Intruder Detection in Fog Computing for Smart Surveillance

Deep Learning / Computer Vision

Project Details

Project Information

Project Title: Intruder Detection in Fog Computing for Smart Surveillance

Category: Deep Learning / Computer Vision

Semester: Spring 2025

Course: CS619

Complexity: Very Complex

Supervisor Details

Project Description

Intruder Detection in Fog Computing for Smart Surveillance

Project Category

Computer Vision

1.Introduction Problem Statement

Surveillance systems play a crucial role in maintaining security and public safety. However, traditional cloud-based video analytics face challenges such as high latency, bandwidth congestion, and excessive reliance on centralized resources. The delay in transmitting real-time video streams to cloud servers leads to inefficiencies in detecting and responding to security threats, particularly unauthorized intrusions.

This project aims to implement a fog-based smart surveillance system specifically designed for intruder detection using a software-only approach. The system will integrate YOLOv5 and Faster R-CNN to identify unauthorized persons in restricted areas. Additionally, it will optimize task scheduling and resource allocation in a simulated fog computing environment using iFogSim. The study evaluates system performance in terms of latency reduction, bandwidth optimization, and resource efficiency compared to traditional cloud-based approaches.

 

2.Objectives

·       Develop an intruder detection model for real-time surveillance using YOLOv5 and Faster R- CNN.

·       Implement a fog computing simulation framework for decentralized video processing.

·       Optimize task scheduling and resource allocation using AI-based techniques (MPSO & RL) in a software environment.

·       Evaluate system performance with iFogSim simulation.

·       Compare fog-based intruder detection with traditional cloud-based methods.

 

3.Functional Requirements

3.1System Overview

The proposed system will be entirely software-based and will be developed using simulated data

instead of physical hardware. Key functionalities include:

3.2Functional Requirements Real-time Intruder Detection

·       Detect unauthorized individuals in restricted areas using YOLOv5/Faster R-CNN.

·       Process simulated video feeds from pre-recorded datasets or real-time streams. Fog Computing Simulation

·       Use iFogSim to simulate a fog computing environment.

·       Optimize bandwidth by sending only security alerts to the cloud.

Task Scheduling & Resource Allocation

·       Implement Modified Particle Swarm Optimization (MPSO) for load balancing.

·       Use Reinforcement Learning (RL) for adaptive scheduling. Performance Evaluation & Simulation

·       Simulate fog-cloud architecture using iFogSim.

·       Measure response time, bandwidth usage, and energy efficiency. Software-Only Approach

·       No dependency on physical hardware such as edge devices, cameras, or sensors.

·       Utilize synthetic or publicly available surveillance datasets.

 

4.  Proposed System Architecture

4.1  System Components

Simulated Video Feeds: Pre-recorded surveillance datasets or real-time video streams processed in software.

Fog Nodes (Simulated in iFogSim): Virtualized processing nodes for local object detection.

Cloud Server (Simulated in iFogSim): Stores logs and handles deep learning model updates.

User Dashboard (Software-based GUI): Displays detection results and sends alerts in a simulated environment.

4.2  Workflow

1.  Simulated video feed is processed in a software-based pipeline.

2️. Fog computing simulation in iFogSim distributes tasks to virtual nodes.

3️. Fog node performs real-time intruder detection using YOLOv5/Faster R-CNN.

4️. AI-based task scheduling optimizes resource allocation within the simulation.

 

Tasks Performed by Student

Step 1: Research & Model Selection (YOLO vs. Faster R-CNN) on pre-trained dataset.

Step 2: Setup iFogSim for simulation

Step 3: Develop object detection pipeline

Step 4: Implement scheduling algorithms for fog resource management (MPSO)

Step 5: Test & compare performance with cloud-based processing

 

Supervisor:

Name: Hina Rafique

Email ID: hina.rafique@vu.edu.pk

Skype ID: live:hina.rafique

 

Languages

  • Python Language

Tools

  • YOLOv5, Faster R-CNN, iFogSim, MPSO, Reinforcement Learning Tool

Project Schedules

Assignment #
Title
Start Date
End Date
Sample File
1
SRS Document
Friday 2, May, 2025 12:00AM
Thursday 22, May, 2025 12:00AM
2
Design Document
Friday 23, May, 2025 12:00AM
Tuesday 29, July, 2025 12:00AM
3
Prototype Phase
Wednesday 30, July, 2025 12:00AM
Friday 12, September, 2025 12:00AM
4
Final Deliverable
Saturday 13, September, 2025 12:00AM
Monday 3, November, 2025 12:00AM

Viva Review Submission

Review Information
Supervisor Behavior

Student Viva Reviews

No reviews available for this project.