Sensors are widespread in applications ranging from environmental monitoring to distributed surveillance for physical security. Novel protocols and appropriate topologies enable large networks of cheap smart-sensors with the main objective of providing pervasiveness and resilience. In this paper we provide a model-based analysis of a ‘K out of M’ (‘KooM’) voting approach which can be used to correlate data coming from heterogeneous event detecting devices. The approach is based on the assumption of diverse redundancy on sensor technologies. The Bayesian Network formalism is employed to perform the analysis. The results show that by choosing appropriate correlation logics an optimal trade-off can be achieved among probability of detection, false alarm rate, availability and robustness against spoofing attempts, depending on the specific application. Furthermore, it will be shown that majority voting on detector outputs allows for a high cost effectiveness in obtaining performance improvements.

Model-based analysis of ‘K out of M' correlation techniques for diverse redundant detectors / Flammini F. - In: INTERNATIONAL JOURNAL OF PERFORMABILITY ENGINEERING. - ISSN 0973-1318. - STAMPA. - 9:(2013), pp. IJPE 452.12.551-IJPE 452.12.560.

Model-based analysis of ‘K out of M' correlation techniques for diverse redundant detectors

Flammini F
2013

Abstract

Sensors are widespread in applications ranging from environmental monitoring to distributed surveillance for physical security. Novel protocols and appropriate topologies enable large networks of cheap smart-sensors with the main objective of providing pervasiveness and resilience. In this paper we provide a model-based analysis of a ‘K out of M’ (‘KooM’) voting approach which can be used to correlate data coming from heterogeneous event detecting devices. The approach is based on the assumption of diverse redundancy on sensor technologies. The Bayesian Network formalism is employed to perform the analysis. The results show that by choosing appropriate correlation logics an optimal trade-off can be achieved among probability of detection, false alarm rate, availability and robustness against spoofing attempts, depending on the specific application. Furthermore, it will be shown that majority voting on detector outputs allows for a high cost effectiveness in obtaining performance improvements.
2013
9
551
560
Flammini F
File in questo prodotto:
File Dimensione Formato  
Paper 10 pp.551-560 IJPE_452.12_Flammini.pdf

Accesso chiuso

Licenza: Tutti i diritti riservati
Dimensione 265.08 kB
Formato Adobe PDF
265.08 kB Adobe PDF   Richiedi una copia

I documenti in FLORE sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificatore per citare o creare un link a questa risorsa: https://hdl.handle.net/2158/1386596
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 4
  • ???jsp.display-item.citation.isi??? ND
social impact