CN105512994A - Fault-tolerant perimeter intruder detection method - Google Patents

Fault-tolerant perimeter intruder detection method Download PDF

Info

Publication number
CN105512994A
CN105512994A CN201610005679.2A CN201610005679A CN105512994A CN 105512994 A CN105512994 A CN 105512994A CN 201610005679 A CN201610005679 A CN 201610005679A CN 105512994 A CN105512994 A CN 105512994A
Authority
CN
China
Prior art keywords
detector
belief
degree
detection
fault
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610005679.2A
Other languages
Chinese (zh)
Other versions
CN105512994B (en
Inventor
贺诗波
崔现斌
史治国
陈积明
孙优贤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University ZJU
Original Assignee
Zhejiang University ZJU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University ZJU filed Critical Zhejiang University ZJU
Priority to CN201610005679.2A priority Critical patent/CN105512994B/en
Publication of CN105512994A publication Critical patent/CN105512994A/en
Application granted granted Critical
Publication of CN105512994B publication Critical patent/CN105512994B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms

Abstract

The invention discloses a fault-tolerant perimeter intruder detection method, including three links: detector inner fault tolerance, fault tolerance between detectors, and trust management and fault detector determination. In a first link, the detection output of a detector is obtained; in a second link, the alarm output of the detector is obtained; and in a third link, the credibility of the detector is dynamically adjusted according to results of the first and second links. The method can reduce false alarm and false dismissal in a perimeter intruder detection system caused by ambient noises and detector faults, and find faulted detectors, thereby allowing the system to work normally when a plurality of detectors break down, and substantially improving the fault-tolerant capability and reliability of the perimeter intruder detection system. The method can directly update hardware based on an original perimeter intruder detection system, and possess low enforcement costs. The method can be applied to borderlines, the surrounding of an airport, the surrounding of an electric power facility, coastlines, etc., and reduce dependence on artificial maintenance.

