Skip to main content

Applying Model-Based Situational Awareness and Augmented Reality to Next-Generation Physical Security Systems

  • Chapter
Cyber-Physical Systems Security

Abstract

Mixed, augmented, and virtual reality holds promise for many security-related applications including physical security systems. When combined with models of a site, an augmented reality (AR) approach can be designed to enhance knowledge and understanding of the status of the facility. The present chapter describes how improved modeling and simulation will increase situational awareness by blurring the lines among the use of tools for analysis, rehearsal, and training—especially when coupled with immersive interaction experiences offered by augmented reality. We demonstrate how the notion of a digital twin can blur these lines. We conclude with challenges that must be overcome when applying digital twins, advanced modeling, and augmented reality to the design and development of next-generation physical security systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The combination of AR, MR, and VR with real environments is also known as XR (extended reality)

References

  1. R. Trechter, Physical security simulation and analysis tools. SAND 2014-3718P (Sandia National Laboratories, Albuquerque, NM, 2014). http://umbra.sandia.gov/pdfs/resources/danteopshed.pdf. Accessed 17 Apr 2018

  2. D. Callow, SAND2016–12214 physical security system of the future: vision and roadmap (Sandia National Labs, 2016)

    Google Scholar 

  3. M. W. Grieves, Digital twin: Manufacturing excellence through virtual factory replication. Digital Twin whitepaper. Michael W. Grieves, LLC (2014). http://www.apriso.com/library/Whitepaper_Dr_Grieves_DigitalTwin_ManufacturingExcellence.php. Accessed 17 Apr

  4. General Electric Research, Predix technology brief: Digital Twin (2017). https://www.predix.com/sites/default/files/predix-digital-twin-technology.pdf. Accessed 17 Apr 2018

  5. E.M. Raybourn, A new paradigm for serious games: Transmedia learning for more effective training & education. J. Comput. Sci. 5(3), 471–481 (2014)

    Article  Google Scholar 

  6. E.M. Raybourn, Applying simulation experience design methods to creating serious game-based adaptive training systems. Interact. Comput. 19, 207–214 (2007)

    Article  Google Scholar 

  7. J. Clem, W. Atkins, V. Urias, Investigation of cyber-enabled physical attack scenarios. SAND2015-4202C (Sandia National Laboratories, Albuquerque, NM, 2015). https://www.osti.gov/scitech/servlets/purl/1255768. Accessed 6 Mar 2018

  8. E.M. Raybourn, in A metaphor for immersive environments: Learning experience design challenges and opportunities. Proceedings of MODSIM. (NTSA, Arlington, VA, 2016)

    Google Scholar 

  9. M.L. Garcia, The Design and Evaluation of Physical Protection Systems, 2nd edn. (Butterworth-Heinemann, Newton, MA, 2007)

    Google Scholar 

  10. K. Klinger, D. Small, E. Gottlieb, J. Whetzel, H. Gillis, J. Wharton, Final report for advanced high security command and control interface LDRD (AHSC2I). SAND2013–8249 (Sandia National Laboratories, Albuquerque, NM, 2013)

    Google Scholar 

  11. L. Dignan, GE aims to replicate digital twin success with security-focused digital ghost. Between the lines, ZDNet.com (2017). https://www.zdnet.com/article/ge-aims-to-replicate-digital-twin-success-with-security-focused-digital-ghost/. Accessed 17 Apr 2018

  12. J. Russel, J. Andersen., C. Sterns, Video motion detector fused radar: the first volumetric ultra-low NAR sensor for exterior environments. SAND2016–0083 (Sandia National Laboratories, Albuquerque, NM, 2016)

    Google Scholar 

  13. A. Greenberg, How an entire nation became Russia’s test lab for cyberwar. Wired (2017, June). https://www.wired.com/story/russian-hackers-attack-ukraine/. Accessed 6 Mar 2018

  14. ICS-CERT, Cyber attack against Ukrainian critical infrastructure (2016). https://ics-cert.us-cert.gov/alerts/IR-ALERT-H-16-056-01. Accessed 6 Mar 2018

  15. R. Lipovski, A. Cherepanov, BlackEnergy trojan strikes again: attacks Ukrainian electric power industry. WeLiveSecurity (2016, Jan). https://www.welivesecurity.com/2016/01/04/blackenergy-trojan-strikes-again-attacks-ukrainian-electric-power-industry/. Accessed 6 Mar 2018

  16. B. Gregory-Brown, D. Wylie, Securing industrial control systems – 2017: A SANS survey (SANS Institute InfoSec Reading Room, 2017) https://www.sans.org/reading-room/whitepapers/analyst/securing-industrial-control-systems-2017-37860. Accessed 6 Mar 2018

  17. J. Stamp, J. Dillinger, W. Young, J. Depoy, Common vulnerabilities in critical infrastructure control systems. SAND2003-1772C (Sandia National Laboratories, Albuquerque, NM, 2003)

    Google Scholar 

  18. K. J. Higgins, Latest Ukraine blackout tied to 2015 cyberattackers. Dark Reading (2017, Jan). https://www.darkreading.com/threat-intelligence/latest-ukraine-blackout-tied-to-2015-cyberattackers/d/d-id/1327863. Accessed 6 Mar 2018

  19. Y. Yang, K. McLaughlin, S. Sezer, T. Littler, E.G. Im, B. Pranggono, H.F. Wang, Multiattribute SCADA-specific intrusion detection system for power networks. IEEE Trans. Power Deliv. 29(3), 1092–1102 (2014)

    Article  Google Scholar 

  20. E. M. Raybourn, N. Fabian, W. Davis, R. C. Parks, J. McClain, D. Trumbo, D. Regan., P. Durlach, Data privacy and security considerations for personal assistants for learning (PAL). Proceedings of the 20th International Conference on Intelligent User Interfaces Companion (2015), pp. 69–72

    Google Scholar 

  21. R. Walton, National academies report finds grid vulnerable to cyber physical attacks. UtilityDive (2017, July 24). http://www.utilitydive.com/news/national-academies-report-finds-grid-vulnerable-to-cyber-physical-attacks/447707/. Accessed 6 Mar 2018

  22. V. Machi, The future of training and simulation: preparing warfighters for tomorrow’s battlefields. National Defense Magazine (2017, Nov). http://www.nationaldefensemagazine.org/articles/2017/11/22/the-future-of-training-and-simulation-preparing-warfighters-for-tomorrows-battlefields. Accessed 29 Apr 2018

  23. E. Hutchins, Cognition in the Wild (The MIT Press, Cambridge, MA, 1995)

    Google Scholar 

  24. Paul, Second Ukraine power outage linked to Russian hackers. The Security Ledger (2017, Jan). https://securityledger.com/2017/01/second-ukraine-power-outage-linked-to-russian-hackers/. Accessed 6 Mar 2018

Download references

Acknowledgments

Sandia National Laboratories is a multimission laboratory managed and operated by the National Technology and Engineering Solutions of Sandia, LLC, a wholly owned subsidiary of Honeywell International, Inc., for the US Department of Energy’s National Nuclear Security Administration under contract DE-NA-0003525.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Elaine M. Raybourn .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this chapter

Cite this chapter

Raybourn, E.M., Trechter, R. (2018). Applying Model-Based Situational Awareness and Augmented Reality to Next-Generation Physical Security Systems. In: Koç, Ç.K. (eds) Cyber-Physical Systems Security. Springer, Cham. https://doi.org/10.1007/978-3-319-98935-8_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-98935-8_16

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-98934-1

  • Online ISBN: 978-3-319-98935-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics