SlideShare a Scribd company logo
AA
SSeemmiinnaarr RReeppoorrtt
OOnn
““BBoorrddeerr SSeeccuurriittyy UUssiinngg WWiirreelleessss
IInntteeggrraatteedd NNeettwwoorrkk SSeennssoorr ””
SSuubbmmiitttteedd bbyy
SSaauurraabbhh RR.. GGiirraattkkaarr
GGuuiiddeedd BByy CCoo--GGuuiiddee BByy
PPrrooff.. PP.. GG.. KKaauusshhiikk PPrrooff.. RR.. RR.. AAggrraawwaall
DDeeppaarrttmmeenntt ooff EElleeccttrroonniiccss aanndd TTeelleeccoommmmuunniiccaattiioonn EEnnggiinneeeerriinngg
JAWAHARLAL DARDA INSTITUTE OF ENGINEERING AND
TECHNOLOGY MIDC, YAVATMAL 445001
2013-2014
CCEERRTTIIFFIICCAATTEE
This is to certify that the Seminar report entitled
““BB oorrddeerr SS eeccuurriittyy UUssiinngg WWiirreelleessss
IInntteegg rraattee dd NNeettww oorr kk SS eennss oorr””
Being Submitted By
Mr. / Ms. Saurabh R. Giratkar
Of final year Engineering during the session 2013-2014
Is for the partial fulfillment for the requirement
For the award of engineering in Electronics and Telecommunication
under
Sant Gadge Baba Amravati University.
PPrrooff.. PP.. GG.. KKaauusshhiikk PPrrooff.. RR.. RR.. AAggrraawwaall
(Project & Seminar Guide) (Project & Seminar Co-Guide)
Prof. Dr. S. M. Gulhane
HOD
DDeeppaarrttmmeenntt ooff EElleeccttrroonniiccss aanndd TTeelleeccoommmmuunniiccaattiioonn EEnnggiinneeeerriinngg
JAWAHARLAL DARDA INSTITUTE OF ENGINEERING AND
TECHNOLOGY MIDC, YAVATMAL 445001
22001133--22001144
ACKNOWLEDGEMENT
It gives me a great pleasure to submit the seminar topic titled “BB OO RR DD EE RR
SS EE CC UU RR II TT YY UU SS II NN GG WW II RR EE LL EE SS SS II NN TT EE GG RR AA TT EE DD NN EE TT WW OO RR KK
SS EE NN SS OO RR ”. I wish to take this opportunity to express my heartiest gratitude with
pleasure to J.D.I.E.T., Yavatmal, which gave me an opportunity in fulfilling my most
cherished desire of reaching my goals.
I am indebted to a proactive guide Prof. P. G. Kaushik and co-guided by Prof.
R. R. Agrawal because without his valuable guidance this work would not have been a
success. His constructive, useful, timely suggestions and encouragement in every step
immensely helped me to carry out my seminar work. His invaluable presence was a
great boost for me in achieving up the goal.
I am very much indebted to the Head of the Department Dr. S. M. Gulhane and
Principal Dr. A. W. Kolhatkar, for providing all the facilities needed for successful
completion of this seminar and providing necessary assistance while preparing for this
seminar work.
I am very much thankful to all Professors and staff members of Electronics and
telecommunication Engineering Department. I also express my deep gratitude to my
parents and all my friends who directly and indirectly helped me to prepare for this
seminar.
SSuubbmmiitttteedd bbyy::
SSaauurraabbhh RR.. GGiirraattkkaarr
Final Year , section-c
Electronics& Telecommunication Engineering.
BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 1
LIST OF FIGURES PAGE NO.
1. Wireless Integrated Network Sensor 5
2. WINS Architecture 6
3. Wins nodes 7
4. A) Thermal Infrared Detector 9
B) A Micrograph of the Thermopile Junction Array 10
5. Nodal distance and Traffic 11
6. WINS micro power spectrum analyser architecture 13
7. Comparator plot 14
BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 2
TABLE OF CONTENTS
CHAPTER TITLE PAGE NO.
CERTIFICATE
ABSTRACT
LIST OF FIGURES
1. INTRODUCTION 4
2. WINS SYSTEM ARCHITECTURE 6
3. WINS NODE ARCHITECTURE 7
4. WINS MICRO SENSOR 9
5. ROUTING BETWEEN NODES 11
6. WINS DIGITAL SIGNAL PROCESSING 12
7. PSD COMPARSON 14
8. APPLICATION 16
9. PROS AND CONS 17
10. CONCLUSION 17
11. REFERENCES 18
BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 3
ABSTRACT
Wireless Integrated Network Sensors (WINS) now provide a new monitoring and
control capability for monitoring the borders of the country. Using this concept we can
easily identify a stranger or some terrorists entering the border. The border area is divided
into number of nodes. Each node is in contact with each other and with the main node.
The noise produced by the foot-steps of the stranger are collected using the sensor. This
sensed signal is then converted into power spectral density and the compared with
reference value of our convenience. Accordingly the compared value is processed using a
microprocessor, which sends appropriate signals to the main node. Thus the stranger is
identified at the main node. A series of interface, signal processing, and communication
systems have been implemented in micro power CMOS circuits. A micro power
spectrum analyzer has been developed to enable low power operation of the entire WINS
system.
Thus WINS require a Microwatt of power. But it is very cheaper when compared
to other security systems such as RADAR under use. It is even used for short distance
communication less than 1 Km. It produces a less amount of delay. Hence it is reasonably
faster. On a global scale, WINS will permit monitoring of land, water, and air resources
for environmental monitoring. On a national scale, transportation systems, and borders
will be monitored for efficiency, safety and security.
BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 4
BORDER SECURITY USING
WIRELESS INTEGRATED NETWORK SENSORS (WINS)
CHAPTER 1
INTRODUCTION
Wireless Integrated Network Sensors (WINS) combine sensing, signal
processing, decision capability, and wireless networking capability in a compact, low
power system. Compact geometry and low cost allows WINS to be embedded and
distributed at a small fraction of the cost of conventional wireline sensor and actuator
systems. On a local, wide-area scale, battlefield situational awareness will provide
personnel health monitoring and enhance security and efficiency. Also, on a metropolitan
scale, new traffic, security, emergency, and disaster recovery services will be enabled by
WINS. On a local, enterprise scale, WINS will create a manufacturing information
service for cost and quality control. The opportunities for WINS depend on the
development of scalable, low cost, sensor network architecture. This requires that sensor
information be conveyed to the user at low bit rate with low power transceivers.
Continuous sensor signal processing must be provided to enable constant monitoring of
events in an environment. Distributed signal processing and decision making enable
events to be identified at the remote sensor. Thus, information in the form of decisions is
conveyed in short message packets. Future applications of distributed embedded
processors and sensors will require massive numbers of devices. In this paper we have
concentrated in the most important application, Border Security.
BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 5
Fig.1A wireless integrating network sensor
Fig.1B wireless integrating network sensor
BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 6
CHAPTER 2
WINS SYSTEM ARCHITECTURE
Conventional wireless networks are supported by complex protocols that are
developed for voice and data transmission for handhelds and mobile terminals. These
networks are also developed to support communication over long range (up to 1km or
