Comments (0) Cite this document
Wireless Sensor Networks, WSN, is an emerging technology that uses distributed sensors with a communications infrastructure to monitor or record environmental conditions. They are being widely applied in security, military, and agriculture owing to their automated ability to…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.8% of users find it useful
Read TextPreview


Download file to see previous pages Borders are critical features of any state since they define territory. Individualterritories on the other hand have specific rules and acceptable ways of conduct which must be protected. As such, it is important that borders should be protected so as to keep away intruders such as illegal immigrants, smugglers, and terrorists. WSNs are being embraced in surveillance because they are cheaper and more effective as compared to traditional surveillance methods such as radar or satellite (Wang &Guo 358).
Wireless border control sensor network architecture is made up of three main components: sensor nodes, gateways, and task managers. Sensor nodes are the components at the end of the architecture which capture the data at the border (through sensing). They are also referred to as the sink, source, or actuators. As such, movement for example at unauthorized areas can be sensed from the sensor nodes. Several sensors are situated differently and are usually interconnected. The sensor nodes may do some calculations before transmitting the data at the border though a gateway (Kalita, &Kar 2).
Gateways on the other hand are proxies for the wireless border control systems. They allow the system administrators to interface Motes to some relay points such as personal digital assistants and personal computers for monitoring. In short, all the interconnected sensor nodes relay their information to the administrator through the same proxy (gateway) (Maharrey, Lim, &Gao 7). Gateways may be active (allow nodes to actively relay data to the system (gateway server), passive (allows gateway to send requests to sensor nodes), or hybrid (performs tasks of both active and passive gateways) (Villegas, Tang, &Qian 4).
The task managers are the receiving ends of the wireless border control sensor network architecture. After the sensor notes acquire information from the ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
Retrieved from
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Wireless Security

...?WIRELESS SECURITY Wireless Security affiliation Table of Contents TECHNOLOGY INVOLVED IN WIRELESS NETWORKS 4 WIRELESS TECHNOLOGY:FUTURE TRENDS 5 COMPANIES INVOLVED IN WIRELESS TECHNOLOGY 7 REGULATORY ISSUES IN WIRELESS NETWORK 8 Piggybacking 8 Wardriving 9 Unauthorized Computer Access 9 Evil Twin Attacks 9 Wireless Sniffing 10 Shoulder Surfing 10 WIRELESS SECURITY MANAGEMENT 11 Wireless Network should be Invisible 11 Wireless Network should be renamed 11 Network Traffic should be encrypted 12 Administrator Password should be Changed 12 Online Awareness 12 Connect Using a VPN 13 Disable File Sharing 13 CONCLUSION 14 REFERENCES 14 INTRODUCTION Wireless networking offers wonderful advantages and opportunities to get easy access... to printer...
12 Pages(3000 words)Research Paper

Wireless security

...and secure than before. Categories of Wireless Security Protection There are three main categories of wireless security protection, which include access control, wired equivalent privacy, and authentication. All of these serve the purpose of protecting the networks from unauthorized outside accesses. Of all these three types of protections, the one, which I feel more secure than the others, is access control. Smith (n.d.) states, “Access control systems are physical or electronic systems which are designed to control who has access to a network”. It is basically a process in which administrator of a...
2 Pages(500 words)Essay

Wireless Network Security

...Wireless Network Security Introduction At the present, a user can use a notebook computer, laptop, Personal Digital Assistance PDA), or a mobile phone with a wireless network connection in order to use internet at any time and at any location where wireless signals are accessible (Weber and Bahadur; Makker). In other words, wireless networking has become a well liked trend that is heavily adopted by the businesses as well as individuals. In this scenario, wireless network security is a promising topic that covers a lot...
8 Pages(2000 words)Research Paper

Wireless Network Security - Cloud Computing Network

...; this has given the passion to venture into security measures in the field of computing rather than dwelling on my line of specialization-data structure. Much has been done to improve and enhance data network; but there are those who are out to see the failure of the development. These are the individuals out to hack others data sources and cause harm or use it for unintended tasks. Any individual within a geographical network range of an open, unencrypted wireless network can snuffle, record or even capture the data traffic and get illegal right of entry to the internal network wherewithal and the internet. (Lou, et al....
3 Pages(750 words)Personal Statement

Adopting Linear Wireless Sensor Networks for Border Monitoring

...through manual means of physical check posts or the placing of an entire military unit. Technology has made things easier. The best form of border surveillance involves minimal human intervention which comes in form of installing of wireless sensor networks that detect the motion in the vicinity and respond accordingly. The border monitoring is done in various forms through use of technology. It is either done in form of satellite monitoring, or the cameras attached to the sensors, or in form of towers and other material being installed across the borders which serve as concrete obstacles and at times...
8 Pages(2000 words)Literature review

Wireless Security

...? Wireless Security Introduction Recently, wireless networking has become more affordable, available and easy to use. Wireless technology is becoming more common especially in homes where it has been greatly adopted. A wireless network involves the access of internet by computers without using any cables or wires. This method is convenient because one can work from anywhere in the house or in his business using his or her laptop. It also makes it possible to connect various computers to the internet, which does not require the use of many disorganized wires or cables as can be in wired networks (, 2012). Wireless local area networks (WLANs) have become explosively popular, which have dramatically altered the way... in which...
7 Pages(1750 words)Research Paper

Wireless Network Security

..., a hacker can capture subversion of an access point in order to collect decrypted information such as encryption keys. Disconnecting the affected from the network is an issue (Security Issues in Wireless Sensor Networks. 2010). Similarly, Sybil attack can be prevented by incorporating encryption and authentication mechanisms that can protect external threats within the wireless network. However, if any intruder enters within the network, there is no security mechanism to prevent it. Moreover, if the intruder uses globally shared keys, any node on the network can be accessed. Cryptography can eliminate Sybil attacks and at the same time is not a cost effective solution. Furthermore, another solution is to equip every wireless node... be...
7 Pages(1750 words)Essay

Wireless security

...of the activities performed over the internet every user wants privacy and security. Security of the connection ensures the integrity and originality of the data and assures the user that his information is safe. Wireless connection employ the use of radiowaves for communication and flow of data between the devices. These radiowaves can easily be tapped, intercepted and the information can be read or stolen and even in some case altered and manipulated hence raising the concern of data integrity and originality. Facing the threats that came with the increasing and rapid growth in the number of users of wireless technology the requirements for...
2 Pages(500 words)Essay

Wireless network design

...the building where waves bound back from reflective surfaces hence cause interference. Having many access point at the same point causes interference too. To solve the reflective waves interference, antennas are used to collect the weak signals amplify them and transmit them to the destination. Other devices such as the cellular phones microwaves and Bluetooth devices which operate in the same spectrum as wireless may cause interference. Techniques such as Direct Sequence Spread Spectrum (DSSS) and frequency hopping spread spectrum (FHSS) are used to overcome these challenges. 2. Wireless security This is a concern not only for...
6 Pages(1500 words)Essay


...BORDER SURVEILLANCE USING WIRELESS SENSOR NETWORK Introduction Border patrol systems have lately got interest to tackle the concerns regarding national security. The main challenge in shielding lengthy stretches of borders is the requirement for exhaustive human participation in patrolling the grounds. Conventional boundary patrol system comprises security checkpoints along with border troops. The protection checkpoints are built on the international roads in which all vehicle traffic is halted to detect and arrest unlawful aliens, drugs, in addition to other illegal...
1 Pages(250 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic BORDER SECURITY USING WIRELESS SENSOR NETWORK for FREE!

Contact Us