skip to main content
10.1145/1644038.1644072acmconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
demonstration

A wireless sensor network for border surveillance

Published:04 November 2009Publication History

ABSTRACT

We will demonstrate a wireless sensor network system for the surveillance of critical areas and properties -- e.g. borders. The system consists of up to 10 sensor nodes that monitor a small border area. The protocols we show focus on detecting trespassers across a predefined area and reporting the detection to a gateway node securely. There, the trespasser's path will be graphically diplayed on a border map. The demonstration features secure protocols for the detection of trespassers, node failure and network partitioning, along with a duty cycle protocol to ensure network longevity. All information pertaining to relevant events in the network or border area will be graphically displayed on a gateway computer.

References

  1. coalesenses. isense. http://www.coalesenses.com.Google ScholarGoogle Scholar
  2. D. Dolev and A. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, 29(2):198--208, 1983. ISSN: 0018--9448.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. P. Rothenpieler, D. Krüger, D. Pfisterer, S. Fischer, D. Dudek, C. Haas, A. Kuntz, and M. Zitterbart. Flegsens - secure area monitoring using wireless sensor networks. In Proceedings of the 4th Safety and Security Systems in Europe, 2009. To appear.Google ScholarGoogle Scholar

Index Terms

  1. A wireless sensor network for border surveillance

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SenSys '09: Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems
      November 2009
      438 pages
      ISBN:9781605585192
      DOI:10.1145/1644038

      Copyright © 2009 Copyright is held by the author/owner(s).

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 4 November 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • demonstration

      Acceptance Rates

      Overall Acceptance Rate174of867submissions,20%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader