Raushan Kumar Singh (IIT Ropar), Sudeepta Mishra (IIT Ropar)

Modern technology is advancing on many different levels, and the battlefield is no exception. India has 15000 km of lengthy land borders shared with many other neighboring countries, and only 5 of the 29 states in India do not have any shared international borders or coastlines. Wire fences and conventional sensor-based systems are used to protect terrestrial borders. Wire fences, being the only line of defense against intrusions at most unmanned borders, result in frequent cases of unreported incursion, smuggling, and human trafficking. Typically, intruders cut the fence to gain access to Indian land, and sensor-based systems are prone to false alarms due to animal movements. We propose combining the intelligence of Tiny Machine Learning (TinyML) with the communication capability of IoT to make borders safer and intrusion more challenging. To learn the typical fence movements from natural causes, we use TinyML. Our learning technique is created explicitly to differentiate between regular fence movement and suspicious fence disturbance. The system is efficient enough to detect metal fence cuts and trespassing carefully. With the aid of online learning environments, the sophisticated TinyML microcontroller’s built-in accelerometer can differentiate between different movement patterns. To identify the most effective defense against sensor-level attacks, we conducted tests to gauge the tolerance levels of conventional microcontroller sensor systems against TinyML-powered microcontrollers when exposed to Electromagnetic Pulse (EMP) based sensor hacking attempts. To the best of our knowledge, this is the first research conducted for the Identification of the best suite sensor system for high-precision Internet of Battlefield Things (IoBT) applications. During the real-time model test, the system is found to be 95.4% accurate and readily deployable on TinyML microcontrollers.

View More Papers

Separation is Good: A Faster Order-Fairness Byzantine Consensus

Ke Mu (Southern University of Science and Technology, China), Bo Yin (Changsha University of Science and Technology, China), Alia Asheralieva (Loughborough University, UK), Xuetao Wei (Southern University of Science and Technology, China & Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation, SUSTech, China)

Read More

Enhance Stealthiness and Transferability of Adversarial Attacks with Class...

Hui Xia (Ocean University of China), Rui Zhang (Ocean University of China), Zi Kang (Ocean University of China), Shuliang Jiang (Ocean University of China), Shuo Xu (Ocean University of China)

Read More

SecuWear: Secure Data Sharing Between Wearable Devices

Sujin Han (KAIST) Diana A. Vasile (Nokia Bell Labs), Fahim Kawsar (Nokia Bell Labs, University of Glasgow), Chulhong Min (Nokia Bell Labs)

Read More

Group-based Robustness: A General Framework for Customized Robustness in...

Weiran Lin (Carnegie Mellon University), Keane Lucas (Carnegie Mellon University), Neo Eyal (Tel Aviv University), Lujo Bauer (Carnegie Mellon University), Michael K. Reiter (Duke University), Mahmood Sharif (Tel Aviv University)

Read More