SlideShare a Scribd company logo
1 of 16
WIFI SIGNALS TO DETECT
BOMBS
AND
CHEMICAL EXPLOSIVES
Contents
• Introduction
• Requirement
• Working
• System overview
• Two Wi-Fi antenna Setups
• Object Risk Estimation
• Conclusion
• References
INTRODUCTION
 The growing needs of public safety urgently require
scalable and low-cost techniques on detecting dangerous
objects hidden in baggage.
 Traditional baggage check involves either high manpower
for manual examinations or expensive and specialized
instruments .
 A system have developed that uses ordinary Wi-Fi to easily
detect weapons , bombs and explosive chemicals in bags
with nearly 90 per cent accuracy , demonstrating low-cost
technology for security screening.
REQUIREMENT
 A Wi-Fi device
 2 to 3 antennas
 A Wi-Fi device with 2 to 3
antennas and can be
integrated into existing Wi-
Fi networks with low-cost
and deployment efforts ,
making it more scalable
and practical than the
approaches using
dedicated instruments.
WORKING
• This approach uniquely separates the wireless interface
caused by two influencing factors of objects
i.e., material and shape
• To identify different materials we exploit the Wi-Fi signal
transmitting through or bypassing the objects , which
result in different characteristics like absorption ,
refraction and reflection in CSI values from antennas and
their difference.
• We can estimate its shape (width and height)or volume
based on the finding that the strength of the reflected
signal is proportional to the reflection area of the object.
CSI(Channel State Information)
• In wireless communications , channel state information
refers to known channel properties of a communication
link.
• This information describes how a signal propagates from
the transmitter to the receiver and represents the
combined effect of scattering ,absorption and power decay
with distance
System overview
TWO ANTENNA SETUPS
Object Risk Estimation through Reflection-
Based Object Imaging
1. Extracting Reflected Signal from CSI Complex
2.Volume Estimation for Liquid Objects in Baggage
CONCLUSION
• To detect the suspicious objects using Wi-Fi technology .
• No installation of high-cost security checking's
infrastructures .
• It can estimate the risk level of the object.
• Extensive experiments are conducted with 15 objects and 6
bags over a 6 month period. The result show that this
system can detect over 95% dangerous objects in different
types of bags and successfully identify 90% dangerous
material types.
REFERENCES
• P. MAZZEI, “Florida school, on edge since shooting, requires students to
carry clear backpacks,” https://www.nytimes.com/ 2018/03/21/us/florida-
school-shooting-clear-backpacks.html, 2018.
• https://ieeexplore.ieee.org/document/8433142
WIFI SIGNALS TO DETECT BOMBS AND CHEMICAL EXPLOSIVES

More Related Content

Similar to WIFI SIGNALS TO DETECT BOMBS AND CHEMICAL EXPLOSIVES

10.1109@maes.2020.2970262
10.1109@maes.2020.297026210.1109@maes.2020.2970262
10.1109@maes.2020.2970262
MKEERTHIKA1
 

Similar to WIFI SIGNALS TO DETECT BOMBS AND CHEMICAL EXPLOSIVES (20)

Securing Underwater Wireless Communication
Securing Underwater Wireless CommunicationSecuring Underwater Wireless Communication
Securing Underwater Wireless Communication
 
Securing Underwater Wireless Communication Networks
Securing Underwater Wireless Communication NetworksSecuring Underwater Wireless Communication Networks
Securing Underwater Wireless Communication Networks
 
Securing Underwater Wireless Communication Networks.pptxkkkk
Securing Underwater  Wireless  Communication Networks.pptxkkkkSecuring Underwater  Wireless  Communication Networks.pptxkkkk
Securing Underwater Wireless Communication Networks.pptxkkkk
 
Wireless applications in various areas
Wireless applications in various areasWireless applications in various areas
Wireless applications in various areas
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Herklotz - Information Operations and Security - Spring Review 2013
Herklotz - Information Operations and Security - Spring Review 2013Herklotz - Information Operations and Security - Spring Review 2013
Herklotz - Information Operations and Security - Spring Review 2013
 
Secure communication over optical networks
Secure communication over optical networksSecure communication over optical networks
Secure communication over optical networks
 
533 450-457
533 450-457533 450-457
533 450-457
 
10.1109@maes.2020.2970262
10.1109@maes.2020.297026210.1109@maes.2020.2970262
10.1109@maes.2020.2970262
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunication
 
O010528791
O010528791O010528791
O010528791
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
18
1818
18
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor Network
 
A Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor NetworksA Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor Networks
 
An efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksAn efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networks
 
FlechaMoreno_Bachelor_Thesis
FlechaMoreno_Bachelor_ThesisFlechaMoreno_Bachelor_Thesis
FlechaMoreno_Bachelor_Thesis
 
Project Synopsis Electricity Theft Detection.docx
Project Synopsis Electricity Theft Detection.docxProject Synopsis Electricity Theft Detection.docx
Project Synopsis Electricity Theft Detection.docx
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 

Recently uploaded

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 

Recently uploaded (20)

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 

WIFI SIGNALS TO DETECT BOMBS AND CHEMICAL EXPLOSIVES

  • 1. WIFI SIGNALS TO DETECT BOMBS AND CHEMICAL EXPLOSIVES
  • 2. Contents • Introduction • Requirement • Working • System overview • Two Wi-Fi antenna Setups • Object Risk Estimation • Conclusion • References
  • 3. INTRODUCTION  The growing needs of public safety urgently require scalable and low-cost techniques on detecting dangerous objects hidden in baggage.  Traditional baggage check involves either high manpower for manual examinations or expensive and specialized instruments .
  • 4.  A system have developed that uses ordinary Wi-Fi to easily detect weapons , bombs and explosive chemicals in bags with nearly 90 per cent accuracy , demonstrating low-cost technology for security screening.
  • 5. REQUIREMENT  A Wi-Fi device  2 to 3 antennas  A Wi-Fi device with 2 to 3 antennas and can be integrated into existing Wi- Fi networks with low-cost and deployment efforts , making it more scalable and practical than the approaches using dedicated instruments.
  • 6. WORKING • This approach uniquely separates the wireless interface caused by two influencing factors of objects i.e., material and shape • To identify different materials we exploit the Wi-Fi signal transmitting through or bypassing the objects , which result in different characteristics like absorption , refraction and reflection in CSI values from antennas and their difference. • We can estimate its shape (width and height)or volume based on the finding that the strength of the reflected signal is proportional to the reflection area of the object.
  • 7. CSI(Channel State Information) • In wireless communications , channel state information refers to known channel properties of a communication link. • This information describes how a signal propagates from the transmitter to the receiver and represents the combined effect of scattering ,absorption and power decay with distance
  • 8.
  • 11. Object Risk Estimation through Reflection- Based Object Imaging 1. Extracting Reflected Signal from CSI Complex
  • 12. 2.Volume Estimation for Liquid Objects in Baggage
  • 13.
  • 14. CONCLUSION • To detect the suspicious objects using Wi-Fi technology . • No installation of high-cost security checking's infrastructures . • It can estimate the risk level of the object. • Extensive experiments are conducted with 15 objects and 6 bags over a 6 month period. The result show that this system can detect over 95% dangerous objects in different types of bags and successfully identify 90% dangerous material types.
  • 15. REFERENCES • P. MAZZEI, “Florida school, on edge since shooting, requires students to carry clear backpacks,” https://www.nytimes.com/ 2018/03/21/us/florida- school-shooting-clear-backpacks.html, 2018. • https://ieeexplore.ieee.org/document/8433142