Generic placeholder image

International Journal of Sensors, Wireless Communications and Control

Editor-in-Chief

ISSN (Print): 2210-3279
ISSN (Online): 2210-3287

Research Article

Elephant Intrusion Warning System Using IoT and 6LoWPAN

Author(s): Prasanna Venkatesan Theerthagiri* and Menakadevi Thangavelu

Volume 10, Issue 4, 2020

Page: [605 - 616] Pages: 12

DOI: 10.2174/2210327909666191129092006

Price: $65

Abstract

Background: This work proposes an automatic IoT based elephant intrusion warning system specifically designed for detecting elephant intrusions into Krishnagiri villages that border wildlife reserves and alerting threatened communities of the location.

Objective: The first one is to find the spectral energy magnitude of the elephant’s vocal communication signal and the other to determine highest pitch frequency produced by elephants.

Methods: Sensors are used to identify the elephant intrusion through IoT based system.

Result: This work designs an automatic IoT based elephant intrusion warning system maintainable by personnel without technical knowledge.

Conclusion: The ultrasonic sensor detects the elephant’s movements and alerts the distance from the sensor to the elephant and location of the intrusion. The PIR sensor detects the elephant’s intrusion in the wildlife fences and informs to the forest officials and people.

Keywords: Elephant intrusion warning system, IoT, sensors, CoAP, 6LoWPAN, PIR sensor.

Graphical Abstract
[1]
Kamminga J, Ayele E, Meratnia N, Havinga P. Poaching detection technologies- A survey. Sensors (Basel) 2018; 18(5): 1474.
[http://dx.doi.org/10.3390/s18051474 PMID: 29738501]
[2]
Gayathri R, Sheela K, Sobana R, Lavanya R. An automatic repelling system to reduce human elephants conflicts using sensors. Int J Res Appl Sci Eng Technol 2017; 5(5): 528-36.
[3]
Prabu M. An efficient surveillance system to detect elephant intrusion into forest borders using seismic sensors. Int J Adv Eng Technol 2016; 166: 171.
[4]
Suganthi N, Rajathi N, Inzamam M. Elephant intrusion detection and repulsive system. Int J Recent Technol Eng 2018; 7(4): 307-10.
[5]
Edirisinghe R, Dias D, Chandrasekara R, Wijesinghe L, Siriwardena P, Sampath PK. Wi-alert: A wireless sensor network based intrusion alert prototype for HEC. Int J Distrib Parallel Syst 2013; 4(4): 23.
[http://dx.doi.org/10.5121/ijdps.2013.4403]
[6]
Gill AQ, Phennel N, Lane D, Phung VL. IoT-enabled emergency information supply chain architecture for elderly people: The Australian context. Inf Syst 2016; 58: 75-86.
[http://dx.doi.org/10.1016/j.is.2016.02.004]
[7]
Rath M, Rout UP. Analysis and study of security aspect and application related issues at the junction of MANET and IoT. Int J Res Eng Technol 2015; 4(13): 426-30.
[8]
Venter PJ, Hanekom JJ. Automatic detection of African elephant (Loxodonta africana) infrasonic vocalisations from recordings. Biosyst Eng 2010; 106(3): 286-94.
[http://dx.doi.org/10.1016/j.biosystemseng.2010.04.001]
[9]
Bellavista P, Cardone G, Corradi A, Foschini L. Convergence of MANET and WSN in IoT urban scenarios. IEEE Sens J 2013; 13(10): 3558-67.
[http://dx.doi.org/10.1109/JSEN.2013.2272099]
[10]
Silva GD, Zoysa K. A low-cost infrasound recording system. 27th National Information Technology Conference 2009.
[11]
Deak G, Curran K, Condell J, Asimakopoulou E, Bessis N. IoTs (Internet of Things) and DfPL (Device-free Passive Localisation) in a disaster management scenario. Simul Model Pract Theory 2013; 35: 86-96.
[http://dx.doi.org/10.1016/j.simpat.2013.03.005]
[12]
Venkataraman AB, Saandeep R, Baskaran N, Roy M, Madhivanan A, Sukumar R. Using satellite telemetry to mitigate elephant-human conflict: An experiment in northern West Bengal, India. Curr Sci 2005; 88(11): 1827-31.
[13]
Wijesinghe L, Siriwardena P, Dahanayake S, Kasthuriratne D, Corea R, Dias D. Electric fence intrusion alert system (eleAlert) 2011 IEEE Global Humanitarian Technology Conference Seattle, WA, USA 2011.
[14]
Shelby Z, Hartke K, Bormann C. The Constrained Application Protocol (CoAP), 2014. RFC: 7252.
[15]
Naik N. Choice of effective messaging protocols for IoT systems: MQTT, CoAP, AMQP and HTTP. 2017 IEEE International Systems Engineering Symposium (ISSE) Vienna, Austria 2017.
[16]
Kaku E, Lomotey RK, Deters R. Using provenance and coap to track requests/responses in IoT. Procedia Comput Sci 2016; 94: 144-51.
[http://dx.doi.org/10.1016/j.procs.2016.08.023]
[17]
Sharma C, Gondhi NK. Communication Protocol Stack for Constrained IoT Systems. 2018 3rd International Conference On Internet of Things: Smart Innovation and Usages (IoT-SIU). Bhimtal, India, 2018.
[http://dx.doi.org/10.1109/IoT-SIU.2018.8519904]
[18]
Peniak P, Franekova M. Model of integration of embedded systems via CoAP protocol of Internet of Things. 2016 International Conference on Applied Electronics (AE) Pilsen, Czech Republic 2016.
[http://dx.doi.org/10.1109/AE.2016.7577273]
[19]
Choi DK, Jung JH, Kang HW, Koh SJ. Cluster-based CoAP for message queueing in Intemet-of-Things networks. 2017 19th International Conference on Advanced Communication Technology (ICACT). Bongpyeong, South Korea, 2017.
[http://dx.doi.org/10.23919/ICACT.2017.7890157]
[20]
Johar R, Qaisar SM, Subasi A, Kurdi RF. A raspberry Pi based event driven quasi real time attendance tracker. 2018 IEEE 3rd International Conference on Signal and Image Processing (ICSIP). Shenzhen, China, 2018.
[http://dx.doi.org/10.1109/SIPROCESS.2018.8600508]
[21]
Abdalla GO, Veeramanikandasamy T. Implementation of spy robot for a surveillance system using Internet protocol of Raspberry Pi. 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). Bangalore, India, 2017.
[http://dx.doi.org/10.1109/RTEICT.2017.8256563]
[22]
Sailesh K, Harsha VB, Sivakumar T, Vijaya PP. Detection of wild elephants using image processing on raspberry Pi3. Int J Comput Sci Mobile Comput 2019; 8(2): 104-15.
[23]
Vujović V, Maksimović M. Raspberry Pi as a sensor web node for home automation. Comput Electr Eng 2015; 44: 153-71.
[http://dx.doi.org/10.1016/j.compeleceng.2015.01.019]
[24]
Wisnusenna S, Yonatan MS, Wibisurya A, Yuwono T. model of web based application to control bridge traveler using raspberry Pi. Procedia Comput Sci 2018; 135: 518-25.
[http://dx.doi.org/10.1016/j.procs.2018.08.204]
[25]
Xiaonan W, Shan Z. All-IP communication between wireless sensor networks and IPv6 networks based on location information. Comput Stand Interfaces 2013; 35(1): 65-77.
[http://dx.doi.org/10.1016/j.csi.2012.05.005]
[26]
Jun Z, Bo Y, Aidong M. Address allocation scheme of wireless sensor networks based on IPv6. 2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology. Beijing, China, 2009.
[http://dx.doi.org/10.1109/ICBNMT.2009.5347849]
[27]
Cheng CY, Chuang CC, Chang RI. Lightweight spatial IP address configuration for IPv6-based wireless sensor networks in smart grid Sensors, 2012 IEEE Taipei, Taiwan,. 2012.
[http://dx.doi.org/10.1109/ICSENS.2012.6411205]
[28]
Wang X, Qian H. Research on all-IP communication between wireless sensor networks and IPv6 networks. Comput Stand Interfaces 2013; 35(4): 403-14.
[http://dx.doi.org/10.1016/j.csi.2012.12.001]
[29]
Amayri M, Arora A, Ploix S, Bandhyopadyay S, Ngo QD, Badarla VR. Estimating occupancy in heterogeneous sensor environment. Energy Build 2016; 129: 46-58.
[http://dx.doi.org/10.1016/j.enbuild.2016.07.026]
[30]
Peng W, Yuankun L, Wenpeng L, Tao L. Research on 6L0WPAN wireless sensor network and IPv6 network interconnection in power distribution system. 2016 China International Conference on Electricity Distribution (CICED) Xi'an, China 2016.
[http://dx.doi.org/10.1109/CICED.2016.7576019]
[31]
Surantha N, Wicaksono WR. Design of smart home security system using object recognition and PIR sensor. Procedia Comput Sci 2018; 135: 465-72.
[http://dx.doi.org/10.1016/j.procs.2018.08.198]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy