Research Project / Applications Seminar SYST 798 FINAL REPORT Brief Dry-Run 3 April 2008 Team: Matt Maier Tom Hare Eric Ho Brian Boynton Ali Raza Key Sponsor:

Slides:



Advertisements
Similar presentations
© 2007 MSA MSA BIOSENSOR Biological Agent Detector.
Advertisements

Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
For Official Use Only. Public Health and EMS How Long Do You Have to Live? For Official Use Only.
Introduction Build and impact metric data provided by the SGIG recipients convey the type and extent of technology deployment, as well as its effect on.
MINISTRY OF HEALTH ACTION PLAN FOR THE PREVENTION AND CONTROL OF ANTHRAX Dr. Marion BullockDuCasse, SMO(H) Director, Emergency, Disaster Management and.
DFF 2014 February 24, Self-adapting Sensor Networks for Semi- automated Threat Detection in a Controlled Area By Jorge Buenfil US ARMY RDECOM ARDEC.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
What we found Benefits n Annual benefits = 9% to 16% of system cost n Most (60% - 70%) come from meter reader staff reductions. n Considerable stakeholder.
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
The Hazardous Materials Safety and Security Technology Operational Test Joseph P. DeLorenzo Midwest Service Center Hazardous Materials Specialist ITS America.
1 The Next Generation AMR System Pinnacle Technologies (John MacConnell) Valon Technology, LLC (Stuart Rumley) A Joint Development between: and.
Bayesian Biosurveillance Gregory F. Cooper Center for Biomedical Informatics University of Pittsburgh The research described in this.
Multicasting in Mobile Ad-Hoc Networks (MANET)
1 Target Tracking with Sensor Networks Chao Gui Networks Lab. Seminar Oct 3, 2003.
Asia Pacific Economic Cooperation Transportation Working Group ITS Experts Group Chicago, Illinois September 2002 Walter Kulyk, P.E. Director, Office of.
The Need for an Integrated View of Water Quality Modeling and Monitoring Bruce Kiselica USEPA, Region 2 Second Workshop on Advanced Technologies in Real.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Smallpox Vaccination: Risk Assessment and Perspectives of the Health Care Provider, Institution, and State of Illinois.
Emergency Preparedness Laura Long Health Services Agency Public Health Dept.
Pandemic Influenza Preparedness Kentucky Department for Public Health Department for Public Health.
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks Dr. Baruch Awerbuch, David Holmer, and Herbert Rubens Johns Hopkins University Department.
SensEye: A Multi-Tier Camera Sensor Network by Purushottam Kulkarni, Deepak Ganesan, Prashant Shenoy, and Qifeng Lu Presenters: Yen-Chia Chen and Ivan.
Goals Metrics Benefits MilestonesTechnology Challenges A.1 Mobile power – “always on” Identify, implement and test the best ways to use existing technology.
1 DHS Bioterrorism Risk Assessment Background, Requirements, and Overview DHS Bioterrorism Risk Assessment Background, Requirements, and Overview Steve.
Smart Grid Technologies Damon Dougherty – Industry Manager.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Research Project / Applications Seminar SYST 798 FINAL PRESENTATION 9 May 2008 Team: Tom Hare Ali Raza Brian Boynton Eric Ho Matt Maier.
Research Project / Applications Seminar SYST 798 FINAL REPORT Second Dry-Run 24 April 2008 Team: Tom Hare Ali Raza Brian Boynton Eric Ho Matt Maier Key.
Network Aware Resource Allocation in Distributed Clouds.
Gathering Data in Wireless Sensor Networks Madhu K. Jayaprakash.
Grammati Pantziou 1, Aristides Mpitziopoulos 2, Damianos Gavalas 2, Charalampos Konstantopoulos 3, and Basilis Mamalis 1 1 Department of Informatics, Technological.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
Munawwar M. Sohul Dr. Taeyoung Yang Dr. Jeffrey H. Reed a
A novel approach of gateway selection and placement in cellular Wi-Fi system Presented By Rajesh Prasad.
Center for Firefighter Safety Research and Development.
Biological Attack Model (BAM) Status Update February 22 Richard Bornhorst Robert Grillo Deepak Janardhanan Shubh Krishna Kathryn Poole.
HSARPA and Chemical Countermeasures for Homeland Security May 25-27, 2004 “NDIA Homeland Security Symposium”, Arlington, VA Dr. William S. Rees, Jr. Dr.
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
Biological Attack Model (BAM) Formal Progress Report April 5, 2007 Sponsor: Dr. Yifan Liu Team Members: Richard Bornhorst Robert Grillo Deepak Janardhanan.
A Distributed Coordination Framework for Wireless Sensor and Actor Networks Tommaso Melodia, Dario Pompili, Vehbi C.Gungor, Ian F.Akyildiz (MobiHoc 2005)
TM Emerging Health Threats and Health Information Systems: Getting Public Health and Clinical Medicine to Real Time Response John W. Loonsk, M.D. Associate.
1 Distribution Statement “A” (Approved for Public Release, Distribution Unlimited)5/15/2012 Advanced Radio Frequency Mapping (RadioMap) Dr. John Chapin.
Mobile Agent Migration Problem Yingyue Xu. Energy efficiency requirement of sensor networks Mobile agent computing paradigm Data fusion, distributed processing.
STRATEGIES FOR THE DETECTION OF UNKNOWN BIOLOGICAL AGENTS Dr. Peter J. Stopa US Army Edgewood Chemical Biological Center Aberdeen Proving Ground, MD.
Research Project / Applications Seminar SYST 798 PROGRESS REPORT 6 March 2008 Team:Brian Boynton Tom Hare Eric Ho Matt Maier Ali Raza Key Sponsor: Dr.
BARD / April BARD: Bayesian-Assisted Resource Discovery Fred Stann (USC/ISI) Joint Work With John Heidemann (USC/ISI) April 9, 2004.
Intelligence Surveillance and Reconnaissance System for California Wildfire Detection Presented by- Shashank Tamaskar Purdue University
Health Emergency Risk Management Pir Mohammad Paya MD, MPH,DCBHD Senior Technical Specialist Public Health in Emergencies Asian Disaster Preparedness Center.
Bradley Cowie Supervised by Barry Irwin Security and Networks Research Group Department of Computer Science Rhodes University DATA CLASSIFICATION FOR CLASSIFIER.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Governor’s Office of Homeland Security and Emergency Response State Directors Meeting February 24, 2014 Bruce A. Davis, Ph.D. Senior Program Manager Resilient.
Research Project / Applications Seminar SYST 798 Sponsor: Dr. KuoChu Chang Team:Brian Boynton Tom Hare Eric Ho Matt Maier Ali Raza.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Self-stabilizing energy-efficient multicast for MANETs.
Wireless sensor and actor networks: research challenges
Research Project / Applications Seminar SYST 798 Sponsor: Dr. Kuo-Chu Chang Team:Brian Boynton Tom Hare Eric Ho Matt Maier Ali Raza.
Redesigning Liver Distribution David Mulligan, MD, Chair Liver & Intestinal Organ Transplantation Committee November 12-13, 2014.
Research Project / Applications Seminar SYST 798 STATUS REPORT 20 March 2008 Team:Brian Boynton Tom Hare Eric Ho Matt Maier Ali Raza Key Sponsor: Dr. Kuo-Chu.
1 Network Quarantine At Cornell University Steve Schuster Director, Information Security Office.
Communications Range Analysis Simulation Set Up –Single Biological Threat placed in Soldier Field –Communication range varied from meters –Sensor.
DHS S&T Investment in Chemical and Biological Incident Response Technology Erik M. Lucas, Ph.D. Science and Engineering Technical Assistant to Chemical.
Biological Attack Model (BAM) Progress Report March 8 Sponsor: Dr. Yifan Liu Richard Bornhorst Robert Grillo Deepak Janardhanan Shubh Krishna Kathryn Poole.
Support for Femtocell Document Number: IEEE C802.16m-08/1089 Date Submitted: Source: Guang Han, Hua XuVoice: ,
Subway Chemical Detection: A Proposed System Process for a Detect-to-Warn Capability to Save Lives CAPT Joselito Ignacio, MA, MPH, CIH, CSP, REHS Acting.
SECURITY SYSTEM USING PIR. OVERVIEW  Introduction of Embedde system  Aim of the project  Current scenario  Limitations of Current scenario  Futurescope.
VIEWS b.ppt-1 Managing Intelligent Decision Support Networks in Biosurveillance PHIN 2008, Session G1, August 27, 2008 Mohammad Hashemian, MS, Zaruhi.
HSPD-7 Critical Infrastructure Identification, Prioritization and Protection: designates EPA as the sector-specific lead agency for critical water infrastructure.
Internet Quarantine: Requirements for Containing Self-Propagating Code
Effective Social Network Quarantine with Minimal Isolation Costs
Using Whole Genome Sequencing Analysis in California
Presentation transcript:

Research Project / Applications Seminar SYST 798 FINAL REPORT Brief Dry-Run 3 April 2008 Team: Matt Maier Tom Hare Eric Ho Brian Boynton Ali Raza Key Sponsor: Dr. Kuo-Chu Chang

Why is Smallpox a Threat ? < 1972: Vaccination required before entering school World Health Organization declare eradication in 1977 Antibodies may decline after 10 years Population 36 years and younger = 47% USA (approx. 140 million) Militarized smallpox is only source (USA and Russia) Two days of life when released Variola major epidemics – 30% or higher among unvacinnated Today

Sponsor Information GMU SEOR: Homeland Security and Military Transformation Lab Dr. Kuo-Chu Chang, Professor, GMU – Dr. Kathryn Blackmond Laskey, Professor, GMU –

Research Conducted Researched Technical Paperwork –60+ articles/papers/books on biological threats, sensors, communications algorithms, disease characteristics, Chicago city characteristics, etc. –Sponsor provided over 20 technical papers in BSF research area Earl W. Zuelke Jr., Photo Courtesy Chicago Police Marine Unit Chicago Police Marine Unit Conducted Subject Matter Expert (SME) Interviews –Mr. Earl Zuelke, Deputy Director, Homeland Security & Emergency Management for the City of Chicago –Mr. David Hoey, Vice President, Business Development, US Genomics, DARPA BAND Biosensor Development Program –Mr. Alan Northrup, Chief Technical Officer for Sensors, MicroFluidic Systems, Inc. –Mr. Paul Cabellon and Ms. Alleace Gibbs, Northrop Grumman, Aerospace Systems Division, CBRNE Business Area –Dr. Paul Chew, Cornell University, Delaunay/ Voronoi Algorithm Modeling –Mr. Abbas Zaidi, CPN Modeling

Research Conducted (cont.) Held Sponsor Meetings and Project Demos –7 Feb, 20 Feb, 6 Mar, 20 Mar, 3 Apr DoD and DHS Requests for Proposal (RFPs) on Future Biosensors –Feb 2006: DARPA Biological Warfare Defense Project, $750M+ FY08-FY11 –Apr 2004: HSARPA Bioagent Autonomous Networked Detectors (BAND), Rapid Automated Biological Identification System (RABIS), $48M 18mo periods of performance Researched Future Biosensor Development –Johns Hopkins University's Applied Physics Laboratory of Laurel, MD –Ionian Technologies, Inc. of Upland, CA –Goodrich Corporation of Danbury, CT –Battelle Memorial Institute of Aberdeen, MD –Physical Sciences, Inc. of Andover, MA –Research Triangle Institute of Research Triangle Park, NC –Northrop Grumman Systems Corporation of Linthicum, MD –MicroFluidic Systems, Inc. of Pleasanton, CA –Science Applications International, Inc. of San Diego, CA –U.S. Genomics, Inc. of Woburn, MA –IQuum, Inc. of Allston, MA –Nanolytics, Inc. of Raleigh, NC –Sarnoff Corporation of Princeton, NJ –Brimrose Corporation of Baltimore, MD

BioSensor Fusion Aim Objectives: –Minimize the time it takes to inform the public of a biological attack based on Sensor-determined dispersal of attack –Model End-to-End System for constant monitoring of urban environment Determine optimal communications parameters and algorithm usage for Sensor Grid Model usage of current sensor technology

