KEYWORDS: C2I, 3D modeling, Visualization, Computer simulations, Device simulation, Data modeling, Control systems, Information security, Cameras, Telecommunications
The combination of digital twins and simulation, alongside with a control, command, and information system, provides a powerful hybrid environment for operational testing and performance assessment of security systems under realistic conditions without interrupting the operation of the test environment. This paper summarizes the use of OCUSIM, a hybrid Control, Command & Information (C2I) and simulation environment, and the associated requirements for 3D modeling, simulation and data exchange in cyber-physical threat assessment, multi-biometrics performance evaluation, and risk-based access control in different security environments. OCUSIM is based on the integration of the OCULUS C2I system with the iCrowd simulation environment along the lines of the digital twin concept. Other use cases and different application domains for OCUSIM are also discussed.
The SAFETY4RAILS2 project delivers methods and systems to increase the safety and recovery of track-based inter-city railway and intra-city metro transportation. When an incident occurs during heavy usage, metro and railway operators have to consider many aspects to ensure passenger safety and security. The EU funded project SAFETY4RAILS, aims to improve the handling of such events through a holistic approach by combining a wide range of analytic tools to detect, prevent, mitigate and respond to cyber-physical attacks to railway networks. In the context of assessing the impact on the crowd inside the rail/metro station and its surroundings from a cyberattack against a rail/metro infrastructure and evaluating the effectiveness of mitigation measures in case of an attack, the iCrowd simulation platform is used in conjunction with external modules that simulate the cyber-physical attacks. This paper reports the results and lessons learnt from these simulations and provides an insight on mitigation measures that may be necessary to reduce infrastructure vulnerabilities under different cyber-physical attack scenarios to several different rail/metro infrastructures.
The European Integrated Border Management (IBM) Strategy addresses the aspect of the “four-tier access control model” in order to develop and implement IBM at national and European Union (EU) level: (i) measures undertaken with third countries or service providers; (ii) cooperation with neighboring countries; (iii) border control and counter-smuggling measures and (iv) control measures within the area of free movement. Within this challenging objective lies the need for a well defined framework and technical platform supporting cross-agency and cross-country collaboration and information exchange. In this paper we present research results in the context of an innovative risk-based border management paradigm shift and exchange of information related to risks and alerts perceived and reported across all involved stakeholders (Border Guards, Custom Authorities and Border Control Point (BCP) Operators), both within EU Member States and Schengen area, as well as collaboration with third countries. The presented framework includes an integrated platform implementation demonstrated in a relevant operational environment of air, land and sea BCP.
Geocoding information in the 2D or 3D space in a systematic and dynamic way is a challenging problem. Furthermore, indoor navigating around the content in the physical or virtual space is also a demanding problem. wayGoo is a 2D/3D geocoding platform that offers dynamic geocoding and navigation in both physical and virtual spaces. In a security application, one would like to connect the dynamic geocoding capabilities with control and command functionalities required in monitoring and managing security environments. Integrating wayGoo with the OCULUS C2I system provides exactly this capability for dynamically monitoring, interacting and managing security spaces. In this paper, we present the integrated wayGoo OCULUS C2I environment and demonstrate its functionalities through several use case scenarios.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.