AudioGuard: Omnidirectional Indoor Intrusion Detection Using Audio Device
Article No.: 4, Pages 1 - 22
Abstract
Indoor intrusion detection is a critical task for home security. Previous works in intrusion detection suffer from the problems such as blind spots in non-line-of-sight (NLOS) areas, restricted device locations, massive offline training required, and privacy concern. In this article, we design and implement an omnidirectional indoor intrusion detection system, named AudioGuard, using only a pair of speaker and microphone. AudioGuard is able to detect both line-of-sight (LOS) and NLOS intrusions. Our observation of acoustic signal propagation in an indoor environment shows that there exist abundant multipath reflections and human movement introduces Doppler shift in echo signals. We hence capture periodical Doppler shift caused by intruder's walking motion to detect intrusion. Specifically, we first extract the Doppler shift embedded in echo signals, and we then propose a periodicity polarization method to cancel out the impact of the change of radial angle and the distance on periodicity of Doppler shift. Finally, we detect intrusion by measuring periodicity of Doppler shift over time. Extensive experiments show that AudioGuard achieves a miss report rate of 0% and 1.75% for LOS and NLOS intrusion, respectively, and a false alarm rate of 4.17%.
References
[1]
Young-Keun Choi, Ki-Man Kim, Ji-Won Jung, Seung-Yong Chun, and Kyu-Sik Park. 2005. Acoustic intruder detection system for home security. IEEE Trans. Cons. Electr. 51, 1 (Feb. 2005), 130–138. https://doi.org/10.1109/TCE.2005.1405710
[2]
Yanni Yang, Jiannong Cao, Xiulong Liu, and Xuefeng Liu. 2020. Door-monitor: Counting in-and-out visitors with COTS WiFi devices. IEEE IoT J. 7, 3 (Mar. 2020), 1704–1717. https://doi.org/10.1109/JIOT.2019.2953713
[3]
Yuepeng Li, Jun Yang, Xiaodong Li, and Jing Tian. 2006. Ultrasonic intruder detection system for home security. In Intelligent Control and Automation, Vol. 344. Springer, Berlin. https://doi.org/10.1007/978-3-540-37256-1_143
[4]
Zieger Christian, Alessio Brutti, and Piergiorgio Svaizer. 2009. Acoustic based surveillance system for intrusion detection. In Proceedings of the 6th IEEE International Conference on Advanced Video and Signal Based Surveillance. IEEE, 314–319. https://doi.org/10.1109/AVSS.2009.49
[5]
Yuxiang Lin, Y. Gao, Bingji Li, and Wei Dong. 2020. Revisiting indoor intrusion detection with WiFi Signals: Do not panic over a Pet!. IEEE IoT J. 7, 10 (Oct. 2020), 10437–10449. https://doi.org/10.1109/JIOT.2020.2994101
[6]
Tianben Wang, Daqing Zhang, Leye Wang, Yuanqing Zheng, Tao Gu, Bernadette Dorizzi, and Xingshe Zhou. 2019. Contactless respiration monitoring using ultrasound signal with Off-the-Shelf audio devices. IEEE IoT J. 6, 2 (Apr. 2019), 2959–2973. https://doi.org/10.1109/JIOT.2018.2877607
[7]
G. Milanesi, A. Sarti, and S. Tubaro. 2002. Real-time video analysis for intrusion detection in indoor environments. In Proceedings of the 11th European Signal Processing Conference. IEEE, 1–4.
[8]
Manoranjan Paul, Shah M. E. Haque, and Subrata Chakraborty. 2013. Human detection in surveillance videos and its applications-a review. EURASIP J. Adv. Sign. Process. 176 (Nov. 2013), 1–16. https://doi.org/10.1186/1687-6180-2013-176
[9]
Bo-Wei Chen, Chen-Yu Chen, and Jhing-Fa Wang. 2013. Smart homecare surveillance system: Behavior identification based on state-transition support vector machines and sound directivity pattern analysis. IEEE Trans. Syst. Man Cybernet.: Syst. 43, 6 (Nov. 2013), 1279–1289. https://doi.org/10.1109/TSMC.2013.2244211
[10]
Rashmiranjan Nayak, Mohini Mohan Behera, Umesh Chandra Pati, and Santos Kumar Das. 2019. Video-based Real-time intrusion detection system using deep-learning for smart city applications. In Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS’19). IEEE, 1–6. https://doi.org/10.1109/ANTS47819.2019.9117960
[11]
Ju Han and B. Bhanu. 2005. Human activity recognition in thermal infrared imagery. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) Workshops. IEEE. https://doi.org/10.1109/CVPR.2005.469
[12]
Yun Li, Yong Song, Yufei Zhao, Shangnan Zhao, Xu Li, Lin Li, and Songyuan Tang. 2017. An infrared target detection algorithm based on lateral inhibition and singular value decomposition. Infrared Phys. Technol. 85 (Sep. 2017), 238–245. https://doi.org/10.1016/j.infrared.2017.07.005
[13]
Khirod Chandra Sahoo and Umesh Chandra Pati. 2017. IoT based intrusion detection system using PIR sensor. In Proceedings of the 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT’17). IEEE, 1641–1645. https://doi.org/10.1109/RTEICT.2017.8256877
[14]
Sami Aldalahmeh, Amer Hamdan, Mounir Fhogho, and Des McLernon. 2016. Enhanced-range intrusion detection using pyroelectric infrared sensors. In Proceedings of the Sensor Signal Processing for Defence (SSPD’16). IEEE, 1–5. https://doi.org/10.1109/SSPD.2016.7590597
[15]
Michael Otero. 2005. Application of a continuous wave radar for human gait recognition. In Signal Processing, Sensor Fusion, and Target Recognition XIV 5809, 538–548. https://doi.org/10.1117/12.607176
[16]
Milenko S. Andrić, Boban P. Bondžulić, Dimitrije М. Bujaković, and Srđan T. Mitrović. 2011. Analysis of radar doppler echoes from various ground moving targets. In Proceedings of the International Conference on Aerospace Sciences and Aviation Technology. 1–11. https://doi.org/10.21608/ASAT.2011.23243
[17]
Fioranelli Francesco, Matthew Ritchie, and Hugh Griffiths. 2015. Multistatic human micro-Doppler classification of armed/unarmed personnel. IET Radar Sonar Navig. 9, 7 (Aug. 2015), 857–865. https://doi.org/10.1049/iet-rsn.2014.0360
[18]
Mu Zhou, Yaoping Li, Liangbo Xie, and Wei Nie. 2019. Maximum mean discrepancy minimization based transfer learning for indoor WLAN personnel intrusion detection. IEEE Sens. Lett. 3, 8 (Aug. 2019), 1–4. https://doi.org/10.1109/LSENS.2019.2932099
[19]
Mu Zhou, Yaoping Li, Xiaoge Huang, Qianlin Pu, and Hui Yuan. 2019. Indoor WLAN intrusion detection using intra-class transfer learning with low effort. In Proceedings of the IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC’19). IEEE, Istanbul, Turkey, 1–6. https://doi.org/10.1109/PIMRC.2019.8904445
[20]
Jiguang Lv, Dapeng Man, Wu Yang, Xiaojiang Du, and Miao Yu. 2017. Robust WLAN-based indoor intrusion detection using PHY layer information. IEEE Access 6 (Dec. 2017), 30117–30127, https://doi.org/10.1109/ACCESS.2017.2785444
[21]
Jiguang Lv, Wu Yang, Liangyi Gong, Dapeng Man, and Xiaojiang Du. 2016. Robust WLAN-Based indoor fine-grained intrusion detection. In Proceedings of the IEEE Global Communications Conference (GLOBECOM’16). IEEE, 1–6. https://doi.org/10.1109/GLOCOM.2016.7842238
[22]
Mu Zhou, Yixin Lin, Nan Zhao, Qing Jiang, Xiaolong Yang, and Zengshan Tian. 2020. Indoor WLAN intelligent target intrusion sensing using ray-aided generative adversarial network. IEEE Trans. Emerg. Top. Comput. Intell. 4, 1 (Feb. 2020), 61–73. https://doi.org/10.1109/TETCI.2019.2892748
[23]
Yue Jin, Zengshan Tian, Mu Zhou, Ze Li, and Zhenyuan Zhang. 2018. A whole-home level intrusion detection system using WiFi-enabled IoT. In Proceedings of the 14th International Wireless Communications & Mobile Computing Conference (IWCMC’18). IEEE, 494–499. https://doi.org/10.1109/IWCMC.2018.8450442
[24]
Mohamed Hadi Habaebi, Mahamat Mahamat Ali, M. M. Hassan, M. S. Shoib, A. A. Zahrudin, A. A. Kamarulzaman, W. S. WanAzhan, and Md. RafiqulIslam. 2015. Development of physical intrusion detection system using Wi-Fi/ZigBee RF signals. Proc. Comput. Sci. 76 (2020), 547–552. https://doi.org/10.1016/j.procs.2015.12.342
[25]
Zengshan Tian, Xiangdong Zhou, Mu Zhou, Shuangshuang Li, and Luyan Shao. 2015. Indoor device-free passive localization for intrusion detection using multi-feature PNN. In Proceedings of the 10th International Conference on Communications and Networking in China (ChinaCom’15). IEEE, 272–277. https://doi.org/10.1109/CHINACOM.2015.7497950
[26]
Enjie Ding, Xiansheng Li, Tong Zhao, Lei Zhang, and Yanjun Hu. 2018. A robust passive intrusion detection system with commodity WiFi devices. J. Sens. 2018 (June. 2018), 1--12. https://doi.org/10.1155/2018/8243905
[27]
Chong Han, Qingqing Tan, Lijuan Sun, Hai Zhu, and Jian Guo. 2018. Csi frequency domain fingerprint-based passive indoor human detection. Information 9, 4 (Apr. 2018), 95–108. https://doi.org/10.3390/info9040095
[28]
Dan Wu, Youwei Zeng, Ruiyang Gao, Shengjie Li, Yang Li, Rahul C. Shah, Hong Lu, and Daqing Zhang. 2021. WiTraj: Robust indoor motion tracking with WiFi signals. IEEE Trans. Mobile Comput. (Dec. 2021), 1–1. https://doi.org/10.1109/TMC.2021.3133114
[29]
Zengshan Tian, Yong Li, Mu Zhou, and Ze Li. 2018. WiFi-Based adaptive indoor passive intrusion detection. In Proceedings of the IEEE 23rd International Conference on Digital Signal Processing (DSP’18). IEEE, 1–5. https://doi.org/10.1109/ICDSP.2018.8631613
[30]
Shengjie Li, Xiang Li, Kai Niu, Hao Wang, Yue Zhang, and Daqing Zhang. 2017. Ar-alarm: An adaptive and robust intrusion detection system leveraging csi from commodity wi-fi. International Conference on Smart Homes and Health Telematics. Springer, Cham, 211–223. https://doi.org/10.1007/978-3-319-66188-9_18
[31]
Shengjie Li, Zhaopeng Liu, Yue Zhang, Xiaopeng Niu, Leye Wang, and Daqing Zhang. 2019. A real-time and robust intrusion detection system with commodity wi-fi. In Adjunct Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the ACM International Symposium on Wearable Computers (UbiComp/ISWC’09). 316–319. https://doi.org/10.1145/3341162.3343789
[32]
Shengjie Li, Zhaopeng Liu, Yue Zhang, Qin Lv, Xiaopeng Niu, Leye Wang, and Daqing Zhang. 2020. WiBorder: Precise Wi-Fi based boundary sensing via through-wall discrimination. Proc. ACM Interact. Mobile Wear. Ubiq. Technol. 4, 3 (Sep. 2020), 1–30. https://doi.org/10.1145/3411834
[33]
Omar Sonbul and Alexander N. Kalashnikov. 2013. Low cost ultrasonic wireless distributed security system for intrusion detection. In Proceedings of the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS’13). IEEE, 235–238. https://doi.org/10.1109/IDAACS.2013.6662679
[34]
R. Unni and U. C Pati. 2018. PC based ultrasonic intrusion detection system. In Proceedings of the International Conference on Communication and Signal Processing (ICCSP’18). IEEE, 942–947. https://doi.org/10.1109/ICCSP.2018.8524262
[35]
Thilina Dissanayake, Takuya Maekawa, Daichi Amagata, and Takahiro Hara. 2018. Detecting door events using a smartphone via active sound sensing. Proc. ACM Interact. Mobile Wear. Ubiq. Technol. 2, 4 (Dec. 2018), 1–26. https://doi.org/10.1145/3287038
[37]
Michael Feldman. 2011. Hilbert Transform Applications in Mechanical Vibration: Feldman/Hilbert Transform Applications in Mechanical Vibration. John Wiley & Sons.
[38]
Xingshui Zu, Feng Guo, Jingchang Huang, Qin Zhao, Huawei Liu, Baoqing Li, and Xiaobing Yuan. 2017. Design of an acoustic target intrusion detection system based on small-aperture microphone array. Sensors 17, 3 (Mar. 2017), 514. https://doi.org/10.3390/s17030514
[39]
Chia-How Lin and Kai-Tai Song. 2013. Probability-based location aware design and on-demand robotic intrusion detection system. IEEE Trans. Syst. Man Cybernet.: Syst. 44, 6 (Jun. 2013), 705–715. https://doi.org/10.1109/TSMC.2013.2277691
[40]
Kai Niu, Fusang Zhang, Xuanzhi Wang, Qin Lv, Haitong Luo, and Daqing Zhang. 2021. Understanding WiFi signal frequency features for position-independent gesture sensing. IEEE Trans. Mobile Comput. 21, 11 (Mar. 2021), 4156–4171. https://doi.org/10.1109/TMC.2021.3063135
[41]
Tianben Wang, Daqing Zhang, Leye Wang, Yuanqing Zheng, Tao Gu, Bernadette Dorizzi, and Xingshe Zhou. 2018. Contactless respiration monitoring using ultrasound signal with off-the-shelf audio devices. IEEE IoT J. 6, 2 (Apr. 2018), 2959–2973. https://doi.org/10.1109/JIOT.2018.2877607
Index Terms
- AudioGuard: Omnidirectional Indoor Intrusion Detection Using Audio Device
Recommendations
Network intrusion detection
Intrusion detection is a new, retrofit approach for providing a sense of security in existing computers and data networks, while allowing them to operate in their current "open" mode. The goal of intrusion detection is to identify unauthorized use, ...
Comments
Information & Contributors
Information
Published In
February 2024
181 pages
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].
Publisher
Association for Computing Machinery
New York, NY, United States
Journal Family
Publication History
Published: 16 December 2023
Online AM: 27 September 2023
Accepted: 25 July 2023
Revised: 07 April 2023
Received: 31 October 2022
Published in TIOT Volume 5, Issue 1
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- Key Research and Development Project in Shaanxi Province of China
- Shaanxi Key Industry Innovation Chain Project
- Yangling Livestock Industry Innovation Center Double-chain Fusion Project
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 391Total Downloads
- Downloads (Last 12 months)263
- Downloads (Last 6 weeks)40
Reflects downloads up to 20 Jan 2025
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in