
 
Introduction to Digital Signal Processing (DSP)
Introduction  to  Digital Signal Processing (DSP)Introduction  to  Digital Signal Processing (DSP)
Introduction to Digital Signal Processing (DSP)Md. Arif Hossain
 
音楽の情報処理
音楽の情報処理音楽の情報処理
音楽の情報処理Akinori Ito
 
Deep reinforcement learning for traffic light cycle control
Deep reinforcement learning for traffic light cycle controlDeep reinforcement learning for traffic light cycle control
Deep reinforcement learning for traffic light cycle controlPRITIJHA21
 
FILTER DESIGN
FILTER DESIGNFILTER DESIGN
FILTER DESIGNnaimish12
 
Antennas slideshare part 1
Antennas slideshare part 1Antennas slideshare part 1
Antennas slideshare part 1Muthumanickam
 

Mais procurados (20)

Lumerical Software: DEVICE
Lumerical Software: DEVICELumerical Software: DEVICE
Lumerical Software: DEVICE
 
FSS PPT Final Show (2)
FSS PPT Final Show (2)FSS PPT Final Show (2)
FSS PPT Final Show (2)
 
Neural Networks: Radial Bases Functions (RBF)
Neural Networks: Radial Bases Functions (RBF)Neural Networks: Radial Bases Functions (RBF)
Neural Networks: Radial Bases Functions (RBF)
 
Dsp U Lec08 Fir Filter Design
Dsp U   Lec08 Fir Filter DesignDsp U   Lec08 Fir Filter Design
Dsp U Lec08 Fir Filter Design
 
Communication Engineering
Communication EngineeringCommunication Engineering
Communication Engineering
 
Dsp U Lec10 DFT And FFT
Dsp U   Lec10  DFT And  FFTDsp U   Lec10  DFT And  FFT
Dsp U Lec10 DFT And FFT
 
IIR filter
IIR filterIIR filter
IIR filter
 
Channel estimation - F. Ling
Channel estimation - F. LingChannel estimation - F. Ling
Channel estimation - F. Ling
 
Numerical Problems on Ampitude Modulation
Numerical Problems on Ampitude ModulationNumerical Problems on Ampitude Modulation
Numerical Problems on Ampitude Modulation
 
Hyperparameter Optimization for Machine Learning
Hyperparameter Optimization for Machine LearningHyperparameter Optimization for Machine Learning
Hyperparameter Optimization for Machine Learning
 
Flat and curved earth propagation
Flat and curved earth propagationFlat and curved earth propagation
Flat and curved earth propagation
 
Beamforming
BeamformingBeamforming
Beamforming
 
Empirical Mode Decomposition
Empirical Mode DecompositionEmpirical Mode Decomposition
Empirical Mode Decomposition
 
MIMO Channel Capacity
MIMO Channel CapacityMIMO Channel Capacity
MIMO Channel Capacity
 
Introduction to Digital Signal Processing (DSP)
Introduction  to  Digital Signal Processing (DSP)Introduction  to  Digital Signal Processing (DSP)
Introduction to Digital Signal Processing (DSP)
 
音楽の情報処理
音楽の情報処理音楽の情報処理
音楽の情報処理
 
Mimo
MimoMimo
Mimo
 
Deep reinforcement learning for traffic light cycle control
Deep reinforcement learning for traffic light cycle controlDeep reinforcement learning for traffic light cycle control
Deep reinforcement learning for traffic light cycle control
 
FILTER DESIGN
FILTER DESIGNFILTER DESIGN
FILTER DESIGN
 
Antennas slideshare part 1
Antennas slideshare part 1Antennas slideshare part 1
Antennas slideshare part 1
 

Destaque

Numerical and experimental impact analysis of square crash box structure with...
Numerical and experimental impact analysis of square crash box structure with...Numerical and experimental impact analysis of square crash box structure with...
Numerical and experimental impact analysis of square crash box structure with...sahril afandi sitompul
 
Membrane - Plate - Shell
Membrane - Plate - ShellMembrane - Plate - Shell
Membrane - Plate - Shellneikrof
 
Rc bldg. modeling & analysis
Rc bldg. modeling & analysisRc bldg. modeling & analysis
Rc bldg. modeling & analysisRamil Artates
 
Master Thesis presentation
Master Thesis presentationMaster Thesis presentation
Master Thesis presentationBogdan Vasilescu
 
Book for Beginners, RCC Design by ETABS
Book for Beginners, RCC Design by ETABSBook for Beginners, RCC Design by ETABS
Book for Beginners, RCC Design by ETABSYousuf Dinar
 
Powerpoint presentation M.A. Thesis Defence
Powerpoint presentation M.A. Thesis DefencePowerpoint presentation M.A. Thesis Defence
Powerpoint presentation M.A. Thesis DefenceCatie Chase
 
Thesis Powerpoint
Thesis PowerpointThesis Powerpoint
Thesis Powerpointneha47
 
Thesis Power Point Presentation
Thesis Power Point PresentationThesis Power Point Presentation
Thesis Power Point Presentationriddhikapandya1985
 

Destaque (11)

Thesis presentation
Thesis presentationThesis presentation
Thesis presentation
 
Thesis Slides
Thesis SlidesThesis Slides
Thesis Slides
 
Numerical and experimental impact analysis of square crash box structure with...
Numerical and experimental impact analysis of square crash box structure with...Numerical and experimental impact analysis of square crash box structure with...
Numerical and experimental impact analysis of square crash box structure with...
 
Membrane - Plate - Shell
Membrane - Plate - ShellMembrane - Plate - Shell
Membrane - Plate - Shell
 
Rc bldg. modeling & analysis
Rc bldg. modeling & analysisRc bldg. modeling & analysis
Rc bldg. modeling & analysis
 
Master Thesis presentation
Master Thesis presentationMaster Thesis presentation
Master Thesis presentation
 
Book for Beginners, RCC Design by ETABS
Book for Beginners, RCC Design by ETABSBook for Beginners, RCC Design by ETABS
Book for Beginners, RCC Design by ETABS
 
Building Information Modeling (BIM)
Building Information Modeling (BIM)Building Information Modeling (BIM)
Building Information Modeling (BIM)
 
Powerpoint presentation M.A. Thesis Defence
Powerpoint presentation M.A. Thesis DefencePowerpoint presentation M.A. Thesis Defence
Powerpoint presentation M.A. Thesis Defence
 
Thesis Powerpoint
Thesis PowerpointThesis Powerpoint
Thesis Powerpoint
 
Thesis Power Point Presentation
Thesis Power Point PresentationThesis Power Point Presentation
Thesis Power Point Presentation
 

Semelhante a Low-Complexity Algorithm for Detecting Intruders in PIR Sensor Networks

An Overview of Array Signal Processing and Beam Forming TechniquesAn Overview...
An Overview of Array Signal Processing and Beam Forming TechniquesAn Overview...An Overview of Array Signal Processing and Beam Forming TechniquesAn Overview...
An Overview of Array Signal Processing and Beam Forming TechniquesAn Overview...Editor IJCATR
 
IR UWB TOA Estimation Techniques and Comparison
IR UWB TOA Estimation Techniques and ComparisonIR UWB TOA Estimation Techniques and Comparison
IR UWB TOA Estimation Techniques and Comparisoninventionjournals
 
1-Wang-FR1020-IGARSS11.pptx
1-Wang-FR1020-IGARSS11.pptx1-Wang-FR1020-IGARSS11.pptx
1-Wang-FR1020-IGARSS11.pptxgrssieee
 
Single Electron Spin Detection Slides For Uno Interview
Single Electron Spin Detection Slides For Uno InterviewSingle Electron Spin Detection Slides For Uno Interview
Single Electron Spin Detection Slides For Uno Interviewchenhm
 
