Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD AND SYSTEM FOR SUPPORTING PASSIVE INTRUSION DETECTION IN INDOOR ENVIRONMENTS
Document Type and Number:
WIPO Patent Application WO/2021/018417
Kind Code:
A1
Abstract:
A method and a system for passively detecting intrusion in an indoor environment are disclosed. The method comprises establishing at least one communication channelbetween two mm-wave devices of a number of mm-wave devices deployed within the indoor environment. The method further comprises continously monitoring communication channel parameters, and using variations of the communication channel parametersto trigger an intrusion detection process.

Inventors:
SCIANCALEPORE VINCENZO (DE)
DEVOTI FRANCESCO (DE)
COSTA-PÉREZ XAVIER (DE)
Application Number:
PCT/EP2020/052176
Publication Date:
February 04, 2021
Filing Date:
January 29, 2020
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
NEC LABORATORIES EUROPE GMBH (DE)
International Classes:
G08B13/24; G08B25/10
Domestic Patent References:
WO2002082004A22002-10-17
Foreign References:
US20150302712A12015-10-22
US20100045457A12010-02-25
US20050156743A12005-07-21
US8730087B22014-05-20
US9185528B22015-11-10
US20030098791A12003-05-29
Other References:
J. PALACIOS ET AL.: "Communication-driven localization and mapping for millimeter wave networks", PROCEEDINGS OF IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (1ΛLFOCOM, 2018
Y. GHASEMPOUR, C. R. C. M. DA SILVAC. CORDEIROE. W. KNIGHTLY: "IEEE 802.11 ay: Next-generation 60 GHz communication for 100 Gb/s Wi-Fi", IEEE COMMUNICATIONS MAGAZINE, vol. 55, no. 12, December 2017 (2017-12-01), pages 186 - 192, XP011674416, DOI: 10.1109/MCOM.2017.1700393
K. HANEDA ET AL.: "A statistical spatio-temporal radio channel model for large indoor environments at 60 and 70 GHz", IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, vol. 63, no. 6, June 2015 (2015-06-01), pages 2694 - 2704, XP011582884, DOI: 10.1109/TAP.2015.2412147
C. SLEZAK ET AL.: "Empirical effects of dynamic human-body blockage in 60 GHz communications", IEEE COMMUNICATIONS MAGAZINE, vol. 56, no. 12, 2018, pages 60 - 66, XP055536648, DOI: 10.1109/MCOM.2018.1800232
S. HAWKINS ET AL.: "Outlier detection using replicator neural networks", PROCEEDINGS OF THE 4TH INT. CONF. ON DATA WAREHOUSING AND KNOWLEDGE DISCOVERY (DAWAK02). AIX-EN-PROVENCE, 2002
Attorney, Agent or Firm:
ULLRICH & NAUMANN (DE)
Download PDF:
Claims:
C l a i m s

1. A method for passively detecting intrusion in an indoor environment, the method comprising:

establishing at least one communication channel between two mm-wave devices of a number of mm-wave devices deployed within the indoor environment, continously monitoring communication channel parameters, and

using variations of the communication channel parameters to trigger an intrusion detection process.

2. The method according to claim 1 , wherein the mm-wave devices have directional communication capabilities through activation of different transmitting and receiving beam patterns, and wherein the at least one communication channel is established through a pair of beams that are activated during the communication.

3. The method according to claim 1 or 2, wherein establishing the at least one communication channel is based on a beamforming alignment process performed during a beam training phase.

4. The method according to any of claims 1 to 3, wherein monitoring communication channel parameters includes at least one of power measurements, received-signal-strength-indicator, RSSI, measurements, and signal-to-noise-ratio, SNR, measurements.

5. The method according to any of claims 1 to 4, further comprising:

exploiting power measurements performed by the mm-wave devices during a beam training phase to directionally sense the propagation environment.

6. The method according to any of claims 1 to 5, further comprising:

using a neural network for adaptively learning a statistical distribution of the communication channel parameters and for identifying variations of the communication channel parameters. 7. The method according to claim 6, wherein the neural network is trained with statistical measurement results of the communication channel parameters in a reference scenario with no disturbing influences being present within the indoor environment as well as when the indoor environment is occupied by one or more intruders.

8. The method according to any of claims 1 to 7, further comprising:

using the directional nature of mm-wave communication to perform directional channel variation sensing, and

based on the monitored directional channel variations, inferring a position of an intruder within the indoor environment.

9. The method according to any of claims 1 to 8, further comprising:

mapping a discovered variation of the communication channel parameters onto one or more specific emergency situations.

10. The method according to any of claims 1 to 9, wherein triggering an intrusion detection process includes generating an alarm.

1 1. A system for passively detecting intrusion in an indoor environment, in particular for executing a method according to any of claims 1 to 10, wherein a number of mm-wave devices is deployed within the indoor environment and wherein at least one communication channel is established between two mm-wave devices of the number of mm-wave devices, the system comprising a control unit having one or more processors, which, alone or in combination, are configured to provide for execution of the following steps:

continously monitoring communication channel parameters, and

using variations of the communication channel parameters to trigger an intrusion detection process.

12. The system according to claim 11 , wherein the mm-wave devices have directional communication capabilities through activation of different transmitting and receiving beam patterns, and wherein the at least one communication channel is established through a pair of beams that are activated during the communication. 13. The system according to claim 11 or 12, further comprising a data analytics engine that is configured to parse the monitored communication channel parameters and to capture mmWave channel variations.

14. The system according to any of claims 11 to 13, further comprising a deep neural network that is configured to automatically learn a reference channel environment of a given mmWave indoor deployment and, if an unexpected channel variation is detected, recognize whether it is due to the presence of an intruder.

15. The system according to claim 14, wherein the neural network is trained with statistical measurement results of the communication channel parameters in a reference scenario with no disturbing influences being present within the indoor environment as well as when the indoor environment is occupied by one or more intruders.

Description:
METHOD AND SYSTEM FOR SUPPORTING PASSIVE INTRUSION DETECTION IN INDOOR ENVIRONMENTS

The present invention relates to a method and a system for passively detecting intrusion in an indoor environment.

Intrusion detection is important for improving safety, for instance, for private house, public offices and specific areas. In general, intrusion detection systems are configured to signal the presence of intruders and to trigger an alarm capable of preventing any theft and/or damage by outsiders. Several commercial solutions are currently available by means of different technologies. Typically, such solutions require ad-hoc systems installed to detect and identify threats.

For instance, WO 02/082004 A2 discloses a dedicated device for motion detection that comprises an incoherent detector and a sensing element, which operates at millimeter wavelength. The dedicated device exploits the output of the incoherent detection to detect movements and trigger an alarm.

US 8,730,087 B2 discloses a passive radar for presence and motion detection. More specifically, presence and motion of intruders is detected passively by means of TM-UWB radars. This requires at least two Tm-UWB radars which are displaced according to the area to be protected and which monitor the changes in the propagation environment to detect the presence of an intruder and track its movement.

US 9,185,528 B2, which relates to Wi-Fi mapping and motion detection, discloses methods and systems that rely on a plurality of transceivers positioned so as to transmit and receive signals that pass through a portion of an area of interest. Movements of persons in the area of interest are determined by using the strength of the received signals and prior knowledge of building characteristics.

US 2003/0098791 A1 discloses a wireless security sensor system for windows and doors. The sensor, which is to be installed, e.g., in a window frame, monitors the window opening by means of a magnetic sensor, whose output is processed by a microprocessor and transmitted via an RF transmitter which enables wireless connectivity to the sensor.

In J. Palacios, et al.:“Communication-driven localization and mapping for millimeter wave networks”, in Proceedings of IEEE Conference on Computer Communications (iNFOCOM) 2018, the authors propose a‘Simultaneous Localization And Mapping’ (SLAM) algorithm which exploits beam-training to retrieve angle-difference-of-arrival information. This information is used to estimate the location of the mmWave APs and the position of the user in the surrounding indoor environment. The proposed solution requires that the user device is connected to a mmWave AP.

Basically, all prior art solutions discussed above prove to be disadvantageous in terms of certain aspects. In particular, the solutions have a common shortcoming, namely that they require the deployment of an ad hoc apparatus for detecting any intrusive behavior.

It is therefore an object of the present invention to improve and further develop a method and a system for passively detecting intrusion in an indoor environment in such a way that intrusion detection can be efficiently performed without the need of a dedicated apparatus.

In accordance with the invention, the aforementioned object is accomplished by a method for passively detecting intrusion in an indoor environment, the method comprising

establishing at least one communication channel between two mm-wave devices of a number of mm-wave devices deployed within the indoor environment, continously monitoring communication channel parameters, and

using variations of the communication channel parameters to trigger an intrusion detection process.

Furthermore, the above mentioned objective is accomplished by a system for passively detecting intrusion in an indoor environment, wherein a number of mm- wave devices is deployed within the indoor environment and wherein at least one communication channel is established between two mm-wave devices of the number of mm-wave devices, the system comprising a control unit having one or more processors, which, alone or in combination, are configured to provide for execution of the following steps:

continously monitoring communication channel parameters, and

using variations of the communication channel parameters to trigger an intrusion detection process.

