innovative border protection systems with modern...
TRANSCRIPT
Innovative Border Protection Systems with Modern Sensors
Filip [email protected]
University of Telecommunication and Post
Faculty of Telecommunication
Bulgaria
19.05.2017, Valencia
Contents1. Introduction
2. Border protection systems
3. Types of sensors used by WSN for border protection
4. Communication standards and processing of data collection
5. Energy efficiency of WSN
6. Security of WSN, IoT and Cloudy technology
7. Conclusions
8. References
2/XXMay 2017 INNOSOC VALENCIA 2017 WORKSHOP
1. Introduction
3/XXMay 2017 INNOSOC VALENCIA 2017 WORKSHOP
Topics of the issue for border protection• The challenges of modern societies define border security
as an extremely important for all countries around the world.
• EU policy is geared towards seeking and implementing effective methods and technologies to counteract human trafficking, the import of illicit goods, weapons, narcotics, terrorists and others.
• On the agenda are measures related to the development and implementation of real-time data acquisition technologies, development of protocols and architectures for collecting, processing and encryption large volumes of data, sensing signal analysis technologies from different sources.
2. Border protection systems
5/XXMay 2017 INNOSOC VALENCIA 2017 WORKSHOP
Types of systems for border protection
There are different approaches to the classification of border security systems, but for the purposes of the present work they will be classified as:
✓Terrestrial border security;
✓Protection of air borders and aviation;
✓Protection of water (blue) borders .
Terrestrial border protection
Supports and enforces immigration policies;Reduces immigrants traffic;Increases borders patrol efficiency.
Unattended Ground Sensors;Cameras;Radars;
Night vision;Heats sensors
System definite true position + intelligent system for location ▪ Generates valuables location intelligence ▪ Locates and track all illegal emigrants, vehicles,
weapons, narcotics, terrorists ….
Protection of water borders and Coast Guard
Detects, identifies and tracks maritime vessels and other illegally passing intruders in the area of their responsibility (territorial waters, exclusive economic zone and search and rescue zone);
Controls and monitors effectively the territorial waters;Increases the efficiency, detection and interception of theillegal immigration and all types of contraband;Increases the level of security for vessels in the coastalzone and provides excellent protection against piracy andterrorist acts.
System for Monitoring and Protection of the Bulgarian Black Sea Border BLUE BORDER
• Detects, identifies and tracksmaritime vessels and other illegallypassing intruders in the area oftheir responsibility;
• Controls and monitors effectivelythe Bulgarian territorial waters inthe Black Sea;
• Improves the safety of maritime traffic through early and reliable detection of any objects of maritime traffic;
• contributes to prevention and avoidance of collisions between vessels and reduces the likelihood of accidents;
• Provides assistance to people in distress and assists the Bulgarian Border Police operations in sea search and rescue (SAR);
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 10/XX
Modern systems for protection air borders
These systems work most often with terrestrial and coast guard systems.They identify air planes and other air craft entering non-authorized foreign airspace;To track people, cars, ships with high precision and high resolution;To exchange information between land, sea and coast guard protection systems.
3. Types of modern sensors used by WSN for border
protection systems
11/XXMay 2017 INNOSOC VALENCIA 2017 WORKSHOP
3.1.Modern sensors for Terrestrial protection border
• Expendable Unattended Ground Sensors (UGS)
ManufacturersARGUS™, ElbitSystems
UGS are small ground-based sensors that collect data through seismic, acoustic, radiological nuclear, and electro-optic, microwave, infrared signals. These sensors are networked devices that provide an early warning system and are capable of remote operation.
INNOSOC VALENCIA 2017 WORKSHOP
3.1.Modern sensors for Terrestrial protection border
• Unattended Ground Sensors low-cost sensors; quickly emplaced in dead spots; many manufactures; Integrated battery and antenna software
Internal antenna for cover use;Battery for 6 monthsDetection and classification: Personnel 10-30 mVehicles – 10- 100 mIP 67 rated with internal antenna
INNOSOC VALENCIA 2017 WORKSHOP
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 14/XX
Detects, classifies and tracks of footsteps or vehicular traffic to a control station located many miles away, in real time, on any terrain and in all weather conditions.If a stranger enters the border, his foot-steps will generate harmonic signals. It can be detected as a characteristic feature in a signal power spectrum. Thus, a spectrum analyzer must be implemented in the WINS.
3.1.Modern sensors for Terrestrial protection border
• Unattended Ground Sensors
3.1.Modern sensors for Terrestrial protection border
• Expendable Unattended Ground Sensors –principals of work The sensors are placed underground, appropriately at a distance of about 200 feet (about 60 m), the number is determined by the size of the security zone and the radiocommunication range of the devices.The communication network is evolved and is managed by specialized software that collects, processes, analyzes sensor data and signals in a certain way for border violations.
INNOSOC VALENCIA 2017 WORKSHOP
3.1.Modern sensors for Terrestrial protection border
• Expendable Unattended Ground Sensors – barrier PrincipeDigital microwave barrierUltrasonic barrierInfrared sensorsdistance 100 m - 220 mSoftware for analyze and control
INNOSOC VALENCIA 2017 WORKSHOP
3.1.Modern sensors for Terrestrial protection border
• Expendable Unattended Ground Sensors – barrier Principe
Active infrared barrier, range: outdoor installation to 300 m.Barrier height 42 cm, 6 rays. Temperature range -25C˚ / 55C˚.Horizontal adjustment 180 ° (± 90 °), vertical adjustment 20 ° (± 10 °)
INNOSOC VALENCIA 2017 WORKSHOP
• THE THERMAL IMAGING CAMERAInfrared energy (A) coming from an object is ocused by the optics (B) onto an infrared detector (C). The detector sends the information to electronics sensor (D) for image processing. The electronics translate the data coming from the detector into an image (E) that can be viewed in the viewfinder or on a standard video monitor or LCD screen
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 18/XX
3.1.Modern sensors for Terrestrial protection border
Infrared Microbolometer
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 19/XX
A microbolometer is a specific type of bolometer used as a detector in a thermal camera. Infrared radiation with wavelengths between 8-13 μm strikes the detector material, heating it, and thus changing its electrical resistance. This resistance change is measured and processed into temperatures which can be used to create an image. Unlike other types of infrared detecting equipment, microbolometers do not require cooling.
3.1.Modern sensors for Terrestrial protection border
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 20/XX
A system for thermal imaging camera mounted on moveable trailer with solar panel.
Source: http://www.flir.co.uk
3.1.Modern sensors for Terrestrial protection border
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 21/XX
Source: http://www.flir.co.uk
Human targets are being tracked and will trigger the alarm when crossing the
virtual fence.
Animals are considered as authorized Intruders and will not trigger the alarm.
3.1.Modern sensors for Terrestrial protection border
Programing the thermal vision camera for specific parameters as high, weigh, temperature, Length and ect.
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 22/XX
Border securitybenefit from thermal imaging cameras because they help them to secure facilities like ports, airports, nuclear facilities, warehouses, estates, border and many more against intruders.
Border securityBorder security specialists protect theircountry’s border against smugglers and otherintruders. With a thermal imaging camerathey are able to see a man at a distance of 20kilometers away in total darkness.
3.1.Modern sensors for Terrestrial protection border
Sound Barrier System
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 23/XX
Sound Barrier System is a wireless, GPRS enabled, perimeter security system, perfect for both remote premises or large scale applications.ASELSAN provides efficient and effective technical solutions related to border security. By means of Automatic Border Crossing Detection ("Smart Surveillance") provided by those solutions, border station personnel does not need to be at the border line in order to observe/determine illegal.
Sourse:ASELSAN
3.1.Modern sensors for Terrestrial protection border
3.1.Modern sensors for Terrestrial protection border
This innovative system uses a network of unattended wireless sensors to create a wireless "trip wire” around a perimeter to provide early warnings against intrusions. The wireless nodes relay real-time perimeter security information to the software, where users can visualize the exact location of intrusions and manage additional networked sensors.
INNOSOC VALENCIA 2017 WORKSHOP
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 25/XX
3.2.Modern sensors for marine protection border The most popular under water
sensor is a acoustic sensor.
A simplified diagram of the underwater sensor network to detect enemy water craft. network.
