You are on page 1of 5

DOI 10.4010/2016.

1678
ISSN 2321 3361 2016 IJESC
`

Research Article

Volume 6 Issue No. 6

Military Applications using Wireless Sensor Networks: A survey


Ishfaq Ahmad1, Khalil Shah2, Saif Ullah3
Department of computer Science
Abdul Wali khan University Mardan 1
Khyber Pakhtoonkhwa, Pakistan 2, 3
ashfaq9701@gmail.com1, escallanio@gmail.com2
Abstract:
Wireless Sensor Networks (WSNs) received enormous attention in recent years due to its phenomenal ability of implementation in
various fields. WSNs consist of a large number of small sensor nodes. These nodes are very cheap in terms of cost. In military
operations, there is always a threat of being attacked by enemies. So, the use of these cheap sensor nodes will help to reduce the
loss. In this paper, we analyze the existing literature of using WSNs for military applications. We will discuss the available
scenarios of using sensor nodes in the military uses. We aim to present a better deployment of sensor nodes for military purposes
with the help of existing research work. We will try to identify different areas in which we can reduce the damage in case of
militants attack or enemys outbreak using an intelligent deployment of nodes.
Keywords: Wireless Sensor Networks, Military Surveillance, Sensor Nodes, Intrusion Detection.
I.

INTRODUCTION

The rise of Wireless Sensor Networks (WSNs) has brought


revolution in the field of technology. These networks comprise
of a large number of densely deployed sensor nodes which
works through collaboration. In WSNs, each sensor node has
limited resources such as, low energy, less bandwidth, limited
memory and small computational power. These nodes are very
inexpensive in terms of cost, so resource limitation is not a big
problem. If a node runs out of energy, so instead of replacing
the battery, we can replace the entire node with a new node.
There are different types of sensors available like temperature
sensor, humidity sensor, multimedia sensor and others. Due to
these variant sensors, WSNs got applications in different fields
such as environment monitoring, agriculture monitoring,
industrial monitoring, health monitoring, home applications
and military operations.
Sensor Networks were initially designed for military
operations and surveillance [1-4]. WSNs have been emerged
as an excellent tool for military applications involving
intrusion detection, various parameter monitoring, information
gathering and, smart logistics support in an unknown deployed
area [5, 6]. These networks can provide different services to
military and air force like information collection, battlefield
surveillance and attack detection [7-11]. Because of their
capabilities of real time transmission, WSNs play an important
role in military operations. These networks offer several
advantages over traditional sensor devices such as fault
tolerance, robustness and low budget deployment. In case of

International Journal of Engineering Science and Computing, June 2016

enemy attack, some nodes will be damaged but node damage


in WSNs does not disturb the complete network. Due to their
unique characteristics [12-18], these networks are well-known
among the research communities and industrialpartners
II.

RELATED WORK

In literature, there exist various studies about implementing


WSNs in military applications. Authors discussed these
applications in different parts of military operations from
different perspectives. In [19-26], different areas are pointed
where WSNs can be deployed in order to obtain better results
and desired outputs. These areas include intrusion detection,
enemy tracking and target classification, battlefield
surveillance, battlefield damage assessment, target system and
detection of Nuclear Biological Chemical (NBC) attacks [27,
28].
A. Intrusion Detection
Sensor networks can be used as a 2-phase in Intrusion
Detection System.Instead of using mines, intrusion can be
spotted with the help of sensor network in a particular area.
Mines [29-33 can target the civilians as well so as an
alternative of mines; sensor nodes sense the environment and
alarm the forces.
B. Battlefield Surveillance
Critical areas and borders can be closely monitored using
sensor networks to obtain information about any enemy
activity in that area. This provides quick gathering of
information provides time for quick response [34].

7039

http://ijesc.org/

There are various other applications of WSNs in military


responsibilities. In [35-37], different tasks are discussed for
which sensor nodes can be used. These include some of above
mentioned areas while the other tasks for which these
networks can be implemented are monitoring friendly forces,
equipment, and ammunition and targeting. Aerostat acoustic
payload for transient and helicopter detection and novel shoe
scanner using an open-access quadruple resonance sensor are
also part of the existing literature.
C.

Aerostat Acoustic Payload for Transient and


Helicopter Detection

Using acoustic sensor shows suspended under attached


aerostats The Army Research Laboratory (ARL) has led tests
to locate and constrain transitory motions from mortars, big
guns and little arms release. The same aerostat and unattended
ground sensor UGS joint effort can track adjacent helicopters
in 3d for tie evasion [38].

