Abstract
This chapter proposes a model for a peripheral security system based on data rate and specific signal format, which can also be used for authorization and recognition functions. This arrangement can be used for security management and monitoring of the inside or outside entry in a large peripheral area. Generally, conventional peripheral security systems detect every intruder and report authorization regardless of checking for authenticity. In the proposed method, identification of authorized persons depends upon exchange of certain fixed data rates between the transmitter and receiver modules. Exchange of data is initiated by the first layer of security provided by the IR sensor, and therefore this system can provide better protection from jamming devices or hacking. The proposed model of data rate-based peripheral security is tested and analyzed using an open-source software, GNU Radio.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mali, D. 2017. Role of surveillance in securing cities, Smart Cities Council India.
Liu, J., K. Hao, Y. Ding, S. Yang, and L. Gao. 2017. Moving human tracking across multi-camera based on artificial immune random forest and improved color-texture feature fusion. The Imaging Science Journal 65 (4): 239–251.
Wei, C., J. Yang, W. Zhu, and J. Lv, 2010. A design of alarm system for substation perimeter based on laser fence and wireless communication. In 2010 International Conference on Computer Application and System Modeling, V3-543–V3-546, Taiyuan.
Allwood, G., G. Wild, and S. Hinckley. 2016. Optical fiber sensors in physical intrusion detection systems: a review. IEEE Sensors Journal 16 (14): 5497–5509. 15 July 2016.
Assaf, M., R. Mootoo, S. Das, E. Petriu, V. Groza, and S. Biswas. 2014. Designing home security and monitoring system based on field programmable gate array*. IETE Technical Review 31 (2): 168–176.
Silva, B., M. Khan, and K. Han. 2017. Internet of things: A comprehensive review of enabling technologies, architecture, and challenges. IETE Technical Review.
Chilipirea, C., A. Ursache, D. Popa, and F. Pop. 2016. Energy efficiency and robustness for IoT: Building a smart home security system. In 2016 IEEE 12th International Conference on Intelligent Computer Communication and Processing (ICCP), 43–48, Cluj-Napoca.
Kaur, T., and D. Kumar. 2015. Wireless multifunctional robot for military applications. In 2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS), 1–5, Chandigarh.
Rawat, A., D. Deb, V. Rawat, and D. Joshi. 2017. Methods and Systems for Data Rate Based Peripheral Security, India Patent 201721005324A, 24 February 2017.
Nguyen, D. 2013. Implementation of OFDM systems using GNU Radio and USRP. Master by Research - Engineering: University of Wollongong.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Prajapati, U., Reddy, B.S.K., Rawat, A. (2019). Modeling a Data Rate-Based Peripheral Security System in GNU Radio. In: Krishna, A., Srikantaiah, K., Naveena, C. (eds) Integrated Intelligent Computing, Communication and Security. Studies in Computational Intelligence, vol 771. Springer, Singapore. https://doi.org/10.1007/978-981-10-8797-4_37
Download citation
DOI: https://doi.org/10.1007/978-981-10-8797-4_37
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8796-7
Online ISBN: 978-981-10-8797-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)