A Survey of Different Methods in Border Security and Surveillance

Authors

  • Sood P Guru Nanak Dev Engineering College, Ludhiana, India
  • Sharma H Guru Nanak Dev Engineering College, Ludhiana, India
  • Sehra SK Guru Nanak Dev Engineering College, Ludhiana, India

DOI:

https://doi.org/10.26438/ijcse/v7i10.217228

Keywords:

Wireless Sensor Networks (WSNs), ZigBee, OPNET Simulator, Barrier Coverage, Wireless Integrated Network Sensors (WINS), Raspberry Pi, IoT, Radio Frequency Identification (RFID) tags

Abstract

This paper presents a review of the existing border security and surveillance techniques proposed, keeping in view the energy optimization and economic integration at the same time. As the task of border monitoring becomes more and more difficult, searching for solutions beyond physical barriers may be one way to improve security. This paper aims to compare different researches in border security with respect to technique, technology, merits and demerits, time complexity, efficiency and unique features. This paper also highlights their fundamental working principles. The solely aim of this paper is to present a direct comparison of various major researches done in this field so as to facilitate the best optimized method to be deployed according to the current scenario.

References

[1] P. Andreas, “Perspective: Border Security in the Age of Globalization: How Can We Protect Ourselves without Losing the Benefits of Openness?,” 2003.

[2] T. Academy, R. Academy, and S. S. Trakt, “Border Management Security Council,” Appl. Phys. A. [Online]. Available: https://www.un.org/sc/ctc/focus-areas/border-control/ accessed on August 2,2019.

[3] N. Paudyal, “10 Toughest Borders In The World.” accessed on August 7,2019.

[4] UN, “Border Management,” 2013. [Online]. Available: https://www.un.org/counterterrorism/ctitf/en/uncct/border-security-initiative, accessed on August 12,2019.

[5] PIB, “Smart Fencing Indo Pak Jammu Border,” 2018. [Online]. Available: https://pib.gov.in/PressReleaseIframePage.aspx?PRID=1546376, accessed on August 12,2019.

[6] PIB, “Smart Fencing Indo Bangladesh Border,” PIB 2019. [Online]. Available: https://pib.gov.in/Pressreleaseshare.aspx?PRID=1567516, accessed on August 20,2019.

[7] WCO, “Smart Border World,” 2019. [Online]. Available: http://www.wcoomd.org/en/media/newsroom/2018/november/world-customs-organization-dedicates-2019-to-transforming-frontiers-into-smart-borders.aspx, accessed on August 21,2019.

[8] M. A. M. and M. M. I. Additional, “Overview of Wireless Sensor Network Chapter.”

[9] X. Hu, “Wireles ss Sens sor Ne etwork k : Cha aracte eristics s and Ar rchitec ctures,” vol. 6, no. 12, pp. 1398–1401, 2012.

[10] M. R. Senouci, “WSN Image.” [Online]. Available: https://www.researchgate.net/profile/Mustapha_Senouci/publication/265396190/figure/fig2/AS:295817744273409@1447539854939/A-typical-WSN-architecture.png, accessed on August 23,2019.

[11] S. Siraj, A. K. Gupta, and Badgujar-Rinku, “Network Simulation Tools Survey,” Int. J. Adv. Res. Comput. Commun. Eng. Vol. 1, Issue 4, June 2012, vol. 1, no. 4, pp. 201–210, 2012.

[12] M. Alkhathami, L. Alazzawi, and A. Elkateeb, “Large scale border security systems modeling and simulation with OPNET,” 2017 IEEE 7th Annu. Comput. Commun. Work. Conf. CCWC 2017, pp. 1–8, 2017.

[13] S. Mittal, “OPNET: An Integrated Design Paradigm for Simulations,” Softw. Eng. An Int. J., vol. 2, no. 2, pp. 57–67, 2012.

[14] G. Gao, “Deployment of WirelessHART,” no. Fskd, pp. 2120–2124, 2012.

[15] A. Kuki, “Modeling computer networks by the help of OPNet tools,” vol. 1, pp. 251–258, 2015.

[16] C. M. Ramya, M. Shanmugaraj, and R. Prabakaran, “Study on ZigBee technology,” ICECT 2011 - 2011 3rd Int. Conf. Electron. Comput. Technol., vol. 6, no. April, pp. 297–301, 2011.

[17] D. Products, “Zigbee Wireless Mesh Networking Link.” [Online]. Available: https://www.digi.com/resources/standards-and-technologies/zigbee-wireless-mesh-networking, accessed on August 24,2019.

.[18] Raspberry Pi Foundation, “Raspberry Pi.” [Online]. Available: https://opensource.com/resources/raspberry-pi, accessed on August 25,2019.

[19] Gadget Geek, “Zigbee image.” [Online]. Available: https://i0.wp.com/www.gadgetgeek.info/wp-content/uploads/zigbee_network2-3.jpg?w=413, accessed on August 29,2019.

[20] A. Imteaj, T. Rahman, M. K. Hossain, and S. Zaman, “IoT based autonomous percipient irrigation system using raspberry Pi,” 19th Int. Conf. Comput. Inf. Technol. ICCIT 2016, pp. 563–568, 2017.

[21] R. Karthikeyan, S. Karthik, T. R. Prasanna Vishal, and S. Vignesh, “Snitch: Design and development of a mobile robot for surveillance and reconnaissance,” ICIIECS 2015 - 2015 IEEE Int. Conf. Innov. Information, Embed. Commun. Syst., pp. 5–8, 2015.

[22] Raspberry Pi Foundation, “Raspberry Pi 4 Image.” [Online]. Available: https://www.raspberrypi.org/products/raspberry-pi-4-model-b/, accessed on August 29,2019..

[23] E. – E. P. for E. Students, “RFID web link.” [Online]. Available: https://www.elprocus.com/rfid-basic-introduction-simple-application/, accessed on September 2,2019..

[24] E. – E. P. for E. Students, “RFID tag image.” [Online]. Available: https://www.elprocus.com/wp-content/uploads/2013/09/RFID-Tag.jpg, accessed on September 2,2019.

[25] E. – E. P. for E. Students, “RFID reader image link.” [Online]. Available: https://www.elprocus.com/wp-content/uploads/2013/09/An-RFID-reader.jpg, accessed on September 2,2019.

Downloads

Published

2019-10-31
CITATION
DOI: 10.26438/ijcse/v7i10.217228
Published: 2019-10-31

How to Cite

[1]
P. Sood, H. Sharma, and S. K. Sehra, “A Survey of Different Methods in Border Security and Surveillance”, Int. J. Comp. Sci. Eng., vol. 7, no. 10, pp. 217–228, Oct. 2019.