Skip to main content

Multi-level Intelligent Border Security System

  • 441 Accesses

Part of the Advances in Intelligent Systems and Computing book series (AISC,volume 1118)

Abstract

Human trafficking, drug trafficking, black marketing, and other cross-border terrorist activities in the border region have turned the border security as the foremost concern for every nation. Huge amount of money is being spent every year for the appointment of special force to monitor border region for 24 h × 365 days which is a tough task in all weathering conditions. On the contrary, an automatic security system will guard the border continuously without boredom. An intelligent border security system is proposed in this paper. The network has three stages of security: underground, ground, and air interface. In underground, vibration and pressure sensing wireless sensors are penetrated and those are capable to provide information about any moving object on the ground. In the ground interface, infrared IP camera capable of capturing image of the intruder at both night and day time is positioned in triangular geometry. To detect any flying object, radars are positioned. This detected information will be transmitted to the central base station through either optical fiber or microwave link. Getting any alarm of pedestrian detection, central station controller can visualize the specific area through IR-IP camera and border security forces may be sent to the specific region immediately.

Keywords

  • IP-IR camera
  • MTI radar
  • Pedestrian detection
  • Smart border security
  • Wireless sensor network (WSN)

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-981-15-2475-2_52
  • Chapter length: 9 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   219.00
Price excludes VAT (USA)
  • ISBN: 978-981-15-2475-2
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   279.99
Price excludes VAT (USA)
Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

References

  1. Côté-Boucher, K., Infantino, F., Salter, M.B.: Border security as practice: an agenda for research. Security Dialogue 45(3), 195–208 (2014). https://doi.org/10.1177/0967010614533243

    CrossRef  Google Scholar 

  2. Lapid, Y.: Introduction. Identities, borders, orders: nudging international relations theory in a new direction. In: Identities, Borders, Orders. Rethinking International Relations Theory, pp. 1–20 (2001)

    Google Scholar 

  3. Amoore, L.: Biometric borders: governing mobilities in the war on terror. Polit. Geogr. 25(3), 336–351 (2006). https://doi.org/10.1016/j.polgeo.2006.02.001

    CrossRef  Google Scholar 

  4. Wasem, R.E.: U.S. Immigration policy: chart book of key trends. CRS Report R42988 (2013)

    Google Scholar 

  5. Patrol, US Border: Total Illegal Alien Apprehensions by Fiscal Year, pp. 1–3 (2014)

    Google Scholar 

  6. Kandel, W.A., Wasem, R.E.: U.S. Immigration policy: chart book of key trends. CRS Report R42988 (2016)

    Google Scholar 

  7. Country Narratives: Trafficking in Persons Report. Department of State, United States of America (2017)

    Google Scholar 

  8. BIPSS: Human Trafficking: A Security Concern for Bangladesh. Issue Brief (9), Available at http://www.bipss.org.bd (2011)

  9. Country Paper: Combating Trafficking of Women and Children in South Asia, p. 17. Bangladesh (2002)

    Google Scholar 

  10. Cornelius, W.A.: From sojourners to settlers: the changing profile of Mexican migration to the United States. Americas Program No. 86, Stanford University (1986)

    Google Scholar 

  11. Burgoon, J.K., Buller, D.B.: Interpersonal Deception Theory. Wiley, Inc. (2008)

    Google Scholar 

  12. Derrick, D.C., Elkins, A.C., Nunamaker Jr., J.F., Zeng, D.D., Burgoon, J.K.: Border security credibility assessments via heterogeneous sensor fusion. IEEE Intell. Syst. 25(3), 41–49 (2010). https://doi.org/10.1109/MIS.2010.79

    CrossRef  Google Scholar 

  13. Cervera, M.A., Ginesi, A., Eckstein, K.: Satellite-based vessel automatic identification system: a feasibility and performance analysis. Int. J. Satell. Commun. Network. 29(2), 117–142 (2011). https://doi.org/10.1002/sat.957

    CrossRef  Google Scholar 

  14. ABI Research: High precision GNSS Market set to increase almost 100% by 2016 (2011). Available at https://www.abiresearch.com/press/high-precision-gnss-market-set-to-increase-almost-/. Accessed on 03 July 2017

  15. Kämppi, P., Rajamäki, J., Guinness, R.: Information security risks for satellite tracking. Int. J. Comput. Commun. 3(1), 9–16 (2009)

    Google Scholar 

  16. Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Comput. Netw. 52, 2292–2330 (2008). https://doi.org/10.1016/j.comnet.2008.04.002

    CrossRef  Google Scholar 

  17. Musaloiu, E.R., Terzis, A., Szlavecz, K., Szalay, A., Cogan, J., Gray, J.: Life under your feet: a wireless soil ecology sensor network. In: Proceedings of the 3rd Workshop on Embedded Networked Sensors (2006)

    Google Scholar 

  18. Ramesh, M.V.: Wireless sensor network for disaster monitoring. Wirel. Sens. Netw. Appl. Centr. Des. (2010)

    Google Scholar 

  19. Ali, M., Sai Kumar, R.: Real-time support and energy efficiency in wireless sensor networks. In: School of Information Science, Computer and Electrical Engineering, Halmstad University, Sweden (2008)

    Google Scholar 

  20. Bulbul, A.A.M., Rahman, M.M., Moniruzzaman, M.: Balancing network load and resources to optimize energy consumption in homogeneous wireless sensor networks. Int. J. Sci. Res. Publ. 5(4), 1–6 (2015)

    Google Scholar 

  21. Rafi, R.S., Rahman, M.M., Sultana, N., Hossain, M.: Energy and coverage efficient static node deployment model for wireless sensor network. Int. J. Sci. Eng. Res. 4(4), 382–387 (2013)

    Google Scholar 

  22. Skolnik, M.I.: Introduction to radar. In: Radar Handbook 2 (1962)

    Google Scholar 

  23. Gebhardt, R., Goldberg, G., King, D., Parke, D., Priester, W.: Automatic target acquisition in mti radar system. U.S. Patent No. 3,831,174 (1974)

    Google Scholar 

  24. Franco, M.: MTI radar system. U.S. Patent No. 4,876,547 (1989)

    Google Scholar 

  25. Perazzo, T., Mao, M., Kwon, O., Majumdar, A., Varesi, J.B., Norton, P.: Infrared vision using uncooled micro-optomechanical camera. Appl. Phys. Lett. 74(23), 3567–3569 (1999). https://doi.org/10.1063/1.124163

    CrossRef  Google Scholar 

  26. Burley, H.A., Sweet, R.J.: Night vision system with color video camera. U.S. Patent No. 5,001,558 (1991)

    Google Scholar 

  27. Abaya, W.F., Basa, J., Sy M., Abad, A.C., Dadios, E.P.: Low cost smart security camera with night vision capability using Raspberry Pi and OpenCV. In: 2014 International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management (HNICEM), IEEE, pp. 1–6, (2014) https://doi.org/10.1109/hnicem.2014.7016253

  28. Bulbul, A.A.M., Biswas, S., Hossain, M.B., Biswas, S.: Past, present and future of mobile wireless communication. IOSR J. Electron. Commun. Eng. (IOSR-JECE), 12(5: Var. I): pp. 55–58, (2017) https://doi.org/10.9790/2834-1205015558

  29. Bulbul, A.A.M., Hasan, M.T., Kadir, M.I., Hossain M.M., Nahid, A.A., Hasan, M.N.: High-capacity downlink for millimeter wave communication network architecture. In: Abraham, A., Dutta, P., Mandal, J., Bhattacharya, A., Dutta, S. (eds.) Emerging Technologies in Data Mining and Information Security. Advances in Intelligent Systems and Computing, vol 814. Springer, Singapore, (2019) https://doi.org/10.1007/978-981-13-1501-5_58

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Verify currency and authenticity via CrossMark

Cite this paper

Bulbul, A.AM., Abdul Awal, M., Tariq Hasan, M., Bellal Hossain, M., Salim Ahmed, M., Iqbal, F. (2020). Multi-level Intelligent Border Security System. In: Reddy, V., Prasad, V., Wang, J., Reddy, K. (eds) Soft Computing and Signal Processing. ICSCSP 2019. Advances in Intelligent Systems and Computing, vol 1118. Springer, Singapore. https://doi.org/10.1007/978-981-15-2475-2_52

Download citation