Oil and Gas monitoring using Wireless Sensor Networks: Requirements, issues and challenges

Wireless Sensor Networks (WSNs) involve top potential technologies that will dramatically change the way of human living and working. Many scientific, industrial and environmental applications require real time information related to physical events like pressure, temperature or humidity. In the past the only way to transfer the sensed data to control center was through cumbersome, costly wires. But recent advancement in wireless networking enables WSNs to communicate the sensed real time event data wirelessly. WSNs have capabilities of sensing, processing and communicating which make them most suitable for monitoring different oil and gas industries upstream, midstream and downstream operations which help to increase production, decrease the accidents, maintenance cost and malfunctioning. The contributions of this paper are threefold. First, we highlight various characteristics of both WSNs and Oil and Gas Industrial environment. Second, we present major requirements of Oil and Gas industrial operations in the three sectors upstream, midstream and downstream. Third, we present the important issues and challenges specific to Oil and Gas industrial environment which affects the working and efficacy of WSNs. These issues and challenges should be considered by the researchers and developers who are planning to design a WSNs based solution for Oil and Gas monitoring.

[1]  Yang Xiao,et al.  Secure data aggregation without persistent cryptographic operations in wireless sensor networks , 2007, Ad Hoc Networks.

[2]  Azzedine Boukerche,et al.  A new energy efficient and fault-tolerant protocol for data propagation in Smart Dust networks using varying transmission range , 2004, 37th Annual Simulation Symposium, 2004. Proceedings..

[3]  Tetsu Iwata,et al.  Side Channel Attacks on Message Authentication Codes , 2005, ESAS.

[4]  Alex Mason,et al.  Novel method for vegetable oil type verification based on real-time microwave sensing , 2013 .

[5]  Lingxuan Hu,et al.  Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[6]  N. M. Saad,et al.  An overview of evaluation metrics for routing protocols in wireless sensor networks , 2012, 2012 4th International Conference on Intelligent and Advanced Systems (ICIAS2012).

[7]  Jie Wu,et al.  On constructing k-connected k-dominating set in wireless ad hoc and sensor networks , 2006, J. Parallel Distributed Comput..

[8]  Mikel Larrea,et al.  Coordinated data aggregation in wireless sensor networks using the Omega failure detector , 2006, PE-WASUN '06.

[9]  Robert H. Deng,et al.  Detecting node replication attacks in wireless sensor networks: A survey , 2012, J. Netw. Comput. Appl..

[10]  Doug Fisher,et al.  SCADA: Supervisory Control and Data Acquisition , 2015 .

[11]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..

[12]  Yacine Challal,et al.  HERO: Hierarchical kEy management pRotocol for heterOgeneous wireless sensor networks , 2008, WSAN.

[13]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .

[14]  Alex Talevski,et al.  Research challenges in applying intelligent wireless sensors in the oil, gas and resources industries , 2009, 2009 7th IEEE International Conference on Industrial Informatics.

[15]  Yacine Challal,et al.  Node capture attack impact on key management schemes for heterogeneous wireless sensor networks , 2009, 2009 Global Information Infrastructure Symposium.

[16]  Mohamad Naufal bin Mohamad Saad,et al.  Detecting replicated nodes in Wireless Sensor Networks using random walks and network division , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).

[17]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[18]  Umberto Spagnolini,et al.  Wireless Sensor Network Modeling and Deployment Challenges in Oil and Gas Refinery Plants , 2013, Int. J. Distributed Sens. Networks.

[19]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[20]  Cem Ersoy,et al.  Wireless sensor networks for healthcare: A survey , 2010, Comput. Networks.

[21]  J. Heidemann,et al.  Enabling Interoperability and Extensibility of Future SCADA Systems ∗ , 2006 .

[22]  Yacine Challal,et al.  Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks , 2011, J. Netw. Comput. Appl..

[23]  Vikram Srinivasan,et al.  Information Coverage and Network Lifetime in Energy Constrained Wireless Sensor Networks , 2007 .

[24]  Yang Xiang,et al.  Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey , 2013, Int. J. Distributed Sens. Networks.

[25]  Shivakant Mishra,et al.  Defending against path-based DoS attacks in wireless sensor networks , 2005, SASN '05.

[26]  Alagan Anpalagan,et al.  Network Challenges for Cyber Physical Systems with Tiny Wireless Devices: A Case Study on Reliable Pipeline Condition Monitoring , 2015, Sensors.

[27]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[28]  Azzedine Boukerche,et al.  Fault-tolerant wireless sensor network routing protocols for the supervision of context-aware physical environments , 2006, J. Parallel Distributed Comput..

[29]  Joel J. P. C. Rodrigues,et al.  Wireless Sensor Networks: a Survey on Environmental Monitoring , 2011, J. Commun..

[30]  Alex Talevski,et al.  The role of wireless sensor networks (WSNs) in industrial oil and gas condition monitoring , 2010, 4th IEEE International Conference on Digital Ecosystems and Technologies.

[31]  Jiannong Cao,et al.  Random-walk based approach to detect clone attacks in wireless sensor networks , 2010, IEEE Journal on Selected Areas in Communications.

[32]  Sanjay Kumar Madria,et al.  SecRout: a secure routing protocol for sensor networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).

[33]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[34]  Yoon-Hwa Choi,et al.  A secure alternate path routing in sensor networks , 2006, Comput. Commun..

[35]  Sushil Jajodia,et al.  Interleaved hop-by-hop authentication against false data injection attacks in sensor networks , 2007, TOSN.

[36]  Yacine Challal,et al.  HERO: Hierarchcal key management protocol for heterogeneous wireless sensor networks , 2008 .

[37]  Wazir Zada Khan,et al.  Distributed Clone Detection in Static Wireless Sensor Networks: Random Walk with Network Division , 2015, PloS one.

[38]  Yan-Xiao Li,et al.  Research on the Wireless Sensor Networks Applied in the Battlefield Situation Awareness System , 2011, ICEC 2011.

[39]  Wazir Zada Khan,et al.  Mobile Phone Sensing Systems: A Survey , 2013, IEEE Communications Surveys & Tutorials.