Вы находитесь на странице: 1из 5

DOI 10.4010/2016.

1678
ISSN 2321 3361 2016 IJESC
`

Research Article Volume 6 Issue No. 6

Military Applications using Wireless Sensor Networks: A survey


Ishfaq Ahmad1, Khalil Shah2, Saif Ullah3
Department of computer Science
Abdul Wali khan University Mardan 1
Khyber Pakhtoonkhwa, Pakistan 2, 3
ashfaq9701@gmail.com1, escallanio@gmail.com2

Abstract:
Wireless Sensor Networks (WSNs) received enormous attention in recent years due to its phenomenal ability of implementation in
various fields. WSNs consist of a large number of small sensor nodes. These nodes are very cheap in terms of cost. In military
operations, there is always a threat of being attacked by enemies. So, the use of these cheap sensor nodes will help to reduce the
loss. In this paper, we analyze the existing literature of using WSNs for military applications. We will discuss the available
scenarios of using sensor nodes in the military uses. We aim to present a better deployment of sensor nodes for military purposes
with the help of existing research work. We will try to identify different areas in which we can reduce the damage in case of
militants attack or enemys outbreak using an intelligent deployment of nodes.

Keywords: Wireless Sensor Networks, Military Surveillance, Sensor Nodes, Intrusion Detection.

I. INTRODUCTION enemy attack, some nodes will be damaged but node damage
in WSNs does not disturb the complete network. Due to their
The rise of Wireless Sensor Networks (WSNs) has brought unique characteristics [12-18], these networks are well-known
revolution in the field of technology. These networks comprise among the research communities and industrialpartners
of a large number of densely deployed sensor nodes which
works through collaboration. In WSNs, each sensor node has II. RELATED WORK
limited resources such as, low energy, less bandwidth, limited
memory and small computational power. These nodes are very In literature, there exist various studies about implementing
inexpensive in terms of cost, so resource limitation is not a big WSNs in military applications. Authors discussed these
problem. If a node runs out of energy, so instead of replacing applications in different parts of military operations from
the battery, we can replace the entire node with a new node. different perspectives. In [19-26], different areas are pointed
where WSNs can be deployed in order to obtain better results
There are different types of sensors available like temperature and desired outputs. These areas include intrusion detection,
sensor, humidity sensor, multimedia sensor and others. Due to enemy tracking and target classification, battlefield
these variant sensors, WSNs got applications in different fields surveillance, battlefield damage assessment, target system and
such as environment monitoring, agriculture monitoring, detection of Nuclear Biological Chemical (NBC) attacks [27,
industrial monitoring, health monitoring, home applications 28].
and military operations. A. Intrusion Detection

Sensor Networks were initially designed for military Sensor networks can be used as a 2-phase in Intrusion
operations and surveillance [1-4]. WSNs have been emerged Detection System.Instead of using mines, intrusion can be
as an excellent tool for military applications involving spotted with the help of sensor network in a particular area.
intrusion detection, various parameter monitoring, information Mines [29-33 can target the civilians as well so as an
gathering and, smart logistics support in an unknown deployed alternative of mines; sensor nodes sense the environment and
area [5, 6]. These networks can provide different services to alarm the forces.
military and air force like information collection, battlefield
surveillance and attack detection [7-11]. Because of their B. Battlefield Surveillance
capabilities of real time transmission, WSNs play an important
Critical areas and borders can be closely monitored using
role in military operations. These networks offer several
sensor networks to obtain information about any enemy
advantages over traditional sensor devices such as fault
activity in that area. This provides quick gathering of
tolerance, robustness and low budget deployment. In case of
information provides time for quick response [34].

