{"title":"Statistical process control testing of electronic security equipment","authors":"D. W. Murray, D. D. Spencer","doi":"10.1109/CCST.1994.363801","DOIUrl":"https://doi.org/10.1109/CCST.1994.363801","url":null,"abstract":"Statistical Process Control testing of manufacturing processes began back in the 1940's with the development of Process Control Charts by Dr. Waiter A. Shewart. Sandia National Laboratories has developed an application of the SPC method for performance testing of electronic security equipment. This paper documents the evaluation of this testing methodology applied to electronic security equipment and an associated laptop computer-based system for obtaining and analyzing the test data. Sandia developed this SPC sensor performance testing method primarily for use on portal metal detectors, but, has evaluated it for testing of an exterior intrusion detection sensor and other electronic security devices. This method is an alternative to the traditional binomial (alarm or no-alarm) performance testing. The limited amount of information in binomial data drives the number of tests necessary to meet regulatory requirements to unnecessarily high levels. For example, a requirement of a 0.85 probability of detection with a 90% confidence requires a minimum of 19 alarms out of 19 trials. By extracting and analyzing measurement (variables) data whenever possible instead of the more typical binomial data, the user becomes more informed about equipment health with fewer tests (as low as five per periodic evaluation).<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"302 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114396763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security mechanism for distributed systems","authors":"Hu Chang, K. Farn, Chih-Hsien Lu","doi":"10.1109/CCST.1994.363792","DOIUrl":"https://doi.org/10.1109/CCST.1994.363792","url":null,"abstract":"In this paper, we provide a new authentication protocol in distributed systems. The proposed protocol includes two primary components. The first component is the user registration and the second component is a secure authentication mechanism. A key partition function is the primary element in user registration with which a service applicant gets his/her resource access privilege from a set of security centers. A sensitive decision function is then designed to qualify the sensitive degree of the applicant. The second component is a authentication mechanism to identify the applicant using his/her qualified key. A numeric example and two lemmas reveal the feasibility of the proposed protocol.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125754877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Alarm verification aids: adding value to closed circuit television and detection systems","authors":"R. M. Rodger, G. Leach, S. D. Featy","doi":"10.1109/CCST.1994.363786","DOIUrl":"https://doi.org/10.1109/CCST.1994.363786","url":null,"abstract":"When a closed circuit television (CCTV) is used in conjunction with a perimeter intruder detection system (PIDS), performance can be improved by using an alarm verification aid (AVA). AVAs range from time-lapse video recorders through freeze frame capture units and small loop action replay systems to DIAMOND (Direct Image Assessment on Demand) type systems. The DIAMOND system presents a sequence of images immediately before and after an alarm to help the operator to decide the cause of the alarm. Earlier research has shown that operators are more likely to notice rapid movement in a scene than something moving slowly or the sudden appearance of a stationary object.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129043540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development and use of a method to commission a perimeter intrusion detection system to a performance standard","authors":"M. Horner, G. Leach, S. Peaty","doi":"10.1109/CCST.1994.363775","DOIUrl":"https://doi.org/10.1109/CCST.1994.363775","url":null,"abstract":"This paper describes the commissioning of a fence-mounted microphonic Perimeter Intrusion Detection Systems (PIDS) to an agreed performance standard. The performance requirements are expressed in terms of a minimum probability of detection and expected false/nuisance alarm rate under different weather conditions. The requirements were developed from both experimental evaluations and computer simulations. This paper gives details of how the PDS 100 PIDS was set up to meet these requirements at an operational site with 30 detection zones. The procedures used were designed to be rigorous enough to ensure that the performance was acceptable, yet quick enough to minimise the time spent commissioning. The tests are based on a calibrated, nondestructive fence tester used to simulate real cutting attacks on the fence. Data from attack trials were used to correlate the signals from real attacks and the fence tester. The commissioning procedure involved one person striking each fence panel, while the generated signals were automatically recorded on a portable computer. This data was used to determine the minimum sensitivity needed for each zone that would have met the required detection rate.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130244031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FISOFM: firearms identification based on SOFM model of neural network","authors":"C. Kou, C. Tung, H. Fu","doi":"10.1109/CCST.1994.363783","DOIUrl":"https://doi.org/10.1109/CCST.1994.363783","url":null,"abstract":"Firearms identification (FI) has been becoming a serious and increasing part of crime investigation for the last two decades. We propose a solution to FI using Neural Network (NN) technology. Lots of methods have been using in FI such as extractor mark, breach mark, ejector mark, and chambering mark identification, etc. We choose the chambering mark identification as our method in this research. It is a simple and useful method for crime investigation. Because of the principle of tool mark, we may identify the firearms. The chambering mark needs to be scanned, preprocessed, segmented, described, reduced and enhanced, and will be recognized by its individual characteristic via the Self-Organizing Feature Map(SOFM) model of NN. It will ease the burden of forensic laboratory's because they do not need to identify the tool mark via microscope.