Wireless Personal Communications

, Volume 99, Issue 4, pp 1625–1637 | Cite as

A Novel Approach Towards a Low Cost Peripheral Security System Based on Specific Data Rates

  • Urvish Prajapati
  • Abhishek Rawat
  • Dipankar Deb


This paper proposes a method for data rate and specific signal format based peripheral security system which can also be used for authorization and recognition functions. This arrangement can be used for security management and monitoring of entry in a large peripheral area. Generally conventional peripheral security systems based on RF modules focus on power level or specific signal measurement, but those methods may suffer from jamming and are prone to hacking. In the proposed method, identification of authorized person depends upon exchange of certain fixed data rates between transmitter and receiver modules. Exchange of data is initiated by the first layer of security provided by IR sensor, and therefore this system can provide better protection from jamming devices or hacking. Results defined from the validation of small setup of hardware module also cross verifies the proposed approach.


Peripheral security RF module IR sensors Command units Signal power Data rate Specific signal format 


  1. 1.
    Nishanthini, S., Abinaya, M., & Malathi, S. (1996). Smart video surveillance system and alert with image capturing using android smart phones. In 2014 International conference on circuits, power and computing technologies [ICCPCT-2014] (pp. 1714–1722). Nagercoil.Google Scholar
  2. 2.
    Rakesh, V., Sreesh, P., & George, S. (2012). An improved real-time surveillance system for home security system using Beagle Board SBC, Zigbee and FTP webserver. In Annual IEEE India conference (INDICON) (pp. 1240–1244). Kochi.Google Scholar
  3. 3.
    Liu, J., Hao, K., Ding, Y., Yang, S., & Gao, L. (2017). Moving human tracking across multi-camera based on artificial immune random forest and improved color-texture feature fusion. The Imaging Science Journal, 65(4), 239–251.CrossRefGoogle Scholar
  4. 4.
    Agarwal, N., & Nayak, S. (2012). Microcontroller based home security system with remote monitoring. Special Issue of International Journal of Computer Applications, pp. 38–41.Google Scholar
  5. 5.
    Wei, C., Yang, J., Zhu, W., & Lv, J. (2010). A design of alarm system for substation perimeter based on laser fence and wireless communication. In 2010 International conference on computer application and system modeling, Taiyuan (pp. V3-543–V3-546).Google Scholar
  6. 6.
    Lee, J., et al. (2007). Security door system using human tracking method with laser range finders. In 2007 International conference on mechatronics and automation, Harbin (pp. 2060–2065).Google Scholar
  7. 7.
    Jaafar, A., Kassim, M., Haroswati, C., & Yahya, C. (2016). Dynamic home automation security (DyHAS) alert system with laser interfaces on webpages and windows mobile using Raspberry PI. In 7th IEEE control and system graduate research colloquium (ICSGRC) (pp. 153–158). Shah Alam.Google Scholar
  8. 8.
    Allwood, G., Wild, G., & Hinckley, S. (2016). Optical fiber sensors in physical intrusion detection systems: A review. IEEE Sensors Journal, 16(14), 5497–5509.CrossRefGoogle Scholar
  9. 9.
    Chunduru, V., & Subramanian, N. (2007). Perimeter-based high performance home security system. In 2007 IEEE international symposium on consumer electronics (pp. 1–7). Irving, TX.Google Scholar
  10. 10.
    Kodali, R., Jain, V., Bose, S., & Boppana, L. (2016). IoT based smart security and home automation system. In 2016 international conference on computing, communication and automation (ICCCA) (pp. 1286–1289). Noida.Google Scholar
  11. 11.
    Assaf, M., Mootoo, R., Das, S., Petriu, E., Groza, V., & Biswas, S. (2014). Designing home security and monitoring system based on field programmable gate array. IETE Technical Review, 31(2), 168–176.CrossRefGoogle Scholar
  12. 12.
    Silva, B., Khan, M., & Han, K. (2017). Internet Of things: A comprehensive review of enabling technologies and challenges. IETE Tech. Rev. Archit.Google Scholar
  13. 13.
    Wang, F., Hu, L., Hu, J., Zhou, J., & Zhao, K. (2017). Recent advances in the internet of things: Multiple perspectives. IETE Technical Review, 34(2), 122132.CrossRefGoogle Scholar
  14. 14.
    Chilipirea, C., Ursache, A., Popa, D., & Pop, F. (2016). Energy efficiency and robustness for IoT: Building a smart home security system. In 2016 IEEE 12th international conference on intelligent computer communication and processing (ICCP) (pp. 43–48). Cluj-Napoca.Google Scholar
  15. 15.
    Kaur, T., & Kumar, D. (2015). Wireless multifunctional robot for military applications. In 2015 2nd international conference on recent advances in engineering & computational sciences (RAECS) (pp. 1–5). Chandigarh.Google Scholar
  16. 16.
    Madni, A. (2008). Smart configurable wireless sensors and actuators for industrial monitoring and control. In 3rd international symposium on communications. Control and signal processing (pp. 447–448). St Julians.Google Scholar
  17. 17.
    Singh, R., & Sapre, S. Communication systems, 3rd ed. McGraw Hill Education (India) Private Limited, pp. 518–519.Google Scholar
  18. 18.
    Rawat, A., Deb, D., Rawat, V., & Joshi, D. (2017). Methods and systems for data rate based peripheral security. India Patent 201721005324A, February 24Google Scholar
  19. 19.
    Lanzisera, S., Zats, D., & Pister, K. (2011). Radio frequency time-of-flight distance measurement for low-cost wireless sensor localization. IEEE Sensors Journal, 11(3), 837–845.CrossRefGoogle Scholar
  20. 20.
    FieldFox Handheld Analyzers, Technical Overview, Keysight Technologies.Google Scholar
  21. 21.
    Singal, T. (2010). Wireless communications. New Delhi: Tata Mcraw Hill Education Private Ltd.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Institute of Infrastructure Technology Research and ManagementAhmedabadIndia

Personalised recommendations