International Journal of Engineering Science and Computing, June 2016 7039 http://ijesc.org/
There are various other applications of WSNs in military Early attack reaction sensing element (EARS), Time
responsibilities. In [35-37], different tasks are discussed for difference of arrival blast localization using a net-work of
which sensor nodes can be used. These include some of above disposable sensors, Novel optical sensor system for missile
mentioned areas while the other tasks for which these canisters continuous monitoring and Acoustic threatening
networks can be implemented are monitoring friendly forces, sound recognition system are also included in the contents of
equipment, and ammunition and targeting. Aerostat acoustic the same paper.
payload for transient and helicopter detection and novel shoe
scanner using an open-access quadruple resonance sensor are Tracking military vehicles, sniper localization and Self-
also part of the existing literature. Healing Mine Field is also the portion of the existing study in
the form of [7]. In tracking military vehicles, the WSNs
C. Aerostat Acoustic Payload for Transient and should be hidden and hard to abolish. For sniper localization, a
Helicopter Detection WSN is being used to locate snipers and the trajectory of
bullets [5], providing valuable clues for law enforcement. The
Using acoustic sensor shows suspended under attached deployment of Wireless Sensor Networks (WSNs) can solve
aerostats The Army Research Laboratory (ARL) has led tests the problem of enemy force deployment uncertainty. Where
to locate and constrain transitory motions from mortars, big ever the force is deployed, senor nodes will capture their
guns and little arms release. The same aerostat and unattended presence and will inform. Then you have to send your army to
ground sensor UGS joint effort can track adjacent helicopters that particular area to protect it. These networks can also be
in 3d for tie evasion [38]. deployed in urban areas to make sure peaceful environment.

D. A Novel Shoe Scanner using an Open-access III. COMPARISONS OF MILITARY


Quadruple Resonance Sensor APPLICATIONS

Novel shoe scanner advanced at the GE Security San Diego As discussed in above section, different authors discussed the
Centre of Excellence utilization Quadruple Resonance (QR) to applications of Wireless Sensor Networks (WSNs) for military
distinguish explosives stowed away in shoes [39]. The shoe purposes from different perspectives. Here we will try to
scanner was created with an open-access frame and filtering compare the study in existing literature and after that
chamber that permits travelers to stand in the framework in a comparison, we will be able to extract a better way of using
regular position throughout the checking process [4]. these sensor networks for military purposes.

Advances in group filter applications to sea mine detection, In [6], it is proposed to use the WSNs in battlefield
Omni Bird a miniature PTZ NIR sensor system for UCAV surveillance to closely monitor the critical areas and borders to
day/night autonomous operations, Low-cost acoustic sensors obtain information about enemy activity in that area. Hence,
for littoral anti-submarine war-fare (ASW) are also being we will gather information quickly which will result in quick
presented in [40]. response. Another way of using sensornodes for battlefield
surveillance is as the operations advance and new operational
E. Advances in Group Filter Applications to Sea Mine
arrangements are ready, new sensor systems could be
Detection
conveyed for front observation [4]. Both the approaches are
It is extremely challenging to separate questions in the under- good. Everyone have its advantages. Border monitoring is an
water environment which change in size, shape, and essential component of military surveillance to prevent
introduction from regularly happening and man-made enemys intrusion. In normal circumstances, it may be enough
disorder. For that unmanned underwater vehicle (UUV) sensor just to monitor borders but in case of war, new sensor nodes
frameworks described by high sensor information rates and are necessary to know the conditions of front areas so that you
constrained preparing capabilities is utilized by Naval Surface can adopt an appropriate plane.
Warfare Centre Panama City (NSWC PC) to output the sonar
Nuclear, Biological and chemical (NBC) attack detection is an
picture and characterize the picture characteristics,
important application of Wireless Sensor Networks (WSNs).
geometrically characterized structures with introductions, and
Nuclear, Biological and chemical (NBC) agents can be sensed
confined ghastly data into different orthogonal parts or
by sensors and embedded warning system can now send a
emphasize sub-spaces of the picture [4].
warning message. It provides the military critical response
time to check the situation and prevent possible attacks which