According to embodiments of the invention, the mm-waves communication channel through off-the-shelf routers are exploited to continuously monitor propagation environment changes so as to detect intrusions. Specifically, intrusion detection capabilities and intrusion tracking capabilities may be provided via beamforming. In contrast to prior art solutions discussed above, embodiments of the invention do not require ad-hoc systems to detect an intrusion. In particular, embodiments may rely on the high penetration rate of the mm-waves devices in the societal behaviors, such as home routers, smart TVs, wearable VR Gaming Headsets, etc. This novel technology is widely deployed in private houses, offices and indoor environments, but so far has only been used to provide connectivity with very high capacity to deliver customized services. Embodiments of the invention pioneers the novel concept of passive intrusion detection by exploiting the directivity property of mm- waves antennas and the high-sensibility to environmental changes of the mm-waves communication channels.

Embodiments of the invention implement a passive channel variation detection process that relies on a directive mm-waves communication between two or more devices in an indoor scenario (based on beamforming alignment process). According to further embodiments, a deep neural network may be configured that adaptively learns the statistical distribution of the measurements in a specific environment and promptly identifies whenever there is a significant change, i.e. , an intrusion.

In a specific embodiment, a method for passively detecting intrusion in an indoor environment comprises the steps of establishing a connection between two or more mm-waves devices deployed in an indoor scenario. Channel parameters, such as RSSI and/or SNR, between each pair of mm-waves device beams are continuously monitored. A neural network may be trained with statistical parameters of the channel measurements in a reference scenario as well as when the environment is occupied by one (or more) intruders. The neural network may be fed with collected data, such as RSSI or SNR, and an alert indicative of an intrusion may be triggered when an environmental change is detected.

There are several ways how to design and further develop the teaching of the present invention in an advantageous way. To this end it is to be referred to the dependent claims on the one hand and to the following explanation of preferred embodiments of the invention by way of example, illustrated by the figure on the other hand. In connection with the explanation of the preferred embodiments of the invention by the aid of the figure, generally preferred embodiments and further developments of the teaching will be explained. In the drawing the only

Fig. 1 is a schematic diagram illustrating the general workflow of an intrusion detection system in accordance with embodiments of the invention,

Fig. 2 is a diagram showing statistical distributions of received power in an intrusion detection system according to the present invention, considering an empty environment (left side) and an occupied environment (right side),

Fig. 3 is a schematic diagram illustrating the general workflow of intrusion detection using a neural network in accordance with embodiments of the invention,

Fig. 4 is a schematic view illustrating a spatial intrusion detection accuracy of an intrusion detection system in accordance with embodiments of the invention,

Fig. 5 is a state diagram of an intrusion detection system in accordance with embodiments of the invention, Fig. 6 is a diagram illustrating empirical probability density functions (PDF) of received power measurements in accordance with embodiments of the invention, and

Fig. 7 is a schematic view illustrating a neural network architecture employed in accordance with embodiments of the invention, and

Fig. 8 is a diagram showing a cumulative distribution function of an intruder localization error.

As 5G deployments start to roll-out, indoor solutions are increasingly pressed towards delivering an enhanced performance, convenience, security, and user experiences not possible with today’s connectivity solutions. Wi-Fi is the predominant technology of choice indoors and major vendors started addressing this need by incorporating the mmWave band to their products. Specifically, with more than 80% of mobile data traffic originating or terminating indoors, service providers aiming at keeping pace with 5G are increasingly considering the mmWave technology for indoor locations as the solution to bring current WiFi products to the next level. As such, it is expected that mmWave devices will become pervasive in the near future. mmWave can elevate user experiences to new heights by bringing multi-Gigabit/s speeds, ultra-low latency experiences, and virtually unlimited capacity to a wide range of devices such as smartphones, tablets, AR/VR (augmented/virtual reality) headsets, and always-connected laptops.

On the standardization side, the IEEE 802.11 ad working group, also known as WiGig, already defined a solution delivering high-speed communication capabilities for devices operating in the mmWave frequency bands. Based on this standard, commercial off-the-shelf products are available today. The future IEEE 802.1 l ay standard (for reference, see IEEE P802.1 1 ay,“Enhanced throughput for operation in license-exempt bands above 45 GFIz,” IEEE 802.11 Working Group, Mar. 2019), currently under development, is being designed to provide up to 30Gbit/s of indoor capacity within 30 meters (for reference, see Y. Ghasempour, C. R. C. M. da Silva, C. Cordeiro, and E. W. Knightly, “IEEE 802.1 l ay: Next-generation 60 GFIz communication for 100 Gb/s Wi-Fi,” IEEE Communications Magazine, vol. 55, no. 12, pp. 186-192, Dec 2017).

The high data rates offered by mmWave systems compared to classical sub-6GHz Wi-Fi ones come at the price of much worse propagation properties. Attenuation is very strong at mmWave frequencies and thus, mmWave devices require a larger number of antenna elements so as to provide high spatial processing gains that compensate for experienced pathloss (for reference, see K. Flaneda et al, “A statistical spatio-temporal radio channel model for large indoor environments at 60 and 70 GFIz,” IEEE Transactions on Antennas and Propagation, vol. 63, no. 6, pp. 2694-2704, June 2015). These multiple antenna elements enable mmWave transmitters to electronically steer the radiation pattern providing spatial diversity to the communication channel. Moreover, strong multi-path features and high obstacle blockage sensitivity make mmWave communications very sensible to propagation environment changes.

With the above in mind, embodiments of the present invention relate to intrusion detection methods and systems which take advantage of the unique properties of mmWave communication channels to perform indoor intrusion detection in a passive manner, in addition to enable Gigabit/s data rates.

In particular, mmWaves can easily pass through common clothing materials and reflect on human bodies. Such reflected waves result in frequency variations that reveal discrepancies from expected communication channel properties measurements (e.g., power, noise, etc.). Thereby, detecting the potential presence of an unexpected person in an indoor environment. In order to do so, according to embodiments, a data analytics engine can carefully parse the monitored data and capture mmWave channel variations. Deep neural networks can then automatically learn the reference channel environment of a given mmWave indoor deployment and, if an unexpected channel variation is detected, recognize whether it is due to the presence of an intruder. Furthermore, the directional nature of the mmWave signal enables a localization feature by sounding the channel on different directions and determining the position of intruders without requiring any active connection. Fig. 1 illustrates a general system workflow according to an embodiment of the invention. As already mentioned above, the new technology utilized by the present invention relies on mm-waves communication channels and is conventionally called Wi-Gig based on the standard IEEE 802.1 1 ad. In particular, Wi-Gig-enabled devices (sometimes herein also referred to as mmWave devices) work at high frequency with 60 GHz bandwidth. The devices are equipped with antenna arrays that provide directional communication capabilities to the devices while focusing the communication towards a particular direction based on the beam pattern. Different beam patterns are properly defined in devices’ codebooks, as will be appreciated by those skilled in the art.

Each Wi-Gig devices pair has to establish a connection through a pair of beams that are activated during the communication, as exemplarily depicted at 1 10 in Fig. 1 for a pairwise connection between a first mmWave device 1 (denoted STA) and a second mmWave device 1 (denoted AP). The beam pattern selection is made by means of a Beam Training phase, wherein devices take measurements of the received power provided by each beam in the codebooks. Based on such measurements, devices are able to select the best beam that is used for future communications with a respective other device.

Millimeter wave propagation is strongly influenced by the propagation environment itself, thus the presence of an intruder can radically change the propagation conditions, which translates into changes in measurements outcome of the beam training phase. Therefore, according to embodiments of the invention, the measurements taken during the beam training phase are exploited to directionally sense the propagation environment. Specifically, embodiments of the invention exploit the power measurements performed by mm-waves devices during standard operations. These measurements may be utilized to detect propagation environment changes and to passively sense intrusions in the area under intrusion control.

According to a further embodiment of the invention, a further functionality is added, which makes Wi-Gig devices capable of providing intrusion detection service to work alongside the connectivity provisioning. In addition, propagation environment changes may be mapped into other emergency situations, such as water leakage, fire, which can be advertised in time to allow emergency recovery.

Embodiments of the invention require that multiple (at least two) Wi-Gig devices are statically deployed within the indoor environment that is to be controlled in terms of intrusion detection. Furthermore, at least two of the multiple the Wi-Gig devices have to establish a successful connection between each other. For example, as shown in Fig. 1 , the deployed Wi-Gig devices may include a Wi-Gig access point (AP) providing connectivity for another Wi-Gig device acting as a station (STA), such as a smart TV. Flowever, as will be easily appreciated by those skilled in the art, this requirement does not prevent the access point from regularly providing connectivity to other devices placed in the environment following normal connection procedures.

Those devices perform the Beam training phase according to the IEEE 802.1 1 ad standard protocol, as shown at 1 10 in Fig. 1 , and the measurements performed during the beam training are then collected (as shown at 120) and processed to track the channel variations per each tx-rx beam pair (as shown at 130). Measurement values might include (but not limited to) power measurements, Received-Signal-Strength-Indicator (RSSI), Signal-to-Noise-Ratio (SNR). The statistical mm-waves channel variation is then used to trigger the intrusion detection process, as shown at 140 in Fig. 1.

Different propagation environments may provide distinct channel statistics. If an intruder breaks into the area, this will automatically change the measurement statistics. Against this background, according to embodiments of the invention, the measurement statistics are continuously monitored and, in case of detecting a change of those statistics, the presence of an intruder in the respective area under surveillance (e.g., a room) can be inferred and eventually an alarm can be triggered.

