Agricultural intrusion detection (AID) based on the internet of things and deep learning with the enhanced lightweight M2M protocol

A. Jerrin Simla,Rekha Chakravarthi,L. Megalan Leo
DOI: https://doi.org/10.1007/s00500-023-07935-1
IF: 3.732
2023-03-04
Soft Computing
Abstract:Internet of Things (IoT) networking technology with Image processing is used in monitoring applications that have advanced sensor development to new levels. Various conflicts between people and animals become a significant issue in the agricultural sector, putting both crops and human life in jeopardy as well as causing significant resource loss. In this paper, we have used wireless sensors with an animal intrusion warning system to tackle this issue, which then automatically alerts both the landowner and the forest service. Depending on the sort of intrusion, this can serve as an early warning message for action. The sensor will find the animal movement or the assailants, and the camera will take a picture. A microcontroller will classify the picture using image processing techniques, and a GSM module transfer an SMS alert to the forest department or the landowner. Around the farm, it has installed motion sensors in several places. Continuous movement is detected by these sensors, which use GSM to connect with the owner. In addition, distinguishing between authorized and unauthorized animal incursions with the use of deep learning, the camera image sensor module is used and examined. A method of keeping animals away is employed in agricultural areas to stop wild animals from damaging crops. Investigation and the avoidance of security breaches will heavily rely on intrusion detection systems. The IoT technology advances in the application layer are presented in an easy-to-understand overview in this article, together with the lightweight communication protocol lightweight M2M (LwM2M). The assessment then examines recent lightweight communication protocols, reviewing their Response time, Packet Delivery Ratio, Energy consumption, latency, bandwidth requirements, throughout, and security. We also discussed an experimental comparison between Message Queuing Telemetry and LwM2M.
computer science, artificial intelligence, interdisciplinary applications
What problem does this paper attempt to address?