[go: up one dir, main page]

CN103458413A - Method for intrusion detection based on wireless signal characters - Google Patents

Method for intrusion detection based on wireless signal characters Download PDF

Info

Publication number
CN103458413A
CN103458413A CN2013102053051A CN201310205305A CN103458413A CN 103458413 A CN103458413 A CN 103458413A CN 2013102053051 A CN2013102053051 A CN 2013102053051A CN 201310205305 A CN201310205305 A CN 201310205305A CN 103458413 A CN103458413 A CN 103458413A
Authority
CN
China
Prior art keywords
wireless
centerdot
intrusion
intrusion detection
prime
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013102053051A
Other languages
Chinese (zh)
Inventor
王洁
高庆华
王洪玉
孙立奎
吴力飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dalian University of Technology
Original Assignee
Dalian University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dalian University of Technology filed Critical Dalian University of Technology
Priority to CN2013102053051A priority Critical patent/CN103458413A/en
Publication of CN103458413A publication Critical patent/CN103458413A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Burglar Alarm Systems (AREA)

Abstract

本发明基于无线信号特征的入侵检测方法属于安防技术、无线网络应用领域,涉及一种基于无线信号特征的入侵检测方法。检测方法是利用入侵物体对无线链路信号强度的影响,实现对是否有物体入侵的状态检测,入侵检测算法以各条无线链路的信号强度信息为输入信息,利用其均值、方差二维统计特性检测是否有入侵发生。该方法采用的系统由无线扫描节点、无线汇聚节点、通用PC机和入侵检测算法组成。入侵检测算法安装在通用PC机中,无线扫描节点、无线汇聚节点、通用PC机之间进行无线通信。该方法适用于墙体遮蔽、环境黑暗等恶劣环境下的入侵检测,利用入侵物体对无线信号的遮蔽造成的无线链路信号强度的变化,实现对是否有目标入侵进行检测。

The invention relates to an intrusion detection method based on wireless signal characteristics, which belongs to the field of security technology and wireless network application, and relates to an intrusion detection method based on wireless signal characteristics. The detection method is to use the influence of the intruding object on the signal strength of the wireless link to realize the state detection of whether there is an object intrusion. Features detect whether an intrusion has occurred. The system adopted in this method is composed of wireless scanning nodes, wireless aggregation nodes, general PCs and intrusion detection algorithms. The intrusion detection algorithm is installed in a general-purpose PC, and wireless communication is carried out between wireless scanning nodes, wireless sink nodes and general-purpose PCs. This method is suitable for intrusion detection in harsh environments such as wall shading and dark environments, and uses the change in the signal strength of the wireless link caused by the shading of the wireless signal by the intruding object to detect whether there is a target intrusion.

Description

Intrusion detection method based on the wireless signal feature
Technical field
The invention belongs to security and guard technology, wireless network application, relate to a kind of intrusion detection method based on the wireless signal feature.
Background technology
Intrusion Detection Technique has a wide range of applications in fields such as border monitoring, bank's monitoring, nucleus monitorings.Along with social development, people are more and more higher to the concern of safety, can predict in the near future, and Intrusion Detection Technique will be used widely in military affairs, industry and our daily life.
The Intrusion Detection Technique extensively adopted at present is based on the detection technique of camera, numerous scholars are to utilizing camera, based on image processing techniques, realizing that intrusion detection conducts in-depth research, as: Zhu J, Lao Y, " Object tracking in structured environments for video surveillance applications " Deng the people, IEEE Transactions on Circuits and Systems for Video Technology, 2010, the 20th volume, the 2nd phase, the P223-235 page.But system layout is more loaded down with trivial details, intruding detection system needs light condition well and can't realize that simultaneously, image processing techniques relates to privacy concern, inapplicable in some monitoring occasion to the penetrating of body of wall etc.In recent years, along with the development of wireless technology, make to utilize the wireless measurement between radio node cheaply to realize that intrusion detection becomes possibility.Due to the inherent characteristic of electric wave, when there being intrusion object to cause while covering certain wireless links, the received signal strength information potential of this link must change.Based on this, when having multi wireless links to exist, by the received signal strength information of each wireless link, can realize whether there being the object invasion to judge in the wireless link overlay area simultaneously.
With traditional intrusion detection method based on camera, compare, because radio node can cover larger zone, so the Intrusion Detection Technique based on the wireless signal feature can complete the security monitor to large scene; Because the radio node cost is lower, so the Intrusion Detection Technique based on the wireless signal feature can be in the application of the field of numerous cost sensitivities; Because wireless signal can penetrate veil, so the Intrusion Detection Technique based on the wireless signal feature can be applied under the scene more at indoor barrier; Because radio node is insensitive to illumination, humiture, so the field that the Intrusion Detection Technique based on the wireless signal feature can be more severe in environmental condition application.These characteristics has determined that the Intrusion Detection Technique based on the wireless signal feature has application prospect more widely.
Summary of the invention
The objective of the invention is to overcome the defect of prior art, invent a kind of intrusion detection method based on the wireless signal feature, with the wireless measurement signal between radio node as metrical information, adopt intrusion detection algorithm to detect the impact of intrusion object on the wireless measurement signal, the variation of the wireless link signals intensity covering of wireless signal caused according to intrusion object, realize whether the detection of target invasion is arranged.
Technical scheme of the present invention is a kind of intrusion detection method based on the wireless signal feature, intrusion detection algorithm is to utilize the impact of intrusion object on wireless link signals intensity, whether realization to there being the state-detection of object invasion, it is input message that intrusion detection algorithm be take the signal strength information of each wireless links, utilize its average, variance Two-dimensional Statistical Characteristics Detection whether to have invasion to occur, when the amplitude changed when the two-dimensional space characteristic information is greater than certain threshold value, judgement has the object invasion, and concrete steps are as follows:
A) N wireless scan node J1, J2, JN is placed on four limits of intrusion object 3 outer rectangular areas, every limit keeps at a certain distance away and places a wireless scan node, wireless aggregation node 1, general purpose PC 2 are placed on monitored area on one side or in inside, monitored area, carry out radio communication between wireless scan node, each node sends wireless signal successively, and other node receives wireless signal and records received signal strength;
B) wireless aggregation node 1 collects by wireless mode the wireless link signals strength information that all wireless scan nodes measure; Simultaneously, the information of collection is sent to general purpose PC 2;
C) on general purpose PC 2, the intrusion detection algorithm of operation is realized whether the detection of object invasion is arranged according to the wireless link strength information; Algorithm is usingd wireless link received signal strength information as input message, the intrusion target position of output estimation; Average, the variance Two-dimensional Statistical characteristic of intrusion detection algorithm based on wireless link signals intensity realizes intrusion detection; Suppose between each wireless scan node to form the n wireless links, obtain respectively in t-1 and the t moment eigenmatrix A and B that average m and variance v by this n wireless links received signal strength form as follows:
A = m 11 v 12 m 21 v 22 · · · · · · m n 1 v n 2 , B = m 11 ′ v 12 ′ m 21 ′ v 22 ′ · · · · · · m n 1 ′ v n 2 ′
Wherein, the average m that eigenmatrix A and B have comprised wireless link signals intensity and variance v feature, m n1and v n2represent respectively signal strength signal intensity average and the variance of n wireless links; In intrusion detection algorithm calculated characteristics matrix A and B, to obtain similarity matrix C as follows for the big or small similarity degree of corresponding element value:
C = ( m 11 - m 11 ′ ) 2 d 1 ( v 12 - v 12 ′ ) 2 d 1 ( m 21 - m 21 ′ ) 2 d 2 ( v 22 - v 22 ′ ) 2 d 2 · · · · · · ( m n 1 - m n 1 ′ ) 2 d n ( v n 2 - v n 2 ′ ) 2 d n
Wherein, m n1-m' n1represented the difference of the average of n bar link, v n1-v' n1represented the difference of the variance of n bar link, d nrepresented the length of n bar link.When each element sum of similarity matrix C is greater than the threshold value of setting, intrusion detection algorithm will be judged the object invasion.
The system that this intrusion detection method adopts is by wireless scan node J1, J2, JN, wireless aggregation node 1, general purpose PC 2 and intrusion detection algorithm form, and intrusion detection algorithm is arranged in general purpose PC 2, between wireless scan node, wireless aggregation node, general purpose PC, carries out radio communication.
Beneficial effect of the present invention is: 1) can utilize the wireless measurement signal to realize whether the judgement of object invasion is arranged; 2) can utilize the radio node of a large amount of cheapnesss to realize fast the intrusion detection of scene on a large scale; 3) size, illumination condition, the condition of covering that detects scene do not had to particular requirement; 4) do not relate to privacy concern; 5) utilize multi wireless links to be detected, improved the robustness of detection system.
The accompanying drawing explanation
Fig. 1 is system architecture diagram of the present invention.In figure: J1 to J8 is wireless scan node, and 1 is wireless aggregation node; 2 is general purpose PC, the operation intrusion detection algorithm; 3 is intrusion object.
Fig. 2 intrusion detection algorithm flow process.
Embodiment
