A priori information on suspicious behaviour is extremely valuable for countering threats involving improvised explosive
devices (IEDs). Suspicious activities along routes during expeditionary operations can be monitored by unattended
networks using simple sensing nodes that can gather data for continuous monitoring of daily vehicle activity. Dedicated
software yields the necessary intelligence on these activities by filtering suspicious behaviour from anomalous behaviour
(including false alarms). Research has started to equip a commercially available sensor network with data analysis software.
It aims at demonstrating the detection of suspicious behaviour along roads, within a required time span. Three
phases are distinguished. First phase is the analysis of traffic flux in a simple scenario with three networks lying at three
junctions. The second phase investigates the ability to track and classify one object in this scenario, while the third phase
aims to track and classify two or more objects. Findings are presented for phase one, flux measurements.A priori information on suspicious behaviour is extremely valuable for countering threats involving improvised explosive
devices (IEDs). Suspicious activities along routes during expeditionary operations can be monitored by unattended
networks using simple sensing nodes that can gather data for continuous monitoring of daily vehicle activity. Dedicated
software yields the necessary intelligence on these activities by filtering suspicious behaviour from anomalous behaviour
(including false alarms). Research has started to equip a commercially available sensor network with data analysis software.
It aims at demonstrating the detection of suspicious behaviour along roads, within a required time span. Three
phases are distinguished. First phase is the analysis of traffic flux in a simple scenario with three networks lying at three
junctions. The second phase investigates the ability to track and classify one object in this scenario, while the third phase
aims to track and classify two or more objects. Findings are presented for phase one, flux measurements.
Intelligence on abnormal and suspicious behaviour along roads in operational domains is extremely valuable for countering
the IED (Improvised Explosive Device) threat. Local sensor networks at strategic spots can gather data for continuous
monitoring of daily vehicle activity. Unattended intelligent ground sensor networks use simple sensing nodes, e.g.
seismic, magnetic, radar, or acoustic, or combinations of these in one housing. The nodes deliver rudimentary data at any
time to be processed with software that filters out the required information. At TNO (Netherlands Organisation for Applied
Scientific Research) research has started on how to equip a sensor network with data analysis software to determine
whether behaviour is suspicious or not. Furthermore, the nodes should be expendable, if necessary, and be small in size
such that they are hard to detect by adversaries. The network should be self-configuring and self-sustaining and should
be reliable, efficient, and effective during operational tasks - especially route surveillance - as well as robust in time and
space. If data from these networks are combined with data from other remote sensing devices (e.g. UAVs (Unmanned
Aerial Vehicles)/aerostats), an even more accurate assessment of the tactical situation is possible. This paper shall focus
on the concepts of operation towards a working intelligent route surveillance (IRS) research demonstrator network for
monitoring suspicious behaviour in IED sensitive domains.
TASTE is a software tool for specifying and deploying unattended ground sensors (UGS) in a
composition which the commander assumes will suit his needs the best. With TASTE different sensor
types such as acoustic, magnetic, seismic, radar and IR imaging sensors can be deployed virtually and
their individual and combined performances analyzed. Sensors can be deployed in scenarios for
neutral, friendly and enemy movements and a set of typical environmental conditions can be selected
as input to the simulator. TASTE will play user defined scenario, calculating and monitoring the
performance and behavior of the individual UGS sensors or of the entire sensor network.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.