The present invention relates generally to a method and system for securing an infrastructure such as a pipeline. More particularly, the present invention relates to a method and system for implementing sensor arrangements and gathering data to protect the infrastructure against potential threats.
In recent years, considerable efforts have been made to secure infrastructures such as pipelines and associated oil and gas infrastructures, with support from both industry and government. Other examples of infrastructures include rail lines, waterways, electrical distribution networks, water distribution networks, and so forth. Securing infrastructures against intentional destructive attacks has been an important focus. However, infrastructures also face threats of accidental damage, for example, such as damage from farmers plowing fields with large machinery, or from backhoes and other machinery used in construction or excavation activities. Providing protection for infrastructures is a complicated task because many are extremely large and easily accessible.
Traditionally, responses to threats against such infrastructures have been mostly reactive, mainly because of the enormous amount of resources required to safeguard such infrastructure sites. Ground and aerial patrols have been used, but such patrols have limitations of timely preparedness for responding to a threat effectively. In-person patrolling is not a cost-effective solution, especially where continuous monitoring is considered desirable. Additionally, daily patrolling of pipeline resources has been estimated to be relatively ineffective in terms of actual damage prevention.
Some recent developments in automated pipeline security include the use of acoustic monitoring, geophones, fiber optic cables, satellite surveillance and the like. These solutions have several limitations. One problem has proven to be a high occurrence of false positive alarms. A false positive is an indication of an imminent threat when, in fact, no such imminent threat exists. Additionally, monitoring techniques such as acoustic sensing and geophone technology do not necessarily provide an ability to actually prevent damage after a threat is detected. Geophones and fiber optic cables need to be physically placed in the right of way (ROW) of a monitored infrastructure, thus increasing vulnerability and concomitant monitoring costs. Satellite surveillance is expensive and is not feasible as a sole method for real time threat detection.
Therefore, there is a need for an improved system and method for detecting threats for large infrastructures such as pipelines. Such a system may provide proactive threat warnings with a reduced occurrence of false positive alarms.
Briefly, in accordance with one embodiment of the invention, a system is provided for detecting potentially adverse conditions of the environment in and around the infrastructure. The system includes a plurality of sensors, each adapted to monitor a different measured parameter of an infrastructure or its surrounding environment. The system also includes a model that fuses data from the plurality of sensors and provides an indication of a potentially adverse condition.
In accordance with another embodiment of the invention, a method is provided for detecting potentially adverse conditions of the environment in and around the infrastructure. The method includes identifying a potentially adverse condition relative to an infrastructure or its surrounding environment. The method also includes selecting a plurality of sensors, each of the plurality of sensors being adapted to monitor a different measured parameter indicative of the potentially adverse condition. The method further includes designing a model that fuses data from the plurality of sensors to produce an indication corresponding to a probability that the potentially adverse condition will appear.
These and other features, aspects, and advantages of the present invention will become better understood when the following detailed description is read with reference to the accompanying drawings in which like characters represent like parts throughout the drawings, wherein:
The present technique relates to the use of combinations of multiple sensors of different types to provide an early indication of a potential threat to an infrastructure or other monitored location. A profile of potential threats and the expected parameters that would be generated for each of the chosen sensor types is developed for comparison with input data. It is believed that profiles that account for more than one type of sensor are more reliable for detection of potential threat conditions because it is less likely that something other than a potential threat would produce a sensor stimulus in an expected range for multiple sensors that are adapted to sense different types of data. Embodiments of the present technique relate to the selection of sensor combinations and development of modeling criteria to improve detection of potential threat conditions while reducing the occurrence of false positive alarms.
Combinations of sensors may be chosen for a given environment, infrastructure or known threat behavior. Examples of sensors from which combinations may be selected include, without limitation, magnetometers, accelerometers, range controlled radars, microphones, gas sensors or the like. Sensors may be used to detect and measure the trajectory and behavioral patterns of various threat causing agencies such as individual persons or vehicles within or near a protected zone. As set forth below, the sensor types chosen for different portions of a protected zone may be chosen because of the effectiveness of the chosen combination at detecting a specific potential threat that is more likely to be present in the specific area of the protected zone.
The use of combinations of multiple types of sensors tends to reduce occurrences of false positives. A false positive is an indication of an imminent threat when, in fact, no such imminent threat exists. The use of combinations of multiple types of sensors allows the development of a profile based on input data from multiple types of sensors instead of a single sensor. Thus, an intrusion may be identified as a potential threat if all or many of the multiple types of sensors' inputs provide an indication that corresponds to the profile of that potential threat.
By way of example,
An exemplary combination of sensors dispersed around these protected zones 14, 16, 18 and 22 may include a plurality of sensors 32, 34, 36 and 38, single or multiple instance of which are chosen to detect a threat activity, even prior to actual threat or damage to the infrastructure. Each of the sensors 32, 34, 36 and 38 is configured to detect a threat behavior of a typical threat causing agency corresponding to an outcome that causes damage to the infrastructure and send a signal representing the threat behavior. By way of example, the sensor 32 may comprise one or more magnetometers and the sensor 34 may comprise one or more accelerometers. The sensor 36 may comprise a range controlled radar and the sensor 38 may comprise one or more microphones. By developing a profile indicative of an expected input from each of these sensors for a particular potential threat, early threat detection capabilities are improved and occurrences of false positive indications of potential threats are reduced.
The range of a typical sensor 32 or 34 or 36 or 38 may not however be limited to one particular protected zone 14 or 16 or 18 or 22. In one embodiment of the invention, one or more of the sensors 32, 34, 36 and 38 may have a range larger than its corresponding protected zone 14, 16, 18 or 22.
The plurality of sensors 32, 34, 36, 38 may form a network for wirelessly communicating with each other. In another embodiment of the invention, the sensors 32, 34, 36, 38 may communicate wirelessly with each other in a pre-defined fashion. In yet another embodiment of the invention, the output of several types of sensors may be combined and/or several sensors may be arranged such that the output of one is input to another. In yet another embodiment of the invention, typical sensor packages may use additional information, with probabilistic logic, to determine one or more attributes about the corresponding protected zone that may indicate a threat level. Moreover, the installations of the multiple types of sensors 32, 34, 36, 38 may be permanent in one embodiment of the invention such that these, once installed, remain in the high probability area. In another embodiment of the invention, for instance, at a construction site the installations of the sensors 32, 34, 36, 38 may be temporary.
As set forth above, one of the plurality of sensors 32, 34, 36 and 38 may comprise a magnetometer. As will be appreciated by those skilled in the art, magnetometers are sensors that measure changes in the earth's magnetic field. In case of threat to any infrastructure and more specifically to pipelines, the threat could involve the use of a moving metal object, for example, a backhoe, or any other similar object, which can be detected by the magnetometers.
A range controlled radar may be employed as a sensor to detect a potential threat entering and moving about in the safe zone. The distance to the same threat causing agency may be calculated from the time the signal takes to travel to and from the threat causing agency. Combining active radar detection method with passive infrared sensing, a typical range-controlled radar system may provide enhanced detection of moving objects and reduced false positive alarm frequency within a range selected.
In one exemplary embodiment of the invention, an in-field supervisory control center 42 may be installed to receive, process and coordinate the sensing signals from various types of sensors 32, 34, 36 and 38. Additionally, it may transmit this data to a remote monitoring center that further analyzes the information and generates alerts. Structurally, the in-field supervisory control center 42 may include one or more micro-controllers and one or more solid-state switches configured to communicate with the multiple types of sensors 32, 34, 36 and 38 in various electrical communication modes. In another embodiment of the invention, the in-field supervisory control center 42 may include logic for activating a number of alert signals in coordination with the multiple types of sensors 32, 34, 36 and 38. An example of this embodiment might be a construction site where the alert would be generated locally in the form of a flashing light or siren sounding when a backhoe approached a pipeline. In a further embodiment, these alerts signals and the data received by the in-field supervisory control center are transmitted to a remote monitoring center for further processing, logging, and alert generation.
Logical processing inputs from the multiple types of sensors may include the use of multiple types of hybrid fusion models 52, 54, 56, 58 for determining a threat level if anything comes in the proximity of the infrastructure 12. The output of the sensors 32, 34, 36 and 38 may be evaluated by the multiple types of hybrid fusion models 52, 54, 56 and 58 to determine whether there is any increase in the threat level and thereby ascertain any serious imminent danger. Each of the multiple types of hybrid fusion models 52, 54, 56, 58, receives the signals from one or more of the multiple types of sensors 32, 34, 36 and 38 and fuses these differing signals. In one embodiment of the invention, one or more of the multiple types of hybrid fusion models 52, 54, 56 and 58 may be positioned inside a protected zone.
A typical hybrid fusion model 52 or 54 or 56 or 58, as described above, may sense and determine whether a threat level associated with the behavior of a threat causing agency is normal or not. The hybrid fusion models 52, 54, 56 or 58 may rely on the inputs of multiple types of sensors because combinations of inputs from different types of sensors may be indicative of particular threat behaviors. For instance, a disturbance measured by a magnetometer in combination with sound in a particular frequency range may be indicative of the presence of a backhoe in a protected zone. This way, the hybrid fusion models 52, 54, 56, 58 process the signals coming from the multiple types of sensors 32, 34, 36 and 38 by fusing them to determine a likelihood of the outcome and provide a signal indicative of the same likelihood of the outcome with low false positives. Multiple types of hybrid fusion models and their application and characteristic behavior in relation to threat level sensing will be explained later in more detail.
Normalcy of a threat level may be typically interpreted in one embodiment of the invention as being within an anticipated range of the detection parameter of the sensor. If any sensor senses and determines that the threat level is not normal, an alert may be relayed to an in-field supervisory control center, or a remote monitoring center via an in-field supervisory control center in accordance with an exemplary embodiment. The magnetometers, accelerometers, range controlled radars or any similar sensor deployed in a typical security monitoring system 10 in accordance with various embodiments of this invention may thus be designed to collect, process and communicate critical information in a reliable and robust fashion. It will be appreciated by those skilled in the art, that the alert signal is relayed in real-time and thus facilitates preventive action to avoid any outcome that causes damage.
The operation of an exemplary embodiment of the present invention is described below using a backhoe as an example of threat causing agency 62. It should be understood that the invention may be employed to detect a wide range of threat causing agencies, depending on the design and environment of the protected infrastructure.
Examples of various threat causing agencies may be human errors, human interferences (unintentional as well as intentional) and natural hazards. Natural hazards may include hazards caused by geological forces such as earthquakes, landslides or the like. In one embodiment of the invention, multiple types of sensors and multiple types of hybrid fusion models are described that work together to detect the preliminary signs of an outcome that causes damage before the event actually occurs. These preliminary signs provide responsible authorities reasonable time to respond and prevent the damage to the infrastructure, or at least reduce the overall amount of damage done. For instance, an accident may be avoided by reducing the pressure in a gas pipeline that is about to experience third party damage. In another embodiment of the invention, the operational logic of the security monitoring system 10 synergistically combines the use of the multiple types of sensors 32, 34, 36 and 38 and the multiple types of hybrid fusion models 52, 54, 56 and 58 to collate the sensor data and effectively construct a complete picture of imminent danger. Combined, these multiple types of sensors 32, 34, 36 and 38 and the multiple types of hybrid fusion models 52, 54, 56 and 58 may produce a high-accuracy, low false-positive identification of potential threats. That in turn allows the protected zones identified to be effectively monitored using that method.
In one embodiment of the invention, the threat behavior data relating to a typical threat causing agency 62 may include a threat behavior before the threat causing agency 62 enters a protected zone 14 or 16 or 18 or 22. In another embodiment of the invention, the threat behavior data may include threat behavior while the threat causing agency 62 is inside a protected zone 14 or 16 or 18 or 22. In yet another embodiment of the invention, the threat behavior data may include data related to location and action of the threat causing agency with respect to spatial boundaries and proximity to the infrastructure when the threat causing agency 62 is inside the protected zone 14 or 16 or 18 or 22.
