0% found this document useful (0 votes)
48 views5 pages

Intrusion Detection With Radio Frequency Identification

RFID technology can be used to create an intrusion detection system that accurately locates breaches within 18 inches. The system uses RFID transponders attached to structures that communicate location codes to transceivers. When a code is not received, an intrusion alarm is sent to the central monitoring controller, which can then pinpoint the exact location of the intrusion. This overcomes limitations of other technologies like CCTV cameras and buried cable sensors. The system provides security for structures while reducing costs, false alarms, and simplifying maintenance compared to traditional vibration-based systems.

Uploaded by

jon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views5 pages

Intrusion Detection With Radio Frequency Identification

RFID technology can be used to create an intrusion detection system that accurately locates breaches within 18 inches. The system uses RFID transponders attached to structures that communicate location codes to transceivers. When a code is not received, an intrusion alarm is sent to the central monitoring controller, which can then pinpoint the exact location of the intrusion. This overcomes limitations of other technologies like CCTV cameras and buried cable sensors. The system provides security for structures while reducing costs, false alarms, and simplifying maintenance compared to traditional vibration-based systems.

Uploaded by

jon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

WHITE PAPER-June.

2010

Intrusion Detection with Radio


Frequency Identification
Secure, Consistent and Easily Deployed
Intrusion Detection

Contact: Kenneth B. Cecil 760-839-3415 Phone/Fax | [email protected]

Executive Summary
Over the last several years and practically since 9/11, there has been a significant
increase in the number of intrusions as well as acts of international terrorism. Although a
large amount of time, effort and money has been budgeted to agencies like the
Department of Homeland Security, these intrusions and attempts to protect individuals
as well as property have not lessened the threat.
Access control devices supervise access at perimeter doors, but fail to detect vandalism
or terrorist threats to the exterior of a facility and the immediate vicinity of a structure or
area to be protected.
Existing perimeter security systems and the prior art consist of CCTV cameras, sense
cables either buried or attached to metal fences, infrared and microwave sensors.
Limitations are the rule since CCTV cameras are less effective at night and both IR
sensors and CCTV cameras are compromised by fog and rain, IR and microwave
sensors do not locate the point of the attempted intrusion and fence cables are limited to
metal fences. Buried cable sensors require significant site engineering. None of the
present solutions can locate intrusions accurately on hard surfaces such as brick walls
or buildings.
United States patent # 7,069,160 overcomes the shortcomings of the older technologies
by utilizing RFID passive proximity microchips to precisely locate intrusions regardless of
weather or of the structural material it is attached to or imbedded in.

Technical Concept of RFID Detection Technology


Each proximity transponder has an assigned encrypted code. The transponder sends a
constant code stream to the System Controller. The transmission signal at (certain
frequencies such as 900 MHz) requires line of site and therefore would be interrupted by
anyone entering the field or breaking the signal since the field is absorbed by hydrogen
and 70% of the human body is water. The System Controller reports exceptions (lack of
receiving the transponder code) as an intrusion. Firmware and software is simplified
since the encrypted transponder code can be used instead of time telemetry algorithms
currently used by vibration sensors.

Vibration Technology based systems


Vibration based systems often result in false-positive alarms due to trucks traveling on
nearby roads, weather, lightening, sonic booms from military aircraft, vibrations from
trees/shrubs and animals as well as earthquakes, tremors, seismic rumblings and
explosions. Repair and maintenance are frequent and costly. Sophisticated software
requiring complicated algorithms must also be developed to determine the approximate
location of an alarm.
How it works
RFID sensors are attached to a wall, fence or building structure and send back a
continuous wireless and secure location code in real time. RF transceivers generate a
UHF radio signal and through electromagnetic inductive coupling, power transponders
within the field. The received signal contains enough energy to power on the RFID
transponders, which transmit back an encoded location signal to the transceivers. The
transceivers are located 20-30 ft (6-9 m) away from the area to be protected and through
the EM field supervise up to 20 transponders. When a code is not received from a
transponder or series of transponders, a breach has occurred. The longitudinal location
can be determined immediately and the intrusion identified within 18 inches (46 cm).

System advantages:
RFID detection systems provide many unique advantages including:

Reduced site work and engineering.

Identifying the exact longitudinal location of an intrusion in real time, speeding


response time and allowing for precise CCTV monitoring.

Reducing costs by utilizing off-the-shelf RFID transponders.

Ensuring vibrations have no negative impact on the system (trucks, wind, sonic
booms, animals, earthquakes or explosions will not result in false-positives).

Simplifying maintenance and repair because transponders are passive (require no


power or maintenance) and operate on energy received from the electromagnetic
field radiated from the transceivers.

Eliminates the possibility of cloning by providing each transponder with a unique


encrypted identification code.

Enables installation on hard surfaces such as brick/concrete walls and sides of


buildings.

Simplifies monitoring with a very low false alarm rate and the ability to pinpoint
the location of the intrusion within 1 meter.

Allowing the system to be easily redeployed

Operational Concept
This section will expand on the RFID detection technology.
RFID standard: RFID is an industry-standard, open architecture radio frequency
technology. Many organizations have developed firmware and software that support
RFID. Because of their popularity, RFID-based solutions can easily integrate with
infrared/ microwave sensors, fence-mounted vibration systems and closed-circuit
television systems.
System controller: An above-ground firmware-based system controller will reside in the
field and interface with up to 30 transceivers. Typically mounted on a pole, wall or fence,
the system controller is a liaison between the supervised area and a central monitoring
controller.
The central monitoring controller continually polls all systems controllers. When one or
more transponders fail to respond, the system controller reports these exceptions and the
unique identification code of the transponder(s) to the central monitoring controller at a
remote location, such as a guard station or central monitoring command center.
Central Monitoring Controller: A central controller receives and processes all alarms.
The transponders failing to report are cross-referenced with location information that
reveals where the breach is taking place and displays the alarm location on the system
monitor.

Other capabilities of the server include:

Arming and disarming zones (for maintenance)

Interfacing with existing systems, such as motion, fire, CCTV and access control
systems

Alarm management for tracking when alarms are reported

Remote notification to pagers, PDAs and smart phones

Remote monitoring and sensitivity adjustments

Kenneth B. Cecil is the technical contact and patent holder. He has over 40 years
experience in the security industry and has held positions in senior management for
several international companies.
Current patents in the field of electronic security:

Patent # 5,896,215: Multi Channel System with Multiple Information Sources.


(IR Transceiver). Granted April 20, 1999.

Patent # 6,340,116: Proximity Card with Incorporated Pin Code Protection


(RFID). Granted Jan.22, 2002.

Patent #6,742,714: Safety Device for Fire Arms (RFID). Granted June 1, 2004.

Patent #7,069,160: Intrusion Detection System and Method Thereof (RFID):


Granted June 27, 2006.

Patent #7,728,725: Intrusion Detection System For Underground/ Above Ground


Systems (RFID) Granted June 1, 2010.

Closing Comments
RFID detection technology represents the state of the art and most cost effective reliable
way to securely detect illegal intrusion activity on hard surfaces and fences.

You might also like