more) with link bit rate over 100kbps. In contrast to conventional wireless networks, the
WINS network must support large numbers of sensors in a local area with short range
and low average bit rate communication (less than 1kbps). The network design must
consider the requirement to service dense sensor distributions with an emphasis on
recovering environment information. Multihop communication yields large power and
scalability advantages for WINS networks. Multihop communication, therefore, provides
an immediate advance in capability for the WINS narrow Bandwidth devices. However,
WINS Multihop Communication networks permit large power reduction and the
implementation of dense node distribution. The multihop communication has been shown
in the figure 2. The figure 1 represents the general structure of the wireless integrated
network sensors (WINS) arrangement.
Continuous operation low duty cycle
Figure 2. The wireless integrated network sensor (WINS) architecture.
BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 7
CHAPTER 3
WINS NODE ARCHITECTURE
The WINS node architecture (Figure 1) is developed to enable continuous
sensing, event detection, and event identification at low power. Since the event detection
process must occur continuously, the sensor, data converter, data buffer, and spectrum
analyzer must all operate at micro power levels. In the event that an event is detected, the
spectrum analyzer output may trigger the microcontroller. The microcontroller may then
issue commands for additional signal processing operations for identification of the event
signal. Protocols for node operation then determine whether a remote user or
neighbouring WINS node should be alerted. The WINS node then supplies an attribute of
the identified event, for example, the address of the event in an event look-up-table stored
in all network nodes. Total average system supply currents must be less than 30 A. Low
power, reliable, and efficient network operation is obtained with intelligent sensor nodes
that include sensor signal processing, control, and a wireless network interface.
Distributed network sensor devices must continuously monitor multiple sensor systems,
process sensor signals, and adapt to changing environments and user requirements, while
completing decisions on measured signals.
Figure 3. WINS nodes (shown as disks)
BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 8
For the particular applications of military security, the WINS sensor systems must
operate at low power, sampling at low frequency and with environmental background
limited sensitivity. The micro power interface circuits must sample at dc or low
frequency where “1/f” noise in these CMOS interfaces is large. The micropower signal
processing system must be implemented at low power and with limited word length. In
particular, WINS applications are generally tolerant to latency. The WINS node event
recognition may be delayed by 10 – 100 m sec, or longer. This permits low clock rate
signal processing and architecture design that minimizes computation and
communication power at the expense of latency. For example, in the latency-tolerant
WINS system, time division multiple access protocols may be implemented to reduce
communication power. Also, it is important to note that sensor signals are generally
narrowband signals (bandwidth less than 10 kHz) that require only low sample and
processing rates. Many of the primary WINS applications require sensor nodes powered
by compact battery cells. Total average system supply currents must be less than 30 A
to provide long operating life from typical compact Li coin cells (2.5 cm diameter and 1
cm thickness).
BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 9
CHAPTER 4
WINS MICRO SENSORS
Source signals (seismic, infrared, acoustic and others) all decay in amplitude
rapidly with radial distance from the source. To maximize detection range, sensor
sensitivity must be optimized. In addition, due to the fundamental limits of background
noise, a maximum detection range exists for any sensor. Thus, it is critical to obtain the
greatest sensitivity and to develop compact sensors that may be widely distributed.
Clearly, microelectromechanical systems (MEMS) technology provides an ideal path for
implementation of these highly distributed systems. The sensor-substrate “Sensorstrate”
is then a platform for support of interface, signal processing, and communication circuits.
Examples of WINS Micro Seismometer and infrared detector devices are shown in
Figure 3. The detector shown is the thermal detector. It just captures the harmonic signals
produced by the foot-steps of the stranger entering the border. These signals are then
converted into their PSD values and are then compared with the reference values set by
the user.
Figure 4 A. Thermal Infrared Detector
BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 10
Fig.4 B Micrograph of the Thermopile Junction Array
The WINS microsensor systems must be monitored continuously by the CMOS
micropower analog-to-digital converter (ADC). As was noted above, power requirements
constrain the ADC design to power levels of 30 W or less. Sensor sample rate for
typical microsensor applications is less than 1kHz (for example the infrared microsensor
bandwidth is 50Hz, thus limiting required sample rate to 100 Hz). Also, it is important to
note that the signal frequency is low. Specifically, the themopile infrared sensor may be
employed to detect temperature, presence, of motion at near dc signal frequencies.
Therefore, the ADC must show high stability (low input-referred noise at low frequency).
For the WINS ADC application, a first order Sigma-Delta (S-D) converter is chosen over
other architectures due to power constraints. The S-D architecture is also compatible with
the limitations of low cost digital CMOS technologies.
BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 11
CHAPTER 5
ROUTING BETWEEN NODES
The sensed signals are then routed to the major node. This routing is done
based on the shortest distance. That is the distance between the nodes is not considered,
but the traffic between the nodes is considered. This has been depicted in the figure 4. In
the figure, the distances between the nodes and the traffic between the nodes has been
clearly shown. For example, if we want to route the signal from the node 2 to node 4, the
shortest distance route will be from node 2 via node 3 to node 4. But the traffic through
this path is higher than the path node 2 to node 4. Where as this path is longer in distance.
Figure 5 . Nodal distance and Traffic
BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 12
CHAPTER 6
WINS DIGITAL SIGNAL PROCESSING
If a stranger enters the border, his foot-steps will generate harmonic signals. It can
be detected as a characteristic feature in a signal power spectrum. Thus, a spectrum
analyzer must be implemented in the WINS digital signal processing system. The
spectrum analyzer resolves the WINS input data into a low-resolution power spectrum.
Power spectral density (PSD) in each frequency “bins” is computed with adjustable band
