Skip to main content

Smart Fence: Decentralized Sequential Hypothesis Testing for Perimeter Security

  • Conference paper
Sensor Systems and Software (S-CUBE 2013)

Abstract

This paper presents a practical solution for the fence-line intrusion detection problem. The MEMS based sensor platform is introduced along with its WirelessHART networking capabilities. A Decentralized Sequential Hypothesis Testing algorithm is studied at the theoretical level before being applied to the problem at hand. Results from several deployments show 100% detection rates within one second of the intrusion. The system is presented as a viable replacement for much more expensive and less performant security systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wald, A., Wolfowitz, J.: Optimum character of the sequential probability ratio test. Ann. Math. Statist. 19, 326–339 (1948)

    Article  MathSciNet  MATH  Google Scholar 

  2. Fellouris, G., Moustakides, G.: Decentralized Sequential Hypothesis Testing Using Asynchronous Communication. IEEE Transactions on Information Theory 57(1), 534–548 (2011), doi:10.1109/TIT.2010.2090249

    Article  MathSciNet  Google Scholar 

  3. Veeravalli, V.: Sequential decision fusion: theory and applications. In: Proceedings of the Workshop on Foundations Information/Decision Fusion with Engineering Applications (August 1996)

    Google Scholar 

  4. Tsitsiklis, J.: On threshold rules in decentralized detection. In: 1986 25th IEEE Conference on Decision and Control, vol. 25, pp. 232–236 (December 1986), doi:10.1109/CDC.1986.267213

    Google Scholar 

  5. Perimeter Security Sensor Technologies Handbook, Electronic Security Systems Engineering Division, North Charleson, South Carolina (1997)

    Google Scholar 

  6. Yousefi, A., Dibazar, A., Berger, T.: Intelligent fence intrusion detection system: detection of intentional fence breaching and recognition of fence climbing. In: IEEE Conference on Technologies for Homeland Security, May 12-13, pp. 620–625 (2008)

    Google Scholar 

  7. Yousefi, A., Dibazar, A., Berger, T.: Application of Non-homogenious HMM on Detecting Security Fence Breaching. In: Proceedings of the ICASSP (2010)

    Google Scholar 

  8. Wittenburg, G., Dziengel, N., Wartenburger, C., Schiller, J.: A system for distributed event detection in wireless sensor networks. In: Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, pp. 94–104. ACM (2010)

    Google Scholar 

  9. Mehta, A., Pister, K.: WARPWING: A complete open source control platform for miniature robots. In: 2010 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2010), Taipei, Taiwan (October 2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Chraim, F., Pister, K. (2013). Smart Fence: Decentralized Sequential Hypothesis Testing for Perimeter Security. In: Zuniga, M., Dini, G. (eds) Sensor Systems and Software. S-CUBE 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 122. Springer, Cham. https://doi.org/10.1007/978-3-319-04166-7_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04166-7_5

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04165-0

  • Online ISBN: 978-3-319-04166-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics