Paper
26 October 2010 Mapping AIS coverage for trusted surveillance
Anna-Liesa S. Lapinski, Anthony W. Isenor
Author Affiliations +
Abstract
Automatic Identification System (AIS) is an unattended vessel reporting system developed for collision avoidance. Shipboard AIS equipment automatically broadcasts vessel positional data at regular intervals. The real-time position and identity data from a vessel is received by other vessels in the area thereby assisting with local navigation. As well, AIS broadcasts are beneficial to those concerned with coastal and harbour security. Land-based AIS receiving stations can also collect the AIS broadcasts. However, reception at the land station is dependent upon the ship's position relative to the receiving station. For AIS to be used as a trusted surveillance system, the characteristics of the AIS coverage area in the vicinity of the station (or stations) should be understood. This paper presents some results of a method being investigated at DRDC Atlantic (Canada) to map the AIS coverage characteristics of a dynamic AIS reception network. The method is shown to clearly distinguish AIS reception edges from those edges caused by vessel traffic patterns. The method can also be used to identify temporal changes in the coverage area, an important characteristic for local maritime security surveillance activities. Future research using the coverage estimate technique is also proposed to support surveillance activities.
© (2010) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Anna-Liesa S. Lapinski and Anthony W. Isenor "Mapping AIS coverage for trusted surveillance", Proc. SPIE 7833, Unmanned/Unattended Sensors and Sensor Networks VII, 783302 (26 October 2010); https://doi.org/10.1117/12.864698
Lens.org Logo
CITATIONS
Cited by 2 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Artificial intelligence

Receivers

Surveillance

Computer security

Information security

Network security

System identification

Back to Top