{"title":"Enhancement of Environmental Security by the Application of Wireless Sensor Network in Nigeria","authors":"Ahmadu Girgiri, Lawan Gana Ali, Mamman M. Baba","volume":110,"journal":"International Journal of Computer and Information Engineering","pagesStart":293,"pagesEnd":300,"ISSN":"1307-6892","URL":"https:\/\/publications.waset.org\/pdf\/10003635","abstract":"
Environmental security clearly articulates the perfections and developments of various communities around the world irrespective of the region, culture, religion or social inclination. Although, the present state of insecurity has become serious issue devastating the peace, unity, stability and progress of man and his physical environment particularly in developing countries. Recently, measure of security and it management in Nigeria has been a bottle-neck to the effectiveness and advancement of various sectors that include; business, education, social relations, politics and above all an economy. Several measures have been considered on mitigating environment insecurity such as surveillance, demarcation, security personnel empowerment and the likes, but still the issue remains disturbing. In this paper, we present the application of new technology that contributes to the improvement of security surveillance known as “Wireless Sensor Network (WSN)”. The system is new, smart and emerging technology that provides monitoring, detection and aggregation of information using sensor nodes and wireless network. WSN detects, monitors and stores information or activities in the deployed area such as schools, environment, business centers, public squares, industries, and outskirts and transmit to end users. This will reduce the cost of security funding and eases security surveillance depending on the nature and the requirement of the deployment.<\/p>\r\n","references":"[1]\tD. Sushma, D. Nandal, and V. Nandal, \u201cSecurity threats in sensor wireless networks\u201d, International Journal of computer science and management studies, vol.11, pp.59-63, 2011.\r\n[2]\tM. Hammoudeh, A. Kurz, E. Gaura, \u201cMuMHR: Multi-path, Multi-hop Hierarchical Routing\u201d, IEEE International Conference on Sensor Technologies and Application, Valencia, Spain. October,2007.\r\n[3]\tC. I. Nwagboso, \u201cSecurity Challenges and Economy of Nigerian State (2007-2011)\u201d. American Journal of Contemporary Research (online). Vol.2(6), pp. 244,2012.\r\n[4]\tO.O. Ewetan, and E. Urhie, \u201cInsecurity and Socio-economic Development in Nigeria\u201d, Journal of Sustainable Development Studies (online). vol. 5(1), pp. 40-63, 2014.\r\n[5]\tA. Oladiran, \u201cSecurity Challenge and Development in Nigeria: Leadership to the Rescue\u201d, International Journal of Academic Research in Public Policy and Governance, vol. 1(1), pp.49, 2014.\r\n[6]\tA. Danbazau, \u201cPoverty Elevation, Security and Stability in Northern Nigeria\u201d, The NMFUK, 22nd Annual Winter Conference, Leicester, UK, December 2012. \r\n[7]\tP. Corke, T. Wark, R. Jurdak, W. Hu, P. Valencia, and D. Moore, (2010) \u201cEnvironmental Wireless Sensor Networks\u201d, in Proc. of the IEEE,2010, paper, 98.11, pp1903-1917.\r\n[8]\tA.k. Darabkh, S.I. Shareen, A. Mohammad, F.J. Iyad, E. Alkhader, and F.A. Mamoun, \u201cPerformance evaluation of Selective and Adaptive Heads Clustering Algorithm over Wireless Networks\u201d, Journal of Network and Computer Application, vol. 35, pp. 2068-2080,2012. \r\n[9]\tP. Bakaraniya, and S. Mehta, \u201cK-LEACH: An Improved LEACH Protocol for Lifetime Improvement in WSN,\u201d International Journal of Engineering Trends and Technology, vol. 4, pp.1521-1526, 2013. \r\n[10]\tG. Sharma, S. Bala, and A.K. Verma, \u201cSecurity framework for Wireless Sensor Networks-Review\u201d 2nd International Conference on Communication Computing and Security, Thapar University, Patiala. India: ICCCS. \r\n[11]\tH. Karl, and A. Willing, Protocols and Architectures for Wireless Sensor Networks\u201d, England: John Wiley & Sons, Ltd., 2007.