Advanced Perimeter Intrusion Detection Systems

SMART Alarm, Intrusion & Perimeter Detection Perimeter Security, Alarms & Intruder Detection, Integrated Solutions, Products & Solutions

There are many perimeter security solutions on the market today. This publication discusses two: surveillance and electric fencing technologies. In this article, we look at a third, which can be a combination of many technologies: Perimeter Intrusion Detection Systems (PIDS). We look at what this solution delivers, with what, and what a good perimeter solution, in general, can and should consist of.

To find out more, SMART Security Solutions spoke to:

• Nick Grange from XtraVision,

• Cliff Rose from Modular Communications SA, and

• Scott Wilson from OPTEX.

SMART Security Solutions: In general, how do PIDS work, and how and where are they installed on the perimeter?

Grange: The PIDS are typically situated on the perimeter boundary of a facility. It is considered good practice to allow multiple systems to support each other, which gives the end user a better chance at detection. The following systems are commonly proposed:

1. Surveillance system with AI detection or a tool to visually verify alarms from PIDS.

2. PA VoIP system to communicate where an event is taking place. This reduces response time and time to engage with the would-be intruder

3. Other IoT devices, such as light switches or IOs from beams and outdoor detectors, electrified fence outputs, etc.

The advantage of most fibre-based PIDS is that they allow one to operate your detection on one or two single-mode fibres, and the balance of fibre on the cable run can be used to support these features, typically through an Ethernet backbone.

Rose: PIDS are detection devices normally installed about the perimeter to detect intruders coming into the area or moving within the space of the perimeter. PIDS is not a specific device or system and is not deployed in any fixed specific manner, rather, the choice of a detection system or device may be determined by many factors, which may include:

• The size of the object to be detected.

• The speed and direction of travel of the object.

• The ambient conditions of the environment.

• Lighting conditions, day and night.

• Weather conditions.

• The time it takes to traverse the perimeter boundary (fence or wall).

• The risk significance of the facility to be protected.

• The budget available to spend on the detection system.

• The budget available to spend on the physical perimeter barrier.

• There may be many more factors which determine the type of detection device or system chosen to detect an intrusion on the perimeter.

To answer how and where PIDS works and how or where it should be installed, careful consideration of the risks at hand is needed. The first consideration for a perimeter would be to provide a suitable physical barrier to deter possible intruders and then delay the intruder from getting past the perimeter into the protected area.

The second objective would be to detect an intruder before the perimeter, at the perimeter, or crossing the perimeter, verify such intrusion, and respond. Once the physical barrier is in place, the next consideration is how to detect a possible intrusion, considering the bullet points above.

Without going into various detection devices and systems, we should consider CCTV with video content analytics (VCA) using artificial intelligence (AI). This is by far the most progressive development for object intrusion detection and will continue to play a significant role in security applications for detection on perimeters going forward.

The application of ‘other’ detection devices should be considered to complement CCTV, VCA and AI for two main reasons:

• To develop a layered solution of detection devices where different technologies are used to detect intrusions in conjunction with the CCTV application in a double-knock scenario.

• To provide a method of detection where VCA and AI may not be practically applied.

Wilson: PIDS exist in many forms, with a vast array of security technologies and solutions available in the market. As new technology and systems continue to be developed, new possibilities can be realised.

Fundamentally, PIDS should address the five Ds: deter, detect, delay, defend, and deny. Traditionally, a big focus was placed on deter, be it physical, manned, or video security systems, providing a visible presence to deter intruders. This has changed over the years, with more sophisticated and organised intrusion attempts.

Intruders are not afraid of CCTV and electric fences. Standard fences and walls do not stop them from attempting to breach the perimeter, but these elements still have their part to play in the delaying process. Detection is now a critical component, particularly identifying what is happening (cutting, climbing, walking or digging), and where it is happening in real time.

The latest OPTEX FiberSenSys EchoPoint Distributed Acoustic Sensor (DAS) systems provide multiple benefits, such as enhanced accuracy and reliability, reduced false alarms, lower maintenance and the ability to provide detection in all weather conditions, making them suitable for all environments. A layered approach to security that combines multiple technologies and systems is vital and leads to increased and more responsive defences that lead to more intruders being deterred and denied access to the environment.

There is no single solution that can be used alone to achieve a complete security solution, and there is no one-size-fits-all solution that can be copied and pasted from site to site. In order to find the technologies and systems that are right for you, the individual characteristics and makeup of your site need to be considered. A comprehensive and complete security system can be designed and delivered by combining multiple technologies and solutions to perform specific functions that can be integrated and managed together.


SMART Security Solutions: Specifically, what PIDS solution does your company supply, and how does it work (acoustic, vibration sensors or cables, etc.)?

Grange: XtraVision distributes SAMM FOTAS in the African region. This is an Acoustic DAS system with a built-in AI system. The system detects both along fence lines (including walls), underground as well as pipelines.

The SAMM FOTAS system uses a single-mode fibre to detect vibrations caused by voice or similar disturbances, using a laser and sensing the backscatter caused by the disturbance. This allows the system to pinpoint the vibration to within 8 m along the run. The vibration or pattern caused is then compared to AI algorithms to cancel out unwanted alarms and ensure the system’s accuracy. SAMM FOTAS is considered one of the leading products in the industry due to its AI functionality and differentiates itself from other systems due to the low false alarm rate when compared to rule-based systems.

Rose: Modular offers CCTV solutions that include VCA and AI technologies and applies these using well-known CCTV brands available on the South African market. Besides local CCTV brands, Modular also imports high-end Dallmeier and Milesight solutions, including IoT detection devices integrated into CCTV systems as alarm triggers and controllers.

In addition to CCTV, Modular has designed and developed the AcoustAlert PIDS, which works on an acoustic vibration detection cable typically installed on perimeter fence systems like BestFence, BetaFence, ClearVu, and other conventional fencing systems.

So, on a perimeter, you may not be able to use VCA line crossing precisely on the fence line. For example, the fence may not be straight. AcoustAlert can be deployed on the fence and can accommodate direction changes. The CCTV camera’s line crossing or human detection capabilities can then be triggered at a safe distance from the fence line, which may also help with false alarms.

The AcoustAlert will pick up fence disturbances, which can be verified with CCTV. Should a fence trigger occur in conjunction with a line crossing or human detection, this could initiate a serious automated response to the intrusion.

Wilson: OPTEX FiberSenSys has 33 years of fibre detection technology, from the FD series with Polarimetric detection with multimode fibre to EchoPoint (DAS) technology with single-mode fibre. Both have unique and different applications and solutions.

FiberSenSys EchoPoint DAS can pinpoint detection on steel and concrete fences (precast, palisade, wire mesh, chain-link and ClearVu types of fences). It also includes walls, wall tops, razor coil, flat wrap and ground detection for walking, running, and digging. FiberSenSys has the highest accreditation and certification with Priority Level-One Nuclear (PL-1N) and CPNI approval at US military and government installations.

An advanced pattern-recognition classification algorithm is incorporated into FiberSenSys EchoPoint to distinguish between genuine intrusion attempts and false alarms caused by wildlife or adverse weather. EchoPoint can be fence mounted, buried underground or in a hybrid layout, and can detect incidents accurately to within +/- 6 m for a range of up to 100 km.

For reliability, the sensors are immune to electromagnetic interference, radio frequency interference, and lightning strikes. They are ideally suited to customers’ demanding and growing needs for securing large perimeters and high-security sites, including airports, logistics centres, mines, critical infrastructure, data conduits and pipelines.


SMART Security Solutions: What central station or platform is required to collect and interpret the data collected along the perimeter? Is AI integrated into the data analysis to improve identification and reduce false alarms? The system’s sensitivity be adjusted to prevent false alarms?

Grange: The system runs on an Ubuntu system and is made up of the parts below:

• The sensor cable (fibre optic).

• An interrogator.

• A processing unit (including FOTAS AI).

• The FOTAS UI.

The quality of signal processing and nuisance alarm rate control results from the quality of artificial intelligence. The location where it is installed always has its own specifications that must be processed in terms of artificial intelligence. We provided this agility and flexibility (additional developments), which gives us great leverage to win the client.

Our AI is very well-developed and proven on several sites. We can adjust sensitivity if required, as our manufacturer provides this capability. If something triggers the system, such as a motor turning on and off near the fibre, we can see this and write this into the AI, so the AI understands the times and type of vibration and signal associated and will no longer trigger

We have already integrated the system into local products and will continue to expand the offering. Detection can be done on a single fibre; the balance of fibres in the infrastructure (the same fibre cable) can be used for other services such as communication, camera, audio, and third-party integrations. Many of our recent designs include a spanning tree network configuration, allowing for the integration and addition of these devices to the IP network. The spanning tree configuration provides a good level of redundancy in the network.

Our fibre is installed using GPS-coordinated positioning, thus creating a map on the graphical user interface. Should an alarm occur, the operator will know the location within 4 m of activation. This will send a coordinate to a third party, such as a camera or drone, to investigate and verify the intrusion if required.

Rose: The central station or platform is also determined by the budget and the risk assessment of the protected space. In most applications, it is important to have a graphical representation of the site and indications on the display (workstation monitor) indicate the type of alarm and position of the alarm on the perimeter, this is offered in the normal AcoustAlert software for site management and alarm display.

Further, the CCTV management software we use, Network Optix, manages alarm inputs, video switching, display sequences, and alarm outputs, which can be programmed to suit site conditions and client expectations for alarm situations. As already mentioned, VCA and AI technologies are the main points of interest when considering PIDS.

Human detection systems and AI learning capabilities certainly reduce false alarms. This is the main reason for applying AI: to reduce alarms and improve the detection capability of camera systems to ensure that wanted alarms are detected as efficiently as possible.

During the commissioning of a CCTV system, the detection sensitivity, as well as object size, speed, direction, and colour, can be configured depending on ambient conditions that affect positive detection probability. However, this should always be used in a layered approach to PIDS to further reduce false alarms and make positive detection probabilities more reliable in layered configurations.

Wilson: OPTEX FiberSenSys products detect and interpret data at source with their own AI. Most have their own web interface or software that can be stand-alone or integrated at larger sites. Data analytics is playing an increasingly important role in security, particularly in threat detection and response. With technological advances, data can be collected, analysed, and used to create real-time alerts and reports, allowing for quick and effective responses to potential security breaches.

Data can improve the accuracy and effectiveness of security sensing technologies. OPTEX commercial products are equipped with intelligent detection algorithms that can analyse large volumes of data to identify patterns. Over time, they can learn to distinguish between normal and abnormal patterns, allowing them to detect and differentiate changes in the environment from genuine intrusions.

On EchoPoint, sensitivity can be adjusted per zone, on different fencing material types, and even in the ground. This ensures accurate detection through different mediums to reduce nuisance alarms


Nick Grange.

SMART Security Solutions: Is this a stand-alone system, or can it be integrated into other management platforms? For example, can data from the PIDS be used to slew cameras to view the area where an intrusion is detected?

Grange: XtraVision has been involved in many POCs (proof of concepts) recently within South Africa and around Africa. We run it as a standalone system, using camera feeds from existing video management systems. We have integrated with EoCortex, Arteco, and Genetec, to name a few, and are currently busy with new integration functionality into Cathexis.

Rose: CCTV, VCA, and AI can be used as stand-alone systems if the viewing conditions and environment are clinical and false alarms or nuisance conditions are minimal. Similarly, our AcoustAlert PIDS can be used as a stand-alone, and in many cases, it is. Obviously, if an alarm is detected, you would need to have a suitable alarm response.

The more common application for where PIDS and AcoustAlert PIDS are used in a layered arrangement can and are generally integrated into management platforms and used to slew PTZ cameras to view the area where an intrusion is detected. In addition, it is possible to switch on perimeter lights, trigger alarm sounders, and perform any other required sequence. In all Modular’s security applications, CCTV using VCA and AI is front and centre.

Wilson: Most OPTEX PIDS are integrated into the more well-known VMS and camera platforms, which makes integration with cameras and other security devices easy. Integration has become a central topic in the security market, and the integration between devices and systems is a fundamental aspect of the system itself.

Integrating all the different sensing technologies is the key to the best complete solution. This makes monitoring and operations easy. This can be done in many ways, from analogue contacts and relays to full software integration between the products and technologies. It all hinges on what the client has already, what the budget is, and what the final SOP should be. Nonetheless, there are multiple options to make a solution workable.

Ultimately, it can all hinge on budgets and existing systems, but the most complete PIDS integrates several different sensing technologies, simplifying monitoring and operations.

SMART Security Solutions: What is your go-to-market strategy in South and southern Africa? Do you work direct, through partners (or both), have local support warranty services, stock, etc.?

Grange: XtraVision is the distribution house; we sell to the entire market, create opportunities with end users, and write tenders where necessary. However, if the end user has a preferred vendor, we assist and ensure the installation is done correctly, as well as help with configuration. We have pricing models in place to protect the integrator as well as the end user. XtraVision conducts support and supply functions for SAMM FOTAS products, and we carry spares.

Rose: Modular Communications has a dual approach to market strategy:

1. For blue-chip companies, we will work directly with our clients to best understand their requirements and design and install accordingly, ensuring the best customer pre- and after-sales service.

2. We work with contractors to supply a complete turnkey solution for large multi-disciplinary projects.

An important aspect of our business philosophy is to always ensure that the system warranty is fully realised and that future maintenance SLA agreements are put in place so that the systems operate optimally for many years.

Wilson: OPTEX’s team in South Africa provides support in the country, across the continent, and internationally if required. This includes assisting in designing and specifying all sites to ensure the correct applications and solutions are recommended and installed. Part of our ongoing commitment is to work with the best partners and installers to ensure we support customers and end-users with the highest level of service and support possible.

As part of this partnership, we provide training and certification to support our distributors with best-practice setup, installation, and application of all of our sensing solutions. We ensure all system integrators and installers are trained and certified before purchasing to ensure speedy and correct installation and that the system works as effectively and efficiently as possible for the customer.

For more information, contact:

• OPTEX, [email protected], www.optex-europe.com


Credit(s)







Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Cameras have long been a feature in perimeter security, with varying reports of success and failure, often dependent on the cameras’ planning, installation and configuration, as well as their integration with other perimeter solutions and centralised management platforms.

Read more...
Onyyx wireless alarm
Technews Publishing Editor's Choice Smart Home Automation
IDS has introduced Onyyx, a wireless alarm system engineered to provide complete system control via the Onyyx app or keyring, as well as seamless installation.

Read more...
Directory of suppliers
Perimeter Security, Alarms & Intruder Detection
The Directory of Product and Solution Suppliers for the alarm, intrusion, and perimeter markets includes details of companies that provide security and risk mitigation products, advice, and services to these verticals.

Read more...
Visual verification raises the security game
Videofied SA Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Incorporating alarm signals with live surveillance footage, visual verification enables a human observer in a control room (onsite or offsite) to gain a clear understanding of the situation, thereby facilitating informed decision-making.

Read more...
Two systems to enhance the efficacy of intrusion detection
Perimeter Security, Alarms & Intruder Detection
The OPTEX RedScan Pro and RedScan mini-Pro sensors, as well as the company’s Fibre SenSys solution, are highly accurate intrusion detection systems that employ two very different yet powerful technologies, providing two types of intrusion detection solutions.

Read more...
From wireless alarms to smart homes
Elvey Security Technologies Perimeter Security, Alarms & Intruder Detection Products & Solutions
The final brand SMART Security Solutions features in its discussions with companies operating in South and southern Africa’s detection and alerting technologies market is DSC, distributed in the region by Elvey Security Technologies.

Read more...
Hadeda-proof sensor technologies
Reditron Perimeter Security, Alarms & Intruder Detection
SMART Security Solutions highlights Takex, represented locally by Reditron, speaking to Gordon Moore, Reditron’s National Sales Director, and Mark Crichton, Takex Channel Manager for South Africa.

Read more...
What not to do: Key ‘don’ts’ in perimeter security systems
Fang Fences & Guards Perimeter Security, Alarms & Intruder Detection
Many people know what to do when securing a perimeter; in this article, Johan van Wyk highlights the important ‘don’ts’ to consider when implementing a turnkey perimeter security solution.

Read more...
The AX Hybrid PRO Series offers reliable wired and wireless protection
Hikvision South Africa Editor's Choice Perimeter Security, Alarms & Intruder Detection Products & Solutions
Hikvision has announced the launch of a new AX Hybrid PRO alarm system with innovative Hikvision ‘Speed-X’ transmission technology. This system offers reliable wired protection while delivering expanded flexibility with seamless wireless integration.

Read more...
Intrusion Selection Guide 2024
Technews Publishing Perimeter Security, Alarms & Intruder Detection
The Intrusion Selection Guide 2024 includes the latest products and solutions aimed at small, medium, and large operations that require reliable, easy-to-install, set-up, and use intruder detection technology that reduces false alarms but never misses an actual event.

Read more...