Fig. 2 schematically illustrates an overview of a channel statistic measurement process according to an embodiment of the invention. While part a) on the left side relates to the case of a static environment without any intrusion, part b) on the right side relates to the present of an intruder moving in the respective room. The upper diagrams of Fig. 2 schematically illustrate the beam training phase of two Wi-Gig devices, STA and AP. Each of the devices has six different beam characteristics (denoted O’-‘5’). The diagrams in the middle of Fig. 2 illustrate an example of a series of SNR measurements for a given couple of transmitting and receiving codebook activation. Statistics are collected over time and statistical distributions are drawn to properly monitor the environment, as shown in the lower diagrams of Fig. 2.

From the diagrams on the right side, the effect of the presence of an intruder moving in the room under surveillance can be obtained. Such an intruder in the covered environment perturbates the propagation environment and this, in turn, is translated into a noticeable difference in the measured SNR for a given couple of activated beams. Different beam pairs provide different statistics showing a distinct sensibility to the environmental changes in different areas of the room depending on their beam pattern. Embodiments of the invention consider the Beam training measurements per each activated beam pair taken in different time windows. While constructing the statistical distribution, a change in the distribution parameters will be detected, such as the mean value m or the variance s of the SNR, which might lead to an intrusion detection event.

Fig. 3 schematically illustrates a workflow according to an embodiment of the present invention that relates to a system with mm-waves routers deployment to support intrusion detection in indoor environments. Specifically, the embodiment relies on the commercial Wi-Gig devices, namely access points, regularly deployed in an indoor environment. Considering each device with a codebook of 36 different selectable beam configurations for transmission and one beam pattern for reception, the beam training phase may be executed for a pair of devices while collecting RSSI and SNR measurements, as shown at 310. As also shown at 310, such data is organized in a dataset 30 and properly labeled according to the status of the environment, i.e. either undisturbed (i.e. empty environment) or disturbed (i.e. with an intruder in the environment).

As shown at 320, the data collected in the dataset 30 during the beam training phase is used to train a Feed Forward Deep Neural Network Classifier 32, which is in charge of learning the different measurement statistics, both in the case of an empty environment and in the case when an intrusion has occurred. After the training phase, the system is ready to operate. New measurements, collected during regular operation as depicted at 330, are continuously fed in to the Classifier 32, as shown at 340. The Classifier 32 is in charge of detecting any environmental change and triggering an alarm in case of detecting an environmental change, as shown at 320. The alarm is indicative of an intrusion event.

As an example, schematically shown in Fig. 4, an intrusion detection system in accordance with embodiments of the invention has been implemented using four commercial Tp-Link Talon ad7200 Wi-Gig devices (denoted T1 , ..., T4) that are installed in an indoor environment 40 (which, in the example, is an office space 42). After a short training period using an emulated dummy body on different locations within the office space 42, measurements of the communication channel parameters were continuously executed, triggering an alarm only when an intrusion is detected (i.e. in case of detecting variations in the monitored communication channel parameters).

Specifically, Fig. 4 shows the measured intrusion detection accuracy in such an environment for different areas of the office space 42. In this particular example only routers T3 and T4 (one acting as an access point whereas the other acting as a common Wi-Gig station) are connected and monitoring the office space 42.

Another embodiment of the present invention relates to a system with mm-waves routers deployment to passively localize an intruder in indoor environments. In this context, it is important to note that the highly directional nature of mm-wave communication can provide highly directional channel variation sensing. This means that different beam patterns are capable to sense channel variations caused by different positions of the intruder.

Consequently, according to an embodiment the directional channel variations are monitored and, based on the monitored variations, the position of an intruder within the indoor environment is inferred. For instance, a Deep Neural Network (for instance, a Deep Feed Forward Neural Network) may be implemented that takes the power measurements performed during the Beam Training phase as input and provides an estimation of the position of the intruder within the indoor environment (e.g., the office area of Fig. 4) as output. This embodiment requires as training data the collection of measurements associated with the coordinate (ground truth) of a dummy intruder in the indoor environment, and a training phase of the deep neural network. After this phase, new measurements can be fed into the Deep Neural Network, which provides an estimation of the intruder’s position in the office. In an exemplary implementation in an office scenario using 4 commercial Tp-Link Talon ad7200 Wi-Gig devices it was possible to obtain an accuracy of 1.4 meters in a 5x10-square-meters office.

As already mentioned above, in order to detect channel anomalies within an indoor reference environment, a mmWave channel monitoring phase is required. In particular, power measurements on an established mmWave link must be regularly collected and analyzed to detect unexpected changes. Following the IEEE 802.1 1 ad protocol guidelines, power measurements are regularly performed during the beam training phase, i.e. , when two mmWave devices seek for which beam to activate providing the best channel quality.

