A Survey on the Present State-of-the-Art of Explosives, Detection Methods and Automatic Explosive Detection using Wireless Sensor Network
نویسنده
چکیده
Though the There is ever increasing evidence of increased terrorist activities that spread entire world. In the wake of modern technologies and diversified threats, it is indispensable to comprehend, detect and prevent with reliable countermeasures. In this context detection of explosives is an active research area. Towards this end many detection systems came into existence. The government agencies in various countries are equipped with the devices that can detect explosives. However, often they are bulky in nature and they are publicly visible and expensive. Therefore it is not feasible to use them in the present condition in public places such as railway stations, airports, bus stations and so on. Manual intervention is another problem in the traditional systems. Therefore there is immediate need for the detection of explosives to be incorporated in a mobile network like Wireless Sensor Network (WSN). Since the nodes of WSN can be deployed hidden from public view, such network is an ideal candidate to have real time and automated detection of explosives. The realization of such networks can pave the way for installation at public domains to safeguard lives and property of citizens. Towards this end we review the literature on the present state-of-the-art of explosives, their characterization, detection methods including the usage of Wireless Sensor Networks (WSNs) for automatic and real time explosive detection. This paper gives insights into different insights into explosives and detection methods that can help in further research towards realizing a fool proof system for explosive detection.
منابع مشابه
Unauthenticated event detection in wireless sensor networks using sensors co-coverage
Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...
متن کاملOutlier Detection in Wireless Sensor Networks Using Distributed Principal Component Analysis
Detecting anomalies is an important challenge for intrusion detection and fault diagnosis in wireless sensor networks (WSNs). To address the problem of outlier detection in wireless sensor networks, in this paper we present a PCA-based centralized approach and a DPCA-based distributed energy-efficient approach for detecting outliers in sensed data in a WSN. The outliers in sensed data can be ca...
متن کاملFDMG: Fault detection method by using genetic algorithm in clustered wireless sensor networks
Wireless sensor networks (WSNs) consist of a large number of sensor nodes which are capable of sensing different environmental phenomena and sending the collected data to the base station or Sink. Since sensor nodes are made of cheap components and are deployed in remote and uncontrolled environments, they are prone to failure; thus, maintaining a network with its proper functions even when und...
متن کاملENERGY AWARE DISTRIBUTED PARTITIONING DETECTION AND CONNECTIVITY RESTORATION ALGORITHM IN WIRELESS SENSOR NETWORKS
Mobile sensor networks rely heavily on inter-sensor connectivity for collection of data. Nodes in these networks monitor different regions of an area of interest and collectively present a global overview of some monitored activities or phenomena. A failure of a sensor leads to loss of connectivity and may cause partitioning of the network into disjoint segments. A number of approaches have be...
متن کاملSecuring Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining
Cluster-based Wireless Sensor Network (CWSN) is a kind of WSNs that because of avoiding long distance communications, preserve the energy of nodes and so is attractive for related applications. The criticality of most applications of WSNs and also their unattended nature, makes sensor nodes often susceptible to many types of attacks. Based on this fact, it is clear that cluster heads (CHs) are ...
متن کامل