Wireless surveillance safety

September 2015 Surveillance, Integrated Solutions, Infrastructure

A local academic institution has recently launched a Safe Public Routes project for the purpose of providing surveillance at various identified crime hotspot areas surrounding each of their four properties. An electronic security system was used to increase security awareness and minimise crime in these areas, to the benefit of students.

The solution behind this electronic security system consists of Dynacolor high definition IP cameras installed onto steel posts five metres above ground level, equipped with Infrared illumination allowing visibility in poor lighting conditions, powered by means of a BFR solar kit, and a combination of Ubiquity and Mikrotik wireless terminals for data transmission to allow for viewing and recording locally on a Mirasys VMS at each respective property.

Each camera post will be equipped with a maximum of two HD IP cameras using solar power and wireless transmission equipment which communicate back to various wireless high-points within each property. The solar power solution allows a single post configuration of two cameras to function for a minimum of 36 hours under overcast weather conditions.

Why wireless and not a wired solution? Each security system can be derived from many different solutions whether wired or wireless, however main factors that were considered include the following:

Geological surrounds

• The project involves placing cameras in public areas where excavation of trenches will be difficult and very disruptive to traffic of local citizens. The solar powered and wireless solution eliminates the need for any excavations other than that for the erection of the camera post thus keeping disruption to the public at a bare minimum.

Existence of underground wire ways

• Should underground wire ways have been already in place, a wired solution would potentially prove to be more cost effective. Due to the lack of existing wire ways, implementation of new wire ways would far outweigh the costs involved with implementing a solar powered and wireless solution.

Implementation period

• Excavations through public areas require special permission and careful planning to minimise disruptions to the public. Not to mention the health and safety regulations that go with it. The time spent on planning alone would most likely exceed the time required to implement the entire solution using the solar powered and wireless solution approach.

Future expansion

• In wired solution terminology, expansion at the edge would require the availability of additional physical network ports. For a wired solution, one would use optical fibre as the underground communication medium towards network switches at the edge to collect the video from the cameras. The initial backbone network platform will be costly to implement while future expansions will become more cost-effective due to the availability of additional ports having been addressed during the initial solution.

• In wireless solution terminology, expansion at the edge would require careful calculations before implementation can occur. Wired solutions allow transmission speeds of up to 10 Gbps while most modern wireless network devices warrant speed of less than 500 Mbps. Expansion of wireless solutions would require sufficient bandwidth at both the source (edge) and receiver (high point) ends. Just because there’s bandwidth available at the edge does not indicate the same at the high-point since most high-points will be the reception point of connections from several edge devices. For this particular project several high-points have been considered allowing expansion of at least twice the number of devices at the edge without having to purchase additional high-point devices.

For the wireless network of this project, each camera post at the edge and high point at the core require an outdoor rated wireless access point designed for long range applications to establish wireless network communication. Ubiquity M5 Powerbeam devices have been selected as the edge devices while Mikrotik Groove Routerboard 52HPN equipped with 120 degree antenna for each high-point.

Security considerations

One of the biggest concerns for wireless users is making sure their wireless networks are secure. When it comes to technology, being 100 percent secure becomes a fabricated term. In reality data sent over a wireless signal are already potentially exposed creating the possibility of intercept if no security measures have been put in place. There are several ways to harden the security of your wireless network to prevent unauthorised access.

Change default passwords

• As almost anything is available on the Internet today, changing the default password of your devices will be the very first step.

Use WPA2 security

• WPA2 stands for Wi-Fi Protected Access. The most recent Wireless Security Protocol responsible for encrypting data before it gets transmitted into open air.

Disable SSID broadcast

• Disabling the broadcast of the SSID makes your wireless network invisible to equipment capable of scanning for networks.

Implement MAC address filtering

• MAC address filtering allows you to create a list of all your devices on an access point blocking access to any other device with a different MAC address. A MAC address of a network device is unique to that device and no duplicate MAC may exist.

Assign static IP addresses and disable DHCP

• DHCP (Dynamic Host Configuration Protocol) is responsible for allocating an available IP address to the requesting network device. Deactivating DHCP increases the difficulty of gaining access to your connected network devices.

Enable firewall

• Enable the firewall at your access point as well as your operating system and open only the ports required for your solution to further increase the difficulty of gaining access to your connected network devices.

As the need for long-range communications, roaming between multiple buildings or floors and the speed of wireless transmission increases, wireless network equipment become the more popular choice with other benefits including time of deployment, reduced cost of ownership and scalability.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
Secure, modernise and optimise CCTV
Surveillance Products & Solutions
Industrial and commercial organisations are navigating complex digital transformation processes. With SecuVue, companies can bridge the gap between operational technology and information technology for safer, smarter operations.

Read more...
IoT-driven smart data to stay ahead
IoT & Automation Infrastructure AI & Data Analytics
In a world where uncertainty is constant, the real competitive edge lies in foresight. Businesses that turn real-time data into proactive strategies will not just survive, they will lead.

Read more...
Hydrogen is green but dangerous
Fire & Safety Infrastructure Power Management
Hydrogen infrastructure is developing quickly, but it comes with safety challenges. Hydrogen is flammable, and its small molecular size means it can leak easily. Additionally, fires caused by hydrogen are nearly invisible, making them difficult to detect and respond to.

Read more...
A whole-site solution to crack the data centre market
Fire & Safety Infrastructure Facilities & Building Management
Fire safety consultants and contractors who can offer a comprehensive fire safety solution to the data centre market can establish themselves as a supplier of a key safety features that help guarantee the smooth operation of critical infrastructure.

Read more...
Eagle Eye Precision Person & Vehicle Detection
Surveillance Products & Solutions AI & Data Analytics
Eagle Eye’s new Precision Person & Vehicle Detection feature detects people and vehicles at long distances with high accuracy and is especially designed for customers who actively monitor for intruders

Read more...
Acronis and Metrofile Cloud announce partnership
Infrastructure Integrated Solutions
Acronis has appointed Metrofile Cloud as its premier disaster recovery (DR) partner in southern Africa, combining Acronis' technologies with Metrofile Cloud's local expertise to deliver secure and adaptable disaster recovery solutions for businesses across the region.

Read more...
Managing stock efficiently and cost-effectively
Asset Management Infrastructure Logistics (Industry)
Rina Redelinghuys, customer services executive at Cquential, a member of the Argility Technology Group, examines stock management across various industries, including retail, fast-moving consumer goods, food and dairy, automotive, apparel, industrial, accessories, paint and chemicals, and pharmaceuticals.

Read more...
Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.