Part 1 of a primer on outdoor perimeter protection by Michael E Rack, Vice president, Marketing and Business Development, Senstar-Stellar Corporation
Outdoor perimeter intrusion detection sensors have been around for several decades now. Originally developed for use by military and government agencies, outdoor sensors were initially extremely expensive and out of reach of the commercial market. They were also quite unreliable because technology had not developed to a point where the sensors could be counted on to work in varying weather and climatic conditions.

Outdoor sensors started to receive widespread consideration in the general marketplace about ten years ago. Refinements, especially in digital signal processing (DSP), had and continue to enhance performance both in detection and in the rejection of environmental and other non-threat sources. Costs also came down significantly, allowing commercialisation of the sensors.

The paradigm of perimeter protection has changed. More efficient use is being made of the human element in the total security system: monitoring the security systems, making decisions based on the information provided and providing the response force instead of being a sentry posted along the perimeter. Today's security professional can choose from a range of intrusion detection sensor technologies to address the spectrum of threat scenarios, environmental conditions, site constraints, nuisance alarm considerations and federal and state regulations.

The Basics
There are five basic elements in an outdoor perimeter security system –

  • Deter: The perimeter should be designed in such a way as to clearly indicate the boundaries of the protected area, while discouraging easy access to that area.

  • Detect: When access to the protected area does occur, the outdoor perimeter sensor system provides early warning that unauthorised entry has occurred.

  • Delay: Inherent in the detection process should be adequate delay to permit proper assessment of the intruder as well as delay in reaching critical assets.

  • Assess: The alarm has to be assessed to provide positive confirmation that it is a valid alarm.

  • Respond: Based on the assessment, appropriate action is taken.

Before the security professional can select an appropriate sensor or sensor technology, they have to understand the nature of the threat and the sophistication of the intruder. Threat scenarios have to be analysed and a clear distinction made between real and perceived threats. The site topography has to be understood and the availability of a "clear zone" (or lack thereof) has to be established.

Performance Parameters
In selecting a sensor technology or a specific product, a security professional should look at performance with regard to several criteria including:

  • the probability of detection (PD)
    the vulnerability to defeat (VD)
  • the false alarm rate (FAR)
  • the nuisance alarm rate (NAR)

These criteria equate to strengths and weaknesses, and understanding them is vital to selecting the right technology for the application.

PD is the likelihood, expressed as a percentage, that the sensor will recognise an intruder within the detection zone. The sensor's PD is conditional on target characteristics (such as mass, size, speed, and orientation), sensitivity settings, weather conditions, site conditions, and proper maintenance of the equipment. A PD of 100 per cent can be achieved by making the sensor so sensitive that the NAR becomes unacceptably high. The PD for outdoor sensors is typically specified at 99 per cent, with anything less than 95 per cent considered unacceptable. A PD of 95 per cent means that one in twenty intrusions will not be detected.

VD is the likelihood that a sensor can be defeated, (e.g. by bypass or spoofing). Each sensor technology has different vulnerabilities inherent in the design. VD also depends on the intruder's foreknowledge of the system, the availability of support (e.g. ladders), and both the operational readiness and state of maintenance of the system. VD can be minimised by using covert (hidden) sensors, by combining sensor technologies for high-risk sites and by eliminating weak points in the perimeter coverage.

FAR is the rate of invalid alarms caused by unknown sources. Typically, the cause is the sensor's own self-generated noise, but it can also include temperature extremes above or below what the sensor's electronics were designed to withstand, poor grounding, faulty or improper electrical connections, power supply voltage fluctuations, damage to equipment done during installation, and poor sensor maintenance. FAR is normally expressed as a number per day, month or year per sensor. FAR is normally negligible and can range from one per month for low-end sensors to one per year for high-end.

NAR is the rate of invalid alarms caused by identifiable non-threat sources. NAR is also normally expressed as a number per day or month per sensor. NAR differs from FAR in that the source of the alarm can be identified by the system operator, typically by remote CCTV. NAR is most commonly associated with small animals, environmental influences (such as heavy winds, rain, blowing snow, fog, hail, day/night, etc.), terrain conditions, vegetation and non-threat personnel in the detection zone. NAR will vary considerably depending on the technology, the application and site conditions. A typical high-end sensor will have a NAR of one per month, whereas low-end sensors can have several per day. It is the responsibility of the security professional to determine what is an acceptable NAR for a particular application. Zero NAR is not achievable in any application. A NAR that is too high leads to a lack of confidence in the sensor, resulting in the sensor being turned off or the alarms being ignored.

Proper management of the system's FAR/NAR is critical to the effectiveness of a perimeter protection system. Without assessment, these invalid alarms can result in an unacceptably high dispatch rate and a security system that is either ignored or shut down by its human monitors.

Fortunately, techniques for managing invalid alarm rates have been developed. These include selecting the proper technology for the application, supplementing intrusion detection sensors with CCTV for remote assessment of each event, paying proper attention to site specifics, following the recommendations of the manufacturer, and providing sufficient operation and maintenance support and budget for the system and the site.

The Categories
Sensor technologies can be compared in at least five categories-

  • Operation: Intrusion detection sensors are either active or passive. Active sensors transmit energy and detect a change in received energy, e.g. radio frequency, infrared, microwave. Passive sensors detect energy caused by an intruder, or changes in natural energy caused by an intruder, e.g. vibration, heat, pressure.

  • Installation: Sensors can be visible or covert (hidden). Visible sensors can act as a deterrent and are typically easier to install and maintain, but are more susceptible to vandalism and defeat. Covert sensors are more difficult to detect and defeat, and are less susceptible to vandalism.

  • Configuration: Sensors are line-of-sight or terrain following. Line-of-sight sensors require that the surrounding terrain be a clear, flat surface. Often site preparation and maintenance are required. Terrain-following sensors detect equally well on even and uneven terrain.

  • Detection Zone Type: The detection zone is either line or volumetric. The line detection zone is confined to a well-defined line or plane. It is often visible and generally easier to locate. It requires much less clear area than volumetric sensors. Volumetric sensors detect intruders in a volume of space, that can be both above and/or below ground. Generally the detection volume is not visible and is therefore more difficult for the intruder to locate.

  • Application. Sensors can be freestanding, fence-mounted, or buried. Freestanding sensors are usually self-supported or mounted to freestanding poles/structures to create the detection area. Fence-mounted sensors are mounted either directly to the fence or on stand-offs attached to the fence. Buried sensors are located at some depth below ground in a line (or parallel lines) configuration.

    The Technologies
    This primer will briefly describe thirteen sensor technologies.

  • Ported Coax: This type of sensor, which creates an electromagnetic detection field around buried "leaky" coaxial cables, is also known as "leaky cable" or "guided radar". The field extends both above and below ground. The sensor, which operates in the VHF band, looks specifically for the mass, speed and conductivity characteristics of human intruders and vehicles, while discounting the movement of small animals. The sensor provides a wide detection field and can be installed in sand, clay, gravel, frozen ground, asphalt and concrete. The technology is classified as active, covert, terrain following, volumetric and buried.

    The only consistent contributors to NAR are moving surface water and moving metal objects in the detection zone. The VD is considered to be the lowest of the sensor technologies available.

  • Fence Disturbance: Fence disturbance sensors come in a variety of forms, including motion sensing (vibration), acoustic and fibre optic. All types are mounted on the fence fabric and trigger an alarm when attempts are made to cut, climb or lift the fence fabric. The sensor is classified as passive, visible, terrain following, line and fence-mounted. Acoustic is currently the most popular, motion sensing is the least popular, and there is growing interest in fibre optic.

    Recent developments include using DSP to enhance detection and minimise NAR, improvements in the sensing cable to include power and data distribution, and the ability to display the intrusion location within 3m (10ft).

    Wind, hail, rain, snow, animals, blowing trash and vegetation hitting the fence can all affect NAR. This technology is considered to have a medium VD level because contact with the fence is necessary for detection.

  • Microwave: The most common type of microwave sensor used in outdoor perimeter applications is bistatic radar. This technology uses separate transmitting and receiving antennas to define an active, visible, line-of-sight, above ground, volumetric detection zone. These zones can be quite wide midway between the antennas, and can require a significant clear zone. They operate at microwave frequencies of 10 GHz or 24 GHz and detect changes in signal that are caused by objects moving between the antennas. To overcome a blind spot located near each antenna, microwave zones must be overlapped in what is often called a "basket weave" configuration. Stacking antennas vertically can create high detection zones.

    Monostatic microwave sensors incorporate a transmitter and receiver in the same unit. The receiver detects microwave energy reflected from objects moving in the detection field. These units are most commonly used for short zones or as a gap-filler for other sensors.

    Recent developments in microwave sensors include a digital processor that enhances the networking of processors and enables remote maintenance and diagnostics. The distance between the transmitter and the receiver (bistatic units) can affect PD. Some of the common NAR problems associated with microwave sensors are moving metal objects such as chain link fences that flex in the wind, wandering animals and birds, blowing debris, surface water, moving vegetation, and blowing sand and snow. Microwave sensors are considered to have a medium level of vulnerability.

  • Passive Infrared (PIR): Passive infrared sensors have been used indoors for a long time. Only recently have inexpensive outdoor versions been offered. PIR senses the presence of infrared radiation (heat) above background and detects primarily transverse motion. The technology is classified as passive, visible, line-of-sight, multi-line and freestanding. NAR can be significant if the unit is not installed properly and the site is not controlled. Some manufacturers suggest linking two units in order to minimise NAR. Some common sources of NAR are animals, flocks of birds, heavy snow, blowing dust, hail, sudden rain, direct sunlight and moving vegetation. PIR sensors are considered to have a high vulnerability and high NAR and are most often used in residential and low-commercial applications.