A typical potential threat level as interpreted by the multiple types of hybrid fusion models 52, 54, 56 and 58 may be based on a real-time snapshot of the activities in and around a protected zone 14 or 16 or 18 or 22. In one embodiment of the invention, data from the multiple types of hybrid fusion models 52, 54, 56 and 58 at the in-field supervisory center or at the remote monitoring center may indicate whether a threat level is below a determined threshold for providing an alert. In another embodiment of the invention, the multiple types of hybrid fusion models 52, 54, 56 and 58 at the in-field supervisory center or at the remote monitoring center 42 may determine whether the threat level is above a determined threshold for providing an alert.
In one embodiment of the invention, one or more of the exemplary multiple types of hybrid fusion models 52, 54, 56 and 58 may be Markov model(s). A Markov model is a collection of finite set of states, each of which is associated with a probability distribution. The probability distributions may typically be multidimensional and transitions among the states are governed by a set of probabilities called transition probabilities. Markov models typically serve to detect signals from the multiple types of sensors 32, 34, 36 and 38 before any threat causing agency even enters the protected zone. In one embodiment of the invention, one or more of the multiple types of sensors 32, 34, 36 and 38, such as accelerometers and the microphones if used, may have a range larger than its corresponding protected zone 14, 16, 18 or 22 and the Markov models tend to be very useful in such applications.
In another embodiment of the invention, one or more of the exemplary multiple types of hybrid fusion models 52, 54, 56 and 58 may use Bayesian Belief Networks. As is well understood in the art, Bayesian Belief Networks are used to typically define various events, the dependencies between them, and the conditional probabilities involved in those dependencies. Applying the technique in one embodiment of this invention, an identification process of an object moving in and around a protected zone and its physical dimensions may be determined. For instance, using a Bayesian Belief Network a probability of likelihood that a moving object is of a predetermined particular type and/or its physical dimensions are that of a predetermined particular object may be determined with certain degree of confidence. In operation, once the object has reached the protected zone, all of the sensors within the protected zone come into play. They all transmit their signals to the Bayesian Belief Network model. These models then fuse the inputs and deduce, with a high degree of certainty, what the threat causing agency may be and what may be the level of threat associated.
In yet another embodiment of the invention, one or more of the exemplary multiple types of hybrid fusion models 52, 54, 56 and 58 may be spatial models. In operation, spatial models typically receive signals once a threat causing agency is within a protected zone. Spatial models process the signals coming from various sensors 32, 34, 36 and 38 and help interpret various movements of the threat causing agency. In one instance the spatial models may determine whether the threat causing agency is near an infrastructure that is to be protected. In another instance, the spatial models may determine whether the threat causing agency is moving quickly or stopping near the asset to be protected. An exemplary situation of appropriate threat level detection may be when a threat causing agency, such as a backhoe is sensed to move towards a specific pipeline. In one such situation, a non-threatening behavior of the backhoe may be one when the backhoe moves at a constant speed through the protected zone. On the other hand, detecting that the backhoe is stopping near the pipeline may indicate it is preparing to dig and is thus a threat. The role and the applications of the spatial models in this particular situation are of special significance. Both Markov models and Bayesian Belief Network models in one such situation may tend to deduce that the threat associated with the movement of the backhoe is high. The spatial models however contribute to the critical decision that the backhoe is moving fast enough to pass the pipeline by safely and so the threat level associated is low and thus there is no need to alert a pipeline operator.
In one embodiment of the invention, one or more of the Markov models typically starts the deduction process whenever there is a threat causing agency in the vicinity of a protected zone. As a threat causing agency moves about and it reaches the protected zone, the Bayesian Belief Network and the spatial models then begin processing. Outputs of all three of these fusion models are then fused to reach a final decision. Moreover, the use of multiple types of sensors and multiple fusion models tends to provide a low occurrence of false positive alerts. Alternatively, one single hybrid fusion model may be used to fuse the sensor outputs depending on the specific application at hand. In another embodiment of the invention, the multiple types of hybrid fusion models may be installed in one or more protected zones. Whatever be the deployment mode, the multiple types of hybrid fusion models 52, 54, 56 and 58 may be adapted to make decisions in coordination with the multiple types of sensors 32, 34, 36 and 38.