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...Signal to-noise-ratio of signal acquisition in global navigation satellite sy...
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...Alexander Decker
 
Three Element Beam forming Algorithm with Reduced Interference Effect in Sign...
Three Element Beam forming Algorithm with Reduced Interference Effect in Sign...Three Element Beam forming Algorithm with Reduced Interference Effect in Sign...
Three Element Beam forming Algorithm with Reduced Interference Effect in Sign...IJMER
 
RADAR MEASUREMENTS LECTURE EECS BERKELY!
RADAR MEASUREMENTS LECTURE EECS BERKELY!RADAR MEASUREMENTS LECTURE EECS BERKELY!
RADAR MEASUREMENTS LECTURE EECS BERKELY!nagatic941
 
Suppression of Chirp Interferers in GPS Using the Fractional Fourier Transform
Suppression of Chirp Interferers in GPS Using the Fractional Fourier TransformSuppression of Chirp Interferers in GPS Using the Fractional Fourier Transform
Suppression of Chirp Interferers in GPS Using the Fractional Fourier TransformCSCJournals
 
Subsystems of radar and signal processing
Subsystems of radar and signal processing Subsystems of radar and signal processing
Subsystems of radar and signal processing Ronak Vyas
 
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...Mimo radar detection in compound gaussian clutter using orthogonal discrete f...
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...ijma
 
J0412261066
J0412261066J0412261066
J0412261066IOSR-JEN
 
Signal Integrity Asif
Signal Integrity AsifSignal Integrity Asif
Signal Integrity AsifMohammed Asif
 
Williams_FR1_TO4_5_2011_07_29v1.ppt
Williams_FR1_TO4_5_2011_07_29v1.pptWilliams_FR1_TO4_5_2011_07_29v1.ppt
Williams_FR1_TO4_5_2011_07_29v1.pptgrssieee
 
Design of matched filter for radar applications
Design of matched filter for radar  applicationsDesign of matched filter for radar  applications
Design of matched filter for radar applicationselelijjournal
 
Design of Linear Array Transducer Using Ultrasound Simulation Program Field-II
Design of Linear Array Transducer Using Ultrasound Simulation Program Field-IIDesign of Linear Array Transducer Using Ultrasound Simulation Program Field-II
Design of Linear Array Transducer Using Ultrasound Simulation Program Field-IIinventy
 
FPGA Implementation of Large Area Efficient and Low Power Geortzel Algorithm ...
FPGA Implementation of Large Area Efficient and Low Power Geortzel Algorithm ...FPGA Implementation of Large Area Efficient and Low Power Geortzel Algorithm ...
FPGA Implementation of Large Area Efficient and Low Power Geortzel Algorithm ...IDES Editor
 
Noise uncertainty effect on multi-channel cognitive radio networks
Noise uncertainty effect on multi-channel cognitive  radio networks Noise uncertainty effect on multi-channel cognitive  radio networks
Noise uncertainty effect on multi-channel cognitive radio networks IJECEIAES
 

Semelhante a Low-Complexity Algorithm for Detecting Intruders in PIR Sensor Networks (20)

Hr3114661470
Hr3114661470Hr3114661470
Hr3114661470
 
An Overview of Array Signal Processing and Beam Forming TechniquesAn Overview...
An Overview of Array Signal Processing and Beam Forming TechniquesAn Overview...An Overview of Array Signal Processing and Beam Forming TechniquesAn Overview...
An Overview of Array Signal Processing and Beam Forming TechniquesAn Overview...
 
IR UWB TOA Estimation Techniques and Comparison
IR UWB TOA Estimation Techniques and ComparisonIR UWB TOA Estimation Techniques and Comparison
IR UWB TOA Estimation Techniques and Comparison
 
1-Wang-FR1020-IGARSS11.pptx
1-Wang-FR1020-IGARSS11.pptx1-Wang-FR1020-IGARSS11.pptx
1-Wang-FR1020-IGARSS11.pptx
 
Single Electron Spin Detection Slides For Uno Interview
Single Electron Spin Detection Slides For Uno InterviewSingle Electron Spin Detection Slides For Uno Interview
Single Electron Spin Detection Slides For Uno Interview
 
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...Signal to-noise-ratio of signal acquisition in global navigation satellite sy...
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...
 
Three Element Beam forming Algorithm with Reduced Interference Effect in Sign...
Three Element Beam forming Algorithm with Reduced Interference Effect in Sign...Three Element Beam forming Algorithm with Reduced Interference Effect in Sign...
Three Element Beam forming Algorithm with Reduced Interference Effect in Sign...
 
RADAR MEASUREMENTS LECTURE EECS BERKELY!
RADAR MEASUREMENTS LECTURE EECS BERKELY!RADAR MEASUREMENTS LECTURE EECS BERKELY!
RADAR MEASUREMENTS LECTURE EECS BERKELY!
 
UWB IRF correlator
UWB IRF correlator UWB IRF correlator
UWB IRF correlator
 
Suppression of Chirp Interferers in GPS Using the Fractional Fourier Transform
Suppression of Chirp Interferers in GPS Using the Fractional Fourier TransformSuppression of Chirp Interferers in GPS Using the Fractional Fourier Transform
Suppression of Chirp Interferers in GPS Using the Fractional Fourier Transform
 
Subsystems of radar and signal processing
Subsystems of radar and signal processing Subsystems of radar and signal processing
Subsystems of radar and signal processing
 
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...Mimo radar detection in compound gaussian clutter using orthogonal discrete f...
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...
 
J0412261066
J0412261066J0412261066
J0412261066
 
Signal Integrity Asif
Signal Integrity AsifSignal Integrity Asif
Signal Integrity Asif
 
Williams_FR1_TO4_5_2011_07_29v1.ppt
Williams_FR1_TO4_5_2011_07_29v1.pptWilliams_FR1_TO4_5_2011_07_29v1.ppt
Williams_FR1_TO4_5_2011_07_29v1.ppt
 
Design of matched filter for radar applications
Design of matched filter for radar  applicationsDesign of matched filter for radar  applications
Design of matched filter for radar applications
 
DSP Lab 1-6.pdf
DSP Lab 1-6.pdfDSP Lab 1-6.pdf
DSP Lab 1-6.pdf
 
Design of Linear Array Transducer Using Ultrasound Simulation Program Field-II
Design of Linear Array Transducer Using Ultrasound Simulation Program Field-IIDesign of Linear Array Transducer Using Ultrasound Simulation Program Field-II
Design of Linear Array Transducer Using Ultrasound Simulation Program Field-II
 
FPGA Implementation of Large Area Efficient and Low Power Geortzel Algorithm ...
FPGA Implementation of Large Area Efficient and Low Power Geortzel Algorithm ...FPGA Implementation of Large Area Efficient and Low Power Geortzel Algorithm ...
FPGA Implementation of Large Area Efficient and Low Power Geortzel Algorithm ...
 
Noise uncertainty effect on multi-channel cognitive radio networks
Noise uncertainty effect on multi-channel cognitive  radio networks Noise uncertainty effect on multi-channel cognitive  radio networks
Noise uncertainty effect on multi-channel cognitive radio networks
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Último (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Low-Complexity Algorithm for Detecting Intruders in PIR Sensor Networks

