Share This Article:

Advanced Border Intrusion Detection and Surveillance Using Wireless Sensor Network Technology

Abstract Full-Text HTML Download Download as PDF (Size:1313KB) PP. 251-259
DOI: 10.4236/ijcns.2013.65028    8,936 Downloads   16,427 Views   Citations
Author(s)    Leave a comment


Wireless Sensor Network (WSN) has been emerging in the last decade as a powerful tool for connecting physical and digital world. WSN has been used in many applications such habitat monitoring, building monitoring, smart grid and pipeline monitoring. In addition, few researchers have been experimenting with WSN in many mission-critical applications such as military applications. This paper surveys the literature for experimenting work done in border surveillance and intrusion detection using the technology of WSN. The potential benefits of using WSN in border surveillance are huge; however, up to our knowledge very few attempts of solving many critical issues about this application could be found in the literature.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

E. Felemban, "Advanced Border Intrusion Detection and Surveillance Using Wireless Sensor Network Technology," International Journal of Communications, Network and System Sciences, Vol. 6 No. 5, 2013, pp. 251-259. doi: 10.4236/ijcns.2013.65028.


[1] I. Akyildiz, W. Su, et al., “A Survey on Sensor Networks,” IEEE Communications Magazine, Vol. 40, No. 8, 2002, pp. 102-114. doi:10.1109/MCOM.2002.1024422
[2] M. Vieira, C. Coelho, et al., “A Survey on Wireless Sensor Network Devices,” IEEE Conference on Emerging Technologies and Factory Automation, Lisbon, 16-19 September 2003, pp. 537-544.
[3] H. Luo, K. Wu, Z. Guo, et al., “Ship Detection with Wireless Sensor Networks,” IEEE Transaction on Parallel and Distributed Systems, 2011.
[4] B. Essendorfer, E. Monari and H. Wanning, “An Integerated System for Border Surveillance,” IEEE Fourth International Conference on Systems (ICONS 09), Gosier, 1-6 March 2009.
[5] V. Thattil and N. Vasantha. “Energy Efficient Approach to Intruder Detection in Militarily Sensitive Border Using Wireless Sensor Networks,” IEEE Conference on Electronics Computer Technology, 2011.
[6] D. Yuping, H. Chang, Z. Zou and S. Tang, “Energy Aware Routing Algorithm for WSN Applications in Border Surveillance,” 2010 IEEE International Conference on Technologies for Homeland Security, Wltham, 8-10 November 2010, pp. 530-535.
[7] E. Onur, C. Ersoy, H. Delic and L. Skaru, “Surveillance Wireless Sensor Networks: Deployment Quality Analysis,” IEEE Network, Vol. 21, No. 6, 2007, pp. 48-53. doi:10.1109/MNET.2007.4395110
[8] T. Arampatzis, J. Lygeros and S. Manesis, “A Survey of Applications of Wireless Sensors and Wireless Sensor Networks,” 13th Mediterranean Conference on Control and Automation Limassol, Cyprus, 27-29 June 2005, pp. 889-895.
[9] F. M. Sabri, “Wireless Sensor Networks for Swift Bird Farms Monitoring,” International Conference on Ultra-Modern Telecommunications & Workshops, St. Petersburg, 12-14 October 2009.
[10] D. Abruzzese, M. Angelaccio, B. Buttarazzi, R. Giuliano, L. Miccoli and A. Vari, “Long Life Monitoring of Historical Monuments via Wireless Sensors Network,” 6th International Symposium on Wireless Communication Systems, Tuscany, 7-10 September 2009.
[11] I. Stoianov, L. Nachman and S. Madden, “PIPENET: A Wireless Sensor Network for Pipeline Monitoring,” The 6th International Conference on Information Processing in Sensor Networks (IPSN’07), Cambridge, 25-27 April 2007.
[12] T. Wark, P. Corke, P. Sikka, L. Klingbeil, Y. Guo, C. Crossman, P. Valencia, D. Swain and G. Bishop-Hurley, “Transforming Agriculture through Pervasive Wireless Sensor Networks,” IEEE Pervasive Computing, White Plains, 19-23 March 2007. doi:10.1109/MPRV.2007.47
[13] V. Gungor, L. Bin and G. Hancke, “Opportunities and Challenges of Wireless Sensor Networks in Smart Grid,” IEEE Transactions on Industrial Electronics, Vol. 57, No. 10, 2010, pp. 3557-3564. doi:10.1109/TIE.2009.2039455
[14] J. Rice, et al., “Maritime Surveillance in the Intracoastal Waterway Using Networked Underwater Acoustic Sensors Integrated with a Regional Command Center,” 2010 International Waterside Security Conference (WSS), Carrara, 3-5 November 2010, pp. 1-6.
[15] A. Mahdy, “Marine Wireless Sensor Networks: Challenges and Applications,” 7th International Conference on Networking, Cancun, 13-18 April 2008, pp. 530-535.
[16] T. He, S. Krishnamurthy, J. A. Stankovic, T. Abdelzaher, L. Luo, R. Stoleru, T. Yan, L. Gu, J. Hui and B. Krogh, “An Energy-Efficient Surveillance System Using Wireless Sensor Networks,” 2nd International Conference on Mobile Systems, Applications and Services, Boston, 6-9 June 2004.
[17] B. Sinopoli, C. Sharp, L. Schenato, S. Shaffert and Sh. S. Sastry, “Distributed Control Applications Within Sensor Networks,” Proceeding of the IEEE, August 2003.
[19] A. Arora, et al., “A Line in the Sand: A Wireless Sensor Network for Target Detection, Classification, and Tracking,” Journal Computer Networks, Vol. 46, No. 5, 2004.
[20] Z. Sun, et al., “BorderSense: Border Patrol through Advanced Wireless Sensor Networks,” Ad Hoc Networks, 2011, pp. 468-477.
[21] H. Luo, et al., “Ship Detection with Wireless Sensor Networks,” IEEE Transactions on Parallel and Distributed Systems, Vol. 23, No. 7, 2012, pp. 1336-1343. doi:10.1109/TPDS.2011.274
[22] A. Mishra, K. Sudan and H. Soliman, “Detecting Border Intrusion Using Wireless Sensor Network and Artificial Neural Network,” IEEE DCOSS 2010, Santa Barbara, 21-23 June 2010.
[23] P. Rothenpieler, D. Kruger, D. Pfisterer, S. Fischer, D. Dudek, C. Haas, A. Kuntz and M. Zitterbart, “Flegsens: Secure Area Monitoring Using Wireless Sensor Networks,” Proceedings of the 4th Safety and Security Systems in Europe, 2009.
[24] E. Felemban, S. Vural, et al., “SAMAC: A Cross-Layer Communication Protocol for Sensor Networks with Sectored Antennas,” IEEE Transactions on Mobile Computing, Vol. 9, No. 8, 2010, pp. 1072-1088. doi:10.1109/TMC.2010.61
[25] J. He, R. A. Norwood, M. Fallahi and N. Peyghambarian, “Solar-Powered Ad-Hoc Wireless Sensor Network for Border Surveillance,” SPIE Defense, Security, and Sensing, 2012.
[26] E. Felemban, C. Gun and E. Ekici, “MMSPEED: Multipath Multi-SPEED Protocol for QoS Guarantee of Reliability and Timeliness in Wireless Sensor Networks,” IEEE Transactions on Mobile Computing, Vol. 5, No. 6, 2006.
[27] K. Kordari and G. L. Blankenship, “Perimeter Coverage with Wireless Sensor Networks,” IEEE Military Communications Conference, San Diego, 2008.
[28] E. Onur, C. Ersoy, H. Delic and L. Akarun, “Surveillance Wireless Sensor Networks: Deployment Quality Analysis,” IEEE Network, Vol. 21, No. 6, 2007, pp. 48-53. doi:10.1109/MNET.2007.4395110
[29] Y. T. Hou, T. C. Lee, B. C. Jeng and C. M. Chen, “Optimal Coverage Deployment for Wireless Sensor Networks,” The 8th International Conference on Advanced Communication Technology, Phoenix Park, 20-22 February 2006.
[30] J. He and H. Shi, “Constructing Sensor Barriers with Minimum Cost in Wireless Sensor Networks,” Journal of Parallel Distributed Computing, Vol. 72, No. 12, 2012, pp. 1654-1663. doi:10.1016/j.jpdc.2012.07.004
[31] B. Bhattacharya, et al., “Optimal Movement of Mobile Sensors for Barrier Coverage of a Planar Region,” Theoretical Computer Science, Elsevier, 2009, pp. 5515-5528.
[32] G. Yang and D. Qiao “Multi-Round Sensro Deployment for Guranteed Barrier Coverage,” IEEE INFOCOM 2010.f

comments powered by Disqus

Copyright © 2018 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.