Sensors are widespread in applications ranging from environmental monitoring to distributed surveillance for physical security. Novel protocols and appropriate topologies enable large networks of cheap smart-sensors with the main objective of providing pervasiveness and resilience. In this paper we provide a model-based analysis of a ‘K out of M’ (‘KooM’) voting approach which can be used to correlate data coming from heterogeneous event detecting devices. The approach is based on the assumption of diverse redundancy on sensor technologies. The Bayesian Network formalism is employed to perform the analysis. The results show that by choosing appropriate correlation logics an optimal trade-off can be achieved among probability of detection, false alarm rate, availability and robustness against spoofing attempts, depending on the specific application. Furthermore, it will be shown that majority voting on detector outputs allows for a high cost effectiveness in obtaining performance improvements.
Model-based analysis of ‘K out of M' correlation techniques for diverse redundant detectors / Flammini F. - In: INTERNATIONAL JOURNAL OF PERFORMABILITY ENGINEERING. - ISSN 0973-1318. - STAMPA. - 9:(2013), pp. IJPE 452.12.551-IJPE 452.12.560.
Model-based analysis of ‘K out of M' correlation techniques for diverse redundant detectors
Flammini F
2013
Abstract
Sensors are widespread in applications ranging from environmental monitoring to distributed surveillance for physical security. Novel protocols and appropriate topologies enable large networks of cheap smart-sensors with the main objective of providing pervasiveness and resilience. In this paper we provide a model-based analysis of a ‘K out of M’ (‘KooM’) voting approach which can be used to correlate data coming from heterogeneous event detecting devices. The approach is based on the assumption of diverse redundancy on sensor technologies. The Bayesian Network formalism is employed to perform the analysis. The results show that by choosing appropriate correlation logics an optimal trade-off can be achieved among probability of detection, false alarm rate, availability and robustness against spoofing attempts, depending on the specific application. Furthermore, it will be shown that majority voting on detector outputs allows for a high cost effectiveness in obtaining performance improvements.File | Dimensione | Formato | |
---|---|---|---|
Paper 10 pp.551-560 IJPE_452.12_Flammini.pdf
Accesso chiuso
Licenza:
Tutti i diritti riservati
Dimensione
265.08 kB
Formato
Adobe PDF
|
265.08 kB | Adobe PDF | Richiedi una copia |
I documenti in FLORE sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.