Document Type : scientific-research article

Authors

1 Ferdowsi University of Mashhad

2 Tarbiat Modares University

Abstract

Extended Abstract
1. Introduction
International boundaries are considered as the first point of impact and the front-line of combat with threat; hence, boundary security greatly induces the national security of the country. As a result, throughout the history, governments have always tried to apply various plans and policies, proportional to the time, place, and technology in each historical period to secure the boundaries. The construction of the Wall of China, Hardin, Golestan, etc. by the governments is the evidence of this point. Iran, due to being located in the Middle East, is faced with major challenges and developments. The threats such as illegal migrations, human and drug trafficking, the importation of prohibited goods, and ethnic movements on the one hand, and the specific features of the border areas _geographical isolation, being away from the center, the lack of development of the border areas, etc._ on the other hand, spread insecurity in the border areas. Therefore, it is essential to study the optimal approaches and strategies of boundary management.
2. Theoretical Framework
The concept of boundary security refers to the prevention of any act incompatible with the national boundaries law of one country and the legalization of people and goods' transport as well as the domestic animals allowed through the boundary gates in compliance with the legal norms (Zarghani, 2007). Obviously, boundary security with its diverse aspects strongly supports the security inside the country (Khatabi, 1995). In the case of security, boundary management, and boundary control, there are several policies and strategies. Countries, according to geographical, political, economic, geopolitical, social, and cultural features, use these designs and practices. In general, three types of management models exist in the field of boundary management and control: Military-disciplinary management model, functional developmental management model, and integrated and combined management model. In Military-disciplinary management model, boundary control and management is done by the military and police forces because of the threats in the surrounding countries and across boundaries. . In this model, control and boundary management is done by using traditional and modern methods and tools including physical obstruction (digging channels, blocking the opening of the boundary, installing barbed wire, creating fine soil, concrete wall, etc.), hardware obstruction (the strengthening of boundary forces, formed military units, the boundary security of border area, etc.), and software control (the use of geographic information systems, space sensors, radar surveillance and eavesdropping, electronics and optics equipment).
3. Methodology
This study is descriptive-analytical and for collecting the data, documents from library and the Internet were used. Moreover, MATLAB software was used for simulation. This software has a wide range of applications, such as signal and image processing, communications, design, test and measurement, modeling, analysis, simulation and so on. This study examines the various methods of control and boundary management in various ways; and finally confirms the use of wireless sensor network as a modern way in science and technology to provide good control of boundaries and its effectiveness in security and boundary control in the border areas.
4. Results
The threats surrounding Iran during the past three decades has led the country to use different policies, plans, methods and tools to manage territorial boundaries. A review and estimate of the efforts in recent years in the field of management and boundary control including constructing earthworks , building materials, establishing boundary checkpoints, using barbed wire, etc. showed that despite spending a lot of money, they cannot effectively manage and control the boundaries. The findings of this study demonstrated that the use of wireless sensor network model in terms of simulations model utilizing three factors, i.e., vibration, speed, and amount of metal, well represented the detection of the moving objects in any type of physical environment. Therefore, based on simulations performed, this type of sensor can be used in any geographical environment, including water, marine, land, swamp, forest, and so onto control and manage the country's boundaries.
5. Conclusion and Suggestions
The unsecured strategic environment dominant in Southwest Asia, the governments and the poor governance in some neighboring countries of Iran, a continued political instability, economic crises and multiple tensions, forced migration, refugees, etc. in one hand, and Iran's long dry and water borders with its neighbors on the other hand, confirms that Islamic Republic of Iran has no choice except the strengthening and the management and control of the boundaries for national security. To manage and optimize boundary control, various methods and tools have been used that some of them, such as building walls, digging ditches, etc., have not only had a high cost, but also did not work. Accordingly, the use and application of new tools and technologies for monitoring and controlling the boundaries of the country is essential. Wireless sensor networks are one of the newest technologies that we are able to use constantly, especially in certain situations (for example, in very rugged mountainous areas) and to monitor and supervise a specified location. In fact, by the design of electronic control boundaries and using wireless sensor networks, boundary management can be done at a relatively lower cost. Wireless sensor networks can be used as an important part of communications, surveillance, navigation and systematic process of military and can be used in any geographical environment, including water, marine, land, swamp, woodland in order for the control and management of boundaries.

Keywords

1. اخباری، م.؛ نامی، م.ح. (1388). جغرافیای مرز با تأکید بر مرزهای ایران. تهران: سازمان جغرافیایی نیروهای مسلّح
2. اعظمی، ه.؛ خلیلی، م.؛ و دهمرده، م. (1391). بررسی و تحلیل چالش‌های امنیتی مرزهای استان سیستان‌وبلوچستان. همایش ملّی شهرهای مرزی و امنیت، چالش‌ها و رهیافت‌ها. دانشگاه سیستان‌وبلوچستان. 152ـ165
3. جان‌پرور، م.؛ لسانی، س. (1392). سازمان‌دهی و به‌کارگیری ساکنین مرزی در مدیریت مرزها با رویکرد پدافند غیرعامل. ششمین کنگرۀ انجمن ژئوپلتیک ایران پدافند غیرعامل، 7 و8 آبان
4. حافظ‌‌نیا، م.ر. (1385). تحلیل کارکردی مرز بین‌المللی: مرز ایران و افغانستان. فصلنامۀ مدرّس علوم انسانی ـ برنامه‌ریزی و آمایش فضا، 10(2)، 69ـ78
5. حیدری، م.؛ انعامی علمداری، س.؛ و فتّاحی، ف. (1391). ژئوپلیتیک مرز و الگوی مدیریت و کنترل مرزهای شرقی ایران. فصلنامۀ ژئوپلیتیک، 8(3)، 118ـ 153
6. خطابی، غ. (1374). مرزبانی. تهران: معاونت آموزشی ناجا
7. روشن، ع.‌ا.؛ سعادتی جعفرآبادی، ح.(1391). بررسی نقش و کارکرد کنترل مرز استان خراسان رضوی با افغانستان و تأثیر آن بر امنیت استان. فصلنامۀ ژئوپلتیک، 8 (3)، 154ـ181
8. زرقانی، س.ه. (1386). مقدّمه‌ای بر شناخت مرزهای بین‌المللی. تهران: انتشارات دانشگاه علوم انتظامی
9. زرقانی، س. ه.؛ اعظمی، ه.؛ و لطفی، ا. (1392). بررسی شیو‌ه‌ها و سیاست‌های مدیریت مرزها و نقش آن در امنیت مرز، نمونۀ موردی مرزهای شرقی ایران(خراسان- افغانستان). مجلّۀ جغرافیا و توسعۀ ناحیه‌ای، 11(20)، 83ـ108
10. صنایعی، ا. (1386). فرماندهی پاسگاه مرزی. تهران: مرکز فنّاوری آموزش
11. قوام‌ملکی، ح.ر. (1389). محدودیت‌ها و فرصت‌های توسعۀ اجتماعی ـ فرهنگی نواحی مرزی. دفتر تحقیقات کاربردی نیروی انتظامی
12. کریمی‌پور، ی. (1379). مقدّمه‌ای بر ایران و همسایگان. تهران: انتشارات جهاد دانشگاهی. دانشگاه تربیت معلّم
13. لطفی، ا. (1390). بررسی شیوه‌ها و سیاست‌های کنترل مرز: نمونۀ موردمطالعه: خراسان رضوی ـ افغانستان. (پایان‌نامۀ منتشرنشدۀ کارشناسی ارشد). دانشگاه فردوسی مشهد، دانشکدۀ ادبیات و علوم انسانی، گروه جغرافیا
14. مجتهدزاده، پ. (1379). ایده‌های ژئوپلیتیک و واقعیت‌های ایرانی. تهران: انتشارات نی
15. مهدوی، د. (1386). چالش‌ها و چشم‌اندازهای کنترل مرزها. دو ماهنامۀ توسعۀ انسانی پلیس، 4(15)، 73ـ 90
16. Doyle, T. (2007). Collaborative border management.Word Customs Journal, 4, 15-22
17. Hatime, H., Namuduri, K., & Watkins, M. (2011). OCTOPUS: An on-demand communication topology updating strategy for mobile sensor networks. The Institute of Electrical and Electronics Engineers Sensors Journal., 11) 4(,1004–1012
18. Heinesson, P. (2009). Accreditation and Border Management. Retrieved from admin.kghcustoms.com/ upload/ sites/ 1/ files/ KGH%20 Border%20 Services%20 webb.pdf
19. Soro, S., & Heinzelman, W. (2009). Cluster head election techniques for coverage preservation in wireless sensor networks. Ad Hoc Networks, 7(5), 955–972
CAPTCHA Image