location and width. Bandwidth and position for each power spectrum bin is matched to
the specific detection problem. The WINS spectrum analyzer must operate at W power
level. So the complete WINS system, containing controller and wireless network
interface components, achieves low power operation by maintaining only the micropower
components in continuous operation. The WINS spectrum analyzer system, shown in
Figure 7, contains a set of parallel filters.
The complete WINS system, containing controller and wireless network interface
components, achieves low power operation by maintaining only the micropower
components in continuous operation. The WINS spectrum analyzer system contains a set
of 8 parallel filters. Mean square power for each frequency bin, is computed at the output
of each filter. Each filter is assigned a coefficient set for PSD computation. Finally, PSD
values are compared with background reference values (that may be either downloaded or
learned). In the event that the measured PSD spectrum values exceed that of the
background reference values, the operation of a microcontroller is triggered. Thus, only if
an event appears does the microcontroller operate. Of course, the microcontroller may
support additional, more complex algorithms that provide capability (at higher power) for
event identification. The WINS spectrum analyzer architecture includes a data buffer.
Buffered data is stored during continuous computation of the PSD spectrum. If an event
is detected, the input data time series, including that acquired prior to the event, are
available to the microcontroller. Low power operation of the spectrum analyzer is
achieved through selection of an architecture that provides the required performance and
function while requiring only limited word length. First, since high resolution
measurements of PSD are required (5 Hz bandwidth passbands at frequencies of 5 – 50
BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 13
Hz with a 200 Hz input word rate) FIR filters would require an excessive number of taps
and corresponding power dissipation. In contrast, IIR filter architectures have provided
adequate resolution with limited word length. An example of the performance of a typical
filter is shown in Figure 8. Here, a series of input signals at frequencies of 10 – 70 Hz
were applied to the 8-bit data IIR filter with coefficients selected for a passband of 10 Hz
width centred at 45 Hz. This device dissipates 3Mw at 3V bias and at a 200Hz word rate.
Figure 6. WINS micropower spectrum analyzer architecture.
BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 14
CHAPTER 7
PSD COMPARISION
Each filter is assigned a coefficient set for PSD computation. Finally, PSD values
are compared with background reference values In the event that the measured PSD
spectrum values exceed that of the background reference values, the operation of a
microcontroller is triggered. Thus, only if an event appears, the micro controller operates.
Buffered data is stored during continuous computation of the PSD spectrum. If an event
is detected, the input data time series, including that acquired prior to the event, are
available to the micro controller. The micro controller sends a HIGH signal, if the
difference is high. It sends a LOW signal, if the difference is low. For a reference value
of 25db, the comparison of the DFT signals is shown in the figure 8.
Figure 7. Comparator plot
BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 15
CHAPTER 8
APPLICATION
1. SUPPORT PLUG-IN LINUX DEVICES: other development will include very small
but limited sensing device that interact with WINS NG node in heterogeneous network.
2. SMALL LIMITED SENAING DEVICE: interact with WINS NG node in
heterogeneous network
3. SCAVENGE ENERGY FROM THE ENVIORNMENT: small device might scavenge
there energy from the environment by means of photocells and piezoelectric materials,
capturing energy from vibration and achieving perpetual lifespan
BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 16
CHAPTER 9
PROS AND CONS
PROS:
1. It avoid hell lot of wiring
2. It can accommodate new devices at any time
3. Its flexible to go through physical partitions
4. It can be accessed through a centralized monitor
5. It is very cheaper, faster can be accessed in shorter distances having less amount of
delay, and also power consumption is in the order of microwatt.
CONS:
1. Its damn easy for hackers to hack it as we can’t control propagation of waves
2. Comparatively low speed of communication
3. Gets distracted by various elements like Blue-tooth
4. Still Costly at large.
BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 17
CHAPTER 10
CONCLUSION
A series of interface, signal processing, and communication systems have been
implemented in micropower CMOS circuits. A micropower spectrum analyzer has been
developed to enable low power operation of the entire WINS system. Thus WINS require
a Microwatt of power. But it is very cheaper when compared to other security systems
such as RADAR under use. It is even used for short distance communication less than 1
Km. It produces a less amount of delay. Hence it is reasonably faster. On a global scale,
WINS will permit monitoring of land, water, and air resources for environmental
monitoring. On a national scale, transportation systems, and borders will be monitored
for efficiency, safety and security.
BORDER SECURITY USING WINS
J.D.I.E.T, Yavatmal Page 18
CHAPTER 11
REFERENCE
[1] M. J. Dong, G. Yung, and W. J. Kaiser, “Low Power Signal Processing Architectures
for Network Microsensors”, 1997 International Symposium on Low Power Electronics
and Design, Digest of Technical Papers (1997).
[2] A. A. Abidi, “Low-power radio-frequency ICs for portable communications”,
Proceedings of the IEEE, 83, (1995).
[3] Agre, J., Clare, L., Pottie, G., and Romanov, N. Development platform for self-
organizing wireless sensor networks. In Proceedings of Aerosense’99 (Orlando Fla., Apr.
Apr. 8–9). International Society of Optical Engineering, Bellingham, Wa., 1999, 257–
268.
[4] Asada, G., Dong, M., Lin, T., Newberg, F., Pottie, G., Marcy, H., and Kaiser, W.
Wireless integrated network sensors: Low-power systems on a chip. In Proceedings of
the 24th IEEE European Solid-State Circuits Conference (Den Hague, The Netherlands,
Sept. 21–25). Elsevier, 1998, 9–12.
[5] Bult, K., Burstein, A., Chang, D., Dong, M., Fielding, M., Kruglick, E., Ho, J., Lin,
F., Lin, T.-H., Kaiser, W., Marcy, H., Mukai, R., Nelson, P., Newberg, F., Pister, K.,
Pottie, G., Sanchez, H., Stafsudd, O., Tan, K., Ward, C., Xue, S., and Yao, J. Low-power
systems for wireless microsensors. In Proceedings of the International Symposium on
Low- Power Electronics and Design (Monterey, Calif., Aug. 12–14). IEEE, New York,
1996, 17–21.
[6] Dong, M., Yung, G., and Kaiser, W. Low-power signal processing architectures for
network microsensors. In Proceedings of the 1997 International Symposium on Low-
Power Electronics and Design (Monterey, Calif., Aug. 18–20). IEEE, New York, 1997,
173–177.
.

