Perimeter security design

Issue 6 2020 Mining (Industry)

When one starts to design a perimeter protection system you need to consider and evaluate the site, taking cognisance of international best practices, such as the four Ds for perimeter protection systems: Deter, Detect, Delay and Defeat.

Deter: This prevents crime by convincing the criminal that the target is too tough. Signs which notify passers-by of security measures are a deterrence. So are chain-link fences topped with razor wire, or patrols cars and armed guards.

Detect: If deterrence does not work, a criminal may attack the target and the detection layer notifies someone that an attack is occurring. For instance, a window contact alarm notifies the alarm company if the window is raised. Without a detect layer, the crime can take place and no-one is the wiser.

Delay: This is hardening the target with tougher materials such as property cages, security boxes, etc. A solid-core metal door and longer screws which connect the door frame to the walls is an example of delay because it will take longer to pry open than a normal door. Adding a padlock to the inside of a gate will add a delay layer. Delay does not mean “make impossibly strong”. All barriers can eventually be penetrated.

Defeat: Sometimes referred to as the response layer, this is what the police or security forces do – they catch the bad guys (or more often, run them off).

Before starting, the designers and installers will need to ensure that their plans are compliant with all local regulations as well as any site-specific regulations and processes. To establish this, one will need to conduct a detailed on-site survey of all existing perimeter security mechanisms and protocols to gather the information required. Thereafter one can start to design a solution based on the following considerations:

• Client concerns and issues related to the current system.

• Status of and age of the current system.

• Consideration of detailed site condition evaluation.

• Types of technology available.

• Technology performance and limitations.

• Site influences on-site which may influence technology choice.

• Integration of technology into existing system.

Types of perimeter security technologies

Video intrusion detection: Video is used and analysed through a digital signal processor to determine pixel change and apply a written algorithm to determine a potential threat or targets within the field of view. These systems normally consist of a number of cameras back-to-back with an overlap to cover dead lengths below the camera. Thermal and/or CCD cameras with an illumination source are normally used in this application along with software management systems that will alert the operator when a human target has been detected.

This system allows the operator to visually verify the cause of the alarm as well as providing additional situational awareness to make informed decisions when dispatching response teams.

Microphonic cable detection: The digital microphonic cable fence disturbance sensor will function as an electronic perimeter intrusion detector. This system is deployed on boundary fences or physical barriers to protect the perimeter of a site. This technology detects alarms caused by attempted cutting, climbing, or lifting of the fence structure.

Seismic perimeter detection: The seismic sensor is a covert intrusion detection system designed to generate an alarm when an alarm is triggered by digging, walking or running in the vicinity of the perimeter fence. Seismic sensors are normally buried and as a result are not easily located and avoided or tampered with.

Microwave detection: Microwave sensors generate an electromagnetic (RF) field between transmitter and receiver, creating an invisible volumetric detection zone. When an intruder enters the detection zone, the changes to the field are registered and an alarm is raised.

Non-lethal electric fence: Electric fences carry an 8 Joule pulsing electrical circuit and when touched by a person or animal, will deliver a shock. Should a person or animal cut, break or short the live and earth wires, an alarm will be created at the local energiser.

Human radar detection: Radar offers unique advantages over other sensors for the detection of humans, such as remote operation during virtually all weather and lighting conditions. However, humans are difficult targets to detect because they have a small radar cross section and move with a low velocity. Most current radar-based human detection systems employ some type of linear-phase matched filtering as part of the detector to improve accuracy and filter environmental influences.

Video management system: Whether new or existing, this is the heart of the system and to a large extent determines many aspects related to system design, including:

• Type of technology which can be integrated.

• Operator interface and usage.

• Remote access.

• Failover and redundancy capabilities.

• Anticipated life span of the system.

• Third-party system integrations.

Finally, the site will also need to consider the operators it will be employing in the control room to monitor and manage the installation. Do the operators have a good level of expertise related to the video management system and technology currently installed? Are the operators technology-savvy and do they have a good understanding of computers? Are the operators familiar with protocols and standard operating procedures on site? Is the present staff complement on site adequate for both day and night shifts?

XtraVision is an authorised importer and distributor of a complete range of fire and security technologies.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Watermist suppression in mining
FS Systems Fire & Safety Mining (Industry) Products & Solutions
Watermist suppression systems are highly effective in suppressing flames and controlling heat spread, especially in confined spaces commonly found in mining environments, by generating fine droplets with an increased surface area, enabling rapid heat absorption and cooling during fire incidents.

Read more...
Gas detection for mining
FS Systems Products & Solutions Fire & Safety Mining (Industry)
Flammable gas detection is critical in safeguarding mining operations, where combustible gases pose significant risks. Early detection of these gases helps prevent fires and explosions, which can lead to devastating consequences.

Read more...
Fire protection for a solvent extraction plant in Africa
FS Systems Fire & Safety Security Services & Risk Management Mining (Industry)
A prominent mining site operates a state-of-the-art solvent extraction (SX) plant, integral to separating and purifying metals from ores, which pose significant fire risks, as SX processes involve highly flammable organic solvents and elevated operating temperatures.

Read more...
Effective fire and smoke detection using cameras
Hikvision South Africa XtraVision SMART Security Solutions Technews Publishing Dahua Technology South Africa Fire & Safety
Video analytics, spurred on by advances in image processing, enhanced fire and smoke detection capabilities while significantly reducing false alarms in surveillance cameras. Today, AI has further improved accuracy and minimised false alarms.

Read more...
Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
Digital transformation in mines
NEC XON Technews Publishing Mining (Industry)
Digital transformation has been hyped to death, but is a reality all companies in all industries need to address, including the mining sector. BCX and NEC XON weigh in on the challenges mines face.

Read more...
Fire safety in mining
Technews Publishing Mining (Industry)
Clinton Hodgson, Head of the Industrial Fire & Life Safety Division at FS Systems International, provides SMART Security Solutions with his insights into fire safety risks and solutions as they pertain to the mining industry.

Read more...
Leading products, trustworthy service
Mining (Industry)
First Distribution Digital Security & IoT aims to be the leading value-added distributor of IP video, advanced video analytics, high-density storage solutions, access control, fire detection, public address, IoT, and networking products in Africa.

Read more...
Key and asset management for mining
Traka Africa Mining (Industry)
Traka specialises in intelligent management solutions for keys and equipment, helping organisations control their important assets, improving productivity and accountability, and reducing risk in critical processes.

Read more...