  • 1. A Low-Complexity Algorithm for Robust Intrusion Detection in PIR-based Wireless Sensor Network Ramanathan Subramanian sramanathan@csa.iisc.ernet.in Under the guidance of Prof. P. Vijay Kumar CSA Dept. IISc, Bangalore May 17, 2010
  • 2. Outline Problem Description. PIR Sensor Operation. Intrusion Detection Algorithm Description. Simulation Results and Field Testing. Idealized Intruder Waveform Analysis. Intruder Tracking.
  • 3. Introduction Wireless sensor networks find numerous applications. To name a few, Unattended Surveillance. Environmental applications. Precision Agriculture. Surveillance cameras are expensive and power hungry. Power outlets are not going to be available in the terrains of interest. Currently, Passive Infra-Red (PIR) sensors consume less power than cameras by up to two orders of magnitude. PIR sensors can be used as a low-power wake-up mechanism for cameras. PIR sensors are triggered by blowing debris, birds, animals, vegetation, hot air currents etc. The problem is challenging because intrusion is a rare event while clutter is always present. Frequent false alarms would effectively render the system useless.
  • 4. Problem Description Detect an intruder in the presence of clutter with low false alarm rate. The intruder is a human traveling in the vicinity of the sensor. The term clutter is used to describe the waveform generated at the output of the sensor as a result of the movement of vegetation caused by the wind.
  • 5. Objective Robust intruder detection algorithm. Minimize the energy spent in detection.
  • 6. Challenges Handle various speeds of the intruder. Duration of the intruder signature could vary from 3s to 18s. Reject clutter from various forms of vegetation. Performance of the algorithm should not be terrain dependent. Low-complexity algorithm. Energy spent in the detection reflects in the number of operations performed.
  • 7. PIR Sensor Operation The PIR sensors along with the optical filters are tuned to detect wavelengths in the range of 8 − 14µm. From Wien’s law we know that humans emit peak radiation at 9.4µm (far Infra-Red). A PIR sensor converts the spatial and temporal variations of intensity of IR falling onto its sensitive element(s), into an electrical signal. Moving vegetation also causes variations in the ambient IR intensity perceived by the sensor, which leads to clutter. This is primarily due to varying occlusions of background IR emissions caused by moving vegetation.
  • 8. Pyroelectricity A PIR sensor works on the principle of pyroelectricity.
  • 10. Analog Panasonic Motion Sensor AMN24111 The sensor produces an electrical potential proportional to differences in the rate of intensity variations across the two diagonals.
  • 11. Golf Ball Lens Radiation received by each plano-convex lens from a zone in the field of view is focused in the sensing region for sensing by the infrared detector.
  • 12. Cross Section Of The Beams Figure: Virtual Pixel Array
  • 13. Top View Of The Beams
  • 14. Intruder Signature For 3m Slow Walk
  • 15. Intruder Signature For (50◦ , 1.5m) Slow Walk
  • 17. Transform Based Approach Figure: 256 Pt DFT Of Intruder And Clutter Data From Analog And Digital Sensor. The figure above pertaining to the analog sensor suggests separating intruder from clutter based on the spectral signature of their waveforms. It was decided to use Haar Transform (HT) for computing the spectral signature in preference to DFT as only additions and subtractions suffice to compute the HT.
  • 18. The Haar Transform And Frequency Binning Since HT is a wavelet transform its coefficients are designed to provide both frequency and time localization information. As a result, the breakdown of N Haar coefficients is as follows: there is one coefficient assigned to frequency 0 (the DC component) and 2k coefficients attached to signals of frequency 2k , 0 ≤ k ≤ log(N) − 1. Thus, there are a total of log(N) + 1 frequencies or frequency ‘bins’ for which the energy is computed in the algorithm. The Haar signals associated with 8-sample transform are shown in the figure below:
