Protecting critical infrastructure with IP surveillance

Access & Identity Management Handbook 2014 Access Control & Identity Management

There is currently high investment in the energy sector and as it continues to grow, it looks to IP surveillance to protect its installations. There are however key issues to be taken into consideration when choosing the most appropriate technology. The protection of critical infrastructure is a challenging task. Each part of an installation has its own specific challenges. What they all have in common though is the need to be protected from theft, break down and hostile activity.

Network video offers excellent possibilities for the operator of a plant to integrate security, safety and production control in one system. A system that permits supervision of all processes, video surveillance, intrusion protection and access control from remote sites, several locations and if needed into one centrally located control room.

So, regardless of what other technologies are being used, the network camera should always be the starting point when planning and designing for the surveillance and protection of critical infrastructure.

Protecting long perimeters, monitoring entrances and exits and safeguarding potentially hazardous areas are the main concerns of the security manager. Often they are also intimately involved in guaranteeing uninterrupted production.

Breaking it down

Let’s take this from a macro to micro (or from outside to inside) point of view of a facility and break it down, starting with its perimeter, buildings and process parts.

For perimeter protection, there are many different technologies available to detect an intruder: microwave, fibre-fence sensors, seismic sensors and radar alerts are a few. In especially sensitive situations, when protecting high-risk infrastructure, network cameras can be combined with these other technologies. The additional benefit that the network camera brings to the situation is information about who or what is trespassing but also about what kind of activity that is going on.

Detection is provided by network thermal cameras equipped with intelligent video analytics, these alarms set off a PTZ dome camera that, thanks to HDTV image quality permits us to get details of the intruder thus enabling identification. To ensure recording and as much functionality as possible, each camera is independent and is able to provide information as long as it is connected to the IP-structure. It is wise to analyse the situation at the edge, and in case of communication failure, the camera can record on an embedded SD-card for future analysis.

More precisely, on-board image processing enables thermal cameras to detect the presence of unauthorised persons anywhere across the entire visible area. This is why we talk not only about perimeter protection but also of area protection, within the entire field of view of the camera. A thermal camera works just as well in complete darkness as in daylight, and environmental disturbances, like rain, fog, sun, foliage or small animals, are kept to a minimum thus influencing the intelligent algorithm as little as possible. When using a network thermal camera to verify the alerts from the alarm system you get the information needed to respond with the right resources. Was it an animal, leaves blowing or was there actually a human being trying to sabotage the system? This information is crucial when deciding what action to take and who to send out.

At the centre of the protection of critical infrastructure sites is the alarm system. The alarms coming from various locations within the supply chain are handled at an alarm-monitoring centre. In the centre, the operators handle the alarms according to their instructions. They verify the alarm and then forward the information available to what they judge to be the appropriate response team, which could be a patrolling guard, the police or at times the fire brigade. However, no system is perfect and an anti-intrusion system can under certain conditions give many false alerts.

The protection of energy supplies and key utilities is a difficult task where the distribution system is the most vulnerable part of the supply chain and the costliest to protect. An example, pipelines transporting gas from remotely located exploration sites, over vast unpopulated areas are very difficult to protect. Remote supervision is a must.

The solution lies in combining the human response teams with high technology.

Information from the thermal camera can be enhanced by the interactive support of a PTZ dome camera. These products together give enough information for the operator to make the appropriate decisions. The operators are now able to send out the correct response team, both in numbers and quality. This is what makes the combination of thermal network cameras and PTZ dome network cameras such a versatile combination.

Additionally, the benefit provided by not having to respond to false alarms has proven to be a cost saver.

Critical areas

Along with perimeter access, it is also important to control access and flow within critical areas. Specifically, being able to monitor exits during evacuation to be sure nobody is left inside and potentially in danger. Network video linked to access control systems offers faster and more accurate access management facilitated by instant access to live or recorded video, vocal and data. Image quality permits us to see in lowlight, for example, emergency exit lights are sufficient to provide scene details. Advanced capabilities allow video and audio information connected to an access control system for an intercom, virtual gates, virtual fences, audio detection and people counting in and out of the facility. In cases of obstruction by environmental factors like fog, smoke etc., thermal cameras can be used as well as image enhancing technology on video cameras.

Security is important and so is production continuity

Then, moving down into processes and the monitoring of specific sensitive areas, the protection of those areas, process monitoring and ensuring safety rules are being respected, are all equally important in making the right decision quickly. The most important thing is to be able to know what is going on in all sensitive areas, and at the same time keep efficiency in the production at a high level. In many cases you have to do this for multiple locations simultaneously.

Roy Alves, business development manager MEA, Axis Communications.
Roy Alves, business development manager MEA, Axis Communications.

Handling safety, security and productivity in one integrated system

In addition to the safety and security, from the camera system we can get the benefit of integrating it into your production system, hereby monitoring also production efficiency, network video for visual inspections and remote assistance with planned maintenance. Be sure safety rules are being followed, tools and equipment are being managed properly and processes are followed.

It is important to work with open protocol in order to facilitate the integration of systems, enabling the manufacturer of different devices and software to integrate the various production components in one management system. For example, SCADA systems can integrate network video to provide information on temperature, pressure and speed meters. For example, if you have a control room in a facility where you control the pumping station, live images of sensors can provide visual confirmation not just data.

Solution

The IP infrastructure makes any installation scalable, reliable and future proof. The network video system allows the most advanced solution for both security and productivity, enabling the entire management of a security system from multiple remote sites, company headquarters, private police offices, security manager’s smartphone etc. Networked systems of this kind are especially useful to critical infrastructure operators since it allows them to be present virtually anywhere.

The system works on intelligent video analysis, advanced motion algorithms, virtual gates and virtual fences, and human vs. animal differentiation. It also allows live remote control of people accessing the plant from the perimeter throughout the entire width of the area and crucially, evaluation of potential incidents.

For infrastructure security, it is all a matter of network. Whenever you have an issue in a facility and you need to involve different parties such as the police, fire services or government bodies, the network video system allows two-way communication for security managers, encouraging cooperation among different entities and agencies. With this solution, people can work in parallel with technology for the best possible protection of a facility.

For more information contact Axis Communications, +27 (0)11 548 6780, [email protected], www.axis.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Fighting fire with cameras
Axis Communications SA Fire & Safety
Thousands of fires are recorded by fire and rescue services every year. These can have wide ranging causes, but the effect is always devastating if not immediately halted.

Read more...
Safeguarding farmland with digital solutions
Axis Communications SA Surveillance
Marlenique Estate, located in the Western Cape, opted for an Axis end-to-end solution to protect its premises with access management, remote monitoring, and property and asset protection.

Read more...
Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Cameras have long been a feature in perimeter security, with varying reports of success and failure, often dependent on the cameras’ planning, installation and configuration, as well as their integration with other perimeter solutions and centralised management platforms.

Read more...
New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Explosion-protected network horn speaker
Axis Communications SA Products & Solutions
Axis launched the world’s first explosion-protected thermometric camera specifically designed for Zone/Division 2, and its first Zone/Division 1 explosion-protected network horn speaker.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
The future of workplace access
HID Global Access Control & Identity Management
Mobile credentials are considerably more secure than physical access control, because they eliminate the need for physical cards or badges, support multiple security protocols, and add layers of protection on top of basic card encryption.

Read more...