Multi-level Intelligent Border Security System

  • Abdullah Al-Mamun Bulbul
  • Md. Abdul Awal
  • Md. Tariq Hasan
  • Md. Bellal Hossain
  • Md. Salim Ahmed
  • Faysal Iqbal
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1118)


Human trafficking, drug trafficking, black marketing, and other cross-border terrorist activities in the border region have turned the border security as the foremost concern for every nation. Huge amount of money is being spent every year for the appointment of special force to monitor border region for 24 h × 365 days which is a tough task in all weathering conditions. On the contrary, an automatic security system will guard the border continuously without boredom. An intelligent border security system is proposed in this paper. The network has three stages of security: underground, ground, and air interface. In underground, vibration and pressure sensing wireless sensors are penetrated and those are capable to provide information about any moving object on the ground. In the ground interface, infrared IP camera capable of capturing image of the intruder at both night and day time is positioned in triangular geometry. To detect any flying object, radars are positioned. This detected information will be transmitted to the central base station through either optical fiber or microwave link. Getting any alarm of pedestrian detection, central station controller can visualize the specific area through IR-IP camera and border security forces may be sent to the specific region immediately.


IP-IR camera MTI radar Pedestrian detection Smart border security Wireless sensor network (WSN) 


  1. 1.
    Côté-Boucher, K., Infantino, F., Salter, M.B.: Border security as practice: an agenda for research. Security Dialogue 45(3), 195–208 (2014). Scholar
  2. 2.
    Lapid, Y.: Introduction. Identities, borders, orders: nudging international relations theory in a new direction. In: Identities, Borders, Orders. Rethinking International Relations Theory, pp. 1–20 (2001)Google Scholar
  3. 3.
    Amoore, L.: Biometric borders: governing mobilities in the war on terror. Polit. Geogr. 25(3), 336–351 (2006). Scholar
  4. 4.
    Wasem, R.E.: U.S. Immigration policy: chart book of key trends. CRS Report R42988 (2013)Google Scholar
  5. 5.
    Patrol, US Border: Total Illegal Alien Apprehensions by Fiscal Year, pp. 1–3 (2014)Google Scholar
  6. 6.
    Kandel, W.A., Wasem, R.E.: U.S. Immigration policy: chart book of key trends. CRS Report R42988 (2016)Google Scholar
  7. 7.
    Country Narratives: Trafficking in Persons Report. Department of State, United States of America (2017)Google Scholar
  8. 8.
    BIPSS: Human Trafficking: A Security Concern for Bangladesh. Issue Brief (9), Available at (2011)
  9. 9.
    Country Paper: Combating Trafficking of Women and Children in South Asia, p. 17. Bangladesh (2002)Google Scholar
  10. 10.
    Cornelius, W.A.: From sojourners to settlers: the changing profile of Mexican migration to the United States. Americas Program No. 86, Stanford University (1986)Google Scholar
  11. 11.
    Burgoon, J.K., Buller, D.B.: Interpersonal Deception Theory. Wiley, Inc. (2008)Google Scholar
  12. 12.
    Derrick, D.C., Elkins, A.C., Nunamaker Jr., J.F., Zeng, D.D., Burgoon, J.K.: Border security credibility assessments via heterogeneous sensor fusion. IEEE Intell. Syst. 25(3), 41–49 (2010). Scholar
  13. 13.
    Cervera, M.A., Ginesi, A., Eckstein, K.: Satellite-based vessel automatic identification system: a feasibility and performance analysis. Int. J. Satell. Commun. Network. 29(2), 117–142 (2011). Scholar
  14. 14.
    ABI Research: High precision GNSS Market set to increase almost 100% by 2016 (2011). Available at Accessed on 03 July 2017
  15. 15.
    Kämppi, P., Rajamäki, J., Guinness, R.: Information security risks for satellite tracking. Int. J. Comput. Commun. 3(1), 9–16 (2009)Google Scholar
  16. 16.
    Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Comput. Netw. 52, 2292–2330 (2008). Scholar
  17. 17.
    Musaloiu, E.R., Terzis, A., Szlavecz, K., Szalay, A., Cogan, J., Gray, J.: Life under your feet: a wireless soil ecology sensor network. In: Proceedings of the 3rd Workshop on Embedded Networked Sensors (2006)Google Scholar
  18. 18.
    Ramesh, M.V.: Wireless sensor network for disaster monitoring. Wirel. Sens. Netw. Appl. Centr. Des. (2010)Google Scholar
  19. 19.
    Ali, M., Sai Kumar, R.: Real-time support and energy efficiency in wireless sensor networks. In: School of Information Science, Computer and Electrical Engineering, Halmstad University, Sweden (2008)Google Scholar
  20. 20.
    Bulbul, A.A.M., Rahman, M.M., Moniruzzaman, M.: Balancing network load and resources to optimize energy consumption in homogeneous wireless sensor networks. Int. J. Sci. Res. Publ. 5(4), 1–6 (2015)Google Scholar
  21. 21.
    Rafi, R.S., Rahman, M.M., Sultana, N., Hossain, M.: Energy and coverage efficient static node deployment model for wireless sensor network. Int. J. Sci. Eng. Res. 4(4), 382–387 (2013)Google Scholar
  22. 22.
    Skolnik, M.I.: Introduction to radar. In: Radar Handbook 2 (1962)Google Scholar
  23. 23.
    Gebhardt, R., Goldberg, G., King, D., Parke, D., Priester, W.: Automatic target acquisition in mti radar system. U.S. Patent No. 3,831,174 (1974)Google Scholar
  24. 24.
    Franco, M.: MTI radar system. U.S. Patent No. 4,876,547 (1989)Google Scholar
  25. 25.
    Perazzo, T., Mao, M., Kwon, O., Majumdar, A., Varesi, J.B., Norton, P.: Infrared vision using uncooled micro-optomechanical camera. Appl. Phys. Lett. 74(23), 3567–3569 (1999). Scholar
  26. 26.
    Burley, H.A., Sweet, R.J.: Night vision system with color video camera. U.S. Patent No. 5,001,558 (1991)Google Scholar
  27. 27.
    Abaya, W.F., Basa, J., Sy M., Abad, A.C., Dadios, E.P.: Low cost smart security camera with night vision capability using Raspberry Pi and OpenCV. In: 2014 International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management (HNICEM), IEEE, pp. 1–6, (2014)
  28. 28.
    Bulbul, A.A.M., Biswas, S., Hossain, M.B., Biswas, S.: Past, present and future of mobile wireless communication. IOSR J. Electron. Commun. Eng. (IOSR-JECE), 12(5: Var. I): pp. 55–58, (2017)
  29. 29.
    Bulbul, A.A.M., Hasan, M.T., Kadir, M.I., Hossain M.M., Nahid, A.A., Hasan, M.N.: High-capacity downlink for millimeter wave communication network architecture. In: Abraham, A., Dutta, P., Mandal, J., Bhattacharya, A., Dutta, S. (eds.) Emerging Technologies in Data Mining and Information Security. Advances in Intelligent Systems and Computing, vol 814. Springer, Singapore, (2019)

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Abdullah Al-Mamun Bulbul
    • 1
    • 2
  • Md. Abdul Awal
    • 2
  • Md. Tariq Hasan
    • 2
  • Md. Bellal Hossain
    • 2
    • 3
  • Md. Salim Ahmed
    • 2
  • Faysal Iqbal
    • 4
  1. 1.Department of Electronics and Telecommunication EngineeringBangabandhu Sheikh Mujibur Rahman Science and Technology UniversityGopalganjBangladesh
  2. 2.Electronics and Communication Engineering DisciplineKhulna UniversityKhulnaBangladesh
  3. 3.Faculty of Engineering and Information TechnologiesThe University of SydneySydneyAustralia
  4. 4.Department of Electrical and Electronic EngineeringBangladesh Army University of Engineering and TechnologyNatoreBangladesh

Personalised recommendations