Description

A kind of fault tolerant perimeter intrusion detecting method
Technical field
The invention belongs to technical field of security and protection, particularly relate to a kind of fault tolerant perimeter intrusion detecting method.
Background technology
Perimeter intrusion detecting system, as the important component part of safety-protection system, is the important defence line together assured the safety for life and property of the people.The invasion result detected when personnel enter investigative range, can be transferred to the control center of system, notify staff, and can cause alarm in this locality by perimeter intrusion detecting system in time.Well deterrence and interception are served to intrusion behavior.
While perimeter intrusion detecting system obtains more and more widespread use, its performance also more and more receives publicity.The performance of perimeter intrusion detecting system is primarily of alert rate (false positive mistake) and false dismissed rate (False negative error) are weighed by mistake.Alert rate characterizes detection system when not invading generation and sends the probability of warning by mistake; False dismissed rate characterizes the probability that when invasion occurs, detection system is not reported to the police.This two indices directly affects the fastness in this security of the lives and property defence line, road, and reducing false dismissal, by mistake police is the important goal that perimeter intrusion detecting system is improved.
Summary of the invention
The object of the invention is to for the deficiencies in the prior art, a kind of fault tolerant perimeter intrusion detecting method is provided.
The object of the invention is to be achieved through the following technical solutions: a kind of fault tolerant perimeter intrusion detecting method, the method comprises the following steps:
(1) fault-tolerant in detector: by the result of detection weighted sum in this detector a period of time, to obtain converging the long and, and the detection as detector after this result binaryzation is exported;
(2) fault-tolerant between detector: to infer by the result of detection Nearest Neighbor with Weighted Voting of adjacent detector current time the position that invader is current, and inferred the position in invader's upper moment on this basis.The position in invader by inference upper moment, is weighted ballot to moment result of detection on adjacent detector again.After the result summation of twice Nearest Neighbor with Weighted Voting, through binaryzation, the warning as detector exports.Described weights are relevant with the degree of belief of detector.
(3) trust management and fault detector judge: the warning of the detector that the detection output of the detector obtained according to step 1 and step 2 obtain exports, the degree of belief of dynamic conditioning detector, when the detection output of detector and the warning Output rusults of detector consistent time, increase the degree of belief of detector; When the detection output of detector and the warning Output rusults of detector inconsistent time, reduce the degree of belief of detector; When the degree of belief of detector is lower than degree of belief threshold value, judge this breakdown detector.
Further, described step (1) is specific as follows:
Note detector i is c at the result of detection of moment t it (), detector weighting on the basis of present detection results gathers the result of detection in L moment in the past, obtains summarized results that is:
c i ( t ) ‾ = Σ l = 0 L α ( t - l × T 0 ) c i ( t - l × T 0 )
Wherein t 0for the work period of detector.
Detection is used to export threshold value Th dby summarized results binaryzation, obtains a boolean results, and the detection as detector exports O i(t), that is:
O i ( t ) = 1 , c i ( t ) &OverBar; &GreaterEqual; Th D 0 , c i ( t ) &OverBar; < Th D
Wherein 1 represents that detector detection exports as reporting to the police, and 0 represents that detector detection exports as mourning in silence.
Further, described step (2) is specific as follows:
If have 1 P can be detected by k detector, and the probability that each detector detects this point is all more than or equal to δ, then this P is detected device network (k, δ) and re-covers lid.In like manner, also claim detector network to meet (k, δ) at P point and re-cover lid.If any point in the Ω of region all meets (k, δ) re-cover lid, then claim region Ω to meet (k, δ) and re-cover lid.
If there is identical (k, δ) heavy overlay area, then these two detectors neighbours' detector each other in two detectors.The set of neighbours' detector of detector i is defined as N i.
(k, δ) being re-covered lid Region dividing is subregion S set R={SR 1, SR 2..., every sub regions is all covered by identical detector set.The detector set covering identical subregion SR with the detection probability being more than or equal to δ is designated as remember that having (k, the δ) overlapped to weigh overlay area with the search coverage of detector i is V i.For meeting subregion, neighbours' detector set of calculating detector i voting results O i, spa(SR):
Wherein r j(t-T 0) for detector j is at (t-T 0) trust weight in moment;
If invader appears in certain sub regions in t, then multiple detectors that invader may be capped this subregion detect simultaneously, and the Nearest Neighbor with Weighted Voting result of this subregion is the maximal value in neighbouring subregion.Namely invader should at maximum O i, spa(SR) subregion corresponding to, is designated as subregion
If the set of the subregion that invader may be in the upper moment is suppose that the maximal rate of invader is v max, then calculate by following formula:
Wherein | S R - SR i , s p a * | = min P 1 &Element; S R . P 2 &Element; SR i , s p a * | P 1 - P 2 | .
For meeting subregion, neighbours' detector set of calculating detector i the voting results O in a upper moment i, tem(SR):
Then in a upper moment, the position that invader may locate should be O of upper moment i, tem(SR) obtain the subregion of maximal value, be designated as
Final summarized results as follows:
O i ( t ) &OverBar; = O i ( t ) + O i , s p a ( SR i , s p a * ) + O i , t e m ( SR i , t e m * )
Adopt threshold determination pair carry out binaryzation, note decision threshold is AlarmTh, and the warning of note detector exports as A i(t), then whether detector is reported to the police and can be determined by following formula:
A i ( t ) = 1 , O i ( t ) &OverBar; &GreaterEqual; A l a r m T h 0 , O i ( t ) &OverBar; < A l a r m T h
Wherein, A it ()=1 represents that detector i reports to the police, refer to detect invader; A it ()=0 represents that detector i mourns in silence, refer to not find invader.
When detector i sends alerting signal to control center, if there is A jt ()=1 meets then the output of this detector is judged to be represent that this detector is correctly reported to the police; Otherwise the output of this detector is judged to be report to the police with representing this detector error.
When detector i sends silent signal to control center, if there is A jt ()=1 meets then the output of this detector is judged to be mourn in silence with representing this detector error; Otherwise the output of this detector is judged to be represent that this detector is correctly mourned in silence.
Control center accepts the detection information that on circumference, numerous detector returns simultaneously, if fault-tolerant between fault-tolerant and detector in detector, has detector A (t)=1, then system provides a place and reports to the police; If there is multiple detector to meet A (t)=1, then system provides many places warning.
Further, described step (3) is specific as follows:
Keep the misdeed of mourning in silence to be called SilentFault behavior when detector should be sent warning, the behavior sending warning when this being mourned in silence is called AlarmFault behavior.
Note is α (α >0) to the penalty value of SilentFault behavior, when namely each SilentFault behavior occurs, the degree of belief of this detector deducts α.So, when during generation, α/P (A should be deducted in the degree of belief of this detector i(t)=1), this value is designated as α s.In like manner, when during generation, the degree of belief of this detector deducts α/P (A i(t)=0), be denoted as α a.That is:
α s=α/P(A i(t)=1)
α a=α/P(A i(t)=0)
Correctly export behavior for detector, each degree of belief of this detector of giving increases β (β >0).When during generation, the degree of belief of detector increases β/P (A i(t)=1), be denoted as β a; When during generation, the degree of belief of this detector increases β/P (A i(t)=0), be denoted as β s.That is:
β a=β/P(A i(t)=1)
β s=β/P(A i(t)=0)
The average general P (R of invasion is there is by detector search coverage in detector working environment i(t)=1) estimate P (A i(t)=1).
Detector i is defined as tr in the degree of belief of moment t i(t).At each work period T 0, according to the degree of belief of the output result of determination adjustment detector of detector.
tr i ( t ) = t r i ( t - T 0 ) - &alpha; a , i f I i a ( t ) = 0 t r i ( t - T 0 ) - &alpha; s , i f I i s ( t ) = 0 t r i ( t - T 0 ) + &beta; a , i f I i a ( t ) = 1 t r i ( t - T 0 ) + &beta; s , i f I i s ( t ) = 1
The detector degree of belief value upper limit is made to be TR 0, represent that this detector is reliable; Lower limit is 0, represents this breakdown detector.That is:
tr i ( t ) = T R 0 , i f t r i ( t ) > T R 0 0 , i f tr i ( t ) < 0 t r i ( t ) , e l s e
If detector i is at the degree of belief tr of moment t it () is lower than failure determination threshold TR th, then think that detector i is judged as fault detector at moment t, be designated as m i(t)=1; If detector i is normal in t, be then designated as m i(t)=0.That is:
m i ( t ) = 1 , i f t r i ( t ) < T R t h 0 , o t h e r s
By detector degree of belief tr ithe ballot weight of t this detector that () determines fault-tolerant link between detector, is called trust weight r i(t).Trust weight is provided by following formula:
r i ( t ) = tr i ( t ) TR 0 , i f m i ( t ) = 0 0 , i f m i ( t ) = 1
The invention has the beneficial effects as follows: the inventive method can reduce the mistake police and false dismissal that are caused by neighbourhood noise, breakdown detector in perimeter intrusion detecting system, and can fault detector be found out, system still normally can be run when numerous detector breaks down, greatly improve perimeter intrusion detecting system survivability and reliability.The inventive method can directly based on original perimeter intrusion detecting system hardware upgrading, and implementation cost is low.The inventive method can be applicable to the places such as boundary line, airport periphery, electric power facility periphery, shore line, reduces the dependence to manual maintenance.
