2019
DOI: 10.1109/access.2019.2951576
|View full text |Cite
|
Sign up to set email alerts
|

A LCX-Based Intrusion-Detection Sensor Using a Broadband Noise Signal

Abstract: An intrusion detection sensor system based on a broadband noise signal and two leaky coaxial cables (LCXs) is proposed and experimentally demonstrated. In the proposed sensor, the broadband noise signal is generated by our designed white noise generator used as the detection signal. The detection signal is transmitted and received by two parallel LCXs, forming an invisible electromagnetic monitoring field around the protected area. The intrusion distance along the LCXs can be accurately extracted by the correl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…In addition, when the trajectories of two targets are very close, the matching problem between targets and trajectories should also be considered. It has been proved that the larger the target's physical size bringing in the stronger reflection signal, which leads to a higher correlation peak [30]. Therefore, in the case of obvious difference in the physical sizes of multiple targets, the targets and corresponding trajectories can be exactly matched by the correlation peak height.…”
Section: B Two Target Localization and Trackingmentioning
confidence: 99%
“…In addition, when the trajectories of two targets are very close, the matching problem between targets and trajectories should also be considered. It has been proved that the larger the target's physical size bringing in the stronger reflection signal, which leads to a higher correlation peak [30]. Therefore, in the case of obvious difference in the physical sizes of multiple targets, the targets and corresponding trajectories can be exactly matched by the correlation peak height.…”
Section: B Two Target Localization and Trackingmentioning
confidence: 99%
“…New attacks detected using the bloom filtering methodology. A sensing system for detecting the intrusion [2] proposed to detect intrusions in the network. It works by generating noise signals and transmitting the detection signal, where it accurately fetches the intrusions with the assistance of the correlation technique.…”
Section: Literature Reviewmentioning
confidence: 99%