International Journal of Engineering Science and Computing, June 2016 7040 http://ijesc.org/
can save lives of many [6]. It is good that t can sense the NBC February 2008, Vol. 2008 Issue 2, p37-43
and can save many lives but it should be make sure that it can [3]. Carlos F. Garca-Hernndez, Pablo H. Ibargengoytia-
sense the NBC even in a very little size and at very early Gonzlez, JoaqunGarca-Hernndez, and Jess A.
stage. For this purpose the sensor nodes can be placed close to Prez-Daz*; Wireless Sensor Networks and
these to the plant and their threshold value should be set even Applications: a Survey; IJCSNS International Journal
very low than the danger limit so that preventive measures can of Computer Science and Network Security, VOL.7 No.3,
be taken before the danger limit is reached. March 2007
Tracking military vehicles is another important aspect of using [4]. Khan, F., Bashir, F., & Nakagawa, K. (2012). Dual Head
sensors in military side. Here, sensor nodes are deployed from Clustering Scheme in Wireless Sensor Networks. in the
an unmanned aerial vehicle (UAV) [7] [40-43]. In order to IEEE International Conference on Emerging
sense the closeness of tanks, Magnetometer sensors are Technologies (pp. 1-8). Islamabad: IEEE Islamabad.
attached to the nodes. Sensor nodes collaborate in order to [5]. M. A. Jan, P. Nanda, X. He, Z. Tan and R. P. Liu, A
estimate the path and velocity of tracked vehicle. In order to robust authentication scheme for observing resources in
track these vehicles, the tracking object should have a the internet of things environment in 13th International
predefined amount of metallic material. Thisamount can be Conference on Trust, Security and Privacy in Computing
specified by the programmer while programing the sensor. and Communications (TrustCom), pp. 205-211, 2014,
IEEE.
IV. CONCLUSION
From above discussion, it is clear that WSNs plays an [6]. Khan, F., & Nakagawa, K. (2012). Performance
important role in military operations. With the help of these Improvement in Cognitive Radio Sensor Networks. in
networks, not only the critical areas can be monitored but also the Institute of Electronics, Information and
due to its flexible nature, it can be expanded to the nearby Communication Engineers (IEICE) , 8.
areas according to the requirements with the passage of time.
Moreover due to its fault tolerance characteristic, if any node [7]. M. A. Jan, P. Nanda and X. He, Energy Evaluation
got damaged, the rest of the network will continue sensing. Model for an Improved Centralized Clustering
Rest of the network will not be affected due to the damage of a Hierarchical Algorithm in WSN, in Wired/Wireless
single or a group of sensors. Internet Communication, Lecture Notes in Computer
Science, pp. 154167, Springer, Berlin, Germany, 2013.
The use of Wireless Sensor Networks (WSNs) will reduce the
casualty rate. Normally these networks are deployed in risky [8]. Khan, F., Kamal, S. A., &Arif, F. (2013). Fairness
and critical areas where there is always a strong threat to Improvement in long-chain Multi-hop Wireless Adhoc
soldiers in case of their presence. The damage of sensor Networks. International Conference on Connected
nodes in that scenario is not noticeable because of their easily Vehicles & Expo (pp. 1-8). Las Vegas: IEEE Las Vegas,
availability and inexpensive nature. USA.
As we discussed earlier, Wireless Sensor Networks (WSNs) [9]. M. A. Jan, P. Nanda, X. He and R. P. Liu, Enhancing
have a vast variety of applications for military purposes, but lifetime and quality of data in cluster-based hierarchical
keeping in mind the importance and critical nature of security routing protocol for wireless sensor network, 2013
and safety, there should be a number of more applications are IEEE International Conference on High Performance
possible in military operations. This requires further research Computing and Communications & 2013 IEEE
in this field.
International Conference on Embedded and Ubiquitous
Computing (HPCC & EUC), pp. 1400-1407, 2013.
REFERENCES
[10]. Q. Jabeen, F. Khan, S. Khan and M.A Jan. (2016).
[1]. M. Pejanovi urii1, Z. Tafa1, 2, G. Dimi3, and V. Performance Improvement in Multihop Wireless Mobile
Milutinovi2, A Survey of Military Applications of Adhoc Networks. in the Journal Applied, Environmental,
Wireless Sensor Networks; 2012 Mediterranean and Biological Sciences (JAEBS), vol. 6(4S), pp. 82-92.
Conference on Embedded Computing (MECO); June 19, Print ISSN: 2090-4274 Online ISSN: 2090-4215,
2012, ISSN: 2377-5475; Publisher IEEE TextRoad.
[2]. Michael Winkler, Klaus-Dieter Tuchs, Kester Hughes, [11]. Khan, F., & Nakagawa, K. (2013). Comparative Study of
and Graeme Barclay, Theoretical and practical aspects Spectrum Sensing Techniques in Cognitive Radio
of military wireless sensor networks; journal of Networks. in IEEE World Congress on Communication
telecommunication and information technology, and Information Technologies (p. 8). Tunisia: IEEE

