THE PAPER | Application of Wireless Sensor Network Technology in Advanced Border Intrusion Detection & Surveillance

WSN is an emerging wireless technology that is used in many applications for collecting information from a field of interest. Two of the promising application spans are the border surveillance and intrusion detection applications.

 By Dr. Emad Felemban


Wireless Sensor Network (WSN) has been emerging in the last decade as a powerful tool for connecting physical and digital world. WSN has been used in many applications such habitat monitoring, building monitoring, smart grid and pipeline monitoring. In addition, few researchers have been experimenting with WSN in many mission-critical applications such as military applications. This paper surveys the literature for experimenting work done in border surveillance and intrusion detection using the technology of WSN. The potential benefits of using WSN in border surveillance are huge; however, up to our knowledge very few attempts of solving many critical issues about this application could be found in the literature.

THE PAPER |  Wireless Sensor Network Technology : Advanced Border Intrusion Detection and Surveillance

Image Attribute: ELBIT SAND - Smart All-Terrain Network Detectors / Download the TechDoc

Keywords: Wireless Sensor Network; Intrusion Detection Border Surveillance; Perimeter Surveillance; Remote Monitoring

1. Introduction

Wireless Sensor Network (WSN) has been emerging in the last decade as a powerful tool for connecting the physical and digital worlds. The great interest of WSN motivated hundreds of applications in many domains, such as healthcare, emergency responses, intelligent traffic control, and military applications. A wireless sensor network consists of a large number of unattended tiny devices equipped with different sensors to perform certain tasks [1,2]. They can be used in challenging places where it is inconvenient for human to be present. The sensors on the devices extract physical information from the environment, such as temperature through a temperature sensor, pressure through a barometer, noise through a microphone, and even an image through a camera or thermal camera. The collected data then are sent over to the control command for further processing.

There has been a great interest to utilize WSN for military applications and especially in border protection [3,4]. To reach its full proposed functionality, researchers of WSN used in border protection have to solve many interesting challenges, such as energy efficiency [5,6], communication and hardware reliability and security issues [7]. In this paper, we will present the state-of-the-art technology and deployment prototypes of WSN used in border surveillance and intrusions detection through surveying the literature for the current deployments and real-life experimentations. Also, we will list the requirements of such mission-critical application’s common challenges and possible solutions to overcome them. Very few attempts have been made to tackle this application, which opens the opportunity wide to the researchers to pursue research in this area.

The paper is organized as follows: Section 2 gives a brief background on the concept of wireless sensor networking and its applications. Section 3 lists the current projects and deployments of WSN in border protection and surveillance. Section 4 lists the challenges and research opportunities of WSN in the border surveillance field. Finally, Section 5 concludes the paper.

2. Background

One of the key advantages of wireless sensor networks (WSN) is their ability to bridge the gap between the physical and logical worlds, by gathering certain useful information from the physical world and communicating that information to more powerful logical devices that can process it. WSN will eventually eliminate the need for human intervention in many information gathering and monitoring applications, especially in confined or dangerous spaces.

The low-cost and small size features of WSN will enable the deployment of hundreds of nodes in any field of interest. Such huge density allows more dense collection of data in spatial and temporal domains. Sensor nodes contains of three main parts: 1) Processing unit; 2) RF transceiver; and 3) Energy source. Multiple sensor nodes self-form themselves to form a network to exchange information and deliver data to a common node called the sink node.

WSN has been applied in many applications [8], such as habitat monitoring [9], Point of Interest Building monitoring [10], pipeline monitoring [11], smart agriculture [12], and smart electrical grid [13]. Researchers, also, have extended the concept of land WSN into marine sensor network [14,15]. Because RF signals do not work under water, acoustic signals are used for communication. Marine wireless sensor networks offer an unmatched option to a wide range of different domains, such as monitoring coral reefs, fish habitats, and oil leaks from offshore facilities.

3. WSN in Border Surveillance

The role of WSN in border surveillance, as in most WSN applications, focuses on information gathering from various types of sensors, such as seismic, camera, thermal camera, and motion detectors. Some advanced WSN process these raw data and send an abstracted alarm or aggregated data to the command center, which, in turn, takes the appropriate defense action. Many researchers from different organizations have suggested solutions for border surveillance problems. In this section, we will survey the literature to list the projects in this regards. A summary of all surveyed literature is provided in Table 1.

3.1. Stealth Detection of Mobile Targets [16]

Researchers at the University of Virginia and Carnegie-Mellon University have developed an energy-efficient WSN system for detecting moving vehicles through a passage line in a stealthy manner.Figure 1 shows a picture of the deployment field and a diagram about the setup. The authors deployed 70 MICA2 sensor nodes running Tiny OS along a 280-feet-long perimeter. The sensor nodes were equipped with a magnetometer, as well as acoustic and photo sensors. Stealth capabilities were achieved by minimizing RF transmission and exposure to minimal.

To achieve its goal, the proposed system needs localization and time synchronization modules. In this project, localization is done through simple static configuration, assuming that the nodes’ locations are known priori. The time of all nodes is synchronized with respect to the base station.

The key performance measurement of the deployment is the Degree Of Aggregation (DOA) representing the sensitivity of the system. DOA is defined as “the minimum number of reports about an event that a leader of a group waits to receive from its group members, before reporting the event’s location to the base station”. The DOA could be dynamically configured for a performance evaluation. As the DOA increases, the number of tracking reports and false alarm decreases; however, the reporting time increases. Therefore, an optimization problem would be how to select the optimal DOA to achieve certain latency and minimize the number of reports and false alarms.

3.2. Evaders Detection with the Help of WSN [17]

Researchers the University of California at Berkeley proposed to deploy WSN to help pursuers detect and track evaders. The concept is based on a Pursuer-Evaders Game (PEG), wherein two teams, Pursuers and Evaders, compete. The WSN is used to locate enemy units and direct

Table 1. A summary of experimental setup of surveyed literature.

Table 1. A summary of experimental setup of surveyed literature.
Figure 1. Actual deployment in the test field and a high level diagram of the topology [16].

Figure 1. Actual deployment in the test field and a high level diagram of the topology [16].

Figure 1. Actual deployment in the test field and a high level diagram of the topology [16].

pursuer team members to catch them. All game units and actions are done in a distributed manner with no central command.

The use of a deployed WSN greatly improved the overall performance of a PEG. Pursuers have a relatively small detection range. They employ limited capability sensing techniques, such as computer vision or ultrasonic sensing; however, with the help of WSN, complete visibility of the field and communication over a long radius becomes possible. Figure 2(a) shows the visibility capability to pursuers in a traditional PEG, while Figure 2(b) shows the enhancements of visibility with the usage of WSN.

The authors have deployed a miniature test bed with 25 motes running Tiny OS and a remote controlled car. They assumed that the nodes are time synchronized and

Figure 2. (a) What pursuers really see a PEG;

Figure 2. (a) What pursuers really see a PEG;

 Figure 2. (b) WSN increase visibility to pursuers.

Figure 2. (b) WSN increase visibility to pursuers.

that the location is provided to simplify the experiments.

3.3. Line in the Sand [18,19]

Ohio State University researchers have deployed 90 sensor motes with metal object detection capabilities. The objective of the project is to detect and classify moving metallic objects, such as armed vehicles and tanks. They used a combination of magnetometer and micro-power impulse radar sensors. The sensor nodes self-form into a network, and once an object passes through the network, nodes collaborate together to classify the passing object as a metallic object or nonmetallic object. Figure 3 shows a sample enclosed mote used in the project.

 Figure 3. An enclosed mote used in Line in the Sand Project.

Figure 3. An enclosed mote used in Line in the Sand Project.

The authors considered a surveillance scenario of breaching a perimeter or within a region. The system should provide target detection, classification, and tracking for moving metallic and nonmetallic objects. The concept used in this project is the “influence field,” which can be defined as the number of sensors that hear an object. Moreover, the proposed system tries to capture the shape of the influence for detection, classification, and tracking.

The authors required accurate time synchronization with no difference more than 5 ms at any time. Nodes are synchronized with the help of periodic time values sent by a distinguished node. Routing and localization is done by a simple algorithm called Logical Grid Routing Protocol. For implementation, the authors used 90 MICA motes equipped with magnetic sensor nodes packaged in a sealed enclosure, as shown in Figure 3 arranged in 1500 square feet space.

3.4. Border Sense [20]

Researchers from Georgia Tech, King Saud University, and University of Nebraska have proposed a hybrid approach to achieve coherent border patrol applications. Combining multimedia wireless sensor network, ground sensor networks with different sensing capabilities, underground sensor networks, and mobile sensor networks, Border Sense provides several advantages compared with the traditional WSN border surveillance techniques mentioned above. Figure 4 shows a simplified diagram of the suggested framework with all different sensing capabilities. New and challenging research issues appear as a result of this hybrid architecture, such as coordination between all nodes tracking a single object and unified data framework for exchanging data.

3.5. Marine Surveillance Using Underwater/ Wireless Sensor Networks

The same application of border surveillance of ground sensor networks can be applied in marine surveillance and marine border protection. In [15], the researchers have demonstrated an underwater surveillance system to detect enemy watercraft by deploying acoustic sensor nodes in shallow water as shown in Figure 5.

Some challenges of underwater sensor networks include slow bandwidth, noisy channel, unreliable links, and lack of energy efficiency.

In [21], the authors proposed innovative ship intrusion detection with wireless sensor networks near a harbor facility. The solution depends on exploiting the V-Shaped wave generated by ship movement on the water surface. They have used three-axis accelerometer sensors with iMote2 on buoys on the sea surface. Figure 6 shows the real deployment.

The deployment uses a grid topology with predefined locations. Sensor nodes were time synchronized before deployment. Accelerometers are used to measure the movements of buoys during waves; these readings are then elaborated to detect passing ships and their speeds. With additional signal and computational processing, nodes can detect the movements of ships around their deployments.

3.6. WSN and Neural Networks for Border Protection [22]

The researchers from New Mexico Tech [22] proposed the usage of artificial neural networks along with WSN for border detection. The key idea of using ANN is to discover patterns that describe an intrusion activity and train the ANN to discover them. The proposed system uses a set of 32 MicaZ sensor nodes equipped with microphones and light sensors collected at the base station. The nodes were distributed along a perimeter to detect single and group intrusion.

The experimental results show that when using both light and sound sensors, the networks were able to detect intrusion in very limited time with higher probability.

3.7. FleGSens: A Wireless Sensor Network for Border Surveillance [23]

Researchers in Germany [23] developed a sensor network prototype consisting of 200 wireless sensor nodes

Figure 4. Hybrid combination of multimedia, ground, mobile, and underground sensors for border patrol.

Figure 4. Hybrid combination of multimedia, ground, mobile, and underground sensors for border patrol.

 Figure 5. (a) A simplified diagram of the underwater sensor network to detect enemy water craft;

Figure 5. (a) A simplified diagram of the underwater sensor network to detect enemy water craft; 

Figure 5. (b) A detailed diagram of an underwater acoustic sensor node;

Figure 5. (b) A detailed diagram of an underwater acoustic sensor node; 

 Figure 5. (c) An overview of the whole underwater acoustic sensor network.

Figure 5. (c) An overview of the whole underwater acoustic sensor network.

called iSense, which was equipped with Passive InfraRed (PIR) sensors covering a 500 m-long land strip. The objective is to ensure the integrity and authenticity of generated alarms and availability when intruders are present.

