Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Invasion detection method based on channel state information and support vector machine

A channel state information, support vector machine technology, applied in computer parts, character and pattern recognition, transmission monitoring and other directions, can solve problems such as coarse-grained and volatile unsuitable for accurate perception, poor intrusion detection accuracy, etc.

Inactive Publication Date: 2017-12-15
UNIV OF ELECTRONIC SCI & TECH OF CHINA
View PDF3 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

RSSI is currently the most widely used energy characteristic, but its coarse-grainedness and variability are not suitable for accurate perception in multipath indoor environments, and the accuracy of intrusion detection is very poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Invasion detection method based on channel state information and support vector machine
  • Invasion detection method based on channel state information and support vector machine
  • Invasion detection method based on channel state information and support vector machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] Specific embodiments of the present invention will be described below in conjunction with the accompanying drawings, so that those skilled in the art can better understand the present invention. It should be noted that in the following description, the introduction of known functions and designs related to the present invention may be downplayed and omitted.

[0015] In this embodiment, the intrusion detection and identification method of the present invention mainly includes the following links: data collection, data preprocessing, data feature extraction, intrusion detection and identification, and the process is as follows: figure 1 As shown, the specific implementation steps are as follows:

[0016] Step 1: Environmental deployment, Wi-Fi-based intrusion detection and identification requires indoor coverage of Wi-Fi signals. The layout of the experimental scene is 6 meters long and 7 meters wide. The system selects the 5G frequency band with less signal interference...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an invasion detection method based on channel state information and a support vector machine. No special hardware facility is needed, an existing wireless network is fully used, and a common business router is used to realize security monitoring function. The coverage scope is wide, and privacy exposure can be prevented. The invasion detection method includes the steps of after obtaining CSI original data, conducting clustering and de noising for the subcarrier data in a channel by using a density-based clustering algorithm DBSCAN, smoothing the denoised data by using weight-based sliding average algorithm, and extracting characteristic values for data by using major constituent analyzing algorithm after data pre-processing. Data subjected to pretreatment and feature extraction can more accurately reflect the main change of signals and greatly reduce number of dimensions. The invasion detection precision is improved and the calculating complexity is reduced. The method uses an SVM classification algorithm to obtain a statistics model of non-linear dependence relation between an invasion state and a signal fingerprint, thereby achieving the purpose of invasion detection.

Description

technical field [0001] The invention relates to the field of indoor intrusion detection, in particular to an identification method for intrusion detection based on channel state information and using support vector machine technology. Background technique [0002] Wi-Fi-based wireless local area networks are widely deployed indoors, providing intrusion detection services as well as data transmission services. When protecting some property or monitoring important areas, people often use some vision-based devices, such as cameras, or infrared-based sensors. Although these devices work well in certain specific environments, there are often many limitations. A fatal shortcoming of vision-based devices is that the monitoring must be within the range of a straight line of sight. Once there is an occluder, the device cannot effectively guarantee normal security, and vision-based devices are easy to expose private content. Some sensitive areas cannot be deployed. Although infrare...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/62H04B17/345
CPCH04B17/345G06F18/2411
Inventor 周瑞鲁翔陈结松
Owner UNIV OF ELECTRONIC SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products