International Journal of Engineering Science and Computing, June 2016 7041 http://ijesc.org/
Tunisia. Engineering and Technology(IJSRSET), Print ISSN :
[12]. Khan, F. (2014). Secure Communication and Routing 2395-1990, Online ISSN : 2394-4099, Volume 2 Issue 2,
Architecture in Wireless Sensor Networks. the 3rd Global pp.664-673.
Conference on Consumer Electronics (GCCE) (p. 4). [22]. Syed Roohullah Jan, Syed TauhidUllah Shah, Zia
Tokyo, Japan: IEEE Tokyo. UllahJohar, Yasin Shah, Khan, F., " An Innovative
[13]. M. A. Jan, P. Nanda, X. He and R. P. Liu, PASCCC: Approach to Investigate Various Software Testing
Priority-based application-specific congestion control Techniques and Strategies", International Journal of
clustering protocol Computer Networks, Vol. 74, PP- Scientific Research in Science, Engineering and
92-102, 2014. Technology(IJSRSET), Print ISSN : 2395-1990, Online
ISSN : 2394-4099, Volume 2 Issue 2, pp.682-689,
[14]. Khan, F. (2014, May). Fairness and throughput
March-April 2016. URL
improvement in multihop wireless ad hoc networks.
: http://ijsrset.com/IJSRSET1622210.php
In Electrical and Computer Engineering (CCECE), 2014
IEEE 27th Canadian Conference on (pp. 1-6). IEEE. [23]. Khan, F., Jan, SR, Tahir, M., & Khan, S., (2015)
Applications, Limitations, and Improvements in Visible
[15]. Mian Ahmad Jan and Muhammad Khan, A Survey of
Light Communication Systems In 2015 International
Cluster-based Hierarchical Routing Protocols, in
Conference on Connected Vehicles and Expo
IRACSTInternational Journal of Computer Networks
(ICCVE) (pp. 259-262). IEEE.
and Wireless Communications (IJCNWC), Vol.3, April.
2013, pp.138-143. [24]. Syed Roohullah Jan, Khan, F., Muhammad Tahir,
Shahzad Khan,, (2016) Survey: Dealing Non-Functional
[16]. Khan, S., Khan, F., & Khan, S.A.(2015). Delay and
Requirements At Architecture Level, VFAST
Throughput Improvement in Wireless Sensor and Actor
Transactions on Software Engineering, (Accepted 2016)
Networks. 5th National Symposium on Information
Technology: Towards New Smart World (NSITNSW) [25]. M. A. Jan, Energy-efficient routing and secure
(pp. 1-8). Riyadh: IEEE Riyad Chapter. communication in wireless sensor networks, Ph.D.
dissertation, 2016.
[17]. Khan, F., Khan, S., & Khan, S. A. (2015, October).
Performance improvement in wireless sensor and actor [26]. M. A. Jan, P. Nanda, X. He, and R. P. Liu, A
networks based on actor repositioning. In 2015 Lightweight Mutual Authentication Scheme for IoT
International Conference on Connected Vehicles and Objects, IEEE Transactions on Dependable and Secure
Expo (ICCVE) (pp. 134-139). IEEE. Computing (TDSC), Submitted, 2016.

[18]. Khan, S., Khan, F., Jabeen. Q., Arif. F., & Jan. M. A. [27]. M. A. Jan, P. Nanda, X. He, and R. P. Liu, A Sybil
(2016). Performance Improvement in Wireless Sensor Attack Detection Scheme for a Forest Wildfire
and Actor Networks. in the Journal Applied, Monitoring Application, Elsevier Future Generation
Environmental, and Biological Sciences Print ISSN: Computer Systems (FGCS), Accepted, 2016.
2090-4274 Online ISSN: 2090-4215 [28]. Puthal, D., Nepal, S., Ranjan, R., & Chen, J. (2015,
[19]. Mian Ahmad Jan and Muhammad Khan, Denial of August). DPBSV--An Efficient and Secure Scheme for
Service Attacks and Their Countermeasures in WSN, in Big Sensing Data Stream. InTrustcom/BigDataSE/ISPA,
IRACSTInternational Journal of Computer Networks 2015 IEEE (Vol. 1, pp. 246-253). IEEE.
and Wireless Communications (IJCNWC), Vol.3, April. [29]. Puthal, D., Nepal, S., Ranjan, R., & Chen, J. (2015). A
2013. Dynamic Key Length Based Approach for Real-Time
[20]. M. A. Jan, P. Nanda, X. He and R. P. Liu, A Sybil Security Verification of Big Sensing Data Stream.
Attack Detection Scheme for a Centralized Clustering- In Web Information Systems EngineeringWISE
based Hierarchical Network in 2015 (pp. 93-108). Springer International Publishing.
Trustcom/BigDataSE/ISPA, Vol.1, PP-318-325, 2015, [30]. Puthal, D., Nepal, S., Ranjan, R., & Chen, J. (2016). A
IEEE. dynamic prime number based efficient security
[21]. Jabeen, Q., Khan, F., Hayat, M.N., Khan, H., Jan., S.R., mechanism for big sensing data streams.Journal of
Ullah, F., (2016) A Survey : Embedded Systems Computer and System Sciences.
Supporting By Different Operating Systems in the [31]. Puthal, D., &Sahoo, B. (2012). Secure Data Collection &
International Journal of Scientific Research in Science, Critical Data Transmission in Mobile Sink WSN: Secure

