An Intelligent Surveillance System Based on IoT for Internal Security of a Nation

An Intelligent Surveillance System Based on IoT for Internal Security of a Nation

Tarun Kumar (CSED, MNNIT Allahabad, Prayagraj, India) and Dharmender Singh Kushwaha (CSED, MNNIT Allahabad, Prayagraj, India)
Copyright: © 2019 |Pages: 30
DOI: 10.4018/IJISP.201907010101

Abstract

Cross border terrorism and internal criminal activities are critical issues for any country to deal with. In India, such types of incidents that breach security are increasing and tracking such incidents depends only on the radio communications and the operations of security agencies. These security agencies face varied challenges to get real-time locations of targeted vehicles, their direction of fleeing, etc. This article proposes a novel application for the automated tracking of the suspicious vehicles in real-time. The proposed application tracks the vehicle based on their registration number, their type, color or RFID tag. The integration of RFID technique in the application reduces the overhead of image processing techniques, thus improving the performance of the application. This article also proposes an approach for vehicle classification. An integrated framework for tracking any vehicle at the request of security agencies is also proposed. Security agencies can track any vehicle in the specific time period by using a user interface application.
Article Preview
Top

1. Introduction

India is facing internal and external security threats from major terrorist activities specific in Jammu and Kashmir. The terrorist outfits are not only targeting military bases and their residences but also the common man. The external security concerns are not difficult as there is deployment of security forces to handle the intruders. In case of internal security, the situation becomes tedious in identification of terrorist among the civilians. Terrorists use civil / fake army vehicles for targeting the armed forces. In such a scenario, terrorists generally inflict causalities. After any incidence, the suspicious vehicles are tracked manually at various checkpoints. The surveillance and monitoring process requires proper coordination and quick response time. Unfortunately, due to the lack of infrastructure and integration of the required technologies, the task becomes more challenging.

1.1. Scenario 1: Vehicle is Recognized Based on RFID Tag

The scenario illustrates a camera and a RFID reader installed 50-100 meters before the main gate of any installation. If all the vehicles belonging to a particular defense station are equipped with the RFID tag, then RFID reader shall read the RFID tag of the vehicle and any vehicle trying to approach this station shall be allowed to do so. The details of the vehicle shall appear on a screen in the security room (Figure 1).

Figure 1.

Vehicle is recognized based on RFID tag

IJISP.201907010101.f01

1.2. Scenario 2: Vehicle Recognition Using License Plate

If the vehicle is not equipped with the RFID tag, then the ANPR module shall read the number plate and the details again displayed on the screen in the security control room (figure 2).

Figure 2.

Vehicle is recognized based on license plate recognition

IJISP.201907010101.f02

1.3. Scenario 3: Vehicle is Unauthorized and Breaks the Barrier

This is the scenario that needs acute care with real time response mechanism. When neither the RFID module nor the ANPR module is able to detect and identify vehicle, an alarm is raised so as to enable the security personals to get alert and take their respective positions (figure 3).

Figure 3.

Vehicle is unauthorized and breaks the barrier

IJISP.201907010101.f03

To tackle and overcome these challenges, one can adopt Intelligent Traffic Surveillance (ITS) System [9-10]. An ITS system processes video streams obtained from roadside CCTV cameras in order to monitor the traffic. The system estimates the traffic flow, speed of the vehicles etc. to manage the traffic. The ITS system is adopted by many developed countries. The ITS system has capabilities to automatic detection and tracking of moving vehicles. The developed countries use ITS system for traffic surveillance i.e. speed violation detection, traffic management [11], tracking of vehicle. The ITS may be used to automate the surveillance process for security forces.

Complete Article List

Search this Journal:
Reset
Open Access Articles
Volume 14: 4 Issues (2020): 1 Released, 3 Forthcoming
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing