Gui Linqing, Yuan Wenyang, Xiao Fu
Nanjing University of Posts and Telecommunications, College of Computer, Jiangsu 210023, China.
Fundam Res. 2022 May 26;3(6):988-996. doi: 10.1016/j.fmre.2022.05.015. eCollection 2023 Nov.
Passive intrusion detection is important for many indoor safety applications. By utilizing widespread WiFi infrastructures, channel state information (CSI) based intrusion detection methods have attractive advantages such as low cost, non-line-of-sight (NLoS) support, and privacy protection. However, existing CSI-based methods lack in-depth and intensive analysis of intrusion detection bound. To the best of our knowledge, this is the first work that precisely characterizes and models CSI-based intrusion detection bound in typical indoor NLoS scenario. A bound is defined as an intruder's farthest position from the transmitter during intrusion detection. To derive a model for the bound, we first derived an intrusion-disturbed NLoS channel model by analyzing the influence of human intrusion on the NLoS wireless channel. Subsequently, based on the channel model, we further derived an intrusion detection bound model. Based on the derived bound model, we proposed a practical system to estimate the real intrusion detection bound. Extensive experiments were conducted based on practical systems. The experimental and simulation results verified and demonstrated the effectiveness of the derived bound model. Our work not only reveals the fundamental performance limit of the basic intrusion detection method in an indoor NLoS scenario, but also provides a valuable reference for bound estimation for other fine-grained wireless sensing applications.
被动入侵检测对于许多室内安全应用都很重要。通过利用广泛存在的WiFi基础设施,基于信道状态信息(CSI)的入侵检测方法具有诸如低成本、支持非视距(NLoS)以及隐私保护等吸引人的优势。然而,现有的基于CSI的方法缺乏对入侵检测边界的深入和细致分析。据我们所知,这是第一项在典型室内非视距场景中精确表征并建模基于CSI的入侵检测边界的工作。边界被定义为入侵检测期间入侵者离发射器的最远位置。为了推导边界模型,我们首先通过分析人体入侵对非视距无线信道的影响,得出了一个受入侵干扰的非视距信道模型。随后,基于该信道模型,我们进一步推导了入侵检测边界模型。基于推导的边界模型,我们提出了一个实用系统来估计实际的入侵检测边界。基于实用系统进行了大量实验。实验和仿真结果验证并证明了推导的边界模型的有效性。我们的工作不仅揭示了室内非视距场景中基本入侵检测方法的基本性能极限,还为其他细粒度无线传感应用的边界估计提供了有价值的参考。