Show simple item record

dc.contributor.advisorVijay Kumar, P
dc.contributor.authorSubramanian, Ramanathan
dc.date.accessioned2011-08-25T05:38:35Z
dc.date.accessioned2018-07-31T04:40:06Z
dc.date.available2011-08-25T05:38:35Z
dc.date.available2018-07-31T04:40:06Z
dc.date.issued2011-08-25
dc.date.submitted2010
dc.identifier.urihttps://etd.iisc.ac.in/handle/2005/1384
dc.identifier.abstracthttp://etd.iisc.ac.in/static/etd/abstracts/1790/G23598-Abs.pdfen_US
dc.description.abstractThis thesis investigates the problem of detecting an intruder in the presence of clutter in a Passive Infra-Red (PIR) based Wireless Sensor Network (WSN). As one of the major objectives in a WSN is to maximize battery life, data transmission and local computations must be kept to a minimum as they are expensive in terms of energy. But, as intrusion being a rare event and cannot be missed, local computations expend more energy than data transmission. Hence, the need for a low-complexity algorithm for intrusion detection is inevitable. A low-complexity algorithm for intrusion detection in the presence of clutter arising from wind-blown vegetation, using PIR sensors is presented. The algorithm is based on a combination of Haar Transform (HT) and Support Vector Machine (SVM) based training. The amplitude and frequency of the intruder signature is used to differentiate it from the clutter signal. The HT was preferred to Discrete Fourier Transform (DFT) in computing the spectral signature because of its computational simplicity -just additions and subtractions suffice (scaling coefficients taken care appropriately). Intruder data collected in a laboratory and clutter data collected from various types of vegetation were fed into SVM for training. The optimal decision rule returned by SVM was then used to separate intruder from clutter. Simulation results along with some representative samples in which intrusions were detected and the clutter being rejected by the algorithm is presented. The implementation of the proposed intruder-detection algorithm in a network setting comprising of 20 sensing nodes is discussed. The field testing performance of the algorithm is then discussed. The limitations of the algorithm is also discussed. A closed-form analytical expression for the signature generated by a human moving along a straight line in the vicinity of the PIR sensor at constant velocity is provided. It is shown to be a good approximation by showing a close match with the real intruder waveforms. It is then shown how this expression can be exploited to track the intruder from the signatures of three well-positioned sensing nodes.en_US
dc.language.isoen_USen_US
dc.relation.ispartofseriesG23598en_US
dc.subjectWireless Sensor Network (WSN)en_US
dc.subjectAlgorithmsen_US
dc.subjectIntrusion Detectionen_US
dc.subjectIntruder Detection Algorithmen_US
dc.subjectPassive Infra-Red (PIR)en_US
dc.subjectIntruder Signatureen_US
dc.subjectPIR Sensorsen_US
dc.subjectSensorsen_US
dc.subjectWireless Networksen_US
dc.subject.classificationCommunication Engineeringen_US
dc.titleA Low-Complexity Algorithm For Intrusion Detection In A PIR-Based Wireless Sensor Networken_US
dc.typeThesisen_US
dc.degree.nameMSc Enggen_US
dc.degree.levelMastersen_US
dc.degree.disciplineFaculty of Engineeringen_US


Files in this item

This item appears in the following Collection(s)

Show simple item record