Human Intrusion Detection Using Wi-Fi or ZigBee RF Signals
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Review Papers | Computer Science & Engineering | India | Volume 5 Issue 3, March 2016

Human Intrusion Detection Using Wi-Fi or ZigBee RF Signals

Ronak Gune

Wi-Fi is a wireless networking technology which allows two or more users to connect to each other or connect to the internet within a particular area. Wi-Fi thus enables a number of devices to communicate with each other using Radio Frequency signal which helps to use a lot of advanced services to be provided to the user. In the proposed system RF signals form Wi-Fi and ZigBee sensor nodes were used and the received signal strength indicators (RSSI) were used as a test to detect the presence of human beings in an indoor environment. This system can be used as an actual alarm for detection of physical intrusion in a certain area and also can be used to save energy and reduce costs on a large scale.

Keywords: Alarm, Intrusion Detection, RSSI, ZigBee, Wi-Fi

Edition: Volume 5 Issue 3, March 2016

Pages: 1394 - 1396

Share this Article

How to Cite this Article?

Ronak Gune, "Human Intrusion Detection Using Wi-Fi or ZigBee RF Signals", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV162200, Volume 5 Issue 3, March 2016, 1394 - 1396

116 PDF Views | 86 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Alarm'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2161 - 2168

Vision Based Fire Flame Detection System Using Optical flow Features and Artificial Neural Network

Anila R. Kurup

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2550 - 2556

Detection and Prevention of Misbehaving Node using PDA and Enhanced 2ACK Scheme

Anil Rathod, Sherly Noel

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1167 - 1170

Secured Location Based Bus Route Locator Application for Android Mobiles

Dayanand G Savakar, Ravi Hosur

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1071 - 1074

A Literature Survey on ?Disaster Monitoring & Alarming System for Mountain Foothills?

Pallavi T. Dhotre

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

Similar Articles with Keyword 'Intrusion Detection'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1317 - 1319

A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN

Chaitanya Sharma

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2085 - 2089

Implementation and Analysis of DoS Attack Detection Algorithms

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1689 - 1692

ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems

Vinod Kumar, Syeda Asra, Yallappa Meti

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 1758 - 1764

Data Transfer Based on Between the Node Coverge Area Using Diffe-Hellman Key Algorithm in Adhoc Network

T. Sankar, M. Prakash

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1317 - 1328

An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Shaik Shanawaz, K. Thyagarajan

Share this Article

Similar Articles with Keyword 'RSSI'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2319 - 2322

Indoor Tracking Using Wi-Fi Routers on a Smartphone

Rutujit K. Diwate, D. N. Rewadkar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1394 - 1396

Human Intrusion Detection Using Wi-Fi or ZigBee RF Signals

Ronak Gune

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1045 - 1051

Detecting Sinkhole and Selective Forwarding Attack in Wireless Sensor Networks

Umashri Karkikatti, Dr. Nalini N

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2434 - 2437

An Efficient Packet Loss Avoidance Mechanism in MANETs

Biradar Prashant D, Satish Kumar N

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 863 - 867

Mitigation of Sybil Attack Using Location Aware Nodes in VANET

Dalbir Singh, Manjot Kaur

Share this Article

Similar Articles with Keyword 'ZigBee'

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1907 - 1909

Smart Car Parking by Considering Pricing and Reservation

Linta John, Sreelakshmi K, Anju Rachel Oommen

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1394 - 1396

Human Intrusion Detection Using Wi-Fi or ZigBee RF Signals

Ronak Gune

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 2115 - 2119

An Energy Optimized Wireless Sensor Networks using Automatic Irrigation system

Pravina B. Chikankar, Soumitra S. Das

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 354 - 356

Secure Routing to Prevent Sybil Attack in Sensor Networks

Mohammed Abrar, P. Subhadra

Share this Article

Similar Articles with Keyword 'Wi-Fi'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1952 - 1955

Ultra Wideband on High Speed Wireless Personal Area Networks

A. S. Syed Navaz, G. M. Kadhar Nawaz

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2338 - 2340

Remotely Counsel and Governing WLAN through Wi-Fi Enabled Android Device

Rohit Goudagaon, Harshal Pingle, Pankaj Jadhav, A. S. Sondkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2591 - 2595

DASU: High Quality Video Streaming Over Multiple Wireless Access Network Using Real Time Adaptive Algorithm

Prathibha T P

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1579 - 1582

MANET, Security Attacks and Routing Protocol: A Survey

Navanpreet Kaur, Harjit Singh

Share this Article
Top