classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory


The perimeter security challenge
November 2016, Residential Estate (Industry), Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection

The rising threat of violent and organised crime in South Africa in recent months has undoubtedly increased awareness of perimeter security and security in general, especially in the residential, wildlife, commercial and industrial environments, to name a few. However, violent and organised crime isn’t the only threat. Political instability, industrial action, vandalism and much more continue to challenge perimeter security.

Furthermore, these sites typically encompass a wide area and pose a physical challenge to security personnel as the perimeters require efficient monitoring to enable rapid response to a potential breach or actual breach. Historically the approach has been deployment of personnel to walk or drive a perimeter as well as deployment of an electric fence as a deterrent.

In the past five years, however, the development of advanced technology to monitor and protect perimeters has become big business and in this writer’s opinion, been the single largest catalyst driving the cost of previously inaccessible technology down to make it more affordable to a much larger percentage of the market.

Advanced perimeter security technologies, as of the release of this article, encompass the following technologies, which in one form or another, can be deployed to protect a perimeter:

• Thermal cameras.

• Video analytics.

• Smart electronic fencing.

• Underground and fence mount seismic solutions.

• IR and microware poles.

• Radar.

• High megapixel cameras.

• Licence plate recognition.

However, in the deployment of these technologies, the following needs to be considered to not only deliver a secure perimeter, but also operational efficiencies:

• Accuracy, above all exceptional and reliable detection at fair distances is paramount and this varies per technology.

• Ability to adapt technology to site-specific requirements.

• Integration, solutions that easily integrate with auxiliary systems.

• Low false alarm rates, where complex algorithms differentiate between real and false alarm events.

• Real-time monitoring. The infrastructure being deployed to carry the detected events must be reliable, have redundancy, and able to transmit at a high rate (preferably Gigabit speeds). I personally recommend single mode fibre on large site deployments where possible. Although expensive, the life span is 10 plus years so the total cost of ownership is more affordable long term than other mediums.

Thermal cameras, I believe, have become the go-to for perimeter solutions in the market and have had massive successes in both the residential and wildlife sectors. However, I must add that thermal cameras have a very specific shortcoming in the ability to run the surveillance theory of Detect, Identify and Recognise. Thermal cameras have the ability to see immense distances (over one kilometre with a 60 mm lens), but this causes an immediate problem in detecting and identifying what the object is on the screen.

This shortcoming isn’t directly related to the camera, but rather the video analytics engine it is running. After using and testing multiple thermal cameras, from the low cost to the ridiculously expensive, from a 13 mm to 60 mm, it is my opinion that for an end-user to guarantee 100% detection, analytics on thermal cameras should not be expected to work (in the sense of detect and identify) beyond 350 to 400 metres. There are cases where the technology functions beyond the stated distance, but this will vary based on time of day and weather. The colder the weather, the better the thermal image is, and in turn, the better the video analytics functions. In essence, the accuracy increases.

More on the perimeter

I have also in recent months seen the increase in requests for radar. This is still, in my opinion, beyond the majority of end-users’ budgets, but does have its place. Originally designed for military applications, a number of manufacturers have dumbed-down their offerings to avoid ITAR regulations. This has led to the increase of commercial radar.

Designed to secure sites, commercial radar is compact, lightweight and reliable, and operates in all weather conditions and detects everything over vast distances. However, depending on the type of radar, it has its flaws, cost is possibly the largest, but in the last month I have seen a radar test where a R100 piece of foam was used to avoid detection by the radar – foam absorbs the signal. The last of the radar flaws, which could be considered a benefit, is its ability to detect everything, so with this, the number of alarms created increases substantially.

A number of residential estates and critical infrastructure site historically have bought into seismic sensor technology. This is where smart underground or fence mounted sensor systems, varying from fibre to individual detectors, are run around the perimeter of a site.

These sensors broadcast signals to a central control room where an alarm is created should a sensor pick up seismic vibrations: a bird on the fence, a warthog digging under the fence or a human climbing a fence. My experience with these types of systems has varied from a 50% up to 70% detection rate, but once again false alarms cause a number of issues.

IR and microware poles have been around for decades and have been the go-to for a number of verticals in the industry, none more so than residential homes. However, for a large scale and distance solution, in this writer’s opinion, they have a 50/50 chance of false alarms.

High megapixel cameras

A number of manufacturers have recently released 4K and above cameras which have the ability to function at both day and night, and can provide incredibly detailed and quality pictures that allow for very accurate video analytics. I have yet to test this in poor weather and dark moon environments, and over large distances. The things I believe any reader, considering this technology for their perimeter should take into consideration are the file sizes of these video feeds. They are immense and use volumes of bandwidth, and with this, a massive amount of data storage and processing is required, but once again, I have not tested these cameras in extreme conditions.

Licence plate recognition (LPR) and biometrics

In order to lock down the perimeter or access to the site, biometrics and card systems have been the industry standard, however LPR is becoming more prevalent in locking down access to sites and the development of the technology has not only dropped the costing, but also allowed for integration.

LPR and biometrics were recently taken by a residential estate where they were integrated as a single access control solution. A number of fingerprints from different residents were added to an access record and bound to a vehicle licence plate. In so doing, a process of verification and authentication was brought into a single access record to eliminate unauthorised drivers using a vehicle and entering or leaving the estate.

In conclusion, I don’t believe there will ever be a silver bullet within budget to give a zero perimeter penetration guarantee as this is always the desired outcome, but the above technology or a blend of it is definitely a step in the right direction.

For more information contact Blacklight Technology Consulting, +27 (0)11 026 7582, kelly@blacklightconsulting.co.za


Credit(s)
Supplied By: Blacklight Consulting
Tel: +27 11 026 7582
Fax:
Email: kelly@blacklightconsulting.co.za
www: www.blacklightconsulting.co.za
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Intelligence and monitoring
    March 2017, Drive Control Corporation, Duxbury Networking, J2 Software, This Week's Editor's Pick, Access Control & Identity Management, Cyber Security, IT infrastructure
    Understanding the threats you face and your vulnerabilities is a starting point for securing your network.
  • Time to upgrade your access?
    March 2017, HID Global, This Week's Editor's Pick, Access Control & Identity Management
    Jaroslav Barton asks if it isn’t already time for you to upgrade your access control system?
  • Think your smartcards are secure?
    March 2017, This Week's Editor's Pick, Access Control & Identity Management
    Not only can you buy traditional card cloning machines, but you can now also buy open hardware to exploit poorly written code that extracts AES smartcard keys in a matter of minutes.
  • Solving the multi-billion rand problem
    March 2017, Eurobyte Technology, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, Security Services & Risk Management, Products
    Security technology can effectively address a multi-billion rand South African problem.
  • Arteco integrates with ZKAccess
    March 2017, News, Access Control & Identity Management, Products
    Arteco, a global provider of video event management solutions has announced its integration with ZKAccess access control platform.
  • neaMetrics is Partner of the Year
    March 2017, Suprema, News, Access Control & Identity Management
    neaMetrics wins ‘Partner of the Year’ as Suprema honours top channel partners at global partner conference.
  • Bartronics products are still around
    March 2017, LifeStyle Design Technology, News, Perimeter Security, Alarms & Intruder Detection
    Harry Bartelink, technical director of Lifestyle Design Technology puts the rumours of Bartronics’ demise to rest.
  • Technology over manpower benefits remote mine site
    March 2017, RR Electronic Systems, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection, Asset Management, EAS, RFID, Integrated Solutions
    RR Electronic Security Solutions replaces manned patrols with technology, achieving zero theft and a 500% return on investment (ROI).
  • Out with the old, in with the new
    March 2017, ZKTeco, Retail (Industry), Access Control & Identity Management
    The retail industry seems stuck in the dark ages when it comes to certain access control practices and products they still use.
  • Perimeter fencing for retail centres
    March 2017, Betafence South Africa, Retail (Industry), Perimeter Security, Alarms & Intruder Detection
    When it comes to perimeter security, retail centres have unique requirements and challenges.
  • 360-degree perimeter protection
    March 2017, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection, Security Services & Risk Management
    Spotter allows for complete 360-degree situational awareness, providing peace of mind and allowing critical management decisions to be effected.
  • UHF long-range Wiegand readers
    March 2017, ZKTeco, Products, Perimeter Security, Alarms & Intruder Detection
    The UHF1-5, UHF2-5, UHF1-10 and UHF2-10 are ZK Teco’s new generation RFID Ultra High Frequency product series.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.