IJTEEE
International Journal of Technology Enhancements and Emerging Engineering Research (ISSN 2347-4289)
PREVIOUS PUBLICATIONS



IJTEEE >> Volume 2 - Issue 2, February 2014 Edition



International Journal of Technology Enhancements and Emerging Engineering Research  
International Journal of Technology Enhancements and Emerging Engineering Research

Website: http://www.ijteee.org

ISSN 2347-4289



A Fault Tolerant Design For Critical Infrastructure Protection In Nigeria: A Case Of Oil Pipelines In The Niger Delta Region.

[Full Text]

 

AUTHOR(S)

Ofoegbu Osita Edward

 

KEYWORDS

Keywords: CIP, Fault tolerance, Pipelines, SCADA.

 

ABSTRACT

ABSTRACT: Since Oil was discovered at oloibiri in 1956, Nigeria as a nation has experienced significant growth in the oil and gas sector as it now accounts for more than 85% of the country’s GDP. The growth of this sector with its commercial gains and importance has culminated in the rise of illegal activities by people who attempt to sabotage operations as in the care of militants, terrorists or bunkerers who intercept pipelines transporting the oil with the aim of siphoning for personal gain. This growing malaise has resulted in enormous financial losses to the government and environment concerns resulting from the attendant oil spillage. Effort made by the government has not yielded much success in curbing this ever-expanding malaise. This paper attempts to proffer a solution framework using emerging technological solutions by adopting a fault tolerant approach to remote monitoring of the pipeline network .A wired/wireless sensor network approach in proposed with suitable restructuring of the pipeline topology to support its implementation. The fault tolerant approach would also encompass human effort to ensure optimal delivering of service so as to aid security agents/monitoring groups to track, trace, apprehend and prosecute the culprits who perpetuate these acts.

 

REFERENCES

[1]. Wikipedia, What is a Critical Infrastructure Retrieved on August 29, 2013 at http: //en.wikipedia.org/wiki/critical infrastructure.

[2]. C.O.Iwendi and A.R Allen, Wireless Sensor Network Nodes: Security and Deployment in Niger-Delta Oil and Gas Sector, International Journal of Network Security and Its Applications (IJNSA),2011, Vol.3, No.1, pp.68.

[3]. T.Fasasi, D. Maynard and H.Nasr, Sensors remotely monitor wells in Nigeria swamps, Oil and Gas Journal, 2005, pp.2.

[4]. I.F.Akyildiz, W.Su, Y.Sankarasubramaniam and E.Cayirci, A Survey on Wireless Networks, IEEE Communications Magazine, 2002, pp.102-114

[5]. ] S. Petersen, P.Doyle, S.Vatland, C.S.Aasland, T.C.Andersen and D.Sjong, Requirements, Drivers and Analysis of Wireless Sensor Network Solutions for Oil and Gas Industry, IEEE Communications Magazine, 2007, pp.219.

[6]. [17] G.Sharma, S.Bala, A.K.Verma and T.Singh, Security in Wireless Sensor Networks using Frequency Hopping, International Journal of Computer Applications (0975-8887), 2012, pp.1.

[7]. R. J. Patton, “Fault-tolerant control: The 1997 situation,” in IFAC Fault Detection, Supervision and Safety for Technical Processes, KingstonUpon Hull, U.K., 1997, pp. 1029–1051.

[8]. Adita et al., (2001). ‘Remote Data Acquisition Using Wireless-SCADA’. International Journal of Engineering, 3(1), 224-231.

[9]. Flanker, k (2004) Using Industrial Ethernet in the Oil and Gas Industry, Retrieved on august 21, 2013 at http://www.moxa.com

[10]. I.F.Akyildiz, W.Su, Y.Sankarasubramaniam and E.Cayirci, A Survey on Wireless Networks,IEEE Communications Magazine, 2002, pp.102-114.

[11]. N. Bessani, P. Sousa, M. Correia, N. F. Neves, and P. Verissimo. The CRUTIAL way of critical infrastructure protection. IEEE Security & Privacy, pages 44–51, Nov./Dec. 2008