SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 4069
A WIRELESS SENSOR NETWORK BASED BORDER MONITORING SYSTEM
USING CLUSTERS
S.Keerthika1, A.Kasthuri2, S.Lavanya3, U.Nandhini4, G.Nandhini5
1Assistant professor, Dept of ECE, V.S.B Engineering College, Tamil Nadu, India
2,3,4,5 B.E student, Dept of ECE, V.S.B Engineering College, Tamil Nadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The military services and applications comprise
large acres of areas. It encompasses arms, ammunition
weapons, tools and confidential data.WirelessSensorNetwork
(WSN) is one of the upcoming technologies in the field of
wireless communication in which is used for intruder alert
system for enhance the security level LDG algorithm is
implemented enhance the energy consumption of system. The
nodes are randomly deployed in the sensor field for such
applications because of which the density of nodes in some
part of the area to be monitored will be more and other areas
might be very less. In this paper, we identify an appropriate
metric to measure the quality of WSN border crossing
detection. Furthermore, we propose a method to calculate the
required number of sensor nodes to deploy in order to achieve
a specified level of coverage according to the chosen metric in
a given belt region, while maintaining radio connectivity
within the network.
Key Words: WSN Routing protocols, media access control,
border security & surveillance, network coverage and cluster
heads.
1. INTRODUCTION
Wireless sensor networks (WSN), composed of numerous
sensor nodes with small, low-power, inexpensive radios,
have attracted a large amount of research that has led to
interesting and innovative applications. Using a state based
convergence mechanism, the current state-of-the-art cut
detection algorithm, Distributed Source Separation
Detection (DSSD), reliably detects arbitrarily-shaped cuts
and allows individual nodes to perform cut detection
autonomously. However, the algorithm suffers from a
number of problems. First, DSSD fails to address security, a
critical component of sensor deployments in unattended
environments. Second, the algorithm requires a lengthy,
iterative convergence process. Finally, all nodes participate
in the frequent broadcasts required to achieve convergence.
We propose an improved cut detection algorithm called
robust cluster-based cut detection. This algorithm divides
the network into a set of location-based clusters. Cluster
leaders form a virtual grid network and the cut detection
algorithm runs on this high-level network. As the algorithm
executes, leaders converge to some state. A leader finding
inconsistency in its expected state informsitsneighborsand
the sink that a cut has happened.
1.1 Introduction to WSN
Wireless Sensor Networks consists of a large number of low
cost, low-power, low maintenance sensor nodes. Sensor
nodesusually consist of sensing, communicating,computing,
storing and power components. Sensor nodes are often
randomly deployed in huge numbers over a large area to
monitor physical conditions like temperature, humidity,
intensity, vibration, pressure, motion, pollutants etc.
Wireless sensor nodes are equipped with sensing unit, a
processing unit, communication unit and power unit. Each
and every node is capable to perform data gathering,
sensing, processing and communicating with other nodes.
The sensing unit sensesthe environment,theprocessingunit
computesthe confined permutations of the sensed data,and
the communication unit performs exchange of processed
information among neighboring sensor nodes.
The basic building block of a sensor node is shown
Figure 1.1.1: Basic Building Blocks of sensor nodes
The sensing unit of sensor nodesintegratesdifferenttypesof
sensors like thermal sensors, magnetic sensors, vibration
sensors, chemical sensors, bio sensors, and light sensors.
1.2 Functionality of sensor nodes
The major characteristics of the sensor node used to
evaluate the performance of WSN
1. Fault tolerance
Each node in the network is prone to unanticipated failure.
Fault tolerance is the capability to maintain sensor network
functionalities without any break due to sensor node
failures.
2. Mobility of nodes
In order to increase the communication efficiency,thenodes
can move anywhere within the sensor field based on the
type of applications.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 4070
Figure 1.2.1: functionality of sensor node
3. Dynamic network topology
Connection between sensor nodes follows some
standard topology. The WSN should have the capability to
work in the dynamic topology.
4. Communication failures
If any node in the WSN fails to exchange data with
other nodes, it should be informed without delay to the base
station or gateway node.
5. Heterogeneity of nodes
The sensor nodes deployed in the WSN may be of
various types and need to work in a cooperative fashion.
6. Scalability
