Human Intruder Detection using MANET Technology
-
2018-11-26 https://doi.org/10.14419/ijet.v7i4.29.21963 -
MANET, Human Intruder Detection, Arduino Uno -
Abstract
This study focus on MANET as a sensor based system to manage security on the designated area. MANET is a continuously self-configuring, infrastructure-less network of mobile devices connected without wires. MANET is relatively a new technology which people can use it to eradicate missing hardware in computer lab issues. By using MANET it can help us to know the location where there is the activity happen which then we can prevent the activity earlier. In addition, this study using Arduino Uno, a low cost and ARM-based computer on a small circuit board which can detect hardware movement up to 8 meters. Furthermore, o notification on intrusion are through the buzzer. Besides, the technology able to monitor voice, record the footage of intruder, controlling light switch and view room temperature from mobile phone. Therefore, this study can be considering valuable and can be commercialized.
-
References
[1] Gondaliya T P et al, “Intrusion Detection System on MAC Layer for Attack Prevention in MANET†4th ICCCNT – 2013, July 4-6, 2013, Tiruchengoda, India
[2] Jadhav S S et al, “Mobile Ad-Hoc Network (MANET) for Disaster Management†IEEE, 2014
[3] Akshat J et al, “ Smart Surveillance Monitoring System†2017 ICDMAI, pp e 269-273, Zeal Education Society, Pune, India, Feb 24-26, 2017
[4] Xiangzhong Meng et al, “ Human ECG Data Detection System based on ZigBee†IEEE, 2017, pp7265 – 7270
[5] Quwaidar et al, “ Real-time Intruder Surveillance using Low-Cost Remote Wireless Sensorsâ€, 2017, 8th International Conference on Information and Communication Systems (ICICS), Pp 194 – 198.
[6] Mobile Ad-Hoc Network Research,(2013). Retrieved on 3 March 2015 from http://www.definealldefinitions.com
[7] Stream voice, data and video via an "infrastructureless" network. (2012). Retrieved on 3 March 2015 from http://silvustechnologies.com/technology/introduction-to-manet
[8] A Survey of Mobility Models in Wireless Adhoc Networksâ€, (2009). Retrieved on 3 March 2015 from http://www.cise.ufl.edu/~helmy/papers/Survey-Mobility-Chapter-1.pdf
[9] “Selfish Node Detection in Replica Allocation over MANETâ€, (2013). Retrieved on 3 March 2015 from http://www.iosrjournals.org/iosr-jce/papers/Vol13-issue5/B01350713.pdf?id=6594
[10] Jain, Sarthak; Vaibhav, Anant; Goyal, Lovely, "Arduino Uno based interactive home automation system through E-mail," Optimization, Reliabilty, and Information Technology (ICROIT), 2014 International Conference on , vol., no., pp.277,280, 6-8 Feb. 2014.
[11] Aarti and Dr. S.S Tyagi, “Study of MANET: Characteristics, Challenges, Application and Security Attacksâ€, IJARCSSE International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, May 2013.
[12] Mohit Kumar and Rashmi Mishra, “An Overview of MANET: History, Challenges and Applicationsâ€, Indian Journal of Computer Science and Engineering (IJCSE), Vol. 3 No. 1 Feb-Mar 2012.
[13] [12] Mahima C et al, “Review on MANET: Characteristics, Challenges, Imperatives and Routing Protocolsâ€, A Monthly Journal of Computer Science and Information Technology, IJCSMC, Vol. 3, Issue. 2, February 2014, pg.432 – 437
[14] Bo Sun, Kui Wu, Udo W. Pooch, “Zone-Based Intrusion Detection for Mobile Ad Hoc Networksâ€, Journal on Adhoc Networks in gurd conference, Vol.10, No. 7, pp 1179-1190, March 2010.
[15] Tapan P. Gondaliya, Maninder Singh, Lovely Professional University “Intrusion detection System for Attack Prevention in Mobile Ad-hoc Networkâ€, Volume 3, Issue 4, April 2013.
[16] Joseph P. Macker and M. Scott Corson. Mobile ad-hoc networking and the IETF. Mobile Computing and Communications Review, 2(1):9–14,1998.
-
Downloads
-
How to Cite
Ilias, I. S. C., & Azmi, M. K. (2018). Human Intruder Detection using MANET Technology. International Journal of Engineering & Technology, 7(4.29), 162-165. https://doi.org/10.14419/ijet.v7i4.29.21963Received date: 2018-11-28
Accepted date: 2018-11-28
Published date: 2018-11-26