Wireless Sensor Networks for Detection of IED Emplacement

Abstract : We are investigating the use of wireless nonimaging-sensor networks for the difficult problem of detection of suspicious behavior related to IED emplacement. Hardware for surveillance by nonimaging-sensor networks can cheaper than that for visual surveillance, can require much less computational effort by virtue of simpler algorithms, and can avoid problems of occlusion of view that occur with imaging sensors. We report on four parts of our investigation. First, we discuss some lessons we have learned from experiments with visual detection of deliberately staged suspicious behavior, which suggest that the magnitude of the acceleration vector of a tracked person is a key clue. Second, we describe experiments we conducted with tracking of moving objects in a simulated sensor network, showing that tracking is not always possible even with excellent sensor performance due to the ill-conditioned nature of the mathematical problems involved. Third, we report on experiments we did with tracking from acoustic data of explosions during a NATO test. Fourth, we report on experiments we did with people crossing a live sensor network. We conclude that nonimaging-sensor networks can detect a variety of suspicious behavior, but implementation needs to address a number of tricky problems.

[1]  Michael J. Brooks,et al.  Detecting suspicious background changes in video surveillance of busy scenes , 1996, Proceedings Third IEEE Workshop on Applications of Computer Vision. WACV'96.

[2]  Yangsheng Xu,et al.  Modeling of human walking trajectories for surveillance , 2003, Proceedings 2003 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2003) (Cat. No.03CH37453).

[3]  Bahram Honary,et al.  Location Determination and Tracking Using Radio Beacons , 2005 .

[4]  Susan Hackwood,et al.  Signal and image processing for crime control and crime prevention , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[5]  Maurizio Filippone,et al.  Detecting Suspicious Behavior in Surveillance Images , 2008, 2008 IEEE International Conference on Data Mining Workshops.

[6]  T. Jan,et al.  Neural network based threat assessment for automated visual surveillance , 2004, 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No.04CH37541).

[7]  David W. Pendall Persistent Surveillance and Its Implications for the Common Operating Picture , 2005 .

[8]  Margot Roosevelt Clearing the Roads , 2005 .

[9]  Gaurav S. Sukhatme,et al.  Detecting anomalous human interactions using laser range-finders , 2004, 2004 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) (IEEE Cat. No.04CH37566).

[10]  Arnold Wiliem,et al.  Detecting Uncommon Trajectories , 2008, 2008 Digital Image Computing: Techniques and Applications.

[11]  Neil C. Rowe Detecting Suspicious Behavior from Positional Information , 2005 .

[12]  Sergio A. Velastin,et al.  Intelligent distributed surveillance systems: a review , 2005 .

[13]  Matthew L. Jensen,et al.  Deception detection through automatic, unobtrusive analysis of nonverbal behavior , 2005, IEEE Intelligent Systems.

[14]  Sachi Desai,et al.  Reliable classification of high explosive and chemical/biological artillery using acoustic sensors , 2005, SPIE Defense + Commercial Sensing.

[15]  Matthew P O'Hara Detection of IED Emplacement in Urban Environments , 2008 .

[16]  István Z. Kovács,et al.  Accuracy and timing aspects of location information based on signal-strength measurements in Bluetooth , 2005, 2005 IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications.

[17]  Clay Wilson,et al.  Improvised Explosive Devices (IEDs) in Iraq and Afghanistan: Effects and Countermeasures , 2006 .

[18]  Yanghee Choi,et al.  Distributed and energy-efficient target localization and tracking in wireless sensor networks , 2006, Comput. Commun..