Problem Statement “Improve Urban Biological Terrorism Response” –Lack of detection and fusion today –Slow response times cost lives –False positives cost money Biological Sensor Fusion proposes solutions for: –Detection: Tiered sensor grid –Fusion: Data Aggregation and Geo-Location –Communication: Epidemic, gossip, and geographic algorithms –Response: Real-time cordon mapping in changing environment –Technology: State of the art in 2008 and forthcoming by 2020 Millennium Park, Chicago. Photo Courtesy 80s Forum80s Forum

BioSensor Fusion Background The Modeled Use Case –Smallpox released on the order of 10 billion organisms (~1 g) to contaminate a heavily trafficked urban area –Terrorists would spray the pathogen into the air System Context –Within a city the size of Chicago there is a potential for 575,000 deaths or more –Current response plans would not allow for detection or response before 3-4 days –Our Model will investigate employment of both current, and state of the art technology that will not be put into operation for another 10 years Sears Tower, Chicago. Photo Courtesy Wikimedia Commons Wikimedia Commons

Biological Sensor Fusion – System Context

BioSensor Fusion Project BioSensor Team took a 3-Pronged approach to addressing the problem of a Biological Terrorist attack in a domestic Urban environment –Architecture Products Provides general information about system as well as providing Context for Algorithm and CPN Models as well as general information on system for client –JAVA Algorithm Model Models the communication of the Sensor Grid upon confirmed detection of a Biological attack in an analysis of the efficacy of 5 different algorithms –Coloured Petri Nets Model Analyzes effectiveness of varying numbers and coverage areas of Sensor types, there being 3 types total

System Design Tier II: Mobile Ad Hoc Sensors –Deployed in emergency response vehicles (Emergency, Police, Fire, HAZMAT, etc.) Example: Biowatch 3 Bioagent Autonomous Networked Detector (BAND) Example: General Dynamics Biological Agent Warning Sensor (BAWS) Example: ICX Mesosystems BioBadge™ 100 Wearable Air SamplerICX Mesosystems BioBadge™ 100 Wearable Air Sampler Tier I: Stationary Sensors –Permanent, round-the-clock air- sampling, building installed indoor and outdoor, high-regret Tier III: Stationary Ad Hoc Sensors –Scattered after a threat is confirmed or incorporated in small, personal devices like cell phones –Provide low-regret tracking of dispersion

System Design (cont.) 276 sensors deployed in Chicago District 001 –1 Operations Center and 5 additional Tier I –120 mobile Tier II –150 ad-hoc Tier III Accuracy prioritized over fast detection –False alarms that shut down facilities and displace people can rival the cost of an actual outbreak (~$750 billion)

Assumptions and Constraints The Bioterrorist attack occurs in District 1 of the City of Chicago, where there are approximately 575,000 people circulating as a result of the high density of attractions and tourism associated with this District A Biological terrorist attack has occurred and either Tier 1 or Tier 2 Sensors, have detected a Bio- attack of smallpox virus at a minimum of 4 hours before lab analysis can occur and District Cordoning can be implemented. Evacuation plan is executed while Tier 3 sensors are additionally deployed to the specific suspected attack area. The Tier 3 sensors are deployed to further narrow down the location of the attack and isolate further zones for evacuation and cleaning The Bioterrorist attack involves the physical dissemination of ~1g of the Smallpox organism (can fit on the head of a pin) The smallpox virus initially infects 150 people upon deployment and is deployed to only one street, limited to 1 block of potential dispersion, and will continue to infect people for 24 hrs The incubation period for smallpox is at least 7 days long; on average it takes 12 days for someone to be contagious once exposed to the virus, so infection is not being spread from person to person within the context of this system Avoiding False Positives is considered to be of prime importance: it was gleaned from our subject matter expert that a full response to a False Alarm of a Bioattack can be just as destructive as the attack itself in monetary terms

EVMS

Architecture Products All Views –AV-1 (in development) Operational Views –OV-1 –OV-2 –OV-3 –OV-5: Node Tree & IDEF0 –OV-6c System Views –SV-1 –SV-2 –SV-4 –SV-5 –SV-6 –SV-7 (in development)

-Number of Sensor type II was cut in half -Sensor Ranges are the same -Increase of latency at early stage CPN Model