Two protocols were developed in this work. The first one is the trespasser detection protocol, which utilizes the PIR sensors to detect movements within the strip space covered. To ensure accurate detection, local PIR signals are grouped and verified before the network is flooded with the messages. The second protocol is the node failure detection protocol, which ensures the integrity of the sensor network, avoiding any breach in the coverage. This is done by selecting a random number of nodes called buddies to listen to other nodes’ heartbeats.

4. Challenges, Requirements and Research Problems

WSN has many challenging features that should be accounted for while designing the desired applications, such as low processing power, low memory storage, low bandwidth, and battery life and communication reliability. These challenges are magnified when WSN is used in mission-critical applications, such as in border surveillance. The following subsections list and discuss the main challenges facing the adoption of WSN in missioncritical applications, such as border surveillance.

4.1. Energy Efficiency

Surveillance missions usually last for an extended period of time. Due to the criticality of the mission, manual replenishing of batteries might not be practical or possible. Thus, an optimized and energy-aware operation should be considered in designing such applications, which can extend the lifetime of the sensor devices and the network in general.

The usage of directional antennas in wireless communication offers many advantages, such as increasing communication range and reducing communication energy consumption. However, the usage of directional antennas with sensor network requires a very intelligent and complicated network stack [24].

In addition, researchers are now heavily investigating energy harvesting with sensor nodes. Researchers in [25] have developed a prototype of a solar-powered sensor nodes. A big question would big how can we utilize those technologies to extend the life of a mission-critical sensor network?

4.2. Stealthness and Security

It is important for a border surveillance system to have a very low probability of being detected, which will affect the success probability of the mission. Moreover, any transmitted and stored information should be encrypted, secured, and protected against interception from enemy communication devices.

There is a fundamental tradeoff between security level and energy consumption. In addition, some techniques to increase stealthness might suggest reducing communication energy and bandwidth.

The importance of providing integrity and security service for the border monitoring network has been firstly introduced in [23]. However, more research should be done to tackle many issues, such as providing security for different topologies and different kinds of sensor networks.

4.3. Accuracy

False alarms will render the surveillance mission into failure. Thus, the accuracy of detection, tracking, and classification of trespassing objects is very important. Hence, methods of aggregate alarms and in-network processing can be used to minimize false alarms. Moreover, as mentioned before, the integrity of the network is very important in reducing the false alarms and increasing the accuracy of the whole system.

4.4. Quality of Service

Timeliness and reliability of detecting the intrusion is another important factor of successful surveillance missions. QoS provisioning on communication should be applied when an intrusion alarm is issued [26]. However, some networks, especially underwater sensor networks, cannot utilize the same quality of service measurements and protocols due to the nature of the application.

4.5. Quality of Coverage

Providing the full coverage of a surveillance field is a very important aspect of the success of the surveillance mission. Providing a full coverage while minimizing the cost has been an active area of research in the operational research field. In order to reduce coverage overlap between sensors, optimization methods should be used to select the best placement of the sensor nodes in the field [27-29]. J. He and H. Shi [30] developed a distributed algorithm to optimize the location of sensor nodes along a barrier to minimize the cost of the full coverage. In [31], the authors examined how to reposition a mobile sensor network efficiently within a specified region to recover a security hole and prevent intruders from exploiting this hole. Yang and Qiao proposed a multi-round approach to deploy sensor nodes to guarantee barrier coverage [32].

5. Conclusion

WSN is an emerging wireless technology that is used in many applications for collecting information from a field of interest. Two of the promising application spans are the border surveillance and intrusion detection applications. The main advantage of using WSN in such applications is the high spatial and temporal data resolution results from deploying hundreds of low-cost sensor nodes along borders. This paper presents a literature survey of current experimentation and deployment research work done in this application area. In addition, we have listed the technical requirements of the surveillance applications and some challenging aspects of using WSN in mission-critical applications, such as border surveillance. To our knowledge, there are very few experimentations and real deployments of such applications.

About The Author:

Emad Felemban P.hd, Currently the Director of Transportation and Crowd Management Center for Research Excellence, Kingdom of Saudi Arabia. Dr. Felemban obtained his doctorate from The Ohio State University with specialization on Wireless Sensor Network. He has done his research on "Performance and Analysis of Wireless Networks and Directional Antennas". His research interest includes emerging wireless technologies liked RFID, NFC, WiMAX, WSN. He also have IT related experience in Data Center, Networking Management and IT planning.


I. Akyildiz, W. Su, et al., “A Survey on Sensor Networks,” IEEE Communications Magazine, Vol. 40, No. 8, 2002, pp. 102-114. doi:10.1109/MCOM.2002.1024422

M. Vieira, C. Coelho, et al., “A Survey on Wireless Sensor Network Devices,” IEEE Conference on Emerging Technologies and Factory Automation, Lisbon, 16-19 September 2003, pp. 537-544.

H. Luo, K. Wu, Z. Guo, et al., “Ship Detection with Wireless Sensor Networks,” IEEE Transaction on Parallel and Distributed Systems, 2011.

B. Essendorfer, E. Monari and H. Wanning, “An Integerated System for Border Surveillance,” IEEE Fourth International Conference on Systems (ICONS 09), Gosier, 1-6 March 2009.

V. Thattil and N. Vasantha. “Energy Efficient Approach to Intruder Detection in Militarily Sensitive Border Using Wireless Sensor Networks,” IEEE Conference on Electronics Computer Technology, 2011.

D. Yuping, H. Chang, Z. Zou and S. Tang, “Energy Aware Routing Algorithm for WSN Applications in Border Surveillance,” 2010 IEEE International Conference on Technologies for Homeland Security, Wltham, 8-10 November 2010, pp. 530-535.

E. Onur, C. Ersoy, H. Delic and L. Skaru, “Surveillance Wireless Sensor Networks: Deployment Quality Analysis,” IEEE Network, Vol. 21, No. 6, 2007, pp. 48-53.doi:10.1109/MNET.2007.4395110

T. Arampatzis, J. Lygeros and S. Manesis, “A Survey of Applications of Wireless Sensors and Wireless Sensor Networks,” 13th Mediterranean Conference on Control and Automation Limassol, Cyprus, 27-29 June 2005, pp. 889-895.

F. M. Sabri, “Wireless Sensor Networks for Swift Bird Farms Monitoring,” International Conference on UltraModern Telecommunications & Workshops, St. Petersburg, 12-14 October 2009.

D. Abruzzese, M. Angelaccio, B. Buttarazzi, R. Giuliano, L. Miccoli and A. Vari, “Long Life Monitoring of Historical Monuments via Wireless Sensors Network,” 6th International Symposium on Wireless Communication Systems, Tuscany, 7-10 September 2009.

I. Stoianov, L. Nachman and S. Madden, “PIPENET: A Wireless Sensor Network for Pipeline Monitoring,” The 6th International Conference on Information Processing in Sensor Networks (IPSN’07), Cambridge, 25-27 April 2007.

T. Wark, P. Corke, P. Sikka, L. Klingbeil, Y. Guo, C. Crossman, P. Valencia, D. Swain and G. Bishop-Hurley, “Transforming Agriculture through Pervasive Wireless Sensor Networks,” IEEE Pervasive Computing, White Plains, 19-23 March 2007. doi:10.1109/MPRV.2007.47

V. Gungor, L. Bin and G. Hancke, “Opportunities and Challenges of Wireless Sensor Networks in Smart Grid,” IEEE Transactions on Industrial Electronics, Vol. 57, No. 10, 2010, pp. 3557-3564. doi:10.1109/TIE.2009.2039455
J. Rice, et al., “Maritime Surveillance in the Intracoastal Waterway Using Networked Underwater Acoustic Sensors Integrated with a Regional Command Center,” 2010 International Waterside Security Conference (WSS), Carrara, 3-5 November 2010, pp. 1-6.

A. Mahdy, “Marine Wireless Sensor Networks: Challenges and Applications,” 7th International Conference on Networking, Cancun, 13-18 April 2008, pp. 530-535.

T. He, S. Krishnamurthy, J. A. Stankovic, T. Abdelzaher, L. Luo, R. Stoleru, T. Yan, L. Gu, J. Hui and B. Krogh, “An Energy-Efficient Surveillance System Using Wireless Sensor Networks,” 2nd International Conference on Mobile Systems, Applications and Services, Boston, 6-9 June 2004.

B. Sinopoli, C. Sharp, L. Schenato, S. Shaffert and Sh. S. Sastry, “Distributed Control Applications Within Sensor Networks,” Proceeding of the IEEE, August 2003.

A. Arora, et al., “A Line in the Sand: A Wireless Sensor Network for Target Detection, Classification, and Tracking,” Journal Computer Networks, Vol. 46, No. 5, 2004.

Z. Sun, et al., “BorderSense: Border Patrol through Advanced Wireless Sensor Networks,” Ad Hoc Networks, 2011, pp. 468-477.

H. Luo, et al., “Ship Detection with Wireless Sensor Networks,” IEEE Transactions on Parallel and Distributed Systems, Vol. 23, No. 7, 2012, pp. 1336-1343.doi:10.1109/TPDS.2011.274

A. Mishra, K. Sudan and H. Soliman, “Detecting Border Intrusion Using Wireless Sensor Network and Artificial Neural Network,” IEEE DCOSS 2010, Santa Barbara, 21- 23 June 2010.

P. Rothenpieler, D. Kruger, D. Pfisterer, S. Fischer, D. Dudek, C. Haas, A. Kuntz and M. Zitterbart, “Flegsens: Secure Area Monitoring Using Wireless Sensor Networks,” Proceedings of the 4th Safety and Security Systems in Europe, 2009.

E. Felemban, S. Vural, et al., “SAMAC: A Cross-Layer Communication Protocol for Sensor Networks with Sectored Antennas,” IEEE Transactions on Mobile Computing, Vol. 9, No. 8, 2010, pp. 1072-1088. doi:10.1109/TMC.2010.61

J. He, R. A. Norwood, M. Fallahi and N. Peyghambarian, “Solar-Powered Ad-Hoc Wireless Sensor Network for Border Surveillance,” SPIE Defense, Security, and Sensing, 2012.

E. Felemban, C. Gun and E. Ekici, “MMSPEED: Multipath Multi-SPEED Protocol for QoS Guarantee of Reliability and Timeliness in Wireless Sensor Networks,” IEEE Transactions on Mobile Computing, Vol. 5, No. 6, 2006.

K. Kordari and G. L. Blankenship, “Perimeter Coverage with Wireless Sensor Networks,” IEEE Military Communications Conference, San Diego, 2008.

E. Onur, C. Ersoy, H. Delic and L. Akarun, “Surveillance Wireless Sensor Networks: Deployment Quality Analysis,” IEEE Network, Vol. 21, No. 6, 2007, pp. 48-53.doi:10.1109/MNET.2007.4395110

Y. T. Hou, T. C. Lee, B. C. Jeng and C. M. Chen, “Optimal Coverage Deployment for Wireless Sensor Networks,” The 8th International Conference on Advanced Communication Technology, Phoenix Park, 20-22 February 2006.

J. He and H. Shi, “Constructing Sensor Barriers with Minimum Cost in Wireless Sensor Networks,” Journal of Parallel Distributed Computing, Vol. 72, No. 12, 2012, pp. 1654-1663. doi:10.1016/j.jpdc.2012.07.004

B. Bhattacharya, et al., “Optimal Movement of Mobile Sensors for Barrier Coverage of a Planar Region,” Theoretical Computer Science, Elsevier, 2009, pp. 5515-5528.

G. Yang and D. Qiao “Multi-Round Sensor Deployment for Guranteed Barrier Coverage,” IEEE INFOCOM 2010.

Publication Details:

Int'l J. of Communications, Network and System Sciences
Vol.6 No.5(2013), Article ID:31336,9 pages DOI:10.4236/ijcns.2013.65028

This work is licensed under Creative Commons 3.0 by the Original Publisher

-51,1,3D Technology,2,5G,9,Abkhazia,2,Abortion Laws,1,Academics,10,Accidents,21,Activism,1,Adani Group,5,ADB,13,ADIZ,1,Adults,1,Advertising,31,Advisory,2,Aerial Reconnaissance,13,Aerial Warfare,35,Aerospace,5,Afghanistan,88,Africa,112,Agile Methodology,2,Agriculture,20,AI Policy,1,Air Crash,10,Air Defence Identification Zone,1,Air Defense,7,Air Force,29,Air Pollution,1,Airbus,5,Aircraft Carriers,5,Aircraft Systems,5,Al Nusra,1,Al Qaida,4,Al Shabab,1,Alaska,1,ALBA,1,Albania,2,Algeria,3,Alibaba,1,American History,4,AmritaJash,10,Antarctic,1,Antarctica,1,Anthropology,7,Anti Narcotics,12,Anti Tank,1,Anti-Corruption,4,Anti-dumping,1,Anti-Piracy,2,Anti-Submarine,1,Anti-Terrorism Legislation,1,Antitrust,2,APEC,1,Apple,2,Applied Sciences,2,AQAP,2,Arab League,3,Architecture,3,Arctic,6,Argentina,7,Armenia,30,Army,3,Art,3,Artificial Intelligence,81,Artillery,2,Arunachal Pradesh,2,ASEAN,12,Asia,70,Asia Pacific,23,Assassination,2,Asset Management,1,Astrophysics,2,ATGM,1,Atmospheric Science,1,Atomic.Atom,1,Augmented Reality,7,Australia,57,Austria,1,Automation,13,Automotive,129,Autonomous Flight,2,Autonomous Vehicle,3,Aviation,63,AWACS,2,Awards,17,Azerbaijan,16,Azeri,1,B2B,1,Bahrain,9,Balance of Payments,2,Balance of Trade,3,Balkan,10,Balochistan,2,Baltic,3,Baluchistan,8,Bangladesh,28,Banking,53,Bankruptcy,2,Basel,1,Bashar Al Asad,1,Battery Technology,3,Bay of Bengal,5,BBC,2,Beijing,1,Belarus,3,Belgium,1,Belt Road Initiative,3,Beto O'Rourke,1,BFSI,1,Bhutan,13,Big Data,30,Big Tech,1,Bilateral Cooperation,19,BIMSTEC,1,Biography,1,Biotechnology,3,Birth,1,BISA,1,Bitcoin,9,Black Lives Matter,1,Black Money,3,Black Sea,2,Blockchain,32,Blood Diamonds,1,Bloomberg,1,Boeing,21,Boko Haram,7,Bolivia,6,Bomb,3,Bond Market,2,Book,11,Book Review,24,Border Conflicts,11,Border Control and Surveillance,7,Bosnia,1,Brand Management,14,Brazil,104,Brexit,22,BRI,5,BRICS,20,British,3,Broadcasting,16,Brunei,3,Brussels,1,Buddhism,1,Budget,4,Build Back Better,1,Bulgaria,1,Burma,2,Business & Economy,1203,C-UAS,1,California,5,Call for Proposals,1,Cambodia,7,Cameroon,1,Canada,54,Canadian Security Intelligence Service (CSIS),1,Carbon Economy,9,CAREC,1,Caribbean,9,CARICOM,1,Caspian Sea,2,Catalan,3,Catholic Church,1,Caucasus,9,CBRN,1,Cement,1,Central African Republic,1,Central Asia,82,Central Asian,3,Central Eastern Europe,48,Certification,1,Chad,2,Chanakya,1,Charity,2,Chatbots,2,Chemicals,7,Child Labor,1,Child Marriage,1,Children,4,Chile,10,China,578,Christianity,1,CIA,1,CIS,5,Citizenship,2,Civil Engineering,2,Civil Liberties,5,Civil Rights,2,Civil Society,5,Civil Unrest,1,Civilization,1,Clean Energy,5,Climate,67,Climate Change,23,Climate Finance,2,Clinical Research,3,Clinton,1,Cloud Computing,44,Coal,6,Coast Guard,3,Cocoa,1,Cognitive Computing,12,Cold War,5,Colombia,15,Commodities,4,Communication,11,Communism,3,Compliance,1,Computers,40,Computing,1,Conferences,1,Conflict,109,Conflict Diamonds,1,Conflict Resolution,48,Conflict Resources,1,Congo,1,Construction,5,Consumer Behavior,4,Consumer Price Index,5,COP26,4,COP28,1,Copper,2,Coronavirus,107,Corporate Communication,1,Corporate Governance,4,Corporate Social Responsibility,4,Corruption,4,Costa Rica,2,Counter Intelligence,15,Counter Terrorism,81,COVID,9,COVID Vaccine,6,CPEC,8,CPG,4,Credit,2,Credit Rating,1,Credit Score,1,Crimea,4,CRM,1,Croatia,2,Crypto Currency,16,Cryptography,1,CSTO,1,Cuba,7,Culture,5,Currency,8,Customer Relationship Management,1,Cyber Attack,7,Cyber Crime,2,Cyber Security & Warfare,115,Cybernetics,5,Cyberwarfare,16,Cyclone,1,Cyprus,5,Czech Republic,3,DACA,1,DARPA,3,Data,9,Data Analytics,36,Data Center,2,Data Science,2,Database,3,Daughter.Leslee,1,Davos,1,DEA,1,DeBeers,1,Debt,13,Decision Support