Pipeline Security

Embed Size (px)

Citation preview

  • 7/31/2019 Pipeline Security

    1/16

  • 7/31/2019 Pipeline Security

    2/16

    SYSTEM PURPOSES

    Detection of intrusion and criminal activity over wide area

    Acquisition of various information without

    additional infrastructure

    Protection of strategic sensitive and

    hazardous sites

    Remote defense devices control

  • 7/31/2019 Pipeline Security

    3/16

    System Advantages Very low FAR (False alarm rate)

    Novel analysis approach

    Easy & quick deployment

    Wireless ultra low energy connectivity

    Low energy consumption per sensor

    Zero external power, wide area use

    Connectivity to any C4 or SCADA systems

    Open Architecture

  • 7/31/2019 Pipeline Security

    4/16

    FIELD DEVICES Cell communication

    To nearest radiobase To nearest radiobase

    urface level

    urface level

    Electrical signals generated

    from mechanical vibrations.

  • 7/31/2019 Pipeline Security

    5/16

    Typical Sensor UGS (Unattended Ground Sensors)

    Very low FAR (False alarm rate)

    Easy & quick deployment

    Wireless ultra low energy connectivity

    Low energy consumption per sensor

    Zero external power, wide area use

    Connectivity to any C4 or SCADA systems

    Open Architecture

  • 7/31/2019 Pipeline Security

    6/16

    UGS data specification

    Waterproof sealed package

    Operating temperature: -40..+60

    Self-Powered Life time: up to 10 years

    Typical radio operating range @ 10dbm: up

    to 1.2 km, 20dbm model, up to 5 km

    Intruder Detectingrange [m]

    Inter sensors Distance [m]

    Underground

    activities12-30 20-50

    Walking 20-35 30-60

    Digging 70-100 120-200

    Cars/Tractors 100-300 180-500

  • 7/31/2019 Pipeline Security

    7/16

    TYPICAL PIPELINE SENSORS DEPLOYMENT

    WiMax

    Data Radio

    Telemechanic shelter

    RS-232

    Valve

  • 7/31/2019 Pipeline Security

    8/16

    Pipeline Protection (underground construction): Seismic sensors covered 30-50 cm

    underground.

    Sensors can anchored or cement

    casted in the ground.

    50-100 m between sensors.

    Unique wireless communication, candeployed up to 10 KM.

    Independent energy sources for each

    sensors available more than 10 years

    working time.

    Detection technologies:

    Human or Vehicle detection.

    Several methods for Oil Leaking detection

  • 7/31/2019 Pipeline Security

    9/16

    Pipeline Protection (stations & pipeline ):

    2-4 sensors for stations secure, communicates control center via oil

    pipeline communication infrastructure.

    50-100 m between each sensors along the pipeline, communicates one

    each other up to 10 KM

  • 7/31/2019 Pipeline Security

    10/16

    Pipeline Protection (leaking detection): Many reasons can cause oil leaking

    such as: Vandalisms activities.

    Corrosion, erosion.

    mechanical damages.

    Seismic sensors can be use to either detecting human activities, vehicles

    movements, oil leaking.

    Sensors can embedded to the pipelines

    either anchored nearby.

  • 7/31/2019 Pipeline Security

    11/16

    Data Gathering process

    Sensors send data to Local Bases

    Local Wired/Wireless Bases route the data to Analytic Controllers.

    Analytic Controllers

    Processes all regional data and route alarms andother information to C4

  • 7/31/2019 Pipeline Security

    12/16

    Command Communication and Control Center C4

    Gathering the Information from the Analytic Controllers

    Displaying guarded objects status

    Tuning the parameters of the system

    (sensitivity, thresholds, sensorsmodes, Radio Frequency and duty

    cycles, etc)

    Integration with the GIS, mobile

    forces navigational information and

    other third-party systems

    Real time fusion of Video data and guarded field status

    Data statistics and archive

  • 7/31/2019 Pipeline Security

    13/16

    CONTROL CENTER TYPICAL WORKBENCH

  • 7/31/2019 Pipeline Security

    14/16

    PATH DETECTION

  • 7/31/2019 Pipeline Security

    15/16

    HISTORY LOG FOR ANY SENSOR

  • 7/31/2019 Pipeline Security

    16/16

    Thank You

    www.defensetechs.com [email protected]