VSLC: Video Surveillance Network Control Mobile Video Surveillance ...

0 downloads 0 Views 1MB Size Report
Abstract: In this paper an analytical study and novel concept of software, hardware and engineering of a new device is presented: the Video Surveillance Local ...
VSLC: Video Surveillance Network Control Mobile Video Surveillance Local Control Engineering and Applications F. Matusek*, G. Pujolle** and R. Reda*** Abstract: In this paper an analytical study and novel concept of software, hardware and engineering of a new device is presented: the Video Surveillance Local Control unit (VSLC). Engineering and performance parameters of the VSLC will be evaluated. Subsequently, the State-Prevent-Event process of the video surveillance system will be analyzed. Accordingly, a new spectrum of applications of video surveillance systems will be introduced. It is expected to achieve new real-time features, especially in critical situations. Finally, one of the applications is considered and analyzed within a case study.

outsourced. The VSLC looks similar to a mobile telephone device (see Figure 1) but is tailored at high security applications.

Index Terms: Video Surveillance, Mobile Unit, VSLC, CCTV, Smart Antenna, Wireless Communication, 3G, 4G I.

INTRODUCTION

The Video Surveillance Local Control (VSLC) is a novel device to be integrated with advanced video surveillance (VS) systems, designed in order to provide security authorities with a set of new high performance real-time functions. The VSLC is a further part of the ongoing R&D efforts towards a Nearly Indestructible Video Surveillance System, as outlined in [1], [2] and [3]. In order to assure high quality of performance, reliability and availability, the VSLC is connected to the Video Surveillance Headquarters (VSHQ) via a multiple technology wireless interface. Achieving a reliable wireless connection with mobile devices in the context of security applications is a challenging task that is subject to constant research. Topics include energy consumption [4], power management [5], performance [6] and visualization on small devices [7]. II. THE VSLC CONCEPT, TECHNICAL SPECIFICATIONS The Video Surveillance Local Control VSLC is a novel system component device for which the manufacturing is * KiwiSecurity, Austria www.kiwi-security.com ** Université Pierre et Marie Curie, Labortoire d'informatique de Paris 6 www.lip6.fr *** Innovation Communication Technologies, Austria / Germany www.ictmc.com

Figure 1: Video Surveillance Local Control, the VSLC device

The VSLC is currently available as a prototype lab version. The technical specifications are summarized as follows: ƒ Size: 110 mm * 60 mm* 10 mm ƒ Display: Widescreen, widescreen Multi-Touch Technology (MTT) and Multi Segment ƒ Wireless Technologies: o UMTS/HSDPA (850, 1900, 2100 MHz) o GSM/EDGE (850, 900, 1800, 1900 MHz) o Wi-Fi (802.11b/g) o Bluetooth 2.0 + EDR ƒ Power Management: Built-in rechargeable high performance lithium-ion battery ƒ Antenna: Built-in Smart Antenna ƒ External Interface: In additional to the wireless interface, the device is equipped with an USB 2.0 interface, used for recharging, data synchronization, upload and download ƒ GPS Mapping: to find the exact location of the device, it combines GPS, Wi-Fi and cell tower location technology in order to create the exact position of the

VSLC at any time. The device and its system architecture was designed in order to provide security authorities with the following functions: ƒ To enable real-time mobile administration and control during attacks ƒ To enable patrolling staff with an online coordination possibility with the Video Surveillance Headquarters According to the communication and access with the central video surveillance database, the VSLC’s functionality could be extended to various new applications (see Section VII). III. DESIGN CHALLENGES As a Physical Layer Device (PHY), the main goal was to obtain flexible, high performance, scalable and reconfigurable properties. Accordingly, during the design, hardware concept and architecture concept phases of the VSLC, the team was confronted with a set of challenges (Figure 2).

fast access memory. C. Operational Challenges Mechanical, thermal and physical extreme situations were taken into account. The device was designed to operate successfully under every natural extreme circumstance. D. Software Challenges A high performance embedded chip as a processing unit and high-speed memory was used in order to cope with performance bottlenecks. On the software level parallel processing was used to use all cores of the unit available. E. Wireless Interface challenges The device was equipped with a high performance smart antenna (MIMO) to account for multiple network technologies and their heterogeneity. IV. WIRELESS TECHNOLOGIES AND STANDARDS One of the big challenges during the design phase of the VSLC device was to define and validate access and transmission concepts based on the possible available technologies in order to be able to provide a broadband access component for the mobile VSLC device through current and future mobile cellular systems.

Figure 2: Challenges that had to be dealt with during the design of the VSLC.