System,5,Defense,12,Defense Deals,8,Deforestation,2,Deloitte,1,Democracy,22,Democrats,2,Demographic Studies,1,Demonetization,6,Denmark. F-35,1,Denuclearization,1,Diamonds,1,Digital,39,Digital Currency,1,Digital Economy,10,Digital Marketing,6,Digital Transformation,11,Diplomacy,14,Diplomatic Row,3,Disaster Management,4,Disinformation,2,Diversity & Inclusion,1,Djibouti,2,Documentary,3,Doklam,2,Dokolam,1,Dominica,2,Donald Trump,48,Donetsk,2,Dossier,2,Drones,14,E-Government,2,E-International Relations,1,Earning Reports,3,Earth Science,1,Earthquake,8,East Africa,2,East China Sea,9,eBook,1,ECB,1,eCommerce,11,Econometrics,2,Economic Justice,1,Economics,43,Economy,109,ECOWAS,2,Ecuador,4,Edge Computing,2,Editor's Opinion,53,Education,65,EFTA,1,Egypt,27,Election Disinformation,1,Elections,44,Electric Vehicle,15,Electricity,7,Electronics,8,Emerging Markets,1,Employment,19,Energy,316,Energy Policy,28,Energy Politics,27,Engineering,24,England,2,Enterprise Software Solutions,8,Entrepreneurship,15,Environment,47,ePayments,13,Epidemic,6,ESA,1,Ethiopia,3,Eulogy,4,Eurasia,3,Euro,6,Europe,14,European Union,233,EuroZone,5,Exchange-traded Funds,1,Exclusive,2,Exhibitions,2,Explosives,1,Export Import,6,F-35,6,Facebook,9,Fake News,3,Fallen,1,FARC,2,Farnborough. United Kingdom,2,FATF,1,FDI,5,Featured,1372,Federal Reserve,2,Fidel Castro,1,FIFA World Cup,1,Fiji,1,Finance,18,Financial Markets,59,Financial Planning,1,Financial Statement,2,Finland,5,Fintech,14,Fiscal Policy,14,Fishery,3,Five Eyes,1,Floods,1,Food Security,27,Forces,1,Forecasting,3,Foreign Policy,13,Forex,4,France,33,Free Market,1,Free Syrian Army,4,Free Trade Agreement,1,Freedom,3,Freedom of Press,1,Freedom of Speech,2,Frigate,1,FTC,1,Fujairah,97,Fund Management,1,Funding,22,Future,1,G20,10,G24,1,G7,4,Gaddafi,1,Gambia,2,Gaming,1,Garissa Attack,1,Gas Price,23,GATT,1,Gaza,13,GCC,11,GDP,14,GDPR,1,Gender Studies,3,Geneal Management,1,General Management,1,Generative AI,7,Genetics,1,Geo Politics,105,Geography,2,Geoint,14,Geopolitics,9,Georgia,11,Georgian,1,geospatial,9,Geothermal,2,Germany,69,Ghana,3,Gibratar,1,Gig economy,1,Global Perception,1,Global Trade,96,Global Warming,1,Global Water Crisis,11,Globalization,3,Gold,2,Google,20,Gorkhaland,1,Government,128,Government Analytics,1,GPS,1,Greater Asia,174,Greece,14,Green Bonds,1,Green Energy,3,Greenland,1,Gross Domestic Product,1,GST,1,Gujarat,6,Gulf of Tonkin,1,Gun Control,4,Hacking,4,Haiti,2,Hamas,10,Hasan,1,Health,8,Healthcare,72,Heatwave,1,Helicopter,12,Heliport,1,Hezbollah,3,High Altitude Warfare,1,High Speed Railway System,1,Hillary 2016,1,Hillary Clinton,1,Himalaya,1,Hinduism,2,Hindutva,4,History,10,Home Security,1,Honduras,2,Hong Kong,7,Horn of Africa,5,Housing,16,Houthi,12,Howitzer,1,Human Development,32,Human Resource Management,5,Human Rights,7,Humanitarian,3,Hungary,3,Hunger,3,Hydrocarbon,3,Hydrogen,4,IAEA,2,ICBM,1,Iceland,2,ICO,1,Identification,2,IDF,1,Imaging,2,IMEEC,2,IMF,76,Immigration,19,Impeachment,1,Imran Khan,1,Independent Media,72,India,661,India's,1,Indian Air Force,19,Indian Army,7,Indian Nationalism,1,Indian Navy,27,Indian Ocean,24,Indices,1,Indigenous rights,1,Indo-Pacific,6,Indonesia,19,IndraStra,1,Industrial Accidents,4,Industrial Automation,2,Industrial Safety,4,Inflation,10,Infographic,1,Information Leaks,1,Infrastructure,3,Innovations,22,Insider Trading,1,Insurance,3,Intellectual Property,3,Intelligence,5,Intelligence Analysis,8,Interest Rate,3,International Business,13,International Law,11,International Relations,9,Internet,53,Internet of Things,34,Interview,8,Intra-Government,5,Investigative Journalism,4,Investment,33,Investor Relations,1,IPEF,1,iPhone,1,IPO,4,Iran,205,Iraq,54,IRGC,1,Iron & Steel,4,ISAF,1,ISIL,9,ISIS,33,Islam,12,Islamic Banking,1,Islamic State,86,Israel,145,ISRO,1,IT ITeS,136,Italy,10,Ivory Coast,1,Jabhat al-Nusra,1,Jack Ma,1,Jamaica,3,Japan,90,JASDF,1,Jihad,1,JMSDF,1,Joe Biden,8,Joint Strike Fighter,5,Jordan,7,Journalism,6,Judicial,4,Justice System,3,Kanchin,1,Kashmir,8,Kaspersky,1,Kazakhstan,26,Kenya,5,Khalistan,2,Kiev,1,Kindle,700,Knowledge