Kaur, 2021 - Google Patents
Wireless Sensor Networks and Border Security: An OverviewKaur, 2021
View PDF- Document ID
- 2326693029885719802
- Author
- Kaur H
- Publication year
- Publication venue
- ONLINE NATIONAL CONFERENCE ON WIRELESS COMMUNICATION, COMPUTING AND INFORMATICS (NCWCCI’21)
External Links
Snippet
Surveillance has happens to be the potential application area of wireless sensor networks (WSNs) in which detection and tracking of an imposter as it travel throughout a sensor network is becoming a more and more significant issue. In this paper, detail about the …
- 238000001514 detection method 0 abstract description 11
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19654—Details concerning communication with a camera
- G08B13/19656—Network used to communicate with a camera, e.g. WAN, LAN, Internet
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19639—Details of the system layout
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10867398B2 (en) | Methods, systems, apparatuses and devices for facilitating motion analysis in an environment | |
Berrahal et al. | Border surveillance monitoring using quadcopter UAV-aided wireless sensor networks | |
Sun et al. | BorderSense: Border patrol through advanced wireless sensor networks | |
US8274377B2 (en) | Information collecting and decision making via tiered information network systems | |
Amiri et al. | Intrusion detection systems in MANET: a review | |
Davis et al. | Airport protection using wireless sensor networks | |
KR102398010B1 (en) | Method for intrusion prediction using artificial intelligence algorithm and computer program thereof | |
CN104601553A (en) | Internet-of-things tampering invasion detection method in combination with abnormal monitoring | |
Zrelli et al. | A new approach of WSN deployment, K-coverage and connectivity in border area | |
Alkhathami et al. | Border surveillance and intrusion detection using wireless sensor networks | |
CN115248880A (en) | Smart city security monitoring system | |
US9264447B2 (en) | Simultaneous determination of a mobile device and its user identification | |
Zhang et al. | Application of wireless sensor network in dynamic linkage video surveillance system based on Kalman filtering algorithm | |
Vadivelan et al. | RETRACTED: A border surveillance system to sense terrorist outbreaks | |
EP3594898A2 (en) | Systems for facilitating motion analysis in an environment using cameras and motion sensors and a gateway | |
Tang et al. | A framework of mining trajectories from untrustworthy data in cyber-physical system | |
Kaur | Wireless Sensor Networks and Border Security: An Overview | |
CN112714446A (en) | Cooperative intrusion sensing method based on edge intelligence | |
Prusty et al. | Prospect of low power sensor network technology in disaster management for sustainable future | |
Tang et al. | Mining lines in the sand: On trajectory discovery from untrustworthy data in cyber-physical system | |
CN111901217B (en) | Key area land-air integrated warning system based on microvibration perception | |
Bendimerad et al. | Coverage enhancement with rotatable sensors in Wireless Video Sensor Networks for post-disaster management | |
Galanda et al. | Mobile Monitoring System for the Protection of the Area of Interest | |
Qi et al. | Construction of integrated land‐space loss prevention and crime prevention system of prison | |
Dahiya | Internet of Drone Things: A New Age Invention |