Early attack reaction sensing element (EARS), Time


difference of arrival blast localization using a net-work of
disposable sensors, Novel optical sensor system for missile
canisters continuous monitoring and Acoustic threatening
sound recognition system are also included in the contents of
the same paper.
Tracking military vehicles, sniper localization and SelfHealing Mine Field is also the portion of the existing study in
the form of [7]. In tracking military vehicles, the WSNs
should be hidden and hard to abolish. For sniper localization, a
WSN is being used to locate snipers and the trajectory of
bullets [5], providing valuable clues for law enforcement. The
deployment of Wireless Sensor Networks (WSNs) can solve
the problem of enemy force deployment uncertainty. Where
ever the force is deployed, senor nodes will capture their
presence and will inform. Then you have to send your army to
that particular area to protect it. These networks can also be
deployed in urban areas to make sure peaceful environment.

D. A Novel Shoe Scanner using an Open-access


Quadruple Resonance Sensor

III.

COMPARISONS
APPLICATIONS

OF

MILITARY

Novel shoe scanner advanced at the GE Security San Diego


Centre of Excellence utilization Quadruple Resonance (QR) to
distinguish explosives stowed away in shoes [39]. The shoe
scanner was created with an open-access frame and filtering
chamber that permits travelers to stand in the framework in a
regular position throughout the checking process [4].

As discussed in above section, different authors discussed the


applications of Wireless Sensor Networks (WSNs) for military
purposes from different perspectives. Here we will try to
compare the study in existing literature and after that
comparison, we will be able to extract a better way of using
these sensor networks for military purposes.

Advances in group filter applications to sea mine detection,


Omni Bird a miniature PTZ NIR sensor system for UCAV
day/night autonomous operations, Low-cost acoustic sensors
for littoral anti-submarine war-fare (ASW) are also being
presented in [40].

In [6], it is proposed to use the WSNs in battlefield


surveillance to closely monitor the critical areas and borders to
obtain information about enemy activity in that area. Hence,
we will gather information quickly which will result in quick
response. Another way of using sensornodes for battlefield
surveillance is as the operations advance and new operational
arrangements are ready, new sensor systems could be
conveyed for front observation [4]. Both the approaches are
good. Everyone have its advantages. Border monitoring is an
essential component of military surveillance to prevent
enemys intrusion. In normal circumstances, it may be enough
just to monitor borders but in case of war, new sensor nodes
are necessary to know the conditions of front areas so that you
can adopt an appropriate plane.

E.

Advances in Group Filter Applications to Sea Mine


Detection

It is extremely challenging to separate questions in the underwater environment which change in size, shape, and
introduction from regularly happening and man-made
disorder. For that unmanned underwater vehicle (UUV) sensor
frameworks described by high sensor information rates and
constrained preparing capabilities is utilized by Naval Surface
Warfare Centre Panama City (NSWC PC) to output the sonar
picture and characterize the picture characteristics,
geometrically characterized structures with introductions, and
confined ghastly data into different orthogonal parts or
emphasize sub-spaces of the picture [4].

International Journal of Engineering Science and Computing, June 2016

Nuclear, Biological and chemical (NBC) attack detection is an


important application of Wireless Sensor Networks (WSNs).
Nuclear, Biological and chemical (NBC) agents can be sensed
by sensors and embedded warning system can now send a
warning message. It provides the military critical response
time to check the situation and prevent possible attacks which