Management,4,Korean Conflict,1,Kosovo,2,Kubernetes,1,Kurdistan,8,Kurds,10,Kuwait,7,Kyrgyzstan,9,Labor Laws,10,Labor Market,4,Land Reforms,3,Land Warfare,21,Languages,1,Laos,2,Large language models,1,Laser Defense Systems,1,Latin America,81,Law,6,Leadership,3,Lebanon,10,Legal,11,LGBTQ,2,Li Keqiang,1,Liberalism,1,Library Science,1,Libya,14,Liechtenstein,1,Lifestyle,1,Light Battle Tank,1,Linkedin,1,Lithuania,1,Littoral Warfare,2,Livelihood,3,Loans,9,Lockdown,1,Lone Wolf Attacks,2,Lugansk,2,Macedonia,1,Machine Learning,7,Madagascar,1,Mahmoud,1,Main Battle Tank,3,Malaysia,12,Maldives,13,Mali,7,Malware,2,Management Consulting,6,Manpower,1,Manto,1,Manufacturing,15,Marijuana,1,Marine Engineering,3,Maritime,50,Market Research,2,Marketing,38,Mars,2,Martech,10,Mass Media,29,Mass Shooting,1,Material Science,2,Mauritania,1,Mauritius,2,MDGs,1,Mechatronics,2,Media War,1,MediaWiki,1,Medicare,1,Mediterranean,12,MENA,6,Mental Health,4,Mercosur,2,Mergers and Acquisitions,18,Meta,2,Metadata,2,Metals,3,Mexico,14,Micro-finance,4,Microsoft,12,Migration,19,Mike Pence,1,Military,112,Military Exercise,10,Military Service,2,Military-Industrial Complex,3,Mining,15,Missile Launching Facilities,6,Missile Systems,56,Mobile Apps,3,Mobile Communications,11,Mobility,4,Modi,8,Moldova,1,Monaco,1,Monetary Policy,6,Money Market,2,Mongolia,11,Monkeypox,1,Monsoon,1,Montreux Convention,1,Moon,4,Morocco,2,Morsi,1,Mortgage,3,Moscow,2,Motivation,1,Mozambique,1,Mubarak,1,Multilateralism,2,Mumbai,1,Muslim Brotherhood,2,Mutual Funds,1,Myanmar,30,NAFTA,3,NAM,2,Namibia,1,Nanotechnology,4,Narendra Modi,2,NASA,13,National Identification Card,1,National Security,5,Nationalism,2,NATO,34,Natural Disasters,15,Natural Gas,33,Natural Language Processing,1,Nauru,1,Naval Base,5,Naval Engineering,24,Naval Intelligence,2,Naval Postgraduate School,2,Naval Warfare,50,Navigation,2,Navy,23,NBC Warfare,2,NDC,1,Nearshoring,1,Negotiations,2,Nepal,12,Netflix,1,Neurosciences,7,New Delhi,4,New Normal,1,New York,5,New Zealand,7,News,1266,News Publishers,1,Newspaper,1,NFT,1,NGO,1,Nicaragua,1,Niger,3,Nigeria,10,Nikki Haley,1,Nirbhaya,1,Non Aligned Movement,1,Non Government Organization,4,Nonproliferation,2,North Africa,23,North America,53,North Korea,58,Norway,5,NSA,1,NSG,2,Nuclear,41,Nuclear Agreement,32,Nuclear Doctrine,2,Nuclear Energy,4,Nuclear Fussion,1,Nuclear Propulsion,2,Nuclear Security,47,Nuclear Submarine,1,NYSE,1,Obama,3,ObamaCare,2,OBOR,15,Ocean Engineering,1,Oceania,2,OECD,5,OFID,5,Oil & Gas,382,Oil Gas,7,Oil Price,73,Olympics,2,Oman,25,Omicron,1,Oncology,1,Online Education,5,Online Reputation Management,1,OPEC,129,Open Access,1,Open Journal Systems,1,Open Letter,1,Open Source,4,OpenAI,2,Operation Unified Protector,1,Operational Research,4,Opinion,691,Opinon Poll,1,Optical Communications,1,Pacific,5,Pakistan,181,Pakistan Air Force,3,Pakistan Army,1,Pakistan Navy,3,Palestine,24,Palm Oil,1,Pandemic,84,Papal,1,Paper,3,Papers,110,Papua New Guinea,2,Paracels,1,Partition,1,Partnership,1,Party Congress,1,Passport,1,Patents,2,PATRIOT Act,1,Peace Deal,6,Peacekeeping Mission,1,Pension,1,People Management,1,Persian Gulf,19,Peru,5,Petrochemicals,1,Petroleum,19,Pharmaceuticals,14,Philippines,18,Philosophy,2,Photos,3,Physics,1,Pipelines,5,PLA,2,PLAN,4,Plastic Industry,2,Poland,8,Polar,1,Policing,1,Policy,8,Policy Brief,6,Political Studies,1,Politics,53,Polynesia,3,Pope,1,Population,6,Portugal,1,Poverty,8,Power Transmission,6,President APJ Abdul Kalam,2,Presidential Election,30,Press Release,158,Prison System,1,Privacy,18,Private Equity,2,Private Military Contractors,2,Privatization,1,Programming,1,Project Management,4,Propaganda,5,Protests,12,Psychology,3,Public Policy,55,Public Relations,1,Public Safety,7,Publications,1,Publishing,7,Purchasing Managers' Index,1,Putin,7,Q&A,1,Qatar,114,QC/QA,1,Qods Force,1,Quad,1,Quantum Computing,3,Quantum Physics,4,Quarter Results,2,Racial Justice,2,RADAR,2,Rahul Guhathakurta,4,Railway,9,Raj,1,Ranking,4,Rape,1,RBI,1,RCEP,2,Real Estate,6,Recall,4,Recession,2,Red Sea,5,Referendum,5,Reforms,18,Refugee,23,Regional,4,Regulations,2,Rehabilitation,1,Religion & Spirituality,9,Renewable,18,Report,4,Reports,48,Repository,1,Republicans,3,Rescue Operation,2,Research,5,Research and Development,24,Restructuring,1,Retail,36,Revenue Management,1,Rice,1,Risk Management,5,Robotics,8,Rohingya,5,Romania,2,Royal Canadian Air Force,1,Rupee,1,Russia,317,Russian Navy,5,Saab,1,Saadat,1,SAARC,6,Safety,1,SAFTA,1,SAM,2,Samoa,1,Sanctions,5,SAR,1,SAT,1,Satellite,14,Saudi Arabia,130,Scandinavia,6,Science & Technology,392,Science Fiction,1,SCO,5,Scotland,6,Scud Missile,1,Sea Lanes of Communications,4,SEBI,3,Securities,2,Security,6,Semiconductor,18,Senate,4,Senegal,1,SEO,5,Serbia,4,Services Sector,1,Seychelles,2,SEZ,1,Shadow Bank,1,Shale Gas,4,Shanghai,1,Sharjah,12,Shia,6,Shinzo Abe,1,Shipping,11,Shutdown,2,Siachen,1,Sierra Leone,1,Signal Intelligence,1,Sikkim,5,Silicon Valley,1,Silk Route,6,Simulations,2,Sinai,1,Singapore,17,Situational Awareness,20,Small Modular Nuclear Reactors,1,Smart Cities,7,Social Media,1,Social Media Intelligence,40,Social Policy,40,Social Science,1,Social Security,1,Socialism,1,Soft Power,1,Software,7,Solar Energy,16,Somalia,5,South Africa,20,South America,47,South Asia,472,South China Sea,35,South East Asia,76,South Korea,62,South Sudan,4,Sovereign Wealth Funds,1,Soviet,2,Soviet Union,9,Space,46,Space Station,2,Spain,9,Special Forces,1,Sports,3,Sports Diplomacy,1,Spratlys,1,Sri Lanka,24,Stablecoin,1,Stamps,1,Startups,43,State of the Union,1,Statistics,1,STEM,1,Stephen Harper,1,Stock Markets,23,Storm,2,Strategy Games,5,Strike,1,Sub-Sahara,4,Submarine,16,Sudan,5,Sunni,6,Super computing,1,Supply Chain Management,48,Surveillance,13,Survey,5,Sustainable Development,18,Swami Vivekananda,1,Sweden,4,Switzerland,6,Syria,112,Taiwan,32,Tajikistan,12,Taliban,17,Tamar Gas Fields,1,Tamil,1,Tanzania,4,Tariff,4,Tata,3,Taxation,25,Tech Fest,1,Technology,13,Tel-Aviv,1,Telecom,24,Telematics,1,Territorial Disputes,1,Terrorism,77,Testing,2,Texas,3,Thailand,11,The Middle East,653,Think Tank,316,Tibet,3,TikTok,1,Tobacco,1,Tonga,1,Total Quality Management,2,Town Planning,3,TPP,2,Trade Agreements,14,Trade War,10,Trademarks,1,Trainging and Development,1,Transcaucasus,19,Transcript,4,Transpacific,2,Transportation,47,Travel and Tourism,15,Tsar,1,Tunisia,7,Turkey,74,Turkmenistan,10,U.S. Air Force,3,U.S. Dollar,2,UAE,139,UAV,23,UCAV,1,Udwains,1,Uganda,1,Ukraine,113,Ukraine War,25,Ummah,1,UNCLOS,7,Unemployment,1,UNESCO,1,UNHCR,1,UNIDO,2,United Kingdom,82,United Nations,28,United States,759,University and Colleges,4,Uranium,2,Urban Planning,10,US Army,12,US Army Aviation,1,US Congress,1,US FDA,1,US Navy,18,US Postal Service,1,US Senate,1,US Space Force,2,USA,16,USAF,21,USV,1,UUV,1,Uyghur,3,Uzbekistan,13,Valuation,1,Vatican,3,Vedant,1,Venezuela,19,Venture Capital,4,Vibrant Gujarat,1,Victim,1,Videogames,1,Vietnam,25,Virtual Reality,7,Vision 2030,1,VPN,1,Wahhabism,3,War,1,War Games,1,Warfare,1,Water,17,Water Politics,7,Weapons,11,Wearable,2,Weather,2,Webinar,1,WeChat,1,WEF,3,Welfare,1,West,2,West Africa,19,West Bengal,2,Western Sahara,2,White House,1,Whitepaper,2,WHO,3,Wholesale Price Index,1,Wikileaks,1,Wikipedia,3,Wildfire,1,Wildlife,3,Wind Energy,1,Windows,1,Wireless Security,1,Wisconsin,1,Women,10,Women's Right,14,Workers Union,1,Workshop,1,World Bank,37,World Economy,32,World Peace,10,World War I,1,World War II,3,WTO,6,Wyoming,1,Xi Jinping,9,Xinjiang,2,Yemen,28,Yevgeny Prigozhin,1,Zbigniew Brzezinski,1,Zimbabwe,2,
IndraStra Global: THE PAPER | Application of Wireless Sensor Network Technology in Advanced Border Intrusion Detection & Surveillance
THE PAPER | Application of Wireless Sensor Network Technology in Advanced Border Intrusion Detection & Surveillance
WSN is an emerging wireless technology that is used in many applications for collecting information from a field of interest. Two of the promising application spans are the border surveillance and intrusion detection applications.
IndraStra Global
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content