Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393587
Petr Dostál, Lukáš Krasula, M. Klima
The image/video quality is a key issue in security video systems. Therefore the objective image/video quality criteria are extensively studied. In this paper, the novel full reference objective metric for image quality assessment is proposed. This metric is based on FSIM. The ROI detection is embedded in order to improve the performance. For ROI estimation, the ground truth data together with two different algorithms were used and compared - The security and multimedia images from LIVE database were used for performance evaluation. The correlation between the objective and subjective tests of multimedia images was calculated using Pearson's and Spearman Rank Order Correlation Coefficient. For performance comparison the state-of-the-art full reference objective image quality metrics were used; PSNR, SSIM, MS-SSIM, VIF and FSIM. In our previous paper, the importance of demosaicing technique and ROI has been shown. This paper continues in this topic and implements new full reference objective metrics for the reconstructed image quality evaluation. The results reveal that the ROI controlled by bottom-up mechanism can be used for performance improvement.
{"title":"HLFSIM: Objective image quality metric based on ROI analysis","authors":"Petr Dostál, Lukáš Krasula, M. Klima","doi":"10.1109/CCST.2012.6393587","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393587","url":null,"abstract":"The image/video quality is a key issue in security video systems. Therefore the objective image/video quality criteria are extensively studied. In this paper, the novel full reference objective metric for image quality assessment is proposed. This metric is based on FSIM. The ROI detection is embedded in order to improve the performance. For ROI estimation, the ground truth data together with two different algorithms were used and compared - The security and multimedia images from LIVE database were used for performance evaluation. The correlation between the objective and subjective tests of multimedia images was calculated using Pearson's and Spearman Rank Order Correlation Coefficient. For performance comparison the state-of-the-art full reference objective image quality metrics were used; PSNR, SSIM, MS-SSIM, VIF and FSIM. In our previous paper, the importance of demosaicing technique and ROI has been shown. This paper continues in this topic and implements new full reference objective metrics for the reconstructed image quality evaluation. The results reveal that the ROI controlled by bottom-up mechanism can be used for performance improvement.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116433490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393565
Sylvio Bisson, Pushkar E. Godbole, M. McKee, Marc St-Amand
Recognizing that the use of mobile phones in Correctional institutions continues to be an issue, the Correctional Service of Canada (CSC) has initiated an investigation into the various methods available for the prevention of the use of mobile phones in Institutions. The broad groups of “Institutional”, “Detection”, and “Interdiction” technologies reveal a wide range of methods to prevent unauthorized mobile phone use in correctional facilities; however, each has significant drawbacks that limit its efficacy in meeting CSC's goals. The development of a new concept in the interdiction of mobile phone use, the Access Denial Service (ADS), provides an encouraging solution while mitigating most, if not all, of the issues present in the current offerings.
{"title":"Methods for the prevention of the use of mobile phones in Correctional institutions","authors":"Sylvio Bisson, Pushkar E. Godbole, M. McKee, Marc St-Amand","doi":"10.1109/CCST.2012.6393565","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393565","url":null,"abstract":"Recognizing that the use of mobile phones in Correctional institutions continues to be an issue, the Correctional Service of Canada (CSC) has initiated an investigation into the various methods available for the prevention of the use of mobile phones in Institutions. The broad groups of “Institutional”, “Detection”, and “Interdiction” technologies reveal a wide range of methods to prevent unauthorized mobile phone use in correctional facilities; however, each has significant drawbacks that limit its efficacy in meeting CSC's goals. The development of a new concept in the interdiction of mobile phone use, the Access Denial Service (ADS), provides an encouraging solution while mitigating most, if not all, of the issues present in the current offerings.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123339415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393574
Mike Rhead, Robert Gurney, S. Ramalingam, N. Cohen
This paper considers real world UK number plates and relates these to ANPR. It considers aspects of the relevant legislation and standards when applying them to real world number plates. The varied manufacturing techniques and varied specifications of component parts are also noted. The varied fixing methodologies and fixing locations are discussed as well as the impact on image capture.
