Advertisement

Modeling a Data Rate-Based Peripheral Security System in GNU Radio

  • Urvish Prajapati
  • B. Siva Kumar Reddy
  • Abhishek Rawat
Chapter
Part of the Studies in Computational Intelligence book series (SCI, volume 771)

Abstract

This chapter proposes a model for a peripheral security system based on data rate and specific signal format, which can also be used for authorization and recognition functions. This arrangement can be used for security management and monitoring of the inside or outside entry in a large peripheral area. Generally, conventional peripheral security systems detect every intruder and report authorization regardless of checking for authenticity. In the proposed method, identification of authorized persons depends upon exchange of certain fixed data rates between the transmitter and receiver modules. Exchange of data is initiated by the first layer of security provided by the IR sensor, and therefore this system can provide better protection from jamming devices or hacking. The proposed model of data rate-based peripheral security is tested and analyzed using an open-source software, GNU Radio.

References

  1. 1.
    Mali, D. 2017. Role of surveillance in securing cities, Smart Cities Council India.Google Scholar
  2. 2.
    Liu, J., K. Hao, Y. Ding, S. Yang, and L. Gao. 2017. Moving human tracking across multi-camera based on artificial immune random forest and improved color-texture feature fusion. The Imaging Science Journal 65 (4): 239–251.CrossRefGoogle Scholar
  3. 3.
    Wei, C., J. Yang, W. Zhu, and J. Lv, 2010. A design of alarm system for substation perimeter based on laser fence and wireless communication. In 2010 International Conference on Computer Application and System Modeling, V3-543–V3-546, Taiyuan.Google Scholar
  4. 4.
    Allwood, G., G. Wild, and S. Hinckley. 2016. Optical fiber sensors in physical intrusion detection systems: a review. IEEE Sensors Journal 16 (14): 5497–5509. 15 July 2016.CrossRefGoogle Scholar
  5. 5.
    Assaf, M., R. Mootoo, S. Das, E. Petriu, V. Groza, and S. Biswas. 2014. Designing home security and monitoring system based on field programmable gate array*. IETE Technical Review 31 (2): 168–176.CrossRefGoogle Scholar
  6. 6.
    Silva, B., M. Khan, and K. Han. 2017. Internet of things: A comprehensive review of enabling technologies, architecture, and challenges. IETE Technical Review.Google Scholar
  7. 7.
    Chilipirea, C., A. Ursache, D. Popa, and F. Pop. 2016. Energy efficiency and robustness for IoT: Building a smart home security system. In 2016 IEEE 12th International Conference on Intelligent Computer Communication and Processing (ICCP), 43–48, Cluj-Napoca.Google Scholar
  8. 8.
    Kaur, T., and D. Kumar. 2015. Wireless multifunctional robot for military applications. In 2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS), 1–5, Chandigarh.Google Scholar
  9. 9.
    Rawat, A., D. Deb, V. Rawat, and D. Joshi. 2017. Methods and Systems for Data Rate Based Peripheral Security, India Patent 201721005324A, 24 February 2017.Google Scholar
  10. 10.
    Nguyen, D. 2013. Implementation of OFDM systems using GNU Radio and USRP. Master by Research - Engineering: University of Wollongong.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Urvish Prajapati
    • 1
  • B. Siva Kumar Reddy
    • 1
  • Abhishek Rawat
    • 1
  1. 1.Institute of Infrastructure Technology Research and ManagementAhmedabadIndia

Personalised recommendations