The invention relates generally to methods and systems for securing large infrastructures and more particularly to methods and systems for securing pipelines and similar infrastructures.
In recent years, considerable efforts have been made for securing pipelines and associated oil and gas infrastructures, with support from both industry and government. However, the growing level of attacks against and accidents involving pipelines and other infrastructures has not only continued but has resulted in even more serious reductions in productivity, downtime and associated losses. Large infrastructures that may be subject to such risk may include pipelines, rail lines, waterways, electrical distribution networks, water distribution networks, and so forth.
Pipelines and other infrastructures also face unintentional threats, for example from farmers ploughing the fields, from backhoes and other machinery used in construction or excavation activities. Oil and gas infrastructure is not only integral to energy supply but also has vital links to other critical infrastructure like power plants, airports, and military bases. Providing protection for such large infrastructure is a very complicated task due to the vulnerability to sabotage of the easily accessible infrastructure, which usually is widespread and may run alternately in remote and densely populated areas.
Traditionally, the solution to threat against such large infrastructures has been mostly reactive, mainly because of the enormous amount of resources required to safeguard these sites. Ground and aerial patrols have been used, but these have limitations of timely preparedness for withstanding and responding to a threat effectively, and are not very reliable and feasible for round the clock security. Some recent developments in pipeline security systems include use of acoustic monitoring, geophones, fiber optic cables and satellite surveillance. These have several limitations. For example, acoustic monitoring has a limited ability to prevent damage. Geophones and fiber optic cables need to be physically dug-in right of way (ROW), thus increasing pipeline vulnerability and also associated high costs. Satellite surveillance is expensive and is not feasible as a sole method for real time threat detection.
Therefore, there is a need for an improved system and method for detecting threats for large infrastructures like the pipelines and other infrastructures, that proactively delivers threat warnings and prevents or reduces the risk of potential damage.
According to one aspect of the present technique, a security monitoring system for a large infrastructure is provided. The system includes multiple magnetometers disposed around an area of the infrastructure. At least one magnetometer is configured to relay an alert signal indicating a change in a magnetic flux profile around the area. A central unit is configured to receive the alert signal and to initiate a response to the alert signal.
Another aspect of the present technique is a method for securing a large infrastructure. The method includes establishing a wireless network around the large infrastructure using multiple magnetometers. A magnetic flux and a change in magnetic flux profile are sensed by the magnetometers around the large infrastructure and a sensed signal is generated. The sensed signal is analyzed to determine whether there is a local disturbance around the large infrastructure. The change in the magnetic flux may indicate the presence of metal objects, indicating the local disturbance.
These and other features, aspects, and advantages of the present invention will become better understood when the following detailed description is read with reference to the accompanying drawings in which like characters represent like parts throughout the drawings, wherein:
Turning now to drawings,
In one example, magnetometers, denoted generally by reference numerals, 24-46 are used as sensing devices and are disposed around these areas 16-22. As will be appreciated by those skilled in the art, the magnetometers are sensors that measure earth's magnetic field. Most moving metal objects (i.e. those that contain some magnetic material), as would be appreciated by those skilled in the art, disturb the earth's magnetic field and the presence of this disturbance is detected by these magnetometers. In case of threat to any large infrastructure and more specifically to pipelines, the threat will generally involve the use of a moving metal object, for example, a backhoe, a gun, a hammer or any other similar object, which can be easily detected by the magnetometers.
Multiple magnetometers may be advantageously used in order to distinguish natural or normal disturbances from local disturbances. It would be appreciated by those skilled in the art that any natural disturbance will typically be detected by almost all the magnetometers in a particular area. Any local disturbance will be detected only by one or a group of magnetometers around that area.
In accordance with the present technique, any suitable magnetometers may be employed. However, in a presently contemplated embodiment, micro-electro-mechanical system (MEMS) magnetometers, may be employed as they are low maintenance and inexpensive. Such devices are typically manufactured using batch fabrication techniques, are sturdy and can be dispersed, for example, from an airplane. Thus, deployment and installation for these sensors is simple and does not involve wiring or digging. Further, such magnetometers are small and consume very little energy for integrated circuitry and wireless networking. It should be noted, however, that while magnetometers are described herein as exemplary sensors according to aspects of this technique, any other sensors with similar features as described herein would equally be applicable.
As described herein the magnetometers 24-46 sense at least a magnet flux and a change in magnetic flux including a change in profile of the magnetic flux over time. It should be noted that the terms ‘change in magnetic flux’ and ‘change in magnetic flux profile’ are understood to be used interchangeably in the following description. The change in the magnetic flux or magnetic flux profile occurs due to the presence of metal objects indicating a local disturbance in the magnetic flux. The multiple magnetometers are configured to compensate for any initial metal presence. Such initial flux levels and variations may result from, for example, natural deviations in the earth's magnetic field, the infrastructure itself (e.g. a pipeline or supporting structures), or a construction activity already underway near the infrastructure. Initial levels may also result from appropriate precautions that may already have been deployed, or metal presence due to any natural occurrences like storms, which may have brought some metal objects closer to the infrastructure. The magnetometers, as described above, sense and determine whether the local disturbance is normal (e.g. within an anticipated range of flux levels or changes in flux levels) or not. If any magnetometer senses and determines that the local disturbance is not normal, an alert is relayed to the central unit, which may be a remote monitoring unit in accordance with an exemplary embodiment. The magnetometers or any similar sensors deployed, are thus configured to collect, process and communicate critical information in a reliable and robust fashion.
In an exemplary embodiment, at least one magnetometer may be configured to relay an alert signal indicating a change in a magnetic flux profile around the area. It will be appreciated by those skilled in the art, that the alert signal is relayed in real-time and thus facilitates preventive action to avoid any potential damage. In the illustrated example, magnetometers 28, 34, 40 and 46, for example, are configured to relay alert signals, shown generally by reference numerals 48, 50, 52 and 54 respectively, if there is any change in the magnetic profile around their respective areas 16, 18, 20 and 22. It may be noted that more than one magnetometer may be used for this function depending on the network configuration. A central unit 56 is configured to receive the alert signal from the magnetometers (28, 34, 40 or 46) and to initiate a response to the alert signal to prevent and contain the threat. The response may be a pre-determined action for example an email to the local security agency responsible for area, may be a physical alarm that initiates a set of security protocols, or any other action as determined by the infrastructure operators.
In a specific embodiment, a sensor package may advantageously be used to detect other parameters along with the magnetic flux to gather more information about the local disturbance. For example, the sensor package may include one or more of acoustic sensors, accelerometers, sounders, motion sensors, or exhaust sensors. Such sensor packages may use the additional information, with combinatorial logic, to determine one or more attributes about the area that may indicate a local disturbance.
In yet another example, the magnetometers may communicate in a node to node or a hub to hub manner. A dedicated node, for example magnetometer 28, may then be used to relay the alert signal 48 to the central unit 56. This would provide savings in terms of transmission energy. It will be appreciated by those skilled in the art that the network is possible even when the magnetometers have no unique address but may have a fixed frame of reference. The above techniques will be equally applicable to determine the location of the magnetometer relaying the alert, and thus finding the location of disturbance.
Powering the magnetometers is another aspect of the present technique. Because the power requirements are considerably low, the magnetometers may be charged as shown generally by reference numeral 60, by a power source 58, which may be a battery. In one example a solar cell and battery system may be used. In one configuration, the magnetometers may have an integrated battery associated with the internal circuitry of the magnetometers. The magnetometers may also be charged by a power scavenging unit. For example, if the area to be protected is located along roadside or a rail track, vibration from the passing vehicles may be converted into power in a manner generally known to those skilled in the art, and may be used to power the magnetometers. Alternately, the movement of a fluid, such as a fluid in a pipeline may be used to scavenge power. Other alternate energy sources like wind may also be used, depending on the geography of the area being secured.
As noted above, the detection of potential threats to the infrastructure may include, for example, determining whether the local disturbance is normal or not normal. Logic for such analysis may be provided in the individual sensors, or may be performed by particular, dedicated sensors, or by processors either in the field or at a remote location. In case the analysis shows that the local disturbance is not normal, at step 70 an alert is relayed to a central unit or other desired oversight location, as described herein above with reference to
Other aspects of the present technique, may include a step 72 for compensating for an initial local disturbance or initial metal presence or any other initial attribute so that a false message is not relayed under such conditions. Such compensation may be part of an initialization or commissioning procedure, and may include the calibration described above. Aspects of the present technique may also include a step 74 for powering the network using alternate energy sources as described in reference to
Aspects of the present technique as described herein thus yield accurate sensing and reliable alerting for providing proactive reliability and safety monitoring for any large infrastructure. Thus false alarms are reduced or prevented which can involve enormous resources. The technique advantageously provides early detection of any threat activity before damage to the asset occurs, and provides time for suitable preventive actions and response. Aspects of the present technique also provide a unique system for monitoring damage and providing real-time alerts using sensing and processing units and a remote alerting system. The technique may further be utilized for recording of events, trend analysis, and data for future prediction tools. It would be well appreciated by those skilled in the art that though the description above relates to protection of a pipeline as an exemplary infrastructure, aspects of present technique are equally applicable to other large infrastructures, such as power stations, railways, airports and other infrastructures which are generally widespread and difficult to physically monitor and secure.
While only certain features of the invention have been illustrated and described herein, many modifications and changes will occur to those skilled in the art. It is, therefore, to be understood that the appended claims are intended to cover all such modifications and changes as fall within the true spirit of the invention.