We stressed that security professionals who have to select a technology should look at strengths and weaknesses with regard to specific criteria including:
- the probability of detection (PD)
- the vulnerability to defeat (VD)
- the false alarm rate (FAR)
- the nuisance alarm rate (NAR)
We examined the first four of thirteen categories of sensor technology: Ported coax; Fence Disturbance; Microwave and Passive Infrared (PIR).
Here we continue with a look at the remaining eleven categories of sensor technology ...
The PD of infrared beam sensors can be affected by weather conditions that cause reduced visibility, such as heavy snow, sheeting rain, fog, blowing sand and dust. Animals, flocks of birds, blowing debris and leaves, and reflected sunlight from shiny surfaces can affect NAR. The vulnerability is rated as high because of the ease of tunnelling under or bridging over the beams.
Recent developments include using DSP to enhance detection and minimise NAR, and improvements in the insulators and insulator types that support the wires. NAR can be affected by rain, snow, ice coating of the wires, fence motion and animals. Electrical grounding of the sensor and the mounting poles is required for a low NAR. This technology is considered to have a medium VD level because of the possibility of bridging over or tunnelling under the detection field.
Taut wire has the lowest NAR of any sensor technology. Animals and ice loading can contribute to NAR. Installation often includes a buried concrete wall to prevent tunnelling. The wire tension has to be checked twice a year. This technology is considered to have a medium VD level because of the possibility of bridging.
Sources of NAR include wind, heavy rain, wet snow, animals and flocks of birds. PD can be affected by installation quality. This technology is considered to have a medium VD level.
Seismic sensors are buried to detect vibration to the soil caused by an intruder. A typical sensor consists of a set of coils and magnets called "geophones". During a seismic disturbance, caused perhaps by an intruder walking, running or crawling over the sensor, an electrical current is generated by the coil and magnets, signalling an alarm. The technology is classified as passive, covert, terrain following, volumetric and buried.
The security professional must be careful to look at the full life-cycle cost - the cost of ownership - when selecting a system
The PD can be affected by soil conditions, especially frozen ground. The movement of a number of large animals, the movement of tree roots, fences and poles because of wind, and the disturbances caused by nearby vehicles all contribute to NAR. This technology has a medium VD because, although difficult to detect, if its location is known, it can be easily bridged.
Combining Sensor Technologies
The wide range of intrusion detection sensor technologies exists to allow security professionals to match the most appropriate technologies to specific site requirements. For high security applications, technologies are often used in combination – either to provide higher levels of PD performance or to reduce FAR/NAR or VD.
The alarm information from two sensor technologies is usually combined in one of two ways. The first way is to declare an alarm only if BOTH sensors go into alarm either simultaneously or within a pre-defined time window. This is referred to as an "AND" configuration. The second way is to declare an alarm if EITHER sensor goes into alarm. This is referred to as an "OR" configuration.
Sensors are connected in an AND configura-tion primarily to lower the NAR, because environ-mental effects have to trigger both sensors before an invalid alarm is declared. However, the PD is lowered and the VD is made worse because a missed detection or the defeat of either sensor results in no alarm. Each sensor in this configuration must have both a very high PD and a very low VD.
Sensors are connected in an OR configuration primarily to use their complimentary strengths, i.e. the strength of one technology covers or makes up for the weakness of the other and vice versa. In this case, the PD is higher because, in effect, there are two chances to catch the intruder. VD is lower because both sensors would have to be defeated to beat the system. However, NAR is higher because either sensor can report an environmental alarm. The key is to select sensors with complimentary strengths and good NAR performance.The most common combination available in a single package and used outdoors employs PIR and monostatic microwave using an AND configuration. Other possible combinations in separate packages include: active infrared / bistatic microwave; fence disturbance /ported coax; and fence disturbance /bistatic microwave.
Testing
Due to the wide range of environmental conditions encountered in outdoor security applications, it is difficult to obtain quantitative performance data. Summary tables, such as those included here, can be used to select the appropriate technologies best matching the specific terrain, environmental conditions and threat level for the site. However, in their decision-making, security professionals also have to rely on site references, the reputation of the manufac-turer, and the results of long-term testing, typically conducted over several seasons, and published by independent testing agencies such as Sandia National Labs in the US or PSDB in the UK.
Most, if not all, sensor technologies can reliably detect an upright walking intruder, but there is a wide variation in performance for other types of intrusions. In addition, each technology has its own particular performance in response to a range of common invalid alarm sources. So understanding the strengths and weaknesses of each technology is critical to success.
Assessment and Response
Proper assessment and timely response are often the keys to a successful outdoor perimeter security system. There is little efficiency in having a highly sophisticated detection system if the alarms that are received are not properly assessed and/or if the response is too little or too late to be effective.
Most, if not all, sensor technologies can reliably detect an upright walking intruder, but there is a wide variation in performance for other types of intrusions
CCTV is the most common tool for assess-ment. It is also very safe and reliable, provided there is full perimeter coverage day and night. Some sites prefer to employ local personnel to assess all alarms, but a high dispatch rate can lower the efficiency of the assessment.
Response should be initiated only after assessment has identified an unauthorised intruder.
The response should be in time to apprehend the intruder if at all possible, or at least to prevent the intruder gaining access to the assets being protected.
Turning on lights and a siren may work to scare off an unsophisticated intruder at first, but without a human response as well, they quickly learn to ignore these indicators.
It is worth noting that many knowledgeable intruders prefer not to try to defeat the sensors but to attack poorly designed assessment and response capabilities.
Costing
In addition to providing higher levels of security (e.g. by increasing the standoff distance against explosive devices), outdoor security systems can also provide a significant financial payback by reducing the dangers and costs of manned guarding. However, the security professional must be careful to look at the full life-cycle cost, often referred to as the "cost of ownership", when selecting a security system for a specific application. The major components of life-cycle cost are initial equipment acquisition, installation and ongoing maintenance.
The acquisition cost of a single sensor can be misleading without considering a number of factors. Site terrain is one. In rough terrain, line-of-sight sensors can be prohibitively expensive because more of them are required to provide complete detection coverage. The total cost may be less using fewer, more expensive terrain following sensors. The sensor installation type is another major factor. Visible sensors, because they are relatively easy to defeat, are more cost-effective for low security applications where the intruder is unsophisticated. Otherwise, multiple sensors of different technologies must be used. For high security applications, covert sensors are more cost-effective, as they have the lowest number of vulnerabilities and can be used alone. The cost of the assessment system (e.g. CCTV) and the alarm integration system must also be included. Installation costs can exceed the acquisition cost of the equipment. Such factors as site preparation (e.g. levelling the ground for line-of-sight sensors, or digging a trench for a buried sensor), providing power to the sensors, and providing a means to communicate alarm information back to a "head end" must be considered.
The installation costs of a CCTV system with adequate lighting can also be significant.
Maintenance costs
Ongoing maintenance costs are often forgotten in annual budgets after the installation of the perimeter security system. Ongoing maintenance refers not only to the sensor system but also to the site. Sensor maintenance should include cleaning, testing and recalibration on a regular basis. Site maintenance can be critical to keeping environmental alarms as low as possible. Site maintenance can include cleaning up debris, leaves and snow, cutting grass, removing vegetation from fences, keeping fences in a good state of repair, and removing objects that would allow an intruder to hide from detection or assessment.
Conclusion
Outdoor perimeter intrusion detection is one of the most challenging fields in the security industry. Operating a successful system is as much selecting the right sensor technology for the application as managing and controlling the FAR/NAR to a manageable level so that the system does not get turned off or, worse, ignored.
Modern technological advances and years of real world experience have refined the art of designing and applying sensors in the outdoor environment, making it possible for security professionals to be confident in their outermost defenses.
Source
Security Installer
No comments yet