More Related Content

What's hot

Seminar on smart antenna systems
Seminar on smart antenna systemsSeminar on smart antenna systems
Seminar on smart antenna systems
Ashok Behuria
 
smart antennas ppt
smart antennas pptsmart antennas ppt
smart antennas ppt
santhu652
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
Ganesh Khadsan
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network ppt
Pramod Kuruvatti
 
Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)
Yogesh Fulara
 
M ary psk modulation
M ary psk modulationM ary psk modulation
M ary psk modulation
Ahmed Diaa
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
Jawhar Ali
 
PIR sensing with arduino
PIR sensing  with  arduinoPIR sensing  with  arduino
PIR sensing with arduino
chetan kadiwal
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
saujanya shah
 
6G Technology
6G Technology6G Technology
6G Technology
Akhil john
 
Wireless Body Area Network
Wireless Body Area NetworkWireless Body Area Network
microwave-engineering
microwave-engineeringmicrowave-engineering
microwave-engineering
ATTO RATHORE
 
Ultrasonic based distance measurement system
Ultrasonic based distance measurement systemUltrasonic based distance measurement system
Ultrasonic based distance measurement system
Mrinal Sharma
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
juno susi
 
Melectronic pill
Melectronic pillMelectronic pill
Melectronic pill
punitkumar Kulli
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
Roma Vyas
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networks
Ameer Sameer
 
microwave-tubes
 microwave-tubes microwave-tubes
microwave-tubes
ATTO RATHORE
 
Alcohol detection system with gsm and gps (fiem , ece)
Alcohol detection system with gsm and gps (fiem , ece)Alcohol detection system with gsm and gps (fiem , ece)
Alcohol detection system with gsm and gps (fiem , ece)
ANUBHAVGHOSHDASTIDAR
 
wirelss sensor network
wirelss sensor networkwirelss sensor network
wirelss sensor network
rasyidi usman
 

What's hot (20)

Seminar on smart antenna systems
Seminar on smart antenna systemsSeminar on smart antenna systems
Seminar on smart antenna systems
 
smart antennas ppt
smart antennas pptsmart antennas ppt
smart antennas ppt
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network ppt
 
Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)
 
M ary psk modulation
M ary psk modulationM ary psk modulation
M ary psk modulation
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
 
PIR sensing with arduino
PIR sensing  with  arduinoPIR sensing  with  arduino
PIR sensing with arduino
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
6G Technology
6G Technology6G Technology
6G Technology
 
Wireless Body Area Network
Wireless Body Area NetworkWireless Body Area Network
Wireless Body Area Network
 
microwave-engineering
microwave-engineeringmicrowave-engineering
microwave-engineering
 
Ultrasonic based distance measurement system
Ultrasonic based distance measurement systemUltrasonic based distance measurement system
Ultrasonic based distance measurement system
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Melectronic pill
Melectronic pillMelectronic pill
Melectronic pill
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networks
 
microwave-tubes
 microwave-tubes microwave-tubes
microwave-tubes
 
Alcohol detection system with gsm and gps (fiem , ece)
Alcohol detection system with gsm and gps (fiem , ece)Alcohol detection system with gsm and gps (fiem , ece)
Alcohol detection system with gsm and gps (fiem , ece)
 
wirelss sensor network
wirelss sensor networkwirelss sensor network
wirelss sensor network
 

Similar to A Border security Using Wireless Integrated Network Sensors (WINS)

IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET Journal
 
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET Journal
 
A Comparative Performance Analysis of Centralized and Distributed Hierarchica...
A Comparative Performance Analysis of Centralized and Distributed Hierarchica...A Comparative Performance Analysis of Centralized and Distributed Hierarchica...
A Comparative Performance Analysis of Centralized and Distributed Hierarchica...
IRJET Journal
 
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Swapnil Jagtap
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
ijcsa
 
Remote Monitoring of Crop Field Using Wireless Sensor Network
Remote Monitoring of Crop Field Using Wireless Sensor NetworkRemote Monitoring of Crop Field Using Wireless Sensor Network
Remote Monitoring of Crop Field Using Wireless Sensor Network
IJMER
 
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
IRJET Journal
 
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor NetworkEnergetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
IRJET Journal
 
Energy Consumption in chain based routing protocol in wireless sensor network
Energy Consumption in chain based routing protocol in wireless sensor networkEnergy Consumption in chain based routing protocol in wireless sensor network
Energy Consumption in chain based routing protocol in wireless sensor network
BADALKUMAR56
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET Journal
 
IRJET- Underground Cable Fault Detection and Transmission of Intimation t...
IRJET-  	  Underground Cable Fault Detection and Transmission of Intimation t...IRJET-  	  Underground Cable Fault Detection and Transmission of Intimation t...
IRJET- Underground Cable Fault Detection and Transmission of Intimation t...
IRJET Journal
 
Presentacion invento redes de sensores inalambricas
Presentacion invento redes de sensores inalambricasPresentacion invento redes de sensores inalambricas
Presentacion invento redes de sensores inalambricasmpgarciam
 
BORDER_SECURITY_USING_WIRELESS_INTEGRATE.pdf
BORDER_SECURITY_USING_WIRELESS_INTEGRATE.pdfBORDER_SECURITY_USING_WIRELESS_INTEGRATE.pdf
BORDER_SECURITY_USING_WIRELESS_INTEGRATE.pdf
sunadstar
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
Ganesh Khadsan
 
Presentacion invento redes de sensores inalambricas
Presentacion invento redes de sensores inalambricasPresentacion invento redes de sensores inalambricas
Presentacion invento redes de sensores inalambricas
mpgarciam
 
Oj3425062509
Oj3425062509Oj3425062509
Oj3425062509
IJERA Editor
 
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKComplete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Rutvik Pensionwar
 

Similar to A Border security Using Wireless Integrated Network Sensors (WINS) (20)

IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
 
SEDRP
SEDRPSEDRP
SEDRP
 
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
 
Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1
 
QoS in WSN thesis
QoS in WSN thesisQoS in WSN thesis
QoS in WSN thesis
 
A Comparative Performance Analysis of Centralized and Distributed Hierarchica...
A Comparative Performance Analysis of Centralized and Distributed Hierarchica...A Comparative Performance Analysis of Centralized and Distributed Hierarchica...
A Comparative Performance Analysis of Centralized and Distributed Hierarchica...
 
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 
Remote Monitoring of Crop Field Using Wireless Sensor Network
Remote Monitoring of Crop Field Using Wireless Sensor NetworkRemote Monitoring of Crop Field Using Wireless Sensor Network
Remote Monitoring of Crop Field Using Wireless Sensor Network
 
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
 
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor NetworkEnergetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
 
Energy Consumption in chain based routing protocol in wireless sensor network
Energy Consumption in chain based routing protocol in wireless sensor networkEnergy Consumption in chain based routing protocol in wireless sensor network
Energy Consumption in chain based routing protocol in wireless sensor network
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
 
IRJET- Underground Cable Fault Detection and Transmission of Intimation t...
IRJET-  	  Underground Cable Fault Detection and Transmission of Intimation t...IRJET-  	  Underground Cable Fault Detection and Transmission of Intimation t...
IRJET- Underground Cable Fault Detection and Transmission of Intimation t...
 
Presentacion invento redes de sensores inalambricas
Presentacion invento redes de sensores inalambricasPresentacion invento redes de sensores inalambricas
Presentacion invento redes de sensores inalambricas
 
BORDER_SECURITY_USING_WIRELESS_INTEGRATE.pdf
BORDER_SECURITY_USING_WIRELESS_INTEGRATE.pdfBORDER_SECURITY_USING_WIRELESS_INTEGRATE.pdf
BORDER_SECURITY_USING_WIRELESS_INTEGRATE.pdf
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
 
Presentacion invento redes de sensores inalambricas
Presentacion invento redes de sensores inalambricasPresentacion invento redes de sensores inalambricas
Presentacion invento redes de sensores inalambricas
 
Oj3425062509
Oj3425062509Oj3425062509
Oj3425062509
 
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKComplete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
 

More from Saurabh Giratkar

A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)
Saurabh Giratkar
 
To Understand the Eco-System in Digital Media Marketing.
To Understand the Eco-System in Digital Media Marketing.To Understand the Eco-System in Digital Media Marketing.
To Understand the Eco-System in Digital Media Marketing.
Saurabh Giratkar
 
Impact of Packaging on Consumer Buying Behavior.
Impact of Packaging on Consumer Buying Behavior.Impact of Packaging on Consumer Buying Behavior.
Impact of Packaging on Consumer Buying Behavior.
Saurabh Giratkar
 
Economy Australia
Economy AustraliaEconomy Australia
Economy Australia
Saurabh Giratkar
 
External environment of taj & oberoi hotel industry
External environment of taj & oberoi hotel industryExternal environment of taj & oberoi hotel industry
External environment of taj & oberoi hotel industry
Saurabh Giratkar
 
Managerial Effectiveness
Managerial Effectiveness Managerial Effectiveness
Managerial Effectiveness
Saurabh Giratkar
 
Mary parker follett
Mary parker follettMary parker follett
Mary parker follett
Saurabh Giratkar
 
Connecting Remote Users to Your Network with Windows Server 2003
Connecting Remote Users to Your Network with Windows Server 2003Connecting Remote Users to Your Network with Windows Server 2003
Connecting Remote Users to Your Network with Windows Server 2003
Saurabh Giratkar
 
OBJECT DECOMPOSITION BASED ON SKELETON ANALYSIS FOR ROAD EXTRATION
OBJECT DECOMPOSITION BASED ON SKELETON ANALYSIS FOR ROAD EXTRATIONOBJECT DECOMPOSITION BASED ON SKELETON ANALYSIS FOR ROAD EXTRATION
OBJECT DECOMPOSITION BASED ON SKELETON ANALYSIS FOR ROAD EXTRATION
Saurabh Giratkar
 
Air pollution monitoring system using mobile gprs sensors array ppt
Air pollution monitoring system using mobile gprs sensors array pptAir pollution monitoring system using mobile gprs sensors array ppt
Air pollution monitoring system using mobile gprs sensors array ppt
Saurabh Giratkar
 
Air pollution monitoring system using mobile gprs sensors array
Air pollution monitoring system using mobile gprs sensors arrayAir pollution monitoring system using mobile gprs sensors array
Air pollution monitoring system using mobile gprs sensors array
Saurabh Giratkar
 
Trojans
TrojansTrojans
Certificate authorities under attack :A
Certificate authorities under attack :ACertificate authorities under attack :A
Certificate authorities under attack :ASaurabh Giratkar
 
Brain Computer Interface Next Generation of Human Computer Interaction
Brain Computer Interface Next Generation of Human Computer InteractionBrain Computer Interface Next Generation of Human Computer Interaction
Brain Computer Interface Next Generation of Human Computer Interaction
Saurabh Giratkar
 

More from Saurabh Giratkar (14)

A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)
 
To Understand the Eco-System in Digital Media Marketing.
To Understand the Eco-System in Digital Media Marketing.To Understand the Eco-System in Digital Media Marketing.
To Understand the Eco-System in Digital Media Marketing.
 
Impact of Packaging on Consumer Buying Behavior.
Impact of Packaging on Consumer Buying Behavior.Impact of Packaging on Consumer Buying Behavior.
Impact of Packaging on Consumer Buying Behavior.
 
Economy Australia
Economy AustraliaEconomy Australia
Economy Australia
 
External environment of taj & oberoi hotel industry
External environment of taj & oberoi hotel industryExternal environment of taj & oberoi hotel industry
External environment of taj & oberoi hotel industry
 
Managerial Effectiveness
Managerial Effectiveness Managerial Effectiveness
Managerial Effectiveness
 
Mary parker follett
Mary parker follettMary parker follett
Mary parker follett
 
Connecting Remote Users to Your Network with Windows Server 2003
Connecting Remote Users to Your Network with Windows Server 2003Connecting Remote Users to Your Network with Windows Server 2003
Connecting Remote Users to Your Network with Windows Server 2003
 
OBJECT DECOMPOSITION BASED ON SKELETON ANALYSIS FOR ROAD EXTRATION
OBJECT DECOMPOSITION BASED ON SKELETON ANALYSIS FOR ROAD EXTRATIONOBJECT DECOMPOSITION BASED ON SKELETON ANALYSIS FOR ROAD EXTRATION
OBJECT DECOMPOSITION BASED ON SKELETON ANALYSIS FOR ROAD EXTRATION
 
Air pollution monitoring system using mobile gprs sensors array ppt
Air pollution monitoring system using mobile gprs sensors array pptAir pollution monitoring system using mobile gprs sensors array ppt
Air pollution monitoring system using mobile gprs sensors array ppt
 
Air pollution monitoring system using mobile gprs sensors array
Air pollution monitoring system using mobile gprs sensors arrayAir pollution monitoring system using mobile gprs sensors array
Air pollution monitoring system using mobile gprs sensors array
 
Trojans
TrojansTrojans
Trojans
 
Certificate authorities under attack :A
Certificate authorities under attack :ACertificate authorities under attack :A
Certificate authorities under attack :A
 
Brain Computer Interface Next Generation of Human Computer Interaction
Brain Computer Interface Next Generation of Human Computer InteractionBrain Computer Interface Next Generation of Human Computer Interaction
Brain Computer Interface Next Generation of Human Computer Interaction
 

Recently uploaded

IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 

Recently uploaded (20)

IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 

A Border security Using Wireless Integrated Network Sensors (WINS)

  • 1. AA SSeemmiinnaarr RReeppoorrtt OOnn ““BBoorrddeerr SSeeccuurriittyy UUssiinngg WWiirreelleessss IInntteeggrraatteedd NNeettwwoorrkk SSeennssoorr ”” SSuubbmmiitttteedd bbyy SSaauurraabbhh RR.. GGiirraattkkaarr GGuuiiddeedd BByy CCoo--GGuuiiddee BByy PPrrooff.. PP.. GG.. KKaauusshhiikk PPrrooff.. RR.. RR.. AAggrraawwaall DDeeppaarrttmmeenntt ooff EElleeccttrroonniiccss aanndd TTeelleeccoommmmuunniiccaattiioonn EEnnggiinneeeerriinngg JAWAHARLAL DARDA INSTITUTE OF ENGINEERING AND TECHNOLOGY MIDC, YAVATMAL 445001 2013-2014
  • 2. CCEERRTTIIFFIICCAATTEE This is to certify that the Seminar report entitled ““BB oorrddeerr SS eeccuurriittyy UUssiinngg WWiirreelleessss IInntteegg rraattee dd NNeettww oorr kk SS eennss oorr”” Being Submitted By Mr. / Ms. Saurabh R. Giratkar Of final year Engineering during the session 2013-2014 Is for the partial fulfillment for the requirement For the award of engineering in Electronics and Telecommunication under Sant Gadge Baba Amravati University. PPrrooff.. PP.. GG.. KKaauusshhiikk PPrrooff.. RR.. RR.. AAggrraawwaall (Project & Seminar Guide) (Project & Seminar Co-Guide) Prof. Dr. S. M. Gulhane HOD DDeeppaarrttmmeenntt ooff EElleeccttrroonniiccss aanndd TTeelleeccoommmmuunniiccaattiioonn EEnnggiinneeeerriinngg JAWAHARLAL DARDA INSTITUTE OF ENGINEERING AND TECHNOLOGY MIDC, YAVATMAL 445001 22001133--22001144
  • 3. ACKNOWLEDGEMENT It gives me a great pleasure to submit the seminar topic titled “BB OO RR DD EE RR SS EE CC UU RR II TT YY UU SS II NN GG WW II RR EE LL EE SS SS II NN TT EE GG RR AA TT EE DD NN EE TT WW OO RR KK SS EE NN SS OO RR ”. I wish to take this opportunity to express my heartiest gratitude with pleasure to J.D.I.E.T., Yavatmal, which gave me an opportunity in fulfilling my most cherished desire of reaching my goals. I am indebted to a proactive guide Prof. P. G. Kaushik and co-guided by Prof. R. R. Agrawal because without his valuable guidance this work would not have been a success. His constructive, useful, timely suggestions and encouragement in every step immensely helped me to carry out my seminar work. His invaluable presence was a great boost for me in achieving up the goal. I am very much indebted to the Head of the Department Dr. S. M. Gulhane and Principal Dr. A. W. Kolhatkar, for providing all the facilities needed for successful completion of this seminar and providing necessary assistance while preparing for this seminar work. I am very much thankful to all Professors and staff members of Electronics and telecommunication Engineering Department. I also express my deep gratitude to my parents and all my friends who directly and indirectly helped me to prepare for this seminar. SSuubbmmiitttteedd bbyy:: SSaauurraabbhh RR.. GGiirraattkkaarr Final Year , section-c Electronics& Telecommunication Engineering.
  • 4. BORDER SECURITY USING WINS J.D.I.E.T, Yavatmal Page 1 LIST OF FIGURES PAGE NO. 1. Wireless Integrated Network Sensor 5 2. WINS Architecture 6 3. Wins nodes 7 4. A) Thermal Infrared Detector 9 B) A Micrograph of the Thermopile Junction Array 10 5. Nodal distance and Traffic 11 6. WINS micro power spectrum analyser architecture 13 7. Comparator plot 14
  • 5. BORDER SECURITY USING WINS J.D.I.E.T, Yavatmal Page 2 TABLE OF CONTENTS CHAPTER TITLE PAGE NO. CERTIFICATE ABSTRACT LIST OF FIGURES 1. INTRODUCTION 4 2. WINS SYSTEM ARCHITECTURE 6 3. WINS NODE ARCHITECTURE 7 4. WINS MICRO SENSOR 9 5. ROUTING BETWEEN NODES 11 6. WINS DIGITAL SIGNAL PROCESSING 12 7. PSD COMPARSON 14 8. APPLICATION 16 9. PROS AND CONS 17 10. CONCLUSION 17 11. REFERENCES 18
  • 6. BORDER SECURITY USING WINS J.D.I.E.T, Yavatmal Page 3 ABSTRACT Wireless Integrated Network Sensors (WINS) now provide a new monitoring and control capability for monitoring the borders of the country. Using this concept we can easily identify a stranger or some terrorists entering the border. The border area is divided into number of nodes. Each node is in contact with each other and with the main node. The noise produced by the foot-steps of the stranger are collected using the sensor. This sensed signal is then converted into power spectral density and the compared with reference value of our convenience. Accordingly the compared value is processed using a microprocessor, which sends appropriate signals to the main node. Thus the stranger is identified at the main node. A series of interface, signal processing, and communication systems have been implemented in micro power CMOS circuits. A micro power spectrum analyzer has been developed to enable low power operation of the entire WINS system. Thus WINS require a Microwatt of power. But it is very cheaper when compared to other security systems such as RADAR under use. It is even used for short distance communication less than 1 Km. It produces a less amount of delay. Hence it is reasonably faster. On a global scale, WINS will permit monitoring of land, water, and air resources for environmental monitoring. On a national scale, transportation systems, and borders will be monitored for efficiency, safety and security.
  • 7. BORDER SECURITY USING WINS J.D.I.E.T, Yavatmal Page 4 BORDER SECURITY USING WIRELESS INTEGRATED NETWORK SENSORS (WINS) CHAPTER 1 INTRODUCTION Wireless Integrated Network Sensors (WINS) combine sensing, signal processing, decision capability, and wireless networking capability in a compact, low power system. Compact geometry and low cost allows WINS to be embedded and distributed at a small fraction of the cost of conventional wireline sensor and actuator systems. On a local, wide-area scale, battlefield situational awareness will provide personnel health monitoring and enhance security and efficiency. Also, on a metropolitan scale, new traffic, security, emergency, and disaster recovery services will be enabled by WINS. On a local, enterprise scale, WINS will create a manufacturing information service for cost and quality control. The opportunities for WINS depend on the development of scalable, low cost, sensor network architecture. This requires that sensor information be conveyed to the user at low bit rate with low power transceivers. Continuous sensor signal processing must be provided to enable constant monitoring of events in an environment. Distributed signal processing and decision making enable events to be identified at the remote sensor. Thus, information in the form of decisions is conveyed in short message packets. Future applications of distributed embedded processors and sensors will require massive numbers of devices. In this paper we have concentrated in the most important application, Border Security.
  • 8. BORDER SECURITY USING WINS J.D.I.E.T, Yavatmal Page 5 Fig.1A wireless integrating network sensor Fig.1B wireless integrating network sensor
  • 9. BORDER SECURITY USING WINS J.D.I.E.T, Yavatmal Page 6 CHAPTER 2 WINS SYSTEM ARCHITECTURE Conventional wireless networks are supported by complex protocols that are developed for voice and data transmission for handhelds and mobile terminals. These networks are also developed to support communication over long range (up to 1km or more) with link bit rate over 100kbps. In contrast to conventional wireless networks, the WINS network must support large numbers of sensors in a local area with short range and low average bit rate communication (less than 1kbps). The network design must consider the requirement to service dense sensor distributions with an emphasis on recovering environment information. Multihop communication yields large power and scalability advantages for WINS networks. Multihop communication, therefore, provides an immediate advance in capability for the WINS narrow Bandwidth devices. However, WINS Multihop Communication networks permit large power reduction and the implementation of dense node distribution. The multihop communication has been shown in the figure 2. The figure 1 represents the general structure of the wireless integrated network sensors (WINS) arrangement. Continuous operation low duty cycle Figure 2. The wireless integrated network sensor (WINS) architecture.
  • 10. BORDER SECURITY USING WINS J.D.I.E.T, Yavatmal Page 7 CHAPTER 3 WINS NODE ARCHITECTURE The WINS node architecture (Figure 1) is developed to enable continuous sensing, event detection, and event identification at low power. Since the event detection process must occur continuously, the sensor, data converter, data buffer, and spectrum analyzer must all operate at micro power levels. In the event that an event is detected, the spectrum analyzer output may trigger the microcontroller. The microcontroller may then issue commands for additional signal processing operations for identification of the event signal. Protocols for node operation then determine whether a remote user or neighbouring WINS node should be alerted. The WINS node then supplies an attribute of the identified event, for example, the address of the event in an event look-up-table stored in all network nodes. Total average system supply currents must be less than 30 A. Low power, reliable, and efficient network operation is obtained with intelligent sensor nodes that include sensor signal processing, control, and a wireless network interface. Distributed network sensor devices must continuously monitor multiple sensor systems, process sensor signals, and adapt to changing environments and user requirements, while completing decisions on measured signals. Figure 3. WINS nodes (shown as disks)
  • 11. BORDER SECURITY USING WINS J.D.I.E.T, Yavatmal Page 8 For the particular applications of military security, the WINS sensor systems must operate at low power, sampling at low frequency and with environmental background limited sensitivity. The micro power interface circuits must sample at dc or low frequency where “1/f” noise in these CMOS interfaces is large. The micropower signal processing system must be implemented at low power and with limited word length. In particular, WINS applications are generally tolerant to latency. The WINS node event recognition may be delayed by 10 – 100 m sec, or longer. This permits low clock rate signal processing and architecture design that minimizes computation and communication power at the expense of latency. For example, in the latency-tolerant WINS system, time division multiple access protocols may be implemented to reduce communication power. Also, it is important to note that sensor signals are generally narrowband signals (bandwidth less than 10 kHz) that require only low sample and processing rates. Many of the primary WINS applications require sensor nodes powered by compact battery cells. Total average system supply currents must be less than 30 A to provide long operating life from typical compact Li coin cells (2.5 cm diameter and 1 cm thickness).
  • 12. BORDER SECURITY USING WINS J.D.I.E.T, Yavatmal Page 9 CHAPTER 4 WINS MICRO SENSORS Source signals (seismic, infrared, acoustic and others) all decay in amplitude rapidly with radial distance from the source. To maximize detection range, sensor sensitivity must be optimized. In addition, due to the fundamental limits of background noise, a maximum detection range exists for any sensor. Thus, it is critical to obtain the greatest sensitivity and to develop compact sensors that may be widely distributed. Clearly, microelectromechanical systems (MEMS) technology provides an ideal path for implementation of these highly distributed systems. The sensor-substrate “Sensorstrate” is then a platform for support of interface, signal processing, and communication circuits. Examples of WINS Micro Seismometer and infrared detector devices are shown in Figure 3. The detector shown is the thermal detector. It just captures the harmonic signals produced by the foot-steps of the stranger entering the border. These signals are then converted into their PSD values and are then compared with the reference values set by the user. Figure 4 A. Thermal Infrared Detector
  • 13. BORDER SECURITY USING WINS J.D.I.E.T, Yavatmal Page 10 Fig.4 B Micrograph of the Thermopile Junction Array The WINS microsensor systems must be monitored continuously by the CMOS micropower analog-to-digital converter (ADC). As was noted above, power requirements constrain the ADC design to power levels of 30 W or less. Sensor sample rate for typical microsensor applications is less than 1kHz (for example the infrared microsensor bandwidth is 50Hz, thus limiting required sample rate to 100 Hz). Also, it is important to note that the signal frequency is low. Specifically, the themopile infrared sensor may be employed to detect temperature, presence, of motion at near dc signal frequencies. Therefore, the ADC must show high stability (low input-referred noise at low frequency). For the WINS ADC application, a first order Sigma-Delta (S-D) converter is chosen over other architectures due to power constraints. The S-D architecture is also compatible with the limitations of low cost digital CMOS technologies.
  • 14. BORDER SECURITY USING WINS J.D.I.E.T, Yavatmal Page 11 CHAPTER 5 ROUTING BETWEEN NODES The sensed signals are then routed to the major node. This routing is done based on the shortest distance. That is the distance between the nodes is not considered, but the traffic between the nodes is considered. This has been depicted in the figure 4. In the figure, the distances between the nodes and the traffic between the nodes has been clearly shown. For example, if we want to route the signal from the node 2 to node 4, the shortest distance route will be from node 2 via node 3 to node 4. But the traffic through this path is higher than the path node 2 to node 4. Where as this path is longer in distance. Figure 5 . Nodal distance and Traffic
  • 15. BORDER SECURITY USING WINS J.D.I.E.T, Yavatmal Page 12 CHAPTER 6 WINS DIGITAL SIGNAL PROCESSING If a stranger enters the border, his foot-steps will generate harmonic signals. It can be detected as a characteristic feature in a signal power spectrum. Thus, a spectrum analyzer must be implemented in the WINS digital signal processing system. The spectrum analyzer resolves the WINS input data into a low-resolution power spectrum. Power spectral density (PSD) in each frequency “bins” is computed with adjustable band location and width. Bandwidth and position for each power spectrum bin is matched to the specific detection problem. The WINS spectrum analyzer must operate at W power level. So the complete WINS system, containing controller and wireless network interface components, achieves low power operation by maintaining only the micropower components in continuous operation. The WINS spectrum analyzer system, shown in Figure 7, contains a set of parallel filters. The complete WINS system, containing controller and wireless network interface components, achieves low power operation by maintaining only the micropower components in continuous operation. The WINS spectrum analyzer system contains a set of 8 parallel filters. Mean square power for each frequency bin, is computed at the output of each filter. Each filter is assigned a coefficient set for PSD computation. Finally, PSD values are compared with background reference values (that may be either downloaded or learned). In the event that the measured PSD spectrum values exceed that of the background reference values, the operation of a microcontroller is triggered. Thus, only if an event appears does the microcontroller operate. Of course, the microcontroller may support additional, more complex algorithms that provide capability (at higher power) for event identification. The WINS spectrum analyzer architecture includes a data buffer. Buffered data is stored during continuous computation of the PSD spectrum. If an event is detected, the input data time series, including that acquired prior to the event, are available to the microcontroller. Low power operation of the spectrum analyzer is achieved through selection of an architecture that provides the required performance and function while requiring only limited word length. First, since high resolution measurements of PSD are required (5 Hz bandwidth passbands at frequencies of 5 – 50
  • 16. BORDER SECURITY USING WINS J.D.I.E.T, Yavatmal Page 13 Hz with a 200 Hz input word rate) FIR filters would require an excessive number of taps and corresponding power dissipation. In contrast, IIR filter architectures have provided adequate resolution with limited word length. An example of the performance of a typical filter is shown in Figure 8. Here, a series of input signals at frequencies of 10 – 70 Hz were applied to the 8-bit data IIR filter with coefficients selected for a passband of 10 Hz width centred at 45 Hz. This device dissipates 3Mw at 3V bias and at a 200Hz word rate. Figure 6. WINS micropower spectrum analyzer architecture.
  • 17. BORDER SECURITY USING WINS J.D.I.E.T, Yavatmal Page 14 CHAPTER 7 PSD COMPARISION Each filter is assigned a coefficient set for PSD computation. Finally, PSD values are compared with background reference values In the event that the measured PSD spectrum values exceed that of the background reference values, the operation of a microcontroller is triggered. Thus, only if an event appears, the micro controller operates. Buffered data is stored during continuous computation of the PSD spectrum. If an event is detected, the input data time series, including that acquired prior to the event, are available to the micro controller. The micro controller sends a HIGH signal, if the difference is high. It sends a LOW signal, if the difference is low. For a reference value of 25db, the comparison of the DFT signals is shown in the figure 8. Figure 7. Comparator plot
  • 18. BORDER SECURITY USING WINS J.D.I.E.T, Yavatmal Page 15 CHAPTER 8 APPLICATION 1. SUPPORT PLUG-IN LINUX DEVICES: other development will include very small but limited sensing device that interact with WINS NG node in heterogeneous network. 2. SMALL LIMITED SENAING DEVICE: interact with WINS NG node in heterogeneous network 3. SCAVENGE ENERGY FROM THE ENVIORNMENT: small device might scavenge there energy from the environment by means of photocells and piezoelectric materials, capturing energy from vibration and achieving perpetual lifespan
  • 19. BORDER SECURITY USING WINS J.D.I.E.T, Yavatmal Page 16 CHAPTER 9 PROS AND CONS PROS: 1. It avoid hell lot of wiring 2. It can accommodate new devices at any time 3. Its flexible to go through physical partitions 4. It can be accessed through a centralized monitor 5. It is very cheaper, faster can be accessed in shorter distances having less amount of delay, and also power consumption is in the order of microwatt. CONS: 1. Its damn easy for hackers to hack it as we can’t control propagation of waves 2. Comparatively low speed of communication 3. Gets distracted by various elements like Blue-tooth 4. Still Costly at large.
  • 20. BORDER SECURITY USING WINS J.D.I.E.T, Yavatmal Page 17 CHAPTER 10 CONCLUSION A series of interface, signal processing, and communication systems have been implemented in micropower CMOS circuits. A micropower spectrum analyzer has been developed to enable low power operation of the entire WINS system. Thus WINS require a Microwatt of power. But it is very cheaper when compared to other security systems such as RADAR under use. It is even used for short distance communication less than 1 Km. It produces a less amount of delay. Hence it is reasonably faster. On a global scale, WINS will permit monitoring of land, water, and air resources for environmental monitoring. On a national scale, transportation systems, and borders will be monitored for efficiency, safety and security.
  • 21. BORDER SECURITY USING WINS J.D.I.E.T, Yavatmal Page 18 CHAPTER 11 REFERENCE [1] M. J. Dong, G. Yung, and W. J. Kaiser, “Low Power Signal Processing Architectures for Network Microsensors”, 1997 International Symposium on Low Power Electronics and Design, Digest of Technical Papers (1997). [2] A. A. Abidi, “Low-power radio-frequency ICs for portable communications”, Proceedings of the IEEE, 83, (1995). [3] Agre, J., Clare, L., Pottie, G., and Romanov, N. Development platform for self- organizing wireless sensor networks. In Proceedings of Aerosense’99 (Orlando Fla., Apr. Apr. 8–9). International Society of Optical Engineering, Bellingham, Wa., 1999, 257– 268. [4] Asada, G., Dong, M., Lin, T., Newberg, F., Pottie, G., Marcy, H., and Kaiser, W. Wireless integrated network sensors: Low-power systems on a chip. In Proceedings of the 24th IEEE European Solid-State Circuits Conference (Den Hague, The Netherlands, Sept. 21–25). Elsevier, 1998, 9–12. [5] Bult, K., Burstein, A., Chang, D., Dong, M., Fielding, M., Kruglick, E., Ho, J., Lin, F., Lin, T.-H., Kaiser, W., Marcy, H., Mukai, R., Nelson, P., Newberg, F., Pister, K., Pottie, G., Sanchez, H., Stafsudd, O., Tan, K., Ward, C., Xue, S., and Yao, J. Low-power systems for wireless microsensors. In Proceedings of the International Symposium on Low- Power Electronics and Design (Monterey, Calif., Aug. 12–14). IEEE, New York, 1996, 17–21. [6] Dong, M., Yung, G., and Kaiser, W. Low-power signal processing architectures for network microsensors. In Proceedings of the 1997 International Symposium on Low- Power Electronics and Design (Monterey, Calif., Aug. 18–20). IEEE, New York, 1997, 173–177. .