SlideShare a Scribd company logo
1 of 14
Download to read offline
International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August -2013) 57
www.arpublication.org
The Escalating Nigeria National Security
Challenge: Smart Objects and Internet-Of-Things
to the rescue
Obodoeze F.C.1
, Ozioko F.E.2
, Okoye F.A.3
Mba C.N4
, Ozue T.I.5
, Ofoegbu E.O.6
1
Department of Computer Science, Renaissance University Enugu, Nigeria
1
fidelisobodoeze@gmail.com
2,3
Department of Computer and Information Science, Enugu State University of Science and Technology
(ESUT), Enugu, Nigeria
2
ekene.ozioko@esut.edu.ng, 3
francisced@esut.edu.ng
4
Department of Computer Engineering, Caritas University Enugu, Nigeria
4
mbacally@yahoo.com
5
Nyzpat Technologies, Port Harcourt, Nigeria
5
thankjehovah@gmail.com
6
Department of Physics Electronics, Oduduwa University, Ile-Ife, Nigeria
6
edoxnt@yahoo.com
Abstract
Since October 1st
2011, when Nigeria Federal Govenrment marked Nigerian’s 51st
National Indepedence celebration at Eagles Square Abuja that witnessed the first bomb
blast in the country, there have been a catalogue of avalanche of security challenges
throughout the country ranging from bomb blasts, suicide bombings, terrorist attacks,
kidnapping for ransoms, ritual killings, political assassinations and political brigande,
crude oil bunkering and pipeline vandalism, armed robbery but to mention a few. The
Federal and State governments have made much effort through the engagement of the
law enforcement agencies and security forces such as Police, Joint Military Task Force
(JTF), State Security Service (SSS), Nigeria Security and Civil Defnce Corps (NSCDC)
but their combined effort have not yielded much positive result towards arresting these
security menace.This paper attempts to proffer a security solution framework using newly
emerging security technological solutions known as “smart objects” and “internet-of-
things”, combining the cooperative efforts of security technologies such as Wireless
Sensor and Actuator Networks(WSANs), Global Positioning System (GPS), IP
surveillance using specialized cameras and Close Circuit Television Cameras (CCTV)
and fusing their cooperative outputs into the Internet using novelty telecommunication
networks such as Wi-Fi, 3G, ZigBee, Internet Protocol (IP) to aid security agents to
track, trace, apprehend and prosecute the culprits who perpetuate these security
challenges.
Keywords: Smart objects, Internet-of-Things (IoT), Global Positioning System (GPS),
RFID, Wireless Sensor Network(WSN), aerial surveillance, IP cameras
1. INTRODUCTION
Since October 1, 2011 when Nigeria Federal Government marked the nation’s 51st
Independence anniversary at Eagles Square Abuja, the nation has not known peace. The first
58
www.arpublication.org
Nigerian bomb blast, which claimed no less than 31 lives at the vicinity of Eagles Square Abuja
during the 51st
Independnce annivsersary celebration, was the first bomb blas Nigeria had ever
witnessed and even with high casualty figure. This first bomb blast at Eagles Square acted as a
catalyst for more bomb blasts and suicide bombings at public buildings, churches, mosques,
schools, military formations, police posts, banks, UN building in Abuja, Police Headquarters
Abuja, etc. by the dreaded Islamic fundamentalists known as ‘Boko Haram” which means
“Western education is sin” who is fighting for enthronement of Islamic system of government in
Nigeria. The number of casualties and destructions as a result of these bombings and shootings by
Boko Haram, predominantly in Northern parts of Nigeria, has reached a disturbing rate, statistics
has it that more than 3,300 persons have been killed as a result of this insurgence. This security
challenge posed by this islamic insurgence in Northern parts of Nigeria is not the only one in
Nigeria; downwards in the Southern parts of the country such as South East, South South, and
recently South West, other security challenges such as kidnapping for ransom, ritual killings, cult
wars, armed robbery especially bank robberies, car snatchings and hijackings and the most
worrisome of all of them, crude oil bunkering and oil pipeline vandalism, predominantly in the
Niger Delta region of the country, which bears all the crude oil installations and exports of the
country. In the South East and South South, kidnapping for ransom has reached an alarming
proportion; there is not a single day in these regions that persons are not kidnapped and the
kidnappers usually target persons of wealthy background or their relatives in order to cough out
huge sums of money from them as ransoms. The ransoms usually range from at least $100,000 in
most cases to up to $1million, and even more in some cases depending on the economic status of
the victim or his/her rich relatives. The victims are not usually released by the kidnappers until all
or huge part of the ransom money have been paid by their relatives or they are luckily rescued by
combined effort of security agencies such as Police, State Security Services (SSS) but in the
majority of the reported and unreported cases, people are paying up the ransom money in order to
secure the release of their kit and kin without any hurt (as some victims have been reported shot
dead as a result of botched attempted rescue efforts by the security operatives).
In the Niger Delta region which bears Nigerian most crude oil earnings from exports
accounting for over 86% of Nigerian annual income, the major security challenge which is
threatening the economic base of the country is the activities of crude oil thieves and vandals who
vandalise major crude oil pipelines transporting crude oil and other petroleum products from
Niger Delta oil wells, flow stations to the refineries or depots in other parts of the country. These
economic criminals have set up numerous illegal refineries scattered all over Niger Delta region
with the sole purpose of refining their illegally bunkered crude oil into useful petroleum products
such as kerosene (DPK), Gas Oil (Diesel) and Petroleum Motor Spirit (PMS) for sale. These
criminals collaborate with security personnel, compromise them to turn their eyes the other way
to allow them steal crude oil from vandalized pipelines unabated. According to a report by Shell
Petroleum, one of the major International Oil Companies (IOCs) operating in Niger Delta region
of Nigeria, Nigeria loses about 2 billion US dollars annually as a result of activities of crude oil
thieves and pipeline vandals who profit illegally from crude oil theft in the Niger Delta region [1].
The Nigerian Federal Government, under the leadership of Dr. Goodluck Jonathan, has tried
unsuccessfully to stop the major security and economic menace in the Niger Delta region; the
Federal government has made extensive investments as well as the IOCs, to bring the security and
economic menace under control but the methodology of tackling these insecurity menaces by the
government has always been the same: vote more money to purchase operational vehicles and
equipment for the Police, Joint Military Taskforce (JTF), the Navy, State Security Servives
(SSS), Nigerian Security and Civil Defence Corps (NSCDC), recruit more security operatives,
International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August -2013) 59
www.arpublication.org
issue orders for arbitrary arrests or give shoot-at-sight orders, urges all security agencies to
collaborate on intelligence gathering and sharing, counter-intelligence but all these efforts have
not yielded the much desired results due to obvious reasons: lack of application or inappropriate
application of Information Technology (IT) and the problem of corruption prevalent amongst the
security forces and government civil servants. Law enforcements as well as security maintenance
is not only about carrying arms about and patrolling the neighbourhood but in this 21st
century,
intelligence gathering and intelligence sharing using innovative IT security solutions can be
applied to produce desired effective results. Until Nigerias law enforcement agents and security
forces are trained on how to use these available IT security tools to gather intelligence data from
the community/neighborhood, share these data amongst the security organs, and use these data to
trace, track, apprehend and prosecute the criminals in the court of law successfully and logically,
the fight against the upsurge of violent crimes and security menace such as kidnapping, armed
robbery, ritual killings, cult wars, car jacking, terrorism and political assissinations cannot be
won.
Globally, Information Technology (IT) has been adopted in the developed world as a
veritable tool in combating the menace of insecurity. One of the approaches of addressing the
problem of insecurity is the use of Information Technology (IT) such as Cyberspace or
Cybersecurity and Telecommunication networks [2]. Cybersecurity is the body of technologies,
processes, practices and methodologies designed to protect networks, programs and data from
attack, damage or unauthorized access [3]. Cybersecurity can be combined effectively with other
IT tools such as security surveillance which includes aerial surveillance using different types of
smart cooperating objects such as wireless and actuator networks (WSANs), security cameras
such as IP cameras, Close Circuit Television Cameras (CCTV), Radio Frequency Identification
(RFID) and other smart cooperating objects to fuse intelligent data from different installed
strategic locations or flashpoints in towns, villages, hotels, public utilities, market, shopping
mails, airports, bus stations, religion and worship centres, military formations, police posts,
foreign missions and embassies, crude oil pipelines and oil facilities to a centralized database
which can be accessed and used by law enforcement agencies and security forces 24/7 to be able
to nip security threat in the bud before it occurs like bomb blasts, kidnapping or armed robbery or
proactively assisting in tracking down criminals or perpetrators and their sponsors anywhere they
hide in the country and bring them to face the full weight of the law.
1.1 The Objectives of this Paper
This paper is a holistic survey and examinationa of current Nigeria state of Security and how
different elements of smart cooperating objects such as wireless sensor and actuator networks
(WSANs), Surveillance IP cameras, Radio Frequency Identification (RFID), Global Positioning
System (GPS) which can be used to provide 24-hour complete surveillance and monitoring
capabilities for the major locations or flashpoints in the country where these indentified security
challenges subsist and how the real-time data obtained from them can fused together to a
centralized database for use by security and law enforcement operatives in order to reduce or
arrest incidences of these security challenges in Nigeria.
At the end of the paper, we will present a holistic implementation framework on how these
smart cooperating objects can be fused together to gather intelligence security data that can help
law enforcement and security operatives arrest these identified national security challenges. In the
future we will design an implementation model and perform simulation experiments to validate
our proposed national security framework for Nigeria.
60
www.arpublication.org
1.2 Related Work
There is dearth of research work on implementation framework to tackle Nigeria’s current
national security challenge. Various security challenges facing Nigeria such as terrorism, armed
robbery, kidnapping, cult wars, religious fundamentalism etc. were highlighted by authors in [2].
Here, they proposed a national security implementation framework to solve these myriads of
security challenge using Global Positioning System (GPS) only but from our survey of various
security challenges facing Nigeria, GPS alone cannot tackle these security challenges but require
the fusion of the latest available cutting-edge surveillance technologies using smart cooperating
objects and Internet-Of-Things (IoT).
2. SMART COOPERATING OBJECTS AND INTERNET-OF-THINGS (IoT)
A smart object is a small computing device that will also have a sensor or actuator as well as
a means of communication – mostly, but not always, wireless communication [4]. Smarts objects
are embedded in other larger objects and systems including industrial machinery, car engines and
lighting and heating systems. Smart objects are the technical drivers behind the smart ecosystems
that are emerging in many diverse environments and applications and are the enablers of
innovations in monitoring and automation for homes and industrial plants as well as the smart
grid and energy efficiency systems. The potential application domains for smart objects is vast –
from ad-hoc emergency response systems to smart transport infrastructure for urban areas.
The key property of a smart object is its capacity for bidirectional communication. Diverse
measurements can be taken of environmental characteristics such as humidity, temperature, wind
speed, pressure, vibration and energy consumption. In addition to measurements, the sensors in
smart objects can also perform detection of elements in an environment such as pollutants or the
presence of a chemical or an intruder.
Smart objects are generally low-powered battery operated devices and will have a CPU and
memory. Their form factor is small and the goal is that their price should be low – this was not
always the case with wireless sensors but prices have lowered in recent years.
The Internet-of-Things (IoT) refers to uniquely identifiable objects (things) and their virtual
representations in an Internet-like structure. The term Internet-of-Things was first used by Kevin