Felemban E. , (2013),
3.2.Modern sensors systems for marine protection border
Underwater acoustic sensor network has the following nodes:
have three type of nodes:
• sensor node that located in the bottom and different depth,
• surface sink , underwater sink or mobile sensor node,
• base station node onshore.
Divers fix it on the bottom of ocean by anchor or fix in surface and different depths.
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 26/XX
3.2.Modern sensors systems for marine protection border
• sensors (such as: sonar sensor, pressure sensor depth sensor and etc.).
• Surface sink nodes: dependent of the used architectures, they can be one or more than one surface sink. This nodes usually located on the ships or boats in the surface of water and have unlimited energy and use RF modules to communicate with sensor nodes and base station node. After receiving data from underwater sensors, this nodes via RF send it to base station node.
• Base station node usually located onshore and connected to Internet.
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 27/XX
Sourse: http://acoustics.org/pressroom/httpdocs/155th/akal.htm
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 28/XX
• Wireless acoustic communication is the typical physical-layer technology underwater because of the high medium absorption of radio frequencies and of the scattering problem affecting optical waves.
• acoustic communication solutions support only delay-tolerant low-bandwidth monitoring applications.
3.2.Modern sensors network formarine protection border
Source: http://soe.rutgers.edu/story/dr-dario-pompili-receives-nsf-career-award
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 29/XX
3.2.Modern sensors network formarine protection border
Sourse: http://slideplayer.com/slide/10248158/
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 30/XX
3.2.Modern sensors for marine protection border
http://slideplayer.com/slide/10248158/
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 31/XX
3.3.Modern sensors for air protection border
Radars integrated into airplanes provide an opportunity to detect air and sea border violations. They serve as a centerpiece in a large communications and data sharing network for critical security structures at the air, sea and land borders.
http://www.spsmai.com/military/?id=2518&q=Net-centric-warfare
• Radar and electro-optical/infrared sensor systems provide advanced precision targeting, navigation, threat detection and next generation intelligence, surveillance and reconnaissance capabilities.
• The space-based solutions collect and transmit imagery and sensor data that informs critical decisions made by national leaders, troops on the battlefield, intelligence agents and emergency responders, as well as the public and private sector.
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 32/XX
http://www.lockheedmartin.com/us/innovations.html
3.3.Modern sensors for air protection border
Innovation radar- sensor system by Lockcheed Martin
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 33/XX
Patrol: drones fly on routine patrols, looking for the illegal crossing of goods or people across borders.Investigations: drones are used to “provide aerial support for law enforcement activities and investigations”Disaster response: drones are used to support emergency response to disasters such as wildfires and flooring. Drones can be used to assess the extent of damage and aid in the planning of disaster response.
3.3.Protection air borders with Drones
3.3.Protection air borders with Drones
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 34/XX
The drones, fly at altitudes between 19,000 ft. and 28,000 ft.,(from5791.2 m to 8534.4 ) are
equipped with a sensor suite that includes and electro-optical and infrared camera. The
sensors allow to collect footage in day or night, as well as track the movement of vehicles such
as cars and boats and gather terrain information. One of the drones is equipped with a Wide
Area Surveillance System, which is mounted on the wing of the aircraft. This system allows to
record an area approximately 3.7 miles(5,95km) wide.
Source: http://dronecenter.bard.edu/customs-and-border-protection-drones/
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 35/XX
3.3.Modern sensors for air protection border
http://elbitsystems.com/
Integrated system in drones
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 36/XX
Thermal imaging camera
installed on airport
Thermal image of a plane landing at the airport.
Images from the thermal imaging camera in TV mode. Control commands are well visible.
Soure: http://www.flir.co.uk
3.3.Modern sensors for air protection border
http://www.spsmai.com/military/?id=2518&q=Net-centric-warfare
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 37/XX
3.3.Modern sensors systems for air protection border
Ground radar
systems
Video surveillance systems –
Mobile and remote control
3.4.Integration systems protection borders
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 38/XX
Detection devices -sensors
Controlling and receiving devices
Video subsystem
The Digital Barriers RDC is a revolutionary approach to monitoring vulnerable ground and perimeters – proven to operate in the
most remote and hostile of locations.
4. Communication standards
39/XXMay 2017 INNOSOC VALENCIA 2017 WORKSHOP
STANDARDS AND SPECIFICATIONS in WSN
Standards commonly used in WSN communications include:
• Zig Bee - Transmit data over long distances by passing data through intermediate devices to reach more distant ones.
• Bluetooth - Wireless technology standard for exchanging data over short distances from fixed and mobile devices by creating PANs’
• 6LoWPAN - Defined encapsulation and header compression mechanisms that allow IPv6 packets to be sent to and received from over IEEE 802.15.4 based networks
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 40/XX
Specification ZigBee standard
Bandwidth Dual PHY (2.4GHz and 868/915 MHz)
Maximum data rate speed of 250 kbps (2.4 GHz), 40 kbps ( 915 MHz),
and 20 kbps (868 MHz)
Protocol for access to the channel CSMA-CA channel access
Topology star, peer-to-peer, mesh, cluster tree
Addressing space of up to: 18,450,000,000,000,000,000 devices (64
bit IEEE address) - 65,535 networks
Radio communication range from 10 to 100 m, 50m typical (5-500m
based on environment)
Devices in network Need to have 64 bit IEEE address
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 41/XX
Specification of ZigBee standard• Frequency network resource is in the frequency range for
scientific, industrial production, military, medical and home use (ISM). The standard is implemented with 27 channels in three frequency ranges - 2.4 GHz (16 channels), 915 MHz (10 channels) and 868 MHz (1 channel). The maximum data rate is 250 Kbps, 40 Kbps and 20 Kbps.
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 42/XX
Comparative analysis of the characteristics on same protocols used by WSN
ZigBee Wi-Fi 6LoWPAN
Max rate 250Kbps Up to 1,35 Gbps 250kbps
Range, m 300 20-100 100
Working Frequency 2,4GHz
915 MHz
868MHz
2,4GHz
5 GHz
2.4GHz, 928MHz, 868MHz or 783MHz
Access method to the
cannel CSMA- CA CSMA- CA
CSMA- CA
ProtocolIEEE
802.15.4IEEE 802.11
IEEE
802.15.4
Max network nodes65536 No limited
No limited
Wake-up time 30 ms 3 s Under consideration
System recourse4 to 32 Kbyte 1Mbyte
128 bytes
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 43/XX
Most used topology in WSN
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 44/XX
5. Energy efficiency of WSN
45/XXMay 2017 INNOSOC VALENCIA 2017 WORKSHOP
Communication Efficiency in Low-Speed Networks
• The basic problem at wireless sensor networks is related to low energy summary of sensor nodes and extending the life of the network.
• Presented model for determining the effectiveness of communication between nodes of low-speed wireless network, based on the distance between them.
• The model performed to determine the effectiveness of low-speed wireless communication network
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 46/XX
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 47/XX
MODEL FOR DETERMING EFFECTIVENESS OF COMMUNICATION IN LOW-SPEED WIRELESS NETWORK
𝑑𝑖𝑗 = 𝑦2 − 𝑦12 + 𝑥2 − 𝑥1
2
𝐸𝑙𝑜𝑐 𝑛𝑖 =1
𝑛𝑖(𝑛𝑖 − 1)
𝑖=𝑗
1
𝑑𝑛𝑖𝑗
WSN with the same type devices N, modeled as a graph G = (V = {1, ... N}), with N devices
Е𝒈𝒍𝒐𝒃 =𝟏
𝑵 𝑵− 𝟏
𝒊=𝒋
𝟏
𝒅𝒊𝒋
Euclidean distance between nodes
Global Efficiency
Local Efficiency
48
The location of the nodes by algorithm of random numbers
WSN with nidentical
devices and R
Algorithm for positioning the sensor devices
Coordinates table of sensor devices
Search algorithm for detection neighboring device
Create neighbors matrix
MODEL FOR DETERMING EFFECTIVENESS
OF COMMUNICATION IN LOW-SPEED
WIRELESS NETWORK
INNOSOC VALENCIA 2017 WORKSHOP
49
MODEL FOR DETERMING EFFECTIVENESS
OF LOW-SPEED WIRELESS NETWORK
Finding the shortest path by Greedy algorithm
Create a table of routes
Determining the energy consumedЕ𝒄𝒐𝒏𝒔𝒖𝒎𝒆𝒅.𝒏𝒊 =𝑬𝒓𝒙 + 𝑬𝒕𝒙+𝑬𝒍𝒊𝒔𝒕𝒆𝒏 + 𝑬𝒆𝒅𝒍𝒆 + 𝑬𝒔𝒍𝒆𝒆𝒑
Table of energy
Local and global efficiency
INNOSOC VALENCIA 2017 WORKSHOP
Research of the effectiveness of communication in wireless low-speed network
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 50/XX
Parameters of simulation studies of network 200x200 mand 50 devices
Results of simulation studies
• Efficiency of communication at N = 50,
different R and location sink in bottom right
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 51/XX
• Efficiency ofcommunication at N = 50, depending on the radio
communication range and the number of connections
Energy efficient of mesh network using ZigBee devises
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 52/XX
Residual energy of the devices in the network
0
5
10
15
201
23
45
6
7
8
9
10
11
12
13
14
1516
1718192021
22
23
24
25
26
27
28
29
30
31
3233
3435
number of hops
number ofneighbors
Number ofTransferring data
Energy consumeddJ
Based on our interpretation of the results we make the following summary:
• The global efficiency increased with increasing the range of the radio node, due to a reduction in the number of intermediate transfers of data, the number of jumps and reduced length of the route;
• Increasing the radio range of the devices may not affect local efficiency, as the number of neighbors is likely to remain consistent across simulations;
• Global efficiency is higher in networks having more connections between the devices, which may be due to allowing a higher number of alternate routes to provide an energy efficient communication between any two units in the network.
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 53/XX
Energy efficient of mesh network using ZigBee devises
6. Security of WSN, IoT and Cloudy technology
How WSN for border security interact with Internet of Thinks and Cloudy Technology ?
54/XXMay 2017 INNOSOC VALENCIA 2017 WORKSHOP
Security• The security of the transmitted data is guaranteed by Advanced
Encryption Standard (AES) encryption with a 128-bit key length. The latter also contributes to the use of the CSMA / CA (Carrier Sense Multiple Access with Collision Avoidance) protocol, which avoids the impact of disturbing signals. Among its special features is the termination of the transmission in the emergence of disturbing signals and only after stopping their work refundable. As a result of all these measures, it is seldom necessary to re-transmit wrong packets of impulses, which is one of the prerequisites for reducing the DC consumption of the transmitters.
• ZigBee uses 128-bit keys to implement its security mechanisms. A key can be associated either to a network, being usable by both ZigBee layers and the MAC sublayer, or to a link, acquired through pre-installation, agreement or transport. Establishment of link keys is based on a master key which controls link key correspondence.
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 55/XX
Security protocol stack in6loWPAN • Authentication and privacy in
IPv6 is provided by IPsec . IPsec defines a set of protocols for securing IP communication: the security protocols Authentication Header (AH) and Encapsulating Security Payload (ESP), the algorithms for authentication and encryption, key exchange mechanisms and it called security associations (SA) .
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 56/XX
http://soda.swedish-ict.se/4183/1/raza11securing.pdf
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 57/XX
Internet of Thinks and security of borders
Systems are needed to help those devices talk to each other, manage all that data, and enforce proper access control•All of the messaging, management, and access control technologies used in these large-scale device networks must be massively scalable•Lightweight protocols for devices to work together and communicate •Unique and extensible identifiers for all those billions of devices
•Lack of interoperability –structural and semantic heterogeneity•Cybersecurity •Privacy and policy
Why not using ?SensorsCamerasFencesSatellitesBorder guardsDrones
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 58/XX
Internet of Thinks and security of borders
IoT Data-Challenges•Multi-modal and heterogeneous;•Noisy and incomplete;•Time and location dependent; •Dynamic and varies in quality ;•Crowed sourced data can be unreliable; •Requires (near-) real-time analysis;•Privacy and security are important issues•Data can be biased!
Technology (IoT) provides a platform to support border security and public safety by:• Detection, prevention and capture of terrorists, illegal aliens and smugglers • Keeping track, tracking the experiments and responding to video surveillance systems, electronic sensors and Air Observations•Interpretation and tracking of traces, marks and other physical evidence• Check traffic points and collaborate to collect actionable intelligence for anti-smuggling activities
The Platform for IoT networked connection of people, process, and data, presents a tremendous opportunity for today’s border security.
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 59/XX
Cloudy technology and security of borders
The security of the twenty-first century borders requires interaction between border guards, intelligent sensors, monitoring and control devices and systems, and intelligent real-time analytical systems.Different companies offer tools to improve interconnection and cooperation between different levels of border security and border protection.Such an instrument is cloud technologies based on IoT architectures.
Cloudy technology and security of borders
Cisco Connected Border
source: http://www.cisco.com/c/dam/en_us/solutions/industries/docs/gov/connected-border-launch-assets.pdf
Conclusion
To improve the border security of European Union, we are working intensively on building innovative systems based on smart sensors and devices for the identification and detection of illegal border crossing.
The increase the reliability and efficiency of border control measures by using integrated wireless networks of intelligent sensors, modern radars, cameras and thermal motion sensors in remote border areas, which are typically difficult to secure and monitor.
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 61/XX
Conclusion Networking surveillance systems, constructed of battery powered intelligent radio-based sensors to provide a computerized decision-making support to border control authorities.
Challenge for uses these technology are:
- provide a secure end-to-end encrypted communication of various types of online information, including movement, humidity and temperature;
- extend the battery life of the sensors in these continuously monitoring systems (i.e. operating 24/7), e.g. by allowing each sensor to wake up from its sleep mode only when movement is detected or when devices transmit routine checks;
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 62/XX
Conclusion
The integration of innovative sensor systems, cloud protection technologies at EU borders will help reduce illegal trafficking of human, goods, arms, smuggling in the EU, and increase the security and peace of the citizens of United Europe.
The European Union's documents provide for a significant part of the systems described in this presentation it will become reality in the European border protection until 2020.
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 63/XX
References 1. Alamri A., Shada W., Hassa M.( 2013), A Survey on Sensor-Cloud: Architecture, Applications, and Approaches, International Journal of Distributed Sensor Networks, Volume 2013, 18 pages
2. Felemban E. , (2013), Advanced Border Intrusion Detection and Surveillance Using Wireless Sensor Network Technology, Int. J. Communications, Network and System Sciences, 6, 251-259
3. Hristov G., Tsvetanov F., Georgieva I., (2016), Cloudy Technologies in Industry, Eleventh International Scientific Conference KNOWLEDGE IN PRACTICE, 16-18 December, 2016 Bansko, Bulgaria, and KNOWLEDGE –International Journal, Vol 15.2
4. Hristov G., P. Zahariev, T. Iliev, M. P. Iliev. An approach for energy optimization in wireless sensor networks. IN: 33rd International Convention on Information and Telecommunication Technology, Electronics and Microelectronics, Opatija, Croatia, 2010, pp. 203–206
4. https://www.ultra-electronics.com/capabilities/c2isr/surveillance-and-security.aspx
5. Melodia T. , H. Kulhandjian, L. Kuo, and E. Demirors, "Advances in Underwater Acoustic Networking," in Mobile Ad Hoc Networking: Cutting Edge Directions, Eds. S. Basagni, M. Conti, S. Giordano and I. Stojmenovic, John Wiley and Sons, Inc., Hoboken, NJ, Second Edition, pp. 804-852, 2013.
6. Renee Berry and Matthew Reisman, (2015 ), Policy Challenges of Cross-Border Cloud Computing, Jurnal of international commerce and economics, p.p.1- 38.
7. Tsvetanov F., Tsvetanov K., Georgieva I., (2014), Modelling and Simulation of Communication Efficiency in Low-Speed Networks, Telecommunications forum TELFOR. 21st, 2014, p.p 178-182
8. http://www.condoraerial.com/Ground-Sensors.html
9. https://www.ara.com/sites/default/files/docs/ARAEUGS2000.pdf
10. https://www.researchgate.net/publication/252952915
11. https://www.researchgate.net/publication/253722707_EOIR_sensors_enhance_border_security_part_two
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 64/XX
Thank you for your attention!
May 2017 INNOSOC VALENCIA 2017 WORKSHOP 65/XX
This document has been prepared for the European Commission however it reflects the views only of the authors, and the
Commission cannot be held responsible for any use which may be made of the information contained therein.