IEEE 802.1 1 ad (and its evolution 802.1 lay) covers many relevant aspects to establish and sustain a communication link between mmWave-enabled devices. To provide the required beamforming capabilities, such devices are equipped with electronically steerable antenna arrays controlled by predefined weights vectors included in a codebook that may automatically activate different transmitting and receiving beam patterns. A specific codebook must be selected for transmitting or receiving operations to activate the communication and establish the connection.

The beam pattern activation is performed by means of a complex Beam Forming Training phase. During this phase, the so-called initiator transmits Sector Sweep (SSW) frames, whereas the responder collects power measurements. As soon as the initiator has probed all available beam patterns by selecting available weights vectors in the codebook, in turn, the responder can start the sector sweep procedure letting the initiator collecting power measurements. This procedure is activated during the association phase being periodically repeated to properly adjust the beam selection during the communication and prevent connection disruptions due to an unexpected signal drop. The entire procedure allows to instantaneously obtain a snapshot of the environment by exploiting the spatial diversity while at the same time considering the best communication path to establish the connection.

Note that, due to the millimeter waves high frequency, their propagation is strongly influenced by the environment itself, including human bodies, walls and even glass objects, which can seriously hamper the signal propagation (for reference, see C. Slezak et al.:“Empirical effects of dynamic human-body blockage in 60 GHz communications”, in IEEE Communications Magazine, vol. 56, no. 12, pp. 60-66, 2018). Thus, the presence of an intruder in the environment can change the propagation conditions, although it might not completely obstruct the communication path between a pair of mmWave nodes. Notably, intruders might have a strong influence on the propagation environment that translates into relevant changes in the beam training measurements outcome. Therefore, the power measurements performed by mmWave devices during standard operations can be exploited to build a complete sensing map of the propagation environment and promptly capture unexpected variations.

Hereafter, a mmWave communication system is considered that consists of multiple mmWave-enabled 802.1 1 ad devices, which can exchange data while periodically performing the beam training phase according to the 802.1 1 ad guidelines. Embodiments of the invention focus on the effects produced by propagation environment changes onto the received power measured by those devices.

The short wavelength characterizing mmWave propagation translates into a quasi- optical propagation behavior. As a consequence, objects which lie in the propagation environment can provide communication blockages as well as a large number of reflected paths that can sustain the communication, especially in indoor environments. Therefore, embodiments of the invention assume mmWave propagation to be a multi-path communication and describe the communication channel with a geometrical model that takes into account the multi-path profile of the environment as follows: wherein L is the set of paths constituting the multi-path profile, co is the complex gain of the /-th path. ai x and a R x are the array steering vectors of the transmitting and receiving device, respectively, which account for the physical characteristics of the arrays, while Ft c, i and OR X J are the angle of departure and the angle of arrival of the /-th path.

Such devices are provided with a default beam codebook of a set P = (p,) of weighting vectors. Different weighting vectors identify distinct beam patterns activated by each device. During the beam training phase, each of the weighing vectors in the transmitter and receiver codebooks, namely Ptx and P™, are sequentially selected and applied to the steering vector of the devices. Based thereupon, one can define the set of available pairs of beams as follows:

B = {( i,j) \pi e Pt x, pj e Prx}

Considering the activation of a given couple of transmitting and receiving beams (i, j) e B, one can describe the overall communication gain g provided by (i, j) as follows: wherein p, e Ptx and p j e R,c are respectively the ith and the jth weighting vectors defined in the transmitting and receiving codebooks of the devices.

It is worth pointing out that the activation of different beam couples provides very different overall communication gains as different weighting vectors pi are designed to be directional and therefore to emphasize different communication directions. This enables the spatial diversity in the power measurements campaign considering different directions and covering a 360°-angle from the device perspective. As mentioned above, devices are periodically performing the beam training phase, wherein beam patterns are sequentially activated to retrieve power measurements so as to select the best beam for sustaining the data transmission. Analytically, per each beam training phase /, one gets a sample of the received power associated to the beam pair (i, j) e B: zϋ = W Tc + GO + X'i wherein Wtc is the transmission power, G'i is the overall communication gain expressed in dB, and X'i is a random variable that takes into account the non-ideality of the communication channel. The samples of the random process zϋ for each selected beam pair can be gathered in a matrix zί = (z^). Based thereupon, the expected mean value m and variance s of the received power distribution per each couple (i, j) e B by can be computed, representing the power distribution in the standard environmental conditions, i.e. with no intrusions being present.

