Assessment of Electromagnetic and Passive Diffuse Infrared Sensors in Detection of IED-Related Behavior / 13th ICCRTS: C2 for Complex Endeavors
Author
Rowe, Neil C.
Gurminder, Singh
Sundram, Joshua
Sim, Phua Poh
Date
2008-06Metadata
Show full item recordAbstract
Persistent wireless sensor networks can be a cost-effective way to monitor public areas for suspicious behavior and
reduce the need for military patrols. We examine here their applicability to the difficult problem of detecting
emplacement of improvised explosive devices (IEDs). We first discuss the threat and how wireless sensor
networks could help fight it; flexible and adaptable management of the sensor network is essential. We then report
some experiments with magnetic and infrared sensors from Crossbow Technologies. We built a network of these
sensors and ran human subjects through it engaged in various activities, some involving carrying of ferromagnetic
materials. Results indicated that a variety of suspicious activities could be detected, though not all mock IEDs
triggered detection, and triangulation was difficult due to the tendency of the signal to quickly saturate. Our
network design is such that data can be easily aggregated in larger networks for broad-area automated monitoring
of settings such as airports and busy urban areas.
Description
13th International Command and Control Research and Technology Symposium (ICCRTS), June 17-19, 2008, Seattle, WA.
International Command and Control Research and Technology Symposium, Bellevue,
Washington, June 2008
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Cyber System Assurance through Improved Network Anomaly Modeling and Detection
Bollmann, Chad A. (Monterey, California: Naval Postgraduate SchoolMonterey, California. Naval Postgraduate School, 2019-12); NPS-19-N039-AThe objectives of this work were to investigate the source of the dual natures of network traffic (i.e., Gaussian and alpha-stable) in order prove the merit of further development, improvement, and application of non-parametric ... -
Cyber System Assurance through Improved Network Anomaly Modeling and Detection
Bollmann, Chad A. (Monterey, California: Naval Postgraduate SchoolMonterey, California. Naval Postgraduate School, 2019-12); NPS-19-N039-AThe objectives of this work were to investigate the source of the dual natures of network traffic (i.e., Gaussian and alpha-stable) in order prove the merit of further development, improvement, and application of non-parametric ... -
An implementation of traffic monitoring for UNIX network performance management.
Fu Chen-Hua (Monterey, California: Naval Postgraduate School, 1993-03);Efficient performance and high throughput are the major goals of the network performance management. How can we achieve these goal? First, it is necessary to know the network traffic situations. This thesis research ...