Intelligent Wireless Sensor Network System to shrink Suspected Terror from Militants

Full Text (PDF, 282KB), PP.54-61

Views: 0 Downloads: 0

Author(s)

SanjeevPuri 1,*

1. Singhania University, Jhunjhunu, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2012.03.07

Received: 24 Jun. 2011 / Revised: 3 Oct. 2011 / Accepted: 9 Dec. 2011 / Published: 8 Apr. 2012

Index Terms

Sensor Networks, Suspected Terror System, Impending Threats, Scattered Detectors, IWSN, Energy aware routing

Abstract

In current scenario, there are always impending threats from militants and terrorists within and out of a country. The sensor networks play a vital role in minimizing the loss of human lives in the event of usual calamity and artificial sabotage created by terrorists. The sensor networks can be successfully deployed in any difficult geographical terrains where manual round-the-clock surveillance is highly impossible. Energy aware routing is immensely helpful to sensor networks in the aspect of extending the life span of the WSNs. In this paper, an automatic suspected terror system based on wireless sensor networks is developed, which is designed for high-rise metro structure. In order to provide early extinguish of impending threats by putting any bomb, large numbers of detectors which periodically measure noise, smell, infringement, vibration, temperature concentration, unidentified stranger photo are deployed from major streets. Those scattered detectors report their monitoring information to the surveillance center via the self-organizing hierarchical intelligent wireless sensor networks (IWSN). Test results from it show that the automatic suspected terror system achieves the design requirements.

Cite This Paper

SanjeevPuri, "Intelligent Wireless Sensor Network System to shrink Suspected Terror from Militants", International Journal of Computer Network and Information Security(IJCNIS), vol.4, no.3, pp.54-61, 2012. DOI:10.5815/ijcnis.2012.03.07

Reference

[1]Barrenetxea, M. Vetterli, 2008. Wireless sensor networks for environmental monitoring: the sensor scope experience. IEEE International Zurich Seminar on Communications, Zurich, pp: 98-101.
[2]Nallusamy, R., K. Duraiswamy and D.A. Muthukumar, 2010. Energy efficient clustering and shortest path routing in wireless ad hoc sensor networks using (WASN) approximation algorithms. J. Math. Technol., 1: 154-160.
[3]C.S., S. Lee, P. Mitra and S. Kumara, 2009. Distributed energy balanced routing for wireless sensor networks. Comput. Ind. Eng., 57: 125-135.
[4]Al-Karaki, J.N. and G.A. Al-Mashaqbeh, 2007. Energy-centric routing in wireless sensor Networks Microprocessors Microsyst., 31: 252-262.
[5]Lattanzi, E., E. Regini, A. Acquaviva and A. Bogliolo, 2007. Energetic sustainability of routing algorithms for energy-harvesting wireless sensor networks. Computing Comm.,30: 2976-2986.
[6]Minami, M., T. Morito, H. Morikawa, A battery-less wireless sensor network system for environmental monitoring applications 2nd International Workshop on Networked Sensing Systems, June 2005
[7]Yang, Y., R.S. Blum and B.M. Sadler, 2009. Energy-efficient routing for signal detection in wireless sensor networks. IEEE Trans. Signal Process, 57: 2050-2063.
[8]F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Communications Magazine, vol. 40, no. 8, pp. 102–114, 2002.
[9]J. Suhonen, M. Kohvakka, M. Hännikäinen, and Hämäläinen, "Design, implementation, and experiments on outdoor deployment of wireless sensor network for environmental monitoring," 6th International Workshop on Architectures, Modeling, and Simulation (SAMOS '06), vol. 4017 of Lecture Notes in Computer Science, pp. 109–121, Samos, Greece, July 2006.
[10]M. Kuorilehto, J. Suhonen, M. Hännikäinen, and Hämäläinen, "Tool-aided design and implementation of indoor surveillance wireless sensor network," in 7th International Workshop on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS '07), vol. 4599 of Lecture Notes in Computer Science, pp. 396–407, Samos, Greece, July 2007.
[11]V. A. Kaseva, M. Kohvakka, M. Kuorilehto, M. Hännikäinen, and T. D. Hämäläinen, "A wireless sensor network for RF-based indoor localization," EURASIP Journal on Advances in Signal Processing, vol. 2008, Article ID 731835, 2008.
[12]M. Kohvakka, J. Suhonen, M. Kuorilehto, V. Kaseva, M. Hännikäinen, and T. D. Hämäläinen, Energy-efficient neighbor discovery protocol for mobile wireless sensor networks," Ad Hoc Networks, vol. 7, no. 1, pp. 24–41, 2009.
[13]K. Sohrabi, J. Gao, V. Ailawadhi, and G. J. Pottie, "Protocols for self-organization of a wireless sensor network," IEEE Personal Communications, vol. 7, no. 5, pp. 16–27, 2000.
[14]T. He, J. A. Stankovic, C. Lu, and T. Abdelzaher, "SPEED: a stateless protocol for real-time communication in sensor networks," in Proceedings of the 23th IEEE International Conference on Distributed Computing Systems, pp. 46–55, May 2003.
[15]E. Felemban, C.-G. Lee, and E. Ekici, "MMSPEED: multipath Multi-SPEED protocol for QoSguaranteeof reliability and timeliness in wireless sensor networks," IEEE Transactions on Mobile Computing, vol. 5, no. 6, pp. 738–754, 2006.
[16]P. K. Pothuri, V. Sarangan, and J. P. Thomas, "Delay-constrained, energy-efficient routing in wireless sensor networks through topology control," in Proceedings of IEEE International Conference on Networking, Sensing and Control (ICNSC '06), pp. 35–41, April 2006.
[17]O. Chipara, Z. He, and Z. He, "Real-time power-aware routing in sensor networks," in Proceedings of the 14th IEEE International Workshop on Quality of Service (IWQoS '06)
[18]F. Ye, G. Zhong, S. Lu, and L. Zhang, "GRAdient broadcast: a robust data delivery protocol for large scale sensor networks," Wireless Networks, vol. 11, no. 3, pp. 285–298, 2005.
[19]P. Volgyesi, G. Balogh, A. Nadas, C. B. Nash, and A. Ledeczi, "Shooter localization and weapon classification with soldier-wearable networked sensors," in Proceedings of the 5th International Conference on Mobile Systems, Applications and Services (MobiSys '07), pp. 113–126, 2007.
[20]L. G. Roberts, "Aloha packet system with and without slots and capture," ACM SIGCOMM—Computer Communication Review, vol. 5, no. 2, pp. 28–42, 1975.
[21]J. Syrjarinne, Studies of modern techniques for personal positioning, Ph.D. dissertation, Tampere University of Technology, Tampere, Finland, March 2001.
[22]"SOAP Version 1.2 W3C Recommendation," 2007, http://www.w3.org/TR/soap12-part1