{"title":"Accuracy of automatic number plate recognition (ANPR) and real world UK number plate problems","authors":"Mike Rhead, Robert Gurney, S. Ramalingam, N. Cohen","doi":"10.1109/CCST.2012.6393574","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393574","url":null,"abstract":"This paper considers real world UK number plates and relates these to ANPR. It considers aspects of the relevant legislation and standards when applying them to real world number plates. The varied manufacturing techniques and varied specifications of component parts are also noted. The varied fixing methodologies and fixing locations are discussed as well as the impact on image capture.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131635458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393575
D. Sheaffer, D. Burnett
Waterborne intruder detection includes many new challenges not seen in land environments. One area of these challenges is the detection of surface swimmers. Swimmers, whose bodies are partially in air and partially submerged, have significantly reduced target strength (TS) for radar and sonar systems compared to intruders fully in air or fully submerged. This reduced TS results in more frequent missed detections or, if detection threshold is widened, increased nuisance alarms. Depending on sea state, a swimmer is also able to blend in with wave noise, making detection even more difficult. We present a method for improved surface swimmer detection in marine environments by fusing data from several sensor systems in both air and water domains to isolate a swimmer's signature from uncorrelated events. This system, tested in Dec 2011 in St. Petersburg FL, produced data indicating significantly improved detection over using any single system. By widening detection threshold of each sensor's detection algorithm but fusing data of each system together, more potential targets can be processed without the risk of increasing nuisance alarms. This work holds the potential to improve the security of several types of water-dependent assets, like commercial harbors, Navy or Coast Guard bases, and nuclear and other water-cooled power plans, and offshore oil platforms.
{"title":"Improved surface swimmer detection through multimodal data fusion","authors":"D. Sheaffer, D. Burnett","doi":"10.1109/CCST.2012.6393575","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393575","url":null,"abstract":"Waterborne intruder detection includes many new challenges not seen in land environments. One area of these challenges is the detection of surface swimmers. Swimmers, whose bodies are partially in air and partially submerged, have significantly reduced target strength (TS) for radar and sonar systems compared to intruders fully in air or fully submerged. This reduced TS results in more frequent missed detections or, if detection threshold is widened, increased nuisance alarms. Depending on sea state, a swimmer is also able to blend in with wave noise, making detection even more difficult. We present a method for improved surface swimmer detection in marine environments by fusing data from several sensor systems in both air and water domains to isolate a swimmer's signature from uncorrelated events. This system, tested in Dec 2011 in St. Petersburg FL, produced data indicating significantly improved detection over using any single system. By widening detection threshold of each sensor's detection algorithm but fusing data of each system together, more potential targets can be processed without the risk of increasing nuisance alarms. This work holds the potential to improve the security of several types of water-dependent assets, like commercial harbors, Navy or Coast Guard bases, and nuclear and other water-cooled power plans, and offshore oil platforms.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131144813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393583
Matthew Ibekwe, S. Vítek, M. Klima, Petr Dostál
This paper studies the security image quality attained in streaming video over wireless networks under different packet error models. Wireless video sensor networks are becoming common place due to increasing crime rates and growing terrorist activities. A crucial requirement for video surveillance technology especially for real-time monitoring is that the video quality must not fall below a certain threshold so that objects and events in these videos could be identified and properly interpreted by viewers. However, the time varying transmission characteristics of the wireless channel and limited throughput can lead to poor performance of multimedia traffic over wireless networks. As a result, the end user may perceive jerky motions, frame freezes, and missing segments which may affect their ability to recognize objects and effectively analyze the scenes. An experimental set-up required for wireless network surveillance using IEEE 802. is described. The authors adopt subjective user tests to study the degree of identification of objects and events in security videos generated from camera security systems and subjected to wireless channel packet loss conditions to benchmark identification in the degraded sequences. Packet loss conditions were introduced into the sequences using NS-2 network simulator.
{"title":"Modeling and evaluation of image quality in wireless surveillance networks","authors":"Matthew Ibekwe, S. Vítek, M. Klima, Petr Dostál","doi":"10.1109/CCST.2012.6393583","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393583","url":null,"abstract":"This paper studies the security image quality attained in streaming video over wireless networks under different packet error models. Wireless video sensor networks are becoming common place due to increasing crime rates and growing terrorist activities. A crucial requirement for video surveillance technology especially for real-time monitoring is that the video quality must not fall below a certain threshold so that objects and events in these videos could be identified and properly interpreted by viewers. However, the time varying transmission characteristics of the wireless channel and limited throughput can lead to poor performance of multimedia traffic over wireless networks. As a result, the end user may perceive jerky motions, frame freezes, and missing segments which may affect their ability to recognize objects and effectively analyze the scenes. An experimental set-up required for wireless network surveillance using IEEE 802. is described. The authors adopt subjective user tests to study the degree of identification of objects and events in security videos generated from camera security systems and subjected to wireless channel packet loss conditions to benchmark identification in the degraded sequences. Packet loss conditions were introduced into the sequences using NS-2 network simulator.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128851772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393535
J. Dabling, James O. McLaughlin, Jason J. Andersen
Kontek Industries (Kannapolis, NC) and their subsidiary, Stonewater Control Systems (Kannapolis, NC), have entered into a cooperative research and development agreement with Sandia National Laboratories (Albuquerque, NM) to jointly develop and evaluate an integrated perimeter security solution, one that couples access delay with detection and assessment. This novel perimeter solution is designed to be sufficiently flexible for implementation at a wide range of facility types, from high security military or government installations to commercial power plants, to industrial facilities of various kinds. A prototype section of barrier has been produced and installed at the Sandia Exterior Intrusion Sensor Testing Facility in Albuquerque, NM. The prototype was implemented with a robust vehicle barrier and coupled with a variety of detection and assessment solutions to demonstrate both the effectiveness of such a solution, as well as the flexibility of the system. In this implementation, infrared sensors and fence disturbance sensors are coupled with a video motion detection sensor and ground sensors. The ability of the system to properly detect pedestrian or vehicle attempts to bypass, breach, or otherwise defeat the system will be characterized, as well as the Nuisance Alarm Rate.
{"title":"Design and performance testing of an integrated detection and assessment perimeter system","authors":"J. Dabling, James O. McLaughlin, Jason J. Andersen","doi":"10.1109/CCST.2012.6393535","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393535","url":null,"abstract":"Kontek Industries (Kannapolis, NC) and their subsidiary, Stonewater Control Systems (Kannapolis, NC), have entered into a cooperative research and development agreement with Sandia National Laboratories (Albuquerque, NM) to jointly develop and evaluate an integrated perimeter security solution, one that couples access delay with detection and assessment. This novel perimeter solution is designed to be sufficiently flexible for implementation at a wide range of facility types, from high security military or government installations to commercial power plants, to industrial facilities of various kinds. A prototype section of barrier has been produced and installed at the Sandia Exterior Intrusion Sensor Testing Facility in Albuquerque, NM. The prototype was implemented with a robust vehicle barrier and coupled with a variety of detection and assessment solutions to demonstrate both the effectiveness of such a solution, as well as the flexibility of the system. In this implementation, infrared sensors and fence disturbance sensors are coupled with a video motion detection sensor and ground sensors. The ability of the system to properly detect pedestrian or vehicle attempts to bypass, breach, or otherwise defeat the system will be characterized, as well as the Nuisance Alarm Rate.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115354114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393553
Xuebing Zhou, C. Busch
Template protection techniques are important supplements to biometrics, which aim to improve system security and safeguard privacy of users. Their development brings a new challenge of privacy and security assessment especially for real systems. In the paper, we take a close look at fuzzy commitment, which is an efficient and widely used template protection algorithm and demonstrates rigorous assessment of an iris fuzzy commitment scheme using the information-theoretical metrics. For instance, a 56 bit long secret can be derived from iris codes. Instead of iris codes, its hash value is stored. However, due to the dependency of iris codes, the uncertainty of secrets reduces to 11.82 bits given protected templates. It confirms the empirical results that an adversary is able to retrieve the iris features from the protected templates with average number of attempts equal to 210.56 as shown in [1]. The poor security and privacy performance is caused by strong correlation of iris feature and unsuitable coding methods used in the algorithm. The quantitative measurement shown in this paper provides a reference guidance on evaluation of template protection in practice. It helps algorithm developers to show the security and privacy of template protection to end-users and to detect the weaknesses of the algorithms.
{"title":"Measuring privacy and security of iris fuzzy commitment","authors":"Xuebing Zhou, C. Busch","doi":"10.1109/CCST.2012.6393553","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393553","url":null,"abstract":"Template protection techniques are important supplements to biometrics, which aim to improve system security and safeguard privacy of users. Their development brings a new challenge of privacy and security assessment especially for real systems. In the paper, we take a close look at fuzzy commitment, which is an efficient and widely used template protection algorithm and demonstrates rigorous assessment of an iris fuzzy commitment scheme using the information-theoretical metrics. For instance, a 56 bit long secret can be derived from iris codes. Instead of iris codes, its hash value is stored. However, due to the dependency of iris codes, the uncertainty of secrets reduces to 11.82 bits given protected templates. It confirms the empirical results that an adversary is able to retrieve the iris features from the protected templates with average number of attempts equal to 210.56 as shown in [1]. The poor security and privacy performance is caused by strong correlation of iris feature and unsuitable coding methods used in the algorithm. The quantitative measurement shown in this paper provides a reference guidance on evaluation of template protection in practice. It helps algorithm developers to show the security and privacy of template protection to end-users and to detect the weaknesses of the algorithms.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124453125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393551
F. Garzia, R. Cusani, E. Sammarco
The security of a port is strongly dependent on the use of integrated access control technology systems. Any weakness of the integrated access control system involves a weakness of the port. For this reason it is necessary to design and realize highly integrated, efficient and reliable access control systems. The authors illustrate the work made to design and realize the integrated access control system of the most important commercial and tourist ports of Italy.
{"title":"Advanced access control system for ports","authors":"F. Garzia, R. Cusani, E. Sammarco","doi":"10.1109/CCST.2012.6393551","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393551","url":null,"abstract":"The security of a port is strongly dependent on the use of integrated access control technology systems. Any weakness of the integrated access control system involves a weakness of the port. For this reason it is necessary to design and realize highly integrated, efficient and reliable access control systems. The authors illustrate the work made to design and realize the integrated access control system of the most important commercial and tourist ports of Italy.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130544008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393577
Rich Messenger, R. Dove
Security strategies and techniques are falling behind the agile pace of adversarial innovative capabilities. A project is underway that has identified six so-called SAREPH characteristics of adversarial self-organizing agility, and is now cataloging patterns toward a pattern language of self-organizing security techniques thatcan be employed for equal or superior security agility. Many such patterns have recently been developed. This paper adds the Genetic Algorithm (GA) to the catalog. The essence of a GA is to express the problem to be optimized in terms of a "fitness function" that evaluates how well candidates optimize the solution. In natural evolution fitness is an organism's ability to survive and reproduce. Computing applications abstract fitness to match the problem at hand, such as an Intrusion Detection System attempting to correlate seemingly unrelated events that collectively constitute a threat Reviewed first are the pattern project and the general nature of the GA. A reusable generic pattern description is developed. Howthe pattern conforms to the SAREPH characteristics is shown. Then three examples from the literature show howthe pattern is employed in SAREPH conformity: predator-prey behavior evolution in robotswarms, future behavior prediction in financially traded stocks, and attack detection in an Intrusion Detection System.
{"title":"Basic Genetic Algorithm pattern for use in self-organizing agile security","authors":"Rich Messenger, R. Dove","doi":"10.1109/CCST.2012.6393577","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393577","url":null,"abstract":"Security strategies and techniques are falling behind the agile pace of adversarial innovative capabilities. A project is underway that has identified six so-called SAREPH characteristics of adversarial self-organizing agility, and is now cataloging patterns toward a pattern language of self-organizing security techniques thatcan be employed for equal or superior security agility. Many such patterns have recently been developed. This paper adds the Genetic Algorithm (GA) to the catalog. The essence of a GA is to express the problem to be optimized in terms of a \"fitness function\" that evaluates how well candidates optimize the solution. In natural evolution fitness is an organism's ability to survive and reproduce. Computing applications abstract fitness to match the problem at hand, such as an Intrusion Detection System attempting to correlate seemingly unrelated events that collectively constitute a threat Reviewed first are the pattern project and the general nature of the GA. A reusable generic pattern description is developed. Howthe pattern conforms to the SAREPH characteristics is shown. Then three examples from the literature show howthe pattern is employed in SAREPH conformity: predator-prey behavior evolution in robotswarms, future behavior prediction in financially traded stocks, and attack detection in an Intrusion Detection System.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130288144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-31DOI: 10.1109/CCST.2012.6393531
Dean Dominguez, M. Parks, Adam D. Williams, S. Washburn
Over the last decade, the world has faced a rapidly expanding and dynamic threat environment. As demonstrated by the 9/11 and 26/11 terrorist attacks, adversary capabilities have evolved to include advanced tactics and increased militancy. For the Department of Energy's National Nuclear Security Administration (DOE/NNSA), and other organizations responsible for protecting facilities housing special nuclear materials, this fragile mix of global uncertainty makes nuclear weapon security an important challenge. Sandia, using scientific and mathematic methodologies, is considered one of the world leaders in the design and implementation of physical protection systems (PPS) and VA methodology, in order to reduce the risk to both domestic and international high consequence facilities. Using the Presagis commercial software suite - primarily Scenario Toolkit and Generation Environment (STAGE), a complex simulation engine - the authors have developed a single analyst, Monte Carlo derived, agent decision-based, and event-driven interactive tool to help meet this need. Evaluating risk reduction for critical infrastructure against increasingly complex adversaries requires high fidelity VA modeling tools. Advanced adversary capabilities require modeling complex scenario variables, including multiple attack vectors and dynamically selected targets of opportunity. Large threat profiles with complex character behavior are needed for increasing adversary militancy. Coupled with Sandia methodology, the strength of the tool stems from the decision logic structure and built-in artificial intelligence components. STAGE allows for an inclusive command and control VA model that uses all traditional elements of a PPS (detection, communication, assessment, delay, command and control, response, interdiction, attrition, and neutralization). This paper will briefly describe the effect that the current threat environment has had on the VA process and then outline the role of STAGE in VA modeling and new threat reduction methodology. This paper also provides an update to the development of the STAGE tool, as well as a description of future plans to advance VA methodology and integrate STAGE simulation analysis with an existing physical site (the Integrated Security Facility at Sandia - a former Category I facility).
{"title":"Special Nuclear material and critical infrastructure security modeling and simulation of physical protection systems","authors":"Dean Dominguez, M. Parks, Adam D. Williams, S. Washburn","doi":"10.1109/CCST.2012.6393531","DOIUrl":"https://doi.org/10.1109/CCST.2012.6393531","url":null,"abstract":"Over the last decade, the world has faced a rapidly expanding and dynamic threat environment. As demonstrated by the 9/11 and 26/11 terrorist attacks, adversary capabilities have evolved to include advanced tactics and increased militancy. For the Department of Energy's National Nuclear Security Administration (DOE/NNSA), and other organizations responsible for protecting facilities housing special nuclear materials, this fragile mix of global uncertainty makes nuclear weapon security an important challenge. Sandia, using scientific and mathematic methodologies, is considered one of the world leaders in the design and implementation of physical protection systems (PPS) and VA methodology, in order to reduce the risk to both domestic and international high consequence facilities. Using the Presagis commercial software suite - primarily Scenario Toolkit and Generation Environment (STAGE), a complex simulation engine - the authors have developed a single analyst, Monte Carlo derived, agent decision-based, and event-driven interactive tool to help meet this need. Evaluating risk reduction for critical infrastructure against increasingly complex adversaries requires high fidelity VA modeling tools. Advanced adversary capabilities require modeling complex scenario variables, including multiple attack vectors and dynamically selected targets of opportunity. Large threat profiles with complex character behavior are needed for increasing adversary militancy. Coupled with Sandia methodology, the strength of the tool stems from the decision logic structure and built-in artificial intelligence components. STAGE allows for an inclusive command and control VA model that uses all traditional elements of a PPS (detection, communication, assessment, delay, command and control, response, interdiction, attrition, and neutralization). This paper will briefly describe the effect that the current threat environment has had on the VA process and then outline the role of STAGE in VA modeling and new threat reduction methodology. This paper also provides an update to the development of the STAGE tool, as well as a description of future plans to advance VA methodology and integrate STAGE simulation analysis with an existing physical site (the Integrated Security Facility at Sandia - a former Category I facility).","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123183312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}