  • 19. The Fast Haar Transform Figure: 8-sample fast Haar transform.
  • 20. Support Vector Machine LIBSVM library interfaced to MATLAB was used for support vector classification.
  • 21. Functional Block Diagram Of The Algorithm
  • 23. Intruder Data Collection Intruder data was collected in a laboratory (i.e., clutter-free) environment. Figure: Experimental floor layout.
  • 25. Clutter Data Collection Clutter data was collected across many outdoor locations in IISc over the period October 2008 to March 2009. Figure: ECE Dept. lawn with a variety of vegetation.
  • 26. Clutter Data Collection Figure: A location in ECE Dept. lawn where a part of clutter data was accumulated.
  • 27. Training Performance Performance: (112 Intruder data and 112 Clutter data) 7/112 = 6.3% misses. 4/112 = 3.6% false alarms.
  • 28. Testing Performance Figure: Linear SVM: Intrusion detected.
  • 29. Testing Performance Figure: Linear SVM: Clutter rejected.
  • 30. Field Testing The field testing was conducted in the ECE Dept. lawn. Three sensors were mounted onto a single platform each with an angular spacing of 120◦ . This essentially gave each platform an omni-directional sensing range. Two identical, linear and parallel arrays of nodes spaced apart by 5m was laid. The inter-node distance in an array was chosen to maximize the area covered by a single node while ensuring that every point in the sensing range was covered by at least 3 nodes. When tested over a period of several hours the network performed flawlessly by detecting every intrusion at speeds ranging from that of a slow crawl to a sprint at 5m/sec. There were also no false alarms in the period over which testing was conducted.
  • 31. Our Three Sensor Platform
  • 33. Wireless Trip Wire We refer to the linear arrangement of nodes as a ‘wireless trip wire’. Let ∆, Rs and (a − p − n) be the inter-node distance, sensing radius of a node and area per node respectively. Let the trip wire provide us k-coverage for a width of ρ on 2 either√sides with the (a − p − n) maximized. 2Rs ∆= k−1 maximizes the (a − p − n) 2Rs2 (a − p − n)max = k
  • 34. Limitations When field testing was carried out around noontime in April 2009, at the height of the summer in Bangalore, a significantly larger false alarm rate was observed. When such summer noontime data was also included in the training set, linear SVM recorded a training performance of 60/275 = 21.8% misses and 22/275 = 8% false alarms. Replacing the linear SVM with a quadratic SVM was able to improve the record on training data to 47/275 = 17% misses and 15/275 = 5.5% false alarms. The improvement with regard to testing data (simulation) was far more pronounced.
  • 35. Quadratic SVM On Summer Clutter Data
  • 36. Summary Of Training Performance
  • 37. Factors Influencing Clutter Amplitude of clutter signal depends on Proximity and size of the vegetation. The ambient temperature. Frequency depends on Stem’s stiffness of the vegetation. The wind speed.
  • 38. Idealized Intruder Waveform Analysis Figure: Geometry used for modeling intruder signature.
  • 39. Analytical Model For Intruder Signature The instantaneous frequency f (t) of the intruder signature is then from OBC given by, v cos ψ(t) κλ f (t) = κω(t) = κ = r (t) (λ(t − t0 ))2 + 1 v − cot(φ+θ) where λ = d sin φ and t0 = λ . The intruder signature is thus given by, t s(t) = sin 2π f (t)dt 0 λt = sin 2πκ arctan λ2 t 0 (t − t0 ) + 1
  • 40. Intruder Signature For (v , d, φ) = (0.7, 3, 90◦ )
  • 41. Intruder Signature For (v , d, φ) = (0.3, 2, 50◦ )
  • 42. What Does The Model Suggest? κ is the constant which corresponds to the density of the beams. Hence the analytical expression naturally extends to other differential PIR sensors in general as κ abstracts the lens. λ and t0 determine the intruder’s analytical waveform. λ for different triplets of (v , d, φ) can be the same. Hence velocity and direction of motion information from a single sensor cannot be extracted. λ corresponding to colocated sensors will be identical. Hence velocity and direction of motion information also cannot be obtained from multiple sensors on the same node. So to track the intruder, many sensing nodes spaced apart will be required.
  • 43. Tracking Let the coordinates of the sensing nodes be (xi , yi ). Set ηi = 1/λi . Lets assume that the ith sensor node has available its reliable estimate of ηi . Let the intruder path equation be ax + by + c = 0. √ a2 +b 2 a Set r = c and α = arctan b . The intruder path equation ax + by + c = 0 can be rewritten as: xr sin α + yr cos α + 1 = 0.
  • 44. Tracking For a node at (x1 , y1 ), ax1 + by1 + c dmin,1 = √ a2 + b 2 dmin,1 sin α cos α 1 ⇒ η1 = = x1 + y1 + v v v vr We have 3 unknowns, r , α, v but just one equation. Thus we require two more equations to solve for r , α and v . sin α cos α 1 η2 = x2 + y2 + v v vr sin α cos α 1 η3 = x3 + y3 + v v vr Now we have 3 equations in 3 unknowns.
  • 45. Tracking After some work, it can be shown that 1 v = √ + c2s2 s α = arctan c 1 r = v (η3 − sx3 − cy3 ) where sin α (η1 − η2 )(y1 − y3 ) − (η1 − η3 )(y1 − y2 ) s = = v (x1 − x2 )(y1 − y3 ) − (x1 − x3 )(y1 − y2 ) cos α −(η1 − η2 )(x1 − x3 ) + (η1 − η3 )(x1 − x2 ) c = = v (x1 − x2 )(y1 − y3 ) − (x1 − x3 )(y1 − y2 ) Hence, 3 sensing nodes will suffice in reliably tracking the intruder.
  • 46. Optimal Locationing Of The 3 Sensing Nodes Tracking involves the transformation: (η1 , η2 , η3 ) → (r , α, v ). The impact of error in the estimates of ηi ’s on r , α and v should be kept minimum for reliable tracking. Equivalently, the Jacobian of the transformation carrying out the mapping: (r , α, v ) → (η1 , η2 , η3 ) should be maximized. ∂η1 ∂η2 ∂η3 ∂r ∂r ∂r . ∂η1 ∂η2 ∂η3 J= ∂α ∂α ∂α ∂η1 ∂η2 ∂η3 ∂v ∂v ∂v Without loss of generality lets assume a coordinate system whose origin is equidistant from the three sensors. Each sensor then is at a constant distance R from the origin.
  • 47. Optimal Locationing Of The 3 Sensing Nodes Again we have a system of 3 equations in the 3 unknowns r , α and v : sin α cos α 1 ηi = xi + yi + , 1 ≤ i ≤ 3. v v vr Rewriting the above system of 3 equations with y xi = R cos(βi ), yi = R sin(βi ), where βi = arctan( xii ), we have R 1 ηi = sin(α + βi ) + , 1 ≤ i ≤ 3. v vr After some work, it can be shown that this Jacobian is given by R2 J= [sin(β3 − β2 ) + sin(β1 − β3 ) + sin(β2 − β1 )] . r 2v 2
  • 48. Optimal Locationing Of The 3 Sensing Nodes The value of J is clearly maximized when β3 − β2 = β1 − β3 = β2 − β1 = 2π and when R is made as 3 large as possible. This suggests that the nodes should be arranged in an equilateral triangle with R as large as possible, subject to the desired node density.
  • 49. Other Issues With a good model for the clutter signature, this problem can be formulated into a proper detection problem. Sleep-wake cycling. Online training.
  • 50. Conclusion We have reasonably met the challenges. This application will become sophisticated when ‘better’ sensors become available.
  • 51. References S. Oh, P. Chen, M. Manzo, and S. Sastry, “Instrumenting wireless sensor networks for real-time surveillance,” in Proc. of the International Conference on Robotics and Automation, May 2006. A. Arora, P. Dutta, S. Bapat, V. Kulathumani, H. Zhang, V. Naik, V. Mittal, H. Cao, M. Demirbas, M. Gouda, Y-R. Choi, T. Herman, S. S. Kulkarni, U. Arumugam, M. Nesterenko, A. Vora, and M. Miyashita, “A line in the sand: A wireless sensor network for target detection, classification, and tracking”, Ohio State University, 2003. MP Motion Sensor (AMN 1,2,4) data sheet, Panasonic Electric Works Corporation of America, New Jersey, USA. Sidney B. Lang, “Pyroelectricity: From Ancient Curiosity to Modern Imaging Tool”, Physics Today, pages 31-36, Aug. 2005.