Home' RTCA Documents for Review : DO-230H FRAC Contents 161
©2017 RTCA, Inc.
Wireless technologies allow mobility and adaptability to rapidly changing circumstances. Wireless is
becoming more widely used in the security environment due to more sophisticated encryption techniques
and the security of the devices themselves. Wireless technology allows for a relatively fast and economical
implementation as opposed to the time and cost of laying conduit and pulling fiber.
The underlying technology consists of wireless nodes (routers or sensors). These nodes can be configured
in a constellation of many nodes to form a wireless mesh network. In practical terms, an airport would
locate multiple nodes around the airfield so that each node would have a clear line-of-sight to at least 2
other nodes for communication purposes. The mesh network formed by these nodes allow for reliable
communication between wireless devices. The reliability is provided by the redundant pathways between
nodes, which also allows for node communication between each other to seek optimum transmission paths,
self-diagnosis and self-healing if a node is removed from the network or fails.
Physical Security Information Management Systems (PSIM)
Advances in data processing allow for existing resources to be used in entirely new ways. In the recent past,
new investment in security devices was required to access new capabilities because of incompatibilities.
The industry now offers a collection of systems designed to leverage the existing (legacy technologies and
equipment) investment as well as allowing for new technology to work together. These systems are known
A PSIM is a system-of-systems that has at its core a PSIM platform that provides timely, accurate and
essential data/information required for situational awareness. The PSIM will enable analysis, response,
mitigation, resolution and recovery for all security-related incidents, and a “platform” that integrates
systems and sensors to detect anomalies and enhance situational awareness across the entire spectrum of
security operations – from a PACS door alarm to a security breach at a Passenger Screening Checkpoint
Section 8- Integration discusses integration best practices and considerations for integration of a diversity
of security systems. The discussion below focuses on performance advantages of PIDS systems integration.
Ideally a PIDS should consist of sensors interfaced to a system that provides for both data correlation and
command-and-control and display functions. The concept of layered sensors has been discussed throughout
this section on Perimeter Intrusion Detection Systems. The true power of layering sensors is realized
through the correlation (knowledge integration) of data provided by these systems.
A simple illustration of layered integration involves the integration of a radar system and CCTV system.
These two systems as integrated together overcome the weaknesses of the individual sensor and couple the
strengths of each sensor. The radar system’s responsibility is to detect objects in the area(s) of interest; it is
limited in determining what the object is. The CCTV system provides for visual assessment of a detected
object. Conversely, the CCTV system is limited at large area surveillance and detection (think of trying to
find an object in the sky while looking through a straw). The radar system will provide the time, location,
and direction of movement of the object of interest. The CCTV system will provide visual assessment of
the object of interest. The integration would consist of taking the detection location data provided by the
radar system and, through integration programming, use the location data to steer a Pan-Tilt-Zoom (PTZ)
Links Archive Navigation Previous Page Next Page