Accompanying drawing explanation
Fig. 1 is fault tolerant perimeter intrusion detecting method flow diagram of the present invention;
Fig. 2 is (3, δ) heavy overlay area subregion schematic diagram;
Fig. 3 is invader's two adjacent moment position views.
Embodiment
Below in conjunction with the drawings and specific embodiments, the present invention is described in further detail.
As shown in Figure 1, a kind of fault tolerant perimeter intrusion detecting method provided by the invention, the method comprising the steps of:
(1) fault-tolerant in detector: by the result of detection weighted sum in this detector a period of time, to obtain converging the long and, and the detection as detector after this result binaryzation is exported; Be specially:
Note detector i is c at the result of detection of moment t it (), detector weighting on the basis of present detection results gathers the result of detection in L moment in the past, obtains summarized results that is:
c i ( t ) &OverBar; = &Sigma; l = 0 L &alpha; ( t - l &times; T 0 ) c i ( t - l &times; T 0 )
Wherein t 0for the work period of detector.
Through converging the long and be a serial number, the final detection of detector exports the Boolean that should be and characterize with or without invasion, uses detection to export threshold value Th dby summarized results binaryzation, obtains a boolean results, and the detection as detector exports O i(t), that is:
O i ( t ) = 1 , c i ( t ) &OverBar; &GreaterEqual; Th D 0 , c i ( t ) &OverBar; < Th D
Wherein 1 represents that detector detection exports as reporting to the police, and 0 represents that detector detection exports as mourning in silence.
(2) fault-tolerant between detector: to infer by the result of detection Nearest Neighbor with Weighted Voting of adjacent detector current time the position that invader is current, and inferred the position in invader's upper moment on this basis.The position in invader by inference upper moment, is weighted ballot to moment result of detection on adjacent detector again.After the result summation of twice Nearest Neighbor with Weighted Voting, through binaryzation, the warning as detector exports.Described weights are relevant with the degree of belief of detector.Be specially:
If have 1 P can be detected by k detector, and the probability that each detector detects this point is all more than or equal to δ, then this P is detected device network (k, δ) and re-covers lid.In like manner, also claim detector network to meet (k, δ) at P point and re-cover lid.If any point in the Ω of region all meets (k, δ) re-cover lid, then claim region Ω to meet (k, δ) and re-cover lid.
If there is identical (k, δ) heavy overlay area, then these two detectors neighbours' detector each other in two detectors.The set of neighbours' detector of detector i is defined as N i.
(k, δ) being re-covered lid Region dividing is subregion S set R={SR 1, SR 2..., every sub regions is all covered by identical detector set.The detector set covering identical subregion SR with the detection probability being more than or equal to δ is designated as it is a sub regions of (3, δ) heavy overlay area in each dashed polygon frame in Fig. 2.
Remember that having (k, the δ) overlapped to weigh overlay area with the search coverage of detector i is V i.For meeting subregion, neighbours' detector set of calculating detector i voting results O i, spa(SR):
Wherein r j(t-T 0) for detector j is at (t-T 0) trust weight in moment;
If invader appears in certain sub regions in t, then multiple detectors that invader may be capped this subregion detect simultaneously, and the Nearest Neighbor with Weighted Voting result of this subregion is the maximal value in neighbouring subregion.Namely invader should at maximum O i, spa(SR) subregion corresponding to, is designated as subregion
If the set of the subregion that invader may be in the upper moment is suppose that the maximal rate of invader is v max, then calculate by following formula:
Wherein as shown in Figure 3, if invader is in little dotted line frame region in the moment, then go up the position of invader at quarter in a period of time in large dotted line frame region.
Next, calculate the result after the temporal correlation considering detector i, for meeting subregion, neighbours' detector set of calculating detector i the voting results O in a upper moment i, tem(SR):
Then in a upper moment, the position that invader may locate should be O of upper moment i, tem(SR) obtain the subregion of maximal value, be designated as
The result of temporal correlation and spatial coherence is gathered with the result of detection of self, obtains final summarized results
O i ( t ) &OverBar; = O i ( t ) + O i , s p a ( SR i , s p a * ) + O i , t e m ( SR i , t e m * )
It is the Boolean whether a sign reports to the police equally that the warning of detector exports, and the same mode of threshold determination that adopts carries out binaryzation.Namely decision threshold is AlarmTh, and the warning of note detector exports as A i(t), then whether detector is reported to the police and can be determined by following formula:
A i ( t ) = 1 , O i ( t ) &OverBar; &GreaterEqual; A l a r m T h 0 , O i ( t ) &OverBar; < A l a r m T h
Wherein, A it ()=1 represents that detector i reports to the police, refer to detect invader; A it ()=0 represents that detector i mourns in silence, refer to not find invader.
A it () is using correcting errors of exporting as each detector detection of criterion.
When detector i sends alerting signal to control center, if there is A jt ()=1 meets then the output of this detector is judged to be represent that this detector is correctly reported to the police; Otherwise the output of this detector is judged to be report to the police with representing this detector error.
When detector i sends silent signal to control center, if there is A jt ()=1 meets then the output of this detector is judged to be mourn in silence with representing this detector error; Otherwise the output of this detector is judged to be represent that this detector is correctly mourned in silence.
Control center accepts the detection information that on circumference, numerous detector returns simultaneously, if fault-tolerant between fault-tolerant and detector in detector, has detector A (t)=1, then system provides a place and reports to the police; If there is multiple detector to meet A (t)=1, then system provides many places warning.Therefore this system may be used for the many places invasion in detection perimeter and can not omit, instead of can only detect place invasion.
(3) trust management and fault detector judge: the warning of the detector that the detection output of the detector obtained according to step 1 and step 2 obtain exports, the degree of belief of dynamic conditioning detector, when the detection output of detector and the warning Output rusults of detector consistent time, increase the degree of belief of detector; When the detection output of detector and the warning Output rusults of detector inconsistent time, reduce the degree of belief of detector; When the degree of belief of detector is lower than degree of belief threshold value, judge this breakdown detector.Be specially:
Keep the misdeed of mourning in silence to be called SilentFault behavior when detector should be sent warning, the behavior sending warning when this being mourned in silence is called AlarmFault behavior.
SilentFault behavior and AlarmFault behavior should catch hell.Note is α (α >0) to the penalty value of SilentFault behavior, when namely each SilentFault behavior occurs, the degree of belief of this detector deducts α.So, when during generation, α/P (A should be deducted in the degree of belief of this detector i(t)=1), this value is designated as α s.In like manner, when during generation, the degree of belief of this detector deducts α/P (A i(t)=0), be denoted as α a.That is:
α s=α/P(A i(t)=1)
α a=α/P(A i(t)=0)
Same, correctly export behavior for detector, each degree of belief of this detector of giving increases β (β >0).When during generation, the degree of belief of detector increases β/P (A i(t)=1), be denoted as β a; When during generation, the degree of belief of this detector increases β/P (A i(t)=0), be denoted as β s.That is:
β a=β/P(A i(t)=1)
β s=β/P(A i(t)=0)
More than process relates to P (A i(t)=1), but it is not known, and the average general P (R of invasion can be occurred by detector search coverage in detector working environment i(t)=1) estimate it, namely think P (A i(t)=1)=P (R i(t)=1).
Detector i is defined as tr in the degree of belief of moment t i(t).At each work period T 0, according to the degree of belief of the output result of determination adjustment detector of detector.
tr i ( t ) = t r i ( t - T 0 ) - &alpha; a , i f I i a ( t ) = 0 t r i ( t - T 0 ) - &alpha; s , i f I i s ( t ) = 0 t r i ( t - T 0 ) + &beta; a , i f I i a ( t ) = 1 t r i ( t - T 0 ) + &beta; s , i f I i s ( t ) = 1
If do not limited the scope of the degree of belief of detector, then after a period of operation, degree of belief value may become very high to normal detector.Thus, when this detector breaks down, need just to make the degree of belief of this detector reduce for a long time, be unfavorable for this fault detector of Timeliness coverage.Therefore, need detector degree of belief value capping.In like manner, we are also its setting lower limit.The detector degree of belief value upper limit is made to be TR 0, represent that this detector is reliable; Lower limit is 0, represents this breakdown detector.That is:
tr i ( t ) = TR 0 , i f t i ( t ) > TR 0 0 , i f tr i ( t ) < 0 tr i ( t ) , e l s e
No matter there is the fault of which kind of type in detector, and all can cause the decline of its degree of belief because of its SilentFault behavior or AlarmFault behavior, therefore, all faults all can be embodied by degree of belief.If detector i is at the degree of belief tr of moment t it () is lower than failure determination threshold TR th, then think that detector i is judged as fault detector at moment t, be designated as m i(t)=1; If detector i is normal in t, be then designated as m i(t)=0.That is:
m i ( t ) = 1 , i f t r i ( t ) < T R t h 0 , o t h e r s
The detector with higher degree of belief is more reliable, and therefore the ballot weight of each detector fault-tolerant link between detector can be embodied by the degree of belief of this detector.
By detector degree of belief tr ithe ballot weight of t this detector that () determines fault-tolerant link between detector, is called trust weight r i(t).Between detector in fault-tolerant link, fault detector does not participate in voting (trust weight is 0).Only have when detector is normal, this detector just can participate in ballot.Trust weight is provided by following formula:
r i ( t ) = tr i ( t ) TR 0 , i f m i ( t ) = 0 0 , i f m i ( t ) = 1

Claims (4)

1. a fault tolerant perimeter intrusion detecting method, is characterized in that, the method comprises the following steps:
(1) fault-tolerant in detector: by the result of detection weighted sum in this detector a period of time, to obtain converging the long and, and the detection as detector after this result binaryzation is exported;
(2) fault-tolerant between detector: to infer by the result of detection Nearest Neighbor with Weighted Voting of adjacent detector current time the position that invader is current, and inferred the position in invader's upper moment on this basis.The position in invader by inference upper moment, is weighted ballot to moment result of detection on adjacent detector again.After the result summation of twice Nearest Neighbor with Weighted Voting, through binaryzation, the warning as detector exports.Described weights are relevant with the degree of belief of detector;
(3) trust management and fault detector judge: the warning of the detector that the detection output of the detector obtained according to step 1 and step 2 obtain exports, the degree of belief of dynamic conditioning detector, when the detection output of detector and the warning Output rusults of detector consistent time, increase the degree of belief of detector; When the detection output of detector and the warning Output rusults of detector inconsistent time, reduce the degree of belief of detector; When the degree of belief of detector is lower than degree of belief threshold value, judge this breakdown detector.
2. a kind of fault tolerant perimeter intrusion detecting method according to claim 1, it is characterized in that, described step (1) is specific as follows:
Note detector i is c at the result of detection of moment t it (), detector weighting on the basis of present detection results gathers the result of detection in L moment in the past, obtains summarized results that is:
c i ( t ) &OverBar; = &Sigma; l = 0 L &alpha; ( t - l &times; T 0 ) c i ( t - l &times; T 0 )
Wherein t 0for the work period of detector.
Detection is used to export threshold value Th dby summarized results binaryzation, obtains a boolean results, and the detection as detector exports O i(t), that is:
O i ( t ) = 1 , c i ( t ) &OverBar; &GreaterEqual; T h D 0 , c i ( t ) &OverBar; < Th D
Wherein 1 represents that detector detection exports as reporting to the police, and 0 represents that detector detection exports as mourning in silence.
3. a kind of fault tolerant perimeter intrusion detecting method according to claim 1, it is characterized in that, described step (2) is specific as follows:
If have 1 P can be detected by k detector, and the probability that each detector detects this point is all more than or equal to δ, then this P is detected device network (k, δ) and re-covers lid.In like manner, also claim detector network to meet (k, δ) at P point and re-cover lid.If any point in the Ω of region all meets (k, δ) re-cover lid, then claim region Ω to meet (k, δ) and re-cover lid.
If there is identical (k, δ) heavy overlay area, then these two detectors neighbours' detector each other in two detectors.The set of neighbours' detector of detector i is defined as N i.
(k, δ) being re-covered lid Region dividing is subregion S set R={SR 1, SR 2..., every sub regions is all covered by identical detector set.The detector set covering identical subregion SR with the detection probability being more than or equal to δ is designated as remember that having (k, the δ) overlapped to weigh overlay area with the search coverage of detector i is V i.For meeting subregion, neighbours' detector set of calculating detector i voting results O i, spa(SR):
Wherein r j(t-T 0) for detector j is at (t-T 0) trust weight in moment;
If invader appears in certain sub regions in t, then multiple detectors that invader may be capped this subregion detect simultaneously, and the Nearest Neighbor with Weighted Voting result of this subregion is the maximal value in neighbouring subregion.Namely invader should at maximum O i, spa(SR) subregion corresponding to, is designated as subregion
If the set of the subregion that invader may be in the upper moment is suppose that the maximal rate of invader is v max, then calculate by following formula:
Wherein | S R - SR i , s p a * | = min P 1 &Element; S R , P 2 &Element; SR i , s p a * | P 1 - P 2 | .
For meeting subregion, neighbours' detector set of calculating detector i the voting results O in a upper moment i, tem(SR):
Then in a upper moment, the position that invader may locate should be O of upper moment i, tem(SR) obtain the subregion of maximal value, be designated as
Final summarized results as follows:
O i ( t ) &OverBar; = O i ( t ) + O i , s p a ( SR i , s p a * ) + O i , t e m ( SR i , t e m * )
Adopt threshold determination pair carry out binaryzation, note decision threshold is AlarmTh, and the warning of note detector exports as A i(t), then whether detector is reported to the police and can be determined by following formula:
A i ( t ) = 1 , O i ( t ) &OverBar; &GreaterEqual; A l a r m T h 0 , O i ( t ) &OverBar; < A l a r m T h
Wherein, A it ()=1 represents that detector i reports to the police, refer to detect invader; A it ()=0 represents that detector i mourns in silence, refer to not find invader.
When detector i sends alerting signal to control center, if there is A jt ()=1 meets then the output of this detector is judged to be represent that this detector is correctly reported to the police; Otherwise the output of this detector is judged to be report to the police with representing this detector error.
When detector i sends silent signal to control center, if there is A jt ()=1 meets then the output of this detector is judged to be mourn in silence with representing this detector error; Otherwise the output of this detector is judged to be represent that this detector is correctly mourned in silence.
Control center accepts the detection information that on circumference, numerous detector returns simultaneously, if fault-tolerant between fault-tolerant and detector in detector, has detector A (t)=1, then system provides a place and reports to the police; If there is multiple detector to meet A (t)=1, then system provides many places warning.
4. a kind of fault tolerant perimeter intrusion detecting method according to claim 1, it is characterized in that, described step (3) is specific as follows:
Keep the misdeed of mourning in silence to be called SilentFault behavior when detector should be sent warning, the behavior sending warning when this being mourned in silence is called AlarmFault behavior.
Note is α (α >0) to the penalty value of SilentFault behavior, when namely each SilentFault behavior occurs, the degree of belief of this detector deducts α.So, when during generation, α/P (A should be deducted in the degree of belief of this detector i(t)=1), this value is designated as α s.In like manner, when during generation, the degree of belief of this detector deducts α/P (A i(t)=0), be denoted as α a.That is:
α s=α/P(A i(t)=1)
α a=α/P(A i(t)=0)
Correctly export behavior for detector, each degree of belief of this detector of giving increases β (β >0).When during generation, the degree of belief of detector increases β/P (A i(t)=1), be denoted as β a; When during generation, the degree of belief of this detector increases β/P (A i(t)=0), be denoted as β s.That is:
β a=β/P(A i(t)=1)
β s=β/P(A i(t)=0)
The average general P (R of invasion is there is by detector search coverage in detector working environment i(t)=1) estimate P (A i(t)=1).
Detector i is defined as tr in the degree of belief of moment t i(t).At each work period T 0, according to the degree of belief of the output result of determination adjustment detector of detector.
tr i ( t ) = tr i ( t - T 0 ) - &alpha; a , i f I i a ( t ) = 0 tr i ( t - T 0 ) - &alpha; s , i f I i s ( t ) = 0 tr i ( t - T 0 ) + &beta; a , i f I i a ( t ) = 1 tr i ( t - T 0 ) + &beta; s , i f I i s ( t ) = 1
The detector degree of belief value upper limit is made to be TR 0, represent that this detector is reliable; Lower limit is 0, represents this breakdown detector.That is:
tr i ( t ) = T R 0 , i f t r i ( t ) > T R 0 0 , i f tr i ( t ) < 0 t r i ( t ) , e l s e
If detector i is at the degree of belief tr of moment t it () is lower than failure determination threshold TR th, then think that detector i is judged as fault detector at moment t, be designated as m i(t)=1; If detector i is normal in t, be then designated as m i(t)=0.That is:
m i ( t ) = 1 , i f t r i ( t ) < T R t h 0 , o t h e r s
By detector degree of belief tr ithe ballot weight of t this detector that () determines fault-tolerant link between detector, is called trust weight r i(t).Trust weight is provided by following formula:
r i ( t ) = tr i ( t ) TR 0 , i f m i ( t ) = 0 0 , i f m i ( t ) = 1 .
CN201610005679.2A 2016-01-04 2016-01-04 A kind of fault tolerant perimeter intrusion detecting method Active CN105512994B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610005679.2A CN105512994B (en) 2016-01-04 2016-01-04 A kind of fault tolerant perimeter intrusion detecting method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610005679.2A CN105512994B (en) 2016-01-04 2016-01-04 A kind of fault tolerant perimeter intrusion detecting method

Publications (2)

Publication Number Publication Date
CN105512994A true CN105512994A (en) 2016-04-20
CN105512994B CN105512994B (en) 2019-10-25

Family

ID=55720952

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610005679.2A Active CN105512994B (en) 2016-01-04 2016-01-04 A kind of fault tolerant perimeter intrusion detecting method

Country Status (1)

Country Link
CN (1) CN105512994B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109858632A (en) * 2019-02-15 2019-06-07 网宿科技股份有限公司 A kind of method and device of threshold value

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101860866A (en) * 2010-05-25 2010-10-13 电子科技大学 Intrusion detection and positioning method of non-uniform sensitivity nodes of anti-intrusion system sensing network
CN103605951A (en) * 2013-09-11 2014-02-26 中科润程(北京)物联科技有限责任公司 Novel behavior characteristic identification algorithm for vibration intrusion detection
US20140266683A1 (en) * 2013-03-13 2014-09-18 Honeywell International Inc. System and method of anomaly detection

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101860866A (en) * 2010-05-25 2010-10-13 电子科技大学 Intrusion detection and positioning method of non-uniform sensitivity nodes of anti-intrusion system sensing network
US20140266683A1 (en) * 2013-03-13 2014-09-18 Honeywell International Inc. System and method of anomaly detection
CN103605951A (en) * 2013-09-11 2014-02-26 中科润程(北京)物联科技有限责任公司 Novel behavior characteristic identification algorithm for vibration intrusion detection

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109858632A (en) * 2019-02-15 2019-06-07 网宿科技股份有限公司 A kind of method and device of threshold value
CN109858632B (en) * 2019-02-15 2021-06-04 网宿科技股份有限公司 Method and device for determining threshold

Also Published As

Publication number Publication date
CN105512994B (en) 2019-10-25

Similar Documents

Publication Publication Date Title
US10535251B1 (en) Alarm signaling technology
CN101562537B (en) Distributed self-optimized intrusion detection alarm associated system
US20180278894A1 (en) Surveillance system
CN102612065B (en) Quick fault-tolerance detection method for monitoring abnormal event by wireless sensor network
US20160088502A1 (en) Method and network device for cell anomaly detection
CN105868629B (en) Security threat situation assessment method suitable for electric power information physical system
CN104464158B (en) Fire alarm linkage control method and system
CN105915388A (en) Sensor fault detection method and system based on distributed network
CN204066307U (en) A kind of safety-protection system based on technology of Internet of things
US20160148500A1 (en) Automatic intrusion detector threshold controlling systems and methods
CN101076174B (en) Method for processing warn windstorm
CN103533571A (en) FEDAV (fault-tolerant event detection algorithm based on voting)
CN206097378U (en) Novel smart home security system
CN105512994A (en) Fault-tolerant perimeter intruder detection method
CN109361728A (en) A kind of classification Incident Reporting System and method based on the multi-source sensing data degree of association
CN104200589A (en) Invasion detecting method, device and security and protection monitoring system thereof
CN112645173A (en) Elevator monitoring method, device, medium and electronic equipment
CN113612229B (en) Power self-healing method for multi-node fault test
CN106297120A (en) A kind of intelligent human body infrared sensing interlink alarm system
CN113225532A (en) Intelligent linkage video monitoring system and method
CN106408220A (en) Method and device for generating super warning in unattended manner
CN215180009U (en) Gas monitoring device with humiture is corrected function
CN106231644A (en) The wireless sensor network data transmission method of distribution line area video monitoring
CN102984730B (en) Distributive detection decision coalescing method of wireless sensor network based on trust model
KR102534920B1 (en) Disaster detection and response support system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant