Beruflich Dokumente
Kultur Dokumente
Abstract - Nowadays, almost all the countries are facing personnel [16]. So here we can use the wireless
threats from terrorists and intruders from their border technology to provide a feasible solution to detect
areas, challenging the internal security of the country in intruders. The paper mainly focused to provide a software
those areas. So many civilian and military applications re- solution to detect human intruders.
quire locating an intruder in a secured area. Target track-
ing, data processing and analysis play a major role in this
type of applications. The proposed system is to develop a
centralized computer application that needs to identify mov- II. RELATED WORK
ing objects in a specific area using sensors. The system will
be basically designed to detect human intruders. The objec-
tive is to design and implement an object tracking system The moving path of the intruder can be tracked using
using a wireless sensor network. This application is able to different technologies. To locate moving objects in wire-
detect and track objects, and report direction and speed of less sensor networks, various researchers came up with
the intruder to a central base station. The human intruder is different ideas. Reference [4] describes some important
detected using a passive infrared (PIR) sensor. The sensor is
connected to a MICAz sensor node. The PIR sensor is able to
aspects of sensor networks including sensor node architec-
detect the humans and provide information about the direc- ture, different remote sensing applications and characteris-
tion of the movement. The gathered information from the tics of sensor networks. The key idea of this paper[7] is to
sensor network is to be given to the base station for allow sensor coverage areas to overlap to reduce the num-
processing. The proposed system provides an environment ber of sensors. Y.Tseng [8] introduces location tracking in
for easy deployment and which does not require any existing wireless sensor networks to reduce communication
infrastructure or constant monitoring by humans. overheads. Reference [9] provides an algorithm to
maximize the sensor field coverage. Reference [10]
covers information collection protocol used in sensor net-
Keywords - Infrared, Intruder, PIR, Sensor node, Wireless
Sensor Network.
works for tracking applications. The main difference be-
tween our application and the above mentioned techniques
I. INTRODUCTION is that the low cost sensor used for this application and the
integration of that with MICAz -it will be a thermal sensor,
Target tracking in Wireless Sensor Network (WSN) is precisely a Passive Infrared Sensor (PIR). A couple of
the major problem in this application. Target tracking in sensor network hardware that was developed specifically
the given application mainly deals with locating moving for monitoring animals and tracking them is explained by
objects and finding the average speed of the moving ob- P Sikka [14]. Hsieh [12] came up with highway and traffic
ject and being able to track its movements. In the tracking applications by using sensor networks. Here magnetome-
scheme illustrated, sensors are placed in a line topology. ter located on the MICAz sensor board can be used to
The technique used for detection is by catching the signal detect magnetic materials such as vehicles (cars). Based
at the Analog to Digital Converter (ADC) pin. The object on the signal strength readings to get the distance between
is being tracked by PIR sensors. The sensors are placed in nodes is the basic technology used. This information is
static position. Using the gathered information from the basically used for this particular traffic application. Apart
sensor nodes, moving path, average speed and direction of from this, we can apply the same for security to track
the movement are predicted. The proposed scheme can moving object. Reference [13] deals with different issues
detect objects moving at an average speed of 5Km/Sec. A related to sensor networks communication architecture.
Passive Infrared Sensor is used to identify whether the Hussain [15] combined Wireless Sensor Node (WSN) and
intruder is a human being or not. The main goal is to ob- Radio frequency Identification (RFID) technology. Their
tain the record of the trajectory of the moving object by work deals with Radio Signal Strength Indicator (RSSI) of
processing the sensor data. WSNs. To identify the person who is carrying the badge is
Internal Security of a country is a major issue now. possible with RFID technology. So author-
India is also facing the cross border terrorism in different ized/unauthorized person identification is possible with
border areas of the country. We lost lot of lives as well as this technology.#PGHHGEVKXGKPVTWUKQPFGVGEVKQP
lot of money because of cross border terrorism. UVTCVGI[KORNGOGPVUUGXGTCNNC[GTUQHFGHGPEGU
It is not possible to place enough men to guard all sections G. Jacoby [11] monitors power behaviour to detect poten-
of the border even with more than 200,000 military tial intrusions by noting irregularities of power consump-