A. Heterogeneous Networks Challenges The device must be successfully deployable in every possible available wireless network, technology or standard, such as UMTS/HSDPA, GSM/EDGE Wi-Fi, Bluetooth 2.0 + EDR. In order to achieve that, a smart antenna was used, which switches networks on the fly, choosing the network with the highest throughput available (see section IV for details). B. Engineering Challenges Various challenges on the engineering level arise when building a wireless VS system [4]. Availability, Reliability, Survivability and Performability were kept at a maximum level. Through the power management system, power supply was kept flexible to adapt to a given task, however power consumption was kept to a minimum. For the prototype as well as the future serial production, the device is programmable, with an on-board processing unit as well as

Figure 3: VSLC mobility within different wireless technologies and standards.

The following facts were the motivation potential to design the device: ƒ Moving from one technology to the other (left to right in Figure 3), means attaining higher bandwidth, i.e. higher data rate, starting from PAN, to LAN etc. However, increasing the speed within the same technology results in the reduction of the available bandwidth and smaller transmission throughput. ƒ On the other hand, moving from one technology to a higher one (left to right) would mean an increase of the possible moving velocity for the same given throughput.

displayed. When the Smart Antenna of the VSLC chooses a wireless network, it has to consider its limitations regarding throughput. Depending on the available bandwidth, different kinds of data can be transferred between the VSLC and the VSHQ. Table 1 gives an example of different networks and possible data to transmit over it. If limited bandwidth is available (less than 9 KB/s, i.e. over the GSM network), only status messages and SMS alarms are transferred to the VSLC device. If a GPRS or EDGE network is available the full events from the VS system, including images, can be transferred. With UMTS and HSDPA video streams and clips can be transferred, providing all available information to the user. Also, connections to various databases, as outlined in section VII, start to be usable once at least UMTS is available. Throughput ≤ 9 KB/s

Networks GSM

≤ 140 KB/s

GPRS, EDGE UMTS HSDPA, WLAN

≤ 1,4 MB/s > 7 MB/s

Concerning video surveillance, there are 3 aspects: • Mobile devices such as the VSLC: most of the cellular technologies are adequate. • For a Single Node: Cellular Technologies will be a bottleneck for surveillance data transmission • For access to the Video Surveillance Database through the headquarters (i.e. multiple video streams): cellular technologies are not suitable at all, where the throughput is too small.

Data to transmit Status, alive + mission messages Events of VS system Low quality video High quality video

Table 1: Different wireless networks with their possible throughput and data to transmit over the VS network.

Figure 5 displays the transmission rates for different wireless technologies and standards, for the two categories: Cellular (GSM, GPRS, etc.) and WLAN with its different standards, together with their time availability. For comparison, the throughput of USB 2.0 and USB 3.0 is

Figure 5: Transmission rates for different wireless technologies / standards, and their availability

V. HEAD QUARTERS (VSHQ) While designing the architecture of the intelligent video surveillance system, the engineering team was confronted with a big challenge: to find the right balance between security requirements and system performance.

Figure 4: Video surveillance system architecture, including the video surveillance database (VSDB)

This balancing act requires a holistic, integrated approach to a complete security concept with security and events management, identity and access management and systems and change management. All three disciplines must interact automatically and seamlessly to ensure an effective level of service that enables perfect component and system performance. Every access to the system is handled through the Access Control Server ACS (as HW) or Access Control Server Functionality ACSF, providing all access functionalities such as firewalls, authentication, authorization and accounting.

Detecting a threat in the early phase can enable the patrolling team to react immediately in order to prevent the corresponding event, which might be in the threat, attack sabotage, or damage and injury phase. If it is not possible to prevent the event, it would be possible to suppress, impede, or amend the event consequences. Finally, an evaluation of the whole process, together with the different events and corresponding states is performed. According to this evaluation, feedback about possible system improvements is given. VII. FUTURE APPLICATIONS

The video surveillance database includes three types of data: ƒ Permanent VS data, which is system specific ƒ Semi-permanent VS data, e.g. info about current suspicious persons or objects ƒ Quasi-Transient VS data, which includes the recorded VS data and videos. The lifetime of this data is determined by the laws of different countries and authorities VI. VSLC STATE PREVENT EVENT PROCESS The VSLC device is supported by a security and events management system, whose role is to track security and compliance issues such as policy violations, suspicious behavior and suspicious objects, as well as problems with service continuity management. Moreover, it enables security authorities to act proactively in case of a threat. This is illustrated by Figure 6, which displays the State-PreventEvent process.