\r\n[12]\tJ. Amiri, M. Sabaei, and B. Soltaninasab, \u201cA New Energy Efficient Data Aggregation Approach in Wireless Sensor Networks,\u201d Communication and Networks, vol. 4, pp.61-72, 2012. \r\n[13]\tK. Pawar, V. Pawar, and T. Sharma, \u201cEnhancement of LEACH protocol Using Energy Heterogeneity Concept\u201d, Internal Journal of Emerging Trends and Technology in Computer Science, vol. 2(1), pp.49-56. \r\n[14]\tS. Harmandeep, and G. Malik, \u201cApproaches to Wireless Sensor: Security protocols\u201d, World of Computer Science and Information Technology Journal, vol.1 (7), pp.301-306, 2011. \r\n[15]\tS. Singh, and V.H. Kumar, \u201cSecurity for Wireless Sensor Network\u201d, International Journal of Computer Science and Engineering, vol.3, pp.2393-2399. Jun.2011. \r\n[16]\tJ.A. Stankovic. (2008). Wireless Sensor Networks. IEEE Computer Society, vol.41 (10), pp.92-95,2008.\r\n[17]\tPOSTECH (2013) Research Area on WSN and Ad-hoc Networks. Monet Lab (online). \r\n[18]\tA. Nayebi, and H. Sarbazi-Azad, \u201cPerformance Modelling of the LEACH for Mobile wireless sensor Networks\u201d, Journal of Parallel and Distribution Computing, vol.71, pp.812-821, 2011.\r\n[19]\tJ. Lee, K. Kapitanova, and S.B. Son, \u201cThe price of security in wireless sensor networks\u201d, Computer Networks, vol. 54(1), pp.2967-2979, 2010. \r\n[20]\tL. Doherty, J. Simon, and T. Watteyne, \u201cWireless sensor Network Challenges and Solutions\u201d, Microwave Journal, Vol.5, pp. 22-34,2012.\r\n[21]\tK. Sohraby, D. Minoli, and T. Znati, \u201cWireless sensor Networks: Technology, Protocol, and Applications\u201d New Jersey: John Wiley & Son, Ltd.,2007.\r\n[22]\tB. Sun, Y. Xian, C. Chung, H. Chen, and T.A. Yang, (2008) \u201cSecurity Co-existence of Wireless Sensor Networks and RFID for Pervasive Computing\u201d, Computer Communication, vol.31(1), pp.4294-4303, 2008.\r\n[23]\tM. Bloznellis, J. Jaworski, and K. Rybarczyk, (2008) \u201cComponent Evaluation in a Secure Wireless Sensor networks\u201d An International Journal of Networks, vol.53(1), pp.19-26, 2008.\r\n[24]\tS. Waware, N.D. Sarwade, P. Gangurde, \u201cA Review of Power Efficient Hierarchical Routing Protocols in Wireless Sensor Networks\u201d International Journal of Engineering,2012\r\n[25]\tV.M. Potdar, and A.J.D. Rathnayaka, \u201cWireless sensor network transport protocols: review, Journal of computer networks and application, vol.36(1), pp.134-146, 2013.\r\n[26]\tFu, Z. Jian, E. Weiw, and A. Wei, \u201cAn Energy-balanced Algorithm of LEACH protocol in WSN. Internal Journal of Computer Science (online). 10(1), pp.354-359,2013. \r\n[27]\tM. El-Sadaawy, and E. Shaaban, \u201cEnhancing S-LEACH Security for Wireless Sensor Network\u201d, International Conference on Electro\/Information Technology, Indianapolis, I EEE computer society, May, 2012.\r\n[28]\tX. Ma, and X. Yu, \u201cImprovement on LEACH protocol of Wireless Sensor Network\u201d in Proc. 2nd International Symposium on Computer, Communication, Control and Automation, Paris, France, ISCCCA 2013.\r\n[29]\tM. Hammoudeh, R. Newman, and S. Mount, \u201cAn Approaches to Data Extraction and Visualisation for Wireless Sensor Networks\u201d, 8th IEEE International Conference on Networks, Gosier, Guadeloupe, March,2009. \r\n[30]\tS. Tyagi, and N. Kumar, \u201cA systematic review and clustering routine techniques based upon LEACH Protocol for wireless sensor networks\u201d, Journal of networks and Computer and Application, 2012. ","publisher":"World Academy of Science, Engineering and Technology","index":"Open Science Index 110, 2016"}