terrorism control by using existing ad-hoc network ...

2 downloads 0 Views 259KB Size Report
government of India to verify the identity of a citizen using an existing Bluetooth (BT) ... border terrorism on the one hand and state sponsored heinous terrorist ...
Prachi Pant et al. / International Journal of Engineering Science and Technology (IJEST)

TERRORISM CONTROL BY USING EXISTING AD-HOC NETWORK (TCEAN) Prachi Pant a , Parul Jain b , Nippu Bansal c , P.K. Bishnoi d a

Mody Institute of Technology and Science, Lakshmangarh (Rajasthan) India,[email protected] Mody Institute of Technology and Science, Lakshmangarh (Rajasthan) India, [email protected] c Mody Institute of Technology and Science, Lakshmangarh (Rajasthan) India,[email protected] d Department of CSE Faculty of E & T, Lakshmangarh (Rajasthan) India, [email protected] b

Abstract: Terrorist crime takes a physical, psychological, social, political and economic toll on primary and secondary victims and society as a whole. The perpetrators of the crime go free as there are no such measures which would ensure the identity of a citizen. So, in today’s environment the country needs to implement robust security measures for it’s safe and healthy working. We introduce this paper to the government of India to verify the identity of a citizen using an existing Bluetooth (BT) Ad-Hoc network. The purpose of this method is to reduce the number of terrorist activities by keeping a check on each citizen entering or residing in the country. The TCEAN system requires each citizen to carry a Bluetooth enabled device. It could either be a mobile phone or a vehicle configured with Bluetooth. Keywords: TCEAN; BT; 1. Introduction TODAY, INDIA is under a virtual siege from within. Global terrorism is rising at an alarming speed and cross border terrorism on the one hand and state sponsored heinous terrorist operations on the other are causing havoc and having a devastating effect on India’s security. “Terrorism is not a means to an end but it is an end in itself.” Before 1990, there was a lack of effective intelligence. No meaningful coordination, focused evaluation, annual tasking of the intelligence agencies used to take place. Therefore, reforms were undertaken after 1990, to look into the security system. But they were either not properly acted upon or they were degraded, leaving the country in a sorry state of affairs. To combat this problem TCEAN provides a very reliable and efficient solution to check each and every citizen who moves in the country. TCEAN is an abbreviation for Terrorism Control by using Existing Ad-Hoc network. The basic concept behind TCEAN is a Bluetooth enabled device that provides the means for verification process. The places having terrorist threat would be integrated by Bluetooth enabled tollbooths located at different areas. A citizen could only cross the toll if he/she has a registered Bluetooth enabled device. Each citizen is identified by a Bluetooth id that is provided by the Government of India. As a citizen or a vehicle crosses a toll the Bluetooth id gets verified in real time. The client module at the toll post makes a wireless link with the server of that place to check the id. This process verifies the citizen without his/her knowledge. Each time an unregistered citizen crosses the toll the location and time gets recorded and the information is passed on to other regional servers and to the central application server. The entire path of this citizen could be traced by taking the location and time records from the central server. This would allow for easy detection of the current location of the suspected citizen. To make the system more secure, robust and to prevent misuse of a valid id a camera would be integrated with the toll booth. The process of making the wireless ad-hoc connection and getting the BT address of the mobile is initialized on the event of motion detection by the camera. Due to the presence of motion detection event BT server does not have to search continuously for a long time. Whenever a visitor/vehicle comes, the BT search will be started. A small, program will be installed in the PC/Laptop at the toll, that will search the BT devices in

    ISSN : 0975-5462

Vol. 3 No. 3 March 2011

2343

Prachi Pant et al. / International Journal of Engineering Science and Technology (IJEST)

the range and transmit to the regional application server. If motion is detected and no BT is found a false alarm would be generated. The software would be held very secure by efficient authentication and authorization. 2. Review and Analysis Until now all the terrorism control activities have been done manually or using small software. There is no such software that could solely take this responsibility. TCEAN provides a platform that could work independently as well as accurately. Although there are many academies like NDA those trains the people to fight against terrorism but these methods cause violence and bloodshed. Other organization like NATO provides military concepts against terrorism. A large fraction of terrorism control relies upon public vigilance. Important areas of a city are protected by having round clock patrolling and CISF citizens. The investigating agencies have coordination with central intelligence agencies to collect intelligence and take immediate action. Cameras and electronic surveillance are installed in different parts of the city including government offices, private companies and other public places. Technologies like mobile tracking, GPS, etc have been used, but these methods imply only after any terrorist act has taken place. They do not provide any prevention against it. [2, 4] 3. Flowcharts and Design An ad-hoc network is one that consists of independent wireless nodes that have the ability to dynamically form connections with each other to create a network. Each node has the ability to be either or both at the same time requests or reports to a central authority. Whenever a candidate will enter the country, BT search module checks for the registration via an event of motion detection of camera. If the discovery system replies as a registered citizen then an ok alarm will be generated and the citizen will be allowed to pass. For an unregistered citizen then an alert will be generated. He/she will be detected as unauthorized and police will be reported about this citizen. (Fig. 3.1.) If the citizen replies that he is new in the country, then he has to first register himself at the nearest registration centre. After registration he would be authorized. Each time the camera detects motion, the event of BT discovery will be started and the time of entry and location will be recorded into the database. This helps to trace the suspected citizen. 4.

Electronic Model and Realization

The most important module of TCEAN is the TBBS (toll booth Bluetooth server). This module is defined as the basic working unit i.e. a cell. It performs the camera initiated Bluetooth verification. A security alarm could also be established with the TBBS so that no unregistered citizen goes undetected. The number and placement of the tollbooths could be varied as per the security requirements. All toll booths of a particular region are associated with one web server. Each web server has a Database server (DBS) and a firewall that protects it from outside threats. This ensures secured data. The complete architecture comprises of many cells that are connected to each other and to a central server that holds the entire database. Any time or location information is available with the central server. [1, 3]

    ISSN : 0975-5462

Vol. 3 No. 3 March 2011

2344

Prachi Pant et al. / International Journal of Engineering Science and Technology (IJEST)

TBBS – Toll booth Bluetooth  server    DBS – Database Bluetooth  server 

Fig. 4.1. Electronic Model

    ISSN : 0975-5462

Vol. 3 No. 3 March 2011

2345

Prachi Pant et al. / International Journal of Engineering Science and Technology (IJEST)

Start

 

            Main entry

   

        Camera motion event                   Generation 

           BT discovery system

 

Local DB

no yes 

Record time and      location 

Person Known? 

Ok alarm  Allow to pass 

Send information to central DB 

Central DB 

          END  yes

        Person gets           Registered? 

no 

     Report to authority 

           Track the path  Fig. 3.1. Flow Chart

    ISSN : 0975-5462

Vol. 3 No. 3 March 2011

2346

Prachi Pant et al. / International Journal of Engineering Science and Technology (IJEST)

Fig.4.2. Cell Architecture

4.1. Security and Privacy To ensure complete security and privacy following points are observed and implemented:  Every citizen is registered and given a unique BTID by a pre specified process of government of country.  Each new BT(mobile phone) device purchased needs to be registered to the government or to the authority under consideration.  The software access is kept secured using robust authentication methods.  For every citizen crossing the TBBS an image is captured by security camera.  Each regional local/global server is protected using firewall.  At each resource or data access requires user name and password verification.  The reporting authority will be immediately informed about any suspected activity or citizen through internet.

5. Results and Analysis The local server of each region on tollbooth collect data about local activities and submit it to the central server. Table 5.1.shows the contents of the central database. It records the BTID, Toll booth ID (TBSID) , Time, city, and the location coordinates of the respective Toll booth. These coordinate help trace the path of any citizen. These points can then be plotted geographically and further actions could be taken immediately. Then Fig. 5.1.shows the graphical representation of two suspected BTID’s. The places visited by the citizen are also shown. The path for BTID 0021FCC02473 is c1-c2-c3-c4-c5, and again for the BTID 001E7D4BD88F is c6-c7-c8-c9 where c1-c9 are the name of the cities. 5.1. Advantages      

Any visitor to the country could be easily traced and verified. TCEAN allows the government to take preventive measures from any terrorist activities. It could solely perform the security activities at the public places Its easy to use, modify and expanded as per the requirements Suspected citizen could be traced and exact location and time can be found. It could be gradually implemented at global level to remove the terrorism from its roots.

5.2. Limitations  

Every citizen needs to have one BT device. The BT device should always be in discoverable mode.

    ISSN : 0975-5462

Vol. 3 No. 3 March 2011

2347

Prachi Pant et al. / International Journal of Engineering Science and Technology (IJEST)

    

Due to the speed and range of Bluetooth limited number of devices could be verified at the same time. Extensive registration process needs to be performed to ensure uniqueness of data. A registered device could be stolen and misused. A citizen carrying multiple BT devices needs to get registered multiple times which duplicates the citizen's data. Duplicate entries for same citizen could be removed by checking the type of BT device Table 5.1.

S. NO.

BTID

TBSID

TIME

CITY

X-AXIS

Y-AXIS

1 2 3 4 5 6 7 8 9

0021FCC02473 0021FCC02473 0021FCC02473 0021FCC02473 0021FCC02473 001E7D4BD88F 001E7D4BD88F 001E7D4BD88F 001E7D4BD88F

00242CB7012F F07BCBD68A3D 001E7D4BD88F F50BCAB36A3D E08CCBF68A3D F50BCAB36A3D E08CCBF68A3D F07BCBD68A3D 001E7D4BD88F

09:10 10:30 14:15 16:42 17:30 18:02 18:30 19:39 19:58

c1 c2 c3 c4 c5 c6 c7 c8 c9

10 30 30 39 50 15 22 35 55

20 30 35 32 45 30 15 20 22

Fig. 5.1. Path of Intruder

6. Conclusion & Future Directions Today the speed of BT is very limited in the sense of establishing the BT ad-hoc wireless connection between PC and mobile phone. Due to this the MAC address identity-retrieving process becomes sluggish. TCEAN system can be made more reliable and secure. The system is very useful for the country. If the government changes or reengineers the working and security policies, the system may be changed very easily. It is capable of tracking a citizen at country wide level. The software may become very useful for military application in terrorism control also. This is sure the project may be very constructive and flourishing, because in contrast to other methods it effectively ensures security of the country. Acknowledgments Authors want to thank to the CSE Departments of MITS, authorities and management of MITS University for providing the research facilities and environment for this research

    ISSN : 0975-5462

Vol. 3 No. 3 March 2011

2348

Prachi Pant et al. / International Journal of Engineering Science and Technology (IJEST)

References [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14]

Terrorism how to control ? available http://content.msn.co.in/msncontribute/story.aspx?pageid= fb42ec20-2488-4191-b25155359d9ffe77 Terrorism: the role of local and state police agencies [online] available http://www.neiassociates.org/ Combating global Terrorism: the role of citizens [online] available http://www.merinews.com/ Anti Terrorism [online] available http://www.nato.int/ “Bluetooth Technology”. [online] available: http://www.bluetomorrow.com/index.php? option=com_frontpage&itemid=1.[accessed: march09, 2009]. “Bluetooth: low power and low cost”. [online].available:http://www.bluetomorrow.com. [ accessed: march 09, 2009 ]. “High Speed Bluetooth ” [online]. available:http://www.bluetomorrow.com /content/section / 344/466/. [accessed: march 09, 2009]. Keogh James, the complete reference: j2me. tatamcgraw - hill, 2003. http://www.sciencedirect.com/scienc? http://www.jsr82.com/jsr-82-sample-device-discovery/. http://developers.sun.com/ Lejos Vision System available http://homepage.ntlworld.com/ jsr-82 Bluetooth API [online] available http://bluecove.org/ BlankenbecklerDavid“anintroductiontobluetooth”[online].available: http://www.wirelessdevnet.comtrainichannels/bluetooth/features/bluetooth.html. [accessed: Feb 06, 2009].

    ISSN : 0975-5462

Vol. 3 No. 3 March 2011

2349

Suggest Documents