Open Access   Article Go Back

A Survey of Different Methods in Border Security and Surveillance

Palak Sood1 , Himani Sharma2 , Sumeet Kaur Sehra3

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-10 , Page no. 217-228, Oct-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i10.217228

Online published on Oct 31, 2019

Copyright © Palak Sood, Himani Sharma, Sumeet Kaur Sehra . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Palak Sood, Himani Sharma, Sumeet Kaur Sehra, “A Survey of Different Methods in Border Security and Surveillance,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.217-228, 2019.

MLA Style Citation: Palak Sood, Himani Sharma, Sumeet Kaur Sehra "A Survey of Different Methods in Border Security and Surveillance." International Journal of Computer Sciences and Engineering 7.10 (2019): 217-228.

APA Style Citation: Palak Sood, Himani Sharma, Sumeet Kaur Sehra, (2019). A Survey of Different Methods in Border Security and Surveillance. International Journal of Computer Sciences and Engineering, 7(10), 217-228.

BibTex Style Citation:
@article{Sood_2019,
author = {Palak Sood, Himani Sharma, Sumeet Kaur Sehra},
title = {A Survey of Different Methods in Border Security and Surveillance},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2019},
volume = {7},
Issue = {10},
month = {10},
year = {2019},
issn = {2347-2693},
pages = {217-228},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4924},
doi = {https://doi.org/10.26438/ijcse/v7i10.217228}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i10.217228}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4924
TI - A Survey of Different Methods in Border Security and Surveillance
T2 - International Journal of Computer Sciences and Engineering
AU - Palak Sood, Himani Sharma, Sumeet Kaur Sehra
PY - 2019
DA - 2019/10/31
PB - IJCSE, Indore, INDIA
SP - 217-228
IS - 10
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
320 269 downloads 140 downloads
  
  
           

Abstract

This paper presents a review of the existing border security and surveillance techniques proposed, keeping in view the energy optimization and economic integration at the same time. As the task of border monitoring becomes more and more difficult, searching for solutions beyond physical barriers may be one way to improve security. This paper aims to compare different researches in border security with respect to technique, technology, merits and demerits, time complexity, efficiency and unique features. This paper also highlights their fundamental working principles. The solely aim of this paper is to present a direct comparison of various major researches done in this field so as to facilitate the best optimized method to be deployed according to the current scenario

Key-Words / Index Term

Wireless Sensor Networks (WSNs), ZigBee, OPNET Simulator, Barrier Coverage, Wireless Integrated Network Sensors (WINS), Raspberry Pi, IoT, Radio Frequency Identification (RFID) tags

References

[1] P. Andreas, “Perspective: Border Security in the Age of Globalization: How Can We Protect Ourselves without Losing the Benefits of Openness?,” 2003.
[2] T. Academy, R. Academy, and S. S. Trakt, “Border Management Security Council,” Appl. Phys. A. [Online]. Available: https://www.un.org/sc/ctc/focus-areas/border-control/ accessed on August 2,2019.
[3] N. Paudyal, “10 Toughest Borders In The World.” accessed on August 7,2019.
[4] UN, “Border Management,” 2013. [Online]. Available: https://www.un.org/counterterrorism/ctitf/en/uncct/border-security-initiative, accessed on August 12,2019.
[5] PIB, “Smart Fencing Indo Pak Jammu Border,” 2018. [Online]. Available: https://pib.gov.in/PressReleaseIframePage.aspx?PRID=1546376, accessed on August 12,2019.
[6] PIB, “Smart Fencing Indo Bangladesh Border,” PIB 2019. [Online]. Available: https://pib.gov.in/Pressreleaseshare.aspx?PRID=1567516, accessed on August 20,2019.
[7] WCO, “Smart Border World,” 2019. [Online]. Available: http://www.wcoomd.org/en/media/newsroom/2018/november/world-customs-organization-dedicates-2019-to-transforming-frontiers-into-smart-borders.aspx, accessed on August 21,2019.
.
[8] M. A. M. and M. M. I. Additional, “Overview of Wireless Sensor Network Chapter.”
[9] X. Hu, “Wireles ss Sens sor Ne etwork k : Cha aracte eristics s and Ar rchitec ctures,” vol. 6, no. 12, pp. 1398–1401, 2012.
[10] M. R. Senouci, “WSN Image.” [Online]. Available: https://www.researchgate.net/profile/Mustapha_Senouci/publication/265396190/figure/fig2/AS:295817744273409@1447539854939/A-typical-WSN-architecture.png, accessed on August 23,2019.
[11] S. Siraj, A. K. Gupta, and Badgujar-Rinku, “Network Simulation Tools Survey,” Int. J. Adv. Res. Comput. Commun. Eng. Vol. 1, Issue 4, June 2012, vol. 1, no. 4, pp. 201–210, 2012.
[12] M. Alkhathami, L. Alazzawi, and A. Elkateeb, “Large scale border security systems modeling and simulation with OPNET,” 2017 IEEE 7th Annu. Comput. Commun. Work. Conf. CCWC 2017, pp. 1–8, 2017.
[13] S. Mittal, “OPNET: An Integrated Design Paradigm for Simulations,” Softw. Eng. An Int. J., vol. 2, no. 2, pp. 57–67, 2012.
[14] G. Gao, “Deployment of WirelessHART,” no. Fskd, pp. 2120–2124, 2012.
[15] A. Kuki, “Modeling computer networks by the help of OPNet tools,” vol. 1, pp. 251–258, 2015.
[16] C. M. Ramya, M. Shanmugaraj, and R. Prabakaran, “Study on ZigBee technology,” ICECT 2011 - 2011 3rd Int. Conf. Electron. Comput. Technol., vol. 6, no. April, pp. 297–301, 2011.
[17] D. Products, “Zigbee Wireless Mesh Networking Link.” [Online]. Available: https://www.digi.com/resources/standards-and-technologies/zigbee-wireless-mesh-networking, accessed on August 24,2019.
.[18] Raspberry Pi Foundation, “Raspberry Pi.” [Online]. Available: https://opensource.com/resources/raspberry-pi, accessed on August 25,2019.
[19] Gadget Geek, “Zigbee image.” [Online]. Available: https://i0.wp.com/www.gadgetgeek.info/wp-content/uploads/zigbee_network2-3.jpg?w=413, accessed on August 29,2019.
[20] A. Imteaj, T. Rahman, M. K. Hossain, and S. Zaman, “IoT based autonomous percipient irrigation system using raspberry Pi,” 19th Int. Conf. Comput. Inf. Technol. ICCIT 2016, pp. 563–568, 2017.
[21] R. Karthikeyan, S. Karthik, T. R. Prasanna Vishal, and S. Vignesh, “Snitch: Design and development of a mobile robot for surveillance and reconnaissance,” ICIIECS 2015 - 2015 IEEE Int. Conf. Innov. Information, Embed. Commun. Syst., pp. 5–8, 2015.
[22] Raspberry Pi Foundation, “Raspberry Pi 4 Image.” [Online]. Available: https://www.raspberrypi.org/products/raspberry-pi-4-model-b/, accessed on August 29,2019..
[23] E. – E. P. for E. Students, “RFID web link.” [Online]. Available: https://www.elprocus.com/rfid-basic-introduction-simple-application/, accessed on September 2,2019..
[24] E. – E. P. for E. Students, “RFID tag image.” [Online]. Available: https://www.elprocus.com/wp-content/uploads/2013/09/RFID-Tag.jpg, accessed on September 2,2019.
[25] E. – E. P. for E. Students, “RFID reader image link.” [Online]. Available: https://www.elprocus.com/wp-content/uploads/2013/09/An-RFID-reader.jpg, accessed on September 2,2019.