You are on page 1of 20

SECURITY OPERATIONS IN THE PROTECTED

AREA OR LOC WITH WIRELESS SECURED


COMMUNICATION & TRACKING DEVICE
CONTENTS:

 Introduction

 Overview of the project

 Hardware and Software Requirements

 Technical specifications

 Applications

 References

Abstract –
Most of the military organization now takes the help of robots to carry out many risky jobs that
cannot be done by the soldier. These robots used in military are usually employed with the
integrated system, including video screens, sensors, gripper and cameras. The military robots
also have different shapes according to the purposes of each robot. Here the new system is
proposed with the help of low power IOT wireless sensor network to trace out the intruders
(unknown persons) and the robot will take the necessary action automatically. Thus the proposed
system, an Intelligent Unmanned Robot (IUR) using IOT saves human live and reduces manual
error in defense side. This is specially designed robotic system to save human life and protect the
country from enemies.
Robots are specially design for human to make our life easier. Robots are design for various
purposes like military purpose, industry, for home based application. At border different tanks,
missile, guns etc are used by enemy. This cause problem and harm our force or soldiers. For this
a robot is design and developed for military purpose application to protect our army. robots used
to detect its obstacle which is found in its path. If it found any obstacle in its path then using gun
mechanism it will able to shoot that obstacle. For making it multifunctional robot all the actions
perform by user same actions perform by robot using stretch sensor. All these mechanisms are
embedded on the propeller

Keywords – Military robot, IOT Wireless network, Intelligent Unmanned Robot (IUR).

INTRODUCTION
The Kargil Waralso known as the Kargil conflict, was an armed
conflict between India and Pakistan that took place between May and July 1999 in the Kargil
district ofKashmir and elsewhere along the Line of Control (LOC). The conflict is also referred
to as Operation Vijay (Victory inHindi) which was the name of the Indian operation to clear the
Kargil sector.
The cause of the war was the infiltration of Pakistani soldiers and Kashmiri militants into
positions on the Indian side of the LOC, which serves as the de facto border between the two
states. During the initial stages of the war, Pakistan blamed the fighting entirely on independent
Kashmiri insurgents, but documents left behind by casualties and later statements by
Pakistan's Prime Minister and Chief of Army Staff showed involvement of Pakistani paramilitary
forces, led by General Ashraf Rashid. The Indian Army, later on supported by the Indian Air
Force, recaptured a majority of the positions on the Indian side of the LOC infiltrated by the
Pakistani troops and militants. With international diplomatic opposition, the Pakistani forces
withdrew from the remaining Indian positions along the LOC.
The war is one of the most recent examples of high altitude warfare in mountainous terrain,
which posed significant logistical problems for the combating sides.
INDIAN government had to face huge loss because of this war. Human loss , machine loss,
aircrafts, tankers. Indian economy decreased by 38%, cost of all commodities increased, taxes
increased..al together we had to face tremendous loss.

DO WE HAVE SOLUTION FOR THIS ??


YES PREVENTION IS BETTER THAN CURE.
OUR PROJECT IS THE SOLUTION FOR THIS AT THE PROTECTED AREAS AND
LOC (LINE OF CONTROL)
This Project is a IR & camera based security system for protected areas &
borders, which senses the Intruders, trespassers and transfer video to other end.
For confirmation

In this Project, we are going to have an IR Sensor which senses any intruders /
trespassers and will activate the alarm as well as switch on the guns in that
particular place.

In this project we will shoot the intruder when he cross the border, the bullet is
equipped with a gps facility if the intruder escapes the we can track him with
the help of ARM 11 devices or smartphone

It will also activate the Camera, which will start capture the live video and
transmit the same to the receiver end, the smart phone

In the same time it will start gives alarm and the data will transferred through
the RF Transmitter & Receiver to the mobile device

EXISTING SYSTEM AND THEIR PROBLEMS

1. VERY HUGE POPULATION TO SECURE APPROX 140 CRORES


2. VERY LARGE AREA TO GIVE SECURITY APPROX 10,000 KM
3. HORRIBLE CLIMATIC CONDITION ALONG THE BORDER ie
EXTREME HOT , EXTREME COLD, ALWAYS RAINING, FOGGY
CLIMATE MAKES VERY DIFFICULT TO GIVE SECURITY
4. LOSS OF HUMAN LIVES
5. HUGE HUMAR RESOURCE IS REQUIRED APPROX 20K
CRORE PER MONTH
6. NO PROTECTION FROM SURGICAL STIKE
7. NO 360 DEGREE , 24/7 SURVELLIANCE SYSTEM
8. NO MERCILESS SHOOTING FACILITY
9. NO PROTECTION FROM MINES & BOMBS
10. NO LIVE HUMAN DETECTION
11. NO ARTIFICAL INTILLEGIENCE PHOTO GRAPHY
SYSTEM
12. NO IOT BASED NOTIFICATION SYSTEM
13. NO SOLUTION FOR DRUGS(COCAINE, OPIUM ETC )
PENETRATION INTO THE COUNTRY
14. NO SOLUTION FOR SOLDIERS WITHOUT LIMBS

LITERATURE SURVEY

Design and Development of multifunctional Robot for Military purpose Applications[1]

Robots are specially design for human to make our life easier. Robots are design for various
purposes like military purpose, industry, for home based application. At border different types of
tanks, missiles and guns are used by the enemy. This causes problems and will harm our force or
soldiers. To address the above problem a robot is designed and developed for military purpose
application to protect our army. The method involves a biped walking robot using parallel leg
mechanism i.e. PLM which includes different functions like capturing real world data using
digital image processing used to detect its obstacle which is found in its path. The limitations in
the system is that it can move only on plain surfaces, but coming to the sytem fails to perfom the
operation effectively.

Touch screen controlled Defence Robot[2]

The robot system can be built with the existing economic conditions that can be used for
different sophisticated robotic applications. The control system consists of Touch screen and
ZigBee modules, a microcontroller that controls the robot. The system provides continuous
visual monitoring through the wireless camera attached to the robot and sends continuous data to
the control unit. A multifunctional Robot is been designed according to the specifications made
above which uses ZigBee Technology.
Zigbee cannot be used to cover very long distance, it can only deal with low complexities and is
very slow. Due to their low range coverage the current project uses GSM, which is used in
concentrators to transmit data to the main station, or in high end multi-function meters.

IOT based Surveillance Robot[3]

The proposed security solution hinges on our novel integration of camera on Raspberry Pi.
Raspberry Pi operates and controls video camera for surveillance and records video for future
playback. The other major advantage is that it is a simple circuit where particular operating
system has to be installed so that the image can be displayed .

Raspberry Pi consumes more power when compared to a PC using INTEL Pentium 2


processor. The Raspberry Pi’s memory is also limited which is been overcome in the current
proposed system which uses External EEPROM memory AT24C02/4/8/16/32A having high
flexibility in volume. Raspberry Pi uses L293D Driver chip. The disadvantage of this is, it has
a 1.5 voltage drop within the chip. Also, using Raspberry Pi the performance decreases
significantly, it also has less Graphical capabilities and can only be programmed on limited
number of languages.

IOT Based Wireless Multifunctional Robot for Military applications[4]

The project is presenting an IOT Based Wireless multifunctional robot for military application
with Raspberry pi 3 using MQTT protocol and it is done by integrating various sensors,
Cameras, Grippers and actuators into web application using MQTT and HTTP protocol. The
system uses ARDUINO controller.

ARDUINO controller has only 10 bits of resolution which is the disadvantage of it.
RASPBERRY PI 3 consumes more power when compared to any other PC using INTEL
Pentium 2 processor and also have got limited memory. MQTT protocol also has many
disadvantages like SYN attacks, sequence manipulation, amorphous identification, DNS flaws.
Wireless Multifunctional Robot for Military Applications[5]

The system presents a modern approach for surveillance at remote and border areas using
multifunctional robot based on current 3G technology used in defence and military applications.
The robotic vehicle has ability to substitute the solider at border areas to provide surveillance.
The robotic vehicle works both as autonomous and manually controlled vehicle using internet as
communication medium. This multisensory robot used to detect human, bombs, harmful gases
and fire at remote and war field areas.
The robot functionality is been controlled by PIC18F452 controller. The PIC18F452 controller
uses RISC computation, which makes the program lengthy. In the PIC controller program
memory is not accessible and only a single accumulator is present for computations.

ADVANTAGES

ROBUST

A micro controller AT89C52 is used in the proposed system which has many advantages when
compared to ARDUINO. Microcontroller AT89C52 has fast clock speeds and a wonderful
variety of peripherals, making it more robust. On the other end of the spectrum, there are
minuscule devices that can provide long battery life.

EFFICIENT

RASPBERRY PI has a limited amount of memory to save any data in it. The proposed system
uses Microcontroller AT89C52 which has memory space 10 times more than RASPBERRY PI
and is much more efficient.

COST EFFECTIVE
GSM technology has been matured since long and hence are widely used. GSM provides a very
cost effective solution and is easy to maintain due to availability of large number of network
engineers at an affordable cost.

SOCIAL IMPACT

INDIAN government had to face huge loss because of wars and the Indian economy
decreased by 38% due to it. The proposed system replaces soldiers in order to save lives.
The robot strikes fear in intruders mind and decreases the amount of trespassing on the
border.

FUNCTIONING OF INTERNET OF THINGS (IOT)

The Internet of Things is the expansion of the current Internet services so as to accommodate
each and every object which exists in this world or likely to exist in the coming future. This article
discusses the perspectives, challenges and opportunities behind a future Internet that fully supports the
“things”, as well as how the things can help in the design of a more synergistic future Internet. Things
having identities and virtual personalities operating in smart spaces using intelligent interfaces to
connect and communicate within social, environmental, and user contexts. There are several fuzziness
about the concept of Internet of Things such as IoT can be broken in two parts Internet and Things.

The worldwide network of interconnected computer networks based on a standard communication


protocol, the Internet suite (TCP/IP) while a things is an object not precisely identifiable.

The world around us is full of objects, smart objects and the existing service provider known as Internet.
The convergence of the sensors like smart objects, RFID based sensor networks and Internet gives rise to
the Internet of Things. With increased usage of sensors the raw data as well as distributed data is
increasing. Smart devices are now connected to Internet using their communication protocol and
continuously collecting and processing the data. Ubiquitous computing which was thought as a difficult
task has now become a reality due to advances in the field of Automatic Identification, wireless
communications, distributed computation process and fast speed of Internet . From just a data
perspective the amount of data generated, stored and processed will be enormous. We focused on
making this architecture as a sensor based architecture where each sensor node will be as important as
the sensor network itself. Visualizing each sensor as having intelligence is the ultimate aim of any
architecture in the IoT domain

There is a lot of pervasive presence in the human environment of things or objects, described
general overview of internet evolution with several IoT services with the use of radio-frequency
identification (RFID) tags, sensors, actuators, mobile phones, smart embedded devices, etc. – which,
through unique addressing schemes, are able to effectively communicate and interact with each other
and work together to reach a common goal of making the system easier to operate and utilize. The
objects that will be connected will be adaptive, intelligent, and responsive

1. FUTURE VISION OF INTERNET OF THINGS


The Internet of Things is a vision which is under development and there can be many stake
holders in this development depending upon their interests and usage. It is still in nascent stages where
everybody is trying to interpret IoT in with respect to their needs. Sensor based data

collection, data management, data mining and World Wide Web is involved in the present vision. Of
course sensor based hardware is also involved. A simple and broad definition of the internet of things
and the basic idea of this concept is the pervasive presence around us of a variety of things or objects –
such as Radio-Frequency Identification (RFID) tags, sensors, actuators, mobile phones, etc. – which,
through unique addressing schemes, are able to interact with each other and cooperate with their
neighbors to reach common goals. Fig. 2 has been discussion on three particular visions given by.
They are:

• Things Oriented Vision

• Internet Oriented Vision

• Semantic Oriented Vision

A. Things Oriented Vision

This vision is supported by the fact that we can track anything using sensors and pervasive technologies
using RFID. The basic philosophy is uniquely identifying any object using specifications of Electronic
Product Code (EPC) .This technique is extended using sensors. It is important to appreciate the fact that
future vision will depend upon sensors and its capabilities to fulfill the “things” oriented vision. We will
be able to generate the data collectively with the help of sensors, and sensor type embedded system.
The summarized vision will be dependent upon sensor based networks as well as RFID-based Sensor
Networks which will take care of the

integration of technology based on RFID and sophisticated sensing and computing devices and the
global connectivity.

Fig.2 Three main visions of Internet of Things.

B. Internet Oriented Vision


The internet-oriented vision has pressed upon the need to make smart objects which are
connected. The objects need to have characteristics of IP protocols as this is one of the major

protocols being followed in the world of Internet. The sensor based object can be converted in to an
understandable format, which can be identified uniquely and its attributes can be continuously
monitored. This makes the base for smart embedded objects which can be assumed to be a

microcomputers having computing resources.

C. Semantic Oriented Vision

This vision is powered by the fact that the amount of sensors which will be available at our
disposal will be huge and the data that they will collect will be massive in nature. Thus we will have vast
amount of information, possibly redundant, which needs to be processed meaningfully. The raw data
needs to be managed, processed and churned out in an understandable manner for better
representations and understanding. If we are able to make the sets of data into homogeneous and
heterogeneous formats then the interoperability issues of understanding the data will be dependent
upon the semantic technologies to process the data. It is here that needs a generic vision of processing
the raw data in to meaningful data and a marked separation of data and their interpretation.

meaningful inferences to develop a unified picture of the situation for smart applications. This is possible
through large scale sensor networks, data processing and inferences using smart sensing and cloud
computing. The inferences will make the sensors sensible enough to rectify the whole process which in
turn will move towards making the whole process intelligent. The components that make up the WSN
monitoring network include:

• Wireless Sensor Networks hardware - Typically a WSN node contains interfaces to sensors, computing
and processing units, transceiver units and power supply. More sophisticated sensor nodes can
communicate over multiple frequencies

• Wireless Sensor Networks Communication Stack (WSNCS) – The nodes will be deployed in an adhoc
manner. Communication topology will be an important factor for communication through the system of
WSN nodes. There is this communication stack at one central node which will be able to interact with
the connected world through the Internet and which will act as a

gateway to the WSN subnet and the Internet .

• Middleware–This is associated with the internet infrastructure and the concept of service oriented
architecture (SOA) for access to heterogeneous sensor resources as described in. WSNs technological
advances in hardware domain catering to circuits and wireless communications have made robust and
cost effective devices in sensing applications. This has led to the use of sensors in wireless
communication devices in diversified environments. Sensor data is collected and sent for centralized,
distributed or any hybrid processing module for data processing. Hence, there are several challenges
WSN has to face to develop a successful IoT communication networks.

A. Communication Mechanism- 6lowpan Challenges

All the objects that are present in the environment can be called object fit to be the “things” of
the internet. All these objects need an address which must be unique. This uniqueness property will be a
unique constraint and it will pave the way to gather information and even control sensor based devices.
Internet Protocol is the standard based protocol which is used for internetworking methods of Internet.
The first version was IPv4 and was thought of having huge address spaces. But IPv4 got exhausted. smart
embedded devices or simply a sensor. Their communication mechanisms will be Wi-Fi, DSL, Satellite,
Cable, Ethernet and so forth. The typical packet size of the communicating protocol will be around 1500
data bytes to 9000 data bytes and even more. Today large amount of spatial data is also being
generated and thus we can use to use metadata for connecting database and Internet. As happens in
World Wide Web, the operations with sensor nodes may not be possible by giving unique names to the
sensors. Instead a unique address scheme must be formulated and will be known as Unique Resource
Name (URN).A look up table of these URN must be present at the centralized node commonly known as
gateway to the sensor sub system. Thus entire network now forms a web of connectivity from users
(high-level) to sensors (low-level) that is addressable (through URN) accessible (through URL) and
controllable (through Uniform Resource Characteristics - URC) [11]

• Data Storage - As IoT is getting developed the amount of data getting created is huge. The data centers
which will be storing this data will also needs space requirement as well as the energy and power
resources. It is this data which needs to be organized and processed. Semantic

data fusion models will also be required to create meaning out of this data. Artificial Intelligence
algorithms must be applied to extract meaning from this redundant data. Data storage and analysis will
be a challenge when the whole world will be connected through IoT.
• Visualization - Any interaction of user with the environment will need proper visualization software
which will highlight the sensing mechanism as well the interpretation of data scenario too. Touch
screens and smart embedded tablets have created a conductive environment for the system. The
information which is being processed in to meaningful data using sensor fusion

algorithms will present lot many inferences about the current situation.

4. IOT: SERVICES AND APPLICATIONS

Let us look into the possible set of future possibilities which we can have a rewarding
applications. Some of the attributes which can be considered while developing application is highlighted
in which says the network availability, bandwidth, area of coverage, redundancy, user involvement and
impact analysis. Fig.7 mainly focuses on the properties of the RFID, sensors and 6lowpan communication
networks based IoT services.

A. Tracking: People, Inventory and Logistic

The basis of this tracking is indeed RFID tags which are placed on object, human beings, animals,
logistics etc. RFID tag reader may be used in all the intermediate stages for tracking anything which has
the RFID tag in it. This object position identification can be smartly used to trigger an alarm, event or a
specific inference regarding a specific subject.

B. Smart Environment and Enterprise Collection

In any work environment an enterprise based application can come up with the fact that it is
based on smarter environment. Here the individual or the enterprise may give data to outside world on
its own discretion. Smart embedded sensor technology can be used in order to monitor and transmit
critical parameters of the environment. Common attributes of the environment are temperature,
humidity, pressure etc. Smart monitoring of soil parameters can allow informed decision making about
agriculture and increase production of food grains and prevent loss of crops . Water conservation is
huge topic of concern where droughts are frequent. To limit water wastage, smart technology can be
used in water conservation.

C. Smart Unit

Another IoT application which is making waves is the Smart grid and smart metering technology.
The energy consumption can be efficiently monitored in a smart home or in a small office or even a
locality. This model can be extended over a city for better load balancing. The world is fast changing and
now camera based surveillance is high in demand. This surveillance will not only require image
processing but also computer vision. IoT which will be based on video processing is a new technological
challenge to integrate large computation with small embedded device. Smart homes can be developed
where things of daily use will be tracked using sensor enabled technologies.

D. Local, Global and Social Sensing

Imagine a scenario where each of the family members of the family have a RFID enabled gadget
and thus object tracking can result actually in human tracking. This can readily happen in IoT where
common mobile phones can be used for tracking human beings. There can be various types of sensors
based devices which can be used for such type of tracking. This is whole process is known as local, global
and social sensing. The object can be tracked locally, globally and in any place, any time and over any
network.
E. Healthcare Monitoring Applications

Imagine a scenario in a village where old age persons, infants, pregnant ladies etc. have RFID
enabled chips over their bodies to track their vital health parameters. Any unusual activity on their part
will raise an alarm or an alert in the nearby local medical assistance home. For example, RFID chips can
be implanted in patients in order to track their medical history. Sensor technology can be used in
emergency response, and health monitoring applications. The information can be used to give medical
assistance to the needful person and in case of higher abnormalities, the nearby efficient hospitals can
be alerted and thus the hospitalization costs can be reduced through early intervention and treatment.
This is the advantage of smart

healthcare using IoT.

F. Traffic Monitoring

In any city in the world, traffic monitoring is an important part of the smart-city infrastructure.
Normal traffic to highway traffic all requires adequate information about the support and logistics
available on the highway and in turn the system can be made self-reliable and intelligent. Any type of
congestion on roads will ultimately lead to loss of fuel and economic loss. Any foresight on traffic will
always help to improve the whole system. With number of WSN and Sensor enabled communications,
an IoT of traffic will be generated. This will be known as Traffic IoT (TIoT). The information collected from
TIoT can be presented to travelers. The traffic information will be dependent upon the queuing model
on roads and infrastructure of roads itself. This identification of critical road points and present state of
traffic information on

all roads can be provided to the user. However this traffic monitoring application needs to be secure to
prevent any terrorist attack frequent in urban cities.
Live human detection
sensor
Block diagram

mines
MOTOR MOTOR
sensor

Stepper
RELAY Harmful motor
RELAY ULN
gas
sensor

RELAY Microcontroller Kit


DRIVER
Power Supply

IR Sensor Signal
Conditioner Circuit
IrDA Wireless Tx

LASER GUN

Relay
ARM 11 . ANDROID RECEIVER SIDE

GAURDIAN android phone

HARDWARE REQUIREMENTS:

 Power Supply 5v DC - 7805, 7812


 Micro controller - ESP 32
 External EEPROM memory - AT24C02/4/8/16/32A
 Real Time Clock (RTC) - DS1307 (www.Dallas.Com)
 Serial Communication - MAX 232
 L298 H BRIDGE DRIVER
 MOTORS
 CLAMPS
 WHEELS
 STEPPER MOTOR
 LASER GUN
 SURGICAL STRIKE SENSOR
 LIVE HUMAN DETECTION SENSOR
 MINES DETECTION SENSOR
 ULN DRIVER
 CAMERA
 INTRUDER SENSORS
 GPS receiver (with licence).

 Software Requirements

o EMBEDDED C
o ESP 32 COMPILER
o IFFFT
o BLYNK
SPECIAL FEATURES
 WIRELESS MOVEMENTS – FORWARD, REVERSE, RIGHT & LEFT
 360 DEGREE ROTATION – ANY ANGLE FREE MOVEMENTS FOR ALL AXES
 SENSORS – PIR, PIR MOTION SENSOR WHICH SENSES A TRESPASSERS
 SENSORS – ULTRASONIC, OBSTACLE DETECTION & DIRECTION
CHANGING
 WIRELESS SOLUTIONS – RF
 OBSTACLE SENSING AND COLLISION AVOIDANCE
 DIRECTION SENSING
 MECHANICAL MODEL FOR REAL TIME OPERATIONS
 STEPPER MOTOR / STEPPER POWER SUPPLY BOARD
 OPTOCOUPLER WITH STEPPER DRIVER BOARD
 AUTO DIALER
 RS 232 CONVERTERS / POWER SOURCE
 RF RECEIVER / TRANSMITTER MODULE - 433.92 MHZ (FT-COM-RX2),
BANDWIDTH – 4MHz

Conclusion

Merciless bsf is the current area of research where lots of scope exists. Currently this particular
security technique is required by several countries .one such enhancement we are trying to do.
The type of communication technique enhance operation, where the user can control the m from
any part of world by getting live video feedback, compared to earlier robots work like wifi with
constraints have limited, iot and s video camera makes it cost effectives combat robot. This
robotic vehicle with different widely be used as surveillance robot for se c emergency rescue
operations where human and user will be able to alert prior to intruder
The proposed system gives an exposure to design a multifunctional defence robot. This robot has
a widespread industrial, defense applications. The laser gun attached to the robot is an excellent
substitute for the weapons carried by the soldiers. The laser gun can be triggered with the help of
wireless camera. It can be used in a hostage situation to pinpoint the exact location of terrorists
with the help of wireless camera, saving many lives during rescue mission. Another application
is border security system to sense movement of intruder through pir sensor.. The current range of
operations is up to 10m and can be made more sophisticated. Laser gun found to be very accurate
in pointing to the target.

BIBLIOGRAPHY

[1] Bhawana D. Parate and Jagruti J. Shah, “Design and Development of Multifunctional

Robort for Military Purpose Application”, International Journal of Engineering Research

and Applications IJERA ISSN: 2248-9622 International Conference on Industrial

Automation and Computing ICIAC- 12-13th April 2014.

[2] Ramesh Nayak and Mithuna Shetty, “Touch Screen Controlled Defence Robot”, The

IIOAB General, 4th April 2016.

[3] Sweeta Deshmukh, Priyadarshini, Mamta Madhura Deshmukh, Dr.Md.Bakhar, “IOT

Based Surveillance Robot”, 2nd National Conference on Recent Advances in Engineering

and Technology, NCRAET 2017.

[4] Vishal L. Mate, Mayuri B. Borse, KomalPatalpure, BhagyashreePawar, “IoT Based

Wireless Multifunctional Robot for Military Applications IJARIIE-ISSN(O)-2395-4396-

4295”, Vol-3 Issue-2 2017.

[5] Tarunpreet Kaur, Dilip Kumar, “Wireless Multifunctional Robot for Military Applications”
Proceedings of 2015 RAECS UIET Panjab University Chandigarh 21-22nd, December
2015
.

You might also like