Abstract

The rapid expansion of nuclear technology across various sectors due to global economic growth has led to a substantial rise in the transportation of radioactive materials. The International Atomic Energy Agency (IAEA) estimates that approximately 20 million shipments of radioactive materials occur annually. In this context, ensuring the safety and security of radioactive material transportation is of significant importance. IAEA’s “Security of Radioactive Materials in Transport” (Nuclear Security Series No. 9-G) mandates that an effective transport security system should provide immediate detection of any unauthorized removal of the packages. In the present study, an innovative Adam-optimized BP neural network model is developed for detecting unauthorized movements of radioactive material packages. To analyze the performance of the proposed algorithm, numerous experiments were conducted. The results demonstrate that the proposed method achieves a 99.17% accuracy rate in detecting unauthorized movements of radioactive materials, with a missed alarm rate of 0.72% and a false alarm rate of 0.1%. This method also enables real-time detection of unauthorized removal of radioactive materials and effectively enhances the security of radioactive materials during transport to reduce the risks of theft, loss, diversion, or sabotage.

1. Introduction

Transporting radioactive materials is a crucial and integral aspect of the nuclear energy industry. Based on estimations conducted by the International Atomic Energy Agency (IAEA), approximately 20 million packages of radioactive materials, including UF6, radioactive sources, fissionable ores, spent fuel, and nuclear waste, are transported globally each year [1]. Typically, these materials are transported long distances and across large geographic areas, often spanning provinces or borders. However, the transportation of radioactive materials confronts some limitations in security and response forces. Consequently, it is crucial not to rely solely on security personnel or local police to handle unexpected and malicious incidents during the transportation of these hazardous materials. According to the records of the IAEA Incident and Trafficking Database (ITDB), 52% of all thefts of radioactive materials between 1993 and 2022 occurred during authorized transport. This figure has increased to 62% in the last decade [2]. Moreover, the event report website of the United States Nuclear Regulatory Commission (U.S.NRC) contains a substantial number of reports on the radioactive material lost during transit. For instance, on February 7, 2020, an Ir-192 source with a dose of 9.987 Ci was lost during transportation to Golden, Colorado [3]. On July 2, 2019, a moisture/density gauge (CPN International MC Series) that contained a 50 mCi Am-Be source and a 10 mCi Cs-137 source was lost on the highway between Aurora and Columbus, Nebraska [4]. If not detected and responded to effectively, the loss or theft of radioactive materials can cause severe environmental contamination and public panic. Criminals may even use stolen radioactive materials for malicious purposes such as creating improvised nuclear devices (IND), radiological exposure devices (RED), radiological dispersal devices (RDD), and dirty bombs [5]. On the other hand, a widespread nuclear material leakage could lead to severe social and economic consequences and could easily kick off global anxiety and concerns [6]. Thus, further surveillance measures of nuclear materials lead to less risk and enhance global transportation security measures for radioactive materials.

In July 2020, the IAEA issued the latest implementing guide under the heading “Security of Radioactive Materials in Transport” [7]. This comprehensive and authoritative document guides the safe and secure transport of radioactive materials and mandates states to establish effective national nuclear security regimes. Based on this guide, transport security objectives are classified into basic, enhanced, and additional transport security levels. The security objectives are clearly defined for each level. According to the guide, the basic level requires detecting any unauthorized access or movement of packages. In this regard, the present study aims to focus on detecting unauthorized movements, also called illegal movement, of packages during the transportation of radioactive materials to prevent loss, theft, diversion, or sabotages.

Recently, numerous studies have been conducted on detecting and tracking nuclear materials within facilities or during transportation. For instance, Gilbert et al. [8] employed spectral X-ray radiography to examine radioactive materials in packages or composite objects, aiming to disrupt the illicit trafficking of nuclear materials. Argonne National Laboratory developed an ARG-US system [911], which uses a range of sensors and active RFID tags to monitor real-time radiation dose, container sealing, as well as ambient temperature and state parameters of containers carrying radioactive materials. The system utilizes GPS technology to track and monitor vehicles transporting the materials. Additionally, the ARG-US system could be implemented for tracking and monitoring nuclear materials within facilities [12]. Vander Wal et al. [13] developed the TRAVELER program based on the ARG-US system and established a virtual geographic boundary for radioactive material shipments. The software automatically triggers an alarm if the transport vehicle leaves the electronic fence. Deb [14] proposed a method called the interior point method (IPM) to estimate the location and trajectory of a moving radioactive source. Moreover, Bauk [15] employed RFID technology and established a tracking model for radioactive materials during sea transportation. The model transmits diverse data including the latitude, longitude, speed, heading of the ship, and the radiation dose of cargo packages to ground-based control centers every two hours.

Several investigations have focused on detecting radioactive sources diverted illicitly in urban environments, which is an important part of modern nuclear security. A prefilter framework was presented for mobile sensor networks to estimate urban sources’ positions and intensity [16]. When detecting illicit radioactive sources in urban areas, the performance of mobile detector systems is constrained by environmental interference. Thus, to address this challenge, the RadMAP system systematically probes variations in natural radiological background and creates multisensor datasets for mobile radiation detection [17]. A network of mobile distributed sensors was deployed on a vehicle platform to detect mobile radioactive sources. It was found that the detection time of mobile radioactive sources was affected by the speed of the source and the number of mobile detectors [18]. Studies [19] demonstrated that the fusion of extensive data generated by radiation detectors employing Pearson’s methodology significantly enhances the source detection effectiveness of mobile radioactive materials.

When transportation occurs, vehicles may pass through tunnels, bridges, or remote mountainous areas, where GPS may not provide real-time location data. Meanwhile, cameras may not be applicable on ships to monitor radioactive materials due to confidentiality and privacy requirements. To address these challenges, Zeng et al. [20, 21] developed a method to detect unauthorized movements by installing a wireless node on radioactive items within the cargo package. In this context, Zeng et al. [20] established a network comprising numerous wireless nodes on the packages. In this approach, any illegal movement of containers can be detected by monitoring the real-time connection status between the detecting node and its adjacent nodes. If a node fails to communicate with its neighboring nodes during transportation, the system automatically issues an alarm indicating that the package has been lost or stolen. However, this method required a stable and reliable network between the nodes. More specifically, the system will generate false alarms if the network fails and communication breaks down. To resolve this shortcoming, the authors in [21] developed an illegal movement detection model based on a space triangle. This approach involves three steps: 1. the received signal strength indicator (RSSI) values were calculated by measuring the signal strength between the nodes on the package and the four anchor nodes within the package; 2. the RSSI values were converted into distances using the log-distance path loss model; 3. the precise location of the package was determined by establishing a spatial triangle and solving the associated mathematical equations. This approach allows for the assessment of whether the radioactive cargo has been moved outside the compartment, indicating the occurrence of an unauthorized movement. It should be indicated that the presence of the multipath effect in wireless signal transmission introduces a notable challenge. As a result, the distances estimated from RSSI values are vulnerable to errors [2224], which adversely affects the accuracy of determining the cargo location. Consequently, false and missed alarms may occur in identifying illegal movements of radioactive material packages. On the other hand, due to the shielding effect of the metal carriage, wireless nodes installed outside the package may not receive signals from the anchor nodes within the cargo, let alone obtain RSSI values. Such instances cause the method not to function properly. Hence, the approach exhibits poor performance.

The conducted literature survey indicates that the existing detection methods deprive stability and accompany the failure risks of detection since the distance calculation based on RSSI generates errors that could lead to false and missed alarms. Consequently, it is of significant importance to develop a novel methodology to detect illegal movements of radioactive material packages steadily and dependably by succeeding with a high detection accuracy. A feasible solution to address the aforementioned challenges is to utilize the backpropagation (BP) neural network, which is a supervised learning algorithm that is commonly employed to solve various problems such as classification, regression, prediction, and pattern recognition problems [25]. In the field of nuclear energy, the BP neural network has been widely employed to monitor the operating state of nuclear systems, diagnose faults, identify nuclides, and optimize the design of reactors [26, 27]. Considering the superior characteristics of the BP neural network such as its proficiency in nonlinear fitting, adaptive learning, and handling multidimensional complex data, this scheme is adopted in the present study to detect unauthorized movements of radioactive material packages during transportation.

Similar to the study conducted by Zeng et al. [21], this article defines an unauthorized movement (or illegal movement) as any movement of radioactive cargo outside the truck’s compartment during transportation. It is worth noting that although the standard BP neural network exhibits outstanding performance, it has some drawbacks such as slow converges and susceptibility to fall in local optimal solutions [28]. To resolve these problems, the Adam optimizer was employed in this article to optimize the standard model. As a result, a new Adam-optimized BP neural network model was developed to detect unauthorized movements of radioactive material packages. The main objective of the present study is to provide a reliable basis for alarm generation in the vehicle transportation security system. This article primarily focuses on the following aspects:(1)Dataset Collection: several Wi-Fi modules were positioned on the inner wall of the cargo compartment and radioactive material transport packages. The RSSI sequence collected from the packages from the Wi-Fi modules inside the cargo compartment was measured after powering on all the modules. To establish a comprehensive dataset, the data collection procedure was repeatedly run at each time where the position of the packages is randomly adjusted, and then the corresponding RSSI values were recorded.(2)Construction of the unauthorized movement detection model: several dynamic optimization algorithms were employed, and the results were compared. In this regard, the convergence speed and computational cost of the optimized BP neural network model were analyzed. Finally, an Adam-optimized BP neural network model was developed to detect unauthorized movements of radioactive materials.(3)Experimental validation: experimental validation was carried out through the measured dataset, comparing and analyzing the changes of three indices, including the number of classification errors (NM), the accuracy rate (ACC), and the MacroF1 macro-mean of the unauthorized movement detection model before and after the optimization. The focus was on the accuracy of the model, as well as the false and missed alarm rate of the model.

3. Detection Model

3.1. BP Neural Network

The BP neural network is a multilayer feedforward neural network based on error backpropagation training. This model is one of the most widely used neural network models, which is commonly used in diverse applications [25]. The BP neural network primarily consists of three parts: the input layer, the hidden layer, and the output layer. Each layer contains several nodes, and the network weights reflect the connection status between layers. This model compares the actual output with the expected output in the output layer. If the results are inconsistent, the error is calculated and the error signal is propagated backward [29]. Then, the gradient descent algorithm continuously updates the network weights until the error meets the accuracy requirements.

Figure 1 shows the schematic structure of a typical three-layer BP neural network, in which x1,…,m, and ŷ1,…,n are input and output variables, respectively. Furthermore, and denote the weights between the nodes of the input and hidden layers and the hidden and output layers, respectively. The activation function of the hidden layer is ReLU with a bias term , while that of the output layer is Softmax with a bias term . The forward propagation equation can be expressed as follows:

The BP neural network utilizes the gradient descent algorithm to optimize and update the network weights and bias terms. This algorithm is as follows:where α represents the learning rate, with a default value of 0.01 [25]. This iterative process is repeated until the network converges to a satisfactory level of performance.

3.2. BP Neural Network Optimized by Adam Algorithm

The standard BP neural network algorithm is prone to oscillations during weight updates using the gradient descent algorithm, resulting in slower convergence rates and falling into local minima, thereby adversely affecting the model accuracy. To address these problems, the Adam optimization algorithm is adopted to optimize the standard BP neural network weight update algorithm [30]. This optimization algorithm dynamically adjusts the learning rate of each parameter by estimating the first-order and second-order moments of the gradients. It also incorporates momentum and adaptive learning rates to accelerate model training, improve network recognition accuracy, and reduce oscillations during convergence. For instance, the gradient descent algorithm updates , which is the weight matrix between the hidden and output layers, through the following iterative calculations:where and are first-order and second-order momentum terms, respectively, while and represent their bias-corrected estimates; denotes the value of the network weights of the t-1st iteration in the implicit and output layers; ƞ1 and ƞ2 are the default values of the hyperparameters; and represent the t-th power of and , respectively.

Finally, the weights and biases are updated, and the weights for the t-th iteration are obtained as equation (12). Similarly the network weights , biases , and between the input and hidden layers during the t-th iteration are updated as follows:where and denote the model bias at the t-1st iteration; is the network weight between the input and hidden layers at the t-1st iteration; α is the learning rate; ɛ is an infinitesimal real value.

3.3. Detection Model with an Adam-Optimized BP Neural Network
3.3.1. Model Feature Parameters and Label Definitions

Based on the analyses presented in the preceding sections, the fundamental concept of commonly used methods for identifying unauthorized relocation of radioactive material during transport revolves around continuous monitoring of its position within the cargo compartment. In this study, a Wi-Fi module was installed on the radioactive transportation parcel, while multiple Wi-Fi modules were deployed as access points (APs) within the transportation compartment. Before the experiment, these Wi-Fi modules’ operation mode and network parameters, including IP address and subnet mask, are required to be configured. Once powered on, the Wi-Fi module on the radioactive goods parcel receives the RSSI values from the multiple APs located within the compartment. These values can be organized into a sequence denoted as (RSSI1, RSSI2, …, RSSIn), where “n” represents the number of APs, which is 6 in the present study. Notably, distinct locations of the parcels yield different RSSI sequences. Therefore, these RSSI sequences can be used as the input feature parameters.

Given the concentration of security forces in the cab, diverting radioactive materials from the front of the truck would be unrealistic. Thus, RSSI data collection from this specific orientation was omitted. During the experiment, with the truck in the center, the area is divided into four distinct regions with unique labels: the interior, the left side, the right side, and the rear area. The neural network’s output value corresponds to the region code, wherein a unique code is allocated to each label. Table 1 provides a mapping between the labels and respective regions.

3.4. Model Architecture Design

The proposed model utilizes a 3-layer Adam-optimized BP neural network. In this model, the hidden layer consists of 32 neurons, while the input layer comprises 6 neurons corresponding to the RSSI values received from 6 APs within the compartment. The output layer consists of 4 neurons and employs Softmax activation to classify the region into four distinct regions. The hidden and output layers employ ReLU and Softmax activation functions, respectively. Figure 2 illustrates the structure of the Adam-optimized BP neural network model for unauthorized movement detection of radioactive material packages.

The training dataset encompasses 70% of the collected dataset, while the remaining 30% is allocated as the test data. Once the model is trained, inputting the RSSI values gathered from the six access points received from the radioactive transportation package empowers the model to generate the corresponding region code for the parcel. Consequently, the specific location of the radioactive parcel can be determined accordingly. If the radioactive parcel is detected outside the truck’s compartment, it indicates an illegal movement has occurred.

4. Experiment

4.1. Hardware Components

The RSSI dataset was collected using seven 51 mm  28 mm Wi-Fi modules, as shown in Figure 3(a). Each module featured an onboard 2.4 GHz Wi-Fi chip antenna and was equipped with a 32-bit low-power dual-core ESP32-WROOM-32 as the core processor. The Wi-Fi modules were powered by a 3.7 V lithium-ion battery. These modules are small, cost-effective, and efficient Wi-Fi modules that offer exceptional performance.

4.2. Experimental Environment

The experimental truck’s compartment is 3.00 m long, 1.60 m wide, and 1.55 m high. The compartment’s roof is situated at a height of 2.3 m above the ground. The experiment was conducted in three steps: firstly, six anchor nodes were arranged inside the compartments affixed directly with transparent adhesive paste. These anchor nodes were set to operate in the AP mode that broadcast wireless signals for other terminals to scan and obtain signal strength. Figure 4 illustrates the installation positions of the anchor nodes. Secondly, one additional Wi-Fi module was designated as the mobile node, simulating a node mounted on the radioactive material transporting container. The mobile node was operated in the STA (station) + AP mode. Once the node was powered on, it automatically scanned and obtained the RSSI values from the six anchor nodes and transmitted the collected data to a PC via the TCP protocol. Finally, the received RSSI data was read and stored on the PC using NetAssist V5.0.2 software.

Based on the measurement results, the mobile node established communication with the anchor node located in the rear area of the truck at a maximum distance of 8 m. However, when the mobile node was positioned on the left or right side of the truck, the connection to the anchor node was lost at a distance of approximately 5 m from the compartment. Notably, the mobile node hardly detected signals from the anchor node inside the compartment when positioned on the front side. Accordingly, the experimental area was divided into four sections: the interior of the truck’s compartment, the area within 5 m to the left and right of the truck, and the region within 8 m from the rear of the truck. During the experiment, the mobile node was randomly moved within these four regions, collecting RSSI values from the six anchor nodes within the compartment at each point. Additionally, the height of the mobile node at the same measurement point was measured to simulate scenarios where packages of different volumes of radioactive materials were illegally moved outside the truck, thereby enriching the dataset. In total, 10113 data points were collected during the experiment. Figure 5 shows photographs of the experimental site.

4.3. Data Preprocessing

RSSI values are affected by a variety of interfering factors such as multipath, scattering, obstacles, and metal shielding that are typically present in the environment. To reduce the measurement error caused by the interference, multiple measurements are conducted at the same location when collecting data. During the experiment, the mobile node reads 20 consecutive RSSI values from each AP at each measurement point, creating a set of RSSI values. On the PC side, a Gaussian filter is applied to the collected RSSI data from the same AP to obtain the final RSSI value. This value is then stored in the sample dataset for subsequent training and testing of the neural network model.

The main concept of applying Gaussian filtering is to select the RSSI value of the high probability region as the effective value and then calculate its geometric mean. This method effectively reduces the errors caused by small probability events and improves the accuracy of the measured data. Based on empirical observations, RSSI values follow a Gaussian distribution [31], with the probability density function in the form as follows:where the mean μ and variance σ2 are expressed as

Therefore, μ and σ2 can be calculated by introducing the measured RSSI values into equations (17) and (18). To compute the Gaussian distribution corresponding to each set of RSSI, the obtained μ and σ2 are applied to the density function of the Gaussian distribution, as defined in equation (16). The RSSI values were selected according to the sigma principle of the Gaussian distribution, and then the average was taken over k RSSI values. Finally, the desired RSSI value can be obtained from the following expression:

After applying Gaussian filtering, the final RSSI dataset can be obtained. This dataset contained 10113 samples collected from random locations within four regions. Table 2 provides details of the data distribution. Due to shielding and obstruction caused by the compartment, the mobile node was unable to scan signals from certain APs in specific areas on the left and right sides near the front of the truck. As stated previously, the method outlined in [13] fails to provide a reliable means of detecting unauthorized movements of the radioactive material packages under these circumstances. In our study, these RSSI values were adjusted to a minimal value of −200 dBm in the dataset during the data preprocessing stage and served as a vital component in the training and testing sets of the detection model. Moreover, even if the packages were in areas where certain APs’ signals were blocked, the proposed detection model could remain capable of effectively detecting the unauthorized movements of packages.

5. Results and Discussion

5.1. Comparison of Multiple Optimization Algorithms

After establishing the dataset, the model was trained to detect unauthorized movements of radioactive material packages. Data processing, as well as model construction, was performed on the PyTorch framework within the PyCharm integrated development environment.

To validate the superiority of the Adam-optimized BP neural network algorithm, it was compared with the standard BP neural network and BP neural networks optimized by other algorithms such as RMSProp, AdaGrade, and AdaDelta that exhibit adaptive learning capabilities. The results illustrated in Figure 6 show that the Adam and RMSProp optimization algorithms outperform the other algorithms in terms of cost and convergence rate. Furthermore, it is found that the Adam optimization algorithm exhibits a clear advantage over the RMSProp optimization algorithm regarding computational costs. Therefore, it is concluded that the utilization of the Adam algorithm for optimizing the BP neural network confers significant advantages.

5.2. Analysis of Experimental Results

The classification prediction was performed using an Adam-optimized BP neural network model with a learning rate of 0.01. The dataset contained 10113 pieces of data, 70% of which is allocated to a training set and 30% to a testing set for experimental validation. The output results were classified into four categories: the interior, the left side, the right side, and the rear of the truck. The evaluation metrics were the number of misclassifications (NM), accuracy (ACC), and the macro-average of F1 scores (MarcoF1). ACC is defined as the ratio of correctly classified instances to the total number of instances and can be mathematically expressed as follows:where is the number of correctly classified instances and is the total number of test instances.

The MarcoF1 macro-average is an index, which is widely used to measure the accuracy and stability of multiclassification models while considering both precision rate and recall rate. In this paper, the output results form a four-classification problem. To calculate the MarcoF1 macro-average, it is necessary to decompose it into four binary classifications. The F1 score is computed for each binary classification, and then the average of the four F1 scores is calculated to obtain the MarcoF1 macro-average. This approach ensures the comprehensive evaluation of the model’s performance across all classes. The MarcoF1 index can be obtained from the following expression:where and are the precision and recall of class i, respectively.

The experiment compared the number of NM, ACC, and MarcoF1 macro-average values between the BP neural network and the Adam-optimized BP neural network models. As shown in Table 3, the results reveal that as the number of training epochs increases, the classification accuracy of both models on the test data improves. For the same number of training epochs, the Adam-optimized BP neural network demonstrates higher accuracy and MarcoF1 macro-average values compared with the BP neural network. Additionally, the Adam-optimized model has substantially fewer misclassifications. Specifically, when the number of epochs was set to 200, the Adam-optimized BP neural network displayed a 28.6% reduction in the number of misclassifications compared to the standard BP neural network. The gap between the NM, ACC, and MarcoF1 macro-average of the Adam-optimized BP neural network and the BP neural network models gradually exhibits a negative correlation with the number of epochs. However, the Adam-optimized BP neural network model consistently outperforms the BP neural network model across these evaluation metrics.

The classification results were converted into two categories: “inside the truck’s compartment” and “outside the truck’s compartment” by merging the classifications for the left side, right side, and rear of the truck. The classification “outside the truck’s compartment” signifies that an unauthorized movement has occurred, which is also referred to as an abnormal event. On the other hand, the classification “inside the truck’s compartment” indicates that there was no unauthorized movement, so it is also called a normal event. The output results are crucial evidence for alarming the onboard transportation security system. In cases where radioactive materials are moved outside but the model incorrectly classifies them as “inside the truck’s compartment,” the system fails to generate an alarm. This case is known as a missed alarm. Conversely, if the radioactive materials are inside the compartment, but the model predicts it as “outside the truck compartment,” and a false alarm is triggered. The missed alarm rate and false alarm rate are defined as follows:where is the number of samples inside the truck misclassified as outside the truck or the number of normal events misclassified as abnormal events; is the actual total number of samples inside the truck or the actual total number of the normal event; is the number of samples outside the truck misclassified as inside the truck or the number of abnormal events misclassified as normal events; is the actual total number of samples outside the truck, or the actual total number of the abnormal event.

The models were trained for 300 epochs with a learning rate of 0.01. The confusion matrices of the standard BP neural network model and the Adam-optimized BP neural network model are shown in Figure 7. It is observed that in the classification obtained from the standard BP neural network, 8 of the 727 test points inside the truck compartments were misclassified, and 24 of the 2307 test points outside the truck’s compartment were mispredicted. Accordingly, the overall classification accuracy was 98.95%. Meanwhile, the rates of missed and false alarms were 0.79% and 0.26%, respectively. Figure 7(b) shows that when using the Adam-optimized BP neural network model for detection, only 3 of the 727 test points inside the truck compartment were correctly classified, resulting in a false alarm rate of 0.1%. However, 22 of the 2307 test points outside the truck compartment were wrongly classified as the interior, resulting in a missed alarm rate of 0.72%. Accordingly, the overall classification accuracy of the model was 99.17% indicating that the modified model outperforms the standard model.

6. Conclusions

To reduce the rates of false and missed alarms in detecting unauthorized movements of radioactive material shipments, an Adam-optimized BP neural network model was proposed in the present study. The developed model was applied to detect unauthorized movements of radioactive material packages. It was found that the Adam-optimized BP neural network model improves classification accuracy and macro-average values compared with the standard BP neural network algorithm. When the output results were categorized into 4 classes: they are the interior, left and right sides, and the rear sections of a truck. The results revealed that the maximum reduction in classification errors is 28.6%. Experimental results indicate that when classifying the output data as whether inside or outside of the truck compartment, the proposed model achieves an accuracy rate of 99.17%, a missed alarm rate of 0.72%, and a false alarm rate of 0.1% in detecting unauthorized movement of radioactive materials.

This article demonstrates that the developed method exhibits high accuracy and stability in detecting unauthorized movements, effectively avoids false alarms and achieves a very low missed alarm rate. This method holds significant potential for enhancing the security of transporting radioactive materials. The developed method addresses various concerns such as losses, theft, and malicious incidents. This approach contributes to enhancing overall transportation security levels.

Data Availability

The data used to support the findings of this study are available from the corresponding author on request.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding this publication.

Acknowledgments

This study was funded by China’s 13th Five-Year Nuclear Energy Development Project, “Individual Self-Security Intelligence of Radioactive Material.”