The perimeter security challenge

Access & Identity Management Handbook 2017 Residential Estate (Industry), Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection

The rising threat of violent and organised crime in South Africa in recent months has undoubtedly increased awareness of perimeter security and security in general, especially in the residential, wildlife, commercial and industrial environments, to name a few. However, violent and organised crime isn’t the only threat. Political instability, industrial action, vandalism and much more continue to challenge perimeter security.

Furthermore, these sites typically encompass a wide area and pose a physical challenge to security personnel as the perimeters require efficient monitoring to enable rapid response to a potential breach or actual breach. Historically the approach has been deployment of personnel to walk or drive a perimeter as well as deployment of an electric fence as a deterrent.

In the past five years, however, the development of advanced technology to monitor and protect perimeters has become big business and in this writer’s opinion, been the single largest catalyst driving the cost of previously inaccessible technology down to make it more affordable to a much larger percentage of the market.

Advanced perimeter security technologies, as of the release of this article, encompass the following technologies, which in one form or another, can be deployed to protect a perimeter:

• Thermal cameras.

• Video analytics.

• Smart electronic fencing.

• Underground and fence mount seismic solutions.

• IR and microware poles.

• Radar.

• High megapixel cameras.

• Licence plate recognition.

However, in the deployment of these technologies, the following needs to be considered to not only deliver a secure perimeter, but also operational efficiencies:

• Accuracy, above all exceptional and reliable detection at fair distances is paramount and this varies per technology.

• Ability to adapt technology to site-specific requirements.

• Integration, solutions that easily integrate with auxiliary systems.

• Low false alarm rates, where complex algorithms differentiate between real and false alarm events.

• Real-time monitoring. The infrastructure being deployed to carry the detected events must be reliable, have redundancy, and able to transmit at a high rate (preferably Gigabit speeds). I personally recommend single mode fibre on large site deployments where possible. Although expensive, the life span is 10 plus years so the total cost of ownership is more affordable long term than other mediums.

Thermal cameras, I believe, have become the go-to for perimeter solutions in the market and have had massive successes in both the residential and wildlife sectors. However, I must add that thermal cameras have a very specific shortcoming in the ability to run the surveillance theory of Detect, Identify and Recognise. Thermal cameras have the ability to see immense distances (over one kilometre with a 60 mm lens), but this causes an immediate problem in detecting and identifying what the object is on the screen.

This shortcoming isn’t directly related to the camera, but rather the video analytics engine it is running. After using and testing multiple thermal cameras, from the low cost to the ridiculously expensive, from a 13 mm to 60 mm, it is my opinion that for an end-user to guarantee 100% detection, analytics on thermal cameras should not be expected to work (in the sense of detect and identify) beyond 350 to 400 metres. There are cases where the technology functions beyond the stated distance, but this will vary based on time of day and weather. The colder the weather, the better the thermal image is, and in turn, the better the video analytics functions. In essence, the accuracy increases.

More on the perimeter

I have also in recent months seen the increase in requests for radar. This is still, in my opinion, beyond the majority of end-users’ budgets, but does have its place. Originally designed for military applications, a number of manufacturers have dumbed-down their offerings to avoid ITAR regulations. This has led to the increase of commercial radar.

Designed to secure sites, commercial radar is compact, lightweight and reliable, and operates in all weather conditions and detects everything over vast distances. However, depending on the type of radar, it has its flaws, cost is possibly the largest, but in the last month I have seen a radar test where a R100 piece of foam was used to avoid detection by the radar – foam absorbs the signal. The last of the radar flaws, which could be considered a benefit, is its ability to detect everything, so with this, the number of alarms created increases substantially.

A number of residential estates and critical infrastructure site historically have bought into seismic sensor technology. This is where smart underground or fence mounted sensor systems, varying from fibre to individual detectors, are run around the perimeter of a site.

These sensors broadcast signals to a central control room where an alarm is created should a sensor pick up seismic vibrations: a bird on the fence, a warthog digging under the fence or a human climbing a fence. My experience with these types of systems has varied from a 50% up to 70% detection rate, but once again false alarms cause a number of issues.

IR and microware poles have been around for decades and have been the go-to for a number of verticals in the industry, none more so than residential homes. However, for a large scale and distance solution, in this writer’s opinion, they have a 50/50 chance of false alarms.

High megapixel cameras

A number of manufacturers have recently released 4K and above cameras which have the ability to function at both day and night, and can provide incredibly detailed and quality pictures that allow for very accurate video analytics. I have yet to test this in poor weather and dark moon environments, and over large distances. The things I believe any reader, considering this technology for their perimeter should take into consideration are the file sizes of these video feeds. They are immense and use volumes of bandwidth, and with this, a massive amount of data storage and processing is required, but once again, I have not tested these cameras in extreme conditions.

Licence plate recognition (LPR) and biometrics

In order to lock down the perimeter or access to the site, biometrics and card systems have been the industry standard, however LPR is becoming more prevalent in locking down access to sites and the development of the technology has not only dropped the costing, but also allowed for integration.

LPR and biometrics were recently taken by a residential estate where they were integrated as a single access control solution. A number of fingerprints from different residents were added to an access record and bound to a vehicle licence plate. In so doing, a process of verification and authentication was brought into a single access record to eliminate unauthorised drivers using a vehicle and entering or leaving the estate.

In conclusion, I don’t believe there will ever be a silver bullet within budget to give a zero perimeter penetration guarantee as this is always the desired outcome, but the above technology or a blend of it is definitely a step in the right direction.

For more information contact Blacklight Technology Consulting, +27 (0)11 026 7582, kelly@blacklightconsulting.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Access & identity expectations for 2024
Technews Publishing IDEMIA ZKTeco Gallagher Salto Systems Africa Regal Distributors SA Reditron Editor's Choice Access Control & Identity Management Information Security AI & Data Analytics
What does 2024 have in store for the access and identity industry? SMART Security Solutions asked several industry players for their brief thoughts on what they expect this year.

Read more...
Access and identity in 2024
Technews Publishing Gallagher HID Global IDEMIA Ideco Biometrics Enkulu Technologies neaMetrics Editor's Choice Access Control & Identity Management Integrated Solutions
SMART Security Solutions hosted a round table discussion with various players in the access and identity market, to find out what they experienced in the last year, as well as their expectations for 2024.

Read more...
The promise of mobile credentials
Technews Publishing Suprema neaMetrics HID Global Editor's Choice Access Control & Identity Management IoT & Automation
SMART Security Solutions examines the advantages and disadvantages of mobile credentials in a market dominated by cards and fobs, in which biometrics is viewed as a secure alternative.

Read more...
Prepare for cyber-physical attacks
Gallagher Information Security Access Control & Identity Management
As the security landscape continues to evolve, organisations must fortify their security solutions to embrace the changing needs of the security and technology industries. Nowhere is this more present than with regard to cybersecurity.

Read more...
Unleash the full potential of AI at the edge
Suprema AI & Data Analytics Access Control & Identity Management
Efficient AI algorithms, when embedded in edge access control devices, enable companies to optimise their use of AI and edge processing to deliver reliable and fast authentication.

Read more...
ASSA ABLOY acquires Amecor in South Africa
Amecor Editor's Choice Perimeter Security, Alarms & Intruder Detection News & Events
ASSA ABLOY has signed an agreement to acquire Amecor, a well-known South African manufacturer of security communication equipment in the South African security market and beyond.

Read more...
Paxton appoints Werner Geldenhuys as Country Sales Manager for South Africa
Paxton News & Events Access Control & Identity Management
Paxton has appointed Werner Geldenhuys as its new Country Sales Manager for South Africa; To lead the team to continue providing smart yet simple-to-use security systems in South Africa.

Read more...
Gallagher Security releases Command Centre v9
Gallagher News & Events Access Control & Identity Management Integrated Solutions
Richer features, greater integrations, with the release of Gallagher Security’s Command Centre v9 security site management software designed to integrate seamlessly with various systems and hardware.

Read more...
Lock down your access control with Alcatraz AI
C3 Shared Services Healthcare (Industry) Access Control & Identity Management AI & Data Analytics
Alcatraz AI, represented in South Africa by C3 Shared Services, changes access control by harnessing the power of artificial intelligence and analytics at the edge, where facial recognition becomes the essential credential autonomously.

Read more...