Using the presented prototype of the VSLC in a video surveillance system, the possibility to connect it to a variety of security relevant databases is presented. With this access, a number of novel applications for high security requirements are made possible. Figure 7 shows examples of possible access to various databases. If the VSLC would have access to law enforcement and other databases to help in the field, various new applications could be achieved. Possibilities include connections to: ƒ ƒ ƒ ƒ ƒ ƒ ƒ

Law Enforcement Criminal Justice Database Vehicle Central Database National Security Database Military Database Medical Databases Hazardous Material Information Database Local Video Surveillance Database

With access to certain databases, the following advantages can be achieved: A. Access to Vehicle database Connecting the VSLC to the vehicle database, the following tasks could be performed: ƒ Immediate identification of license plates ƒ Identification of car owners ƒ Capturing possible attackers / terrorists in known cars This way, a policeman on the streets can quickly access the database, find missing cars and identify suspected terrorists. This feature gives the officer on the street the ability to react fast to a situation and make the right decisions. Supported by the State-Prevent-Event process he would be able to protect citizens better than ever before. Figure 6: State-Prevent-Event process

Utilizing the capabilities and provided features of the VSLC, it will be possible to provide security authorities not only with monitoring functions but also the ability to proactively react while an attack is taking place (Figure 6).

B. ƒ ƒ ƒ

Access to National Security database Automatic identification of known criminals / terrorists Adding a suspect to the database Identification of accomplices of captured criminals / terrorists

With this feature, a high-ranking police or military officer can access the national security database and get immediate warnings and updates of attacks in the country. This never before available feature would dramatically increase security in the future, enabling decision makers to access critical information anywhere, at any time.

personnel could react faster and make better decisions and thus greatly enhance security in areas where high security is a necessity. ACKNOWLEDGMENT This work was supported by the Austrian Federal Ministry for Transport, Innovation and Technology www.bmvit.gv.at, the Austrian Research Promotion Agency “Österreichische Forschungsförderungs-gesellschaft“ www.ffg.at and the Academic Business Incubator INiTS, www.inits.at. This work will be partially included in a PhD thesis at the Pierre & Marie Curie University (UPMC). REFERENCES [1]

[2]

[3]

[4] Figure 7: A video surveillance system with access to various databases, including vehicle, national security and military access control systems.

C. Access to Border Control database ƒ Information if a captured suspect has entered the country recently and with whom ƒ Warn Border Control of a dangerous suspect ƒ Information if someone was captured carrying material that can be used for an attack (e.g. a bomb) while entering the country Officers that are carrying a VSLC and who are chasing a suspect in a car could wirelessly warn Border Control of this person, including the persons picture and license plate number. This way, a suspected terrorist could be captured immediately at the border, severely enhancing security at the border. VIII. CONCLUSION In this work a novel concept of a new device, the Video Surveillance Local Control (VSLC) unit, was presented. Engineering challenges and solutions were outlined, along with requirements for wireless transmission and available technologies and standards. Further, the architecture for Video Surveillance Headquarters was outlined and the StatePrevent-Event process was introduced, which greatly enhances security when working together with the VSLC. Finally, possible applications, if the VSLC could be connected to various security databases, were discussed and analyzed. It was shown, that using the VSLC security

[5]

[6]

[7]

S. Sutor, F. Matusek, F. Kruse, K. Kraus and R. Reda, “Large-Scale Video Surveillance Systems: New Performance Parameters and Metrics”, to be published at in Press, presented at The Third International Conference on Internet Monitoring and Protection, Bucharest, July 2008 F. Matusek, S. Sutor, F. Kruse, K. Kraus and R. Reda, “NIVSS: A Nearly Indestructible Video Surveillance System”, in Press, presented at The Third International Conference on Internet Monitoring and Protection, Bucharest, July 2008 S. Sutor, F. Matusek, R. Reda, “WSSU: Wireless Self-Contained Surveillance Unit; An Ad-Hoc Video Surveillance System”, in Press, presented at The Fourth Advanced International Conference on Telecommunications, Athens, June, 2008 C.-F. Chiasserini, and Enrico Magli, “Energy Consumption and Image Quality in Wireless Video-Surveillance Networks”, IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, 2002 A. Maier, B. Rinner, T. Trathnigg, and H. Schwabach, “Combined Management of Power- and Quality of Service in Distributed Embedded Video Surveillance Systems”, Proceedings of the First Workshop on Power-Aware Real-Time Computing, 2004 A. Doblander, A. Maier, and B. Rinner, “Increasing Service Availability in Intelligent Video Surveillance Systems by Fault Detection and Dynamic Reconfiguration”, Proceedings of the Workshop on Mobile Computing, 2005 J. Wang, M.J.T. Reinders, R.L. Lagendijk, J. Lindenberg, and M.S. Kankanhalli, “Video Content Representation on Tiny Devices”, IEEE International Conference on Multimedia and Expo, 2004