Context-based Models to Overcome Operational Challenges in Maritime Security

被引:0
|
作者
Ayala, Diego Fernando Martinez [1 ]
Sidoti, David [1 ]
Mishra, Manisha [1 ]
Han, Xu [1 ]
Pattipati, Krishna [1 ]
机构
[1] Univ Connecticut, Dept Comp & Elect Engn, Storrs, CT 06269 USA
关键词
Maritime Security; smuggling; piracy; METOC; INTEL; CONOPS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Piracy and smuggling are major international problems which not only threaten maritime security but also affect the global economy. Even though NATO and international forces have been relentlessly fighting maritime crime in East Africa (Gulf of Aden), the problems still persist and maritime crime has moved to West Africa (Gulf of Guinea). In the same vein, the Joint Interagency Task Force-South (JIATF-S) has had substantial operational success, controlling the vast geographical spread of smugglers in the East Pacific and Caribbean Sea. Due to limited number of maritime assets available, every resource needs to be efficiently allocated, both in time and space. This poses a great operational challenge requiring the integration and fusion of disparate information relevant to the mission and dynamic allocation of resources under uncertainty. Operational planning and execution for counter-smuggling and counter-piracy operations involve surveillance (to search, detect, track and identify potential threats) and interdiction operations (to intercept, investigate and potentially apprehend the suspects) in a dynamic and uncertain mission environment. In this paper, we present context-based models for counter-smuggling and counter-piracy missions, where the smuggling and piracy activities are represented in the form of color coded heat maps built using Intelligence information (INTEL), meteorological and oceanographic (METOC) information and other mission-specific attributes (sensor observations, target types and their behavior, etc.); these maps are interpreted as probability of activity (PoA) surfaces. These PoA surfaces form an input to the decision support module discussed in this paper.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Context-based Architectural Security Analysis
    Taspolatoglu, Emre
    Heinrich, Robert
    [J]. 2016 13TH WORKING IEEE/IFIP CONFERENCE ON SOFTWARE ARCHITECTURE (WICSA), 2016, : 281 - 282
  • [2] Context-based Security and Privacy for Healthcare IoT
    Alagar, Vangalur
    Alsaig, Alaa
    Ormandjieva, Olga
    Wan, Kaiyu
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON SMART INTERNET OF THINGS (SMARTIOT 2018), 2018, : 122 - 128
  • [3] Design and Implementation of a Context-Based Security Model
    Iijima, Tadashi
    Kido, Satoshi
    [J]. KNOWLEDGE-BASED SOFTWARE ENGINEERING, JCKBSE 2014, 2014, 466 : 356 - 370
  • [4] Threat Assessment Using Context-Based Tracking in a Maritime Environment
    George, Jemin
    Crassidis, John L.
    Singh, Tarunraj
    [J]. FUSION: 2009 12TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION, VOLS 1-4, 2009, : 187 - 194
  • [5] A context-based framework for enhancing GNSS performance and security
    Baldoni, Sara
    Battisti, Federica
    Carli, Marco
    Neri, Alessandro
    [J]. 2023 IEEE/ION POSITION, LOCATION AND NAVIGATION SYMPOSIUM, PLANS, 2023, : 729 - 739
  • [6] Toward a Context-Based Approach for Software Security Learning
    Wen, Shao-Fang
    Katt, Basel
    [J]. JOURNAL OF APPLIED SECURITY RESEARCH, 2019, 14 (03) : 288 - 307
  • [7] Context-Based Constraints in Security: Motivations and First Approach
    Mostefaoui, Ghita Kouadri
    Brezillon, Patrick
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 146 (01) : 85 - 100
  • [8] Towards an Ontology for IoT Context-Based Security Evaluation
    Gonzalez-Gil, Pedro
    Skarmeta, Antonio F.
    Antonio Martinez, Juan
    [J]. 2019 GLOBAL IOT SUMMIT (GIOTS), 2019,
  • [9] Modeling context-based security policies with contextual graphs
    Mostéfaoui, GK
    Brézillon, P
    [J]. SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 28 - 32
  • [10] Context-based security policies:: A new modeling approach
    Brézillon, P
    Mostéfaoui, GK
    [J]. SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 154 - 158