Detecting Suspicious Behavior from Only Positional Data with Distributed Sensor Networks
Loading...
Authors
Rowe, Neil C.
Subjects
sensors
networks
suspicious
behavior
locations
networks
suspicious
behavior
locations
Advisors
Date of Issue
2005
Date
2005
Publisher
Monterey, California. Naval Postgraduate School
Language
Abstract
Wireless sensor networks are increasingly popular and are being used to measure simple properties of their environment. In many applications such as surveillance, we would like them to distinguish "suspicious" behavior automatically. We distinguish here between suspicious and anomalous behavior, and develop a mathematical model which we illustrate on some sample data. We show the model predicts six classic deception strategies. We conclude with analysis of more sophisticated deceptions that exploit system responses to simpler deceptions.
Type
Conference Paper
Description
Proceedings of DTEC '05, 2005 ASME International Design Engineering Technical Conferences and Computers and Information in Engineering Conference
Series/Report No
Department
Computer Science (CS)
Organization
Identifiers
NPS Report Number
Sponsors
supported by the Chief of Naval Operations, U.S. Navy, N61F22
Funder
Format
Citation
Proceedings of DTEC '05, 2005 ASME International Design Engineering Technical Conferences and Computers and Information in Engineering Conference
Distribution Statement
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.