The number of sensor nodes in a sensor network
can be in the order of hundreds or even thousands. Hence,
WSN designed for sensor networks is supposed to be highly
scalable.
7. Independency
The WSN shouldhave thecapabilitytoworkwithout
any central control point.
8. Programmability
The option for reprogramming or reconfiguring
should be available for the WSN to become adaptive for any
dynamic changes in the network.
9. Utilization of sensors
The sensors should be utilized in a way that
produces the maximum performance with less energy.
10. Impracticality of public key cryptosystems
The limited computation and power resources of
sensor nodes often make it undesirable to use public key
algorithms.
2. PROPOSED METHOD
2.1 LINK SELECTION IN LDG ALGORITHM
Link Selection in LDG Algorithm is implemented here. The
proposed power control technique can also be used by MAC
protocols to improve the probability of successful data
transmissions. Many countryresearchgroupshaveproposed
using WSNs for border monitoring. Although therearemany
interesting research problemsin sensornetworks,computer
scientists must work closely with security personaltocreate
a system that produces useful data. In this section, we
examine the need for sensor networksand therequirements
that sensor networks must meet to collect useful data for
defence purpose. For any country to maintain peaceful
relations with its neighbors there is a need to establish a fire
free zone in the borders, here the wireless sensor network
system is at use. Solder presence in the borders may lead to
taunting among them and lead to unexpected conflicts and
ultimately results in a war. Wirelessnetworking systemsare
required in less population density areas where there is
chance for illegal human operations, where as it is not
necessary in placeswhich hashigh densityofpopulationand
security. Another difficulty present in highly populated area
is that the sensors will detect the disturbances caused by
people living in that area. The impact of sensor networksfor
habitat and environmental monitoring will be measured by
their ability to enable new applications and produce new,
otherwise unattainable, results. In addition, border places
often serve as refuges for people who leave their home land
in the pursuit of money and good life style. Sensor networks
have a significant advantage over traditional methods of
monitoring. Finally, sensor network deployment is a
comparatively more economical method forconductinglong
term studies than traditional methods. Presently, a large
number of solders are required to monitor the border but
implementingof sensor network will reduce thenumbersto
minimum.
2.2 Border Requirements
[1] Access of Internet
The sensor network at bordersshould be accessiblethrough
internet. An important purpose of border monitoring
applications is the ability to support remote communication
with main networks.
[2] Network hierarchy
The field station at border needs enough requirements to
support database systems and Internet connectivity.
However, the borders of political interest are located up to
several kilometers away. In the second phase the multiple
patches are deployed at areas of interest to provide
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 4071
connectivity to main network. Four or more patches of 150
static (not mobile) nodes are sufficient to start.
[3] Durability of sensor network
Non rechargeable sourcesof power sourcesthat run for10-
11 months used in sensor networks gained significant
audience. Although ecological studies at borders span
multiple field seasons, individual field seasons typicallyvary
from 9 to 12 months.
[4] Grid Operation
Energy supply is bounded to each and every level of
network. Disconnection may occur when we try to use non
conventional energy sources like solar power and wind
energy. Our country border hassufficient solar powertorun
many elements of the application 24x7 with low
probabilities of service interruptions due to power loss.
[5] Managing the device from a distance
There is the necessity to monitor and manage the network
wirelessly from a large distance since no militarypresenceis
required in borders. Except for installation andmaintenance
purpose in some extraordinary exceptional conditionsthere
should be no presence of military people in the borders.
[6] Hidden operation
The circuits and equipment that is used in border
monitoringmust be hidden. It should not be identifiedbythe
neighboring countries as it may lead to personal
indifferences between the two countries. Removing human
presence from the border areaspresent givesustensionfree
conditions between the nations and lead to economic and
political ties.
[7] Behavior of the system
For the functioning of our border monitoring system our
sensor network must exhibit stable, predictable, and
repeatable behavior. It is difficult to maintain and debug an
unpredictable system. Predictability is important to induce
