Next Article in Journal
Coarse and Fine Two-Stage Calibration Method for Enhancing the Accuracy of Inverse Finite Element Method
Next Article in Special Issue
WeMo: A Prototype of a Wearable Mobility Device Adapting to User’s Natural Posture Changes
Previous Article in Journal
Lightweight Object Detection Algorithm for UAV Aerial Imagery
Previous Article in Special Issue
A Sustainable Approach to Delivering Programmable Peer-to-Peer Offline Payments
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Real-Time Detection of Intruders Using an Acoustic Sensor and Internet-of-Things Computing

1
KACST-TIC in Radio Frequency and Photonics for the e-Society (RFTONICS), King Saud University, Riyadh 11421, Saudi Arabia
2
King Abdullah Institute for Nanotechnology (KAIN), King Saud University, Riyadh 11451, Saudi Arabia
3
Electrical Engineering Department, King Saud University, Riyadh 11421, Saudi Arabia
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(13), 5792; https://doi.org/10.3390/s23135792
Submission received: 18 May 2023 / Revised: 14 June 2023 / Accepted: 19 June 2023 / Published: 21 June 2023
(This article belongs to the Special Issue Internet of Things for Smart City Application)

Abstract

:
Modern home automation systems include features that enhance security, such as cameras and radars. This paper proposes an innovative home security system that can detect burglars by analyzing acoustic signals and instantly notifying the authorized person(s). The system architecture incorporates the concept of the Internet of Things (IoT), resulting in a network and a user-friendly system. The proposed system uses an adaptive detection algorithm, namely the “short-time-average through long-time-average” algorithm. The proposed algorithm is implemented by an IoT device (Arduino Duo) to detect people’s acoustical activities for the purpose of home/office security. The performance of the proposed system is evaluated using 10 acoustic signals representing actual events and background noise. The acoustic signals were generated by the sounds of keys shaking, the falling of a small object, the shrinking of a plastic bag, speaking, footsteps, etc. The effects of different algorithms’ parameters on the performance of the proposed system have been thoroughly investigated.

