Intrusion Detection
20220242465 · 2022-08-04
Inventors
- Bruce McKenney (Selkirk, NY, US)
- Marc R. Pearlman (Clifton Park, NY, US)
- Joshua Johnson (Troy, NY, US)
- Anuj R. Nadig (Falmouth, MA, US)
- Zahid F. Mian (Loudonville, NY, US)
Cpc classification
B61L27/30
PERFORMING OPERATIONS; TRANSPORTING
B61L27/53
PERFORMING OPERATIONS; TRANSPORTING
B61L27/70
PERFORMING OPERATIONS; TRANSPORTING
B61L27/33
PERFORMING OPERATIONS; TRANSPORTING
B61L15/0027
PERFORMING OPERATIONS; TRANSPORTING
B61L27/20
PERFORMING OPERATIONS; TRANSPORTING
International classification
B61L23/04
PERFORMING OPERATIONS; TRANSPORTING
B61L15/00
PERFORMING OPERATIONS; TRANSPORTING
B61L27/20
PERFORMING OPERATIONS; TRANSPORTING
B61L27/70
PERFORMING OPERATIONS; TRANSPORTING
Abstract
A solution for detecting and alerting to intrusions or obstacles in an area. One or more sensing devices can be used in combination with computer processing capabilities to monitor an area for intrusions or obstacles. An illustrative area is part of a railyard or railroad track, which can be monitored for intrusions by foot, vehicle, or even by inanimate objects such as falling rocks from a track cut. The sensing, computing, and/or alerting systems can be redundant to ensure operation at all times.
Claims
1. A system for detecting intruding objects in a monitored area, the system comprising: at least one intrusion detection sensing node including: at least one sensor for acquiring sensor data for a monitored area; and a computing device configured to process the sensor data and generate intrusion detection data, wherein the at least one sensor provides the sensor data for processing by the computing device using at least two redundant sensor communications links; and a base station configured to receive intrusion detection data from the at least one intrusion detection sensing node via one of a plurality of node communications links, wherein the plurality of node communications links include a primary node communications link by which communications are first attempted and at least one backup node communications link for enabling communications when the primary communications link fails.
2. The system of claim 1, wherein the computing device includes at least two redundant controllers, wherein each redundant controller independently processes the sensor data received from a unique one of the at least two redundant sensor communications links to generate intermediate intrusion detection data.
3. The system of claim 2, wherein the computing device further includes a voting module, wherein the voting module evaluates the intermediate intrusion detection data generated by each of the at least two redundant controllers and outputs one of: intrusion detection data or a failure, based on the evaluation.
4. The system of claim 2, wherein the computing device further includes: at least one interface diagnostic module for monitoring each interface for the at least two redundant sensor communications links, and at least one watchdog module for monitoring each of the at least two redundant controllers.
5. The system of claim 1, wherein the at least one sensor includes at least one of: a vibration sensor, a visible and/or long wave infrared camera, a near infrared camera, an infrared camera, a short wave infrared light detection and ranging system, or a microwave radio detection and ranging sensor.
6. The system of claim 1, wherein the at least one sensor includes a first sensor for acquiring sensor data corresponding to a first sensing modality and a second sensor for acquiring sensor data corresponding to a second sensing modality distinct from the first sensing modality, and wherein the computing device fuses the sensor data acquired by the first sensor and the second sensor.
7. The system of claim 1, wherein the at least one intrusion detection sensing node is mounted on a rail vehicle.
8. The system of claim 1, wherein the monitored area is an area including a railroad.
9. The system of claim 1, wherein the base station is further configured to process the intrusion detection data received from the at least one intrusion detection sensing node to generate analysis results relating to an intrusion.
10. The system of claim 9, wherein the base station provides at least one of: the analysis results or instructions based on the analysis results, for use by a remote user and/or for processing by a remote computing device.
11. A system for detecting intruding objects in an area including a railroad, the system comprising: a plurality of intrusion detection sensing nodes, each intrusion detection sensing node including: at least one sensor for acquiring sensor data for a monitored area; and a computing device configured to process the sensor data and generate intrusion detection data, wherein the at least one sensor provides the sensor data for processing by the computing device using at least two redundant sensor communications links; and a base station configured to receive intrusion detection data from each of the plurality of intrusion detection sensing nodes via one of a plurality of node communications links and process the intrusion detection data to generate analysis results relating to an intrusion of the area, wherein the plurality of node communications links include a primary node communications link by which communications are first attempted and at least one backup node communications link for enabling communications when the primary communications link fails.
12. The system of claim 11, wherein the computing device for each intrusion detection sensing node includes at least two redundant controllers, wherein each redundant controller independently processes the sensor data received from a unique one of the at least two redundant sensor communications links to generate intermediate intrusion detection data.
13. The system of claim 12, wherein the computing device for each intrusion detection sensing node further includes a voting module, wherein the voting module evaluates the intermediate intrusion detection data generated by each of the at least two redundant controllers and outputs one of: intrusion detection data or a failure, based on the evaluation.
14. The system of claim 11, wherein the intrusion detection data received by the base station is based on sensor data acquired using a plurality of different sensing modalities.
15. The system of claim 14, wherein the plurality of different sensing modalities includes at least two of: vibration sensing, imaging, and range detecting.
16. The system of claim 11, wherein the area includes at least one of: an overpass, an underpass, a trench, or a tunnel, for the railroad.
17. A method of detecting intruding objects in a monitored area, the method comprising: acquiring, on a computing device for an intrusion detection sensing node, sensor data for the monitored area from at least one sensor, wherein the at least one sensor provides the sensor data for processing by the computing device using at least two redundant sensor communications links; processing, with the computing device for the intrusion detection sensing node, the sensor data to generate intrusion detection data; providing, for processing on a base station, the intrusion detection data via one of a plurality of node communications links, wherein the plurality of node communications links include a primary node communications link by which communications are first attempted and at least one backup node communications link for enabling communications when the primary communications link fails.
18. The method of claim 17, further comprising processing, by the base station, the intrusion detection data to generate analysis results relating to an intrusion of the monitored area.
19. The method of claim 18, further comprising the base station providing at least one of: the analysis results or instructions based on the analysis results, for use by a remote user and/or for processing by a remote computing device.
20. The method of claim 17, wherein the processing includes: each of a plurality of redundant controllers independently processing the sensor data received from a unique one of the at least two redundant sensor communications links to generate intermediate intrusion detection data; and a voting module evaluating the intermediate intrusion detection data generated by each of the plurality of redundant controllers, wherein the computing device outputs one of: intrusion detection data or a failure, based on the evaluation.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0026] These and other features of the disclosure will be more readily understood from the following detailed description of the various aspects of the invention taken in conjunction with the accompanying drawings that depict various aspects of the invention.
[0027]
[0028]
[0029]
[0030]
[0031]
[0032]
[0033]
[0034]
[0035]
[0036]
[0037]
[0038]
[0039]
[0040]
[0041]
[0042]
[0043]
[0044]
[0045]
[0046]
[0047] It is noted that the drawings may not be to scale. The drawings are intended to depict only typical aspects of the invention, and therefore should not be considered as limiting the scope of the invention. In the drawings, like numbering represents like elements between the drawings.
DETAILED DESCRIPTION
[0048]
[0049] The base station 115 can comprise a centralized location for multiple intrusion detection sensor nodes 105. The base station 115 can have both the visibility and computing power to combine and correlate measurements across a geographically dispersed sensor set. In an embodiment, the central base station 115 can include redundant servers. However, it is understood that this is only illustrative. For example, in other embodiments the base station 115 can comprise a portable computing device. Regardless, the base station 115 can include software to analyze the sensor data from at least one intrusion detection sensing node 105 to identify and characterize an intrusion detection event.
[0050] For redundancy, each Ethernet network node includes a cell/satellite backup communications link 120. The base station 115 can provide analysis results, instructions, and/or the sensor data to any remote users 125, a group which may include maintenance personnel or personnel monitoring for incidents. The base station 115 also can provide the analysis results, instructions, etc., machine-to-machine, e.g., in the form of a SCADA interface 130 directly to an external train control interface to a controller on a locomotive. For example, the base station 115 can provide an instruction to trigger a control action of a device. In particular, the device can be a vehicle (e.g., a locomotive, a maintenance of way vehicle, etc.), and the control action can control one or more aspects of the vehicle's function. A third party database interface layer 135 can provide further integration by obtaining additional data (e.g., remote sensing data, etc.) from existing data source(s) which may be fused with the data being provided by the remote IDS nodes 105 in order to generate the analysis results.
[0051]
[0052] Similarly, each controller 220 can be powered using two or more redundant power supplies 225, so that a failure of a single supply does not result in failure of the entire remote IDS node 105. The system power can be provided by one or more external power sources 230. These might include solar power, industrial 110 VAC, or vehicle 24 VAC, etc. In the event that the external power sources fail, a power backup system 235, such as a battery-powered Uninterruptible Power Source (UPS), can supply power until primary power is restored.
[0053]
[0054] The sensor interfaces 315 and 320 are monitored using interface diagnostics modules 330; sensor malfunctions detected by the diagnostics modules 330 are reported to the CPU cores 325. Watchdog modules 335 can monitor the function of the CPU cores 325. The CPU cores 325 are required to notify the watchdog modules 335 with a reset operation on a particular temporal schedule; if the CPU cores 325 fail to notify the watchdog modules properly, a malfunction is adjudged, and the CPU cores 325 are restarted.
[0055] The results of the analysis by CPU cores 325 are presented to a voting module 340, such as a 2oo4 hardware voting configuration, where the results are compared; if the results from redundant sensors are not the same, the voting module 340 judges a failure, accepting either a unanimous or majority vote, or rejecting all of the results, depending on the SIL level. The system can be powered by redundant power supplies 345, providing for continued system operation even if one of the power supplies 345 fails.
[0056]
[0057] The overall system power can be supplied by external sources 420, which may include solar, power-line 110/220 VAC, or low-voltage 24 VAC. In the event that the external power source 420 fails, the system can contain a backup power module 425 which functions as an uninterruptible power source.
[0058] Communication with the base station 115 can be provided by a communication link module 430. In a preferred embodiment the communication link module 430 utilizes a high-bandwidth Ethernet backbone link 435. In an alternate embodiment where a wired link is not feasible, it may use a mesh radio wireless link 440, which provides less data bandwidth but can reach past some physical impediments. In the event that the primary link fails, a backup link 445 can be provided utilizing cellular or satellite wireless links, which have limited bandwidth but still provide some communication capabilities.
[0059]
[0060] Moreover the controllers can be powered using redundant power supplies 515; the redundancy provides for continued operation even if one supply fails. The overall system power can be supplied by external sources 520, which may include solar, power-line 110/220 VAC, or low-voltage 24 VAC, etc. In the event that the external power source 520 fails, the system can contain a backup power module 525 which functions as an uninterruptible power source.
[0061] Communication with the base station 115 can be provided by a communication link module 530. In an embodiment the communication link module 530 utilizes a high-bandwidth Ethernet backbone link 535. In an alternate embodiment where a wired link is not feasible, it may use a mesh radio wireless link 540, which provides less data bandwidth but can reach past some physical impediments. In the event that the primary link fails, a backup link 545 can be provided utilizing cellular or satellite wireless links, which have limited bandwidth but still provide some communication capabilities.
[0062]
[0063] Each sensor interface 605 has an accompanying interface diagnostic module 615 which can check for proper function; each diagnostic module provides its observations to the CPUs 610 so that the CPUs can judge the validity of the relevant sensor data. The CPUs are also monitored using watchdog modules 620, which must be serviced according to a schedule; if the CPUs 610 do not meet the schedule required by the watchdog modules 620, the watchdog modules have the ability to reset or shut down one or more of the CPUs.
[0064] The results of analysis from the CPUs 610 can be delivered to a hardware voting module 625, which judges the validity of the results based on agreement between the results delivered by the multiple CPUs 610; if there is agreement per a 2oo4 criterion, the results are considered valid. Each CPU 610 can be powered using redundant power supplies 630; this allows the node to continue to operate even if one of the power supplies fails.
[0065]
[0066] For long-range presence detection, a laser 715 and photoreceptor 720 can be used in combination to perform range measurement to obstacles using, for example, a time of flight method. By reflecting through a rotating mirror 725, a 360° plane may be scanned for obstacles. For shorter-range presence detection, a similar time of flight method can employ laser 730 and photoreceptor 735, but in this case the mirror 740 not only can rotate to provide 360° scanning in azimuth, it also can change angle dynamically to provide a large field of view in elevation.
[0067]
[0068]
[0069]
[0070]
[0071]
[0072]
[0073]
[0074] The first step 1210 uses object recognition to identify the object based on the 2D image or 3D point cloud; if it cannot be identified the analysis completes with a negative result (e.g., unidentifiable) provided to the fuzzy expert system. Otherwise, processing can continue in order to determine spatial and/or temporal object properties for the detected blob. For example, in step 1215, the identified object undergoes a blob-based size analysis to determine whether the blob's size is within the size requirements of intrusion criteria; if it is not within the criteria the analysis completes with a negative result (e.g., size not met) provided to the fuzzy expert system.
[0075] The identified and sized object then undergoes motion analysis in step 1220 to determine its speed and direction; if these can't be determined the analysis completes with a negative result (e.g., not calculable) provided to the fuzzy expert system. The object's motion is then analyzed in step 1225 to determine whether the blob has come to rest. If this cannot be determined, the analysis completes with a negative result (e.g., not calculable) provided to the fuzzy expert system.
[0076] Next, the object properties can be evaluated with respect to intrusion criteria. For example, the object's location can be analyzed in step 1230 to determine whether the blob is within a geo-fence defining at least one intrusion zone; if the blob is not in any intrusion zone the analysis completes with a negative result (e.g., not violated) provided to the fuzzy expert system. Although the object has been identified as an intruder, it may be one which has manually been identified by personnel as a non-intruder; this is checked against an override list in step 1235; if the blob has been identified as a non-intruder the analysis completes with a negative result (e.g., already excluded) provided to the fuzzy expert system. At this point the object has been identified as a true intruder, so relevant data for the fuzzy expert system is gathered in step 1240 and the analysis completes with a positive result (e.g., intruder) provided to the fuzzy expert system.
[0077]
[0078] In step 1320, the de-noised data is partitioned into blobs, which are groups of points with common attributes, implying potential connectedness, which are thus candidates as objects. Each blob, e.g., candidate object, is labeled in step 1325 with a unique identifier so that it can be tracked through the processing. Since a blob is only a candidate object, it may be ephemeral or illusory (noise); to exclude this possibility, a blob must be verified in step 1330 to appear in multiple consecutive analyses to be considered authentic. If the blob has not met these criteria yet, the process returns to fetch new sensor data in step 1305. If the blob has met these criteria, the blob is reported in step 1335 to the classifier for further analysis.
[0079]
[0080]
[0081]
[0082] The track area in the vicinity of the overpass is monitored by geophones 1615, which are capable of sensing minute tremors in the earth resulting from a falling object; multiple geophones 1615 can be laid out in an array, which allows the IDS node to identify the location of the impact. Multi-spectral imaging systems 1620 can be located underneath the overpass (e.g., mounted to an underside of the overpass, on the ground, on a support structure for the overpass, and/or the like) which are capable of visibly identifying objects which have fallen on the tracks. A multi-spectral imaging system might include visible light, near-IR, short-wave IR, and/or LIDAR, with the signals from different imagers fused to provide a multi-spectral view of any object.
[0083]
[0084] The track area can be surrounded at its perimeter with an array of geophones 1710, which are capable of sensing minute tremors in the earth resulting from falling or rolling objects. The geometry of the layout for the geophones 1710 can provide for localizing the center of the impact by comparing the signals from neighboring geophones 1710 in the array. A further distance from the rails, arrays of soil stability sensors 1715—for example, pore pressure sensors—can monitor movements of the surface soil uphill from the tracks 1700, to detect landslide or mud slide activity. Within the tunnel or trench, a set of multi-spectral imaging sensors 1720 can be mounted such that their fields of view overlap, providing in the summation a field of view encompassing the entire track area in the vicinity of the tunnel or trench 1705. By fusing the signals from the geophones 1710, soil stability sensors 1715, and multi-spectral imagers 1720, the IDS node can detect any material encroaching on the rails from the surrounding terrain.
[0085]
[0086]
[0087]
[0088] The foregoing description of various embodiments of this invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed and inherently many more modifications and variations are possible. All such modifications and variations that may be apparent to persons skilled in the art that are exposed to the concepts described herein or in the actual work product, are intended to be included within the scope of this invention.