confidence in the military that they can depend on these
alternatives for protecting the country in borders.
[8] Interactions with main network
As the connections are made using the internet, in cases of
maintenance and testing it is the local network that we use.
We can use personal digital assistants to serve us in this
aspect. It can be used to question, alter parameters of
operation.
[9] Recording of data
It is very important to store the readings from a sensor for
using in analysis. The data isretrieved from sensor and then
sent for error correction. This processed data is stored in
data bases. These data bases are highly securedandareopen
for top army personal. Since we can’t expect the inflow of
human traffic and the moment of the enemy near theborder.
Time to time update of new data is important in this
operation.
The main contribution of this paper is to outline techniques
from the literature to calculate node density and determine
the number as well as the location of monitoring towers.
However, the cost of such a system is extremely high and its
multi-phase sensing could introduce significant reporting
delays. The collaboration between sensorsindifferentlayers
requirescomplex coordination techniques.Furthermore,the
integration of the multimodal data is not a trivial task.
2.3 LDG protocol
BSNs use a cost metric to choose the ‘best’ MT and the ‘best’
parent to reach that MT. The potential parent, distance to
reach it and the quality of the link connecting the two nodes.
The link quality approximations dependontheChannelState
Information (CSI). The algorithm for the parent selection
considersthe full path to the MT to ensure thatthealgorithm
we propose flat, modular system architecturetooffertimely,
mission-centric event detection. The proposed architecture
is open to any hardware platform and does not assume any
sensing modality. Flat systemscompriseasetofBasicSensor
Nodes (BSN), which collaborate to detect and report events.
Conventional border surveillance systems rely on of fixed
checkpoints, Monitoring Towers (MT), mobile vehicles, and
border guards. Border guards could be equipped with man
pack antennas. The proposed networkarchitecturebuildson
top of the existing border surveillance infrastructure. BSNs
are deployed in unattended ground to provide higher
granularity for monitoring. Surveillance towers, which may
be stationary or mobile, e.g., armored vehicle dispatched to
incident, collect and route data to the wired network.
Surveillance towers can host powerful and reliable
multimedia sensors, i.e., radars and cameras. Information
from BSNs and the multimedia sensors can be fused at the
MT to reduce the false alarm rate. After the MT confirms an
intrusion reported by a BSN(s), they report the intrusion
location to the remote control and command centre. Due to
coverage considerations and to reduce the miss rate, the
number of deployed BSN(s) is expected to be very large.
2.4 Result of implementation
Packet delivery ratio (PDR)
PDR is expressed asthe ratio between the numberofpackets
successfully delivered to a destination and the number of
packets sent by source node.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 4072
Figure2.4.1: packet delivery ratio
Energy consumption (EC)
Figure 2.4.2: energy consumption
The EC measures the amount of power consumed at each
BSN during the network operation. In NS-2,thecalculationof
energy expenditure at each node takes into account the
power consumed for packet transmission and reception,the
one consumed during the time where the radio is in sleep
mode, and the energy consumed by the environmentsensing
operations (sensor boards).
Figure 2.4.3: delay comparison
REFERENCES
[1] E. U. C. House of Lords, “Frontex: the eu external borders
agency,” Authority of the House of Lords, March
2008.[Online].
Available:http://www.publications.parliament.uk/pa/ld200
708/ldselect/ldeucom/60/60.pdf
[2] L. Boaz, S. Kaijage, and R. Sinde, “Wireless sensor node
for gas pipeline leak detection and location,” International
Journal of Computer Applications, vol. 100,no.18,pp.29–33,
August 2014.
[3] A. O. Adejo, A. J. Onumanyi, J. M. Anyanya, and S. O.
Oyewobi, “Oil and gas process monitoring through wireless
sensor networks: A survey,” Ozean Journal of Applied
Science, vol. 6, no. 2, 2013.
[4] M. Hammoudeh, R. Newman, C. Dennett, S. Mount, and O.
Aldabbas, “Map as a service: A framework forvisualisingand
maximising information return from multi-modal wireless
sensor networks,” Sensors, vol. 15, no. 9, p. 22970, 2015.
[Online]. Available: http://www.mdpi. Com/1424-
8220/15/9/22970
[5] Z. Sun, P. Wang, M. C. Vuran, M. A. Al-Rodhaan, A. M. Al-
Dhelaan, and I. F. Akyildiz, “Border sense: Border patrol
through advanced wirelesssensor networks,” Ad HocNetw.,
vol. 9, no. 3, pp. 468–477, May 2011. [Online]. Available:
http://dx.doi.org/10.1016/j.adhoc.2010.09.008

More Related Content

What's hot

WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKS
pabitra jena
 

What's hot (19)

WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKS
 
Intro to wireless sensor network
Intro to wireless sensor networkIntro to wireless sensor network
Intro to wireless sensor network
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
 
paper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrokpaper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrok
 
Case study of wireless sensor network
Case study of wireless sensor networkCase study of wireless sensor network
Case study of wireless sensor network
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
First introduction to wireless sensor networks
First introduction to wireless sensor networksFirst introduction to wireless sensor networks
First introduction to wireless sensor networks
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network ppt
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol ppt
 
Data acquisition and storage in Wireless Sensor Network
Data acquisition and storage in Wireless Sensor NetworkData acquisition and storage in Wireless Sensor Network
Data acquisition and storage in Wireless Sensor Network
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
L010527175
L010527175L010527175
L010527175
 
WIRELWIRELESS INTEGRATED NETWORK SENSORS
WIRELWIRELESS INTEGRATED NETWORK SENSORSWIRELWIRELESS INTEGRATED NETWORK SENSORS
WIRELWIRELESS INTEGRATED NETWORK SENSORS
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Wireless Network For Strategic Boundary Supervision System
Wireless Network For Strategic Boundary Supervision SystemWireless Network For Strategic Boundary Supervision System
Wireless Network For Strategic Boundary Supervision System
 
574 501-507
574 501-507574 501-507
574 501-507
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNS
 

Similar to IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters

Similar to IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters (20)

IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
 
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
 
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
 
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
 
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor NetworkIRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
 
A Survey of Fault Tolerance Methods in Wireless Sensor Networks
A Survey of Fault Tolerance Methods in Wireless Sensor NetworksA Survey of Fault Tolerance Methods in Wireless Sensor Networks
A Survey of Fault Tolerance Methods in Wireless Sensor Networks
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
 
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
 
Deep Learning Fault Detection Algorithms in WSNs
Deep Learning Fault Detection Algorithms in WSNsDeep Learning Fault Detection Algorithms in WSNs
Deep Learning Fault Detection Algorithms in WSNs
 
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
 
file4.pdf
file4.pdffile4.pdf
file4.pdf
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
 
Hybrid Target Tracking Scheme in Wireless Sensor Networks
Hybrid Target Tracking Scheme in Wireless Sensor NetworksHybrid Target Tracking Scheme in Wireless Sensor Networks
Hybrid Target Tracking Scheme in Wireless Sensor Networks
 
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Recently uploaded (20)

(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 

IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 4069 A WIRELESS SENSOR NETWORK BASED BORDER MONITORING SYSTEM USING CLUSTERS S.Keerthika1, A.Kasthuri2, S.Lavanya3, U.Nandhini4, G.Nandhini5 1Assistant professor, Dept of ECE, V.S.B Engineering College, Tamil Nadu, India 2,3,4,5 B.E student, Dept of ECE, V.S.B Engineering College, Tamil Nadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The military services and applications comprise large acres of areas. It encompasses arms, ammunition weapons, tools and confidential data.WirelessSensorNetwork (WSN) is one of the upcoming technologies in the field of wireless communication in which is used for intruder alert system for enhance the security level LDG algorithm is implemented enhance the energy consumption of system. The nodes are randomly deployed in the sensor field for such applications because of which the density of nodes in some part of the area to be monitored will be more and other areas might be very less. In this paper, we identify an appropriate metric to measure the quality of WSN border crossing detection. Furthermore, we propose a method to calculate the required number of sensor nodes to deploy in order to achieve a specified level of coverage according to the chosen metric in a given belt region, while maintaining radio connectivity within the network. Key Words: WSN Routing protocols, media access control, border security & surveillance, network coverage and cluster heads. 1. INTRODUCTION Wireless sensor networks (WSN), composed of numerous sensor nodes with small, low-power, inexpensive radios, have attracted a large amount of research that has led to interesting and innovative applications. Using a state based convergence mechanism, the current state-of-the-art cut detection algorithm, Distributed Source Separation Detection (DSSD), reliably detects arbitrarily-shaped cuts and allows individual nodes to perform cut detection autonomously. However, the algorithm suffers from a number of problems. First, DSSD fails to address security, a critical component of sensor deployments in unattended environments. Second, the algorithm requires a lengthy, iterative convergence process. Finally, all nodes participate in the frequent broadcasts required to achieve convergence. We propose an improved cut detection algorithm called robust cluster-based cut detection. This algorithm divides the network into a set of location-based clusters. Cluster leaders form a virtual grid network and the cut detection algorithm runs on this high-level network. As the algorithm executes, leaders converge to some state. A leader finding inconsistency in its expected state informsitsneighborsand the sink that a cut has happened. 1.1 Introduction to WSN Wireless Sensor Networks consists of a large number of low cost, low-power, low maintenance sensor nodes. Sensor nodesusually consist of sensing, communicating,computing, storing and power components. Sensor nodes are often randomly deployed in huge numbers over a large area to monitor physical conditions like temperature, humidity, intensity, vibration, pressure, motion, pollutants etc. Wireless sensor nodes are equipped with sensing unit, a processing unit, communication unit and power unit. Each and every node is capable to perform data gathering, sensing, processing and communicating with other nodes. The sensing unit sensesthe environment,theprocessingunit computesthe confined permutations of the sensed data,and the communication unit performs exchange of processed information among neighboring sensor nodes. The basic building block of a sensor node is shown Figure 1.1.1: Basic Building Blocks of sensor nodes The sensing unit of sensor nodesintegratesdifferenttypesof sensors like thermal sensors, magnetic sensors, vibration sensors, chemical sensors, bio sensors, and light sensors. 1.2 Functionality of sensor nodes The major characteristics of the sensor node used to evaluate the performance of WSN 1. Fault tolerance Each node in the network is prone to unanticipated failure. Fault tolerance is the capability to maintain sensor network functionalities without any break due to sensor node failures. 2. Mobility of nodes In order to increase the communication efficiency,thenodes can move anywhere within the sensor field based on the type of applications.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 4070 Figure 1.2.1: functionality of sensor node 3. Dynamic network topology Connection between sensor nodes follows some standard topology. The WSN should have the capability to work in the dynamic topology. 4. Communication failures If any node in the WSN fails to exchange data with other nodes, it should be informed without delay to the base station or gateway node. 5. Heterogeneity of nodes The sensor nodes deployed in the WSN may be of various types and need to work in a cooperative fashion. 6. Scalability The number of sensor nodes in a sensor network can be in the order of hundreds or even thousands. Hence, WSN designed for sensor networks is supposed to be highly scalable. 7. Independency The WSN shouldhave thecapabilitytoworkwithout any central control point. 8. Programmability The option for reprogramming or reconfiguring should be available for the WSN to become adaptive for any dynamic changes in the network. 9. Utilization of sensors The sensors should be utilized in a way that produces the maximum performance with less energy. 10. Impracticality of public key cryptosystems The limited computation and power resources of sensor nodes often make it undesirable to use public key algorithms. 2. PROPOSED METHOD 2.1 LINK SELECTION IN LDG ALGORITHM Link Selection in LDG Algorithm is implemented here. The proposed power control technique can also be used by MAC protocols to improve the probability of successful data transmissions. Many countryresearchgroupshaveproposed using WSNs for border monitoring. Although therearemany interesting research problemsin sensornetworks,computer scientists must work closely with security personaltocreate a system that produces useful data. In this section, we examine the need for sensor networksand therequirements that sensor networks must meet to collect useful data for defence purpose. For any country to maintain peaceful relations with its neighbors there is a need to establish a fire free zone in the borders, here the wireless sensor network system is at use. Solder presence in the borders may lead to taunting among them and lead to unexpected conflicts and ultimately results in a war. Wirelessnetworking systemsare required in less population density areas where there is chance for illegal human operations, where as it is not necessary in placeswhich hashigh densityofpopulationand security. Another difficulty present in highly populated area is that the sensors will detect the disturbances caused by people living in that area. The impact of sensor networksfor habitat and environmental monitoring will be measured by their ability to enable new applications and produce new, otherwise unattainable, results. In addition, border places often serve as refuges for people who leave their home land in the pursuit of money and good life style. Sensor networks have a significant advantage over traditional methods of monitoring. Finally, sensor network deployment is a comparatively more economical method forconductinglong term studies than traditional methods. Presently, a large number of solders are required to monitor the border but implementingof sensor network will reduce thenumbersto minimum. 2.2 Border Requirements [1] Access of Internet The sensor network at bordersshould be accessiblethrough internet. An important purpose of border monitoring applications is the ability to support remote communication with main networks. [2] Network hierarchy The field station at border needs enough requirements to support database systems and Internet connectivity. However, the borders of political interest are located up to several kilometers away. In the second phase the multiple patches are deployed at areas of interest to provide
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 4071 connectivity to main network. Four or more patches of 150 static (not mobile) nodes are sufficient to start. [3] Durability of sensor network Non rechargeable sourcesof power sourcesthat run for10- 11 months used in sensor networks gained significant audience. Although ecological studies at borders span multiple field seasons, individual field seasons typicallyvary from 9 to 12 months. [4] Grid Operation Energy supply is bounded to each and every level of network. Disconnection may occur when we try to use non conventional energy sources like solar power and wind energy. Our country border hassufficient solar powertorun many elements of the application 24x7 with low probabilities of service interruptions due to power loss. [5] Managing the device from a distance There is the necessity to monitor and manage the network wirelessly from a large distance since no militarypresenceis required in borders. Except for installation andmaintenance purpose in some extraordinary exceptional conditionsthere should be no presence of military people in the borders. [6] Hidden operation The circuits and equipment that is used in border monitoringmust be hidden. It should not be identifiedbythe neighboring countries as it may lead to personal indifferences between the two countries. Removing human presence from the border areaspresent givesustensionfree conditions between the nations and lead to economic and political ties. [7] Behavior of the system For the functioning of our border monitoring system our sensor network must exhibit stable, predictable, and repeatable behavior. It is difficult to maintain and debug an unpredictable