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126705086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An image processing system for the monitoring of special nuclear material and personnel","authors":"T. Thai, J. Carlson, D. Urenda, T. Cooley","doi":"10.1109/CCST.1994.363797","DOIUrl":"https://doi.org/10.1109/CCST.1994.363797","url":null,"abstract":"An important aspect of insider protection in production facilities is the monitoring of the movement of special nuclear material (SNM) and personnel. One system developed at Sandia National Labs for this purpose is the Personnel and Material Tracking System (PAMTRAK). PAMTRAK can intelligently integrate different sensor technologies and the security requirements of a facility to provide a unique capability in monitoring and tracking SNM and personnel. Currently many sensor technologies are used to track the location of personnel and SNM inside a production facility. These technologies are generally intrusive; they require special badges be worn by personnel, special tags be connected to material, and special detection devices be mounted in the area. Video technology, however, is non-intrusive because it does not require that personnel wear special badges or that special tags be attached to SNM. Sandia has developed a video-based image processing system consisting of three major components: the Material Monitoring Subsystem (MMS), the Personnel Tracking Subsystem (PTS) and the Item Recognition Subsystem (IRS).<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122243570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure-Way, an affordable home security system","authors":"J. G. Vinson, D. Knight, B. Mahafza","doi":"10.1109/CCST.1994.363777","DOIUrl":"https://doi.org/10.1109/CCST.1994.363777","url":null,"abstract":"In recent years, demands for affordable small, light weight, multipurpose security system(s) for home usage have been on the rise. Low cost, low power requirements, simplicity of operation, and fast mounting-start-up procedures are desirable features. To date, most home security systems are either too expensive and complex to be utilized by an average home owner, or alternatively, they do not offer adequate protection. A new low cost multipurpose home security system, called Secure-Way, has been developed by KBM Enterprises, Inc. in Huntsville, Alabama. Secure-Way has remote learning capabilities which can be adjusted and updated at any time by the user. RECORD signals are automatically triggered by motion, while STOP signals are programmable. The system utilizes a 9-volt battery, a push on/off button, LED indicators for \"wait for arming\", \"RECORD\", and \"STOP\" modes, and an adjustable alarm/recording times. The device is light weight and can be mounted indoors and/or outdoors.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114197536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid tracking technology","authors":"C. Wong, G. Reshetnikov","doi":"10.1109/CCST.1994.363767","DOIUrl":"https://doi.org/10.1109/CCST.1994.363767","url":null,"abstract":"Electronic personnel and asset tracking systems have historically employed either radio frequency (RF), infrared (IR), or ultrasonic technology. This paper discusses the strengths and weaknesses of each of these technologies and discusses the use of hybrid designs that use the features of one technology to fill the deficiency gaps in another. While each technology possesses inherent advantages and features, each also has its own distinct limitations. For example, while RF can readily track the presence of an article in a large facility using few receivers, establishing the precise location of an article typically requires the installation of many additional receivers and can easily become uneconomic. A hybrid system consisting of two technologies and/or sensor classes working in tandem when intelligently linked would enhance system performance beyond the use of two non linked systems. The use of a common intelligent controller makes the hybrid combination synergistic allowing it to outperform single technologies installed in parallel but not integrated into one system. A key benefit of the hybrid approach is the ability to supervise the tags for location, functionality, and tampering to a much greater degree than is possible with single technology and class systems. The hybrid system is also cost effective when compared to multiple technology non integrated systems since the integration makes use of common system elements such as wiring, power supplies, controllers and annunciators.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134646829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent MTS monitoring system","authors":"So-Lin Yen, H. Hwang","doi":"10.1109/CCST.1994.363769","DOIUrl":"https://doi.org/10.1109/CCST.1994.363769","url":null,"abstract":"Criminal investigation agencies in Taiwan are often frustrated nowadays because criminals can easily communicate through Mobile Telephone System (MTS) and thus escape from being captured. In this paper we present the structure and functions of the intelligent MTS monitoring system to be installed at Ministry of Justice, Investigation Bureau (MJIB). Because it can save the MTS traffic data with A-number, B-number, cell location and direction into specified data base and it can record the monitored speech to dedicated tape and/or transfer to on-site monitoring station automatically, this system really increases efficiency and accuracy for criminal investigation and its capacity can be extended easily.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"11 20","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114046297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Code book cipher system","authors":"K. Shaheen","doi":"10.1109/CCST.1994.363793","DOIUrl":"https://doi.org/10.1109/CCST.1994.363793","url":null,"abstract":"A new system is proposed to enhance the security of a stream ciphering algorithm that is based on non-linear J-K flip flop networks (Pless's system). The new system incorporates a multiplexing algorithm with a Pseudorandom Number Generator (PNG) to generate a random sequence that is totally independent of the corresponding input sequence. This multiplexing algorithm can be achieved by using a 32 MByte Random Access Memory (RAM) code book filled with random sequences where the (25 bit) input sequence will specify the address of the output bytes. Although the RAM code book algorithm is very secure, another level of complexity is added using a non-linear arithmetic operation at the output stage where the message text (400 bits) will be added to a (320 bits) random key and then evaluated for a (320 bits) random base. Both, key and base, are generated by the code book which has a period of 10E110. The overall system is considered an NP-complete problem and it is very secure under plain-text attack.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115686559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}