1. Introduction

The Internet of Things (IoT) is an emerging paradigm that enables communication between electronic devices and sensors. IoT uses smart devices and the internet to provide innovative solutions to various challenges and issues related to various businesses and governmental and and public/private industries across the world [1]. IoT is progressively becoming an important aspect of our life, where an extensive variety of smart systems, frameworks, intelligent devices, and sensors are currently used. Cisco anticipated that by the year 2022 there would be more than 28 billion IoT-connected devices, as compared to 18 billion in 2017, where more than half of those devices would be machine-to-machine connections [2]. It is also anticipated that the number of connected IoT devices will reach 50 billion devices by 2030 [3].
Security has been one of the most critical social challenges in recent years. This is due to a spike in instances of robbery and intrusion in practically every location, including homes and offices. Intruders can cause a considerable loss of belongings and may also commit additional crimes. Therefore, intruder detection systems are of utmost importance and an unavoidable requirement of our daily life.
IoT systems are among the modern home automation systems’ security-enhancing capabilities. These devices can provide a revolutionary home security system that can detect intruders by using an appropriate sensing device and instantly notify the property owner. Several sensors can be utilized to detect intruders in different environments and situations, such as video sensors, passive infrared (PIR) sensors, contact sensors, acoustic sensors, pressure sensors, and vibration sensors. Table 1 shows a number of the sensors used in intruder detection systems. The effectiveness of the selected sensor depends on a variety of factors, including the type of sensor, the placement of the sensor, and the environment in which the sensor is used.
Monitoring cameras are the most common video sensors for intruder detection [4,5]. This traditional system is a viable solution for home and building security but requires several sensors to cover different nearby and separate areas. In addition, visible cameras need light to work, while infrared cameras, which are well suited for dark places, are quite expensive. Furthermore, the use of a camera poses a threat in the sense of violating the privacy of a place, possibly through unauthorized access to the footage of the place where the camera is installed. Further, cameras can also be recognized by an intruder.
Motion sensors are another commonly used sensor in intruder detection systems. These sensors detect movement within a specified area. There are several types of motion sensors, including PIR sensors, ultrasonic sensors, and microwave sensors. PIR sensors are the most widely used motion sensors due to their low cost and high accuracy. However, motion sensors have limitations such as blind spots and range limitations [6,7].
Contact sensors are another commonly used sensors in intruder detection systems to monitor the opening and closing of doors, windows, and other entry points. These sensors are made up of two components, a magnetic piece and a sensor body, which are located separately. They work by detecting changes in magnetic fields when a door or window is opened. Contact sensors are relatively simple and inexpensive, making them a popular choice for home security systems. They are also easy to install and require little maintenance. However, contact sensors do have some limitations. They only detect when a door or window is opened but do not detect motion or other types of intrusion. Pressure sensors, on the other hand, are used to detect changes in pressure or weight and can be used to detect the presence of intruders. These sensors are often placed under carpets or floor mats and trigger an alarm or alert when pressure is applied [7].
Radar is another sensor that can be used to detect intruders. It operates by radiating electromagnetic energy and detecting the echo returned from reflecting objects (targets). The nature of the echo signal provides information about the target. The range, or distance, to the target is found from the time it takes for the radiated energy to travel to the target and come back [8]. Despite all the advantages of radar, it is not recommended for indoor intruder detection because it is an active device causing electromagnetic radiation. Further, it works properly only in the line-of-site transmission and is difficult to hide from intruders. Another intrusion detection system could be based on the scattered reflections generated by a pulsed light or acoustic signals [9,10,11]. This concept is analogous to the radar challenge of transmitting a pulsed signal. The scattered signal reflections are analyzed for the purpose of intruder detection and localization. This solution is o quite high in cost and suitable for outdoor applications. Seismic vibration sensor technology can also be a viable contender for the detection of human footsteps and hence an intruder [12]. The amplitude of propagating waves in the soil caused by the impact of a person’s movement is measured using seismic sensors. A seismic sensor can detect a wide frequency band that is below the threshold of the human hearing spectrum. Geophones are sensors used to measure the amplitude of seismic waves within the soil. This solution is well-suited for outdoor applications. Further, the sensor needs to be immersed in the ground.
Several studies have attempted the problem of intruder detection using acoustic approaches. In [13], the authors used linear frequency modulation (LFM) as an acoustic source signal with the employment of coherence bandwidth for the sake of acoustic-based intruder detection. In [9], they exploited a source of white noise and an array of microphones for the purpose of intruder detection. After white noise is propagated, two selected features out of the source and received signals are compared which are based on the Short-Time Fourier Transform (STFT) and the zero-crossing rates. The presence of an intruder is determined based on the comparison result if it exceeds a certain threshold. Similarly, in [14], the authors compared the energy of a chirp signal and its reverberation based on a two-dimensional spectro-temporal filtering mechanism of the Fourier spectrogram. Thus, they can detect any changes in the acoustic scene affecting the propagated signal. In [15], the authors proposed a method for intruder detection using a speaker and microphone in addition to a camera. Their acoustic detection algorithm is based on measuring the distortion of the space transfer function so that the magnitude of the recorded signal is much lower than the magnitude of the propagated signal in the case of the presence of an intruder. Note that the aforementioned research methods, which are proposed for intruder detection, have the disadvantage of requiring an active acoustic source to work. Second, they lack real-time implementation of their intruder detection systems, which is crucial for these types of applications.
Table 1. Sensors used in intruder-detection systems.
Table 1. Sensors used in intruder-detection systems.
SensorReferenceLimitation
Video[4,5]Requires several sensors to cover different areas that are nearby and apart
Needs light to work
Infrared camera is quite expensive
Poses a threat in the sense of violating the privacy of a place
Motion[6,7]Blind spots
Range limitations
Magnetic contact[7]Do not detect motion or other types of intrusions
Radar[8]Not recommended for indoor intruder detection
Works properly only in the line-of-site transmission
Pulsed light[9,11]Quite high cost
Not suitable for indoor applications
Vibration[12]Not suitable for indoor applications
Acoustic[9,13,14,15]Affected by environmental noise
In this research work, a real-time smart security system based on an IoT device is proposed, which continuously monitors the area and notifies the authorized person(s) in the event of intrusion. A main objective in our development is to come up with a cost-effective, privacy-preserving, and reliable intruder detection system that is well suited for indoor applications. Specifically, the goals are (1) developing a computationally less demanding intruder detection algorithm that can be executed by an IoT device, (2) employing IoT sensors that ensure some privacy for homes and other private places, and (3) employing IoT sensors covering wider areas of nearby but separated places. The intruder detection system proposed in this research work is developed such that it sends a notification to the user’s phone once an intruder is detected over at least 10 consecutive positive decisions for more reliable results. It does so in less than 3 s, which meets the real-time requirement of the application at hand, as demonstrated in Section 3.2.
The remaining parts of this paper are organized as follows. The system concept, detection algorithm employed in this research work, and hardware implementation are described in Section 2. The experimental investigation is discussed and presented in Section 3. Concluding remarks are given in Section 4.

2. System Development

2.1. System Concept

Figure 1 represents the main concept of our solution for the problem at hand. In particular, there is an acoustic sensor that is placed in the area to be protected. The acoustic signal captured by the sensor is digitized and processed in an IoT device. The main function of the IoT device is to detect abnormal activities in the digitized acoustic signal. When no intruder is present, the acoustic signal is pure background noise. This background noise is used in the initialization phase of the IoT device for computing the parameters of the intruder detector. Later, the presence of an intruder will produce an acoustic signal, which can be detected with a proper thresholding process. In this study, we consider the use of an adaptive algorithm for detecting abnormalities in a real-time captured acoustic signal. The adaptive algorithm makes use of an adaptive threshold to detect intruders and is implemented on a dedicated IoT hardware to speed up the computational process. One option for such a hardware is the Arduino Due chip, which is an integrated circuit designed to have the flexibility to be programmable based on the algorithm to be implemented [16]. Once an intruder detection is declared, or equivalently the energy of the acoustic signal crosses the adaptive threshold, a wireless control module (ESP8266) is used with the Arduino Due for sending a notification to the intended person’s mobile, through the Blynk IoT cloud, as demonstrated in Figure 1.

2.2. Detection Algorithm

Intruder detection using acoustic sensors can be formulated as a classical binary testing problem. The detector usually stores a threshold to determine if the acoustic signal is high enough to be caused by the presence of an intruder. A decision is made in favor of the intruder state if the signal value exceeds the threshold. Otherwise, it is set in favor of the no-intruder state. Note that a threshold of a fixed value may cause an excessive number of false alarms. This is because noise alone might exceed low-level thresholds, leading in such a case to a false alarm. In contrast, if the threshold is set too high, weak intruder signals might not be detected; this latter situation is classified as miss detection. For reliable intruder detection in a noisy environment, the threshold must be varied adaptively according to the background noise.
In this study, we propose a detection method using the “short-time-average through long-time-average” (STA/LTA) algorithm [17]. This algorithm computes the threshold in an adaptive manner to maintain a constant false alarm rate (CFAR). It continuously calculates the average value of the energy of an acoustic signal in two consecutive time-moving windows. The short-time-average window (STA) estimates the acoustic events, while the long-time-average window (LTA) provides an estimation of the temporal energy of the acoustic background noise of the surrounding environment. The algorithm works by comparing the value of the STA window to the value of the LTA window multiplied by a scaling constant based on the desired probability of a false alarm. When the value of an STA window exceeds that of the LTA window, an event is “declared”. The equation governing the operation of STA/LTA algorithm is given by [18]:
1 S i = n S + 1 n X i 2 η L i = n L S + 1 n S X i 2
where the right-hand term of Equation (1) is the adaptive threshold, x i is the ith sample of digitized acoustic signal, S is the length of STA window, L is the length of LTA window, and η represents a predefined scaling factor. The symbol ≷ means that an intruder is present if the value of the left-hand side of Equation (1) is greater than that of the right-hand side. If it is less, then a no-intruder state is declared. For proper operation of the STA/LTA algorithm in a particular application, S, L, and η must be carefully selected. The size of the LTA window is often kept to 5 to 10 times the size of STA window [18]. The STA window is usually selected depending on the short event duration. Unfortunately, it is not possible to determine the type of such an event in advance as it could be a human voice, a sound originating from opening doors, and/or a sound originating from breaking items. Therefore, the size of the STA window is set heuristically. On the other hand, the value of the predefined scaling factor η is adjusted so that it maintains a pre-defined constant false alarm rate. In particular, we run the STA/LTA algorithm with a selected window size over background signals recorded at the place to be monitored. The value of η is varied until the desired constant false alarm rate is reached. Figure 2 shows the architecture of STA/LTA, where d is the step size and k is the number of consecutive positive decisions employed to reduce the number of false events. In particular, the algorithm considers the presence of an intruder if k consecutive positive decisions are made. A warning message is then released by the system based on the user’s requirements.

2.3. Hardware Implementation

Implementing the STA/LTA algorithm in a small controller to detect intruders using acoustic signals implies dealing with real-time data streaming that must be processed within a given time constraint, called real-time stream processing. This means that the system should be able to do the following tasks in real time: collecting the acoustic signal from ADC and storing it in a particular place of the STA/LTA windows arrays, shifting the STA/LTA windows arrays, summing the two new windows’ arrays, averaging, calculating the ratio, and comparing it with a predefined threshold. Among the mentioned tasks, reading new data and shifting and summation of windows represent the bottlenecks in realizing a real-time streaming process, especially for the microcontrollers that have a single core and can only execute one instruction at a time. Therefore, an Arduino code was developed in a way that switches between the operations of shifting windows and reading new data within an acceptable rate, whereas the summation operation of the windows was reduced to add and subtract d samples that entered and exited each window. The code of the STA/LTA algorithm is as shown in Figure 3.
Figure 4 shows the intruder-detection workflow. The system starts by initializing the hardware and uploading the predefined algorithm’s parameters. The values of these parameters were specified using an offline simulation study, the details of which are given in the next section. Then, the system goes into idle mode until a turn-on signal was received from the mobile application. Once the turn-on signal is received by the system, the monitoring process is started; firstly, the background acoustic noise is recorded on the SD card for a specified time and used afterward by the system to select the suitable scaling factor η according to the pre-specified constant false alarm rate. Then, the input acoustic signal is continuously captured and stored on the STA/LTA window array while the shifting process is performed during this interval of time. After that, the summation and averaging processes are performed, and the ratio of the values of STA and LTA windows is compared with the scaling factor η . If the ratio exceeds the value of the scaling factor, the event is declared, and the alarm signal is sent to the intended person’s mobile to alert them about the presence of an intruder. Finally, when there is a presence of an intruder, the system starts recording the acoustic signal on the SD card for a certain time defined by the user.
This advanced electronics technology offers a wide spectrum of microcontrollers that are available off the shelf. Among them, we chose the Arduino platform. The Arduino is an open-source computer hardware/software platform for building digital devices and interactive objects that can sense and control the physical world around them. The Arduino device consists of a microcontroller (usually an Atmel AVR or ARM processor), a set of digital and analog input/output pins, and a development environment that includes an integrated development environment (IDE) and a library of pre-written software functions that can be used to control the board’s various inputs and outputs. Many versions of the official Arduino hardware have been commercially produced to date. Arduino Due has the best features that allow an efficient implementation of the STA/LTA algorithm. With Arduino Due, the system can achieve an average processing time as low as 47.6 μ s with a window size of 10,000 samples (STA window + LTA window). Figure 5 shows the system hardware block diagram. A MAX9814 microphone amplifier module is used as an acoustic sensor with sensitivity in the range of −44 dBV/Pa to −26 dBV/Pa and a frequency response range of 20 Hz to 20 kHz. This module is a low-cost, high-quality microphone amplifier with automatic gain control (AGC) and low-noise microphone bias [19]. A wireless control module (ESP8266) is used with Arduino Due. This module uses a Wi-Fi channel, which is integrated into the IoT system. A notification alarm is sent via a Wi-Fi network to the Blynk IoT cloud and then collected by an intended person’s mobile through a cloud-based mobile application. Finally, an SD card adapter module is used to record the acoustic signals. This module has a serial peripheral interface (SPI) to connect with the microcontroller. Figure 6 shows the intruder detection system hardware architecture. In the beginning, we wrote a code using the Arduino IDE, which controls the communication between the hardware components. This code is then compiled and uploaded to the hardware board, where it runs the various hardware components. In particular, the Arduino first receives the acoustic signal captured by the MAX9814 module and converts it to a digital signal using the Arduino build-in ADC. After that, the received signal is either stored in the SD card or analyzed using the implemented adaptive algorithm, as shown in Figure 5. Depending on the algorithm’s calculation outputs, the Arduino sends a notification signal to the mobile application if an intruder is detected, using the WiFi module (ESP8266) and the IoT cloud. Figure 7 shows the overall intruder’s detection system prototype.

3. Experimental Results

3.1. Selection of Algorithm’s Parameters

In this subsection, we describe experiments we performed to select the parameters of the STA/LTA algorithm for best performance using real acoustic data recorded by Arduino Due. We have considered the probability of detection and probability of miss for the performance validation at the fixed probability of a false alarm. The probability of detection is an important parameter in many fields, which refers to the likelihood of correctly identifying the presence of a target signal or event. The probability of a miss, on the other hand, is also an important metric, particularly in the areas where the consequences of a missed detection can be significant. It is a measure of the likelihood that a particular event or object will not be detected or identified by a given system. In our development, the STA/LTA is adjusted to have a pre-defined constant false alarm rate, a performance metric used to evaluate the likelihood of a system flagging an event as occurring when this is not true.
Next, acoustic background noise and ten different events were recorded for 3 min and stored on the SD card. The system recording sampling rate was 14 KHz with a resolution of 12 bits. These records were analyzed using MATLAB codes to select the proper main parameters for the STA/LTA algorithm.
The background acoustic noise was recorded at a laboratory when no individuals were available. Figure 8 shows a snapshot of the background. As can be seen from the figure, the background noise closely follows the Gaussian distribution, as shown in the inset of Figure 8.
Ten events were recorded at the same laboratory, where each event was repeated ten times with a gap of almost ten seconds between consequence events. Table 2 shows the recorded events’ details and the average duration of each. As can be seen from the table, the maximum event duration is 1.036 s for the acoustic signal generated by the plastic bag, the minimum duration is 0.043 s for the acoustic signal generated by the light switch, and the average calculated duration of all events is 0.49 s. Figure 9 shows an acoustic signal that contains the ten different events that were extracted from the originally recorded signals. These recorded data are used with the developed MATLAB codes to evaluate the performance of the STA/LTA algorithm and to select the proper algorithm’s parameters that will be implemented in the system hardware. Figure 10 further shows the spectrograms of four events with different durations.
The detection performance of the proposed system was evaluated using recorded acoustic signals representing the actual events and background noise. The effects of different algorithm parameters on the detection performance of the proposed system have been thoroughly investigated. The evaluation was based on the following three metrics: the probability of detection, the probability of misdetection, and the probability of false alarm.
In this study, three different STA window sizes were used to evaluate the performance of the algorithm. These windows were selected depending on the minimum, average, and maximum duration of the previously recorded events. Initially, the LTA window was kept at 5 times the selected STA window, and the moving window step size was held at d = 14 samples, which is equivalent to 0.001 of the sampling rate. However, the scaling factor η was chosen to have a 0.001 probability of a false alarm. The values of η were determined by running the STA/LTA algorithm over the recorded background signal. Figure 11 shows the plot of the probability of a false alarm against the change in the value of η for the three different STA window sizes. The values of η for the minimum, maximum, and average STA window sizes are 2.47, 1.28, and 1.44, respectively.
The detection performance was computed from the ten recorded acoustic signals, where we found that all events in the ten different events were perfectly detected with no miss using the three predefined STA window sizes. Table 3 shows the details of the results. However, the algorithm showed quite a high number of false alarms depending on the STA window size used. Figure 12 shows the keys’ acoustic signal with the STA/LTA algorithm decisions displayed in red over the acoustic signal.
These false alarms can be reduced by either increasing the value of η or considering the presence of abnormality if the detection ratio exceeds the threshold, for example, in k consecutive runs. The performance of the algorithm is re-evaluated using four k values (1, 5, 10, and 20). The STA/LTA algorithm results for the different values of k are shown in Table 4. Improvement in performance is pronounced only when the STA window was 0.043 s. Table 4 shows the performance when the signal generated by the keys is considered. It is observed that the number of false events decreases as the value of k increases. However, selecting the proper value of k is required to avoid missing real events, especially those of short duration. In our study, we found that k = 10 is a suitable value to reduce the false alarm without missing real events of the recorded acoustic signals.
Finally, we varied the value of step size d to determine its effect on the algorithm performance. The studied step sizes are 14, 28, 42, and 56 samples, which represent 0.001, 0.002, 0.003, and 0.004 of the recording sampling rates, respectively. It can be seen from Table 5 that increasing the step size results in reducing the number of false events. Furthermore, increasing the step size d beyond a certain value will result in missing some events. Therefore, the step size d must be selected carefully. It must be mentioned here that selecting the step size is affected by the value of k value, where the multiplication of these two values must not be smaller than the expected duration of the shortest event.

3.2. Hardware Demonstration

The performance of the developed system was evaluated extensively in real environments using an Arduino IDE serial monitor and MATLAB-developed code. The evaluation shows the calculation of the system’s scaling factor η and presents results for intruder detection as well as the system speed in a real-time environment. The system was tested at a laboratory when no individuals were available to compute the proper value of η and when an event occurs to compute the detection performance.
Two scenarios have been considered to test the developed prototype. The first scenario tests the detection system prototype by comparing the results of each of its main functions with those produced by the MATLAB code. The second scenario tests all the functions of the system prototype together.
In the first scenario, five background noise records of 100 s length were stored in the SD card. This duration is sufficient to estimate the values of η for a probability of a false alarm of value 0.001. Table 6 shows the estimated scaling factor η and the average calculation time per sample for each of the five recorded background noises when threshold computations were performed by the prototype itself and by the MATLAB code. It can be seen from the table that the values of η for both methods are identical, which validates the background calculation using the prototype. It is intuitively not surprising to note that the speed of MATLAB’s computation of η is far higher than that of the prototype because MATLAB utilizes an Intel Core i5 processor of a laptop with 2.67 GHz speed and 8 GB memory, while the prototype utilizes Arduino Duo, a simple controller with very limited capabilities.
For event detection, five records each of three minutes were stored on the SD card. Each record contains five events selected from the ten events given in Table 2. Table 7 shows the number of detected events using both MATLAB and the prototype. Both methods perfectly detect the presence of an event.
The second scenario addresses the real-time evaluation of the whole prototype. In this scenario, the lengths of STA and LTA windows were set to 0.043 and 0.215 s, respectively, and the step size (d) of moving window was set to 0.003 of the sampling rate. Two steps were executed:
  • The prototype was set to record 100 s of background noise, and then the STA/LTA algorithm was run over the recorded background signal to compute the threshold η .
  • A total of 20 different events (selected from the events mentioned in Table 2) were generated inside the lab and within a distance of 1, 2, and 5 m from the prototype location. All generated events were captured and processed by the proposed prototype.
The prototype was able to detect all generated events in real time, where a notification was sent immediately (in less than 3 s) via the cloud. Figure 13 shows a control panel of the proposed detection system on the mobile. This app is built using Blynk app builder, which uses drag and drop pre-designed elements to build a custom user interface (UI) [20]. It can be seen that there are two light-emitting diode (LED) indicators (System and Intruder) and one controlling switch. The LED, named the system, will be continuously flashing when there is no problem in the connection between the prototype and the mobile app through the cloud. The LED, named the intruder, is turned on when an intruder is detected by the prototype. At the beginning and once the threshold is computed, the prototype goes into idle mode, waiting for a switching signal that will come from the mobile app to start the monitoring mode, as shown in Figure 4.

