INSUREX_SYSTEMS
Access & Intrusion

Capability Use Case

Perimeter Defense & Drone-Based Surveillance

Layered perimeter protection combining fiber-optic fence sensing, radar detection, autonomous drone response, and thermal imaging.

PythonONVIFMQTTKafkaGISReactWebSocketTensorFlowDockerREST API
Perimeter Defense & Drone-Based Surveillance

Executive Summary

Our perimeter defense solutions create layered detection zones that identify, classify, and track threats from the outer boundary to the asset perimeter, providing security operators with verified threat intelligence and autonomous drone-based visual confirmation before committing human response resources. Clients protecting critical infrastructure—energy substations, data centers, water treatment facilities—have eliminated nuisance alarm fatigue while achieving sub-30-second detection-to-verification timelines. The layered approach reduces the physical guard force required for perimeter patrol by 60-70% while simultaneously improving detection coverage to 24/7 all-weather capability.

The Challenge

Critical infrastructure perimeters present unique detection challenges. Facilities may span thousands of meters of fence line through varied terrain—open fields, wooded areas, waterfronts, and adjacent public roadways. Traditional perimeter security relies on CCTV and periodic guard patrols, creating coverage gaps both spatial (blind spots between cameras) and temporal (patrol intervals of 30-60 minutes). At a 2-kilometer perimeter, a determined intruder can breach, transit the detection zone, and reach critical assets within 3-5 minutes—far less than the typical patrol interval.

Single-technology perimeter detection systems suffer from unacceptable false-alarm rates in outdoor environments. Fence-mounted vibration sensors trigger on wind, wildlife, and vegetation contact. Outdoor motion cameras alert on shadows, headlights, and thermal shimmer. Buried cable sensors activate during ground frost heave and heavy vehicle traffic on adjacent roads. Each false alarm requires operator attention, guard dispatch, or both—and the resulting alarm fatigue is the primary reason genuine perimeter breaches are missed.

Regulatory frameworks for critical infrastructure demand specific perimeter security performance levels. NERC CIP-006 for bulk electric system facilities requires defined Electronic Security Perimeters and Physical Security Perimeters with monitored access points. CFATS for chemical facilities mandates risk-based security performance standards including detection, delay, and response. NRC 10 CFR 73 for nuclear facilities specifies detection probability thresholds and assessment timelines. Any perimeter defense system must demonstrate measurable performance against these standards.

Our Approach

We design layered perimeter defense architectures with three concentric detection zones. The outer zone (50-200 meters beyond the fence line) uses ground-surveillance radar (Magos, Navtech, or Axis D2210-VE) to detect and track moving targets in all weather conditions, classifying them as human, vehicle, animal, or environmental. The mid zone (fence line) uses distributed fiber-optic sensing (DAS) cable bonded to the fence fabric, detecting climbing, cutting, and lifting attempts via acoustic signature analysis. The inner zone (fence line to asset boundary) uses thermal imaging cameras with video analytics for target classification and tracking.

When the outer zone radar detects a human or vehicle target approaching the perimeter, the system cues the nearest PTZ camera to the target's radar-derived coordinates and initiates classification. If the target reaches the fence line and triggers the fiber-optic sensor, the system correlates the radar track with the fence alarm (spatially and temporally) to confirm a breach attempt and elevates the event to a verified alarm. At this point, the system can dispatch an autonomous drone (DJI Dock 2, Skydio X10, or Nightingale Security) to the breach location for real-time aerial visual assessment, providing the operator with live video of the threat before committing a physical response.

The correlation engine fuses data from all sensor layers, maintaining persistent target tracks from detection through assessment and response. Each target is assigned a threat score based on behavior patterns: direct approach to the fence line scores higher than parallel movement, cutting/climbing signatures score higher than leaning/pushing, and post-breach movement toward critical assets triggers maximum priority. The entire detection-classification-assessment pipeline executes within 30 seconds, meeting NERC CIP and CFATS assessment timeline requirements.

Key Capabilities

Multi-Layer Sensor Fusion

Radar, fiber-optic fence sensing, and thermal imaging operate as correlated detection layers, requiring multi-sensor confirmation before alarm escalation and reducing single-sensor false alarms by 90%.

Autonomous Drone Dispatch

Pre-programmed drone response missions launch within 15 seconds of a verified perimeter alarm, providing live aerial video assessment of the breach location and autonomous target tracking along configurable flight corridors.

Distributed Fiber-Optic Sensing

Coherent optical time-domain reflectometry (C-OTDR) detects and classifies fence-line disturbances (climbing, cutting, lifting, impact) with 3-meter spatial resolution along the entire fiber run, using a single interrogation unit for up to 40 km of fiber.

Threat Scoring & Behavior Analysis

Persistent target tracking with behavioral pattern analysis assigns dynamic threat scores based on approach vector, fence interaction type, and post-breach movement, enabling proportional response escalation from monitoring to drone dispatch to armed response.

Technical Architecture

The distributed fiber-optic acoustic sensor (DAS) uses coherent optical time-domain reflectometry to detect phase changes in backscattered light along a standard single-mode fiber bonded to the fence fabric. The interrogation unit (OptaSense, Fotech, or Halo) pulses a narrow-linewidth laser into the fiber and analyzes the returning Rayleigh backscatter at 10,000 samples per second per spatial resolution cell (3-5 meters). Classification algorithms running on the interrogation unit's embedded GPU distinguish between climbing signatures (periodic loading with 1-3 Hz cadence), cutting (high-frequency broadband acoustic signature above 2 kHz), lifting (low-frequency sustained loading), and environmental noise (wind: broadband below 500 Hz, rain: stochastic broadband). The DAS system covers up to 40 km of fence line from a single interrogation unit, with fiber routed through weather-sealed conduit along the fence line and terminated in a reflective loop for bidirectional monitoring.

Ground surveillance radar integration uses the Magos ScenarioPlus or Axis D2210-VE radar units, which output target tracks via the ONVIF Profile M analytics metadata interface or vendor-specific REST APIs. Radar tracks include target position (range and bearing, converted to GPS coordinates via known radar mounting position), velocity, radar cross-section (RCS), and vendor-classified target type. Our correlation engine ingests radar tracks and fiber-optic events via MQTT, performing spatial correlation using PostGIS spatial functions: a radar track passing within 10 meters of a fence DAS activation within a 5-second temporal window generates a correlated multi-sensor event with confidence scoring based on the consistency of the spatial and temporal alignment.

Autonomous drone dispatch is orchestrated via the drone manufacturer's SDK (DJI FlightHub 2 API for DJI Dock, Skydio Cloud API for Skydio X10). Upon receipt of a verified perimeter alarm, the system generates a mission flight plan from the nearest drone dock to the alarm location, including waypoints for optimal camera angles considering the breach direction indicated by the radar track. The drone launches within 15 seconds, reaches the breach location within 60-90 seconds (typical for perimeters up to 1.5 km from the dock), and enters an autonomous orbit pattern providing continuous video of the breach zone. Video is streamed via WebRTC to the operator console and simultaneously recorded to the evidence management system. All drone operations comply with FAA Part 107 waiver requirements for BVLOS (Beyond Visual Line of Sight) operations at the facility.

Specifications & Standards

DAS Resolution
3-5 m spatial, 10 kHz sampling, 40 km fiber range
Radar Coverage
600 m range (human), 1,200 m (vehicle), 360° scan
Drone Response
< 15 s launch, < 90 s on-target, 40 min flight time
False Alarm Rate
< 1/km/day with multi-sensor correlation
Compliance
NERC CIP-006, CFATS RBPS, NRC 10 CFR 73
Thermal Imaging
640x512 VOx, NETD < 40 mK, human detect @ 1,800 m

Integration Ecosystem

Magos Radar SystemsOptaSense / Fotech DASAxis Thermal Cameras (Q29 Series)FLIR / Teledyne ThermalDJI Dock 2 / FlightHubSkydio X10 / Cloud APIGenetec Security CenterMilestone XProtect

Measurable Outcomes

98.5% detection probability (Pd) validated
Independent third-party testing at a NERC CIP-regulated substation confirmed 98.5% detection probability for human perimeter breach attempts across 197 test scenarios including day, night, rain, fog, and wind conditions up to 45 mph.
65% reduction in guard patrol costs
A data center campus replaced 24/7 vehicle patrol routes (4 guards per shift, 3 shifts) with sensor-based perimeter monitoring and drone verification, reducing the perimeter security guard force from 12 FTEs to 4 FTEs plus a centralized monitoring operator.
28-second average detection-to-assessment
The full pipeline from initial radar detection through fiber-optic fence alarm correlation to drone-delivered visual assessment averaged 28 seconds across 847 alarm events during the first year of operation, well within the 60-second CFATS assessment requirement.

Let's Build

READY TO START?