Elaborate the present invention below in conjunction with concrete technical scheme and accompanying drawing, but the present invention is not limited to specific embodiment.Embodiment: as shown in Figure 1, the system that this intrusion detection method adopts is comprised of wireless scan node, wireless aggregation node, general purpose PC, intrusion detection algorithm.System arranges 8 wireless scan node J1, J2 ... J8 and wireless aggregation node 1 be the wireless module design based on being operated in 433MHz all, transmitting power 20dBm, antenna gain 1dB.Wireless scan node J1, J2 ... four ,Mei Bian interval, the limit 5m that J8 is placed on 10m * 10m rectangular area place a wireless scan node, and placing height is 1m.Wireless aggregation node 1, PC 2 are placed on monitored area on one side or in inside, monitored area, the wireless scan node J1 of distance, and J2 ... in J8100m.Wireless scan node J1 ... J8 forms queue, sends successively wireless signal, other wireless signal that the wireless scan node reception current time sending node of transmitted signal does not send, and measure received signal strength information.Wireless aggregation node 1 is intercepted the wireless signal information of each wireless link, and the received signal strength information of each link is delivered to general purpose PC 2.
Fig. 2 means the intrusion detection algorithm flow process, and concrete steps are as follows:
A) can carry out radio communication between wireless scan node, each node sends wireless signal successively, and other node receives wireless signal and records received signal strength;
B) wireless aggregation node can be collected the wireless link signals strength information that all wireless scan nodes measure by wireless mode; Simultaneously, the information of collection is sent to general purpose PC;
C) intrusion detection algorithm moved on general purpose PC is realized whether the detection of object invasion is arranged according to the wireless link strength information; Algorithm is usingd wireless link received signal strength information as input message, the intrusion target position of output estimation.Average, the variance Two-dimensional Statistical characteristic of intrusion detection algorithm based on wireless link signals intensity realizes intrusion detection.Suppose between each wireless scan node to form the n wireless links, constantly obtain at t-1 the eigenmatrix A that average m and variance v by this n wireless links received signal strength form as follows:
A = m 11 v 12 m 21 v 22 · · · · · · m n 1 v n 2
Constantly obtain at t the eigenmatrix B that average m and variance v by this n wireless links received signal strength form as follows:
B = m 11 ′ v 12 ′ m 21 ′ v 22 ′ · · · · · · m n 1 ′ v n 2 ′
Wherein, the average m that eigenmatrix A and B have comprised wireless link signals intensity and variance v feature, m n1and v n2represent respectively signal strength signal intensity average and the variance of n wireless links; In intrusion detection algorithm calculated characteristics matrix A and B, to obtain similarity matrix C as follows for the big or small similarity degree of corresponding element value:
C = ( m 11 - m 11 ′ ) 2 d 1 ( v 12 - v 12 ′ ) 2 d 1 ( m 21 - m 21 ′ ) 2 d 2 ( v 22 - v 22 ′ ) 2 d 2 · · · · · · ( m n 1 - m n 1 ′ ) 2 d n ( v n 2 - v n 2 ′ ) 2 d n
Wherein, m n1-m' n1represented the difference of the average of n bar link, v n1-v' n1represented the difference of the variance of n bar link, d nrepresented the length of n bar link.When each element sum of similarity matrix C is greater than the threshold value of setting, intrusion detection algorithm will be judged the object invasion, as shown in Figure 2.
Using the wireless link metrical information as input, average, the variance of the signal strength signal intensity of each wireless link are carried out to On-line Estimation, the construction feature matrix B at the intrusion detection algorithm based on mean variance associating two-dimensional detection technology of the upper operation of PC (2); Afterwards, eigenmatrix B and the upper one eigenmatrix A constantly built are analyzed, calculate similarity matrix C, calculate its mould value, and then to whether having target to occur being adjudicated, and court verdict is exported to the screen of general purpose PC (2).
Test shows, in 10m * 10m rectangular area, and 8 wireless scan node J1 of system layout, J2 ... .J8, can realize the detection to intrusion object, success rate is 98%, and false alarm rate is 1%.
The method is applicable to the intrusion detection under the adverse circumstances such as body of wall covers, ambient black, and whether the variation of the wireless link signals intensity of utilizing intrusion object to cause covering of wireless signal realizes having the target invasion to be detected.

