Development of Underground Perimeter Intrusion Detection System
##plugins.themes.bootstrap3.article.main##
Abstract
An underground passive security system based on minimal electric charge detection was developed and implemented in the real application field. The fixed length of the sensor cable is buried underground named a security zone. It is generated an alarm when an intruder goes into the security zone. A shielded telecommunication cable can be used for sensing the generated minimal charges by the external intrusion. If two different types of materials are rubbed with each other, minimal electric charges are generated, called the triboelectric effect. Minimal electric charges are generated between the cable shield and conductors when forces and impacts are applied to the underground buried cable. The control device detects and amplifies generated minimal charges due to the intruders on the sensor cable. The proposed system can be shown a reliable intrusion detection rate of up to 96%-97% when we have kept and considered all installation and environmental conditions.
Download Statistics
Downloads
##plugins.themes.bootstrap3.article.details##
Sensor cable, Alarm, Charge detection, Tribo-electric effect Detection rate
[2] Garcia, L. Mary “The Design and Evaluation of Physical Protection Systems” Woburn, MA: Butterworth-Heinemann, 2001, https://doi.org/10.1016/C2009-0-25612-1 .
[3] Defense Advanced Research Projects Agency (DARPA) and The National Institute of Justice (NIJ) “Perimeter Security Sensor TechnoLogies Handbook” National CriminaI Justice Reference Service (NCJRS), 1998.
[4] IAEA Nuclear Security Series “Handbook on the Design of Physical Protection Systems for Nuclear Material and Nuclear Facilities” International Atomic Agency Vienna, 2021.
[5] Southwest Microwave “Buried cable intrusion detection system”, System Introduction, Jul 2019.
[6] Jeff Bush, Carol A. Davis, Pepe G. Davis, Allen Cekorich, and Fred P. McNair "Buried Fiber Intrusion Detection Sensor with Minimal False Alarm Rates", Proc. SPIE 3860, Fiber Optic Sensor Technology and Applications, Dec 1999, https://doi.org/10.1117/12.372970 .
[7] N. Blaunstein, Z. Dank, and M. Zilbershtein “Prediction of Radiation Pattern of a Buried Leaky Coaxial Cable” Springer, Subsurface Sensing Technologies and Applications, Vol. 1, No. 1, 2000. DOI: 1566-0184/00/0100-0079 .
[8] Suleyman Alpay Aslangula “Detecting Tunnels for Border Security based on Fiber Optical Distributed Acoustic Sensor Data using DBSCAN” 9th International Conference on Sensor Networks March 2020, DOI: 10.5220/0008869600780084 .
[9] Hsin Hsieh, Kai-Shuo Hsu, Tai-Lang Jong, and Likarn Wang “Multi-Zone Fiber-Optic Intrusion Detection System with Active Unbalanced Michelson Interferometer Used for Security of Each Defended Zone” IEEE Sensors Journal, Vol. 20, No. 3, Feb 2020. DOI: 10.1109/JSEN.2019.2946904 .
[10] Qiwen Zeng, Jianfeng Tao, Sajun Guo, Huiliang Ge “Target detection method based on optical fiber fence” Journal of Physics 2019. DOI: 10.1088/1742-6596/1237/2/022149 .
[11] Xiaolei Li, Qizhen Sun, Jianghai Wo, Manliang Zhang and Deming Liu “Hybrid TDM/WDM-based Fiber-Optic Sensor Network for Perimeter Intrusion Detection” Journal of Lightwave Technology, Vol. 30, No. 8, pp.1113-1120, April 2012. DOI: 10.1109/jlt.2011.2170401
[12] Mieczyslaw Szustakowski and Marek Życzkowski “Fiber optic sensors for perimeter security with intruder localization” Congress on Optics and Optoelectronics, Sep 2005, Poland”. DOI: https://doi.org/10.1117/12.622776
[13] Marek Zyczkowski "Intruder localization and identification in fiber optic systems" Conference on Optics and Photonics for Counterterrorism and Crime Fighting IV, Oct 2008. DOI: 10.1117/12.800076 .
[14] Cai Xia Liu, Fang Yi Xie "A Perimeter Intrusion Detection System (PIDS) Based on Sensor Network Applied Mechanics and Materials Vol. 568, No. 570, pp. 468-472, June 2014. https://doi.org/10.4028/www.scientific.net/AMM.568-570.468 .
[15] Yuheng Liu, Chao Li, Yang He, Jing Wu, and Zhang Xiong “A Perimeter Intrusion Detection System using Dual-Mode Wireless Sensor Networks” Second International Conference on Communications and Networking, China, pp.861-865, 2007, DOI: 10.1109/chinacom.2007.4469520 .
[16] Odgerel Ayurzana and Hiesik Kim “Minimal Electric Charge Detection Device for Perimeter Security System” Journal of Electrical Engineering, David Publishing, USA, Volume 5, Number 6, Nov-Dec 2017. DOI: 10.17265/2328-2223/2017.06.005 .
[17] Hiesik Kim and Odgerel Ayurzana “Reducing False Alarms Caused by Wind Effect in Automatic Security Perimeter System” ESCS-2016, Las Vegas, USA, Jul 25 – 28, 2016. ISBN: 1-60132-433-2, CSREA Press ©.
[18] Devashish Lohani, Carlos Crispim-Junior, Quentin Barthélemy, Sarah Bertrand, Lionel Robinault and Laure Tougne Rodet “Perimeter Intrusion Detection by Video Surveillance: A Survey” MDPI, Sensors May 2022. DOI: https://doi.org/10.3390/s22093601 .
[19] Zhang Y.L, Zhang Z.Q, Xiao G, Wang R.D, He X “Perimeter intrusion detection based on intelligent video analysis” IEEE Conference ICCAS-2015, Busan, Korea, 13–16 Oct 2015. DOI: 10.1109/ICCAS.2015.7364811 .
[20] Vijverberg J.A, Janssen R.T, Zwart R, With P.H “Perimeter-intrusion event classification for on-line detection using multiple instance learning solving temporal ambiguities” IEEE Conference ICIP-2014, Paris, France, 27–30 Oct 2014. DOI: 10.1109/ICIP.2014.7025487 .
The license term for an open-access journal refers to the duration and conditions under which the published content is made available to the public. Open-access journals often use licenses that permit broad use and distribution of the content. A commonly used license for open-access content is a Creative Commons license.
ICTFocus journal has Open Access to articles published under a license by CC BY (Attribution). This license allows others to copy, distribute, display, and perform the work and derivative works based upon it, but only if they give the author or licensor the credits in the manner specified by these.
The license term is typically indefinite, allowing for the ongoing availability of the content to the public. However, the specific license terms and duration can vary depending on the journal's policies and the type of Creative Commons license used. Always refer to the specific license terms provided by the open-access journal to understand how the content can be used.