Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30077
Enhancement of Environmental Security by the Application of Wireless Sensor Network in Nigeria

Authors: Ahmadu Girgiri, Lawan Gana Ali, Mamman M. Baba

Abstract:

Environmental security clearly articulates the perfections and developments of various communities around the world irrespective of the region, culture, religion or social inclination. Although, the present state of insecurity has become serious issue devastating the peace, unity, stability and progress of man and his physical environment particularly in developing countries. Recently, measure of security and it management in Nigeria has been a bottle-neck to the effectiveness and advancement of various sectors that include; business, education, social relations, politics and above all an economy. Several measures have been considered on mitigating environment insecurity such as surveillance, demarcation, security personnel empowerment and the likes, but still the issue remains disturbing. In this paper, we present the application of new technology that contributes to the improvement of security surveillance known as “Wireless Sensor Network (WSN)”. The system is new, smart and emerging technology that provides monitoring, detection and aggregation of information using sensor nodes and wireless network. WSN detects, monitors and stores information or activities in the deployed area such as schools, environment, business centers, public squares, industries, and outskirts and transmit to end users. This will reduce the cost of security funding and eases security surveillance depending on the nature and the requirement of the deployment.

Keywords: Wireless sensor network, node, application, monitoring, insecurity, environment.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1339103

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1357

References:


[1] D. Sushma, D. Nandal, and V. Nandal, “Security threats in sensor wireless networks”, International Journal of computer science and management studies, vol.11, pp.59-63, 2011.
[2] M. Hammoudeh, A. Kurz, E. Gaura, “MuMHR: Multi-path, Multi-hop Hierarchical Routing”, IEEE International Conference on Sensor Technologies and Application, Valencia, Spain. October,2007.
[3] C. I. Nwagboso, “Security Challenges and Economy of Nigerian State (2007-2011)”. American Journal of Contemporary Research (online). Vol.2(6), pp. 244,2012.
[4] O.O. Ewetan, and E. Urhie, “Insecurity and Socio-economic Development in Nigeria”, Journal of Sustainable Development Studies (online). vol. 5(1), pp. 40-63, 2014.
[5] A. Oladiran, “Security Challenge and Development in Nigeria: Leadership to the Rescue”, International Journal of Academic Research in Public Policy and Governance, vol. 1(1), pp.49, 2014.
[6] A. Danbazau, “Poverty Elevation, Security and Stability in Northern Nigeria”, The NMFUK, 22nd Annual Winter Conference, Leicester, UK, December 2012.
[7] P. Corke, T. Wark, R. Jurdak, W. Hu, P. Valencia, and D. Moore, (2010) “Environmental Wireless Sensor Networks”, in Proc. of the IEEE,2010, paper, 98.11, pp1903-1917.
[8] A.k. Darabkh, S.I. Shareen, A. Mohammad, F.J. Iyad, E. Alkhader, and F.A. Mamoun, “Performance evaluation of Selective and Adaptive Heads Clustering Algorithm over Wireless Networks”, Journal of Network and Computer Application, vol. 35, pp. 2068-2080,2012.
[9] P. Bakaraniya, and S. Mehta, “K-LEACH: An Improved LEACH Protocol for Lifetime Improvement in WSN,” International Journal of Engineering Trends and Technology, vol. 4, pp.1521-1526, 2013.
[10] G. Sharma, S. Bala, and A.K. Verma, “Security framework for Wireless Sensor Networks-Review” 2nd International Conference on Communication Computing and Security, Thapar University, Patiala. India: ICCCS.
[11] H. Karl, and A. Willing, Protocols and Architectures for Wireless Sensor Networks”, England: John Wiley & Sons, Ltd., 2007.
[12] J. Amiri, M. Sabaei, and B. Soltaninasab, “A New Energy Efficient Data Aggregation Approach in Wireless Sensor Networks,” Communication and Networks, vol. 4, pp.61-72, 2012.
[13] K. Pawar, V. Pawar, and T. Sharma, “Enhancement of LEACH protocol Using Energy Heterogeneity Concept”, Internal Journal of Emerging Trends and Technology in Computer Science, vol. 2(1), pp.49-56.
[14] S. Harmandeep, and G. Malik, “Approaches to Wireless Sensor: Security protocols”, World of Computer Science and Information Technology Journal, vol.1 (7), pp.301-306, 2011.
[15] S. Singh, and V.H. Kumar, “Security for Wireless Sensor Network”, International Journal of Computer Science and Engineering, vol.3, pp.2393-2399. Jun.2011.
[16] J.A. Stankovic. (2008). Wireless Sensor Networks. IEEE Computer Society, vol.41 (10), pp.92-95,2008.
[17] POSTECH (2013) Research Area on WSN and Ad-hoc Networks. Monet Lab (online).
[18] A. Nayebi, and H. Sarbazi-Azad, “Performance Modelling of the LEACH for Mobile wireless sensor Networks”, Journal of Parallel and Distribution Computing, vol.71, pp.812-821, 2011.
[19] J. Lee, K. Kapitanova, and S.B. Son, “The price of security in wireless sensor networks”, Computer Networks, vol. 54(1), pp.2967-2979, 2010.
[20] L. Doherty, J. Simon, and T. Watteyne, “Wireless sensor Network Challenges and Solutions”, Microwave Journal, Vol.5, pp. 22-34,2012.
[21] K. Sohraby, D. Minoli, and T. Znati, “Wireless sensor Networks: Technology, Protocol, and Applications” New Jersey: John Wiley & Son, Ltd.,2007.
[22] B. Sun, Y. Xian, C. Chung, H. Chen, and T.A. Yang, (2008) “Security Co-existence of Wireless Sensor Networks and RFID for Pervasive Computing”, Computer Communication, vol.31(1), pp.4294-4303, 2008.
[23] M. Bloznellis, J. Jaworski, and K. Rybarczyk, (2008) “Component Evaluation in a Secure Wireless Sensor networks” An International Journal of Networks, vol.53(1), pp.19-26, 2008.
[24] S. Waware, N.D. Sarwade, P. Gangurde, “A Review of Power Efficient Hierarchical Routing Protocols in Wireless Sensor Networks” International Journal of Engineering,2012
[25] V.M. Potdar, and A.J.D. Rathnayaka, “Wireless sensor network transport protocols: review, Journal of computer networks and application, vol.36(1), pp.134-146, 2013.
[26] Fu, Z. Jian, E. Weiw, and A. Wei, “An Energy-balanced Algorithm of LEACH protocol in WSN. Internal Journal of Computer Science (online). 10(1), pp.354-359,2013.
[27] M. El-Sadaawy, and E. Shaaban, “Enhancing S-LEACH Security for Wireless Sensor Network”, International Conference on Electro/Information Technology, Indianapolis, I EEE computer society, May, 2012.
[28] X. Ma, and X. Yu, “Improvement on LEACH protocol of Wireless Sensor Network” in Proc. 2nd International Symposium on Computer, Communication, Control and Automation, Paris, France, ISCCCA 2013.
[29] M. Hammoudeh, R. Newman, and S. Mount, “An Approaches to Data Extraction and Visualisation for Wireless Sensor Networks”, 8th IEEE International Conference on Networks, Gosier, Guadeloupe, March,2009.
[30] S. Tyagi, and N. Kumar, “A systematic review and clustering routine techniques based upon LEACH Protocol for wireless sensor networks”, Journal of networks and Computer and Application, 2012.