In operation, the security monitoring system 10 synergistically combines two different aspects of infrastructure damage prevention. First, a ‘multiple types of sensor’ approach to detect potential threats to an infrastructure and second, associating a hybrid fusion modeling system to fuse the sensor inputs and determine the threat level with low numbers of false positives. The multiple types of sensors 32, 34, 36 and 38 may be selected based on the typical threat behaviors experienced in and around a protected zone. For example, for a typical pipeline industry, a major source of damage may be accidents caused by backhoes hitting pipes that carry liquid or gas. A range of possible behaviors of the backhoe such as backing the backhoe off of a trailer, moving it towards the pipeline, slowing near the pipeline, lowering the support feet, lowering the bucket to dig and the like that eventually may lead up to the backhoe hitting the pipe may be distinct from one another. There may be sensors that may work together to discern and detect these behaviors and warn to the advantage of a well-coordinated maintenance of the security monitoring system 10. The use of multiple types of sensors allows various industrial zones to be protected while preventing unnecessary false positive alarms.
In operation, each of the multiple types of hybrid fusion models 52, 54, 56 and 58 may respond to the actions of a threat causing agency 62 in a different way, and all of them may be designed such that their collective response encodes an assessment of the level of threat being posed to the infrastructure. The sensor signals are transmitted to an in-field supervisory control center, and possibly from the in-field center to a remote monitoring center. Appropriate action may be taken at either or both of the in-field supervisory control center or the remote monitoring center.
The centralized control method adopted in the security monitoring system 20 of
The decentralized control method adopted in the security monitoring system 30 of
In the first form, when remote decisions are not required, the in-field supervisory control center analyzes the data as in functional block 112 assessing potential threat levels as in functional block 114 for determining a threat level around the infrastructure. As noted above, the detection of potential threats to the infrastructure may include, for example, determining whether the threat level is below a threshold level for alerting or above the threshold level for alerting. Logic for such analysis may be provided in the individual sensors, or may be performed by particular, multiple types of hybrid fusion models associated with the multiple types of sensors, or by processors either in the field or at the supervisor control centers on site or at a remote location. In case the analysis shows that the threat level is above the threshold level for alerting, communicating potential threat level as in functional block 116 an alert is relayed to a central unit or other desired oversight location, as described herein above with reference to
In the second form, when remote decisions are required, the sensor data from the multiple types of sensors 32, 34, 36, 38 as received by the in-field supervisory control are sent to a remote monitoring center as in step 122. At the remote monitoring center, the data is further processed using hybrid fusion models as in functional block 112 assessing potential threat levels as in functional block 114 for determining a threat level around the infrastructure. At that point, if further remote decisions are required, the analysis results are resent to the remote monitoring center for further processing and a second decision look as described as above. At the end of the analysis, finally an alarm-state or no-alarm-state decision is reached. If an alarm-state decision is reached, an alert is relayed to a central unit or other desired oversight location communicating potential threat level as in functional block 116, as described herein above with reference to
Aspects of the present invention as described herein thus yield accurate sensing and reliable alerting for providing proactive reliability and proactively monitoring for any infrastructure. The coordination of the multiple sensors and multiple sensor types with the multiple types of hybrid fusion models tends to reduce false positives. The technique advantageously provides early detection of any threat activity before damage to the infrastructure occurs, and provides time for suitable preventive actions and response. Aspects of the present invention also provide a unique system for monitoring damage and providing real-time alerts using sensing and processing units and a remote alerting system. It would be well appreciated by those skilled in the art that though the description above relates to protection of a pipeline as an exemplary infrastructure, aspects of the present invention are equally applicable to other infrastructures, such as power stations, railways, airports and other infrastructures, which are generally widespread and difficult to physically monitor and secure.
While only certain features of the invention have been illustrated and described herein, many modifications and changes will occur to those skilled in the art. It is, therefore, to be understood that the appended claims are intended to cover all such modifications and changes that fall within the true spirit of the invention.