Trustworthiness evaluation of multi-sensor situation recognition in transit surveillance scenariosShow others and affiliations
2013 (English)In: Security Engineering and Intelligence Informatics. CD-ARES 2013 / [ed] Cuzzocrea A., Kittl C., Simos D.E., Weippl E., Xu L., Springer , 2013, p. 442-456Conference paper, Published paper (Refereed)
Abstract [en]
Physical Security Information Management (PSIM) systems are a recent introduction in the surveillance of critical infrastructures, like those used for mass-transit. In those systems, different sensors are integrated as separate event detection devices, each of them generating independent alarms. In order to lower the rate of false alarms and provide greater situation awareness for surveillance operators, we have developed a framework-namely DETECT-for correlating information coming from multiple heterogeneous sensors. DETECT uses detection models based on (extended) Event Trees in order to generate higher level warnings when a known threat scenario is being detected. In this paper we extend DETECT by adopting probabilistic models for the evaluation of threat detection trustworthiness on reference scenarios. The approach also allows for a quantitative evaluation of model sensitivity to sensor faults. The results of a case-study in the transit system domain demonstrate the increase of trust one could expect when using scenarios characterized in a probabilistic way for the threat detection instead of single-sensor alarms. Furthermore, we show how a model analysis can serve at design time to support decisions about the type and redundancy of detectors. © IFIP International Federation for Information Processing 2013.
Place, publisher, year, edition, pages
Springer , 2013. p. 442-456
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 8128
Keywords [en]
Event correlation, Physical security, Probabilistic modelling, Quantitative evaluation, Sensor and data analysis, Trustworthiness, Information management, Information retrieval systems, Information science, Monitoring, Network security, Security systems, Sensors
National Category
Embedded Systems
Research subject
Computer Science, Software Technology
Identifiers
URN: urn:nbn:se:mdh:diva-47811DOI: 10.1007/978-3-642-40588-4_31Scopus ID: 2-s2.0-84892890122ISBN: 9783642405877 (print)OAI: oai:DiVA.org:mdh-47811DiVA, id: diva2:1427348
Conference
CD-ARES 2013 Workshops: 2nd International Workshop on Modern Cryptography and Security Engineering, MoCrySEn 2013 and 3rd International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2013; Regensburg; Germany; 2-6 September 2013;
2018-06-042020-04-29Bibliographically approved