SlideShare a Scribd company logo
WIFI SIGNALS TO DETECT
BOMBS
AND
CHEMICAL EXPLOSIVES
Contents
• Introduction
• Requirement
• Working
• System overview
• Two Wi-Fi antenna Setups
• Object Risk Estimation
• Conclusion
• References
INTRODUCTION
 The growing needs of public safety urgently require
scalable and low-cost techniques on detecting dangerous
objects hidden in baggage.
 Traditional baggage check involves either high manpower
for manual examinations or expensive and specialized
instruments .
 A system have developed that uses ordinary Wi-Fi to easily
detect weapons , bombs and explosive chemicals in bags
with nearly 90 per cent accuracy , demonstrating low-cost
technology for security screening.
REQUIREMENT
 A Wi-Fi device
 2 to 3 antennas
 A Wi-Fi device with 2 to 3
antennas and can be
integrated into existing Wi-
Fi networks with low-cost
and deployment efforts ,
making it more scalable
and practical than the
approaches using
dedicated instruments.
WORKING
• This approach uniquely separates the wireless interface
caused by two influencing factors of objects
i.e., material and shape
• To identify different materials we exploit the Wi-Fi signal
transmitting through or bypassing the objects , which
result in different characteristics like absorption ,
refraction and reflection in CSI values from antennas and
their difference.
• We can estimate its shape (width and height)or volume
based on the finding that the strength of the reflected
signal is proportional to the reflection area of the object.
CSI(Channel State Information)
• In wireless communications , channel state information
refers to known channel properties of a communication
link.
• This information describes how a signal propagates from
the transmitter to the receiver and represents the
combined effect of scattering ,absorption and power decay
with distance
System overview
TWO ANTENNA SETUPS
Object Risk Estimation through Reflection-
Based Object Imaging
1. Extracting Reflected Signal from CSI Complex
2.Volume Estimation for Liquid Objects in Baggage
CONCLUSION
• To detect the suspicious objects using Wi-Fi technology .
• No installation of high-cost security checking's
infrastructures .
• It can estimate the risk level of the object.
• Extensive experiments are conducted with 15 objects and 6
bags over a 6 month period. The result show that this
system can detect over 95% dangerous objects in different
types of bags and successfully identify 90% dangerous
material types.
REFERENCES
• P. MAZZEI, “Florida school, on edge since shooting, requires students to
carry clear backpacks,” https://www.nytimes.com/ 2018/03/21/us/florida-
school-shooting-clear-backpacks.html, 2018.
• https://ieeexplore.ieee.org/document/8433142
WIFI SIGNALS TO DETECT BOMBS AND CHEMICAL EXPLOSIVES

More Related Content

Similar to WIFI SIGNALS TO DETECT BOMBS AND CHEMICAL EXPLOSIVES

Securing Underwater Wireless Communication Networks.pptxkkkk
Securing Underwater  Wireless  Communication Networks.pptxkkkkSecuring Underwater  Wireless  Communication Networks.pptxkkkk
Securing Underwater Wireless Communication Networks.pptxkkkk
Dipaloke Arunodoy
 
Securing Underwater Wireless Communication
Securing Underwater Wireless CommunicationSecuring Underwater Wireless Communication
Securing Underwater Wireless Communication
Dipaloke Arunodoy
 
Securing Underwater Wireless Communication Networks
Securing Underwater Wireless Communication NetworksSecuring Underwater Wireless Communication Networks
Securing Underwater Wireless Communication Networks
Dipaloke Arunodoy
 
Wireless applications in various areas
Wireless applications in various areasWireless applications in various areas
Wireless applications in various areas
Amulya Anu
 
Paper Submission -International Journal of Wireless & Mobile Networks (IJWMN...
Paper Submission -International Journal of  Wireless & Mobile Networks (IJWMN...Paper Submission -International Journal of  Wireless & Mobile Networks (IJWMN...
Paper Submission -International Journal of Wireless & Mobile Networks (IJWMN...
ijwmn
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
nkansal81
 
Herklotz - Information Operations and Security - Spring Review 2013
Herklotz - Information Operations and Security - Spring Review 2013Herklotz - Information Operations and Security - Spring Review 2013
Herklotz - Information Operations and Security - Spring Review 2013
The Air Force Office of Scientific Research
 
Secure communication over optical networks
Secure communication over optical networksSecure communication over optical networks
Secure communication over optical networks
Pawar Public School, Amanora, Hadapsar
 
International Journal of Wireless & Mobile Networks (IJWMN) - - -World Journ...
International Journal of Wireless & Mobile Networks (IJWMN)  - - -World Journ...International Journal of Wireless & Mobile Networks (IJWMN)  - - -World Journ...
International Journal of Wireless & Mobile Networks (IJWMN) - - -World Journ...
ijwmn
 
533 450-457
533 450-457533 450-457
533 450-457
idescitation
 
10.1109@maes.2020.2970262
10.1109@maes.2020.297026210.1109@maes.2020.2970262
10.1109@maes.2020.2970262
MKEERTHIKA1
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunication
Devyani Vaidya
 
O010528791
O010528791O010528791
O010528791
IOSR Journals
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
18
1818
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
Manish Sharma
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor Network
IOSR Journals
 
A Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor NetworksA Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor Networks
ijtsrd
 
An efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksAn efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networks
IISTech2015
 

Similar to WIFI SIGNALS TO DETECT BOMBS AND CHEMICAL EXPLOSIVES (20)

Securing Underwater Wireless Communication Networks.pptxkkkk
Securing Underwater  Wireless  Communication Networks.pptxkkkkSecuring Underwater  Wireless  Communication Networks.pptxkkkk
Securing Underwater Wireless Communication Networks.pptxkkkk
 
Securing Underwater Wireless Communication
Securing Underwater Wireless CommunicationSecuring Underwater Wireless Communication
Securing Underwater Wireless Communication
 
Securing Underwater Wireless Communication Networks
Securing Underwater Wireless Communication NetworksSecuring Underwater Wireless Communication Networks
Securing Underwater Wireless Communication Networks
 
Wireless applications in various areas
Wireless applications in various areasWireless applications in various areas
Wireless applications in various areas
 
Paper Submission -International Journal of Wireless & Mobile Networks (IJWMN...
Paper Submission -International Journal of  Wireless & Mobile Networks (IJWMN...Paper Submission -International Journal of  Wireless & Mobile Networks (IJWMN...
Paper Submission -International Journal of Wireless & Mobile Networks (IJWMN...
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Herklotz - Information Operations and Security - Spring Review 2013
Herklotz - Information Operations and Security - Spring Review 2013Herklotz - Information Operations and Security - Spring Review 2013
Herklotz - Information Operations and Security - Spring Review 2013
 
Secure communication over optical networks
Secure communication over optical networksSecure communication over optical networks
Secure communication over optical networks
 
International Journal of Wireless & Mobile Networks (IJWMN) - - -World Journ...
International Journal of Wireless & Mobile Networks (IJWMN)  - - -World Journ...International Journal of Wireless & Mobile Networks (IJWMN)  - - -World Journ...
International Journal of Wireless & Mobile Networks (IJWMN) - - -World Journ...
 
533 450-457
533 450-457533 450-457
533 450-457
 
10.1109@maes.2020.2970262
10.1109@maes.2020.297026210.1109@maes.2020.2970262
10.1109@maes.2020.2970262
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunication
 
O010528791
O010528791O010528791
O010528791
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
18
1818
18
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor Network
 
A Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor NetworksA Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor Networks
 
An efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksAn efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networks
 
FlechaMoreno_Bachelor_Thesis
FlechaMoreno_Bachelor_ThesisFlechaMoreno_Bachelor_Thesis
FlechaMoreno_Bachelor_Thesis
 

Recently uploaded

HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 

Recently uploaded (20)

HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 

WIFI SIGNALS TO DETECT BOMBS AND CHEMICAL EXPLOSIVES

  • 1. WIFI SIGNALS TO DETECT BOMBS AND CHEMICAL EXPLOSIVES
  • 2. Contents • Introduction • Requirement • Working • System overview • Two Wi-Fi antenna Setups • Object Risk Estimation • Conclusion • References
  • 3. INTRODUCTION  The growing needs of public safety urgently require scalable and low-cost techniques on detecting dangerous objects hidden in baggage.  Traditional baggage check involves either high manpower for manual examinations or expensive and specialized instruments .
  • 4.  A system have developed that uses ordinary Wi-Fi to easily detect weapons , bombs and explosive chemicals in bags with nearly 90 per cent accuracy , demonstrating low-cost technology for security screening.
  • 5. REQUIREMENT  A Wi-Fi device  2 to 3 antennas  A Wi-Fi device with 2 to 3 antennas and can be integrated into existing Wi- Fi networks with low-cost and deployment efforts , making it more scalable and practical than the approaches using dedicated instruments.
  • 6. WORKING • This approach uniquely separates the wireless interface caused by two influencing factors of objects i.e., material and shape • To identify different materials we exploit the Wi-Fi signal transmitting through or bypassing the objects , which result in different characteristics like absorption , refraction and reflection in CSI values from antennas and their difference. • We can estimate its shape (width and height)or volume based on the finding that the strength of the reflected signal is proportional to the reflection area of the object.
  • 7. CSI(Channel State Information) • In wireless communications , channel state information refers to known channel properties of a communication link. • This information describes how a signal propagates from the transmitter to the receiver and represents the combined effect of scattering ,absorption and power decay with distance
  • 8.
  • 11. Object Risk Estimation through Reflection- Based Object Imaging 1. Extracting Reflected Signal from CSI Complex
  • 12. 2.Volume Estimation for Liquid Objects in Baggage
  • 13.
  • 14. CONCLUSION • To detect the suspicious objects using Wi-Fi technology . • No installation of high-cost security checking's infrastructures . • It can estimate the risk level of the object. • Extensive experiments are conducted with 15 objects and 6 bags over a 6 month period. The result show that this system can detect over 95% dangerous objects in different types of bags and successfully identify 90% dangerous material types.
  • 15. REFERENCES • P. MAZZEI, “Florida school, on edge since shooting, requires students to carry clear backpacks,” https://www.nytimes.com/ 2018/03/21/us/florida- school-shooting-clear-backpacks.html, 2018. • https://ieeexplore.ieee.org/document/8433142