Outdoor perimeter security sensors a forty year perspective

K. Harman, Wayne K. Messner
{"title":"Outdoor perimeter security sensors a forty year perspective","authors":"K. Harman, Wayne K. Messner","doi":"10.1109/CCST.2012.6393530","DOIUrl":null,"url":null,"abstract":"Outdoor perimeter security sensors have played, and continue to play, an important role in the security of critical assets and VIP residents over the past 40 years. In many ways outdoor security sensor technology can be described as “Slow-Tech” in a “High-Tech” world. In “High-Tech” we can expect a new product every few months with product lifetimes of one to two years. In the “Slow-Tech” world of outdoor security it typically takes two to three years to develop a new product and another two to three years to get the product approved by the user community. Fortunately once approved these products have a lifetime of ten to twenty years. The Carnahan Conference has provided an important venue for the introduction of new sensor technologies as they emerge from R&D, are tested by various agencies, and are introduced into the “real world” of outdoor security. The harsh realities of the outdoor environment and the wide range of threats faced by these sensors provide many challenges that have been the topic of many of the learned papers. The Carnahan conference provides an opportunity for the users of the technology to relate their experience to those who wish to introduce new technologies. Through the sponsorship of the IEEE these papers form a unique point of reference for the development of new sensors. Forty years ago most of the important players were large aerospace companies. Many of the sensor technologies used in perimeter security evolved from military developments. As one of the dominant users of perimeter security equipment, the US military sponsored much of this early development. This “mil-spec” environment had a profound effect on these developments which in many cases has survived to this day and is part of the heritage of the present world on outdoor perimeter security. These companies gave way to a number of small “spin-off” one product companies where the technologies were exploited. More recently most of one product companies have merged into larger “one-stop-shopping” companies. This paper describes the many changes in technology, the business models and the user community over the past 40 years and concludes with a prediction as to what the next 10 years will bring.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2012.6393530","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Outdoor perimeter security sensors have played, and continue to play, an important role in the security of critical assets and VIP residents over the past 40 years. In many ways outdoor security sensor technology can be described as “Slow-Tech” in a “High-Tech” world. In “High-Tech” we can expect a new product every few months with product lifetimes of one to two years. In the “Slow-Tech” world of outdoor security it typically takes two to three years to develop a new product and another two to three years to get the product approved by the user community. Fortunately once approved these products have a lifetime of ten to twenty years. The Carnahan Conference has provided an important venue for the introduction of new sensor technologies as they emerge from R&D, are tested by various agencies, and are introduced into the “real world” of outdoor security. The harsh realities of the outdoor environment and the wide range of threats faced by these sensors provide many challenges that have been the topic of many of the learned papers. The Carnahan conference provides an opportunity for the users of the technology to relate their experience to those who wish to introduce new technologies. Through the sponsorship of the IEEE these papers form a unique point of reference for the development of new sensors. Forty years ago most of the important players were large aerospace companies. Many of the sensor technologies used in perimeter security evolved from military developments. As one of the dominant users of perimeter security equipment, the US military sponsored much of this early development. This “mil-spec” environment had a profound effect on these developments which in many cases has survived to this day and is part of the heritage of the present world on outdoor perimeter security. These companies gave way to a number of small “spin-off” one product companies where the technologies were exploited. More recently most of one product companies have merged into larger “one-stop-shopping” companies. This paper describes the many changes in technology, the business models and the user community over the past 40 years and concludes with a prediction as to what the next 10 years will bring.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
户外周边安全传感器四十年的展望
在过去的40年里,户外周界安全传感器已经并将继续在关键资产和VIP居民的安全中发挥重要作用。在许多方面,户外安全传感器技术可以被描述为“高科技”世界中的“慢科技”。在“高科技”领域,我们每隔几个月就会推出一款新产品,产品寿命为一到两年。在“慢科技”的户外安全领域,开发一款新产品通常需要两到三年的时间,再花两到三年的时间让产品获得用户群体的认可。幸运的是,一旦获得批准,这些产品的使用寿命为10到20年。卡纳汉会议为介绍新的传感器技术提供了一个重要的场所,因为它们从研发中脱颖而出,经过各种机构的测试,并被引入户外安全的“真实世界”。室外环境的严酷现实和这些传感器面临的广泛威胁提供了许多挑战,这些挑战已成为许多学术论文的主题。卡纳汉会议为该技术的用户提供了一个机会,将他们的经验与那些希望引入新技术的人联系起来。通过IEEE的赞助,这些论文形成了开发新传感器的独特参考点。40年前,大多数重要的参与者都是大型航空航天公司。外围安全中使用的许多传感器技术都是从军事发展中发展而来的。作为周边安全设备的主要用户之一,美国军方赞助了这一早期发展的大部分。这种“军事规范”的环境对这些发展产生了深远的影响,在许多情况下,这些发展一直存在到今天,并且是当今世界户外周边安全遗产的一部分。这些公司让位于一些小的“衍生”产品公司,这些公司利用了这些技术。最近,大多数单一产品公司已经合并为更大的“一站式购物”公司。本文描述了过去40年来技术、商业模式和用户社区的许多变化,并对未来10年将带来什么进行了预测。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Department of Defense Instruction 8500.2 “Information Assurance (IA) Implementation:” A retrospective Attack tree-based evaluation of physical protection systems vulnerability Super-resolution processing of the partial pictorial image of the single pictorial image which eliminated artificiality A concept of automated vulnerability search in contactless communication applications Working towards an international ANPR Standard — An initial investigation into the UK standard
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1