{"title":"Space Division Multiple Access for Wireless Sensor Networks","authors":"Abdallah El Moutia, K. Makki, N. Pissinou","doi":"10.1109/THS.2008.4534495","DOIUrl":"https://doi.org/10.1109/THS.2008.4534495","url":null,"abstract":"A uniform latin square of order k = m2 is an k times k square matrix that consists of k symbols from 0 to k-1 such that no symbol appears more than once in any row or in any column. This property is also maintained in any m times m area of main subsquares in a k times k Latin square. The uniqueness of each symbol in the main subsquares presents very attractive characteristic in applying uniform latin squares to time slot allocation problem in sensor networks. In this paper, we propose a space division multiple access (SDMA) scheme for wireless sensor networks based on Uniform Latin squares. The SDMA divides the geographical area into space divisions, where there is one-to-one map between space divisions and time slots. Because of the uniqueness of the symbol value in any main subsquares, the mapping of time slots into space divisions guaranties a collision-free medium access to sensor nodes. We also study the effect of the use of multiple transmission power levels and corresponding packet lengths on the system throughput. To do so, a self-controlled multiple power level algorithm has been proposed to improve the throughput of a multiple power level system.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125291821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applying ROI Analysis to Support SOA Information Security Investment Decisions","authors":"K. Buck, P. Das, D. Hanf","doi":"10.1109/THS.2008.4534478","DOIUrl":"https://doi.org/10.1109/THS.2008.4534478","url":null,"abstract":"Offering functionality and data in a secure manner poses significant challenges for Government enterprises that are embracing approaches, such as Service- Oriented Architectures (SOA), especially when there is a desire to promote information sharing across functional, organizational, or Community of Interest (COI) boundaries. Many Government organizations evaluate Implementation of security measures against the risk that a particular vulnerability will be exploited by a particular threat. Informed Information security Investment decisions are made based upon analysis of cost, benefit, schedule, performance, and risk tradeoffs. The Investment decision-making space for Information security In a web-based, service-oriented environment is explored in this paper, and methods for evaluating operational, economic and performance implications are considered. This paper discusses the value and practicality of applying Return-on-Investment (ROI) analysis for Government information security investment decision-making, especially when information sharing is a key success driver. Recommendations are based upon preliminary findings of a MITRE Mission-Oriented Investigation and Experimentation (MOIE) effort related to SOA Performance Measures Expression In Performance-Based Acquisition (PBA) Vehicles.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125056602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Concept of Airport Security Screening","authors":"Y. Yildiz, D. Abraham, K. Panetta, S. Agaian","doi":"10.1109/THS.2008.4534493","DOIUrl":"https://doi.org/10.1109/THS.2008.4534493","url":null,"abstract":"Airport security measures serve to protect the traveling public, crew and aircraft. According to the TSA over 600 million passengers travel on commercial airlines and more than 700 million pieces of luggage are screened each year [2]. With such a large number of people traveling, airports and aircraft have become natural targets for terrorists. We propose a new concept of airport security screening measures that connects all airport security screening equipment for passengers and their belongings together from the onset of their check-in. Utilizing historical and profiling passenger information and the global security threat level to adapt and optimize the screening level and process for each screening device, it will streamline all check-in activities while drastically improving the overall quality of screening.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"458 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125827716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rohan Narayana Murty, G. Mainland, Ian Rose, Roy Chowdhury, Abhimanyu Gosaint, Josh Berst, M. Welsh
{"title":"CitySense: An Urban-Scale Wireless Sensor Network and Testbed","authors":"Rohan Narayana Murty, G. Mainland, Ian Rose, Roy Chowdhury, Abhimanyu Gosaint, Josh Berst, M. Welsh","doi":"10.1109/THS.2008.4534518","DOIUrl":"https://doi.org/10.1109/THS.2008.4534518","url":null,"abstract":"In this paper, we present the vision for an open, urban-scale wireless networking testbed, called CitySense, with the goal of supporting the development and evaluation of novel wireless systems that span an entire city. CitySense is currently under development and will consist of about 100 Linux-based embedded PCs outfitted with dual 802.11a/b/g radios and various sensors, mounted on buildings and streetlights across the city of Cambridge. CitySense takes its cue from citywide urban mesh networking projects, but will differ substantially in that nodes will be directly programmable by end users. The goal of CitySense is explicitly not to provide public Internet access, but rather to serve as a new kind of experimental apparatus for urban-scale distributed systems and networking research efforts. In this paper we motivate the need for CitySense and its potential to support a host of new research and application developments. We also outline the various engineering challenges of deploying such a testbed as well as the research challenges that we face when building and supporting such a system.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126065707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bioevent detection via fusion of disparate data","authors":"P. Picciano, R. Mccormack","doi":"10.1109/THS.2008.4534433","DOIUrl":"https://doi.org/10.1109/THS.2008.4534433","url":null,"abstract":"The biosurveillance domain presents a deluge of disparate data overloading analysts to the point where critical information can be missed. The abundance of data heightens the appeal of information fusion solutions. In general, sensor fusion approaches can be viewed as bottom-up and driven by technical capabilities. Often neglected are the information needs that can help human operators optimize performance. We assert improved fusion techniques can arise by implementing top-down processes derived from operator information needs, task demands, and work environment context. Numerous cognitive engineering methods are available to construct such processes. Thus we posit a bidirectional approach is needed to achieve higher-level fusion and support the human operator with decision tasks.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122157638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Overview of the Operation for the Proposed Locomotive Worker Identification with Cameras","authors":"S. Martín","doi":"10.1109/THS.2008.4534476","DOIUrl":"https://doi.org/10.1109/THS.2008.4534476","url":null,"abstract":"This paper will present the results of a system added to an active railroad system located in the southern United States. The addition of locomotive transportation worker identification certificate (TWIC) and camera systems in locomotives which prevents unauthorized movement of the locomotives as well as giving the ability to monitor activity associated with each locomotive. The TWIC is a recently implemented requirement for port transportation workers. Forward and aft looking cameras mounted on each locomotive provides further security. A live video feed of the footage locomotive can be accessed via the Internet by authorized personnel and designated agencies. 'Real time' GPS positioning data are provided at specified intervals so the physical location of each locomotive is known at all times. Each engineer on an engine is assigned and issued a technology-based credential (PIN validated) which is used for control of engine start-up, and as an event log of use. The system administrator enrolls each employee at the 'head end' TWIC server. This server networks with the 24 currently active locomotives to populate each locomotives security device with the proper credentials. The system as designed can accommodate more than 100 engines. Upon verification a \"valid\" read of the credential and PIN entry enables the train engineer to commence with the \"start-up\" process. As part of this deployment option the team integrated a metropolitan wireless network utilizing technology with GPS capability. All signals from each locomotive for the video and GPS positioning data are monitored by a network operations center.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128018794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Raising the Bar for Hardware Security: Physical Layer Security in Standard CMOS","authors":"C. Rawlings","doi":"10.1109/THS.2008.4534461","DOIUrl":"https://doi.org/10.1109/THS.2008.4534461","url":null,"abstract":"As the sophistication of attacks on secured systems extends to the international electronic borders, there exists an increased need for enhanced physical layer security in silicon in order to protect sensitive information such as encryption keys used in most security systems. With hardware security as one of the new primary requirements for many, if not most, system architectures, new questions are being asked of various memory technologies in order to prohibit the reverse engineering or break down of the overall system for the life of that security system, standard, and/or protocol. One of the most relevant questions to the topic of hardware security is, \"How physically secure is the underlying memory technology?\" Equally important is the question of securing sensitive encryption keys throughout the manufacturing process. These two hardware security factors are important since encryption is only as robust as the ability for any encryption based system to keep the encryption key hidden. A new embedded permanent memory technology based on a standard logic CMOS antifuse provides unprecedented physical layer security for security applications such as HDCP (High bandwidth Digital Content Protection) and AACS (Advanced Access Content System), both of which require unique encryption keys for each hardware device. While these are commercial security standards used to protect digital media in the consumer marketplace, the same principals apply to the public sector. A CMOS logic antifuse technology, developed and patented by Kilopass, when combined with a robust key distribution, tracking, and management system, tailored for semiconductor manufacturing, provides end-to-end security for sensitive encryption keys from the author or originator of the encryption key through to the end product.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":" 20","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113950525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. C. Haase, P. Monin, Z. S. Haase, R. F. Young, M.S. MacGregor
{"title":"Real-Time System for Stand-Off Measurement of Structural Stability","authors":"W. C. Haase, P. Monin, Z. S. Haase, R. F. Young, M.S. MacGregor","doi":"10.1109/THS.2008.4534474","DOIUrl":"https://doi.org/10.1109/THS.2008.4534474","url":null,"abstract":"Summit Safety has developed a non-contact, ultrasound-based sensor capable of detecting small changes in position of a structure and small vibrations that may be precursors of structural collapse. The sensor uses two ultrasonic transducers - one for transmit, and one for receive - and processes the return echo in a manner similar to that of a laser interferometer to generate high-resolution position, velocity, and acceleration information about structural surfaces. By using ultrasound, the sensor operates even in the presence of thick smoke, dust, or fog, which could render an optical or laser-based system unusable. Because the sensor is non-contact, it can be installed quickly and potentially out of harm's way. Installation and alignment of the sensor can be accomplished in a matter of seconds. Summit Safety received initial funding from NIST and follow-on phase 1 and phase 2 SBIR contracts from DHS to continue the development of the monitoring system. Phase 1 focused on analyzing the accuracy and performance limitations of the sensor. phase 1 further identified particular collapse scenarios and different types of structures in order to best utilize the measurement capability of the system for collapse detection and prediction. During phase 2 (currently in process) the system is being converted from an engineering tool to a system capable of providing real-time measurement of structural stability and advanced warning of pending collapse for first responders and emergency personnel. The system will display structural stability data from wireless sensors on a central display system.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"40 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128826656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Zaki, D. Whitford, G. Bizzigotti, A. Hafez, R. Corbo, H. Carlson
{"title":"Integrated Knowledge Management System (IKMS)","authors":"T. Zaki, D. Whitford, G. Bizzigotti, A. Hafez, R. Corbo, H. Carlson","doi":"10.1109/THS.2008.4534465","DOIUrl":"https://doi.org/10.1109/THS.2008.4534465","url":null,"abstract":"Noblis, a not-for-profit organization, has extensive experience in the development of knowledge management systems (KMSs), and has recently developed a KMS for the Department of Homeland Security to address a specific need in the chemical threat area. While this KMS does not include a risk assessment model, it possesses the attributes required for the incorporation of such a model. It can also be expanded to include other threat agents as well (e.g., biological). The secured, web- enabled KMS includes an advanced search engine which provides powerful search capabilities. The index server allows for a complete integration with the Web application server and other components, providing substantial control over access to indexed documents. The KMS also incorporates a Noblis proprietary knowledge management module which operates on text to retrieve more complicated concepts than what can be extracted using common search tools. This paper sheds some light on the architecture of this KMS, and it also presents and discusses the architecture for an integrated knowledge management system (IKMS).","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121242110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Control System Cyber Incident Reporting Protocol","authors":"S. Hennin","doi":"10.1109/THS.2008.4534497","DOIUrl":"https://doi.org/10.1109/THS.2008.4534497","url":null,"abstract":"Information sharing about cyber incidents that affect the normal, safe operation of industrial control systems is not well coordinated or standardized across critical infrastructure sectors of the economy. Consequently there is little situational awareness about the frequency, type and extent of control system cyber incidents - a deficiency with potential national security implications. Control system disruption due to cyber rather than physical means is increasingly a concern of industry and government. More and more control systems utilize commercial off-the-shelf computer technology, and are inter-connected with business enterprise systems and the Internet. Not only are control systems in different sectors interdependent but the commonality of technology means that all sectors face a common cyber threat. These common cyber threats and vulnerabilities present the opportunity for common solutions to be adopted across industry sectors. The solutions include the elimination of vulnerabilities in control system designs and implementations. But with constantly evolving technology and the ever-present threat of cyber attack, tools are needed to support the early detection and timely reporting of control system cyber incidents. A Raytheon-led team is working in consultation with industry and government to define a standard protocol and data schema for the timely reporting of actual and potential cyber attacks on industrial control systems. Previous efforts to share cyber incident information have encountered barriers, including data confidentiality and detection of novel cyber attack methods. Potential solutions to these barriers and deployment approaches for information sharing tools based on the protocol standard are described.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123234090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}