ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

The Escalating Nigeria National Security Challenge: Smart Objects and Internet-Of-Things to the rescue

Journal: International Journal of Computer Networking and Communication (IJCNAC) (Vol.1, No. 1)

Publication Date:

Authors : ;

Page : 57-70

Keywords : Smart objects; Internet-of-Things (IoT); Global Pos itioning System (GPS); RFID; Wireless Sensor Network(WSN); aerial surveillance; IP cameras;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Since October 1st 2011, when Nigeria Federal Govenrment marked Nigerian?s 51st National Indepedence celebration at Eagles Square Abuja that witnessed the first bomb blast in the country, there have been a catalogue of avalanche of security challenges throughout the country ranging from bomb blasts, suicide bombings, terrorist attacks, kidnapping for ransoms, ritual killings, political assassinations and political brigande, crude oil bunkering and pipeline vandalism, armed robbery but to mention a few. The Federal and State governments have made much effort through the engagement of the law enforcement agencies and security forces such as Police, Joint Military Task Force (JTF), State Security Service (SSS), Nigeria Security and Civil Defnce Corps (NSCDC) but their combined effort have not yielded much positive result towards arresting these security menace.This paper attempts to proffer a security solution framework using newly emerging security technological solutions known as ?smart objects? and ?internet-of-things?, combining the cooperative efforts of security technologies such as Wireless Sensor and Actuator Networks(WSANs), Global Positioning System (GPS), IP surveillance using specialized cameras and Close Circuit Television Cameras (CCTV) and fusing their cooperative outputs into the Internet using novelty telecommunication networks such as Wi-Fi, 3G, ZigBee, Internet Protocol (IP) to aid security agents to track, trace, apprehend and prosecute the culprits who perpetuate these security challenges.

Last modified: 2014-02-04 22:11:11