4. Conclusions

In this paper, we successfully built a real-time intruder-detection system that is based on the adaptive STA/LTA algorithm. The algorithm was implemented using an Arduino Due microcontroller and was used to detect abnormal activities in acoustically recorded signals. Prior to realizing the system, intensive studies were conducted to select the appropriate parameters for the algorithm. These studies were conducted by developing MATLAB codes to analyze a real dataset to select the algorithm’s parameters values for better performance. These parameters include the short and long window sizes, moving step size, and the detection scaling factor η . The algorithm was then implemented using the proposed hardware and tested in a real environment. The system was able to successfully detect all abnormalities generated in the area under consideration.
It is relevant to mention here that while the proposed system enjoys the advantages of being cost-effective, privacy-preserving, and relatively reliable, its implementation on the Arduino Duo device poses certain limitations. Specifically, the Arduino Duo is of limited processing capability, which hinders the use of more advanced intruder-detection algorithms. Future studies could consider other IoT devices with higher processing capabilities. Further, it is possible to use different cost-effective sensors and fuse their results for the sake of developing more reliable intruder detection systems.

Author Contributions

Conceptualization, N.A.-K., S.A., M.A., Y.A. and S.A.A.; methodology, N.A.-K., S.A., M.A., Y.A. and S.A.A.; software, N.A.-K., S.A., M.A., Y.A. and A.B.I.; validation, N.A.-K., S.A., M.A., Y.A. and A.B.I.; formal analysis, N.A.-K., S.A., M.A., Y.A. and A.B.I.; investigation, N.A.-K.; resources, N.A.-K.; data curation, N.A.-K.; writing—original draft preparation, N.A.-K., S.A., M.A., Y.A., A.B.I. and S.A.A.; writing—review and editing, N.A.-K., S.A., M.A., Y.A., A.B.I. and S.A.A.; visualization, N.A.-K. and A.B.I.; supervision, N.A.-K. and S.A.A.; project administration, S.A.A.; funding acquisition, S.A.A. and A.B.I. All authors have read and agreed to the published version of the manuscript.

Funding

The authors extend their appreciation to the Deputyship for Research and Innovation, Ministry of Education, Saudi Arabia: IFKSUOR3-022-2.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. El-Sayed, H.; Sankar, S.; Prasad, M.; Puthal, D.; Gupta, A.; Mohanty, M.; Lin, C.T. Edge of things: The big picture on the integration of edge, IoT and the cloud in a distributed computing environment. IEEE Access 2017, 6, 1706–1717. [Google Scholar] [CrossRef]
  2. Cicero, S.; Cromwell, C.; Hunt, E. Cisco Predicts More IP Traffic in the Next Five Years Than in the History of the Internet; Cisco: San Jose, CA, USA, 2018. [Google Scholar]
  3. Hussain, M.Z.; Hanapi, Z.M. Efficient Secure Routing Mechanisms for the Low-Powered IoT Network: A Literature Review. Electronics 2023, 12, 482. [Google Scholar] [CrossRef]
  4. Abhinay, D.; Chaitanya, K.; Ram, P.S. Intruder Detection and Tracking Using Computer Vision and IoT. In Advances in Signal Processing and Communication Engineering: Select Proceedings of ICASPACE 2021; Springer: Berlin/Heidelberg, Germany, 2022; pp. 499–512. [Google Scholar]
  5. Vandana, G.; Pardhasaradhi, B.; Srihari, P. Intruder Detection and Tracking using 77GHz FMCW Radar and Camera Data. In Proceedings of the 2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT), Bangalore, India, 8–10 July 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 1–6. [Google Scholar]
  6. Gami, H. Movement Direction and Distance Classification Using a Single PIR Sensor. IEEE Sens. Lett. 2018, 2, 6000104. [Google Scholar] [CrossRef]
  7. Smith, S.; Ellis, J.; Abrams, R. Chapter 8—Central Alarm Stations and Dispatch Operations. In The Professional Protection Officer; IFPO, Ed.; Butterworth-Heinemann: Boston, MA, USA, 2010; pp. 89–103. [Google Scholar] [CrossRef]
  8. Griffiths, H.; Cohen, L.; Watts, S.; Mokole, E.; Baker, C.; Wicks, M.; Blunt, S. Radar spectrum engineering and management: Technical and regulatory issues. Proc. IEEE 2014, 103, 85–102. [Google Scholar] [CrossRef]
  9. Choi, Y.K.; Kim, K.M.; Jung, J.W.; Chun, S.Y.; Park, K.S. Acoustic intruder detection system for home security. IEEE Trans. Consum. Electron. 2005, 51, 130–138. [Google Scholar] [CrossRef]
  10. Cheong, K.M.; Shen, Y.L.; Chi, T.S. Active acoustic scene monitoring through spectro-temporal modulation filtering for intruder detection. J. Acoust. Soc. Am. 2022, 151, 2444–2452. [Google Scholar] [CrossRef] [PubMed]
  11. Basutli, B.; Zungeru, A.M.; Mtengi, B.; Diarra, B. Design of a Short Range Optical Pulse Transceiver System for Intruder Detection. In Proceedings of the 2019 2nd International Conference on Electronics and Electrical Engineering Technology, Penang, Malaysia, 25–27 September 2019; pp. 68–73. [Google Scholar]
  12. Anchal, S.; Mukhopadhyay, B.; Kar, S. Person identification and imposter detection using footstep generated seismic signals. IEEE Trans. Instrum. Meas. 2020, 70, 1–11. [Google Scholar] [CrossRef]
  13. Lee, C.; Kim, D.; Kim, K. Acoustic detection based on coherence bandwidth. Electron. Lett. 2015, 51, 1387–1388. [Google Scholar] [CrossRef]
  14. Lin, C.H.; Cheong, K.M.; Huang, M.C.; Chen, M.Y.; Chang, C.K.; Chi, T.S. Acoustic scene change detection by spectro-temporal filtering on spectrogram using chirps. In Proceedings of the 2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA), Jeju, Republic of Korea, 13–15 December 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1–5. [Google Scholar]
  15. Park, H.; Park, J.; Kim, H.; Lee, S.Q.; Park, K.H.; Paik, J. Hybrid Sensor Network-Based Indoor Surveillance System for Intrusion Detection. Symmetry 2018, 10, 181. [Google Scholar] [CrossRef] [Green Version]
  16. Raspberry Pi Documentation. Available online: https://www.raspberrypi.com/documentation/ (accessed on 1 March 2023).
  17. Jones, J.P.; van der Baan, M. Adaptive STA–LTA with outlier statistics. Bull. Seismol. Soc. Am. 2015, 105, 1606–1618. [Google Scholar] [CrossRef]
  18. Mukhopadhyay, B.; Anchal, S.; Kar, S. Detection of an intruder and prediction of his state of motion by using seismic sensor. IEEE Sens. J. 2017, 18, 703–712. [Google Scholar] [CrossRef]
  19. Allwood, G.; Wild, G.; Hinckley, S. Optical fiber sensors in physical intrusion detection systems: A review. IEEE Sens. J. 2016, 16, 5497–5509. [Google Scholar] [CrossRef] [Green Version]
  20. Blynk. Low-Code IoT Software Platform for Electronics Manufacturers. Available online: https://blynk.io/ (accessed on 1 March 2023.).
Figure 1. System Concept.
Figure 1. System Concept.
Sensors 23 05792 g001
Figure 2. The Architecture of the STA/LTA Algorithm.
Figure 2. The Architecture of the STA/LTA Algorithm.
Sensors 23 05792 g002
Figure 3. Arduino code.
Figure 3. Arduino code.
Sensors 23 05792 g003
Figure 4. Intruder detection flowchart.
Figure 4. Intruder detection flowchart.
Sensors 23 05792 g004
Figure 5. System hardware block diagram.
Figure 5. System hardware block diagram.
Sensors 23 05792 g005
Figure 6. System hardware architecture.
Figure 6. System hardware architecture.
Sensors 23 05792 g006
Figure 7. Intruder’s detector prototype.
Figure 7. Intruder’s detector prototype.
Sensors 23 05792 g007
Figure 8. Segment of a background acoustic signal with its histogram.
Figure 8. Segment of a background acoustic signal with its histogram.
Sensors 23 05792 g008
Figure 9. Acoustic signal with 10 events.
Figure 9. Acoustic signal with 10 events.
Sensors 23 05792 g009
Figure 10. Spectrograms of four events: (a) speaking, (b) keys, (c) plastic shrinking, (d) footsteps.
Figure 10. Spectrograms of four events: (a) speaking, (b) keys, (c) plastic shrinking, (d) footsteps.
Sensors 23 05792 g010
Figure 11. Probability of a false alarm versus the scaling factor η .
Figure 11. Probability of a false alarm versus the scaling factor η .
Sensors 23 05792 g011
Figure 12. Keys’ acoustic signal with the STA/LTA algorithm decisions.
Figure 12. Keys’ acoustic signal with the STA/LTA algorithm decisions.
Sensors 23 05792 g012
Figure 13. Mobile App window.
Figure 13. Mobile App window.
Sensors 23 05792 g013
Table 2. Event’s average duration.
Table 2. Event’s average duration.
EventDuration (s)
Use of keys0.219
Falling of a small object0.1485
Shrinking a plastic bag1.036
Speaking0.2606
Footsteps0.29
Light switch0.0433
Dragging table0.5752
Wardrobe1.033
Open door0.38
Close door0.91
Average0.49
Table 3. Detection performance parameters of the first study. D, M, and F represent the number of actual, missed, and falsely detected events, respectively, whereas, SE, AV, and LE represent STA window sizes with 0.043, 0.49, and 1.036 s, respectively.
Table 3. Detection performance parameters of the first study. D, M, and F represent the number of actual, missed, and falsely detected events, respectively, whereas, SE, AV, and LE represent STA window sizes with 0.043, 0.49, and 1.036 s, respectively.
KeysSmall ObjectPlastic BagSpeakingStepsSwitch
DMFDMFDMFDMFDMFDMF
SE1008100101009100710061008
AV100910013100110010100320010
LE100710061001100610041005
Drag TableWardrobeOpen DoorClose DoorBackground
DMFDMFDMFDMFDMF
SE10051002110030100250018
AV10021008100101009002
LE1002100710071006004
Table 4. Detection performance parameters of the key signal.
Table 4. Detection performance parameters of the key signal.
STAk = 1k = 5k = 10k = 20
DMFDMFDMFDMF
SE = 0.0431808140411011000
AV = 0.491909190919091909
LE = 1.0361707160616061505
Table 5. Effect of step size on the number of false events.
Table 5. Effect of step size on the number of false events.
STAStep Sizek = 1k = 5k = 10k = 20
SE = 0.043148410
288100
428100
568000
Table 6. Estimated values of η and average computation time using the developed system and MATLAB code.
Table 6. Estimated values of η and average computation time using the developed system and MATLAB code.
RecordedBG #1BG #2BG #3BG #4BG #5Avg. Time (ms)
System2.11.952.22.252.25523.36
MATLAB2.11.952.22.252.251.71
Table 7. Number of detected events in the recorded data using the developed system and MATLAB code.
Table 7. Number of detected events in the recorded data using the developed system and MATLAB code.
RecordD #1D #2D #3D #4D #5
System55555
MATLAB55555
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Al-Khalli, N.; Alateeq, S.; Almansour, M.; Alhassoun, Y.; Ibrahim, A.B.; Alshebeili, S.A. Real-Time Detection of Intruders Using an Acoustic Sensor and Internet-of-Things Computing. Sensors 2023, 23, 5792. https://doi.org/10.3390/s23135792

AMA Style

Al-Khalli N, Alateeq S, Almansour M, Alhassoun Y, Ibrahim AB, Alshebeili SA. Real-Time Detection of Intruders Using an Acoustic Sensor and Internet-of-Things Computing. Sensors. 2023; 23(13):5792. https://doi.org/10.3390/s23135792

Chicago/Turabian Style

Al-Khalli, Najeeb, Saud Alateeq, Mohammed Almansour, Yousef Alhassoun, Ahmed B. Ibrahim, and Saleh A. Alshebeili. 2023. "Real-Time Detection of Intruders Using an Acoustic Sensor and Internet-of-Things Computing" Sensors 23, no. 13: 5792. https://doi.org/10.3390/s23135792

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop