Skip to main content
Log in

Integrated Peripheral Security System for Different Areas Based on Exchange of Specific Data Rates

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Securing large areas specifically establishments of national importance like military areas, nuclear site or parliament etc. from unauthorized intrusion is difficult, complex and costly. In this paper, we propose Integrated Peripheral Security System for different areas based on specific data rate exchange. This system overcomes the limitations of conventional security systems. Data rate based peripheral security system has been confined to local command unit formerly. In the proposed system, central authority can visualize, control and update the security information on local command, and provide a cost-effective solution compared to existing systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Nishanthini, S., Abinaya, M., & Malathi, S. (2014). Smart Video Surveillance system and alert with image capturing using android smart phones. In 2014 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2014], Nagercoil, pp. 1714–1722.

  2. Liu, J., Hao, K., Ding, Y., Yang, S., & Gao, L. (2017). Moving human tracking across multi-camera based on artificial immune random forest and improved colour-texture feature fusion. The Imaging Science Journal, 65(4), 239–251.

    Article  Google Scholar 

  3. Wei, C., Yang, J., Zhu, W., & Lv, J. (2010). A design of alarm system for substation perimeter based on laser fence and wireless communication. In 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), Taiyuan, pp. 543–546.

  4. Lee, J. et al. (2007). Security door system using human tracking method with laser range finders. In 2007 International Conference on Mechatronics and Automation, Harbin, pp. 2060–2065.

  5. Allwood, G., Wild, G., & Hinckley, S. (2016). Optical fiber sensors in physical intrusion detection systems: A review. IEEE Sensors Journal, 16(14), 5497–5509.

    Article  Google Scholar 

  6. Jaafar, A., Kassim, M., Haroswati, C., & Yahya, C. (2016). Dynamic home automation security (DyHAS) alert system with laser interfaces on webpages and windows mobile using Raspberry PI. In 2016 7th IEEE Control and System Graduate Research Colloquium (ICSGRC), Shah Alam, pp. 153–158.

  7. Salvador, S., Maggiora, R., Milanesio, D., & Rodighiero, G. (2014). An anti-intrusion protection barrier based on 2D radar technology. In 2014 International Carnahan Conference on Security Technology (ICCST), Rome, pp. 1–4.

  8. Falcone, P., et al. (2012). Active and passive radar sensors for airport security. In 2012 Tyrrhenian Workshop on Advances in Radar and Remote Sensing, Naples, pp. 314–321.

  9. Sego, D. (2009). Ground moving personnel indication and tracking from airborne platforms. In 2009 IEEE Conference on Technologies for Homeland Security, Boston, MA, pp. 93–100.

  10. Hamdi, M., Bellazreg, R., & Boudriga, N. (2007). Doppler effect on location-based tracking in mobile sensor networks. In 2007 IEEE/ACS International Conference on Computer Systems and Applications, Amman, pp. 252–257.

  11. Fu, Q., & Zhang, J. (2016). Moving target detection based on motion filter and tracking point cohesion for through wall radar. In 2016 CIE International Conference on Radar (RADAR), Guangzhou, pp. 1–4.

  12. Chunduru, V., & Subramanian, N. (2007). Perimeter-based high performance home security system. In 2007 IEEE International Symposium on Consumer Electronics, Irving, TX, pp. 1–7.

  13. Zanella, A., Bui, N., Castellani, A., Vangelista, L., & Zorzi, M. (2014). Internet of Things for smart cities. IEEE Internet of Things Journal, 1(1), 22–32.

    Article  Google Scholar 

  14. Silva, B., Khan, M., & Han, K. (2017). Internet of Things: A comprehensive review of enabling technologies, architecture, and challenges. In IETE Technical Review, pp. 1–16.

  15. Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250–1258.

    Article  Google Scholar 

  16. Wang, F., Hu, L., Hu, J., Zhou, J., & Zhao, K. (2017). Recent advances in the Internet of Things: Multiple perspectives. IETE Technical Review, 34(2), 122–132.

    Article  Google Scholar 

  17. Prajapati, U., Rawat, A., & Deb, D. (2018). A novel approach towards a low cost peripheral security system based on specific data rates. Wireless Personal Communications, 99(4), 1625–1637.

    Article  Google Scholar 

  18. Kumbhar, A. (2017). Overview of ISM bands and Software-defined Radio Experimentation. Wireless Personal Communications, 97(3), 3743–3756.

    Article  Google Scholar 

  19. Yahiaoui, S., Omar, M., Bouabdallah, A., Natalizio, E., & Challal, Y. (2018). An energy efficient and QoS aware routing protocol for wireless sensor and actuator networks. AEU - International Journal of Electronics and Communications, 83, 193–203.

    Article  Google Scholar 

  20. Rawat, A., Deb, D., Rawat, V., & Joshi, D. (2017). Methods and systems for data rate based peripheral security. India patent 201721005324, February 17, 2017.

  21. Singh, R., & Sapre, S. Communication systems (3 ed., pp. 518–519). McGraw Hill Education (India) Private Limited.

  22. Lanzisera, S., Zats, D., & Pister, K. (2011). Radio frequency time-of-flight distance measurement for low-cost wireless sensor localization. IEEE Sensors Journal, 11(3), 837–845.

    Article  Google Scholar 

  23. “FieldFox Handheld Analyzers”, Technical Overview, Keysight Technologies.

  24. Singal, T. (2010). Wireless communications. New Delhi: Tata Mcraw Hill Education Private Ltd.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Urvish Prajapati.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Prajapati, U., Rawat, A. & Deb, D. Integrated Peripheral Security System for Different Areas Based on Exchange of Specific Data Rates. Wireless Pers Commun 111, 1355–1366 (2020). https://doi.org/10.1007/s11277-019-06919-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-019-06919-5

Keywords

Navigation