A Lightweight Security Scheme (LSS) for Wireless Node Communication for Border Surveillance System
DOI:
https://doi.org/10.13052/jcsm2245-1439.1041Keywords:
Raspberry Pi, Wireless Security, WSN, Border Surveillance System, Lightweight CommunicationAbstract
The physical breach across the borders is a very common issue these days among nations sharing boundaries. It is controlled via proper border surveillance system. The border surveillance system is trivially a physical border intrusion detection system in which CCTV cameras are used traditionally to observe manually the presence of some intruder. Instead, we utilize the raspberry PI controller board based wireless sensor nodes fitted with raspberry PI camera for identifying the intruder. Once the intruder is identified, the wireless sensor nodes communicate the messages with the next hop sensor nodes and the message ultimately reaches the control room from where army action may be initiated. In this work, we propose a novel lightweight security scheme (LSS) for raspberry PI based wireless node communication for the Border Surveillance System. We have utilized the XBee (Zigbee) serial communication between raspberry PI based wireless sensor nodes. The proposed scheme is based upon the notion of confusion and correct identification of pattern (byte) in the transmitted messages. The entire communication scheme is lightweight and secure.
Downloads
References
N. Bhadwal, V. Madaan, P. Agrawal, A. Shukla, A. Kakran, “Smart Border Surveillance System using Wireless Sensor Network and Computer Vision,” International Conference on Automation, Computational and Technology Management (ICACTM), London, United Kingdom, pp. 183–190, April 2019.
Rajeev Singh and Sukhwinder Singh, “Raspberry PI based models for Smart and Automatic Monitoring Border Surveillance System”, submitted to ICTACT Journal on Communication Technology, 2021.
R. Bellazreg, N. Boudriga, S. An, “Border Surveillance using sensor based thick-lines,” ICOIN 2013, Bangkock, Thailand, 221–226, January 2013.
H. Afzaal and N.H. Zafar, “Modeling of IoT-based Border Protection System,” First International Conference on Latest trends in Electrical Engineering and Computing Technologies (INTELLECT), Karachi, pp. 1–6, 2017.
E. Felemban, “Advanced Border Intrusion Detection and Surveillance Using Wireless Sensor Network Technology,” Int. J. Communications, Network and System Sciences, 6, 251–259, 2013.
T. He, S. Krishnamurthy, J. A. Stankovic, T. Abdelzaher, L. Luo, R. Stoleru, T. Yan, L. Gu, J. Hui and B. Krogh, “An Energy-Efficient Surveillance System Using Wireless Sensor Networks,” 2nd International Conference on Mobile Systems, Applications and Services, Boston, 6–9 June 2004.
B. Sinopoli, C. Sharp, L. Schenato, S. Shaffert and Sh. S. Sastry, “Distributed Control Applications Within Sensor Networks,” Proceeding of the IEEE, August 2003.
http://www.cse.ohiostate.edu/siefast/nest/nest_webpage/ALineInTheSand.html
A. Arora, et al., “A Line in the Sand: A Wireless Sensor Network for Target Detection, Classification, and Tracking,” Journal Computer Networks, Vol. 46, No. 5, 2004.
Z. Sun, et al., “BorderSense: Border Patrol through Advanced Wireless Sensor Networks,” Ad Hoc Networks, 2011, pp. 468–477.
H. Luo, et al., “Ship Detection with Wireless Sensor Networks,” IEEE Transactions on Parallel and Distributed Systems, Vol. 23, No. 7, 2012, pp. 1336–1343.
A. Mishra, K. Sudan and H. Soliman, “Detecting Border Intrusion Using Wireless Sensor Network and Artificial Neural Network,” IEEE DCOSS 2010, Santa Barbara, 21–23 June 2010.
P. Rothenpieler, D. Kruger, D. Pfisterer, S. Fischer, D. Dudek, C. Haas, A. Kuntz and M. Zitterbart, “Flegsens: Secure Area Monitoring Using Wireless Sensor Networks,” Proceedings of the 4th Safety and Security Systems in Europe, 2009.
B. Bhardwaj, U. Pallapothu, “Wireless Smart System for Intruder Detection at Borders with Far-field microphone and TDOA,” International Conference on Smart Electronics and Communication (ICOSEC), Trichy, India, pp. 1257–1263, 10–12 Sept. 2020.
S. Jeevitha; S.V. Kumar, A Study on Sensor Based Animal Intrusion Alert System Using Image Processing Techniques, 2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp. 20–23, 12–14 Dec. 2019.
S. Angadi and R. Katagall, “Agrivigilance: A Security System For Intrusion Detection In Agriculture Using Raspberry Pi And Opencv”, International Journal of Scientific & Technology Research, 8(11):1260–1267, Nov. 2019.
S. Sruthy, S. Yamuna and S. N. George, “An IoT based Active Building Surveillance System using Raspberry Pi and NodeMCU,” pp. 1–9, 2020. Available at: https://arxiv.org/abs/2001.11340.
T. Prathaban, W. Thean, M.I.S.M. Sazali, “A vision-based home security system using OpenCV on Raspberry Pi 3,” Advances in Electrical and Electronic Engineering (AIP) Conference Proceedings 2173, 020013 (2019).
K. Rambabu, V.Haritha, S.Nikhil Srinivas, P.Sanjana Reddy, “IoT Based Human Intrusion Detection System using Lab View,” International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8(6S4): 557–560.
A.A. Ahmed, Y.W. Kit, A.A. Sallam, “Raspberry Pi-Based Investigating Model for Identifying Intrusion Evidence,” J. Forensic Sci. & Criminal Investigation, 7(3):1–9, 2018.
R.A. Nadafa, S.M. Hatture, V. M. Bonal, S.P. Naikb, “Home Security against Human Intrusion using Raspberry Pi,” International Conference on Computational Intelligence and Data Science (ICCIDS 2019), Procedia Computer Science 167 (2020) 1811–1820.
Z. A.Yasar, R. D. Kumar, S. Aadarsh, G. H. Kumar, “Border Surveillance System using Computer Vision,” 6th International Conference on Advanced Computing & Communication Systems (ICACCS), pp. 623–628, 2020.
Rajeev Singh and T.P. Sharma, “A Key Hiding Communication Scheme for Enhancing the Wireless LAN Security,” Springer Wireless Personal Communications, 2014, 77(2):1145–1165.
Rajeev Singh and T.P. Sharma, “A Novel Sequence Number Based Secure Authentication Scheme for Wireless LANs,” Journal of Electronics Science & Technology (JEST), 2015, 13(2):144–152.
Rajeev Singh and T.P. Sharma, “A sequence number based WLAN authentication scheme for reducing the MIC field overhead”, in: Proc. Tenth IEEE International Conf. on Comp. and Commun. Technologies, WOCN’13, Bhopal, July 2013, pp. 1–4.