Intrusion Detection through Leaky Wave Cable in Conjunction with Channel State Information

Syed Ikram Shah, Syed Yaseen Shah, Syed Shah

Research output: Chapter in Book/Report/Conference proceedingConference proceedingpeer-review

10 Citations (Scopus)

Abstract

This paper presents design and implementation of a low-cost system solution. A light-weight wireless device is used for surveillance of suspicious activities at highly sensitive areas. The devices such as transceivers operating at 2.4 GHz are deployed in indoor settings. Finer-grained Channel State Information in conjunction with pair of leaky wave cable detects any intruder in the area. The intrusion detection is identified at a particular subcarrier frequency. The processing of the measured data over time is analyzed and used for reporting the disturbances. Deploying leaky wave cable as transmitter and receiver has benefits in terms of wider coverage area, covering blind and semi blind zones. The system fully exploits the amplitude and phase information of Channel State Information provided by Intel 5300 NIC and its associated driver. The experimental results demonstrate greater level of accuracy in a cluttered environment.
Original languageEnglish
Title of host publication2019 UK/China Emerging Technologies (UCET)
PublisherIEEE
Pages1-4
Number of pages4
ISBN (Electronic)978-1-7281-2797-2
DOIs
Publication statusPublished - 24 Oct 2019
Externally publishedYes
Event4th International Conference on UK - China Emerging Technologies 2019 - Glasgow, United Kingdom
Duration: 21 Aug 201922 Aug 2019
https://www.gla.ac.uk/media/Media_646489_smxx.pdf

Conference

Conference4th International Conference on UK - China Emerging Technologies 2019
Abbreviated titleUCET
Country/TerritoryUnited Kingdom
CityGlasgow
Period21/08/1922/08/19
Internet address

Keywords

  • Channel state information (CSI)
  • leaky wave cable (LWC)
  • access point (AP)
  • wireless sensor networks (WSNS)

Fingerprint

Dive into the research topics of 'Intrusion Detection through Leaky Wave Cable in Conjunction with Channel State Information'. Together they form a unique fingerprint.

Cite this