Claims (2)

1.一种基于无线信号特征的入侵检测方法,其特征在于,入侵检测算法是利用入侵物体对无线链路信号强度的影响,实现对是否有物体入侵的状态检测,入侵检测算法以各条无线链路的信号强度信息为输入信息,利用其均值、方差二维统计特性检测是否有入侵发生,当二维空间特征信息发生变化的幅度大于一定的阈值时,判断有物体入侵,具体步骤如下:1. An intrusion detection method based on wireless signal characteristics, characterized in that the intrusion detection algorithm utilizes the influence of the intrusion object on the signal strength of the wireless link to realize the state detection of whether there is an object intrusion, and the intrusion detection algorithm uses each wireless The signal strength information of the link is the input information. Use its mean value and variance two-dimensional statistical characteristics to detect whether there is an intrusion. When the change in the two-dimensional spatial feature information is greater than a certain threshold, it is judged that there is an object intrusion. The specific steps are as follows: a)N个无线扫描节点(J1,J2,…JN)放置在入侵物体(3)外矩形区域的四边,每边间隔一定距离放置一个无线扫描节点,无线汇聚节点(1)、通用PC机(2)放置在监测区域一边或者处于监测区域内部,无线扫描节点之间进行无线通信,各节点依次发送无线信号,其它节点接收无线信号并记录接收信号强度;a) N wireless scanning nodes (J1, J2, ... JN) are placed on the four sides of the rectangular area outside the intrusion object (3), and a wireless scanning node is placed at a certain distance on each side, wireless convergence node (1), general-purpose PC ( 2) Placed on the side of the monitoring area or inside the monitoring area, wireless scanning nodes perform wireless communication, each node sends wireless signals in turn, other nodes receive wireless signals and record the received signal strength; b)无线汇聚节点(1)通过无线的方式收集所有无线扫描节点测量到的无线链路信号强度信息;同时,将采集的信息发送给通用PC机(2);b) The wireless aggregation node (1) collects the wireless link signal strength information measured by all wireless scanning nodes wirelessly; at the same time, sends the collected information to the general PC (2); c)通用PC机(2)上运行的入侵检测算法根据无线链路强度信息实现对是否有物体入侵的检测;算法以无线链路接收信号强度信息作为输入信息,输出估计的入侵目标位置;入侵检测算法基于无线链路信号强度的均值、方差二维统计特性实现入侵检测;假设各无线扫描节点之间形成n条无线链路,在t-1与t时刻分别得到由这n条无线链路接收信号强度的均值m和方差v组成的特征矩阵A和B如下:c) The intrusion detection algorithm running on the general-purpose PC (2) realizes the detection of object intrusion according to the wireless link strength information; the algorithm uses the received signal strength information of the wireless link as input information, and outputs the estimated intrusion target position; The detection algorithm realizes intrusion detection based on the two-dimensional statistical characteristics of the mean value and variance of the wireless link signal strength; assuming that n wireless links are formed between the wireless scanning nodes, the n wireless link The characteristic matrices A and B composed of the mean value m and variance v of the received signal strength are as follows: AA == mm 1111 vv 1212 mm 21twenty one vv 22twenty two ·· ·· ·· ·· ·· ·· mm nno 11 vv nno 22 ,, BB == mm 1111 ′′ vv 1212 ′′ mm 21twenty one ′′ vv 22twenty two ′′ ·· ·· ·· ·· ·· ·· mm nno 11 ′′ vv nno 22 ′′ 其中,特征矩阵A和B包含了无线链路信号强度的均值m以及方差v特征,mn1以及vn2分别代表第n条无线链路的信号强度均值及方差;入侵检测算法计算特征矩阵A和B中对应元素值的大小相似程度得到相似度矩阵C如下:Among them, the characteristic matrices A and B include the mean value m and variance v characteristics of the wireless link signal strength, m n1 and v n2 represent the mean value and variance of the signal strength of the nth wireless link respectively; the intrusion detection algorithm calculates the characteristic matrix A and The degree of similarity of the corresponding element values in B to obtain the similarity matrix C is as follows: CC == (( mm 1111 -- mm 1111 ′′ )) 22 dd 11 (( vv 1212 -- vv 1212 ′′ )) 22 dd 11 (( mm 21twenty one -- mm 21twenty one ′′ )) 22 dd 22 (( vv 22twenty two -- vv 22twenty two ′′ )) 22 dd 22 ·&Center Dot; ·· ·· ·&Center Dot; ·&Center Dot; ·· (( mm nno 11 -- mm nno 11 ′′ )) 22 dd nno (( vv nno 22 -- vv nno 22 ′′ )) 22 dd nno 其中,mn1-m'n1代表了第n条链路的均值的差异,vn1-v'n1代表了第n条链路的方差的差异,dn代表了第n条链路的长度;当相似度矩阵C的各元素之和大于设定的阈值时,入侵检测算法将判定物体入侵。Among them, m n1 -m' n1 represents the difference in the mean value of the nth link, v n1 -v' n1 represents the difference in the variance of the nth link, and d n represents the length of the nth link; When the sum of the elements of the similarity matrix C is greater than the set threshold, the intrusion detection algorithm will determine that the object is intruded. 2.根据权利要求1所述的一种基于无线信号特征的入侵检测方法,,其特征在于:该侵检测方法采用的系统由无线扫描节点(J1,J2,…JN)、无线汇聚节点(1)、通用PC机(2)和入侵检测算法组成,入侵检测算法安装在通用PC机(2)中,无线扫描节点、无线汇聚节点、通用PC机之间进行无线通信。2. An intrusion detection method based on wireless signal characteristics according to claim 1, characterized in that: the system used in the intrusion detection method consists of wireless scanning nodes (J1, J2, ... JN), wireless convergence nodes (1 ), a general-purpose PC (2) and an intrusion detection algorithm, the intrusion detection algorithm is installed in the general-purpose PC (2), and the wireless scanning node, the wireless convergence node, and the general-purpose PC perform wireless communication.
CN2013102053051A 2013-05-28 2013-05-28 Method for intrusion detection based on wireless signal characters Pending CN103458413A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013102053051A CN103458413A (en) 2013-05-28 2013-05-28 Method for intrusion detection based on wireless signal characters

