U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Fiber-Optic Sensors, Systems, and Applications in Physical Security (From Proceedings, 1990 Carnahan Conference on Security Technology, University of Kentucky, Lexington, Kentucky, May 2-4, 1990, P 13-17, 1990, R. William De Vore, ed. -- See NCJ-124389)

NCJ Number
124392
Author(s)
B D Griffiths
Date Published
1990
Length
5 pages
Annotation
Optical-fiber offers major advantages as a sensor over alternative technology, including long and reliable operational life and applications in dangerous environments, but the material requires special handling during the sensor manufacturing stages and during installation and operation, when quality control procedures and preventive maintenance plans must be implemented.
Abstract
When designing a security system based on sensors with high reliability it is important not to counteract that performance with false alarms caused by quality problems in any stage of the system. A fiber-optic continuity sensor may offer the ultimate level of reliability and freedom from false alarms. The bonding of an optical fiber within a barbed steel tape is one way of designing a security system where the electronics and data communication facilities are combined in a modular form. An optical fiber woven security net, composed of cables of various combinations woven into sensor barriers, sets off an alarm when there is a break but operates reliably and continuously. This technology has been developed to meet the requirements of underwater physical security. An output speckle pattern interferogram, which monitors fiber optic cables, is a measure of the fibers' physical displacement. Attenuation sensors, which detect changes in optical characteristics due to temperature variations, have been used to detect attempts to tamper with data communications in local area networks. 7 figures. (Author abstract modified)

Downloads

No download available