-Number of Sensor type II was cut in half -Sensor Ranges are the same -Number of Hops are the same CPN Model

JAVA Model Analysis: Latency Conclusions: Latency includes both re-sense time and communications time. Latency is statistically bounded for a given range. Latency decreases logarithmically as range increases. Latency variance decreases with increased range. Communications Ranges 200m+ do not provide significant added benefit. Sensor Ranges 150m+ do not provide significant added benefit. With optimum communications and sensor ranges, latency is typically 3 minutes or less

Analysis: Hop Count Conclusions: Hop Count decreases faster than Latency (nonlinear) as range increases. This is due to the high level of disconnection in the network at low ranges. Hop Count variance decreases as range increases. Variance in minimum and maximum hops due to the arrival of buffered data via separate paths. No significant improvement for ranges 250m+ Hop Count never decreases to less than 1 Hop count (when optimized) is six degrees of separation or less: “Small World Communication”

Analysis: Neighbors and Coverage Conclusions: Neighbor quantity increases exponentially with communications range, but is not affected by sensor range Coverage increases logarithmically with sensor range, but is not affected by communications range In both cases, variance increases as range increases With optimal ranges, neighbors will typically be 0-25 (largely disconnected), and coverage 30% or less

Conclusions: At low range, remaining power has a wide variance. This is due mainly to many communications hops and sensing periods, which has a large impact on power. Low range yielded cases with still very good power conservation in the network. Communications Ranges beyond 250m+ have little and even sometimes a detrimental effect on power conservation. With optimal communications, Sensor Range has a slight impact on remaining power, only at ranges <100meters. Analysis: Power Remaining

Analysis Conclusions Communications Range – Optimal 250m+ –This is feasible with a 5 watt 2.4 GHz transmitter on ad-hoc sensors Sensor Range – Optimal 150m+ –This is feasible e for current biological sensors in development –Low sensor ranges provided the best geo-location accuracy Hop Count – Optimal <6 –Hop Count and Latency are not precisely linearly related. Latency could occur while a mobile node is disconnected from the network –For speedy delivery performance, “Small World Communications” is needed Coverage – Optimal <30% –Only impacted by Sense Range Neighbors – Optimal 0-25, includes disconnection –Only impacted by Communications Range Power – [Data Needed] –Algorithm xxx provides best power conservation –Less than 10% Tier III power on average is needed when optimally configured Fusion –A fused DHS Operations Center result is reasonable in under 5 minutes after biological agent detection. –Sense time has the most impact on overall time to respond to a biological threat.

Final Thoughts Biological Sensor Fusion –Research into prior Biological attack/outbreak scenarios lead us to project an economic loss of $750M and approximately 35 deaths given a status quo, lack of swift response –Our model dictates a full response within hours, allowing no deaths and significantly lower cost for vaccinations, cleanup, and decontamination as a result of Sensor Grid Geo- Location of threat –Our model demonstrates the fusion of data for responders to target a threat real-time, demonstrates the use of ad-hoc and mobile ad- hoc communications in a real-world scenario, and is a high interest research area in DoD and DHS

Future Work Prevention and Treatment –Vaccination Distribution Scenarios –Counter-proliferation Options –Isolation and Treatment Options –Emergency Response Training Sensor Research/ Design –Advanced Technologies: UV Fluorescence, Laser-Induced fluorescence, isothermal arrays, genetic classification, electromagnetic spectroscopy, and microfluidics –Deployment Scenarios Additional Modeling –Biological agent dispersal/ movement –Local sensor processing and data fusion algorithms –Fusion of hospital/medical practitioner data with sensor data –Buffer Size, Cache, Anti-Entropy analyses –Modification of model for other types of EW, ISR or CBRNE sensors –Military Applications

Backup Slides

CPN Model

System Parameters Communications Parameters –Algorithm Used –Range –Burst Time –Tx/Rx Power –Reliability –Data Buffering –Fusion Cordon Sensor Parameters –Quantity –Sensor Lat/Long –Sensor Movement –Range –Sensitivity –Specificity –False Positive Rate –Sense Time –Sense Power –Coverage Analysis Results –Latency –Delivery Rate –Hop Count –Coverage –Remaining Power –Neighbors –Algorithm Type