Join or Sign in

Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.

To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.comMember Registration
https://www.asmag.com/rankings/
INSIGHTS

5 technologies that are hot in perimeter security now

5 technologies that are hot in perimeter security now
Many end user organizations attach great importance to perimeter security, for which a variety detection technologies are used. This note discusses some of the perimeter security technologies that are gaining traction.
Many end user organizations attach great importance to perimeter security, for which a variety detection technologies are used. This note discusses some of the perimeter security technologies that are gaining traction.
 
Perimeter security aims to deter intrusion right at the outside of the end user’s premises. As such, it’s important for a variety of end user entities from critical infrastructure and military compounds to commercial and residential sites. Demand for perimeter security has been growing at a steady pace; according to MarketsandMarkets, the perimeter security components market is set to grow from US$61.3 billion in 2020 to $96.5 billion by 2026, at a CAGR of 7.9 percent.
 
Perimeter security entails detection of threats by way of sensors, each with a unique detection method. Below we discuss some of the perimeter security technologies that are gathering momentum.
 

Lidar

 
A lidar sensor emits laser pulses into the environment and calculates the distance of an object based on the time it takes for the pulses to travel back. Lidar’s advantage, as compared to video, is it’s agnostic to light or inclement weather conditions. “Benefiting from the substantial interest generated in the automotive sector, lidar solutions continue to decrease in price while offering improved environmental performance specifications for outdoor operation,” said Brad Martin, Director of Product Management at Senstar.
 

Fiber optic

 
Fiber optic sensors work by transmitting pulses of laser light into an optical fiber and measuring light reflections that occur along its length. A disturbance of the fiber caused by fence vibrations due to someone climbing or putting a ladder against the fence, for example, changes the amount of light returned from that point. “Fiber optic sensors, already a well-established solution, are seeing renewed interest with the availability of highly cost-effective solutions for smaller sites along with extended, 20-plus year deployment lifetimes,” Martin said.
 

Wireless communications

 
More and more, sensors and the backend system communicate wirelessly. “Wireless communications between the sensor and main system are increasing due to increasing market confidence on the wireless technology. Especially this trend is remarkable in the residential and small to medium size commercial sites,” said Ken Arimura, GM for Asia Pacific Sales Division at OPTEX.
 

Smartphone capability

 
Remote control and monitoring features are heavily demanded as well. “Smartphone capability for the remote control and monitoring is a must now for residential inquiries. Some projects require home automation capability in addition to it,” Arimura said.
 

Video

 
Video surveillance has now emerged as a popular, if not essential, technology for perimeter security. “Without doubt video surveillance is being increasingly used in perimeter security, not least due to the growth in remote monitoring which brings a greater need for visual verification to reduce costs associated with responding to false alarms. Other sensors are valuable in establishing that something has breached a perimeter – or tried to – but video allows remote operators to more clearly establish what it is and, crucially, the most appropriate response,” said Niklas Rosell, Global Product Manager for Smart Camera Features at Axis Communications.
 
“Video is critical for perimeter security – without immediate, video-based assessment of alarms, security personnel may lose confidence in their intrusion detection systems. To maximize the effectiveness of video surveillance and assessment, the video management system must be able to link the intrusion location (ideally down to a few meters or feet) to a specific camera or PTZ preset. Automated camera call-up offers a multitude of benefits: faster operator response, reduced training requirements, optimized video quality and retention settings, and the ability to trigger location-specific deterrents,” Martin said.
 
Yet the use of video should also depend on the use case and scenario. “We protect some very large sites where it is too difficult to get power into the field to support CCTV. Our optical fiber-based PID solutions require no power or electrics in the field so it is much more cost effective to secure large or remote perimeters. However, for smaller sites where power isn’t such a concern, then almost all of the projects we work on have some form of video integration, either direct into our controllers or via a PSIM or SMS. Our clients benefit from the visual confirmation of an intrusion and the ability to deploy an appropriate response,” said Mark Horton, VP of Bandweaver Technology.
 

Sensor fusion

 
Needless to say, each detection technology has its pros and cons. Sensor fusion, or the use of a combination of these technologies, then, makes perimeter detection more effective.
 
“To truly benefit from the gains of these technologies, organizations require intelligent, integrated solutions that can maximize the strengths of each individual technology. This is why sensor fusion is generating substantial, renewed interest,” Martin said. “Real sensor fusion leverages today’s impressive computing power for analyzing real-time data alongside historical, locational, environmental, and classification information before generating an alarm. For operators, this holds the key to finally defeating nuisance alarms while maintaining the highest levels of security.”
 

Video and other sensors as an example

 
Pairing intrusion detection sensors with video is an example. “Video as a sensor has limitations – it does not work in the dark and often lacks the detail in contrast or spatial context for high accuracy detection/classification. These limitations can be overcome by combining the video data with data from complimentary sensors. For example, tripwire sensors such as fiber provide alerts for large, fenced perimeters, while radar and lidar add spatial information and work in poor environmental conditions,” said Srinath Kalluri, CEO of Oyla.
 
“Integration with sensor and IP camera/VMS is increasing. In Asian market, video solution is the first choice for the end-user to think about security solution. However, many customers will add sensing solution to trigger the video recording and notification in order to complement the weak point of video-only solution,” Arimura said. “The most common solution they choose is active infrared beam sensors. Some high security-required places would choose laser scanning and fiber sensors. The interest to the new trend of visual verification by video and alarm combined solution like CHeKT can be seen in some alarm monitoring service companies.”


Product Adopted:
Others
Subscribe to Newsletter
Stay updated with the latest trends and technologies in physical security

Share to: