border surveillance in wireless sensor network system ... · border surveillance as it differs from...
TRANSCRIPT
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248 Volume: 5 Issue: 6 376 –380
_______________________________________________________________________________________________
376 IJFRCSCE | June 2019, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
Border Surveillance in Wireless Sensor Network System using Log Shadowing
Sensing Model
Shivam Rohilla1, Sukhmani Chabra
2
Student1 – N. C. C.E, Israna, Department of CSE, Panipat, Haryana, India
Assistant Professor2– N.C.C.E, Israna, Department of CSE, Panipat, Haryana, India
[email protected], [email protected]
2
Abstract – Borders are extremely vulnerable and prone to terrorist attacks, smuggling and illegal immigration. Border surveillance application
has become one of promising application areas of wireless sensor networks. A primary objective of this application is the detection of illegal
crossing; intruder in the border area. However, the quality of the intruders detection affected by various conditions such as the sensor density, the
sensor ranges the area width and the intruder crossing paths. The latter is an important factor for evaluating the performance of the WSN based
border surveillance as it differs from one intruder to another. To achieve enhanced situation awareness it is necessary to fuse sensor and
information data. An estimation of the intruders crossing paths is necessary then to provide a proper and efficient design of the network. Log
shadowing sensing model is implemented in this article for maximizing number of barriers. In this implemented fading model, receive power
enhanced using gamma function. The proposed algorithm used of a round-robin approach where end nodes are relaying a keep-alive message to
other end nodes, in order to minimize the number of messages required to keep a continuously consistent view of safety-critical nodes and links.
This article gives robust distributed approach to the border surveillance in WSNs in order to maximize the number of barriers and minimize energy consumption.
Key Words –Wireless sensor networks, border surveillance, Intruder, Surveillance System
__________________________________________________*****_________________________________________________
I. INTRODUCTION
An important problem in WSN based surveillance application
is the intruder detection while obtaining long system lifetime,
as well as maintaining sufficient sensing coverage and
reliability. In that case, the detection level of the intruders
within a border monitored area can be used as a performance
metric of the deployed network. In actual fact, an intruder will
try to traverse the border area and reach the destination
without being detected. For this context, most of researchers in
the past research results consider only linear network
architecture [1] and where the sensors are deployed either
randomly or uniformly according to one surveillance line. This
is particularly useful in idealistic situations with perfect
conditions. However, the border areas separating two countries
are generally long of hundreds of kilometers containing
mountains, valleys and rough terrain that can cause significant
changes in the sensors deployment methods and cause radio
disconnection. In addition to this, due to the irregular
geographic conditions making some areas hard to access, the
intruders trying to avoid detection when crossing the
monitored area can choose to penetrate this area following
different and various paths. In fact, the intruder may prefer
some paths because of their geographical advantages and
penetrate through them. Those paths should be geographically
feasible and differ from one intruder to another. Therefore, a
good designing of the WSN should be dined taking into
consideration the intruder crossing paths in such a way that the
overall cost of the network is minimized while guaranteeing
the desired QoS in terms of intruders’ detection [2].
Furthermore, the presence of different and various intruders
crossing paths requires the sensor nodes to be deployed non-
uniformly. In this context, we consider multi-thick lines
architecture where the monitored area will be divided into
smaller zones that we denote subareas. The size of the
subareas can be determined according to the terrain properties
and the characteristic of the crossing intruders. As mentioned
before, the intruders may cross the area according to different
paths [3]. This parameter inspires us to develop a model that
estimates the time spent to cross the area from its entrance
until the exit point. We further provide a sensor deployment
method for better intruder detection rate where we assume that
the set of possible paths that can be followed by the intruders
are known by the system.
Figure 1 Border Surveillance System
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248 Volume: 5 Issue: 6 376 –380
_______________________________________________________________________________________________
377 IJFRCSCE | June 2019, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
II. INTEGRATED SURVEILLANCE SYSTEMS
Border surveillance makes use of a number of systems that
detect threats and conspicuous behavior. Within an integrated
surveillance system, disparate technologies that complement
one another are installed, the interaction of the data output is
essential. An integrated surveillance system consists of
sensors, exploitation systems (that might also be deployed as
situational awareness displays) and external information
systems. Border is monitored by a range of different sensor
types. Those sensors deliver data to a border surveillance unit
(BSU). However, the areas that are monitored intersect and
data that is of interest for one surveillance unit may also be of
interest for adjacent units [4]. Our architecture allows the
necessary data sharing and accommodation of additional
information from external systems resulting in enhanced
situation awareness
Exploitation Systems
Exploitation Systems are used for the exploitation of
reproduced data. Exploitation can be done in different contexts
and can be specific to the system, data type, area or task. For
exploitation systems that work on products that are produced
from multiple sensors it is important that data are available in
an inter-coordinated data format. Exploited data normally
already contain more enhanced information similar to the
sensor data it has to be integrated adequately into a common
picture [8-9]. This type of information is of interest for upper
decision bodies. Still some special expertise is needed to read
and decide upon it.
Information Systems
Information systems are relevant for the rating/ evaluation of
derived data and information. Weather data can give essential
advice which product sources are of interest in certain
circumstances, systems such as the Schengen Information
System provide data on detected persons or goods and
databases/information services freely available on the Internet
can provide background information for all kinds of questions.
Public information sources are subject of data protection and
the usage of this data has to be legally defined across borders.
The system type, structure, language and concepts that are
used within those systems differ from region to region and
nation to nation. This is why an integration and combined
usage of such system information is extremely complicated
[6].
Sensor Systems
Sensor systems normally consist of the sensor and a ground
station that does the primary data processing and possibly
some exploitation. Combined sensor systems that consist of
different sensors might use some sensors as triggers for others
and only the secondary information is passed on to an
“outside” exploitation system. Depending on the sensor type
and the processing a proprietary data stream may be created
[10]. To observe land and sea borders it is necessary to make
use of different sensor types with differing ranges and tasks:
Long-Range border surveillance conducted by space borne
and airborne systems is of interest for an all-weather and 24
hour detection of threats that harm a wide area. The sensors
can deliver all kinds of imagery such as IR, electro optical and
synthetic aperture radar as well as motion imagery, signal
intelligence or radar data.
Airborne Sensors, including the use of balloons or zeppelins
can be used for medium-range border surveillance.
Ground-Based or seaborne sensors are mainly used for short-
range surveillance. Real time information can be provided on
critical areas, objects and people [5]. Seaborne sensors can be
installed above or under water. The display of sensor data in a
common picture only makes sense if the operator/analyst is
able to interpret that information correctly. Raw sensor data
have to be interpreted by specialists. Therefore sensor data are
only provided on system, local or at the most the regional
level.
III. METHODOLOGY
Problem Formulation
In implementation of network simulation there are various
problem arises in term of technical and social and these
challenges must be resolved before the deployment. Some of
the challenges are depicted below:
Network Management:
Security Issues
Congestion and collision Control
MAC Design
Data Consistency Liability
Reference work used learning automata approach to solve
coverage problem. It presented distributed border surveillance
(DBS) algorithm that aims to find the minimum possible
number of nodes in each barrier to monitor the network
borders [7]. In DBS approach, learning automaton assists to
find the best nodes to assure barrier coverage at any moment.
In this scheme, used binary sensing model for detect of nodes
probability.
Objective
The DBS algorithm has been implemented through WSNs
simulator. The performance results of the proposed solution
are compared to reference work. We analyzed the performance
with the following inputs:
Total number of nodes N
Sensing range of node Rs
Network height
Network width
It is worthy to state that we used a random deployment
scenario to scatter nodes in the network. It estimated the target
location, velocity and trajectory in a distributed and
asynchronous manner. The accuracy of the algorithm is
analytically derived under ideal binary sensing model and
extensive simulations of ideal, imperfect and faulty sensing
models show that the algorithm achieves good performance.
Log Shadowing Sensing Model
Log shadowing sensing model is implemented in this article
for maximizing number of barriers. In this implemented fading
model, receive power enhanced using gamma function. The
proposed algorithm will make use of a round-robin approach
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248 Volume: 5 Issue: 6 376 –380
_______________________________________________________________________________________________
378 IJFRCSCE | June 2019, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
where end nodes are relaying a keep-alive message to other
end nodes, in order to minimize the number of messages
required to keep a continuously consistent view of safety-
critical nodes and links.
Figure 2 General Flowchart for deploying log shadowing
model
Figure 3 Monitoring Phase
Shadowing gives a path loss exponent factor to describe the
effect of micro environment, and a random factor to describe
the shadowing effect. The dependencies of all the factors
(obstacles such as building, foliage) have been taken into
account in this sensing model. Here, the sensing ability of a
node is not uniform in all the directions. This is similar to
shadowing in radio wave propagation. Assuming log-normal
shadowing path loss model, the probability that an event at a
distance x from the node will be detected is given by
𝑃𝐷 𝑦 = 𝑄 10𝑛𝑙𝑜𝑔 𝑦 𝑟𝑠
𝜕
Where n denotes path loss exponent (2 ⩽ 𝑛 ≤ 4), 𝑟𝑠 denotes
sensing radius without fading.
IV. RESULT AND DISCUSSION
SOFTWARE: It is powerful software that provides an
environment for numerical computation as well as graphical
display of outputs. In Matlab the data input is in the ASCII
format as well as binary format. It is high-performance
language for technical computing integrates computation,
visualization, and programming in a simple way where
problems and solutions are expressed in familiar mathematical
notation.
Table 1 Various Simulation Parameters used in NS2
Network Animator Simulation Result
Figure 4 NS 2 network animation file for deploying 10 sensor
nodes
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248 Volume: 5 Issue: 6 376 –380
_______________________________________________________________________________________________
379 IJFRCSCE | June 2019, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
Figure 5 NS 2 network animation file showing packet loss in a
cluster of 10 nodes
Figure 6 Base and proposed work comparative analysis for
number of barriers with network height 20
Figure 7 Base and proposed work comparative analysis for
network width 20 meter
Figure 8 Number of base barrier and number of proposed
barrier comparative analysis for diverse sensing range with
100 nodes
Figure 9 Base and proposed work comparative analysis for
different network size and R=40 m
Figure 10 Base and proposed work comparative analysis for
different network size
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248 Volume: 5 Issue: 6 376 –380
_______________________________________________________________________________________________
380 IJFRCSCE | June 2019, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
V. CONCLUSION
Border surveillance is one of the high priorities in the security
of countries around the world. Border surveillance must be so
tight otherwise it leads to heinous crime. Border monitoring
systems are peculiar province of the intelligent technologies
by the implementation of WSNs. Traditional border
observations unable to provide complete surveillance at
borders. Therefore need intelligent system like various types
of advanced sensors, laser wall, smart fencing. In our
dissertation we implemented fully distributed approach using
log sensing shadowing model to enhance network overall
performance by locating BPs. We implemented an efficient
approach for maintaining the BPs in the network, which
updates their structure in a stochastic way. By implementing
log shadowing sensing model technique number of barriers
depicted the efficiency of proposed work better than exist one
for various parameters like network height, width, and range.
In order to implement WSN for border surveillance, it is
compulsory to have a secure WSN with appropriate protocols
because there are possibilities of diverse attacks in WSN.
REFERENCES
[1] Y. Wu and M. Cardei, “Distributed algorithms for barrier
coverage via sensor rotation in wireless sensor networks”, J.
Combinatorial Optim. pp. 1–22, 2018
[2] Biswarup Deb, Bishal Das, Ankita Paul, Bobby Sharma,
“Smart Border Monitoring System-A Survey”, International
Journal of Innovations & Advancement in Computer Science,
IJIACS ISSN 2347 – 8616, Volume 7, Issue 3, March 2018
[3] Habib Mostafaei, Morshed U. Chowdhurry, and Mohammad S.
Obaidat, “Border Surveillance With WSN Systems in a
Distributed Manner”, IEEE SYSTEMS JOURNAL, January
11, 2018.
[4] H. Mostafaei, A. Montieri,V. Persico, and A. Pescap´e, “A
sleep scheduling approach based on learning automata for
WSN partial coverage,” J. Netw. Comput. Appl., vol. 80, pp.
67–78, 2017
[5] Arjun D, Indukala P K and K A Unnikrishna Menon, “Border
Surveillance and Intruder Detection Using Wireless Sensor
Networks: A Brief Survey”, International Conference on
Communication and Signal Processing, April 6-8, IEEE 2017,
India
[6] R. Han, L. Zhang, and W. Yang, “Maximizing strong barriers
in life time heterogeneous directional sensor network” , in
Proc. Int. Conf. Wireless Communication System, 2016, pp.
80–85.
[7] S. K. A. Imon, A. Khan, M. Di Francesco, and S. K. Das,
“Energy-efficient randomized switching for maximizing
lifetime in tree-based wireless sensor networks,” IEEE/ACM
Trans. Netw., vol. 23, no. 5, pp. 1401–1415, Oct. 2015
[8] M. Obaidat and S. Misra, “Principles of Wireless Sensor
Networks”, Cambridge, U.K.: Cambridge Univ. Press, 2014
[9] J. He and H. Shi, “Constructing sensor barriers with minimum
cost in wireless sensor networks”, J. Parallel Distrib. Comput,
vol. 71, pp. 1654– 1663, 2012
[10] A. Saipulla, C. Westphal, B. Liu, and J. Wang, “Barrier
coverage of line based deployed wireless sensor networks,” Ad
Hoc Netw., vol. 11, no. 4, pp. 127–135, 2009