Base Protection Lab (BPL) December 12, 2007 ONR Program Officer: William “Kip” Krebs, 703-696-2575, Alternate POC: Annetta Burger.

Slides:



Advertisements
Similar presentations
2.3.3 MAD SAMBA (Multicamera and distributed Surveillance and multisensor-based surveillance) Contact: Alessandro ZANASI zanasi-alessandro.eu.
Advertisements

anywhere and everywhere. omnipresent A sensor network is an infrastructure comprised of sensing (measuring), computing, and communication elements.
Web Content Control Application Providing Secure & Reliable Internet Access December 2010.
Introduction Build and impact metric data provided by the SGIG recipients convey the type and extent of technology deployment, as well as its effect on.
Existing Axxon Verticals CCTV Module Access Control Face Recognition License Plate Recognition Wagon Numbers Recognition POS Security Intellectual Detectors.
A new Network Concept for transporting and storing digital video…………
1 Improving Efficiency, Reliability and Security in the Mobile Communications & Data Environment Coban User Group 2013, Rob Boback – Public Safety Sales.
Presented by: Team NightStriker Course: EDSGN Section: 006.
“Why do we need Security”  Each business has unique security and safety needs, e.g. Inventory Shrinkage and Theft Personal Safety Break Ins Moving Your.
XProtect® Expert 2013 Product presentation
MOTOROLA and the Stylized M Logo are registered in the US Patent and Trademark Office. All other product or service names are the property of their respective.
1 CISR-consultancy Challenges “Customer ask us what to do next” Keywords: “Customer ask us what to do next” From Policy to Practise The world is going.
Perception and Communications for Vulnerable Road Users safety Pierre Merdrignac Supervisors: Fawzi Nashashibi, Evangeline Pollard, Oyunchimeg Shagdar.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Location Systems for Ubiquitous Computing Jeffrey Hightower and Gaetano Borriello.
Axis Intelligent Video Intelligence where you need it.
seminar on Intrusion detection system
Testing Intrusion Detection Systems: A Critic for the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory By.
Wavion Video Surveillance Solution
David Rogers, Stu Andrzejewski, Kelly Desmond, Brad Garrod.
Crowd Control FVWC 2011 Entry Use of automated site monitoring to supplement and enhance existing surveillance systems on a virtual world platform. Multi-user.
WLAN. A wireless LAN, or WLANLAN WLAN, is a local area network that does not have wired Ethernet connections. A WLAN can be either an extension to a current.
Intrusion and Anomaly Detection in Network Traffic Streams: Checking and Machine Learning Approaches ONR MURI area: High Confidence Real-Time Misuse and.
Mobile Robotics for Inspection and Maintenance in Extreme Environments.
SMUCSE 8394 Devices III Surveillance Cameras. SMUCSE 8394 Surveillance of the Borders 235 different video surveillance systems currently in operation.
MICA: A Wireless Platform for Deeply Embedded Networks
Mobile Distributed 3D Sensing Sandia National Laboratories Intelligent Sensors and Robotics POC: Chris Lewis
SMUCSE 8394 BTS – Devices II Sensors Detection, Surveillance, Protection.
Intrusion Detection Adam Ashenfelter Nicholas J. Tyrrell.
Intrusion Detection System for Wireless Sensor Networks: Design, Implementation and Evaluation Dr. Huirong Fu.
An approach to Intelligent Information Fusion in Sensor Saturated Urban Environments Charalampos Doulaverakis Centre for Research and Technology Hellas.
Multiple Autonomous Ground/Air Robot Coordination Exploration of AI techniques for implementing incremental learning. Development of a robot controller.
Slide Adaptive Sampling and Prediction (ASAP) AOSN-II Undersea Persistent Surveillance (UPS) Autonomous Wide Aperture.
Next-Generation IDS: A CEP Use Case in 10 Minutes 3rd Draft – November 8, nd Event Processing Symposium Redwood Shores, California Tim Bass, CISSP.
Radar Video Surveillance
Computerised Air Traffic Management Tools - Benefits and Limitations OMAR BASHIR (March 2005)
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
IP-based Integrated Security Solutions for Airport Operations and Security AirporTech Asia 2008 Danny Peleg.
AirPatrol’s ZoneDefense for Corrections Complete 24/7 precision monitoring and detection of all mobile devices.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
NC-BSI: 3.3 Data Fusion for Decision Support Problem Statement/Objectives: Problem - Accurate situation awareness requires rapid integration of heterogeneous.
A Survey of Spectrum Sensing Algorithm for Cognitive Radio Applications YaGun Wu netlab.
International Internship Summer 2008: NICTA (Sydney, AU) Caitlin Cottrill.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
1 Distribution Statement “A” (Approved for Public Release, Distribution Unlimited)5/15/2012 Advanced Radio Frequency Mapping (RadioMap) Dr. John Chapin.
Information Technology Needs and Trends in the Electric Power Business Mladen Kezunovic Texas A&M University PS ERC Industrial Advisory Board Meeting December.
Roaming Security Robot Ruslan Masinjila Aida Militaru.
MELE / ABSi PROPRIETARY A System of Sensors A TOTAL SOLUTION FOR THE NATIONAL CAPITAL REGION.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Chapter 14 : Modeling Mobility Andreas Berl. 2 Motivation  Wireless network simulations often involve movements of entities  Examples  Users are roaming.
SensorWare: Distributed Services for Sensor Networks Rockwell Science Center and UCLA.
Computer Science and Engineering Department The University of Texas at Arlington MavHome: An Intelligent Home Environment.
BORDER SECURITY USING WIRELESS INTEGRATED NETWORK SENSORS (WINS) By B.S.Indrani (07841A0406) Aurora’s Technological and Research Institute.
Dr. Stelios Panagiotou, Dr. Stelios C.A. Thomopoulos Integrated Systems Laboratory Institute of Informatics and Telecommunications National Center for.
Jia Uddin Embedded System Lab.  MPLS  IMANET  IMANET network model  Proposed model of IMANET with MPLS  Conclusion.
Security Gateway & Remote Monitoring and Control (RMC)
CPET 565 Mobile Computing Systems Lecture 2 Introduction to Wireless Communication and Networking (2) Hongli Luo Indiana University-Purdue University Fort.
CRESST ONR/NETC Meetings, July July, 2003 ONR Advanced Distributed Learning Bill Kaiser UCLA/SEAS Wireless Networked Sensors for Assessment.
Vehicle Management System Adopted successfully with I.D., wireless Vehicle Management Systems (VMS) for Parking, Residential Societies.
Flame & Smoke Detection System Flame & Smoke Vision Detection is an intelligent vision-based analytics system which can timely detect suspicious fire or.
Application Intrusion Detection
Outline Sensys SensMetrics Solution SensMetrics Performance Measures
Connected Infrastructure
SmartCatch Systems Putting Intelligence into Surveillance
The Next Generation - UNIFIED
Connected Infrastructure
An Overview of the ITTC Networking & Distributed Systems Laboratory
Bringing Large Commercial Airport Capabilities to Your Local Community
RFID Security System Problem Impact Approach Diagram
Utilizing the Network Edge
Presentation transcript:

Base Protection Lab (BPL) December 12, 2007 ONR Program Officer: William “Kip” Krebs, , Alternate POC: Annetta Burger , Presentation to BMVA Symposium on Security and surveillance: performance evaluation

Page 2 Objectives Conduct basic research to provide more open public access to recreational and other non-restricted facilities on military bases and to improve the overall base safety and security utilizing advanced video and signal based surveillance. Create test bed in Hawaii to evaluate whether novel sensors (video cameras, radio frequency identification, seismic, LIDAR, microwave, and infrared sensors) in combination with behavior analysis software can identify patterns of behavior.

Page 3 PMRF BPL System Diagram Alert Delivery & Situation Data Data Collection (Integrated Sensor Systems) RFIDSeismic Sensor Data Links (Wireless) Production System – Data Analysis and Management External (Wide Area) Network Firewall Remote Users and Developers: – SAIC Kauai – SAIC Maui – SAIC Arlington – UH Manoa – Novasol Oahu – Object Video – MHPCC Maui – Others Internet PMRF Base Protection Laboratory (PBPL) MW / IRLidarTextualVideoOthers Middleware Data Storage & Archiving Simulation & Playback Data Fusion & Tracking Behavioral Analysis - Automated Behavior Analysis (ABA) - Statistical Anomaly Detection (SAD) - Agent Based Modeling (ABM) Sensor Data Processing Alert Generation Base Security Development Platform

Page 4 Current BPL Sensor Configuration 22°00 ’ ” N 159°46 ’ ” W Outdoor Test Bed –4.5km by 1km area –Linked by wireless communications Open Architecture Hardware Configuration –Mobile sensors enable optimum sensor coverage for data collection exercises Software Configuration – modular, flexible and reusable –Object-oriented software –Based on Java Jini architecture –Communication through a “ blackboard ”

Page 5 Sensors RFID System – UltraWideBand 2 LIDAR motion trackers 5 License Plate Readers 8 Low Light Cameras 4 Video Cameras Seismic Array (2000 feet) 2 MW/IR Fence Posts (500 feet fence)

Page 6 Data Collection –Scripted Scenarios for Abnormal Activity 4 Days data of confederates –Normal Data 2 Days data of base personnel and recreational visitors Sensor Collection Results –12 video cameras with advanced video analytics software detected and tracked objects of interest without problems –LIDAR – converted for intrusion detection and alarm sensor Detected and provided accurate alerts –Microwave and Infrared Detection Fences 100% detection and 0% false alarms for motion detection –RFID Limited coverage to be improved with tuning antennas and replacing fixed sensors with mobile units –Seismic No data available due to compatibility issues Sensors should be available Jan08

Page 7 Proposed RFID Coverage 2D coverage (coordinates) Seen by three or more receivers Provides (x, y) with 3m or better accuracy 1D coverage (a point between two sensors) Seen by two receivers Provides a point (x Σ, y Σ ) on a line between the two sensors. 0D coverage (presence in an area) Seen by one receiver Provides the coordinates of the sensor (x S, y S ) that sees the entity No detection (no information) Seen by none of the receivers

Page 8 RFID Track

Page 9 Video Tracks

Page 10 LIDAR Sensor 1000 feet

Page 11 LIDAR Tracks System Administrator Display - pedestrian and vehicle traffic map overlay

Page 12 Challenges Develop a reliable, plug-play, robust test bed to meet researcher requirements. Develop common standard data sets that vary in difficulty that can be used to assess algorithm performance. Develop valid and reliable metrics to evaluate and compare behavioral algorithm performance.

Page 13 Future Plans Create common data sets and metrics. Distribute data sets to research community to test whether behavioral algorithms can detect “ normal ” and “ anomalous ” behavior for the prediction of threats and advance warning using a variety of sensors. Test and evaluate sensor options to optimize early detection of threat behavior and reduce security manpower requirements.