# Introduction orders of all nations in this world are at danger and, because of their vast sizes, cannot in any way, shape, be observed in their whole by individuals at extremely inconvenient times of the day. Security is considered to be the primary concern of most of the countries in the world today. The increase in terror and other related crime activities have raised the need to develop and implement intrusion detection system that can raise an alarm whenever there is danger. There are many applications of intrusion detection mechanisms. The primary concern in this paper is the human and object intrusion mechanism. The study will focus on the development of the intrusion detection that will detect the activities of human beings, as well as, other intruders. Most of the intrusion detection systems have employed wireless sensor networks to facilitate the communication [1]. Wireless sensor networks are considered to provide not only easy implementation procedures but also rapid alternatives for building the network. Depending on the mode of deployment, the coordinates of the sensor devices can follow a given distribution pattern. The mode of distribution of the sensor devices will depend on the nature of the perimeter under surveillance. The analysis of the distribution mode will can be solved using a three dimensional field models and also analysis of nonuniform deployment [2]. Deterministic deployment can also work for plain and easily accessible fields.The system will be deployed in sensitive areas that are expected to have suspicious activities by human beings. The model developed here will make use of wireless sensor networks that will be controlled from a central point. The wireless sensor networks will work to track the detection signals that are obtained from each individual sensor.This paper is organized as follows: Section 2 presents the intrusion detection system architectural design. Section 3 briefly describes different types of sensors that used intrusion detection. Section 4gives the Network Model for WSN. Section 5 presents the intrusion detection systemtechniques. Section 6the recommended technique for Intrusion detection system. Finally, this paper is concluded in Section7. # II. Intrusion Detection System Architectural Design The design of a successful intrusion system will have to incorporate a given perimeter that will be defined by the monitoring system. Typical intrusion systems are normally developed to monitor a given perimeter which in most cases is defined by an object. The entire security perimeter of the border is coordinated from a central base station [3]. Any detection segment is sent to the central base station. It should be also mentioned the activity of such systems must be supported 24/7. The system should be allowed to run throughout its life. This ensures continuous monitoring of the defined region. Additionally, the deployment of the sensors should be made in such a way that the perimeter is entirely covered without any unattended spaces in between the nodes. This requires accurate and effective orientation and positioning of the sensor devices [4]. It can also be said that such system require a design where intruders are less likely to notice the location of the sensors. There is also need for the sensor devices to communicate to each other. This can only be accomplished through the use of line topology where the sensor devices are placed in a straight line of a semi-straight. This implies that routing will be very important in deriving the communication protocols for the sensors [5]. # III. # Intrusion Detection Sensors The decision on the location and distribution of the sensors is considered to largely contribute tothe success of the system. Human intrusion can be detected using many sensor modalities that do not emit a signal and sense how targets modify it. Magnetic sensors accept that the trespasser, for instance a person carrying weapons, has material that is magnetically sensitive [6]. Ferromagnetic material generates a particular magnetic signature, which can be sensed by means of a magnetometer. Footsteps of humans and animals, birds flapping their wings, etc., correspondingly make sound over and above the entity's voiced sound. Sensors designed to take measurements of sound are fundamentally hydrophones and microphones. Conversely, vibrationbased motion sensors sense displacement, velocity, and acceleration using ismometers/geophones, velometers, and accelerometers, respectively. Additionally, in the case of heavy vehicles there might be coupling between the acoustic noise and ground vibrations [7]. The acoustic waves travel at different speeds and their amplitudes decrease at different rates with distance or get absorbed at different rates. This helps in distinguishing the type of intruding vehicle or other noise source. Table above shows a comparison between different types of sensors used in detecting intrusion such ashuman beings, animals, or objects. Infrared, ultrasound and accelerometer are most common intrusion detection sensors. Comparing the infrared and accelerometer sensors, the infrared sensor has better movement detection properties [8]. In addition, an infrared sensor requires low energy and has an analogue output signal that gives the direction of an object's movement. Ultrasound sensors are used to locate objects such as human beings using the high frequency acoustic waves reflected from an object. The delay between transmission of the ultrasound pulse and the echo return helps determine the distance of the object. Accelerometer is a low power dynamic sensor used to determine the position and velocity, orientation or tilt and impact or vibration and shock. # IV. Intrusion Detection Sensor Models An intrusion detection sensor model is a model of a real time intrusion detection system that is capable of detecting penetrations, break-ins and other forms of abuse. An intrusion detection sensor model helps discover distinct pattern that describes an abnormal or intrusion activity. The discovered distinct pattern is used to train the detection model to recognize abnormalities and intrusion. The models are built using low cost sensors that send sound and light data to help the model make an automated decision and report an abnormality or intrusion activity. Each model of the network can monitor the local region and then communicate through the wireless channels with the other nodes for the collaborative production of a highlevel representing on the state of the environment [9].There are many different types of sensor models that can be employed in intrusion detection systems. Depending on the area to be covered and the type of space, different kinds of WSN can be deployed. Most of the outdoor applications are known to make use of microwaves, infrared, ultrasonic and radar sensor systems. The effectiveness of these models will depend on the target to sensor distance, environment, propagation characteristics, size and motion pattern of the target, amount of energy emitted, capability of the sensor etc [6].Below are the detailed descriptions about the most common detection sensor models. # a) Probabilistic Model Probabilistic sensing model is an accurate sensing model adopted in the analysis of the quality of coverage of WSN. A probabilistic sensing model takes into account the detection probabilities of the sending device, which decay with factors such as distance, hardware configuration and environmental conditions [10]. The probabilistic sensing model helps develop intrusion detection systems whose sensors are deployed and distributed in a manner that meets the system requirements and minimizes cost. Probabilistic sensor model relies on the threshold distance within which an intruder can be detected wirelessly. This implies that the threshold distance is governed by the perimeter of the space within which the detection should occur. In relation to Elfes' model the detection probability can be described by such physical parameters of the sensors that are accommodated by the generic model parameters. If the target sensor distance is abbreviated d, the detection probability is an exponentially decaying function of d. The rate of decay is determined by two parameters; y and B which reflect the sensor characteristics [11]. In general the probability that a sensor will detect a target can be found using the following relation. ?? ?? = ? 1 ?? ??? (?? ? ?? ?? 1 ) ?? 0 According to the formula above, the probabilistic sensing model sensor detects a target object with a probability of 1 if the distance between the target and the sensor d is below the threshold distance d t . This is a simplified formula using d alone that can be deployed indoors where the light of sight is ensured. According to the following, the following conditions holds: If d