Sie sind auf Seite 1von 4

DETECTIONMEASUREMENT

by Gerhard Lamprecht & Brendon Bentley

compelling
evidence
using standard public key cryptography
With the seemingly never ending advance and sophistication in speed radar
equipment, the impact that the technology has on evidence gathering and
processing should be scrutinized more carefully
igh-end vehicles are currently
H produced with as many as four
24GHz ultra-wideband radars and
Reflector

one 77GHz long-range radar. But the rapid


growth in radar sophistication and accuracy
is opening up opportunities in the traffic law
enforcement industry as well.
Another technology that is growing
rapidly is data cryptography. Initially a
CAR 2

specialized military function, it has now


developed into a large commercial industry,
and will be a key part of law enforcement
following the introduction of digital
cameras for the generation of evidence.
CAR 1

Such evidence is often transmitted over


public networks, including the internet.
Many systems currently generate weak
evidence as a result of the cryptographic
POLICE

systems employed, but a strong public key


cryptographic system is recommended.

Currrent CW radar
Continuous wave (CW) Doppler radars Figure 1: The above shows how the wrong vehicle can be prosecuted for an offense: the intention is
transmit a constant frequency towards to measure the speed of CAR 2, but the reflector causes the speed of CAR 1 to be measured
a target vehicle. The reflection from the
vehicle is mixed back with the transmitted frequency difference during a modulated the problem of finding the direction of
signal to produce a difference in frequency chirp. The angle of the target may be found arrival (DOA) with improved resolution
– a difference that is proportional to the in one plane (typically the azimuth plane) may be found in System Design of a 77GHz
radial velocity component of the target. through digital beam-forming. The radar automotive RADAR Sensor with Superresolution
These radars are simple and cannot receiver has multiple receiving antennae DOA estimation.[1]
resolve the speed to more than one target spatially separated, which can use phase and The nature of Newton’s laws of motion
on a busy multi-lane road. In addition, they level comparison to determine the angle of – which dictate the movement of radar
cannot be used in many locations where direction of the target. It is therefore possible targets traveling at speeds much less than
there is infrastructure such as buildings or with modern FMCW radars to measure the speed of light – allow for most radar
bridges. Figure 1 shows an example of how the speed, angle and distance to multiple receivers to apply closed-form linear analysis
the wrong vehicle can be prosecuted for an vehicles simultaneously. to track targets. But there are more advanced
offense, while Figure 2 (opposite) shows These radars are now commercially radar problems that could not be resolved
another case in which the measured speed available at frequencies as high as 77GHz, before, for which computational intelligence
can be twice the real speed of the vehicle. but more bandwidth is available at higher provides solutions.[2] Control parameters
frequencies, which translates into increased in the receiver as well as chirp parameters
New generation FMCW radar range and speed resolution. can be optimized by evaluating a penalty
Many of the limitations of Doppler radar Another area of progress that has had (or error) function. This will improve range
guns can be overcome by Frequency a significant effect on radar performance resolution and target tracking for most cases.
Modulated Continuous Wave (FMCW) is signal-processing algorithms. Although Finally, innovative signal generation
radars, which determine the distance examples of progress in this field are technology has also allowed radar
or range to the target by measuring the numerous, one such example that addresses transmitters to be improved. Direct digital

??? TRAFFIC TECHNOLOGY INTERNATIONAL ANNUAL 2008


DETECTIONMEASUREMENT

synthesizers (DDS) have made it possible


to reduce the range and speed errors by Retro-reflector
modulating the transmitted signal more
linearly. DDSs make use of quartz crystal
oscillators, which provide extremely stable
reference signals. It is a property of quartz

CAR 1
crystal oscillators that their frequency
stability increases as time passes – a
property known as aging.
Other passive radio components used
in radar systems are remarkably resilient to
changing environmental conditions and can
usually survive and operate reliably in high
temperatures to the point of melting, cold
temperatures to far below freezing point,
and under severe mechanical strain to the
point of deformation.

POLICE
Radar jamming devices
A weakness of radar systems is that they are
sensitive to jamming. Jamming is intentional
or unintentional radiation of electromagnetic Figure 2: The above diagram shows that the radar signal undergoes Doppler shift twice, so the
waves at or close to the operating frequency measured speed is actually twice the actual speed
of a radar system. This radiation appears to
the radar as noise and reduces the ability
of the radar receiver to identify and track
RTX
targets. Consequently, a ratio called the
signal-to-jam ratio (SJR) may be calculated, Speed ß Target
as shown below: measuring
vehicle
Bista

R TX
R TR
tic pla

At the burnthrough range for the jammer,


the SJR = 1 and the radar receiver can
ne

no longer distinguish a target from the


disruptive jamming signal. There are several
things which are important to note.
The signal power of a target decreases as
the fourth power of the distance between
GSM BTS
the radar and the target (i.e. R4 in the UMTS node B
equation), while the signal power of the
jammer decreases as the second power of
the distance between the radar and the
jammer (i.e. R2j in equation 1). This gives
the jammer an advantage, meaning the Figure 3: The principle of operation of a bistatic radar, which parasitically employs existing public
jammer’s disruptive signal would be affecting radio transmitters, such as cellphone, and only the receiver is designed and constructed
the radar at distances far greater than the
maximum distance at which the radar can jammer would need an antenna broadcasting
identify a target, and also that the amplitude over a wide angle (with a relatively low GJ)
of the jamming signal would overpower that “It is possible to as it does not know the position of the radar
of a true target at the same distance. and cannot steer a more directed antenna to
The last factor in the below equation design the radar always illuminate the radar.
In contrast, the radar is free of these
receiver such that constraints and may employ a highly
directive antenna to increase its resilience
it can detect if it against jamming.
gives the radar a big advantage over being It is possible to design the radar receiver
jammed if its side lobes are well suppressed is being jammed, such that it can detect if it is being jammed,
and it has a narrow beam width. but cannot determine if it was intentional.
The only parameters that can be but cannot It is furthermore possible to implement
controlled by the jammer are the jammer’s strategies within the radar receiver to
transmitted power and its transmitted determine if it circumvent the problem of being jammed.
gain (i.e. PJ and in the first equation). The The radar can control its transmitted signal
jammer’s power PJ is legally regulated by the was intentional” or apply signal-processing techniques to
ITU and authorities in all countries. In order the received signal, or use a combination of
to direct the jamming signal at the radar, the these two techniques to successfully evade

TRAFFIC TECHNOLOGY INTERNATIONAL ANNUAL 2008 ???


DETECTIONMEASUREMENT

a jamming attempt. As FMCW radars often Raw radar and result data Image/s or video System meta data
generate compicated chirp sequences, true • Serial numbers
• Physical configuration
targets may be resolved in the face of radar • Camera and lens
• Software versions
jamming by disregarding received signals GPS time • Radar configuration
• Software settings
that do not match the known generated source • User settings

transmission chirp sequence.

stealth radars
It is possible to build passive radar systems Mixer

that do not transmit any signal, and SHA hash Evidence package
consequently cannot be detected by radar generator
detectors. In a bistatic radar (Figure 3), the
transmitter and receiver have significant
geographical separation, such that the angle Crypto engine on silicon
(known as the bistatic angle, b) spanned Signature
between the transmitter and the receiver at RSA/DSA cipher
Public
the target is within the range 0º < b < 180º. key
Mixer

Such a radar parasitically employs existing Key pair


public radio transmitters, such as cellphone generator
communications, and only the receiver is The digital signature, meta
designed and constructed. Laser Sequencing data and raw radar data
fingerprint EEPROM are watermarked onto the
The radar yields the ranges RRX and
evidential images of videos
RTX between the target and the receiver
and between the target and the transmitter
respectively, as well as the Doppler speed in
the direction parallel to the bistatic plane. Figure 4: Modern computer and communication systems make use of public key cryptography and
Operation of a bistatic radar system public key infrastructure (PKI) to protect privacy and prevent illegal use
has several requirements: the receiver and
transmitter must have line-of-sight (LOS) Speed resolution: 0.622317([km/h]
contact and the receiver and transmitter to
each must have LOS contact with the target.
Cellular base transceiver stations (BTS)
are usually close to roads, making this an 100
excellent choice for a transmitter source.
The LOS distance between the receiver
and the transmitter should be known as 80
accurately as possible. Cellular BTS positions
Radial speed [km/h]

are constantly transmitted on the broadcast


control channel.
The receiver antenna must have a 60

narrow beam if the angle at the receiver Strong

is an important parameter. These systems


are currently in development for military 40
applications, but have not yet found their
way into law enforcement applications.
20
handling of digital evidence
As digital speed cameras have replaced most
wet-film cameras, the risk of managing 0 Weak
digital evidence is beginning to surface in
the courts. Most systems on the market use Time (sec)
some form of symmetric cryptography that
does not sufficiently protect the evidence. Figure 5: Raw radar data – a typical visualization of a simple Doppler radar over a number of seconds
A cryptographic technique, such as 3DES
or AES, may be strong but the system in preserving the authenticity of digital Each traffic camera is fitted with a hardware
may be weak as a result of the difficulty evidence.[4] The watermark creator usually RSA or DSA public key engine. A unique
in managing the cryptographic keys. The keeps the existence and placement of fingerprint and ever-increasing sequential
management of keys has been the downfall the watermark secret, but the different plain text input is provided to the cipher. To
of most symmetric cryptographic systems organizations involved in the field of speed guarantee sufficient security over the life of
since World War II, where the German law enforcement make it difficult to keep the evidence, a large key should be selected.
Enigma[3] was broken by several countries. this information secret. The processing power required for a typical
Furthermore, the validity period of evidence Modern computer and communication image at 4MB would be prohibitive. A hash
is usually long enough to put many key systems make use of public key function, such as MD5 or SHA, is therefore
management schemes at high risk. cryptography and public key infrastructure used to generate a hash code from the image
Another system that camera (PKI) to protect privacy and prevent and raw radar data. The hash code is then
suppliers promote is watermarking. illegal use. This can be applied in law provided to the cipher instead of the raw
Most watermarking systems are weak enforcement,[3] as illustrated in Figure 4. image and radar data. The cipher then uses

??? TRAFFIC TECHNOLOGY INTERNATIONAL ANNUAL 2008


DETECTIONMEASUREMENT

Figure 6: The above shows safeTcam, a new-generation speed enforcement system that employs sophisticated radar and encryption technology

the private key to encrypt the hash, time,


sequence and fingerprint into a digital “A cryptographic technique may
signature. The digital signature, public key
and raw radar data can then be coded or be strong but the system may be
watermarked to the image.
Only if the image, radar data, unique weak as a result of the difficulty in
identity and position in timespace is
unaltered would it produce the same managing the cryptographic keys”
signature than the one decrypted with the
public key. The public key cannot generate assumptions to optimize DSP processing Gerhard Lamprecht is the chief technical officer of
TMT Services, while Brendon Bentley is a microwave
the digital signature, so the system therefore speed, and these can be exploited in court. engineer, TMT Services. For further information,
guarantees that fabrication, tampering and The recording of raw radar data allows please contact info@safetcam.com, telephone +27 21
destruction of evidence can be detected. the data to be reprocessed afterwards 551 6092, or log on to www.tmtservices.co.za
To prevent tampering and destruction of using more advanced and more intensive
evidence, multiple copies of the evidence algorithms. Figure 5 shows a visualization References
[1]
Wenig, P, Schoor, M, et al. System Design
can be distributed for courts and police of a simple Doppler radar over a number of a 77GHz automotive RADAR Sensor with
records, etc, meaning that all copies have of seconds that clearly indicates the value Superresolution DOA estimation, Proceedings of the
to be changed or destructed to affect the of these visualization techniques in court. International Symposium on Signals, Systems and
evidence. In contrast, symmetric systems In this diagram, there were two targets Electronics (ISSSE), July 2007
[2]
Veeramachaneni, K.; Osadciw, L.A; 2006 IEEE
want to limit the number of copies of data with different speeds. The safeTcam Conference on RADAR, Multiple sectors, multi
to prevent access to keys. in Figure 6 uses an advanced tracking function, multi RADAR dwell time management using
The purpose of the meta data is to record radar and encrypts digital evidence from particle swarm optimization (M3RTM), Date: 24-27
the assumptions made between components the radar, camera and GPS using public April 2006, Page(s): 7
[3]
J.N. Wenger, H.T. Engstrom, and R.I. Meader, History
of an evidence-recording device, such as the key cryptography. Each violation can be of the Bombe Project, OP-20-G Memorandum dated
camera, radar and storage medium. Signal- validated over the cellular network, then 30 May 1944, 2 (NARA Record Group 457,
processing algorithms make numerous gathered and processed as evidence. n File #4584)

TRAFFIC TECHNOLOGY INTERNATIONAL ANNUAL 2008 ???

Das könnte Ihnen auch gefallen