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013102053051A CN103458413A (en) 2013-05-28 2013-05-28 Method for intrusion detection based on wireless signal characters

Publications (1)

Publication Number Publication Date
CN103458413A true CN103458413A (en) 2013-12-18

Family

ID=49740284

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013102053051A Pending CN103458413A (en) 2013-05-28 2013-05-28 Method for intrusion detection based on wireless signal characters

Country Status (1)

Country Link
CN (1) CN103458413A (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104184501A (en) * 2014-08-28 2014-12-03 北京睿仁医疗科技有限公司 Pairing method of low-power-consumption Bluetooth thermometers
CN104678770A (en) * 2015-01-23 2015-06-03 小米科技有限责任公司 Displacement accident detection method and system
CN105242549A (en) * 2015-09-02 2016-01-13 小米科技有限责任公司 Equipment control method and device
CN105894703A (en) * 2016-05-11 2016-08-24 大博(武汉)科技有限公司 Intelligent monitoring method, device and system based on WiFi
TWI602407B (en) * 2016-09-13 2017-10-11 微波資訊科技有限公司 An invading detecting system and method based on the sinr estimation
CN108173975A (en) * 2018-03-12 2018-06-15 杨光亚 A kind of intelligent security guard monitoring system and method based on RSSI signal detections
CN108521652A (en) * 2018-03-28 2018-09-11 清华大学 A method and device for automatically identifying legitimate WiFi users
CN109274440A (en) * 2018-10-10 2019-01-25 重庆邮电大学 Passive intrusion detection method based on adaptive screening of environmental features
CN109461295A (en) * 2018-12-07 2019-03-12 连尚(新昌)网络科技有限公司 A kind of household reporting method and apparatus
CN111132008A (en) * 2019-12-19 2020-05-08 重庆大学 Intrusion object detection positioning system based on wireless local area network signals
CN111245538A (en) * 2018-11-29 2020-06-05 华为技术有限公司 Link quality detection method and related equipment
CN111901758A (en) * 2015-09-16 2020-11-06 伊万尼有限责任公司 Detecting location within a network
US11323845B2 (en) 2015-09-16 2022-05-03 Ivani, LLC Reverse-beacon indoor positioning system using existing detection fields
US11350238B2 (en) 2015-09-16 2022-05-31 Ivani, LLC Systems and methods for detecting the presence of a user at a computer
US11423968B2 (en) 2015-09-16 2022-08-23 Ivani, LLC Detecting location within a network
US11800319B2 (en) 2015-09-16 2023-10-24 Ivani, LLC Building system control utilizing building occupancy

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030027550A1 (en) * 2001-08-03 2003-02-06 Rockwell Laurence I. Airborne security manager
CN101436336A (en) * 2007-11-15 2009-05-20 中国科学院自动化研究所 Intrusion detection system and method
CN102970687A (en) * 2012-11-02 2013-03-13 中国科学院微电子研究所 Method for deploying detection node and detecting intrusion in wireless sensor network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030027550A1 (en) * 2001-08-03 2003-02-06 Rockwell Laurence I. Airborne security manager
CN101436336A (en) * 2007-11-15 2009-05-20 中国科学院自动化研究所 Intrusion detection system and method
CN102970687A (en) * 2012-11-02 2013-03-13 中国科学院微电子研究所 Method for deploying detection node and detecting intrusion in wireless sensor network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
孙立奎,王洪玉,吴力飞,王洁: "基于信号差分特性的被动入侵检测方法", 《传感技术学报》 *

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104184501B (en) * 2014-08-28 2018-04-03 北京睿仁医疗科技有限公司 A kind of matching method of low-power consumption bluetooth clinical thermometer
CN104184501A (en) * 2014-08-28 2014-12-03 北京睿仁医疗科技有限公司 Pairing method of low-power-consumption Bluetooth thermometers
CN104678770B (en) * 2015-01-23 2019-03-01 小米科技有限责任公司 It is displaced event detecting method and system
CN104678770A (en) * 2015-01-23 2015-06-03 小米科技有限责任公司 Displacement accident detection method and system
CN105242549B (en) * 2015-09-02 2018-05-08 小米科技有限责任公司 A kind of method and apparatus being controlled to equipment
CN105242549A (en) * 2015-09-02 2016-01-13 小米科技有限责任公司 Equipment control method and device
US11800319B2 (en) 2015-09-16 2023-10-24 Ivani, LLC Building system control utilizing building occupancy
CN111901758A (en) * 2015-09-16 2020-11-06 伊万尼有限责任公司 Detecting location within a network
US11423968B2 (en) 2015-09-16 2022-08-23 Ivani, LLC Detecting location within a network
CN111901758B (en) * 2015-09-16 2022-08-09 伊万尼有限责任公司 Detecting location within a network
US11711667B2 (en) 2015-09-16 2023-07-25 Ivani, LLC Detecting location within a network
US11350238B2 (en) 2015-09-16 2022-05-31 Ivani, LLC Systems and methods for detecting the presence of a user at a computer
US11323845B2 (en) 2015-09-16 2022-05-03 Ivani, LLC Reverse-beacon indoor positioning system using existing detection fields
US12114225B2 (en) 2015-09-16 2024-10-08 Ivani, LLC Detecting location within a network
CN105894703B (en) * 2016-05-11 2019-03-08 优乐(武汉)健康科技有限公司 A kind of intelligent monitoring method based on WiFi, apparatus and system
CN105894703A (en) * 2016-05-11 2016-08-24 大博(武汉)科技有限公司 Intelligent monitoring method, device and system based on WiFi
TWI602407B (en) * 2016-09-13 2017-10-11 微波資訊科技有限公司 An invading detecting system and method based on the sinr estimation
CN108173975B (en) * 2018-03-12 2020-09-08 杨光亚 Intelligent security monitoring system and method based on RSSI signal detection
CN108173975A (en) * 2018-03-12 2018-06-15 杨光亚 A kind of intelligent security guard monitoring system and method based on RSSI signal detections
CN108521652A (en) * 2018-03-28 2018-09-11 清华大学 A method and device for automatically identifying legitimate WiFi users
CN109274440B (en) * 2018-10-10 2021-05-18 重庆邮电大学 Passive intrusion detection method based on environmental characteristic self-adaptive screening
CN109274440A (en) * 2018-10-10 2019-01-25 重庆邮电大学 Passive intrusion detection method based on adaptive screening of environmental features
CN111245538A (en) * 2018-11-29 2020-06-05 华为技术有限公司 Link quality detection method and related equipment
CN109461295A (en) * 2018-12-07 2019-03-12 连尚(新昌)网络科技有限公司 A kind of household reporting method and apparatus
CN109461295B (en) * 2018-12-07 2021-06-11 连尚(新昌)网络科技有限公司 Household alarm method and equipment
CN111132008A (en) * 2019-12-19 2020-05-08 重庆大学 Intrusion object detection positioning system based on wireless local area network signals

Similar Documents

Publication Publication Date Title
CN103458413A (en) Method for intrusion detection based on wireless signal characters
Mohammadmoradi et al. Measuring people-flow through doorways using easy-to-install ir array sensors
CN108387940B (en) An indoor moving object detection method based on Wi-Fi wireless perception
US8836344B2 (en) Intrusion detection and tracking system
Yang et al. Performing joint learning for passive intrusion detection in pervasive wireless environments
JP2011523106A (en) Image sensor, alarm system and method for classifying objects and events
CN104079874A (en) Security and protection integrated system and method based on Internet of Things technology
CN105575034B (en) A kind of two waveband forest fire protection intelligent monitoring software image processing analysis method
US20090201146A1 (en) Remote activity detection or intrusion monitoring system
CN109740411A (en) Intelligent monitoring system, monitoring method and rapid alarm method based on face recognition
CN102608571A (en) Target location method for wireless sensor network for wild animals
Purushothaman et al. Fall detection system using artificial neural network
Arjun et al. PANCHENDRIYA: A multi-sensing framework through wireless sensor networks for advanced border surveillance and human intruder detection
Huang et al. Tscnn: A 3d convolutional activity recognition network based on rfid rssi
Liu et al. A binary-classification-tree based framework for distributed target classification in multimedia sensor networks
Nakkach et al. Smart border surveillance system based on deep learning methods
Faulkner et al. Device-free localization using privacy-preserving infrared signatures acquired from thermopiles and machine learning
Raad et al. Crowd anomaly detection systems using rfid and wsn review
Lee et al. Wireless sensing without sensors—An experimental approach
CN108828510B (en) Radio frequency tomography positioning method based on gradient shadow weight model
Sushmitha et al. IoT based fire detection and warning system for surveillance applications using deep learning model
CN105451235A (en) Wireless sensor network intrusion detection method based on background updating
CN105844756A (en) People counting method based on radio frequency backscatter signal
Turetta et al. Towards deep learning-based occupancy detection via wifi sensing in unconstrained environments
Raja et al. Detecting spying activities from the sky via deep learning

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination