Airport IoT Operations

Intelligent devices taking off fueled by AI

The Internet of Things (IoT) has landed in airport operations. More than 20 billion end devices are already networked via the Internet, and there will likely be three times more than this by 2025, according to Statista. In the process, end devices are becoming increasingly more intelligent and efficient, fueled by progress being made in artificial intelligence (AI), machine learning and even 5G—the new mobile phone technology—which creates the required bandwidths for data transfer in the IoT.

All of this adds up to huge potential for environments such as airports. The deployment of IoT cameras provides increased security and allows users to better understand the behavior of passengers. Based on video analyses in real time, operations can be optimized.

The current focus of spending on IoT projects centers on the use of cameras. However, a study carried out by Cisco determined three out of every four projects would fail. The reason? Many investments fall short of the mark because traditional thinking in IoT is very one dimensional: although cameras are being networked, their potential to optimize operations remains untapped. The key to tapping into this potential lies in finding the optimal synergy between end devices, platforms and applications in the IoT, or “IoT Excellence.”

IoT-enabled cameras help their users gain a greater understanding of how passengers and employees behave. This knowledge opens up new opportunities for optimizing processes and reducing downtime. Consider a few examples of how the IoT makes passenger transport more secure—particularly in airports— but also more efficient.

Smart Security Cameras

Artificial intelligence and higher computing power create new application possibilities for cameras in the IoT. Today, complex applications such as video analyses or AI-based facial recognition can run directly on the camera.

A security camera in the airport not only provides video data, but it also compares this data—in real time—with images in databases. Patterns of movement by travelers entering and exiting airport facilities, and passengers within the terminals can be detected and then interpreted in context.

Increased Security and Efficiency at Airports

Airports have to check in growing numbers of passengers while also guaranteeing high security standards. IoT applications for security cameras can provide support by optimizing operations in these areas:

  • Automatic facial recognition means people who are wanted by the police can be detected, increasing security at check-in areas.
  • Security cameras can analyze and control visitor flow using smart displays. Passengers are kept informed—in real time—about waiting times and any operational irregularities.
  • Camera systems in air traffic control towers analyze irregularities on the runways and inform the airport management team. New technologies guarantee optimal visibility—even at night or in poor weather conditions.
  • By linking to other data sources such as weather data, traffic data and flight bookings, the systems can create intelligent forecasts about potential operational disruptions.
  • Video analyses can be used for the early detection of suspicious behavior, whether by employees in sensitive areas for which they aren’t responsible, or passengers behaving in an unusual manner.
  • Security staff can use the camera system to follow suspicious people throughout the entire airport in real time.
  • The theft of luggage or other items can be detected and prevented.
  • Unattended luggage can be discovered and investigated by security staff more quickly.

Airports are complex environments, and not every concern relates to passenger flow. Beyond flight-related concerns, airports are also large retail centers, and IoT applications for cameras can be applied in these settings as well. Analysis of shopper behaviors can help manage queues at shops and overall movement within the retail area .

Before people even enter the terminal, cameras can also provide license plate recognition, collect data on vehicle accidents and alert security to abnormal or suspicious behavior on airport grounds.

Optimizing Waiting Times at Major Airports

One frequent bottleneck at airports are security checkpoints, which can easily cause long waiting times and operational irregularities. This can frustrate passengers and increase the workload of staff members. For this reason, many airports use camera systems to monitor the number of visitors. If a queue becomes too long, the system informs staff or provides this information via displays.

At one of Europe’s major airports, operations staff have implemented intelligent visitor management using an existing camera system. Video data is analyzed in real time, meaning waiting times can be predicted with 96 percent accuracy. The predicted waiting times are communicated via displays to control visitor flows. The result? An improved customer experience, increased security and more effective planning of personnel deployment.

The digital networking of camera systems offers the opportunity to improve how resources are used, to design processes more efficiently, to reduce costs and, ultimately, to raise the level of the experience for everyone involved.

This article originally appeared in the March 2020 issue of Security Today.

Featured

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.