7040

http://ijesc.org/

can save lives of many [6]. It is good that t can sense the NBC
and can save many lives but it should be make sure that it can
sense the NBC even in a very little size and at very early
stage. For this purpose the sensor nodes can be placed close to
these to the plant and their threshold value should be set even
very low than the danger limit so that preventive measures can
be taken before the danger limit is reached.
Tracking military vehicles is another important aspect of using
sensors in military side. Here, sensor nodes are deployed from
an unmanned aerial vehicle (UAV) [7] [40-43]. In order to
sense the closeness of tanks, Magnetometer sensors are
attached to the nodes. Sensor nodes collaborate in order to
estimate the path and velocity of tracked vehicle. In order to
track these vehicles, the tracking object should have a
predefined amount of metallic material. Thisamount can be
specified by the programmer while programing the sensor.
IV.
CONCLUSION
From above discussion, it is clear that WSNs plays an
important role in military operations. With the help of these
networks, not only the critical areas can be monitored but also
due to its flexible nature, it can be expanded to the nearby
areas according to the requirements with the passage of time.
Moreover due to its fault tolerance characteristic, if any node
got damaged, the rest of the network will continue sensing.
Rest of the network will not be affected due to the damage of a
single or a group of sensors.
The use of Wireless Sensor Networks (WSNs) will reduce the
casualty rate. Normally these networks are deployed in risky
and critical areas where there is always a strong threat to
soldiers in case of their presence. The damage of sensor
nodes in that scenario is not noticeable because of their easily
availability and inexpensive nature.
As we discussed earlier, Wireless Sensor Networks (WSNs)
have a vast variety of applications for military purposes, but
keeping in mind the importance and critical nature of security
and safety, there should be a number of more applications are
possible in military operations. This requires further research
in this field.
REFERENCES

February 2008, Vol. 2008 Issue 2, p37-43


[3]. Carlos F. Garca-Hernndez, Pablo H. IbargengoytiaGonzlez, JoaqunGarca-Hernndez, and Jess A.
Prez-Daz*; Wireless Sensor Networks and
Applications: a Survey; IJCSNS International Journal
of Computer Science and Network Security, VOL.7 No.3,
March 2007
[4]. Khan, F., Bashir, F., & Nakagawa, K. (2012). Dual Head
Clustering Scheme in Wireless Sensor Networks. in the
IEEE
International
Conference
on
Emerging
Technologies (pp. 1-8). Islamabad: IEEE Islamabad.
[5]. M. A. Jan, P. Nanda, X. He, Z. Tan and R. P. Liu, A
robust authentication scheme for observing resources in
the internet of things environment in 13th International
Conference on Trust, Security and Privacy in Computing
and Communications (TrustCom), pp. 205-211, 2014,
IEEE.
[6]. Khan, F., & Nakagawa, K. (2012). Performance
Improvement in Cognitive Radio Sensor Networks. in
the Institute of Electronics, Information and
Communication Engineers (IEICE) , 8.
[7]. M. A. Jan, P. Nanda and X. He, Energy Evaluation
Model for an Improved Centralized Clustering
Hierarchical Algorithm in WSN, in Wired/Wireless
Internet Communication, Lecture Notes in Computer
Science, pp. 154167, Springer, Berlin, Germany, 2013.
[8]. Khan, F., Kamal, S. A., &Arif, F. (2013). Fairness
Improvement in long-chain Multi-hop Wireless Adhoc
Networks. International Conference on Connected
Vehicles & Expo (pp. 1-8). Las Vegas: IEEE Las Vegas,
USA.
[9]. M. A. Jan, P. Nanda, X. He and R. P. Liu, Enhancing
lifetime and quality of data in cluster-based hierarchical
routing protocol for wireless sensor network, 2013
IEEE International Conference on High Performance
Computing and Communications & 2013 IEEE
International Conference on Embedded and Ubiquitous
Computing (HPCC & EUC), pp. 1400-1407, 2013.

[1]. M. Pejanovi urii1, Z. Tafa1, 2, G. Dimi3, and V.


Milutinovi2, A Survey of Military Applications of
Wireless Sensor Networks; 2012 Mediterranean
Conference on Embedded Computing (MECO); June 19,
2012, ISSN: 2377-5475; Publisher IEEE

[10]. Q. Jabeen, F. Khan, S. Khan and M.A Jan. (2016).


Performance Improvement in Multihop Wireless Mobile
Adhoc Networks. in the Journal Applied, Environmental,
and Biological Sciences (JAEBS), vol. 6(4S), pp. 82-92.
Print ISSN: 2090-4274 Online ISSN: 2090-4215,
TextRoad.

[2]. Michael Winkler, Klaus-Dieter Tuchs, Kester Hughes,


and Graeme Barclay, Theoretical and practical aspects
of military wireless sensor networks; journal of
telecommunication
and
information
technology,

[11]. Khan, F., & Nakagawa, K. (2013). Comparative Study of


Spectrum Sensing Techniques in Cognitive Radio
Networks. in IEEE World Congress on Communication
and Information Technologies (p. 8). Tunisia: IEEE

International Journal of Engineering Science and Computing, June 2016

7041

http://ijesc.org/

Tunisia.
[12]. Khan, F. (2014). Secure Communication and Routing
Architecture in Wireless Sensor Networks. the 3rd Global
Conference on Consumer Electronics (GCCE) (p. 4).
Tokyo, Japan: IEEE Tokyo.
[13]. M. A. Jan, P. Nanda, X. He and R. P. Liu, PASCCC:
Priority-based application-specific congestion control
clustering protocol Computer Networks, Vol. 74, PP92-102, 2014.
[14]. Khan, F. (2014, May). Fairness and throughput
improvement in multihop wireless ad hoc networks.
In Electrical and Computer Engineering (CCECE), 2014
IEEE 27th Canadian Conference on (pp. 1-6). IEEE.
[15]. Mian Ahmad Jan and Muhammad Khan, A Survey of
Cluster-based Hierarchical Routing Protocols, in
IRACSTInternational Journal of Computer Networks
and Wireless Communications (IJCNWC), Vol.3, April.
2013, pp.138-143.
[16]. Khan, S., Khan, F., & Khan, S.A.(2015). Delay and
Throughput Improvement in Wireless Sensor and Actor
Networks. 5th National Symposium on Information
Technology: Towards New Smart World (NSITNSW)
(pp. 1-8). Riyadh: IEEE Riyad Chapter.
[17]. Khan, F., Khan, S., & Khan, S. A. (2015, October).
Performance improvement in wireless sensor and actor
networks based on actor repositioning. In 2015
International Conference on Connected Vehicles and
Expo (ICCVE) (pp. 134-139). IEEE.
[18]. Khan, S., Khan, F., Jabeen. Q., Arif. F., & Jan. M. A.
(2016). Performance Improvement in Wireless Sensor
and Actor Networks. in the Journal Applied,
Environmental, and Biological Sciences Print ISSN:
2090-4274 Online ISSN: 2090-4215
[19]. Mian Ahmad Jan and Muhammad Khan, Denial of
Service Attacks and Their Countermeasures in WSN, in
IRACSTInternational Journal of Computer Networks
and Wireless Communications (IJCNWC), Vol.3, April.
2013.
[20]. M. A. Jan, P. Nanda, X. He and R. P. Liu, A Sybil
Attack Detection Scheme for a Centralized Clusteringbased
Hierarchical
Network
in
Trustcom/BigDataSE/ISPA, Vol.1, PP-318-325, 2015,
IEEE.
[21]. Jabeen, Q., Khan, F., Hayat, M.N., Khan, H., Jan., S.R.,
Ullah, F., (2016) A Survey : Embedded Systems
Supporting By Different Operating Systems in the
International Journal of Scientific Research in Science,

International Journal of Engineering Science and Computing, June 2016

Engineering and Technology(IJSRSET), Print ISSN :


2395-1990, Online ISSN : 2394-4099, Volume 2 Issue 2,
pp.664-673.
[22]. Syed Roohullah Jan, Syed TauhidUllah Shah, Zia
UllahJohar, Yasin Shah, Khan, F., " An Innovative
Approach to Investigate Various Software Testing
Techniques and Strategies", International Journal of
Scientific Research in Science, Engineering and
Technology(IJSRSET), Print ISSN : 2395-1990, Online
ISSN : 2394-4099, Volume 2 Issue 2, pp.682-689,
March-April
2016.
URL
: http://ijsrset.com/IJSRSET1622210.php
[23]. Khan, F., Jan, SR, Tahir, M., & Khan, S., (2015)
Applications, Limitations, and Improvements in Visible
Light Communication Systems In 2015 International
Conference on Connected Vehicles and Expo
(ICCVE) (pp. 259-262). IEEE.
[24]. Syed Roohullah Jan, Khan, F., Muhammad Tahir,
Shahzad Khan,, (2016) Survey: Dealing Non-Functional
Requirements At Architecture Level, VFAST
Transactions on Software Engineering, (Accepted 2016)
[25]. M. A. Jan, Energy-efficient routing and secure
communication in wireless sensor networks, Ph.D.
dissertation, 2016.
[26]. M. A. Jan, P. Nanda, X. He, and R. P. Liu, A
Lightweight Mutual Authentication Scheme for IoT
Objects, IEEE Transactions on Dependable and Secure
Computing (TDSC), Submitted, 2016.
[27]. M. A. Jan, P. Nanda, X. He, and R. P. Liu, A Sybil
Attack Detection Scheme for a Forest Wildfire
Monitoring Application, Elsevier Future Generation
Computer Systems (FGCS), Accepted, 2016.
[28]. Puthal, D., Nepal, S., Ranjan, R., & Chen, J. (2015,
August). DPBSV--An Efficient and Secure Scheme for
Big Sensing Data Stream. InTrustcom/BigDataSE/ISPA,
2015 IEEE (Vol. 1, pp. 246-253). IEEE.
[29]. Puthal, D., Nepal, S., Ranjan, R., & Chen, J. (2015). A
Dynamic Key Length Based Approach for Real-Time
Security Verification of Big Sensing Data Stream.
In Web Information Systems EngineeringWISE
2015 (pp. 93-108). Springer International Publishing.
[30]. Puthal, D., Nepal, S., Ranjan, R., & Chen, J. (2016). A
dynamic prime number based efficient security
mechanism for big sensing data streams.Journal of
Computer and System Sciences.
[31]. Puthal, D., &Sahoo, B. (2012). Secure Data Collection &
Critical Data Transmission in Mobile Sink WSN: Secure

7042

http://ijesc.org/

and Energy efficient data collection technique.


[32]. Puthal, D., Sahoo, B., &Sahoo, B. P. S. (2012). Effective
Machine to Machine Communications in Smart Grid
Networks. ARPN J. Syst. Softw. 2009-2011 AJSS
Journal, 2(1), 18-22.
[33]. M. A. Jan, P. Nanda, M. Usman, and X. He, PAWN: A
Payload-based mutual Authentication scheme for
Wireless Sensor Networks, accepted, 2016.
[34]. M. Usman, M. A. Jan, and X. He, Cryptography-based
Secure Data Storage and Sharing Using HEVC and
Public Clouds, Elsevier Information sciences,
accepted, 2016.

[42]. Ms. Sunita, Jyoti Malik, SumanMor; Comprehensive


Study of Applications of Wireless Sensor Network;
International Journal of Advanced Research in
Computer Science and Software Engineering;Volume 2,
Issue 11, November 2012; ISSN: 2277 128X.
[43]. Kay Romer, Friedemann Mattern; The Design Space of
Wireless
Sensor
Networks;
IEEE
Wireless
Communications, Volume: 11, Issue: 6, pp. 54-61,
December 2004, ISSN: 1536-1284.

[35]. Jan, S. R., Khan, F., &Zaman, A. THE PERCEPTION


OF STUDENTS ABOUT MOBILE LEARNING AT
UNIVERSITY LEVEL. NO. CONTENTS PAGE NO.,
97.
[36]. Khan, F., & Nakagawa, K. (2012). B-8-10 Cooperative
Spectrum Sensing Techniques in Cognitive Radio
Networks.
, 2012(2), 152.
[37]. Safdar, M., Khan, I. A., Ullah, F., Khan, F., & Jan, S. R.
Comparative Study of Routing Protocols in Mobile
Adhoc Networks.
[38]. Shahzad
Khan,
Fazlullah
Khan,
FahimArif,
QamarJabeen, M.A Jan and S. A Khan (2016).
Performance Improvement in Wireless Sensor and
Actor Networks, Journal of Applied Environmental and
Biological Sciences, Vol. 6(4S), pp. 191-200, Print
ISSN: 2090-4274 Online ISSN: 2090-4215, TextRoad.
[39]. M. Usman, M. A. Jan, X. He and P. Nanda, Data
Sharing in Secure Multimedia Wireless Sensor
Networks, in 15th IEEE International Conference on
Trust, Security and Privacy in Computing and
Communications (IEEE TrustCom-16), accepted, 2016.
[40]. Ananyachatterjee,
ManjushaPandey;
Practical
Applications of Wireless Sensor Network Based on
Military, Environmental, Health and Home Applications:
A Survey; International Journal of Scientific &
Engineering Research, Volume 5, Issue 1, January2014., , ISSN 2229-5518.
[41]. Gyula Simon Mikls Marti kos Ldeczi Gyrgy
Balogh Branislav Kusy Andrs Ndas Gbor Pap Jnos
Sallai Ken Frampton; Sensor Network-Based Counters
niper System; SenSys'04 Proceedings of the 2nd
international conference on Embedded networked sensor
systems, Baltimore, USA, November 2004ISBN: 158113-879-2

International Journal of Engineering Science and Computing, June 2016

7043

http://ijesc.org/

You might also like