Advertisement

Robot Assisted Emergency Intrusion Detection and Avoidance with a Wireless Sensor Network

  • Pritee Parwekar
  • Rishabh Singhal
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 247)

Abstract

In the century of wars with the unseen and many a times undefined enemy, military challenge ranges from active battles to covert operations. The loss of intelligent and trained soldier in military actions is becoming increasingly strategically costlier. Replacement of the human soldier with a mechanical one especially in hostile environments is the failure of military. The paper has contributed towards implementation of robotics in military applications for intrusion detection and avoidance. The sensors will detect any human intrusion in restricted areas and will inform the base station consisting of a microcontroller the zone in which the intruder is present. This microcontroller will communicate with our remote bot consisting of a microcontroller and will give the zone number in which the intrusion took place thus instructing the bot to go and check the intrusion in specified area.

Keywords

Robot assisted military devices 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Pintea, C.-M., Pop, P.C.: Sensor networks security based on sensitive robots agents: A conceptual model. In: Herrero, Á., Snášel, V., Abraham, A., Zelinka, I., Baruque, B., Quintián, H., Calvo, J.L., Sedano, J., Corchado, E. (eds.) Int. Joint Conf. CISIS’12-ICEUTE’12-SOCO’12. AISC, vol. 189, pp. 47–56. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  2. 2.
    Orang, Z.A., et al.: Using Adaptive Neuro-Fuzzy Inference System in Alert Management of Intrusion Detection Systems. I. J. Computer Network and Information Security 11, 32–38 (2012)CrossRefGoogle Scholar
  3. 3.
    do Carmo, R., Hollick, M.: DogoIDS: A Mobile and Active Intrusion Detection System for IEEE 802.11s Wireless Mesh Networks. Technical Report TR-SEEMOO-2012-04Google Scholar
  4. 4.
  5. 5.
  6. 6.

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Department of Computer ScienceJaypee Institute of Information TechnologyNOIDAIndia

Personalised recommendations