SlideShare une entreprise Scribd logo
1  sur  1
Smartdust Network for Tactical Border Surveillance System to
    Detect, Classify and Track Enemy Intrusion using Acoustic-
             Magnetic-Thermal- Vibration Signatures


                                           Abstract

         The greatest threat to national security is “Terrorism” infiltrating through borders. In
critical border areas such as Kashmir and Bangladesh regular forces or even satellites cannot
monitor these intruding terrorists as the area monitored is quite large and quite complex. This
project provides an innovative and effective solution to this problem.

        The project aim is to design a next generation intelligent ultra small dust like wireless
sensor motes which has multiple onboard sensors and a processor, which has the ability to detect
an enemy intrusion across borders and battlefields. Thousands of these smartdust motes can be
deployed within a large area in a few hours by one or two men. The motes can form a network
on its own among them, are small in size, rapidly deployable, have wireless connection to
outside world. They detect the intrusion and classify it into vehicles or individuals and groups.
Onboard hardware include a variety of sensors for vibration/seismic, magnetic, acoustic and
thermal signature recognition, a microcontroller for processing these sensor values and a radio
transceiver for communication over a wireless network. The system process the sensor readings,
classify the targets and the tracking history can be viewed in the Graphics LCD display attached
in the central monitoring unit. The central monitoring node acts as the parent node in a peer to
peer wireless network model. The dust motes communicate with central parent node using
wireless radio network.

        Microcontroller: 32-bit ARM Cortex-M3 microcontroller is used to control the mote
        Display: Graphics LCD used to show the intrusion type and tracking history
        Communication: IEEE 802.15.4 wireless protocol for communication between motes.
IEEE 802.15.4 protocol is a low power, low cost, medium range WPAN network protocol.
        Thermal Sign: Enhanced PIR sensor is used to identify humans via the heat emitted
from their body.
        Vibration Sign: 3-axis MEMS Accelerometer is used to sense the physical vibration
caused by the intruder
        Acoustic Sign: MEMS Microphone is used to sense the acoustic sound signals.
        Magnetic Sign: Intruders carrying weapons and moving in vehicles can be identified
using their magnetic signature in this AMR Magnetic sensor.

Contenu connexe

Tendances (20)

Smart dust
Smart dustSmart dust
Smart dust
 
Smart Dust
Smart DustSmart Dust
Smart Dust
 
Smart dust_2009
Smart dust_2009Smart dust_2009
Smart dust_2009
 
smart dust
smart dustsmart dust
smart dust
 
Smart dust
Smart dustSmart dust
Smart dust
 
SMART DUST
SMART DUSTSMART DUST
SMART DUST
 
Smart dust
Smart dustSmart dust
Smart dust
 
smartdust
smartdust smartdust
smartdust
 
Smartdust
SmartdustSmartdust
Smartdust
 
Smart Dust
Smart DustSmart Dust
Smart Dust
 
Smart dust
Smart dustSmart dust
Smart dust
 
Smart dust
Smart dustSmart dust
Smart dust
 
Smart Dust --- Hardware for Wireless Sensor Networks
Smart Dust --- Hardware for Wireless Sensor NetworksSmart Dust --- Hardware for Wireless Sensor Networks
Smart Dust --- Hardware for Wireless Sensor Networks
 
Smart Dust - A Little Wonder
Smart Dust - A Little WonderSmart Dust - A Little Wonder
Smart Dust - A Little Wonder
 
Smart Dust
Smart DustSmart Dust
Smart Dust
 
Smart dust
Smart dustSmart dust
Smart dust
 
Intro to wsn
Intro to wsnIntro to wsn
Intro to wsn
 
Investigation of energy efficient protocols based on stable clustering for en...
Investigation of energy efficient protocols based on stable clustering for en...Investigation of energy efficient protocols based on stable clustering for en...
Investigation of energy efficient protocols based on stable clustering for en...
 
Wireless sensor network (WSN)
Wireless sensor network (WSN)Wireless sensor network (WSN)
Wireless sensor network (WSN)
 
WSN
WSNWSN
WSN
 

Similaire à Abs smartdust network for tactical border surveillance system to detect, classify and track enemy intrusion (1)

Wireless Network For Strategic Boundary Supervision System
Wireless Network For Strategic Boundary Supervision SystemWireless Network For Strategic Boundary Supervision System
Wireless Network For Strategic Boundary Supervision SystemjournalBEEI
 
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...srinivasanece7
 
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesSmartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesIOSR Journals
 
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesSmartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesIOSR Journals
 
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...srinivasanece7
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKTejas Wasule
 
A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)Saurabh Giratkar
 
A Wireless Sensor Network ( Wsn )
A Wireless Sensor Network ( Wsn )A Wireless Sensor Network ( Wsn )
A Wireless Sensor Network ( Wsn )Joanna Paulsen
 
border-security-using-wins
 border-security-using-wins border-security-using-wins
border-security-using-winsAakashkumar276
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
 
Wireless applications in various areas
Wireless applications in various areasWireless applications in various areas
Wireless applications in various areasAmulya Anu
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor networkrahulkumargiri
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
 
Wireless Data Transmission and Acquisition for Alive Detection
Wireless Data Transmission and Acquisition for Alive DetectionWireless Data Transmission and Acquisition for Alive Detection
Wireless Data Transmission and Acquisition for Alive DetectionIJMERJOURNAL
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksImran Khan
 
Report on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKReport on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKNishant Bhardwaj
 

Similaire à Abs smartdust network for tactical border surveillance system to detect, classify and track enemy intrusion (1) (20)

Wireless Network For Strategic Boundary Supervision System
Wireless Network For Strategic Boundary Supervision SystemWireless Network For Strategic Boundary Supervision System
Wireless Network For Strategic Boundary Supervision System
 
A0550110
A0550110A0550110
A0550110
 
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
 
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesSmartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
 
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesSmartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
 
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
 
iot with cloud
iot with cloudiot with cloud
iot with cloud
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)
 
A Wireless Sensor Network ( Wsn )
A Wireless Sensor Network ( Wsn )A Wireless Sensor Network ( Wsn )
A Wireless Sensor Network ( Wsn )
 
border-security-using-wins
 border-security-using-wins border-security-using-wins
border-security-using-wins
 
Wsn
WsnWsn
Wsn
 
4 pillers of iot
4 pillers of iot4 pillers of iot
4 pillers of iot
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
 
Wireless applications in various areas
Wireless applications in various areasWireless applications in various areas
Wireless applications in various areas
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor network
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
Wireless Data Transmission and Acquisition for Alive Detection
Wireless Data Transmission and Acquisition for Alive DetectionWireless Data Transmission and Acquisition for Alive Detection
Wireless Data Transmission and Acquisition for Alive Detection
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor Networks
 
Report on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKReport on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORK
 

Plus de Faheen Ahmed

Helium bron carbon song
Helium bron carbon songHelium bron carbon song
Helium bron carbon songFaheen Ahmed
 
Manufacturing tech 2
Manufacturing tech 2Manufacturing tech 2
Manufacturing tech 2Faheen Ahmed
 
How to Fill TNEA Application Form
How to Fill TNEA Application FormHow to Fill TNEA Application Form
How to Fill TNEA Application FormFaheen Ahmed
 
Pray as Seen Me Praying Prophet Muhammad(pbuh)
Pray as Seen Me Praying Prophet Muhammad(pbuh) Pray as Seen Me Praying Prophet Muhammad(pbuh)
Pray as Seen Me Praying Prophet Muhammad(pbuh) Faheen Ahmed
 

Plus de Faheen Ahmed (6)

Helium bron carbon song
Helium bron carbon songHelium bron carbon song
Helium bron carbon song
 
Faheen resume
Faheen resumeFaheen resume
Faheen resume
 
Manufacturing tech 2
Manufacturing tech 2Manufacturing tech 2
Manufacturing tech 2
 
How to Fill TNEA Application Form
How to Fill TNEA Application FormHow to Fill TNEA Application Form
How to Fill TNEA Application Form
 
Pray as Seen Me Praying Prophet Muhammad(pbuh)
Pray as Seen Me Praying Prophet Muhammad(pbuh) Pray as Seen Me Praying Prophet Muhammad(pbuh)
Pray as Seen Me Praying Prophet Muhammad(pbuh)
 
Ethical hacking1
Ethical hacking1Ethical hacking1
Ethical hacking1
 

Abs smartdust network for tactical border surveillance system to detect, classify and track enemy intrusion (1)

  • 1. Smartdust Network for Tactical Border Surveillance System to Detect, Classify and Track Enemy Intrusion using Acoustic- Magnetic-Thermal- Vibration Signatures Abstract The greatest threat to national security is “Terrorism” infiltrating through borders. In critical border areas such as Kashmir and Bangladesh regular forces or even satellites cannot monitor these intruding terrorists as the area monitored is quite large and quite complex. This project provides an innovative and effective solution to this problem. The project aim is to design a next generation intelligent ultra small dust like wireless sensor motes which has multiple onboard sensors and a processor, which has the ability to detect an enemy intrusion across borders and battlefields. Thousands of these smartdust motes can be deployed within a large area in a few hours by one or two men. The motes can form a network on its own among them, are small in size, rapidly deployable, have wireless connection to outside world. They detect the intrusion and classify it into vehicles or individuals and groups. Onboard hardware include a variety of sensors for vibration/seismic, magnetic, acoustic and thermal signature recognition, a microcontroller for processing these sensor values and a radio transceiver for communication over a wireless network. The system process the sensor readings, classify the targets and the tracking history can be viewed in the Graphics LCD display attached in the central monitoring unit. The central monitoring node acts as the parent node in a peer to peer wireless network model. The dust motes communicate with central parent node using wireless radio network. Microcontroller: 32-bit ARM Cortex-M3 microcontroller is used to control the mote Display: Graphics LCD used to show the intrusion type and tracking history Communication: IEEE 802.15.4 wireless protocol for communication between motes. IEEE 802.15.4 protocol is a low power, low cost, medium range WPAN network protocol. Thermal Sign: Enhanced PIR sensor is used to identify humans via the heat emitted from their body. Vibration Sign: 3-axis MEMS Accelerometer is used to sense the physical vibration caused by the intruder Acoustic Sign: MEMS Microphone is used to sense the acoustic sound signals. Magnetic Sign: Intruders carrying weapons and moving in vehicles can be identified using their magnetic signature in this AMR Magnetic sensor.