Ashton in 1999 [5, 6]. The concept of the Internet of Things first became popular through the
Auto-ID Center and related market analysts publications [5]. Radio-frequency identification
(RFID) is often seen as a prerequisite for the Internet of Things. If all objects and people in daily
life were equipped with radio tags, they could be identified and inventoried by computers. Other
smart objects such as wireless sensors, actuators, surveillance cameras, GPS trackers can be
combined with RFID to enable a complete Internet-of-Things which is desperately needed to
tackle myriads of security challenges bedeviling Nigeria. Fig. 1 shows the roadmap of the
Internet of Things (IoT).
2.1 RFID
RFID- Radio Frequency IDentification is a a technology that uses tiny computer chips smaller
than a grain of sand to track items at a distance. RFID "spy chips" have been hidden in the
packaging of Gillette razor products and in other products you might buy at a local Wal-Mart,
Target, or Tesco - and they are already being used to spy on people in the United States of
America (USA) [8]. RFID eqully means of storing and retrieving data through electromagnetic
International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August -2013) 61
www.arpublication.org
transmission to an RF (Radio Frequency) compatible integrated circuit. It is typically used to
label and track items in supermarkets and warehouses. There are two parts to the RFID system -
1. The tag, the simplest version is a tiny microchip that contains a code identifying the thing to
which it is attached / glued to. The microchip is often connected to a flat spiral aerial that allows
it to work by radio signals and 2. The Reader which is a machine that sends a radio signal to the
tag asking for its code. The tag senses the request and sends back its unique code. The reader can
then connect to a computer or database and uses the code to identify what the object is (or the
identity of the person the tag is attached to). The system works over a foot or so, which is fine
when the tags are guaranteed to be close to the reader. The handy thing about the tag is that it
needs no power at all - no battery needed. This is because the reader sends it enough radio power
Fig. 1 The roadmap of the Internet of Things (IoT)[7]
to turn on whilst it is being interrogated [9]. Fig. 2 shows the typical magnified image of actual
tag found in Gillette Mach3 razor blades; the chip appears as the tiny black square component.
The coil of wires surrounding the chip is the antenna, which transmits your information to a
reader device, which can be located anywhere. In USA, Wal-Mart and Tesco, among many
others, use RFID systems for management of their supply chains [10]. RFID tags can be
categories as active, passive and semi-passive (or indeed, semi-active) tags. An active tag has a
battery-powered radio transceiver whereas a passive tag operates without any battery. The latter
achieves this by reflecting the RF signal transmitted to it from a reader or transceiver and adds its
own data to the signal. Similarly, semi-passive tags use the radio waves of other senders as the
energy source for transmitting their data. Unlike passive tags, however, semi-passive tags may
have batteries to maintain memory or power other functions. It is not surprising to note that active
tags are the most powerful RFID tags available given their larger range, memory and
functionality but are also more expensive.
Software agents and
advanced sensor
fusion
2000 2010 2020 Time
RFID tags for
facilitating routing,
inventorying, and
loss prevention
Surveilance, security,
healthcare, transport,
food security, document
management
Locating people and
everyday objects
Teleoperation and
telepresence: Ability
to monitor and
control
Supply-Chain Helpers
Vertical-Market Applications
Ubiquitous Positioning
Physical-World Web
Demand for expedited
logistics
Cost reducation leading
to diffusion into 2
nd
wave of applications
Ability of devices located
indoors to receive
geolocation signals
Miniaturization, power-
efficient electronics, and
available spectrum
Technology Reach
62
www.arpublication.org
Fig.2 A magnified image of actual tag found in Gillette Mach3 razor blades [8]
Sensing capabilities can be added to RFID tags using the same RFID protocols for reading
the tag’s ID. Tags will either have integrated sensors or will allow for adding additional sensors.
A number of vendors are offering RFID tags with sensing capability. RFID and wireless sensors
are natural complements for supply chain applications as the latter can be used for monitoring
temperature in the chill chain and other situations where the recording of environmental
conditions is imperative for the preservation of the goods being transported.
RFID readers can also be combined with an RF transceiver. Such a wireless device can sense
environmental conditions and read IDs from tagged objects as well as transmitting this
information to a data capture portal such as Vertoda. The integration of RFID into an ad-hoc
WSN opens up many new applications. For example, a healthcare system that leverages RFID
and wireless sensor technologies can monitor not only the patient’s vital signs but also their
medicine and pill bottles to track when a bottle is removed or replaced by a patient. Automated
asset tracking and inventory management would also be facilitated by combining these two
technologies [10]. Vehicle tracking to reduce incidences of car jacking in Nigeria can benefit
from the combination of these technologies. Global System for Mobile Telecommunication
(GSM) or satellite communications can be used with GPS or RFID to track kidnapped victims
and their captors or kidnappers wherever they are so that the victims can be rescued while the
kidnappers are arrested to face the full weight of the law. RFID technology also can be used for
the provision of homeland security; homeland security is needed badly in Nigeria where the
scourge of terrorism, bombings, kidnapping, armed robbery, rape is the order of the day.
Homeland security also can cover border protection and management. In the Northern parts of
Nigeria, porous borders is the reason why Islamic insurgents find it easy to enter Nigeria through
the numerous porous borders with Chad, Niger Republic, Cameroun. These porous boarders
cannot be manned successfully by Customs or security agents, RFID technology can be used in
manning these porous boarders just as it is done in the United States of America (USA) [11].
2.2 GPS
When people talk about "a GPS," they usually mean a GPS receiver. The Global Positioning
System (GPS) is actually a constellation of 27 Earth-orbiting satellites (24 in operation and three
extras in case one fails). The U.S. military developed and implemented this satellite network as a
military navigation system, but soon opened it up to everybody else.
Each of these 3,000 to 4,000-pound solar-powered satellites circles the globe at about 12,000
miles (19,300 km), making two complete rotations every day. The orbits are arranged so that at
any time, anywhere on Earth, there are at least four satellites "visible" in the sky. A GPS
receiver's job is to locate four or more of these satellites, figure out the distance to each, and use
this information to deduce its own location. This operation is based on a simple mathematical
International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August -2013) 63
www.arpublication.org
principle called trilateration[12]. Fig.3 shows a typical GPS with multiple satellites (four
satellites) with signals used to calculate the position of an object on earth’s surface. Fig.4 shows a
flowchart depicting how a typical GPS tracking system works.
Fig. 3 GPS system with multiple satellites used to locate the position of an object on earth the
surface[12]
Fig. 4 The typical workings of a GPS tracking System
START
GPS Tracker connects to the
nearest satellite network
The satellite sends the GPS
location info to the GPS
Is GPRS
Available?
- Byteworks GPS tracker,
- Store the GPS location,
timestamp and vehicle info like
speed, battery level, etc in SD
CARD and send it later to
byteworks GPS Server when
GPRS is now available
- Byteworks GPS tracker,
- Send GPS location
information,
- timestamp and vehicle
info like speed, battery
level, etc in SD CARD
and send it later to
byteworks GPS Server
for database storage
NO YES
- Web interface
- Extract the data from byteworks
GPS database and plot on the
map
STOP
64
www.arpublication.org
2.3 Surveillance IP cameras
Surveillance Internet Protocol (IP) cameras, also called network cameras, can combine
camera and computing capabilities into a single unit. These cameras are security cameras that can
capture video footages and still images (photos) of a security event such as (breach or threat) real-
time and transmit the captured file using wireless or wired communication links onto a PC Server
installed with video management software and/or graphic viewer. A Wireless IP camera is an IP
camera that utilizes wireless radio communication networks such as Bluetooth, Infrared, Wi-Fi,
Zigbee, 3G, or any of the WLAN to transmit or transport captured video/image to a PC server
with video management software or to a centralized database and then to a webserver so that the
captured images or videos can be viewed from web-based interface using standard browers.
Surveillance cameras are especially good for monitoring equipment, asset, utilities, the
environment (such as streets or public places) to pick video footage of any security breach. This
can lead to the tracking, arrest and prosecution of criminals such as armed robbers, assonists,
burglars, terrorists, kidnappers, etc. even after crimes have been committed because of the video
or photo evidence.
2.3.1 Considerations when choosing a network/surveillance camera [13]:
Many factors should be considered before selecting a surveillance IP camera for a security
surveillance application such as public utilities, oil and gas pipelines, critical facilities or military
formations. There are different types of IP surveillance cameras based on the following features:
• fixed,
• day/night,
• wireless,
• indoor,
• outdoor and PZT, etc.
• camera multi-function capability
For an IP surveillance camera suitable for monitoring critical public utilities such as remote
oil and gas pipeline to capture real-time scene of vandalisation, the following features must be
present:
1. Day and night capability- because vandalisation can occur at any time in any oil and gas
pipelines, in fact most of the reported vandalisation of oil pipelines in Nigeria occurred at nights
[14].
2. Wireless capability – surveillance camera suitable for monitoring critical facilities such as oil
and gas pipeline monitoring must utilize wireless communication network to be able to transport
the captured video wirelessly to the central gateway and control station for viewing, otherwise the
vandals can destroy the captured file.
3. Outdoor capability – An outdoor capability or IP65 features is required by a surveillance
camera to be able to monitor critical public facilities especially facilities in remote fields such as
oil pipelines that are installed where people are not living. Such camera should be able to
withstand tough and harsh weather conditions such as rain, sunlight and strong wind.
International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August -2013) 65
www.arpublication.org
4. Miniature camera size - Security surveillance cameras come in different sizes: small to
medium to big sizes. In general, the smaller the better, because the smaller ones are not easy to
attract attention especially when they are installed in unattended hostile environments where they
can easily be seen and destroyed by vandals or criminals.
Fig. 5 depicts typical Cisco 2500 Series Video Surveillance IP Cameras used for security
surveillance application. The Cisco Video Surveillance 2500 Series IP Cameras are feature-rich,
professional digital cameras designed for superior performance in a wide variety of environments.
The cameras have an enhanced, progressive scan imager for excellent video and color, even in the
most demanding lighting conditions. They use MPEG-4 compression to produce DVD-quality
video. These fully featured high-resolution cameras include automatic day/night mode, dual
streams, bidirectional audio, motion detection, alarm inputs and outputs, and an analog BNC for
ease of installation.
Fig. 5. Cisco 2500 Series Video security Surveillance IP cameras [15]
Fig. 6. Libelium video/image IP surveillance camera board with inserted PIR presence detector
(an actuator), LDR sensors and 22 LEDS to aid night vision [16]
Fig. 6 depicts a wireless IP surveillance video camera (built by Libelium) that is capable of
capturing vandalisation image or video whether in the night or during daylight wherever it is
deployed in any section of the oil pipeline infrastructure or any public utility that is at risk of
vandalisation or sabotage. It uses ZigBee, Bluetooth and Wi-Fi protocols to send low bandwidth
66
www.arpublication.org
data and high speed W-CDMA and HSPA mobile networks to upload high bandwidth data such
as video/image. It uses 3G network module with inbuilt SD card with 2GB (extended up to
32GB) to store the photos and videos taken by the Video Camera Sensor Board without the need
of being handled by the node Micro Controller Unit (MCU). Close Circuit Television Camera
(CCTV) is another special IP surveillance camera that can be used for security surveillance of
properties, public and private utilities, roads, streets, markets, shopping malls, airports etc. to
gather real-time data of events as they occur; any security breach could likely be picked up and
the footage sent to the viewing monitor or a centralized database for viewing later on. The
footage can be used to see and track criminals like kidnappers, armed robbers, rapists, terrorists
etc. and apprehend them.
2.4 Wireless Sensor Actuator Network (WSAN)
Wireless sensor networks (WSNs) are IEEE 802.15.4 enabled devices capable of robust and
reliable multi-hop communications [17],[18]. Wireless sensors can be deployed in unattended
environments and can enable collection of data from there to distant base stations and then to
control room [19],[20]. Wireless sensors have found useful applications in varying number of
civilian and military applications because of their low-cost and ease of deployment [18],[21],[22].
Because of these inherent and other advantages, wireless sensor networks have found useful
applications in environmental monitoring applications especially in oil and gas fields. Wireless
Sensor Networks (WSN) can be combined with Wireless Actuator Networks to form Wireless
Sensor Actuator Network (WSAN) which can interact and cooperate together especially in
critical security applications. For instance wireless sensors and actuators can be combined
effectively in perimeter security applications; the wireless sensors can sense and detect the
intrusion using diverse technologies such as Infrareds and the output from the sensor can be
combined with an actuator input to trigger an alarm or alert and activates a surveillance IP camera
to record the video or photo of such security breach and send it to a PC server for viewing later in
order to apprehend the criminal. WSANs can equally be integrated with GPS and RFID for
effective security monitoring and surveillance. Fig. 7 depicts a typical wireless sensor nodes or
units installed by prominent International Oil and Gas Company (IOC), Shell Petroleum and
Development Company (SPDC) in over her 1000 oil wells scattered in Nigeria Niger Delta region
to monitor her installed oil pipelines, oil wells, flow stations and rigs to prevent and reduce
vandalism and oil theft. Some wireless sensors with the integration of GPS can be used to sense
and detect presence of bombs and the locations where they are planted by terrorists and this can
help to detect undetonated and unexploded bombs and their locations immediately by security
experts in order to save lives.
Fig.7 A model of vMBusX-SP battery-powered Smart Wireless Sensor installed by SPDC
in her over 1000 oil wells and other oil facilities in the fields of Niger Delta to fight
vandalism and theft [22]
International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August -2013) 67
www.arpublication.org
WSANs have many diverse applications. However, it is only through the integration of
WSANs with multimedia security cameras such as Close Circuit Television Camera (CCTV),
Internet Protocol (IP) cameras, Complemetary Metal Oxide Semiconductor (CMOS) video
cameras etc. with GPS and RFID that WSANs can offer a comprehensive security solution to
meet all tracking and monitoring needs for an effectively secure environment.
3. THE PROPOSED NIGERIAN NATIONAL ART COOPERATING OBJECTS
AND INTERNET-OF-THINGS (IOTS)
In this section, we present and describe the implementation framework for integrating
surveillance, tracking and monitoring smart objects of RFID, GPS, WSAN and specialized
Internet Protocol (IP) cameras which can be fused together to obtain security data or reports from
different security flashpoints or locations all over the country as shown in Fig.8.
Fig. 8 The Proposed Nigeria National Security Framework
Here in the Fig.8, there is a correlation of security data from different installed locations in
public places, streets, banks, market, shopping malls, airports, seaports, schools, public utilities,
oil and gas pipelines and other oil installations, government buildings, police posts and
checkpoints, military formations and facilities, borders etc. into a common Gateway which is then
routed to a secure Centralised Database from which the data can be accessed by logging on to a
secure Centralised Internet or Intranet portal by various law enforcement and security agencies
from their respective Servers and clients (such as mobile phones, PDAs, smartphones etc.) with
appropriate authentications and authorizations.
The Common Gateway module of the proposed National Security Framework in Fig.8 is a
fusion of many gateways for RFID tracking objects, GPS tracking objects, WSAN tracking
objects, surveillance security cameras. A software methodology is used to combine them
effectively into a common gateway so that they can come together and their output data
Common
Gateway
for
Wireless sensors,
RFID objects,
GPS satellite
objects, Security
surveillance
cameras from
different
flashpoints and
locations in the
country
Secure Central
Internet or
Intranet portal
(enabled with
Cybersecurity)
Server at Office of
the National
Security Adviser
(NSA)
Secure
Centralise
d
Database
Nigerian
Police
Server
SSS
Server
JTF
Server
NSCDC
ServerNigerian Navy
Server
Wireless and
Actuator
Sensor
Network
(WSAN) nodes
or objects
RFID tracking
objects
GPS satellite
objects
Surveillance IP
cameras (with
night vision)
Nigerian
Customs
Server
68
www.arpublication.org
channeled into a common central database and then to a common internet/intranet portal so that
law enforcement and security agencies can access the portal real-time and get updated
information about any security lapse, threat or attack anywhere in the country. Fig.9. depicts the
conglomeration of security gateways that make up the common gateway in Fig.8.
Fig. 9 The integration of different gateways from WSAN, RFID, GPS and surveillance security
cameras into a common gateway
4. CONCLUSION
Nigeria is currently facing enormous security challenges especially terrorism and violent
crimes. Smart objects and Internet-of-Things can help Nigeria to combat terrorism and other
forms of violent crimes by fusing the intelligent ouputs of smart cooperating objects and Internet-
of-Things (IoT) adopting monitoring/surveillance technologies such as RFID, GPS, WSAN and
surveillance IP cameras. In this paper we proposed a national security framework which is
designed to integrate the outputs of these various smart security technologies into a common
security gateway and database in such a way it can be accessed by the major law enforcement and
security agencies such as the Police, JTF, NSCDC, SSS, Customs, NDLEA through their
servers/clients connected via a web-based portal interface at any time from any region of the
country. This will enhance intelligence sharing and security collaboration which can help security
agencies nip violent crimes and terroris at the bud. We earnestly believe that our proposed
security framework, when implemented, can go along way in fusing the surveillance and
intelligence data gathered from these innovative security tools so that law enforcement agencies
and security forces can tackle these security challenges successfully by preemptively preventing
security breaches and challenges and proactively tackling these security challenges by helping to
trace, track, arrest and prosecute the criminals that perpetuated these security challenges.
4.1 Future Work
The researchers intend to carry out further research on the subject topic by designing an
implementation model and then carry out simulation experiments of the proposed Nigeria
national security framework using the designed model that can fuse the cooperative outputs of the
these identified smart objects and Internet-oF-Things(IoT).
RFID
Gateway
WSAN
Gateway
GPS
Gateway
Surveillance camera
Gateway
Common
Security
Gateway
International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August -2013) 69
www.arpublication.org
REFERENCES
[1] J.L. Akinode, Improving National Security using GPS tracking system technology, Mediterranean
Journal of Social Sciences, vol.2(5), October 2011, pp.76.
[2] TechTarget.com, Cybersecurity definition, Retrieved online on July 23, 2013 at
http://www.techtarget.com/definition/cybersecurity.html
[3] Marton, Using IP for Smart Objects and ‘The Internet of Things’, December 22,2009.
Retrieved online on April 2, 2013 at http://vertoda.wordpress.com/2009/12/22/using-ip- for-
smart-objects-and-the-internet-of-things/
[4] Kevin Ashton, That 'Internet of Things' Thing, In: RFID Journal, 22 July 2009. Retrieved online
on 26 July 2013.
[5] Wikipedia, Internet of Things, Retrieved on July 26, 2013 at
http://en.wikipedia.org/wiki/Internet of Things
[6] SRI Consulting Business Intelligence, Retrieved on July 23, 2013 at
http://en.wikipedia.org/wiki/Internet of Things
[7] Spychips.com, ‘What is RFID?”, Denver University Law Review, 2002. Accessed online on July
26, 2013 at http://www.spychips.com/what-is-rfid.html
[8] Teach-ICT.COM, “What is RFID?”, Retrived online on July 28, 2013 from http://www.teach-
ict.com/technology_explained/rfid/rfid.html
[9] Martcon, “ Wireless Sensor Networks & Complementary Technologies”, Vertoda Blog, December
29, 2009. Accessed online on 22 July 2013 @
http://vertoda.wordpress.com/2010/02/10/wireless-sensor-networks- wind-farms/
[10] Retrived Online at www.dhs.gov/radio-frequency-identification-rfid-what-it.html on July 28,
2013.
[11] Marshall Brain and Tom Harris, “ How GPS Receivers Work”, Retrieved online on July 28, 2013
on http://electronics.howstuffworks.com/gadgets/travel
[12] ESPOW.com, Considerations when choosing Surveillance cameras , 2013. Retrieved online
on April 10, 2013 at "http://www.espow.com/wholesale-security-surveillance- surveillance-
cameras-ip-cameras.html?osCsid=1jos40ssgf5h3o1of69dle4jn4.
[13] CISCO Systems Inc, USA, CISCO 2500 Series Video security Surveillance IP cameras, Cisco
White Paper, 2013. Retrieved online on April 11, 2013 at http://www.cisco.com/.
[14] Libelium, Video Camera Technical Guide, Document version: v4.1, April 2013, pp.34.
[15] I.F.Akyildiz, W.Su, Y.Sankarasubramaniam and E.Cayirci, A Survey on Wireless Networks,
IEEE Communications Magazine, 2002, pp.102-114.
[16] S. Petersen, P.Doyle, S.Vatland, C.S.Aasland, T.C.Andersen and D.Sjong, Requirements, Drivers
and Analysis of Wireless Sensor Network Solutions for Oil and Gas Industry, IEEE
Communications Magazine, 2007, pp.219.
[17] G.Sharma, S.Bala, A.K.Verma and T.Singh, Security in Wireless Sensor Networks using
Frequency Hopping, International Journal of Computer Applications (0975-8887), 2012, pp.1.
[18] C.Bisdikian, An Overview of the Bluetooth Wireless Technology, IEEE Communication
Magazine, 2012, vol.39.
[19] C.O.Iwendi and A.R Allen, Wireless Sensor Network Nodes: Security and Deployment in Niger-
Delta Oil and Gas Sector, International Journal of Network Security and Its Applications (IJNSA),
2011, Vol.3, No.1, pp.68.
[20] T.Fasasi, D. Maynard and H.Nasr, Sensors remotely monitor wells in Nigeria swamps, Oil and
Gas Journal, 2005, pp.2.
70
www.arpublication.org
Authors
Engr. ThankGod Izuchukwu Ozue is a Doctoral Research Student in the Department
of Electronic and Computer Engineering Nnamdi Azikiwe University Awka. He is
currently working as a Secuirty expert at Nyzpat Technologies Ltd. Port Harcourt,
Nigeria. He had his Masters Degree in Control Systems and Computer Engineering at
Nnamdi Azikiwe University in 2010 and B.Eng Electrical and Electronic Engineering at
Nnamdi Azikiwe University Awka in 2006. He has authored several conference and
research journal publications. Email: thankjehovah@gmail.com
Dr. Francis A. Okoye is a lecturer and former Head, Department of Computer Science
and Engineering Enugu State University of Science and technology (ESUT), Nigeria. He
had his Ph.D in Computer Science in 2008 at Ebonyi Stat University Abakaliki, Nigeria.
He obtained his MSc. and BEng. in Computer Science and Engineering at Enugu State
University of Science and Technology (ESUT), Nigeria in 2001 and 1996 respectively.
He has several years of experience in both teaching and research. Email:
francisced@esut.edu.ng
Engr. Fidelis C. Obodoeze is a lecturer at Renaissance University Enugu, Department
of Computer Science. He is currently pursuing his PhD programme in the Department of
Electronic and Computer Engineering Nnamdi Azikiwe University Awka, Nigeria. He
had his Masters Degree in Control Systems and Computer Engineering at Nnamdi
Azikiwe University in 2010 and B.Sc Degree in Computer Engineering at Obafemi
Awolowo University Ile-Ife in 2000. He had authored and co-authored several research
papers at reputable local and international journals. Email: fidelisobodoeze@gmail.com
Engr. Frank Ekene Ozioko is the Director of ICT office Enugu State University of
Science and Technology (ESUT) and Lecturer Department of Computer and
Information Science, ESUT, Nigeria. He had several years of experience in university
ICT administration and engineering as well as in teaching and research. Email:
ekene.ozioko@esut.edu.ng
Engr. Edward Osita Ofoegbu is currently a Doctoral Research Student in the
Department of Electronic and Computer Engineering Nnamdi Azikiwe University
Awka. He is currently lecturing at Department of Physics Electronics Oduduwa
Univesity Ile-Ife, Osun State, Nigeria. He had his Masters Degree in Control Systems
and Computer Engineering in 2012 and B.Eng Electronic and Computer Engineering in
2007 both at Nnamdi Azikiwe University Awka, Nigeria. He has worked on several
commercial ICT projects using latest cutting-edge and innovative technologies. Email:
edoxnt@yahoo.com
Calista Nnenna Mba is a Lecturer and former Acting Head, Department of Computer
Engineering, Caritas University Enugu, Nigeria. She is currently pursuing her Ph.D
programme in Computer Science at Nnamdi Azikiwe University Awka, Nigeria. She
had her MSc. Computer Science at University of Nigeria Nsukka (UNN) in 2009,
Nigeria and B.Eng in Computer Science and Engineering at Enugu State University of
Science and Technology (ESUT), Nigeria in 2004. Email: mbacally@yahoo.com

More Related Content

What's hot

2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy Mohit Kumar
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber WarfareAmit Anand
 
Finland s cyber security strategy background dossier
Finland s cyber security strategy   background dossierFinland s cyber security strategy   background dossier
Finland s cyber security strategy background dossierYury Chemerkin
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Ajay Serohi
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011hassanzadeh20
 
CyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementCyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementRicardo Reis
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 

What's hot (13)

2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy
 
114-116
114-116114-116
114-116
 
post conflict rehab
post conflict rehabpost conflict rehab
post conflict rehab
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber Warfare
 
Finland s cyber security strategy background dossier
Finland s cyber security strategy   background dossierFinland s cyber security strategy   background dossier
Finland s cyber security strategy background dossier
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Cyber war
Cyber warCyber war
Cyber war
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
CyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementCyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency Management
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 

Similar to The Escalating Nigeria National Security Challenge: Smart Objects and Internet-Of-Things to the rescue

CCIS Brochure English (Nov 2014)
CCIS Brochure English (Nov 2014)CCIS Brochure English (Nov 2014)
CCIS Brochure English (Nov 2014)Gry Helene Stavseng
 
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in IndonesiaManaging High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in IndonesiaYudhistira Nugraha
 
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...IRJET Journal
 
Securing National Events with Anti-Drone Technology
Securing National Events with Anti-Drone TechnologySecuring National Events with Anti-Drone Technology
Securing National Events with Anti-Drone TechnologyNovoQuad
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copysmita mitra
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxSharifulShishir
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Jim Geovedi
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...IJCI JOURNAL
 
Internet of things Based Real time Accident Alert and Reporting System for Ni...
Internet of things Based Real time Accident Alert and Reporting System for Ni...Internet of things Based Real time Accident Alert and Reporting System for Ni...
Internet of things Based Real time Accident Alert and Reporting System for Ni...ijtsrd
 
Prognosis of Theories of Intelligence in Counter Terrorism The Case of the No...
Prognosis of Theories of Intelligence in Counter Terrorism The Case of the No...Prognosis of Theories of Intelligence in Counter Terrorism The Case of the No...
Prognosis of Theories of Intelligence in Counter Terrorism The Case of the No...YogeshIJTSRD
 
Raduenzel - INTL621 Assignment 2
Raduenzel - INTL621 Assignment 2Raduenzel - INTL621 Assignment 2
Raduenzel - INTL621 Assignment 2Mark Raduenzel
 
Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Adriana Dvorsak
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaEvan Pathiratne
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 

Similar to The Escalating Nigeria National Security Challenge: Smart Objects and Internet-Of-Things to the rescue (20)

CCIS Brochure English (Nov 2014)
CCIS Brochure English (Nov 2014)CCIS Brochure English (Nov 2014)
CCIS Brochure English (Nov 2014)
 
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in IndonesiaManaging High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...
 
Securing National Events with Anti-Drone Technology
Securing National Events with Anti-Drone TechnologySecuring National Events with Anti-Drone Technology
Securing National Events with Anti-Drone Technology
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
ICOCI2013: Keynotes 1
ICOCI2013: Keynotes 1ICOCI2013: Keynotes 1
ICOCI2013: Keynotes 1
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copy
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptx
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 
Secure I T 2011
Secure I T 2011Secure I T 2011
Secure I T 2011
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
 
Internet of things Based Real time Accident Alert and Reporting System for Ni...
Internet of things Based Real time Accident Alert and Reporting System for Ni...Internet of things Based Real time Accident Alert and Reporting System for Ni...
Internet of things Based Real time Accident Alert and Reporting System for Ni...
 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
 
Prognosis of Theories of Intelligence in Counter Terrorism The Case of the No...
Prognosis of Theories of Intelligence in Counter Terrorism The Case of the No...Prognosis of Theories of Intelligence in Counter Terrorism The Case of the No...
Prognosis of Theories of Intelligence in Counter Terrorism The Case of the No...
 
Raduenzel - INTL621 Assignment 2
Raduenzel - INTL621 Assignment 2Raduenzel - INTL621 Assignment 2
Raduenzel - INTL621 Assignment 2
 
Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUPCYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 

More from ijcnac

Designing Financial Information System Using Structured System Analysis and D...
Designing Financial Information System Using Structured System Analysis and D...Designing Financial Information System Using Structured System Analysis and D...
Designing Financial Information System Using Structured System Analysis and D...ijcnac
 
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGESEFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGESijcnac
 
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...A Comparative Analysis of the Performance of VoIP Traffic with Different Type...
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...ijcnac
 
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...ijcnac
 
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
Performance Analysis and Simulation of  OLSR Routing Protocol in MANET Performance Analysis and Simulation of  OLSR Routing Protocol in MANET
Performance Analysis and Simulation of OLSR Routing Protocol in MANET ijcnac
 
BookyScholia: A Methodology for the Investigation of Expert Systems
BookyScholia: A Methodology for the  Investigation of Expert SystemsBookyScholia: A Methodology for the  Investigation of Expert Systems
BookyScholia: A Methodology for the Investigation of Expert Systemsijcnac
 
A Joint Encryption/Watermarking Algorithm for Secure Image Transfer
A Joint Encryption/Watermarking Algorithm for Secure Image TransferA Joint Encryption/Watermarking Algorithm for Secure Image Transfer
A Joint Encryption/Watermarking Algorithm for Secure Image Transferijcnac
 
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...ijcnac
 
Study of Polarization Mode Dispersion in the Optical Digital Connection to Hi...
Study of Polarization Mode Dispersion in the Optical Digital Connection to Hi...Study of Polarization Mode Dispersion in the Optical Digital Connection to Hi...
Study of Polarization Mode Dispersion in the Optical Digital Connection to Hi...ijcnac
 

More from ijcnac (9)

Designing Financial Information System Using Structured System Analysis and D...
Designing Financial Information System Using Structured System Analysis and D...Designing Financial Information System Using Structured System Analysis and D...
Designing Financial Information System Using Structured System Analysis and D...
 
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGESEFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
 
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...A Comparative Analysis of the Performance of VoIP Traffic with Different Type...
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...
 
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
 
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
Performance Analysis and Simulation of  OLSR Routing Protocol in MANET Performance Analysis and Simulation of  OLSR Routing Protocol in MANET
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
 
BookyScholia: A Methodology for the Investigation of Expert Systems
BookyScholia: A Methodology for the  Investigation of Expert SystemsBookyScholia: A Methodology for the  Investigation of Expert Systems
BookyScholia: A Methodology for the Investigation of Expert Systems
 
A Joint Encryption/Watermarking Algorithm for Secure Image Transfer
A Joint Encryption/Watermarking Algorithm for Secure Image TransferA Joint Encryption/Watermarking Algorithm for Secure Image Transfer
A Joint Encryption/Watermarking Algorithm for Secure Image Transfer
 
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
 
Study of Polarization Mode Dispersion in the Optical Digital Connection to Hi...
Study of Polarization Mode Dispersion in the Optical Digital Connection to Hi...Study of Polarization Mode Dispersion in the Optical Digital Connection to Hi...
Study of Polarization Mode Dispersion in the Optical Digital Connection to Hi...
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

The Escalating Nigeria National Security Challenge: Smart Objects and Internet-Of-Things to the rescue

  • 1. International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August -2013) 57 www.arpublication.org The Escalating Nigeria National Security Challenge: Smart Objects and Internet-Of-Things to the rescue Obodoeze F.C.1 , Ozioko F.E.2 , Okoye F.A.3 Mba C.N4 , Ozue T.I.5 , Ofoegbu E.O.6 1 Department of Computer Science, Renaissance University Enugu, Nigeria 1 fidelisobodoeze@gmail.com 2,3 Department of Computer and Information Science, Enugu State University of Science and Technology (ESUT), Enugu, Nigeria 2 ekene.ozioko@esut.edu.ng, 3 francisced@esut.edu.ng 4 Department of Computer Engineering, Caritas University Enugu, Nigeria 4 mbacally@yahoo.com 5 Nyzpat Technologies, Port Harcourt, Nigeria 5 thankjehovah@gmail.com 6 Department of Physics Electronics, Oduduwa University, Ile-Ife, Nigeria 6 edoxnt@yahoo.com Abstract Since October 1st 2011, when Nigeria Federal Govenrment marked Nigerian’s 51st National Indepedence celebration at Eagles Square Abuja that witnessed the first bomb blast in the country, there have been a catalogue of avalanche of security challenges throughout the country ranging from bomb blasts, suicide bombings, terrorist attacks, kidnapping for ransoms, ritual killings, political assassinations and political brigande, crude oil bunkering and pipeline vandalism, armed robbery but to mention a few. The Federal and State governments have made much effort through the engagement of the law enforcement agencies and security forces such as Police, Joint Military Task Force (JTF), State Security Service (SSS), Nigeria Security and Civil Defnce Corps (NSCDC) but their combined effort have not yielded much positive result towards arresting these security menace.This paper attempts to proffer a security solution framework using newly emerging security technological solutions known as “smart objects” and “internet-of- things”, combining the cooperative efforts of security technologies such as Wireless Sensor and Actuator Networks(WSANs), Global Positioning System (GPS), IP surveillance using specialized cameras and Close Circuit Television Cameras (CCTV) and fusing their cooperative outputs into the Internet using novelty telecommunication networks such as Wi-Fi, 3G, ZigBee, Internet Protocol (IP) to aid security agents to track, trace, apprehend and prosecute the culprits who perpetuate these security challenges. Keywords: Smart objects, Internet-of-Things (IoT), Global Positioning System (GPS), RFID, Wireless Sensor Network(WSN), aerial surveillance, IP cameras 1. INTRODUCTION Since October 1, 2011 when Nigeria Federal Government marked the nation’s 51st Independence anniversary at Eagles Square Abuja, the nation has not known peace. The first
  • 2. 58 www.arpublication.org Nigerian bomb blast, which claimed no less than 31 lives at the vicinity of Eagles Square Abuja during the 51st Independnce annivsersary celebration, was the first bomb blas Nigeria had ever witnessed and even with high casualty figure. This first bomb blast at Eagles Square acted as a catalyst for more bomb blasts and suicide bombings at public buildings, churches, mosques, schools, military formations, police posts, banks, UN building in Abuja, Police Headquarters Abuja, etc. by the dreaded Islamic fundamentalists known as ‘Boko Haram” which means “Western education is sin” who is fighting for enthronement of Islamic system of government in Nigeria. The number of casualties and destructions as a result of these bombings and shootings by Boko Haram, predominantly in Northern parts of Nigeria, has reached a disturbing rate, statistics has it that more than 3,300 persons have been killed as a result of this insurgence. This security challenge posed by this islamic insurgence in Northern parts of Nigeria is not the only one in Nigeria; downwards in the Southern parts of the country such as South East, South South, and recently South West, other security challenges such as kidnapping for ransom, ritual killings, cult wars, armed robbery especially bank robberies, car snatchings and hijackings and the most worrisome of all of them, crude oil bunkering and oil pipeline vandalism, predominantly in the Niger Delta region of the country, which bears all the crude oil installations and exports of the country. In the South East and South South, kidnapping for ransom has reached an alarming proportion; there is not a single day in these regions that persons are not kidnapped and the kidnappers usually target persons of wealthy background or their relatives in order to cough out huge sums of money from them as ransoms. The ransoms usually range from at least $100,000 in most cases to up to $1million, and even more in some cases depending on the economic status of the victim or his/her rich relatives. The victims are not usually released by the kidnappers until all or huge part of the ransom money have been paid by their relatives or they are luckily rescued by combined effort of security agencies such as Police, State Security Services (SSS) but in the majority of the reported and unreported cases, people are paying up the ransom money in order to secure the release of their kit and kin without any hurt (as some victims have been reported shot dead as a result of botched attempted rescue efforts by the security operatives). In the Niger Delta region which bears Nigerian most crude oil earnings from exports accounting for over 86% of Nigerian annual income, the major security challenge which is threatening the economic base of the country is the activities of crude oil thieves and vandals who vandalise major crude oil pipelines transporting crude oil and other petroleum products from Niger Delta oil wells, flow stations to the refineries or depots in other parts of the country. These economic criminals have set up numerous illegal refineries scattered all over Niger Delta region with the sole purpose of refining their illegally bunkered crude oil into useful petroleum products such as kerosene (DPK), Gas Oil (Diesel) and Petroleum Motor Spirit (PMS) for sale. These criminals collaborate with security personnel, compromise them to turn their eyes the other way to allow them steal crude oil from vandalized pipelines unabated. According to a report by Shell Petroleum, one of the major International Oil Companies (IOCs) operating in Niger Delta region of Nigeria, Nigeria loses about 2 billion US dollars annually as a result of activities of crude oil thieves and pipeline vandals who profit illegally from crude oil theft in the Niger Delta region [1]. The Nigerian Federal Government, under the leadership of Dr. Goodluck Jonathan, has tried unsuccessfully to stop the major security and economic menace in the Niger Delta region; the Federal government has made extensive investments as well as the IOCs, to bring the security and economic menace under control but the methodology of tackling these insecurity menaces by the government has always been the same: vote more money to purchase operational vehicles and equipment for the Police, Joint Military Taskforce (JTF), the Navy, State Security Servives (SSS), Nigerian Security and Civil Defence Corps (NSCDC), recruit more security operatives,
  • 3. International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August -2013) 59 www.arpublication.org issue orders for arbitrary arrests or give shoot-at-sight orders, urges all security agencies to collaborate on intelligence gathering and sharing, counter-intelligence but all these efforts have not yielded the much desired results due to obvious reasons: lack of application or inappropriate application of Information Technology (IT) and the problem of corruption prevalent amongst the security forces and government civil servants. Law enforcements as well as security maintenance is not only about carrying arms about and patrolling the neighbourhood but in this 21st century, intelligence gathering and intelligence sharing using innovative IT security solutions can be applied to produce desired effective results. Until Nigerias law enforcement agents and security forces are trained on how to use these available IT security tools to gather intelligence data from the community/neighborhood, share these data amongst the security organs, and use these data to trace, track, apprehend and prosecute the criminals in the court of law successfully and logically, the fight against the upsurge of violent crimes and security menace such as kidnapping, armed robbery, ritual killings, cult wars, car jacking, terrorism and political assissinations cannot be won. Globally, Information Technology (IT) has been adopted in the developed world as a veritable tool in combating the menace of insecurity. One of the approaches of addressing the problem of insecurity is the use of Information Technology (IT) such as Cyberspace or Cybersecurity and Telecommunication networks [2]. Cybersecurity is the body of technologies, processes, practices and methodologies designed to protect networks, programs and data from attack, damage or unauthorized access [3]. Cybersecurity can be combined effectively with other IT tools such as security surveillance which includes aerial surveillance using different types of smart cooperating objects such as wireless and actuator networks (WSANs), security cameras such as IP cameras, Close Circuit Television Cameras (CCTV), Radio Frequency Identification (RFID) and other smart cooperating objects to fuse intelligent data from different installed strategic locations or flashpoints in towns, villages, hotels, public utilities, market, shopping mails, airports, bus stations, religion and worship centres, military formations, police posts, foreign missions and embassies, crude oil pipelines and oil facilities to a centralized database which can be accessed and used by law enforcement agencies and security forces 24/7 to be able to nip security threat in the bud before it occurs like bomb blasts, kidnapping or armed robbery or proactively assisting in tracking down criminals or perpetrators and their sponsors anywhere they hide in the country and bring them to face the full weight of the law. 1.1 The Objectives of this Paper This paper is a holistic survey and examinationa of current Nigeria state of Security and how different elements of smart cooperating objects such as wireless sensor and actuator networks (WSANs), Surveillance IP cameras, Radio Frequency Identification (RFID), Global Positioning System (GPS) which can be used to provide 24-hour complete surveillance and monitoring capabilities for the major locations or flashpoints in the country where these indentified security challenges subsist and how the real-time data obtained from them can fused together to a centralized database for use by security and law enforcement operatives in order to reduce or arrest incidences of these security challenges in Nigeria. At the end of the paper, we will present a holistic implementation framework on how these smart cooperating objects can be fused together to gather intelligence security data that can help law enforcement and security operatives arrest these identified national security challenges. In the future we will design an implementation model and perform simulation experiments to validate our proposed national security framework for Nigeria.
  • 4. 60 www.arpublication.org 1.2 Related Work There is dearth of research work on implementation framework to tackle Nigeria’s current national security challenge. Various security challenges facing Nigeria such as terrorism, armed robbery, kidnapping, cult wars, religious fundamentalism etc. were highlighted by authors in [2]. Here, they proposed a national security implementation framework to solve these myriads of security challenge using Global Positioning System (GPS) only but from our survey of various security challenges facing Nigeria, GPS alone cannot tackle these security challenges but require the fusion of the latest available cutting-edge surveillance technologies using smart cooperating objects and Internet-Of-Things (IoT). 2. SMART COOPERATING OBJECTS AND INTERNET-OF-THINGS (IoT) A smart object is a small computing device that will also have a sensor or actuator as well as a means of communication – mostly, but not always, wireless communication [4]. Smarts objects are embedded in other larger objects and systems including industrial machinery, car engines and lighting and heating systems. Smart objects are the technical drivers behind the smart ecosystems that are emerging in many diverse environments and applications and are the enablers of innovations in monitoring and automation for homes and industrial plants as well as the smart grid and energy efficiency systems. The potential application domains for smart objects is vast – from ad-hoc emergency response systems to smart transport infrastructure for urban areas. The key property of a smart object is its capacity for bidirectional communication. Diverse measurements can be taken of environmental characteristics such as humidity, temperature, wind speed, pressure, vibration and energy consumption. In addition to measurements, the sensors in smart objects can also perform detection of elements in an environment such as pollutants or the presence of a chemical or an intruder. Smart objects are generally low-powered battery operated devices and will have a CPU and memory. Their form factor is small and the goal is that their price should be low – this was not always the case with wireless sensors but prices have lowered in recent years. The Internet-of-Things (IoT) refers to uniquely identifiable objects (things) and their virtual representations in an Internet-like structure. The term Internet-of-Things was first used by Kevin Ashton in 1999 [5, 6]. The concept of the Internet of Things first became popular through the Auto-ID Center and related market analysts publications [5]. Radio-frequency identification (RFID) is often seen as a prerequisite for the Internet of Things. If all objects and people in daily life were equipped with radio tags, they could be identified and inventoried by computers. Other smart objects such as wireless sensors, actuators, surveillance cameras, GPS trackers can be combined with RFID to enable a complete Internet-of-Things which is desperately needed to tackle myriads of security challenges bedeviling Nigeria. Fig. 1 shows the roadmap of the Internet of Things (IoT). 2.1 RFID RFID- Radio Frequency IDentification is a a technology that uses tiny computer chips smaller than a grain of sand to track items at a distance. RFID "spy chips" have been hidden in the packaging of Gillette razor products and in other products you might buy at a local Wal-Mart, Target, or Tesco - and they are already being used to spy on people in the United States of America (USA) [8]. RFID eqully means of storing and retrieving data through electromagnetic
  • 5. International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August -2013) 61 www.arpublication.org transmission to an RF (Radio Frequency) compatible integrated circuit. It is typically used to label and track items in supermarkets and warehouses. There are two parts to the RFID system - 1. The tag, the simplest version is a tiny microchip that contains a code identifying the thing to which it is attached / glued to. The microchip is often connected to a flat spiral aerial that allows it to work by radio signals and 2. The Reader which is a machine that sends a radio signal to the tag asking for its code. The tag senses the request and sends back its unique code. The reader can then connect to a computer or database and uses the code to identify what the object is (or the identity of the person the tag is attached to). The system works over a foot or so, which is fine when the tags are guaranteed to be close to the reader. The handy thing about the tag is that it needs no power at all - no battery needed. This is because the reader sends it enough radio power Fig. 1 The roadmap of the Internet of Things (IoT)[7] to turn on whilst it is being interrogated [9]. Fig. 2 shows the typical magnified image of actual tag found in Gillette Mach3 razor blades; the chip appears as the tiny black square component. The coil of wires surrounding the chip is the antenna, which transmits your information to a reader device, which can be located anywhere. In USA, Wal-Mart and Tesco, among many others, use RFID systems for management of their supply chains [10]. RFID tags can be categories as active, passive and semi-passive (or indeed, semi-active) tags. An active tag has a battery-powered radio transceiver whereas a passive tag operates without any battery. The latter achieves this by reflecting the RF signal transmitted to it from a reader or transceiver and adds its own data to the signal. Similarly, semi-passive tags use the radio waves of other senders as the energy source for transmitting their data. Unlike passive tags, however, semi-passive tags may have batteries to maintain memory or power other functions. It is not surprising to note that active tags are the most powerful RFID tags available given their larger range, memory and functionality but are also more expensive. Software agents and advanced sensor fusion 2000 2010 2020 Time RFID tags for facilitating routing, inventorying, and loss prevention Surveilance, security, healthcare, transport, food security, document management Locating people and everyday objects Teleoperation and telepresence: Ability to monitor and control Supply-Chain Helpers Vertical-Market Applications Ubiquitous Positioning Physical-World Web Demand for expedited logistics Cost reducation leading to diffusion into 2 nd wave of applications Ability of devices located indoors to receive geolocation signals Miniaturization, power- efficient electronics, and available spectrum Technology Reach
  • 6. 62 www.arpublication.org Fig.2 A magnified image of actual tag found in Gillette Mach3 razor blades [8] Sensing capabilities can be added to RFID tags using the same RFID protocols for reading the tag’s ID. Tags will either have integrated sensors or will allow for adding additional sensors. A number of vendors are offering RFID tags with sensing capability. RFID and wireless sensors are natural complements for supply chain applications as the latter can be used for monitoring temperature in the chill chain and other situations where the recording of environmental conditions is imperative for the preservation of the goods being transported. RFID readers can also be combined with an RF transceiver. Such a wireless device can sense environmental conditions and read IDs from tagged objects as well as transmitting this information to a data capture portal such as Vertoda. The integration of RFID into an ad-hoc WSN opens up many new applications. For example, a healthcare system that leverages RFID and wireless sensor technologies can monitor not only the patient’s vital signs but also their medicine and pill bottles to track when a bottle is removed or replaced by a patient. Automated asset tracking and inventory management would also be facilitated by combining these two technologies [10]. Vehicle tracking to reduce incidences of car jacking in Nigeria can benefit from the combination of these technologies. Global System for Mobile Telecommunication (GSM) or satellite communications can be used with GPS or RFID to track kidnapped victims and their captors or kidnappers wherever they are so that the victims can be rescued while the kidnappers are arrested to face the full weight of the law. RFID technology also can be used for the provision of homeland security; homeland security is needed badly in Nigeria where the scourge of terrorism, bombings, kidnapping, armed robbery, rape is the order of the day. Homeland security also can cover border protection and management. In the Northern parts of Nigeria, porous borders is the reason why Islamic insurgents find it easy to enter Nigeria through the numerous porous borders with Chad, Niger Republic, Cameroun. These porous boarders cannot be manned successfully by Customs or security agents, RFID technology can be used in manning these porous boarders just as it is done in the United States of America (USA) [11]. 2.2 GPS When people talk about "a GPS," they usually mean a GPS receiver. The Global Positioning System (GPS) is actually a constellation of 27 Earth-orbiting satellites (24 in operation and three extras in case one fails). The U.S. military developed and implemented this satellite network as a military navigation system, but soon opened it up to everybody else. Each of these 3,000 to 4,000-pound solar-powered satellites circles the globe at about 12,000 miles (19,300 km), making two complete rotations every day. The orbits are arranged so that at any time, anywhere on Earth, there are at least four satellites "visible" in the sky. A GPS receiver's job is to locate four or more of these satellites, figure out the distance to each, and use this information to deduce its own location. This operation is based on a simple mathematical
  • 7. International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August -2013) 63 www.arpublication.org principle called trilateration[12]. Fig.3 shows a typical GPS with multiple satellites (four satellites) with signals used to calculate the position of an object on earth’s surface. Fig.4 shows a flowchart depicting how a typical GPS tracking system works. Fig. 3 GPS system with multiple satellites used to locate the position of an object on earth the surface[12] Fig. 4 The typical workings of a GPS tracking System START GPS Tracker connects to the nearest satellite network The satellite sends the GPS location info to the GPS Is GPRS Available? - Byteworks GPS tracker, - Store the GPS location, timestamp and vehicle info like speed, battery level, etc in SD CARD and send it later to byteworks GPS Server when GPRS is now available - Byteworks GPS tracker, - Send GPS location information, - timestamp and vehicle info like speed, battery level, etc in SD CARD and send it later to byteworks GPS Server for database storage NO YES - Web interface - Extract the data from byteworks GPS database and plot on the map STOP
  • 8. 64 www.arpublication.org 2.3 Surveillance IP cameras Surveillance Internet Protocol (IP) cameras, also called network cameras, can combine camera and computing capabilities into a single unit. These cameras are security cameras that can capture video footages and still images (photos) of a security event such as (breach or threat) real- time and transmit the captured file using wireless or wired communication links onto a PC Server installed with video management software and/or graphic viewer. A Wireless IP camera is an IP camera that utilizes wireless radio communication networks such as Bluetooth, Infrared, Wi-Fi, Zigbee, 3G, or any of the WLAN to transmit or transport captured video/image to a PC server with video management software or to a centralized database and then to a webserver so that the captured images or videos can be viewed from web-based interface using standard browers. Surveillance cameras are especially good for monitoring equipment, asset, utilities, the environment (such as streets or public places) to pick video footage of any security breach. This can lead to the tracking, arrest and prosecution of criminals such as armed robbers, assonists, burglars, terrorists, kidnappers, etc. even after crimes have been committed because of the video or photo evidence. 2.3.1 Considerations when choosing a network/surveillance camera [13]: Many factors should be considered before selecting a surveillance IP camera for a security surveillance application such as public utilities, oil and gas pipelines, critical facilities or military formations. There are different types of IP surveillance cameras based on the following features: • fixed, • day/night, • wireless, • indoor, • outdoor and PZT, etc. • camera multi-function capability For an IP surveillance camera suitable for monitoring critical public utilities such as remote oil and gas pipeline to capture real-time scene of vandalisation, the following features must be present: 1. Day and night capability- because vandalisation can occur at any time in any oil and gas pipelines, in fact most of the reported vandalisation of oil pipelines in Nigeria occurred at nights [14]. 2. Wireless capability – surveillance camera suitable for monitoring critical facilities such as oil and gas pipeline monitoring must utilize wireless communication network to be able to transport the captured video wirelessly to the central gateway and control station for viewing, otherwise the vandals can destroy the captured file. 3. Outdoor capability – An outdoor capability or IP65 features is required by a surveillance camera to be able to monitor critical public facilities especially facilities in remote fields such as oil pipelines that are installed where people are not living. Such camera should be able to withstand tough and harsh weather conditions such as rain, sunlight and strong wind.
  • 9. International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August -2013) 65 www.arpublication.org 4. Miniature camera size - Security surveillance cameras come in different sizes: small to medium to big sizes. In general, the smaller the better, because the smaller ones are not easy to attract attention especially when they are installed in unattended hostile environments where they can easily be seen and destroyed by vandals or criminals. Fig. 5 depicts typical Cisco 2500 Series Video Surveillance IP Cameras used for security surveillance application. The Cisco Video Surveillance 2500 Series IP Cameras are feature-rich, professional digital cameras designed for superior performance in a wide variety of environments. The cameras have an enhanced, progressive scan imager for excellent video and color, even in the most demanding lighting conditions. They use MPEG-4 compression to produce DVD-quality video. These fully featured high-resolution cameras include automatic day/night mode, dual streams, bidirectional audio, motion detection, alarm inputs and outputs, and an analog BNC for ease of installation. Fig. 5. Cisco 2500 Series Video security Surveillance IP cameras [15] Fig. 6. Libelium video/image IP surveillance camera board with inserted PIR presence detector (an actuator), LDR sensors and 22 LEDS to aid night vision [16] Fig. 6 depicts a wireless IP surveillance video camera (built by Libelium) that is capable of capturing vandalisation image or video whether in the night or during daylight wherever it is deployed in any section of the oil pipeline infrastructure or any public utility that is at risk of vandalisation or sabotage. It uses ZigBee, Bluetooth and Wi-Fi protocols to send low bandwidth
  • 10. 66 www.arpublication.org data and high speed W-CDMA and HSPA mobile networks to upload high bandwidth data such as video/image. It uses 3G network module with inbuilt SD card with 2GB (extended up to 32GB) to store the photos and videos taken by the Video Camera Sensor Board without the need of being handled by the node Micro Controller Unit (MCU). Close Circuit Television Camera (CCTV) is another special IP surveillance camera that can be used for security surveillance of properties, public and private utilities, roads, streets, markets, shopping malls, airports etc. to gather real-time data of events as they occur; any security breach could likely be picked up and the footage sent to the viewing monitor or a centralized database for viewing later on. The footage can be used to see and track criminals like kidnappers, armed robbers, rapists, terrorists etc. and apprehend them. 2.4 Wireless Sensor Actuator Network (WSAN) Wireless sensor networks (WSNs) are IEEE 802.15.4 enabled devices capable of robust and reliable multi-hop communications [17],[18]. Wireless sensors can be deployed in unattended environments and can enable collection of data from there to distant base stations and then to control room [19],[20]. Wireless sensors have found useful applications in varying number of civilian and military applications because of their low-cost and ease of deployment [18],[21],[22]. Because of these inherent and other advantages, wireless sensor networks have found useful applications in environmental monitoring applications especially in oil and gas fields. Wireless Sensor Networks (WSN) can be combined with Wireless Actuator Networks to form Wireless Sensor Actuator Network (WSAN) which can interact and cooperate together especially in critical security applications. For instance wireless sensors and actuators can be combined effectively in perimeter security applications; the wireless sensors can sense and detect the intrusion using diverse technologies such as Infrareds and the output from the sensor can be combined with an actuator input to trigger an alarm or alert and activates a surveillance IP camera to record the video or photo of such security breach and send it to a PC server for viewing later in order to apprehend the criminal. WSANs can equally be integrated with GPS and RFID for effective security monitoring and surveillance. Fig. 7 depicts a typical wireless sensor nodes or units installed by prominent International Oil and Gas Company (IOC), Shell Petroleum and Development Company (SPDC) in over her 1000 oil wells scattered in Nigeria Niger Delta region to monitor her installed oil pipelines, oil wells, flow stations and rigs to prevent and reduce vandalism and oil theft. Some wireless sensors with the integration of GPS can be used to sense and detect presence of bombs and the locations where they are planted by terrorists and this can help to detect undetonated and unexploded bombs and their locations immediately by security experts in order to save lives. Fig.7 A model of vMBusX-SP battery-powered Smart Wireless Sensor installed by SPDC in her over 1000 oil wells and other oil facilities in the fields of Niger Delta to fight vandalism and theft [22]
  • 11. International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August -2013) 67 www.arpublication.org WSANs have many diverse applications. However, it is only through the integration of WSANs with multimedia security cameras such as Close Circuit Television Camera (CCTV), Internet Protocol (IP) cameras, Complemetary Metal Oxide Semiconductor (CMOS) video cameras etc. with GPS and RFID that WSANs can offer a comprehensive security solution to meet all tracking and monitoring needs for an effectively secure environment. 3. THE PROPOSED NIGERIAN NATIONAL ART COOPERATING OBJECTS AND INTERNET-OF-THINGS (IOTS) In this section, we present and describe the implementation framework for integrating surveillance, tracking and monitoring smart objects of RFID, GPS, WSAN and specialized Internet Protocol (IP) cameras which can be fused together to obtain security data or reports from different security flashpoints or locations all over the country as shown in Fig.8. Fig. 8 The Proposed Nigeria National Security Framework Here in the Fig.8, there is a correlation of security data from different installed locations in public places, streets, banks, market, shopping malls, airports, seaports, schools, public utilities, oil and gas pipelines and other oil installations, government buildings, police posts and checkpoints, military formations and facilities, borders etc. into a common Gateway which is then routed to a secure Centralised Database from which the data can be accessed by logging on to a secure Centralised Internet or Intranet portal by various law enforcement and security agencies from their respective Servers and clients (such as mobile phones, PDAs, smartphones etc.) with appropriate authentications and authorizations. The Common Gateway module of the proposed National Security Framework in Fig.8 is a fusion of many gateways for RFID tracking objects, GPS tracking objects, WSAN tracking objects, surveillance security cameras. A software methodology is used to combine them effectively into a common gateway so that they can come together and their output data Common Gateway for Wireless sensors, RFID objects, GPS satellite objects, Security surveillance cameras from different flashpoints and locations in the country Secure Central Internet or Intranet portal (enabled with Cybersecurity) Server at Office of the National Security Adviser (NSA) Secure Centralise d Database Nigerian Police Server SSS Server JTF Server NSCDC ServerNigerian Navy Server Wireless and Actuator Sensor Network (WSAN) nodes or objects RFID tracking objects GPS satellite objects Surveillance IP cameras (with night vision) Nigerian Customs Server
  • 12. 68 www.arpublication.org channeled into a common central database and then to a common internet/intranet portal so that law enforcement and security agencies can access the portal real-time and get updated information about any security lapse, threat or attack anywhere in the country. Fig.9. depicts the conglomeration of security gateways that make up the common gateway in Fig.8. Fig. 9 The integration of different gateways from WSAN, RFID, GPS and surveillance security cameras into a common gateway 4. CONCLUSION Nigeria is currently facing enormous security challenges especially terrorism and violent crimes. Smart objects and Internet-of-Things can help Nigeria to combat terrorism and other forms of violent crimes by fusing the intelligent ouputs of smart cooperating objects and Internet- of-Things (IoT) adopting monitoring/surveillance technologies such as RFID, GPS, WSAN and surveillance IP cameras. In this paper we proposed a national security framework which is designed to integrate the outputs of these various smart security technologies into a common security gateway and database in such a way it can be accessed by the major law enforcement and security agencies such as the Police, JTF, NSCDC, SSS, Customs, NDLEA through their servers/clients connected via a web-based portal interface at any time from any region of the country. This will enhance intelligence sharing and security collaboration which can help security agencies nip violent crimes and terroris at the bud. We earnestly believe that our proposed security framework, when implemented, can go along way in fusing the surveillance and intelligence data gathered from these innovative security tools so that law enforcement agencies and security forces can tackle these security challenges successfully by preemptively preventing security breaches and challenges and proactively tackling these security challenges by helping to trace, track, arrest and prosecute the criminals that perpetuated these security challenges. 4.1 Future Work The researchers intend to carry out further research on the subject topic by designing an implementation model and then carry out simulation experiments of the proposed Nigeria national security framework using the designed model that can fuse the cooperative outputs of the these identified smart objects and Internet-oF-Things(IoT). RFID Gateway WSAN Gateway GPS Gateway Surveillance camera Gateway Common Security Gateway
  • 13. International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1(August -2013) 69 www.arpublication.org REFERENCES [1] J.L. Akinode, Improving National Security using GPS tracking system technology, Mediterranean Journal of Social Sciences, vol.2(5), October 2011, pp.76. [2] TechTarget.com, Cybersecurity definition, Retrieved online on July 23, 2013 at http://www.techtarget.com/definition/cybersecurity.html [3] Marton, Using IP for Smart Objects and ‘The Internet of Things’, December 22,2009. Retrieved online on April 2, 2013 at http://vertoda.wordpress.com/2009/12/22/using-ip- for- smart-objects-and-the-internet-of-things/ [4] Kevin Ashton, That 'Internet of Things' Thing, In: RFID Journal, 22 July 2009. Retrieved online on 26 July 2013. [5] Wikipedia, Internet of Things, Retrieved on July 26, 2013 at http://en.wikipedia.org/wiki/Internet of Things [6] SRI Consulting Business Intelligence, Retrieved on July 23, 2013 at http://en.wikipedia.org/wiki/Internet of Things [7] Spychips.com, ‘What is RFID?”, Denver University Law Review, 2002. Accessed online on July 26, 2013 at http://www.spychips.com/what-is-rfid.html [8] Teach-ICT.COM, “What is RFID?”, Retrived online on July 28, 2013 from http://www.teach- ict.com/technology_explained/rfid/rfid.html [9] Martcon, “ Wireless Sensor Networks & Complementary Technologies”, Vertoda Blog, December 29, 2009. Accessed online on 22 July 2013 @ http://vertoda.wordpress.com/2010/02/10/wireless-sensor-networks- wind-farms/ [10] Retrived Online at www.dhs.gov/radio-frequency-identification-rfid-what-it.html on July 28, 2013. [11] Marshall Brain and Tom Harris, “ How GPS Receivers Work”, Retrieved online on July 28, 2013 on http://electronics.howstuffworks.com/gadgets/travel [12] ESPOW.com, Considerations when choosing Surveillance cameras , 2013. Retrieved online on April 10, 2013 at "http://www.espow.com/wholesale-security-surveillance- surveillance- cameras-ip-cameras.html?osCsid=1jos40ssgf5h3o1of69dle4jn4. [13] CISCO Systems Inc, USA, CISCO 2500 Series Video security Surveillance IP cameras, Cisco White Paper, 2013. Retrieved online on April 11, 2013 at http://www.cisco.com/. [14] Libelium, Video Camera Technical Guide, Document version: v4.1, April 2013, pp.34. [15] I.F.Akyildiz, W.Su, Y.Sankarasubramaniam and E.Cayirci, A Survey on Wireless Networks, IEEE Communications Magazine, 2002, pp.102-114. [16] S. Petersen, P.Doyle, S.Vatland, C.S.Aasland, T.C.Andersen and D.Sjong, Requirements, Drivers and Analysis of Wireless Sensor Network Solutions for Oil and Gas Industry, IEEE Communications Magazine, 2007, pp.219. [17] G.Sharma, S.Bala, A.K.Verma and T.Singh, Security in Wireless Sensor Networks using Frequency Hopping, International Journal of Computer Applications (0975-8887), 2012, pp.1. [18] C.Bisdikian, An Overview of the Bluetooth Wireless Technology, IEEE Communication Magazine, 2012, vol.39. [19] C.O.Iwendi and A.R Allen, Wireless Sensor Network Nodes: Security and Deployment in Niger- Delta Oil and Gas Sector, International Journal of Network Security and Its Applications (IJNSA), 2011, Vol.3, No.1, pp.68. [20] T.Fasasi, D. Maynard and H.Nasr, Sensors remotely monitor wells in Nigeria swamps, Oil and Gas Journal, 2005, pp.2.
  • 14. 70 www.arpublication.org Authors Engr. ThankGod Izuchukwu Ozue is a Doctoral Research Student in the Department of Electronic and Computer Engineering Nnamdi Azikiwe University Awka. He is currently working as a Secuirty expert at Nyzpat Technologies Ltd. Port Harcourt, Nigeria. He had his Masters Degree in Control Systems and Computer Engineering at Nnamdi Azikiwe University in 2010 and B.Eng Electrical and Electronic Engineering at Nnamdi Azikiwe University Awka in 2006. He has authored several conference and research journal publications. Email: thankjehovah@gmail.com Dr. Francis A. Okoye is a lecturer and former Head, Department of Computer Science and Engineering Enugu State University of Science and technology (ESUT), Nigeria. He had his Ph.D in Computer Science in 2008 at Ebonyi Stat University Abakaliki, Nigeria. He obtained his MSc. and BEng. in Computer Science and Engineering at Enugu State University of Science and Technology (ESUT), Nigeria in 2001 and 1996 respectively. He has several years of experience in both teaching and research. Email: francisced@esut.edu.ng Engr. Fidelis C. Obodoeze is a lecturer at Renaissance University Enugu, Department of Computer Science. He is currently pursuing his PhD programme in the Department of Electronic and Computer Engineering Nnamdi Azikiwe University Awka, Nigeria. He had his Masters Degree in Control Systems and Computer Engineering at Nnamdi Azikiwe University in 2010 and B.Sc Degree in Computer Engineering at Obafemi Awolowo University Ile-Ife in 2000. He had authored and co-authored several research papers at reputable local and international journals. Email: fidelisobodoeze@gmail.com Engr. Frank Ekene Ozioko is the Director of ICT office Enugu State University of Science and Technology (ESUT) and Lecturer Department of Computer and Information Science, ESUT, Nigeria. He had several years of experience in university ICT administration and engineering as well as in teaching and research. Email: ekene.ozioko@esut.edu.ng Engr. Edward Osita Ofoegbu is currently a Doctoral Research Student in the Department of Electronic and Computer Engineering Nnamdi Azikiwe University Awka. He is currently lecturing at Department of Physics Electronics Oduduwa Univesity Ile-Ife, Osun State, Nigeria. He had his Masters Degree in Control Systems and Computer Engineering in 2012 and B.Eng Electronic and Computer Engineering in 2007 both at Nnamdi Azikiwe University Awka, Nigeria. He has worked on several commercial ICT projects using latest cutting-edge and innovative technologies. Email: edoxnt@yahoo.com Calista Nnenna Mba is a Lecturer and former Acting Head, Department of Computer Engineering, Caritas University Enugu, Nigeria. She is currently pursuing her Ph.D programme in Computer Science at Nnamdi Azikiwe University Awka, Nigeria. She had her MSc. Computer Science at University of Nigeria Nsukka (UNN) in 2009, Nigeria and B.Eng in Computer Science and Engineering at Enugu State University of Science and Technology (ESUT), Nigeria in 2004. Email: mbacally@yahoo.com