You are on page 1of 13

A Conference Paper

On
KIDNAPPERS AND ROBBERS THREAT-ALERT INTELLIGENT SYSTEM WITH
IOT WEARABLE AND GPS TRACKER: A CONCEPTUAL DESIGN

1
Onuora, Augustine. C., 2Eziechina Malachy A., 3Osuesu B. O., 4Chikezie Uche M.

1,2
Department of Computer Science,
Akanu Ibiam Federal Polytechnic Unwana,
Afikpo -Ebonyi State - Nigeria.
3,4
Department of Electrical / Electronics Engineering Technology
Akanu Ibiam Federal Polytechnic Unwana,
Afikpo -Ebonyi State - Nigeria.

1
aconuora@akanuibiampoly.edu.ng, 2meziechina@gmail.com,
3
boosuesu@akanuibiampoly.edu.ng, 4uchedimkpagu@gmail.com
Abstract

An era marked by unprecedented technological advancements, personal safety and security


remain paramount concerns. The ability to integrate and monitor almost anything with a
sensor using the internet is no longer news. Crimes like kidnapping and robbery can be
decreased with the help of this cutting-edge computing area called IOT. This innovative
system amalgamates Internet of Things (IoT) technology, wearable devices, and GPS
tracking capabilities to create a comprehensive solution for enhancing individual safety and
security. The proposed system is designed to proactively identify and respond to potential
threats or emergencies that individuals may encounter in their daily lives. It leverages IoT-
enabled wearable devices, such as smartwatches or wearables integrated into clothing, to
continuously monitor various vital signs and environmental parameters. These wearables can
detect anomalies in heart rate, body temperature, movement patterns, and even ambient air
quality, which may indicate distress or danger. This research examined various design
concept that can be applied to create an efficient threat alert system using IOT and GPS. The
research technique highlighted potential ways of mitigating such crime using pertinent data
that was acquired. Other barriers to successfully implementing this system were also taken
into account.

Keywords: IOT, Design, Sensor, kidnap, Robbery, Internet, Network, Security, GPS

1
1.0 Introduction

With its unprecedented opportunities for connectivity and data use, the Internet of Things
(IoT) has emerged as a game-changer in the computing industry (Shackelford, 2020). An era
in which almost everything can be connected to and monitored over the internet has arrived
as a result of the capacity to integrate sensors into diverse items and settings (Ferrero Martn,
2019). This study looks on the use of IoT to prevent crimes like robbery and kidnapping. This
study aims to shed light on the potential of the Internet of Things (IoT) to lower crime rates
and contribute to peace, unity, and progress in the post-election era, with a particular focus on
Nigeria, a country dealing with issues of urbanisation, unemployment, social media
influence, and weakly enforced criminal laws. (Fergusson, 2016 & Onuora et al., 2017).

In essence, a crime is an act that is forbidden by the law. It is a highly complicated


occurrence that is impacted by the local culture and does not arise as a result of a single
cause. For the same reason, many of things that are forbidden in one nation but permitted in
another. Alcohol drinking, which is prohibited in Muslim nations but permitted everywhere
else, serves as an example. As cultures evolve, so do people's perceptions of what constitutes
crime. Because of this, there may be different causes of crime that vary according on the type
of crime, when and where it occurs, and other factors (McGuire et al., 2021).

The impact of social media on criminal behaviour is significant. By giving a platform for
communication, coordination, recruiting, and even cyberbullying, it can intensify criminal
activity. Social media is a crucial component in the changing face of crime because criminals
use its anonymity and reach to commit illicit acts. (Olajimbiti, 2022)

According to Mahmood (2022), social media has revolutionised connectivity and


communication, but it has also turned into a double-edged sword by promoting a variety of
criminal acts. In order to address these issues and improve cybersecurity safeguards, a
multifaceted strategy comprising social media firms, law enforcement, and user education is
needed.

According to McNamara et al., (2019), Ineffective criminal law enforcement can also make
social inequality worse. Because they lack sufficient legal safeguards, marginalised
populations frequently suffer the consequences of such failures because they may be
disproportionately targeted by criminals and law enforcement. Governments and law
enforcement organisations must devote sufficient funds, upgrade training, and foster
coordination to address this issue and guarantee that criminal laws are applied consistently
and equitably. An environment where people can trust that their rights will be upheld and
criminals will be held accountable for their actions is one where criminal laws are more
strictly enforced (Maculan & Gil Gil, 2020).

2
2.0 Literature Review

By finding a solution to the geodetic second-order design (SOD) problem, Odam et al.,
(2021) opined that the selection of the best GPS baselines can be accomplished. Basically,
there are two methods to choose from when choosing the best baselines in a GPS network:
conventional methods and artificial methods. The analytical method and the trial-and-error
method are examples of traditional procedures, whereas local and global optimisation
techniques are examples of artificial methods. The best GPS baselines to measure in the field
in the current investigation have been chosen using BOA because they will meet the posited
criterion matrix and be reasonably priced. On a GPS network, it has undergone testing. Due
to the BOA's excellent precision.

The concept of integrated onboard navigation systems using GPS for commercial launch
vehicles was taken into consideration by Zosimovych (2015) in a study, mathematical models
of its components were developed for various design structure and composition variants. The
technological challenge of conceptually designing an integrated navigation system for a space
launch vehicle capable of placing small artificial Earth satellites into low and medium
circular orbits while utilising GPS technologies has been established and simulated.

Chit, (2021) described that in hospital, when specimen are collected from patients, Instead of
using a test tube to log patient data, RFID is used in this work. The restrictions caused by
utilising the barcode labels are removed by this method. The test tube-mounted RFID tag
features a memory to record patient data that may be updated with the aid of an RFID reader.
Test tubes are stored in a specimen transport cooler box while being transported from one
department to another to preserve their quality at the right temperature and humidity.
Additionally, an IoT sensor and GPS system are used inside the cooler box to offer position
monitoring, temperature and humidity readings, and other data that can be accessed via a
cloud platform. In conclusion, the newly proposed RFID, GPS, and IoT technologies for
medical specimen logistic system can create a better and more user-friendly system for
specimen management.

Bhardwaj et al., (2023) in their paper discussed wearable tracking devices that school-aged
children can wear. It doesn't require any expensive equipment to function. People with all
levels of education can use this technology. Two buttons are present: an alarm button and a
panic button. Making sure the child can reach their parents in an emergency is the main goal
of this device. The child can warn their parents to an emergency and provide them a location
update by pressing the alert button. Today's technology for communication uses Bluetooth,
WI-FI, and RFID. Due to their limited service area, these technologies make it difficult to
converse over long distances. They are also not very accurate. This device uses GSM
technology to resolve the problem. The device's latitude and longitude can be found without
the parents having to enter any extra codes. If a child has to let his or her parents know where
they are right now in an emergency. There are two ways for a child to let their parents know
if they are uncomfortable. By pressing the alert button on the child's device, the parent or
guardian's cell phone receives the alarm message via SMS. If the child needs to contact the

3
parent right away, the panic button on the device also allows a call to be placed, allowing the
child to speak with the parent in real time.

Crime against children has increased over the past few years throughout the world, and
parents constantly worry about their kids anytime they are outside. Children's monitoring and
surveillance have so become extremely important. This study introduces a parent module and
child module-based outdoor IoT tracking system. The child module tracks the location of the
child in real time and sends that data to a cloud-based database, which then sends it to the
parent module (which is portrayed as a mobile application). The application displays this
information as a location on Google maps. Samaan (2019) highlighted that along with a few
other features, the mobile application is made specifically for this use. A GSM/GPS module
on a shield and a Raspberry Pi Zero Wireless are used to provide mobile connectivity, the
internet, and position information. A path from the parent's present location to the child's
location is displayed on a map in the implementation results for the suggested system, which
demonstrate what happens when the youngster exits a pre-set safe area.

Sharanya & Prasad (2020), stated that as more crimes against children and women are being
recorded today, the protection and tracking of children and women is a serious concern. In
order to assist parents in finding and keeping an eye on their kids, a smart IoT device for
tracking and protecting women and children has been designed. The system is created
utilising an embedded ONE board with GPS and GSM modules. The work is innovative in
that when a kid or woman needs rapid attention in an emergency, the system instantly notifies
the parent or carer by sending an SMS. The parameters for the same, including buttons to call
from the smartphone and send a location through SMS, are plotted. The aforementioned
mechanism guarantees the security and monitoring of women and children.

Siraj (2019), in this thesis, ARCTIC (An IoT based system for child tracking in Daycare) is
proposed and developed as a method to track kids on field trips. ARCTIC was created with
the teachers who would be working with the kids in it in mind. The Arctic prototype system
is also shown in this thesis as a way to track kids on field excursions using BLE technology.
A trilateration-based Android software was created to gather the beacon distance from
neighbouring beacons coming from instructors' smartphones in order to determine the relative
location of a child when they depart the maximum specified distance. An evaluation of the
system's user experience was done lastly through a user research.

3. Design Methodology

The approach that will be used is to figure out how to create a conceptual design for GPS and
IoT.A network of satellites known as NAVSTAR (Navigation Satellite Timing and Ranging)
provide GPS services. Both the military and citizens use it for navigation. The space segment,
the control segment, and the user segment are the three segments that make up the GPS
system. The GPS segments are depicted in Figure 1.

4
Fig. 1 The three segments of GPS (Bhardwaj et al., 2023)

All the three segments are described in detail as follow,The space segment: The GPS space
segment consists of constellation of minimum 24 operational satellites. This 24satellites core
constellation ensures that the GPS receivers can view at least 4 satellites from any point on
the planet.The satellites in the GPS constellation are arranged in six orbital planes which are
equally spaced. Each orbital planeconsists of four satellites. All these satellites fly in the
MEO (Medium Earth Orbit) at an altitude of about 20,200 kmfrom the surface of the earth.
Presently there are 27 operational satellites. The extra three satellites improve the
GPSperformance but are not considered part of the core constellation.

The satellite signal received by the GPS receiver consist of satellite orbital and clock
information, information and status concerning all the satellites and a globalionospheric
model for ionospheric error correction. The satellite signals are timed using highly accurate
atomic clocks. Control segment: The control segment controls the satellites. The control
segment consists of global network of ground facilities that track the GPS satellites, monitor
their transmission, perform analysis and then provide them with fcorrected orbital and clock
information. The current operational control segment consists of a Master Control
Station(MCS), an alternate master control station, four ground antennas and six monitor
stations. The monitor stationscontinuously receive the data from the satellites and then send
that information to the master control station. The mastercontrol station receives navigation
information from the monitor stations, corrects the satellite data and sends thisinformation to
the GPS satellites using the ground antennas

5
Users Segment: GPS receivers used by both the military and the general public make up the
user segment. The GPS receiver can be installed on the car or carried in one's hand. To
determine a precise position and navigational parameters, the receiver analyses the GPS
satellite signal. All GPS users are included in the User Segment. A GPS antenna and GPS
receiver with an integrated microprocessor or navigator make up the user equipment.

HOME
APPLIANCE

HEALTH
CARE

INDUSTRY

IOT

AGRICULTU
RE

SCHOOL

SECURITY

Fig2 : IoT Technology Topology

With the development of technology, devices may now communicate with one another via
human-to-machine (H2M) and machine-to-machine (M2M) networks. The Internet of Things
(IoT) is a network of objects or devices that have been interconnected and are operating as a
unit via wired or wireless internet connections and are embedded with sensors, actuators, and
other technologies. Sensors, actuators, embedded systems, and wireless sensor networks
collectively make up the Internet of Things (IoT). IoT is being used in consumer, industrial,
logistics, security, healthcare, and smart environment applications.

ZigBee, Bluetooth Low Energy (BLE), Z-Wave, Near Field Communication (NFC), Internet
Protocol Version 6 (IPv6), Low Power Wireless Personal Area Networks (6LOWPAN), and
Bluetooth Low Energy (BLE) are just a few of the protocols that the Internet of Things uses
to interact with smart things.

In this study, we introduced a box-integrated Internet of Things network. This device is made
up of four physically distinct modules in order to meet the IoT network requirements for

6
small size, light weight, low cost, low power consumption, multifunctionality, and
extensibility:

• Power module
• processing module
• communication module and
• sensor/actuator module.
To track a victims's location in real time, we are creating a technology that can be worn as a
wearable. Additionally, it need to make it possible for victims to transmit signal in an
emergency. Therefore, we will take the following few steps to complete both of these
operations:

Fig 3 : Architecture of IOT / GPS System

7
Fig 4: Sequence diagram

4. Mitigating Crime through IoT and GPS Tracking

The role of IoT wearables and GPS tracking functionalities in crime prevention is significant,
offering innovative tools to enhance public safety and law enforcement efforts. Here's a
detailed exploration of their contributions: (Byun et al., 2014), (Tundis et al., 2020) and
(Sadhana et al., 2022).

4.1. Offender Monitoring:

IoT wearables, such as ankle monitors or electronic monitoring devices, are used to track
individuals on probation, parole, or house arrest. GPS tracking functionalities within these
wearables enable authorities to monitor the movements of offenders in real-time. This deters
individuals from violating the terms of their release, reduces recidivism, and promotes
compliance with the law.

4.2. Victim Safety:

Wearable IoT devices can serve as personal safety tools. In cases of emergency, victims can
activate these devices to send distress signals, including their precise location, to law
enforcement or emergency services. This immediate response capability can be crucial in
situations such as domestic violence or abduction, enabling swift intervention (Onuora et al.,
2023) .

8
4.3. Law Enforcement Efficiency:

GPS tracking functionalities enable law enforcement agencies to monitor the location of their
personnel and assets, improving situational awareness and response times. Officers equipped
with IoT wearables can coordinate their efforts more effectively during emergencies or
criminal investigations.

4.4. Evidence Gathering:

GPS tracking data from IoT wearables can serve as valuable evidence in criminal
investigations. Location history and movement patterns can help establish timelines,
corroborate witness testimonies, or identify suspects and their alibis.

4.5. Missing Persons Cases:

IoT wearables equipped with GPS tracking are instrumental in locating missing persons,
particularly individuals with cognitive impairments, children, or elderly individuals prone to
wandering. These devices can expedite search and rescue operations, increasing the chances
of a successful outcome.

4.6. Crime Hotspot Analysis:

Data collected from GPS tracking functionalities can be used to analyze crime hotspots and
trends. Law enforcement agencies can identify areas with high criminal activity, enabling
them to allocate resources more effectively and implement targeted crime prevention
strategies.

4.7. Privacy Considerations:

While IoT wearables and GPS tracking offer many benefits, they also raise important privacy
concerns. Balancing public safety with individual privacy rights is crucial, and safeguards
must be in place to prevent misuse of tracking data and ensure compliance with legal and
ethical standards.

5. GPS Tracking Functionalities

GPS tracking technology holds immense potential in victim rescue and criminal
apprehension, revolutionizing the way law enforcement agencies respond to emergencies and
investigate crimes. (Puthusseryppady et al., 2021), (Tundis et al., 2020) and (Chadil et al.,
2008)

Victim Rescue:

1. Precise Location Information: GPS tracking provides real-time and precise location
data, enabling swift responses in cases of missing persons, accidents, or natural
disasters. Search and rescue teams can pinpoint victims' locations accurately, reducing
search times and increasing the chances of a successful rescue.

9
2. Domestic Violence and Abduction Cases: Victims of domestic violence or abduction
can activate GPS-equipped devices to send their exact locations to law enforcement.
This immediate response capability can be life-saving, helping officers locate victims
and apprehend suspects promptly.

3. Medical Emergencies: GPS tracking is crucial for tracking individuals with medical
conditions who may require urgent assistance. Wearable devices equipped with GPS
can transmit distress signals, allowing medical responders to reach the scene quickly.

Criminal Apprehension :

1. Fugitive Tracking: GPS tracking is invaluable for monitoring and apprehending


fugitives on the run. Law enforcement agencies can track parolees, probationers, or
suspects involved in criminal investigations, reducing the risk they pose to society.

2. Evidence in Investigations: GPS data can serve as critical evidence in criminal cases.
Movement patterns, location histories, and alibi verification can help establish
suspects' involvement or innocence in crimes.

3. Community Safety: GPS tracking of known offenders enhances community safety by


allowing authorities to enforce exclusion zones and curfews effectively. Violations
trigger immediate alerts, leading to swift action.

4. However, the use of GPS tracking also raises privacy concerns and must be subject to
legal and ethical guidelines. Striking a balance between the potential benefits of
victim rescue and criminal apprehension and individual privacy rights is crucial to
ensuring responsible and effective use of this technology.

Conclusion

The cornerstone of this conceptual design is the seamless integration of GPS tracking
technology into the wearable devices. This integration allows the system to pinpoint the
wearer's exact location in real-time, ensuring that help can be dispatched swiftly in case of
emergencies, accidents, or threats.

The Threat-Alert Intelligent System utilizes advanced machine learning algorithms and
artificial intelligence to analyze data from wearables and assess the wearer's well-being. In
the event of abnormal readings or suspicious patterns, the system triggers automated alerts.
These alerts can take various forms, including notifying emergency services, sending distress
signals to predefined contacts, or activating audio and video recording to capture evidence.

This conceptual design prioritizes user privacy and data security, incorporating robust
encryption and user-controlled consent mechanisms to safeguard sensitive information. It
also offers customization options, allowing users to set their threat thresholds and response
preferences.

In conclusion, the "Threat-Alert Intelligent System with IoT Wearable and GPS Tracker"
represents a forward-looking concept aimed at revolutionizing personal safety and security.

10
By fusing IoT technology, wearables, GPS tracking, and intelligent algorithms, this system
envisions a future where individuals can enjoy a greater sense of security and receive rapid
assistance in critical situations. While this design is conceptual, it serves as a foundation for
the development of next-generation safety solutions that can empower individuals to live
their lives with greater confidence and peace of mind.

References

Bhardwaj, G., Dixit, M., Kumari, G., Kumari, K., & Srivastava, S. (2023). Arduino UNO
based child tracking system using GPS and GSM. Oriental journal of computer science
and technology, 16(01), 61-67. https://doi.org/10.13005/ojcst16.01.04

Byun, J., Nasridinov, A., & Park, Y. (2014). Internet of things for smart crime detection.
Contemporary Engineering Sciences, 7, 749-754.
https://doi.org/10.12988/ces.2014.4685

Canter, D., & Youngs, D. (2019). Crime and society. Crime and Society, 1-6.
https://doi.org/10.4324/9781351207430-101

Chadil, N., Russameesawang, A., & Keeratiwintakorn, P. (2008). Real-time tracking


management system using GPS, GPRS and Google Earth. 2008 5th International
Conference on Electrical Engineering/Electronics, Computer, Telecommunications and
Information Technology. https://doi.org/10.1109/ecticon.2008.4600454

Charles, A. O., Ifeyinwa, O. C., & Chukwuemeka, I. (2016). Psychology of Kidnapping.


Practicum Psychologia, 6, 104-120. https://doi.org/10.4324/9781315779768-13

Chit, M. (2021). Deployment of RFID, GPS and IOT technology for medical specimen
logistic system. Chulalongkorn University Theses and Dissertations (Chula ETD).
https://doi.org/10.58837/chula.the.2021.133

Fergusson, R. (2016). Unemployment, crime and recession. "Young people, welfare and
crime", 119-142. https://doi.org/10.1332/policypress/9781447307013.003.0005

Ferrero Martın, F. J. (2019). Sensors for the Internet of things. Sensors in the Age of the
Internet of Things: Technologies and applications, 35-61.
https://doi.org/10.1049/pbce122e_ch2

Kidnapping? What kidnapping? (2023). Under Penalty of Death, 148-157.


https://doi.org/10.2307/j.ctv2kx8jm5.17

Maculan, E., & Gil Gil, A. (2020). The rationale and purposes of criminal law and
punishment in transitional contexts. Oxford Journal of Legal Studies, 40(1), 132-157.
https://doi.org/10.1093/ojls/gqz033

Mahmood, Z. (2022). Web 2.0, social media, and mobile technologies for connected
government. Research Anthology on Social Media's Influence on Government, Politics,
and Social Movements, 206-223. https://doi.org/10.4018/978-1-6684-7472-3.ch011

11
McGuire, J., Evans, E., & Kane, E. (2021). Victim and witness retraction and disengagement:
A systematic review of contributing factors. Evidence-Based Policing and Community
Crime Prevention, 313-359. https://doi.org/10.1007/978-3-030-76363-3_9

McLean, R., & Densley, J. A. (2022). On robbery. Robbery in the Illegal Drugs Trade, 1-18.
https://doi.org/10.1332/policypress/9781529223910.003.0001

McNamara, L., Quilter, J., Hogg, R., Loughnan, A., Douglas, H., Brown, D., & Farmer, L.
(2019). Understandingprocessesof criminalisation: Insights from an Australian study of
criminal law-making. Criminology & Criminal Justice, 21(3), 387-407.
https://doi.org/10.1177/1748895819868519

Odam, D. S., Doma, M. I., Fawzy, H. I., Sedeek, & Farhan, M. H. (2021). Design of global
positioning system (GPS) networks using different artificial intelligence techniques.
Journal of Engg. Research, 11(1), 14-25. DOI:10.36909/ jer.10587

Olajimbiti, E. (2022). The pragmatics of political deception on Facebook. Research


Anthology on Social Media's Influence on Government, Politics, and Social
Movements, 738-754. https://doi.org/10.4018/978-1-6684-7472-3.ch036

Onuora, A. C., Ana, P. O., Madubuike, C. E., & Ogbunude, F. U. (2023). IOT-BASED
DESIGN FOR PERSONAL ELECTRONIC HEALTH MONITORING SYSTEM FOR
NIGERIA PRIMARY CARE. International Conference on Smart, Secure and
Sustainable Nation | S3N’2022 .

Onuora, A. C., Uche, D. C., Ogbunude, F. O., & Uwazuruike, F. (2017). The Challenges of
Cybercrime in Nigeria: An Overview. AIPFUJournal of School of Sciences (AJSS),
1(2). ISSN:-0794–8646-X

Puthusseryppady, V., Morrissey, S., Aung, M. H., Coughlan, G., Patel, M., & Hornberger, M.
(2021). Using GPS tracking to investigate outdoor navigation patterns in patients with
Alzheimer disease: Cross-sectional study (Preprint).
https://doi.org/10.2196/preprints.28222

Sadhana, B., Nidhishree, N. A., & Vishwa, V. (2022). Child monitoring system using gps
child tracking system. International Journal of Engineering Applied Sciences and
Technology, 7(1), 329-337. https://doi.org/10.33564/ijeast.2022.v07i01.051

Samaan, S. (2019). Design and implementation of children tracking system using IoT. Al-
Nahrain Journal for Engineering Sciences, 22(3), 172-179.
https://doi.org/10.29194/njes.22030172

Sezgin, Y. (2013). Human rights under state-enforced religious family laws in Israel, Egypt
and India. https://doi.org/10.1017/cbo9781139649612

Shackelford, S. J. (2020). Welcome to the Internet of things. The Internet of Things.


https://doi.org/10.1093/wentk/9780190943813.003.0002

12
Sharanya, V., & Prasad, S. V. (2020). IOT and GPS based women safety system using ARM7
controller. INTERNATIONAL CONFERENCE ON MULTIFUNCTIONAL
MATERIALS (ICMM-2019). https://doi.org/10.1063/5.0019988

Siraj, S. (2019). ARCTIC: An IoT-based System for Child Tracking in Day Care. Computer
Science and Engineering, master's level.

Tundis, A., Kaleem, H., & Mühlhäuser, M. (2020). Detecting and tracking criminals in the
real world through an IoT-based system. Sensors, 20(13), 3795.
https://doi.org/10.3390/s20133795

Zosimovych, N. (2015). Conceptual Design of Navigation System for a Commercial Launch


Vehicle. International Journal of Modern Engineering Research (IJMER), 5(10), 31-42.

13

You might also like