In case of an intrusion event that occurs when a person moves inside the propagation environment, embodiments of the invention draw one or more of the following three observations: i) due to the hydrophobic millimeter-wave behavior, the presence of an intruder may completely block some of the paths I e L between the transmitter and the receiver, ii) the flat surfaces that characterize most of the fixtures in the environment might act as wave reflectors: the intruder might permanently move them thereby disrupting some existing path while building new communication channels, iii) a moving person acting as an intruder continuously moves around intermittently blocking some of the communication paths. Such changes in the propagation environment translate into a tangible multi-path profile change that reflects the modifications of the received power statistics both in terms of average and variance.

According to an embodiment, in order to detect such changes, i.e. unexpected data measurements, a density estimate based on a non-parametric kernel estimate function, namely a ground truth density is performed. For instance, this kernel estimate function may be set up in accordance with the approach described in S. Hawkins et al.: Outlier detection using replicator neural networks,” in Proceedings of the 4th Int. Conf. on Data Warehousing and Knowledge Discovery (DaWaK02). Aix-en-Provence, 2002. In this way, measurement values differing from the ground truth density are labelled as outliers. However, when no assumptions are taken about the distribution of the measurements, outlier detection is only feasible by comparing the estimated density of a given measurement value to the average density of its neighbors, namely unsupervised outlier detection method.

While such outlier detection process helps to recognize the next environmental change, it is necessary to identify the current status of the system based on the data collected within a certain measurement time window in order to trigger an alert for potential intruders. According to embodiments, two main system states may be defined: i) a state 50“intrusion detected” and ii) a state 52“no intrusion detected”, as shown in the state diagram of Fig. 5.

As will be appreciated by those skilled in the art, the continuous presence of an intruder within the environment may conditionally change the overall power measurements, which may exhibit altered distribution parameters m and å as described above. This would result, in turn, in upcoming power measurements distributed according to the new distribution statistics revealing no further outliers. Therefore, according to embodiments of the invention, the system does not rely only on the outlier detection process to determine the current system state as it might fail while trying to capture diverging behaviors. Instead, a new system state (denoted Similarity check 54 in Fig. 5) that accounts for such an intermediate state may be introduced. This state is entered as soon as no further variation is retrieved, i.e. , when no power measurement is marked as an outlier.

If no outliers are detected within an entire measurement time window T k , a distribution similarity process is executed. In particular, this process compares the expected mean values m and variances s of the received power within the previous measurement time window T against the distribution parameters of a reference scenario. It should be noted that the reference measurements distribution strongly depends on the selected environment and must be taken in advance when the environment is not occupied by any human presence (labelled as reference environment 56 in Fig. 5). In case the distribution of measurements in 7*- is found to be similar to the distribution of measurements taken during the reference scenario, this places the system in the“No intrusion detected” state 52, as shown in Fig. 5. Otherwise, the intrusion state 50 is entered again.

Different applied settings might result in different system behaviors. As such, embodiments of the invention take into account one or more of the following aspects: i) a larger measurement time window T k might capture better the channel dynamics and properly recognize the outlier, but it might return a biased set of distribution statistics that might impair the overall similarity process; ii) the measured variance shall be weighted higher than the measured mean value as the variance is a meaningful feature that better describes the data distribution, iii) a detection threshold value D shall be automatically selected as it may lead to reduce the sensitivity of the system to the possible intrusions (when set to low values) while triggering often an alarm (when set to high values) and, iv) the power measurement statistics is assumed as normally distributed which makes the analysis tractable, deviations on this assumption would affect the solution effectiveness.

Regarding the power measurement statistics assumption of being normally distributed, Fig. 6 shows the empirical probability density function (PDF) of power measurements taken with real devices for three different beams in a room with no intruders. As it can be observed, although the multiple beams exhibit different distributions showing how the spatial diversity affects the mmWave communication channels, they can be reasonably mapped to normal distributions with different variance and mean values based on the selected transmission beam.

The intrusion detection solution described so far effectively works for static scenarios where intruders enter an area without modifying the environment. Flowever, when considering an intruder considerably changing the structure of the indoor environment (e.g., moving furniture or introducing new static objects) the reference environment may significantly change its power measurements distribution leading to a ping-pong effect between the “intrusion detected” and “similarity check” system states. In such a case, even though the room might have no intruders anymore and no outliers are detected, the power measurements distribution within the last measurement interval T may differ from the reference scenario in To. To overcome this problem and make the solution able to dynamically learn about room structure changes, embodiments of the invention introduce a machine-learning module responsible of updating the reference environment when required.

To make the intrusion detection solution robust to indoor mmWave environment changes, a machine learning-based solution may be realized which, by means of a training process, is able to automatically approximate the system model described above. The advantage of a self-learning approach versus a parametric model-based solution is multifold: i) the distribution of the power measurements can radically change according to the specific deployment environment, thus the setting parameters have to be properly tuned for each indoor environment to successfully detect intrusions; ii) the indoor environment structure can change (e.g., furniture moved), resulting in a new reference environment that must be identified preventing the system to enter into a deadlock between the non-intrusion and similarity check states; iii) the multivariate Gaussian assumption of the power measurements might not hold if the number of transmission paths is not sufficiently high or in case of non linearity in the devices’ power measurement unit.

As already mentioned above, according to embodiments of the invention, a Deep Convolutional Neural Network Classifier architecture 70 is adopted, as depicted in Fig. 7. For each time interval k, a set of power measurements S k taken within measurement time window r k is organized as a matrix I k e R BxT (forming the input 72) such that columns of I k contain the measurements vector V at the time t e r , whereas rows represent the temporal evolution of each element of V within the measurement time window r k . The convolutional layer 74 has a kernel with T x 1 size and it is used to reduce the dimensionality of the input layer 72. Given the dimensions of the kernel, one can write the output of the convolutional layer 74 as the following: fk = y (Ik w) wherein relative to each beam couple (i,j) e B, y (-) is the re/u

activation function and w is the set of weights of the convolutional layer 74. The idea is to exploit the convolutional layer 74 to find an ad-hoc weighting vector w, which is able to translate the temporal evolution of V into a lower dimensional feature space that represents the intrusion phenomena and, at the same time, keeps separated the contributions of each couple (i,j) e B. The output of the convolutional layer 74 is a vector with B x 1 size. According to an embodiment, this vector is fed into a deep fully connected neural network comprising a 9-neurons layer 76 followed by a 2-neurons output layer 78 with relu and softmax activation functions, respectively. Such layers 76, 78 carry out the classification process. Additionally, the output neurons provide a score, which represents the conditioned probabilities Pr(intrusion\\ ) and Pr (intrusion^ ) by means of the soft-max activation function. Therefore, the output neuron that maximizes the score represents the chosen output class inferred by the system.

A key feature of the presented neural network 70 is that, if the training set is provided with a sufficiently different number of indoor scenarios, the convolutional layer 74 can learn to extract features which are relevant to detect intrusion events independently on the environment itself. The variety of the training data affects also the classification part of the network that is able to generalize the classification process. This translates into a system which is portable and does not require an initial adaptation to the specific area of interest as long as the mmWave devices relative positioning is kept.

Embodiments of the present invention also relate to intruder localization within an area under surveillance. Given the directional nature of the mmWave communication, it is possible to exploit the measurements taken during the beam training phase to sense the propagation environment towards specific directions. Specifically, one can, alongside the intrusion detection, map the changes sensed by the different beams onto the (potential) location of the intruder inside the area of interest (e.g., within the office).

An embodiment of the invention relates to implementing a variation of the neural network-based solution. First, it is important to note that in the context of intruder localization, there is no interest in the temporal evolution of the received power. Conversely, it is assumed that an intrusion occurred, hence, the method should aim at mapping in the received power measurements into the location of the intruder in the area. This can be achieved by adopting a different neural network architecture with respect the one described above. Specifically, embodiments consider a deep neural network with an input layer with the dimensionality of the vector f, followed by an L-neurons hidden layer and a 2-neurons output layer. As activation functions, tanh may be selected for the hidden layer and Hnear\ox the output one.

Fig. 8 depicts the obtained results after having trained neural network with a batch size of 1000, a number of 100 epochs, a learning rate of 0.0001 and Adam optimizer. Fig. 8a shows the intruder localization performances with 1 hidden layer network with different number of neurons, while Fig. 8b shows the localization performances achieved by keeping the hidden layer size at 8-neurons and changing the depth of the network. Results are showing that localization performances can be achieved with a sub-meter precision for the 70% of the cases, and that increasing the complexity of the network does not help to improve localization performances. Therefore, low complexity architecture which can fit in the limited hardware of commercial off-the-shelf devices is sufficient to effectively exploit directional power measurements to estimate the intruder location.

To summarize, embodiments of the invention disclosed herein may relate to one or more of the following aspects:

- analytical modeling of mmWave channel variation outliers detection by monitoring and analysis of gathered power measurements;

- distribution similarity process comparing regularly obtained sample channel monitoring measurements against a reference environment without intruders;

- design of a deep neural network that continuously keeps track of real-time channel measurements and triggers an alert message when an intrusion is detected;

- localization of intruders within a given indoor reference channel environment;

- implementation of an intrusion detection mechanism as a stand-alone software running in off-the-shelf mmWave routers and feasibility validation in an office scenario. Many modifications and other embodiments of the invention set forth herein will come to mind to the one skilled in the art to which the invention pertains having the benefit of the teachings presented in the foregoing description and the associated drawings. Therefore, it is to be understood that the invention is not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.