system. Predictability is important to induce confidence in the military that they can depend on these alternatives for protecting the country in borders. [8] Interactions with main network As the connections are made using the internet, in cases of maintenance and testing it is the local network that we use. We can use personal digital assistants to serve us in this aspect. It can be used to question, alter parameters of operation. [9] Recording of data It is very important to store the readings from a sensor for using in analysis. The data isretrieved from sensor and then sent for error correction. This processed data is stored in data bases. These data bases are highly securedandareopen for top army personal. Since we can’t expect the inflow of human traffic and the moment of the enemy near theborder. Time to time update of new data is important in this operation. The main contribution of this paper is to outline techniques from the literature to calculate node density and determine the number as well as the location of monitoring towers. However, the cost of such a system is extremely high and its multi-phase sensing could introduce significant reporting delays. The collaboration between sensorsindifferentlayers requirescomplex coordination techniques.Furthermore,the integration of the multimodal data is not a trivial task. 2.3 LDG protocol BSNs use a cost metric to choose the ‘best’ MT and the ‘best’ parent to reach that MT. The potential parent, distance to reach it and the quality of the link connecting the two nodes. The link quality approximations dependontheChannelState Information (CSI). The algorithm for the parent selection considersthe full path to the MT to ensure thatthealgorithm we propose flat, modular system architecturetooffertimely, mission-centric event detection. The proposed architecture is open to any hardware platform and does not assume any sensing modality. Flat systemscompriseasetofBasicSensor Nodes (BSN), which collaborate to detect and report events. Conventional border surveillance systems rely on of fixed checkpoints, Monitoring Towers (MT), mobile vehicles, and border guards. Border guards could be equipped with man pack antennas. The proposed networkarchitecturebuildson top of the existing border surveillance infrastructure. BSNs are deployed in unattended ground to provide higher granularity for monitoring. Surveillance towers, which may be stationary or mobile, e.g., armored vehicle dispatched to incident, collect and route data to the wired network. Surveillance towers can host powerful and reliable multimedia sensors, i.e., radars and cameras. Information from BSNs and the multimedia sensors can be fused at the MT to reduce the false alarm rate. After the MT confirms an intrusion reported by a BSN(s), they report the intrusion location to the remote control and command centre. Due to coverage considerations and to reduce the miss rate, the number of deployed BSN(s) is expected to be very large. 2.4 Result of implementation Packet delivery ratio (PDR) PDR is expressed asthe ratio between the numberofpackets successfully delivered to a destination and the number of packets sent by source node.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 4072 Figure2.4.1: packet delivery ratio Energy consumption (EC) Figure 2.4.2: energy consumption The EC measures the amount of power consumed at each BSN during the network operation. In NS-2,thecalculationof energy expenditure at each node takes into account the power consumed for packet transmission and reception,the one consumed during the time where the radio is in sleep mode, and the energy consumed by the environmentsensing operations (sensor boards). Figure 2.4.3: delay comparison REFERENCES [1] E. U. C. House of Lords, “Frontex: the eu external borders agency,” Authority of the House of Lords, March 2008.[Online]. Available:http://www.publications.parliament.uk/pa/ld200 708/ldselect/ldeucom/60/60.pdf [2] L. Boaz, S. Kaijage, and R. Sinde, “Wireless sensor node for gas pipeline leak detection and location,” International Journal of Computer Applications, vol. 100,no.18,pp.29–33, August 2014. [3] A. O. Adejo, A. J. Onumanyi, J. M. Anyanya, and S. O. Oyewobi, “Oil and gas process monitoring through wireless sensor networks: A survey,” Ozean Journal of Applied Science, vol. 6, no. 2, 2013. [4] M. Hammoudeh, R. Newman, C. Dennett, S. Mount, and O. Aldabbas, “Map as a service: A framework forvisualisingand maximising information return from multi-modal wireless sensor networks,” Sensors, vol. 15, no. 9, p. 22970, 2015. [Online]. Available: http://www.mdpi. Com/1424- 8220/15/9/22970 [5] Z. Sun, P. Wang, M. C. Vuran, M. A. Al-Rodhaan, A. M. Al- Dhelaan, and I. F. Akyildiz, “Border sense: Border patrol through advanced wirelesssensor networks,” Ad HocNetw., vol. 9, no. 3, pp. 468–477, May 2011. [Online]. Available: http://dx.doi.org/10.1016/j.adhoc.2010.09.008