Page 263 - Shaping smarter and more sustainable cities - Striving for sustainable development goals
P. 263

Security Monitoring

            Security monitoring networks are composed of nodes that are placed at fixed locations throughout
            an environment that continually monitor one or more sensors to detect an abnormality. A key
            difference between security monitoring and environmental monitoring is that security networks are
            not actually collecting any data. This has a significant impact on the optimal network architecture.
            Each node has to frequently check the status of its sensors but it only has to transmit a data report
            when there is a security violation. The immediate and reliable communication of alarm messages is
            the primary system requirement. Additionally, it is essential to confirm that each node is still present
            and functioning. If a node was to be disabled or fail, it would represent a security violation that
            should be reported. For security monitoring applications, the network must be configured so that
            nodes are responsible for confirming the status of each other. One approach is to have each node
            be assigned to peer that will report if a node is not functioning. The optimal topology of a security
            monitoring network will look quite different from that of a data collection network.
            It  is  reasonable  to  assume  that  each  sensor  should  be  checked  approximately  once  per  hour.
            Combined  with  the  ability  to  evenly  distribute  the  load  of  checking  nodes,  the  energy  cost  of
            performing this check would become minimal. A majority of the energy consumption in a security
            network is spent on meeting the strict latency requirements associated with the signaling of the
            alarm when a security violation occurs.
            Once detected, a security violation must be communicated to the base station immediately. The
            latency of the data communication across the network to the base station has a critical impact on
            the application performance. Users demand that alarm situations be reported within seconds of
            detection. This means that network nodes must be able to respond quickly to requests from their
            neighbours in order to forward data.
            Currently there is a new generation of autonomous 3G sensors equipped with video cameras that
            enable the development of new security, surveillance and military applications, the wireless sensor
            network platform for the Internet of Things.
            These new video camera sensors, in conjunction with the 3G communication module, allow the
            creation of sensor nodes that transmit both discrete data gathered by analog and digital sensors
            and complex streams of real time information, such as photos and video, to servers in the Cloud.





















                Figure 32 – 3G sensors stream photo and video to the Cloud for new security applications










            ITU‐T's Technical Reports and Specifications                                                 253
   258   259   260   261   262   263   264   265   266   267   268