Sei sulla pagina 1di 3

Intelligent Border Security Intrusion Detection

using IoT and Embedded systems


Vidhya Lavanya R Sumesh E P
Department of Mathematics & Department of Electronics &
Dawoud ALshukri Apllied Sciences Communication Engineering,
Center for PG Studies Middle East College Middle East College
Middle East College Muscat, Oman Muscat, Oman
Muscat, Oman vidhya@mec.edu.om sumesh@mec.edu.o
PG16f1634@mec.edu.om

Pooja Krishnan
Student Success Center
Middle East College
Muscat, Oman
pooja@mec.edu.om

Abstract— Border areas are generally considered as places Proposed system in this paper is designed to achieve
where great deal of violence, intrusion and cohesion between following features:
several parties happens. This often led to danger for the life of
employees, soldiers and common man working or living in • A 180-degree controllable motor to scan area with
border areas. Further geographical conditions like mountains, two degrees of freedom - horizontal and vertical.
snow, forest, deserts, harsh weather and water bodies often
lead to difficult access and monitoring of border areas.
• Integration of two types of cameras, thermal FLIR
Proposed system uses thermal imaging camera (FLIR) for (Lepton) and night camera, that facilitate monitoring
detection of various objects and infiltrators. FLIR is assigned even during fog, dark and humid environments. Night
an IP address and connected through local network to the camera also helps in aiming the laser pistol in
control center. Software code captures video and subsequently telescope mode.
the intrusion detection. A motor controlled spotlight with
• A warning facility, controlled by the monitoring
infrared and laser gun is used to illuminate under various
conditions at the site. System also integrates sound sensor to
center to alert the infiltration.
detect specific sounds and motion sensors to sense suspicious • A laser pistol, controlled by monitoring center
movements. Based on the decision, a buzzer and electric intended to prevent hackers and to avoid direct
current through fence for further protection can be initiated. docking with infiltrators.
Sensors are be integrated through IoT for an efficient control
of large border area and connectivity between sites. • Controlled electric shock in the border fence to block
the intruder movement.
Keywords—Internet of things, Raspberry Pi, FLIR,

I. INTRODUCTION
II. SYSTEM DEIGN
Ensuring security across border region is considered as
an important aspect for any country. It provide protection to Design steps are divided into two, the first section is in
the country at the same time, it incur huge expenses for a the border area while the second section in controller site.
country. Cameras are set such that motors can move it to scan by 180
degrees. Both the camera and motor controlled by ESP8266
Many systems are developed by researchers to provide a [7], [8] controlled by raspberry pi. The controller is also
solution for efficient monitoring of borders. In [1], a programmed to interface the PIR sensor and the electric
mechanized robot controlled by embedded system is shock activators. A communication link between the border
reported. This system employs a group of sensors and a night area and the control station is established though an
camera; data from these sensors transmitted wirelessly to independent network switched using two routers (wired and
control station. wireless network). Network of sensors in border sites are
In [2], a robot man consisting a laser machine gun and connected through IoT as in Fig.1.
camera to facilitate determination of targets and use
Bluetooth enabled communication between the control center
and the robot. Metal and sound sensors transmit the
information. The control center is responsible to control the
robot and the gun.
PIR sensor based system with a camera and GSM based
communication to the control center is reported in [3]-[6]. A
robot receives the commands from control station and move
towards the target and use laser for controlling the intrusion.

978-1-5386-8046-9/19/$31.00 ©2019 IEEE


instructions are received through ESP8266 from the
raspberry pi and from the client. The laser gun and night
camera can be controlled by control center via ESP8266
upon reception of commands from the raspberry pi. In
addition, the system controls an alarm through ESP8266 to
warn the intruders about being in a restricted area.
Communication between the system in border area and
control center happens either through the wired or wireless
network through the router.

Fig. 1. Block diagram of system in the border site

Fig.2 and 3 shows the flow diagram of software routine


at the border site and controller site respectively.
When the PIR sensor detects movements it will activate
the electric shocker, through Raspberry pi. An additional
control for electric shock is provided through the control
center. This deters intruders and infiltrators trying to climb
the fence. Under normal conditions, in the absence of
instructions from controlling station, the system goes under a
stable mode. One receiving orders from the control station to

Fig. 3. Flow chart of software routine at the controller site.

III. RESULTS AND DISCUSSIONS


Raspberry Pi and ESP8266 communication happens
through Machine Queuing Telemetry Transport Protocol
(MQTT) - which is an Internet- of-Things connectivity
protocol. This is a lightweight publish/subscribe messaging
transport technique and useful for connections over Internet
Protocol link.
Publish and subscribe to the topic is done by the MQTT
node of Node-red. The ESP12E publishes the topic
“servoH”, “servoV” and “GunFire”. In raspberry pi, node-
red’s MQTT node is used to subscribe to the Topic
“servoH”, “servoV” and “GunFire”. Thus, the messages
corresponding to the subscribed topics will be received by
the corresponding MQTT nodes.

Fig. 2. Flow chart of software routine at the border site.

the motors, it follows a path according to the orders


controlled by horizontal or vertical movements. The
The border area and monitor area are connected by two
networks, wired and wireless. This is to ensure reliable data
transmission and communication without interruption.

IV. CONCLUSION
Fig. 4. Window showing the control screen to select the activities
The system developed has provided efficient
Figure 4 shows the window that appears in the control communication and control operation. It alarms the intruder
room and represents the screen to select the six control keys and if the intruder ignores the alarm, an electric fence is
as follows: activated. Image of the border screen is transmitted to the
controller side through IoT. System provides surveillance in
• Control gun dark, fog, and extreme weather conditions and provides 180
degree scanning of the scene.
• Turn on electricity
• Turn off electricity REFERENCES
• Control horizontal motor
[1] A.M. Alex, M.E. Jose, K.S. Rinsily, S. Bosco, S. Shaji, “Android
• Control vertical motor based intelligent robot for border security,” International Research
Journal of Engineering and Technology, vol.4, no.4,pp. 2041-2043.
• Turn on alarm [2] C.M.Naveen Kumar, B. Ramesh, G. Shivakumar, J.R. Manjunath,
“Android Based Autonomous Intelligent Robot for Border Security,”
This page is opened by address: 192.168.1.2:1880/ui. International Journal of Innovative Science, Engineering &
Technology, vol. 1, pp. 544-548, Jul. 2014.
Figure 5 shows the simulation step at the control station
site. The testing of network is done by entering the device [3] S.J. Prajakta, S.B. Honrao, “Advance border security using android
application,” IJARIIE, vol. 2, pp. 3458-3465, 2016.
holder (IP: 192.168.1.2) followed by pinging the device
[4] R.Thilagavathy, J. Murali, P. Kamal, P. Arunpandiyan, “ An
holder (IP: 192.168.1.9) and establishing the link. intelligent unmanned army robot,” IJARCET, vol.4, pp. 473-477,
Feb. 2015,
[5] S. Sudhakar, E. Praveen Kumar , S. Thiyagarajan “Border Security
and Multi Access Robot using Embedded System,” Indian Journal of
Sci & Tech., vol. 9, Apr. 2016.
[6] K. Jain, V. Suluchana, “Design and Development of Smart Robot Car
for Border Security,” Int. J of Computer Applications, vol. 76, Aug.
2013.
[7] “ESP8266EX Datasheet,” Internet: https://cdn-
shop.adafruit.com/product-files/2471/0A-
ESP8266__Datasheet__EN_v4.3.pdf [28 Jul 2018]
[8] “Raspberry Pi WiFi With The ESP8266”, https://www.i-
Fig. 5. Simulation at the control station site programmer.info/programming/hardware/10037-raspberry-pi-wifi-
with-the-esp8266-.html ,Sept. 12, 2016 [Nov.2, 2018].
Figure 6 shows the overall network architecture.
Fig. 6. Network architecture

Potrebbero piacerti anche