International Journal of Engineering Science and Computing, June 2016 7042 http://ijesc.org/
and Energy efficient data collection technique. [42]. Ms. Sunita, Jyoti Malik, SumanMor; Comprehensive
[32]. Puthal, D., Sahoo, B., &Sahoo, B. P. S. (2012). Effective Study of Applications of Wireless Sensor Network;
Machine to Machine Communications in Smart Grid International Journal of Advanced Research in
Networks. ARPN J. Syst. Softw. 2009-2011 AJSS Computer Science and Software Engineering;Volume 2,
Journal, 2(1), 18-22. Issue 11, November 2012; ISSN: 2277 128X.

[33]. M. A. Jan, P. Nanda, M. Usman, and X. He, PAWN: A [43]. Kay Romer, Friedemann Mattern; The Design Space of
Payload-based mutual Authentication scheme for Wireless Sensor Networks; IEEE Wireless
Wireless Sensor Networks, accepted, 2016. Communications, Volume: 11, Issue: 6, pp. 54-61,
December 2004, ISSN: 1536-1284.
[34]. M. Usman, M. A. Jan, and X. He, Cryptography-based
Secure Data Storage and Sharing Using HEVC and
Public Clouds, Elsevier Information sciences,
accepted, 2016.
[35]. Jan, S. R., Khan, F., &Zaman, A. THE PERCEPTION
OF STUDENTS ABOUT MOBILE LEARNING AT
UNIVERSITY LEVEL. NO. CONTENTS PAGE NO.,
97.
[36]. Khan, F., & Nakagawa, K. (2012). B-8-10 Cooperative
Spectrum Sensing Techniques in Cognitive Radio
Networks.
, 2012(2), 152.
[37]. Safdar, M., Khan, I. A., Ullah, F., Khan, F., & Jan, S. R.
Comparative Study of Routing Protocols in Mobile
Adhoc Networks.
[38]. Shahzad Khan, Fazlullah Khan, FahimArif,
QamarJabeen, M.A Jan and S. A Khan (2016).
Performance Improvement in Wireless Sensor and
Actor Networks, Journal of Applied Environmental and
Biological Sciences, Vol. 6(4S), pp. 191-200, Print
ISSN: 2090-4274 Online ISSN: 2090-4215, TextRoad.
[39]. M. Usman, M. A. Jan, X. He and P. Nanda, Data
Sharing in Secure Multimedia Wireless Sensor
Networks, in 15th IEEE International Conference on
Trust, Security and Privacy in Computing and
Communications (IEEE TrustCom-16), accepted, 2016.
[40]. Ananyachatterjee, ManjushaPandey; Practical
Applications of Wireless Sensor Network Based on
Military, Environmental, Health and Home Applications:
A Survey; International Journal of Scientific &
Engineering Research, Volume 5, Issue 1, January-
2014., , ISSN 2229-5518.
[41]. Gyula Simon Mikls Marti kos Ldeczi Gyrgy
Balogh Branislav Kusy Andrs Ndas Gbor Pap Jnos
Sallai Ken Frampton; Sensor Network-Based Counters
niper System; SenSys'04 Proceedings of the 2nd
international conference on Embedded networked sensor
systems, Baltimore, USA, November 2004ISBN: 1-
58113-879-2

International Journal of Engineering Science and Computing, June 2016 7043 http://ijesc.org/

Вам также может понравиться