Skip to main content

Modeling a Data Rate-Based Peripheral Security System in GNU Radio

  • Chapter
  • First Online:
Book cover Integrated Intelligent Computing, Communication and Security

Part of the book series: Studies in Computational Intelligence ((SCI,volume 771))

Abstract

This chapter proposes a model for a peripheral security system based on data rate and specific signal format, which can also be used for authorization and recognition functions. This arrangement can be used for security management and monitoring of the inside or outside entry in a large peripheral area. Generally, conventional peripheral security systems detect every intruder and report authorization regardless of checking for authenticity. In the proposed method, identification of authorized persons depends upon exchange of certain fixed data rates between the transmitter and receiver modules. Exchange of data is initiated by the first layer of security provided by the IR sensor, and therefore this system can provide better protection from jamming devices or hacking. The proposed model of data rate-based peripheral security is tested and analyzed using an open-source software, GNU Radio.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mali, D. 2017. Role of surveillance in securing cities, Smart Cities Council India.

    Google Scholar 

  2. Liu, J., K. Hao, Y. Ding, S. Yang, and L. Gao. 2017. Moving human tracking across multi-camera based on artificial immune random forest and improved color-texture feature fusion. The Imaging Science Journal 65 (4): 239–251.

    Article  Google Scholar 

  3. Wei, C., J. Yang, W. Zhu, and J. Lv, 2010. A design of alarm system for substation perimeter based on laser fence and wireless communication. In 2010 International Conference on Computer Application and System Modeling, V3-543–V3-546, Taiyuan.

    Google Scholar 

  4. Allwood, G., G. Wild, and S. Hinckley. 2016. Optical fiber sensors in physical intrusion detection systems: a review. IEEE Sensors Journal 16 (14): 5497–5509. 15 July 2016.

    Article  Google Scholar 

  5. Assaf, M., R. Mootoo, S. Das, E. Petriu, V. Groza, and S. Biswas. 2014. Designing home security and monitoring system based on field programmable gate array*. IETE Technical Review 31 (2): 168–176.

    Article  Google Scholar 

  6. Silva, B., M. Khan, and K. Han. 2017. Internet of things: A comprehensive review of enabling technologies, architecture, and challenges. IETE Technical Review.

    Google Scholar 

  7. Chilipirea, C., A. Ursache, D. Popa, and F. Pop. 2016. Energy efficiency and robustness for IoT: Building a smart home security system. In 2016 IEEE 12th International Conference on Intelligent Computer Communication and Processing (ICCP), 43–48, Cluj-Napoca.

    Google Scholar 

  8. Kaur, T., and D. Kumar. 2015. Wireless multifunctional robot for military applications. In 2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS), 1–5, Chandigarh.

    Google Scholar 

  9. Rawat, A., D. Deb, V. Rawat, and D. Joshi. 2017. Methods and Systems for Data Rate Based Peripheral Security, India Patent 201721005324A, 24 February 2017.

    Google Scholar 

  10. Nguyen, D. 2013. Implementation of OFDM systems using GNU Radio and USRP. Master by Research - Engineering: University of Wollongong.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Urvish Prajapati .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Prajapati, U., Reddy, B.S.K., Rawat, A. (2019). Modeling a Data Rate-Based Peripheral Security System in GNU Radio. In: Krishna, A., Srikantaiah, K., Naveena, C. (eds) Integrated Intelligent Computing, Communication and Security. Studies in Computational Intelligence, vol 771. Springer, Singapore. https://doi.org/10.1007/978-981-10-8797-4_37

Download citation

Publish with us

Policies and ethics