Professional Documents
Culture Documents
ABSTRACT
In the last decade, the usage of wireless sensor network (WSN) has become a powerful tool that connects the physical and
digital world. Currently, WSN is applied in numerous applications such as monitoring of buildings, wildlife and habitats,
pipelines, and smart electrical grid control. The conventional border patrol systems are highly labour intensive, requiring
constant human involvement. In addition, there is the lack of a coordination unit to provide accuracy to the system. Therefore,
this study presents the implementation of the method of surveillance and intrusion detection system to measure the sensor
nodes.
1. INTRODUCTION
Wireless Sensor Networks (WSNs) have been emerging in the last decade as powerful tools for connecting physical and
digital world. WSN provide distributed network and Internet access to sensors, controls, and processors that are deeply
embedded in equipment, facilities, and the environment. WSN is applied in many applications such as monitoring of
buildings, wildlife, pipelines, manufacturing, healthcare, environmental monitoring, and security. One of the most
recent monitoring applications of WSNs is the border control application. Surveillance of a given area is one of the
major application situations for wireless sensor networks. Wireless sensor nodes help in monitoring a given area, such
as private property or a border. They are also helpful in helping track trespassers. In order to help detect moving
objects, the nodes should be equipped with a number of sensors [1]. The passive infrared sensors are among the
cheapest and simplest to use in this situation. As they communicate with each other, sensor nodes track moving
directions and positions of various objects and report them to the base station [2]. In areas demanding extreme safety,
the nodes should be able to report the locations of the objects in a given time with great accuracy [3]. This paper will
discuss the use of wireless sensor nodes in border surveillance while considering the effectiveness, reliability, and
power consumption issues.
2. RELATED WORK
Several works has been done in the past in the field of secure surveillance with WSN for the border control. While my
literature review going on, I searched for the studies and the researches that are related with analysis of border control
systems. I also searched for how to increase border control security. The border patrol has extensively been based on
human involvement. The first study [4] found that many works have addressed border surveillance applications based
Page 17
on WSNs. Many solutions using WSNs have organized the network nodes as a line-sensor, where every movement
going over a barrier of sensors is detected. In this case, sensor nodes deployment should guarantee barrier coverage.
Compared to full coverage, a barrier coverage based on a perfect linear deployment requires fewer sensor nodes and
may experience radio disconnection due to sensor failure and depletion. The sensor nodes have various capabilities or
functionalities, such as, provision of accurate detection and a larger detection range. In addition, the ground sensors
also provide additional data that cannot be detected by the existing border patrol techniques. On the other hand, the
underground sensors provide efficient system functionalities where devices that are placed above the ground are not
desired. The mobile sensors also offer intrusion tracking capabilities. Therefore, by improving the network processing,
these types of sensors are able to detect and relay information to a remote administrator [4].
Second studyLiu et al, investigated the construction of sensor barrier on long strip area of irregular shape when sensors
are distributed according to Poisson point process. To ensure that trespassers cannot cross the border undetected,
multiple disjoint sensor barriers will be created in distributed manner covering large scale boundaries. Then, a
segmentation technique has been proposed to achieve continuous barrier coverage of the whole area. Also Liu et focuses
on applying WSN applications for border surveillance globally. Such need emanates from the growing risks near
borders that every country should take care of. In the first part of the article, existing studies on the topic are analyzed
and several significant drawbacks of modern WSN applications for border surveillance were revealed: insufficient
coverage, lack of tracking (for linear deployment), high costs, rough surface, ineffectiveness of random deployment etc.
In order to solve these issues, authors offer three new elements: connected coverage (thick line architecture along the
border), deployment strategy, and routing mechanism for data transferring between nodes. Authors also made two
simulations in order to learn the influence of l-coverage on routing technique and the amount of hops necessary to
communicate Data Relay Node (DRN) line. It was revealed that with the larger value of k, the number of uncovered
nodes decreased. The definition of the k-barrier coverage is as follows. The definition of k- barrier coverage denotes a
region covered by a sensor crossing paths with another k- sensor through the coverage area. Underground and ground
sensors are deployed at predetermined positions. To achieve optimal manual deployment of the k- barrier area of the
belted region, k rows of sensors are deployed along the shortest path possible[5].
The third study researchers from the University of Virginia and Carnegie-Mellon University developed an energy
efficient WSN system for detecting moving vehicles through a passage line in a stealthy manner. They used the MICA2
platform, this MICA2 Mote is a third generation mote module used for enabling low-power, wireless, sensornetworks.
The primary goal for using the MICA2 platform with 70 MICA2 motes, is for the wireless sensor networks security,
Surveillance, and Force Protection. Also they used it for the environmental monitoring for large scale wireless networks
up to (1000+ points). They deployed 70 MICA2 motes, along a 280 feet long perimeter in a grassy field that would
typically represent a critical choke point to be monitored. Each of the these motes is equipped with a 433 MHz Chipcon
radio with 255 selectable transmission power settings. While this radio is sufficient to allow the motes deployed in the
field to communicate with each other, it is not capable of long-range (> 1000 ft) communication when put on the
ground [6].
Page 18
data directly to node j when j i + 2. This is because it consumes additional power. In the event of the greedy
algorithm, all nodes tend to run out of power simultaneously. This means that in any given instance, all nodes consume
the same energy that was offered initially [9].
Conversely, in case D <C(1/(y+1)), then the nodes exist in such a manner that xi> D; for example, node
1. Since the optimum distance di D has Idi = min (d, xi), some of the nodes are left behind due to lack of energy. This
happens when other nodes are out of energy. In this case, the greedy algorithm fails to be efficient and the alternative is
to create a heuristic remedy to allow the other nodes to supply the energy so that the data can be sent away. For
instance, node 1 should be allowed to send data directly to node 3 as reflected in figure 1. In this case, the algorithm
would work efficiently while erecting wireless sensor nodes in border surveillance [10].
Page 19
RSSI
1
4- 20m
1-20m
0-8m
0-5m
8- 30m
5-15m
1-12m
0-8m
15- 40m
10-30m
5-15m
0-10m
40- 70m
25-50m
20-30m
0-20m
The most common performance indicators of wireless sensor nodes include resiliency, as well as global and local
connectivity. In terms of local connectivity, there is a probability whereby two linked sensor nodes use a common key to
create a secure link for communication. For global connectivity, a certain proportion of nodes establish secure
connection over several nodes. Therefore, it is true that when distributing sensor nodes, it is appropriate to exercise
caution to ensure that they are not subject to compromise. This would play a vital role in ensuring that sensor nodes
work efficiently and provide better results during the border surveillance process [11].
Page 20
analyze interference by other elements, irregular propagation, and environmental conditions that lead to discarding of
packets. This process plays a major role in terms of evaluating and defining various communication protocols that
govern wireless sensor nodes during the border surveillance process [18]. Therefore, to ensure that wireless sensor
nodes are reliable, it is appropriate to implement measures of determining the prevailing problems to establish effective
ways of improving their reliability and effectiveness.
6. CONCLUSION
Networks of small, densely distributed wireless sensor nodes are capable of solving a variety of collaborative problems
such as monitoring and surveillance. Border security is a primary concern of the national security agenda in this period
of terrorism and threats of terrorism. Use of wireless sensor nodes in border surveillance play a major role in detecting
intruders and allows appropriate actions to be taken, especially in high security areas. The issue of wireless sensor
nodes reliability is accorded considerable attention to make sure the sensors operate efficiently. In this case, it is
appropriate to ensure that sensor nodes are reliable regardless of power consumption. Nonetheless, as technology
evolves, it is crucial to identify the appropriate ways of reducing power consumption while sustaining or improving
their reliability.
REFERENCES
[1] An, Sunshin. Border Surveillance using Sensor-based Thick Lines. Bangkok: Korea University, 2013.
[2] Wu, Jie. Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer
Networks. New York, NY: CRC Press, 2010.
[3] Hassani, Amin, Alexander Bertrand, and Marc Moonen. "Cooperative Integrated Noise Reduction and NodeSpecific Direction-of-Arrival Estimation in a Fully Connected Wireless Acoustic Sensor Network." Signal
Processing 107.2 (2015): 66-81.
[4] Sun, Zhi, et al. "BorderSense: Border patrol through advanced wireless sensor networks." Ad Hoc Networks 9.3
(2011): 468-477.
[5] Ramzi, NoureddineBoudriga, and Sunshin An. "Border Surveillance using sensor based thick-lines." Information
Networking (ICOIN), 2013 International Conference on. IEEE, 2013.
[6] T. He, S. Krishnamurthy, J. A. Stankovic, T. Abdelzaher, L. Luo, R. Stoleru, T. Yan, L. Gu, J. Hui and B. Krogh,
An Energy-Efficient Surveillance System Using Wire-less Sensor Networks, 2nd International Conference on
Mobile Systems, Applications and Services, Boston, 6-9 June 2004.
[7] Vecchio, Massimo and Roberto Lpez-Valcarce. "Improving Area Coverage of Wireless Sensor Networks via
Controllable Mobile Nodes: A Greedy Approach." Journal of Network and Computer Applications 48.1 (2015): 113.
[8] Haas, Christian. Secure and Flexible Border Surveillance Using Wireless Sensor Networks. Telematics,12Mar.
2013. web. 14 Feb. 2015. <https://telematics.tm.kit.edu/english/staff_725.php>.
[9] Perrig, Adrian and Robert Szewczyk. Sensor Network Key Distribution. Sparrow, 1 May. 2014. web. 14 Feb. 2015.
<https://sparrow.ece.cmu.edu/group/wsnkeydist.html>.
[10] Arputhavijayaselvi, Susila. "Innovative Energy Resourceful Merged Layer Technique (MLT) of Node Deployment
to Enhance the Lifetime of Wireless Sensor Networks." Egyptian Informatics Journal 1.1 (2014): 1-16.
[11] Sun, Ning, Youngbuk Chou, and Sangho Lee. Node Classification Based on Functionality in Energy-Efficient and
Reliable
Wireless
Sensor
Networks.
Hindawi,
16
Dec
2012.
web.
14
Feb.
2015.
<http://www.hindawi.com/journals/ijdsn/2012/937462/>.
[12] Guoqiang, Mao. Localization Algorithms and Strategies for Wireless Sensor Networks: Monitoring and
Surveillance Techniques for Target Tracking: Monitoring and Surveillance Techniques for Target Tracking.
Hershey, PA: IGI Global, 2012.
[13] Tezcan, Nurcan. Energy-efficient and Reliable Data Transfer in Wireless Sensor Networks. California, CA:
ProQuest, 2013. Print.
[14] Tan, Yen Kheng. Energy Harvesting Autonomous Sensor Systems: Design, Analysis, and Practical
Implementation. New York, NY: CRC Press, 2013.
[15] Li, Wei and Zhang Wei. "Coverage Hole and Boundary Nodes Detection in Wireless Sensor Networks." Journal of
Network and Computer Applications 48.2 (2013): 35-43.
[16] Kar, Koushik and Suman Banerjee. Node Placement for Connected Coverage in Sensor Networks. IA State
University, 15 Jul. 2014. web. 14 Feb. 2015. <http://www.ece.iastate.edu/~kamal/Docs/kk04.pdf>.
[17] Malaki, Morteza. Energy-efficient Strategies for Deployment and Resource Allocation in Wireless Sensor
Networks. California, CA: ProQuest, 2009.
Page 21
[18] Halder, Subir and Das Bit Sipra. "Enhancement of Wireless Sensor Network Lifetime by Deploying Heterogeneous
Nodes." Journal of Network and Computer Applications 38.1 (2014): 106-124.
AUTHOR
Mosad Alkhathami is a full-time Ph.D. candidate of Electrical and computer Engineer at Wayne
State University. He received his M.S. in Telecommunication system from DePaul University for
Graduate Studies/ Chicago in 2011, the B.S in Electrical and Computer Science from Purdue
Calumet University/ Hammond, IN in 2009. Mosad Alkhathami, now doing his Ph.D. thesis in the
field of embedded systems and wireless sensor networks.
Dr. Lubna Alazzawi received her PhD from University of Technology and University of MichiganDearborn, USA joint program. Dr. Alazzawi is currently working in the Department of Electrical
and Computer Engineering at Wayne State University, USA. Prior to joining Wayne State
University, She was teachingin the Department of Electrical and Computer Engineering at
University of Michigan, Dearborn, USA. She also worked there as
Page 22