Upload
defensetechs
View
219
Download
0
Embed Size (px)
Citation preview
7/31/2019 Pipeline Security
1/16
7/31/2019 Pipeline Security
2/16
SYSTEM PURPOSES
Detection of intrusion and criminal activity over wide area
Acquisition of various information without
additional infrastructure
Protection of strategic sensitive and
hazardous sites
Remote defense devices control
7/31/2019 Pipeline Security
3/16
System Advantages Very low FAR (False alarm rate)
Novel analysis approach
Easy & quick deployment
Wireless ultra low energy connectivity
Low energy consumption per sensor
Zero external power, wide area use
Connectivity to any C4 or SCADA systems
Open Architecture
7/31/2019 Pipeline Security
4/16
FIELD DEVICES Cell communication
To nearest radiobase To nearest radiobase
urface level
urface level
Electrical signals generated
from mechanical vibrations.
7/31/2019 Pipeline Security
5/16
Typical Sensor UGS (Unattended Ground Sensors)
Very low FAR (False alarm rate)
Easy & quick deployment
Wireless ultra low energy connectivity
Low energy consumption per sensor
Zero external power, wide area use
Connectivity to any C4 or SCADA systems
Open Architecture
7/31/2019 Pipeline Security
6/16
UGS data specification
Waterproof sealed package
Operating temperature: -40..+60
Self-Powered Life time: up to 10 years
Typical radio operating range @ 10dbm: up
to 1.2 km, 20dbm model, up to 5 km
Intruder Detectingrange [m]
Inter sensors Distance [m]
Underground
activities12-30 20-50
Walking 20-35 30-60
Digging 70-100 120-200
Cars/Tractors 100-300 180-500
7/31/2019 Pipeline Security
7/16
TYPICAL PIPELINE SENSORS DEPLOYMENT
WiMax
Data Radio
Telemechanic shelter
RS-232
Valve
7/31/2019 Pipeline Security
8/16
Pipeline Protection (underground construction): Seismic sensors covered 30-50 cm
underground.
Sensors can anchored or cement
casted in the ground.
50-100 m between sensors.
Unique wireless communication, candeployed up to 10 KM.
Independent energy sources for each
sensors available more than 10 years
working time.
Detection technologies:
Human or Vehicle detection.
Several methods for Oil Leaking detection
7/31/2019 Pipeline Security
9/16
Pipeline Protection (stations & pipeline ):
2-4 sensors for stations secure, communicates control center via oil
pipeline communication infrastructure.
50-100 m between each sensors along the pipeline, communicates one
each other up to 10 KM
7/31/2019 Pipeline Security
10/16
Pipeline Protection (leaking detection): Many reasons can cause oil leaking
such as: Vandalisms activities.
Corrosion, erosion.
mechanical damages.
Seismic sensors can be use to either detecting human activities, vehicles
movements, oil leaking.
Sensors can embedded to the pipelines
either anchored nearby.
7/31/2019 Pipeline Security
11/16
Data Gathering process
Sensors send data to Local Bases
Local Wired/Wireless Bases route the data to Analytic Controllers.
Analytic Controllers
Processes all regional data and route alarms andother information to C4
7/31/2019 Pipeline Security
12/16
Command Communication and Control Center C4
Gathering the Information from the Analytic Controllers
Displaying guarded objects status
Tuning the parameters of the system
(sensitivity, thresholds, sensorsmodes, Radio Frequency and duty
cycles, etc)
Integration with the GIS, mobile
forces navigational information and
other third-party systems
Real time fusion of Video data and guarded field status
Data statistics and archive
7/31/2019 Pipeline Security
13/16
CONTROL CENTER TYPICAL WORKBENCH
7/31/2019 Pipeline Security
14/16
PATH DETECTION
7/31/2019 Pipeline Security
15/16
HISTORY LOG FOR ANY SENSOR
7/31/2019 Pipeline Security
16/16
Thank You
www.defensetechs.com [email protected]