classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory


The perimeter security challenge
November 2016, Residential Estate (Industry), Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection

The rising threat of violent and organised crime in South Africa in recent months has undoubtedly increased awareness of perimeter security and security in general, especially in the residential, wildlife, commercial and industrial environments, to name a few. However, violent and organised crime isn’t the only threat. Political instability, industrial action, vandalism and much more continue to challenge perimeter security.

Furthermore, these sites typically encompass a wide area and pose a physical challenge to security personnel as the perimeters require efficient monitoring to enable rapid response to a potential breach or actual breach. Historically the approach has been deployment of personnel to walk or drive a perimeter as well as deployment of an electric fence as a deterrent.

In the past five years, however, the development of advanced technology to monitor and protect perimeters has become big business and in this writer’s opinion, been the single largest catalyst driving the cost of previously inaccessible technology down to make it more affordable to a much larger percentage of the market.

Advanced perimeter security technologies, as of the release of this article, encompass the following technologies, which in one form or another, can be deployed to protect a perimeter:

• Thermal cameras.

• Video analytics.

• Smart electronic fencing.

• Underground and fence mount seismic solutions.

• IR and microware poles.

• Radar.

• High megapixel cameras.

• Licence plate recognition.

However, in the deployment of these technologies, the following needs to be considered to not only deliver a secure perimeter, but also operational efficiencies:

• Accuracy, above all exceptional and reliable detection at fair distances is paramount and this varies per technology.

• Ability to adapt technology to site-specific requirements.

• Integration, solutions that easily integrate with auxiliary systems.

• Low false alarm rates, where complex algorithms differentiate between real and false alarm events.

• Real-time monitoring. The infrastructure being deployed to carry the detected events must be reliable, have redundancy, and able to transmit at a high rate (preferably Gigabit speeds). I personally recommend single mode fibre on large site deployments where possible. Although expensive, the life span is 10 plus years so the total cost of ownership is more affordable long term than other mediums.

Thermal cameras, I believe, have become the go-to for perimeter solutions in the market and have had massive successes in both the residential and wildlife sectors. However, I must add that thermal cameras have a very specific shortcoming in the ability to run the surveillance theory of Detect, Identify and Recognise. Thermal cameras have the ability to see immense distances (over one kilometre with a 60 mm lens), but this causes an immediate problem in detecting and identifying what the object is on the screen.

This shortcoming isn’t directly related to the camera, but rather the video analytics engine it is running. After using and testing multiple thermal cameras, from the low cost to the ridiculously expensive, from a 13 mm to 60 mm, it is my opinion that for an end-user to guarantee 100% detection, analytics on thermal cameras should not be expected to work (in the sense of detect and identify) beyond 350 to 400 metres. There are cases where the technology functions beyond the stated distance, but this will vary based on time of day and weather. The colder the weather, the better the thermal image is, and in turn, the better the video analytics functions. In essence, the accuracy increases.

More on the perimeter

I have also in recent months seen the increase in requests for radar. This is still, in my opinion, beyond the majority of end-users’ budgets, but does have its place. Originally designed for military applications, a number of manufacturers have dumbed-down their offerings to avoid ITAR regulations. This has led to the increase of commercial radar.

Designed to secure sites, commercial radar is compact, lightweight and reliable, and operates in all weather conditions and detects everything over vast distances. However, depending on the type of radar, it has its flaws, cost is possibly the largest, but in the last month I have seen a radar test where a R100 piece of foam was used to avoid detection by the radar – foam absorbs the signal. The last of the radar flaws, which could be considered a benefit, is its ability to detect everything, so with this, the number of alarms created increases substantially.

A number of residential estates and critical infrastructure site historically have bought into seismic sensor technology. This is where smart underground or fence mounted sensor systems, varying from fibre to individual detectors, are run around the perimeter of a site.

These sensors broadcast signals to a central control room where an alarm is created should a sensor pick up seismic vibrations: a bird on the fence, a warthog digging under the fence or a human climbing a fence. My experience with these types of systems has varied from a 50% up to 70% detection rate, but once again false alarms cause a number of issues.

IR and microware poles have been around for decades and have been the go-to for a number of verticals in the industry, none more so than residential homes. However, for a large scale and distance solution, in this writer’s opinion, they have a 50/50 chance of false alarms.

High megapixel cameras

A number of manufacturers have recently released 4K and above cameras which have the ability to function at both day and night, and can provide incredibly detailed and quality pictures that allow for very accurate video analytics. I have yet to test this in poor weather and dark moon environments, and over large distances. The things I believe any reader, considering this technology for their perimeter should take into consideration are the file sizes of these video feeds. They are immense and use volumes of bandwidth, and with this, a massive amount of data storage and processing is required, but once again, I have not tested these cameras in extreme conditions.

Licence plate recognition (LPR) and biometrics

In order to lock down the perimeter or access to the site, biometrics and card systems have been the industry standard, however LPR is becoming more prevalent in locking down access to sites and the development of the technology has not only dropped the costing, but also allowed for integration.

LPR and biometrics were recently taken by a residential estate where they were integrated as a single access control solution. A number of fingerprints from different residents were added to an access record and bound to a vehicle licence plate. In so doing, a process of verification and authentication was brought into a single access record to eliminate unauthorised drivers using a vehicle and entering or leaving the estate.

In conclusion, I don’t believe there will ever be a silver bullet within budget to give a zero perimeter penetration guarantee as this is always the desired outcome, but the above technology or a blend of it is definitely a step in the right direction.

For more information contact Blacklight Technology Consulting, +27 (0)11 026 7582, kelly@blacklightconsulting.co.za


Credit(s)
Supplied By: Blacklight Consulting
Tel: +27 11 026 7582
Fax:
Email: kelly@blacklightconsulting.co.za
www: www.blacklightconsulting.co.za
  Share via Twitter   Share via LinkedIn      

Further reading:

  • ASSA ABLOY acquires Inhep
    July 2017, Inhep Electronics Holdings, This Week's Editor's Pick, Perimeter Security, Alarms & Intruder Detection, News
    Inhep is the latest South Africa security designer and manufacturer to be snapped up by ASSA ABLOY. It seems that local is internationally lekker.
  • Morpho becomes OT-MORPHO
    July 2017, Morpho South Africa, News, Access Control & Identity Management
    Safran has announced the completion of the sale of its identity and security activities to Advent International for Euro 2.4 billion.
  • Avigilon integrates Virdi
    July 2017, Avigilon, News, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management
    Avigilon Access Control Manager integrated with Virdi’s biometric system provides additional authentication for sites requiring a high level of security.
  • New brand open day for Came BPT
    July 2017, Came BPT South Africa, News, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management
    Came BPT South Africa held open days on 6 and 7 June 2017 at its Johannesburg office in order to have customers experience the new Came BPT brand as well as the new VisionBPT and MileSight ranges.
  • Security for factory environments
    July 2017, ZKTeco, Industrial (Industry), Access Control & Identity Management
    Due to the variety and complexity of most industrial sites, their security systems should combine access control, video surveillance, intrusion systems and more.
  • Ending workforce management shortfalls
    July 2017, Active Track, Industrial (Industry), Access Control & Identity Management, Asset Management, EAS, RFID
    The FPX10 sends email and SMS notifications in the event of breach of pre-set parameters, or activation of its panic or emergency functions.
  • Cybersecurity for access control
    July 2017, This Week's Editor's Pick, Access Control & Identity Management, Cyber Security, Asset Management, EAS, RFID
    Farpointe provides cybersecurity vulnerability checklist for contactless cards and readers.
  • Flat panel radar detection
    July 2017, MASS, Products, CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection
    The Athena intelligent video detection system combines Spotter RF flat panel radar with the Silent Sentinel compact PTZ to provide early warning of activity along the perimeter or within an open space.
  • Multi-biometric finger-vein standalone terminal
    July 2017, ZKTeco, Products, Access Control & Identity Management
    ZKteco South Africa has launched the inPulse+, a multi-biometric reader capable of capturing and processing finger vein and fingerprint biometric data at the same time.
  • S2 Security, Allegion wireless lock integration
    July 2017, Products, Access Control & Identity Management
    S2 Security and Allegion have announced S2 NetBox series product support for Schlage NDE wireless locks.
  • Simpler, faster and more secure
    June 2017, G4S Secure Solutions, Rhyco Risk Projects, Access Control & Identity Management, Integrated Solutions
    Hi-Tech Security Solutions asked three experts in the field of visitor management – Mark Paynter of TerPay Security Advisors, Gary Swart of Rhyco Risk Projects and Tim Timmins of G4S Secure Solutions – to share their insights into the features and future of visitor management solutions.
  • Throwing the book at visitor management
    June 2017, neaMetrics, Powell Tronics, iPulse Systems, Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions
    There are a number of portable devices that can be used to replace the visitors’ book, all of which offer a heightened level of security and accuracy.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.