The Escalating Nigeria National Security Challenge: Smart Objects and Internet-Of-Things to the rescue
Journal: International Journal of Computer Networking and Communication (IJCNAC) (Vol.1, No. 1)Publication Date: 2013-08-31
Authors : Obodoeze F.C Ozioko F.E Okoye F.A Mba C.N Ozue T.I Ofoegbu E.O;
Page : 57-70
Keywords : Smart objects; Internet-of-Things (IoT); Global Pos itioning System (GPS); RFID; Wireless Sensor Network(WSN); aerial surveillance; IP cameras;
Abstract
Since October 1st 2011, when Nigeria Federal Govenrment marked Nigerian?s 51st National Indepedence celebration at Eagles Square Abuja that witnessed the first bomb blast in the country, there have been a catalogue of avalanche of security challenges throughout the country ranging from bomb blasts, suicide bombings, terrorist attacks, kidnapping for ransoms, ritual killings, political assassinations and political brigande, crude oil bunkering and pipeline vandalism, armed robbery but to mention a few. The Federal and State governments have made much effort through the engagement of the law enforcement agencies and security forces such as Police, Joint Military Task Force (JTF), State Security Service (SSS), Nigeria Security and Civil Defnce Corps (NSCDC) but their combined effort have not yielded much positive result towards arresting these security menace.This paper attempts to proffer a security solution framework using newly emerging security technological solutions known as ?smart objects? and ?internet-of-things?, combining the cooperative efforts of security technologies such as Wireless Sensor and Actuator Networks(WSANs), Global Positioning System (GPS), IP surveillance using specialized cameras and Close Circuit Television Cameras (CCTV) and fusing their cooperative outputs into the Internet using novelty telecommunication networks such as Wi-Fi, 3G, ZigBee, Internet Protocol (IP) to aid security agents to track, trace, apprehend and prosecute the culprits who perpetuate these security challenges.
Other Latest Articles
- Performance Analysis and Simulation of OLSR Routing Protocol in MANET
- BookyScholia: A Methodology for the Investigation of Expert Systems
- A Joint Encryption/Watermarking Algorithm for Secure Image Transfer
- Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for Channel Estimation in Noisy Environment
- Study of Polarization Mode Dispersion in the Optical Digital Connection to High Bit Rate
Last modified: 2014-02-04 22:11:11