Next Article in Journal
Pedestrian Flow Identification and Occupancy Prediction for Indoor Areas
Next Article in Special Issue
Automatic Passenger Counting on the Edge via Unsupervised Clustering
Previous Article in Journal
Power-Intent Systolic Array Using Modified Parallel Multiplier for Machine Learning Acceleration
Previous Article in Special Issue
Implicit Overhearing Node-Based Multi-Hop Communication Scheme in IoT LoRa Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Development and Analysis of a Distributed Leak Detection and Localisation System for Crude Oil Pipelines

by
Safuriyawu Ahmed
1,*,
Frédéric Le Mouël
1,†,
Nicolas Stouls
1,† and
Gislain Lipeme Kouyi
2
1
Univ Lyon, INSA Lyon, Inria, CITI, EA3720, 69621 Villeurbanne, France
2
Univ Lyon, INSA Lyon, DEEP, EA7429, 69621 Villeurbanne, France
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Sensors 2023, 23(9), 4298; https://doi.org/10.3390/s23094298
Submission received: 2 March 2023 / Revised: 18 April 2023 / Accepted: 21 April 2023 / Published: 26 April 2023
(This article belongs to the Special Issue Advanced Applications of WSNs and the IoT)

Abstract

:
Crude oil leakages and spills (OLS) are some of the problems attributed to pipeline failures in the oil and gas industry’s midstream sector. Consequently, they are monitored via several leakage detection and localisation techniques (LDTs) comprising classical methods and, recently, Internet of Things (IoT)-based systems via wireless sensor networks (WSNs). Although the latter techniques are proven to be more efficient, they are susceptible to other types of failures such as high false alarms or single point of failure (SPOF) due to their centralised implementations. Therefore, in this work, we present a hybrid distributed leakage detection and localisation technique (HyDiLLEch), which combines multiple classical LDTs. The technique is implemented in two versions, a single-hop and a double-hop version. The evaluation of the results is based on the resilience to SPOFs, the accuracy of detection and localisation, and communication efficiency. The results obtained from the placement strategy and the distributed spatial data correlation include increased sensitivity to leakage detection and localisation and the elimination of the SPOF related to the centralised LDTs by increasing the number of node-detecting and localising (NDL) leakages to four and six in the single-hop and double-hop versions, respectively. In addition, the accuracy of leakages is improved from 0 to 32 m in nodes that were physically close to the leakage points while keeping the communication overhead minimal.

1. Introduction

Pipeline transportation of crude oil is increasingly being adopted because of its low carbon footprint compared to other modes of transportation, such as ships, waterborne vessels, and rail trucks, and it is also considered the safest means of transportation [1,2]. However, it sometimes fails as a result of third-party interferences, ageing infrastructure, corrosion, erosion, equipment failures, material and weld failures, natural hazards, and operational failures [3]. These failures lead to the release of hydrocarbon in the environment into the form of oil leakages and spills (OLS) causing environmental pollution and degradation, loss of life and revenue, health-related issues, and socioeconomic impacts [1,2,4,5]. Consequently, various leakage detection and monitoring systems (LDMSs) are being adopted to reduce the impacts of such failures, such as wired and wireless systems, statistical detection and localisation, hybrid systems, robots, and remote sensing systems.
However, incidents in pipeline transportation continue to occur. For instance, Shell Nigeria recorded a loss of crude oil in their network to the tune of 11,000 barrels per day in 2018 [6], an increment of approximately 550% in comparison to the previous year. Additionally, some of the classical leakage detection techniques (LDTs) that comprise community-based surveillance and security personnel, supervisory control and data acquisition (SCADA) systems, fibre optics, conducting cables, helicopters, and satellites are difficult to maintain, inflexible, have limited coverage, high detection and localisation (DAL) times, high false alarms, or are expensive to implement [7,8,9].
Hence, in recent years, industries have seen an increase in the adoption of WSN and IoT-based systems for infrastructure monitoring. The oil and gas industry covers three sectors (upstream, midstream, and downstream) to improve the various processes related to each sector. The midstream sector is used to monitor the various failures encountered in the transportation of oil and gas products. While research studies [2,10,11,12,13] have shown that it is more efficient compared to other LDMSs, some challenges still exist. For instance, energy consumption, reliability, the accuracy of leakage DAL, the sensitivity of detection communication and node failures, and single point of failure (SPOF) [14,15].
Therefore, in this work, we address these issues by proposing a new distributed leakage DAL technique, HyDiLLEch, with the following contributions:
  • A combination of existing LDTs to optimise their strengths and minimise their weaknesses while ensuring the continuous and accurate DAL of leakages.
  • A presentation of the node placement strategy, which allows sensitivity in leakage DAL and elimination of SPOFs.
  • An analysis of the efficiency of HyDiLLEch, considering the resilience to SPOFs, the accuracy of leakage DAL, the communication overhead, and energy consumption.
Moreover, this is an extension of the work by [16]. In this version, we also present the results of the detection sensitivity of different sizes of leakages, the accuracy of some classical LDTs, and a further representation of energy consumption. In addition, we provide an extended explanation of the design choices and specifications of the system. Finally, we elaborate on the algorithms to show the changes in sensing frequency according to the detection or localisation and change the metric of measurement for the accuracy to metres compared to the percentage in the first version, as in [17]. The rest of this article is structured as follows: In Section 2, we discuss the existing works; Section 3 details the hydraulic background of statistical leakage DAL. Section 4 discusses the main contributions of the work. Finally, we discuss our results in Section 5 and present our conclusion and future works in Section 6.

2. Related Works

Many LDTs and leakage detection monitoring systems (LDMSs) are used to reduce the negative impacts of OLS. In this section, we present research works on different aspects of designing an LDMS. In the first Section 2.1, we discuss several classical LDTs and LDMSs and present WSN/IoT-based monitoring systems in Section 2.2.

2.1. Pipeline Failure Detection and Localisation Techniques

Existing classical techniques for monitoring pipelines are based on research works and techniques, such as robots, computational fluid dynamics, and hybrid systems. Robots are mainly used to monitor pipeline integrity. You Na et al. [18] proposed the use of biometric robots for detecting anomalies in pipelines. With an insect-like crawling feature, the proposed robot can effectively travel along the different paths of the complex pipeline network. Sujatha et al. [19] proposed a prototype robot for real-time, continuous, and autonomous monitoring of the pipeline. This was enabled by integrating the robots with a mobile application for tracking changes, which could be customised to the needs. A preliminary test conducted on the usage of the robots shows the robustness and practicability of usage. Kim et al. [10] developed a sensor-based system for pipeline monitoring and maintenance by combining topology-aware robots, mobile sensors, and a radio frequency identification (RFID) sensor-based localisation technique. Their integrated system is expected to prevent failures through the early detection and reporting of anomalies, after which, the robotic agents provide recovery by conducting repairs. Several experiments were conducted showing the cost-effectiveness and scalability of their system. However, research on robotics for overall pipeline monitoring is still in its early stages and has not been largely adopted due to its implementation complexity and the performance limitations for industrial purposes. Currently, pipeline inspection gauges are more commonly used to monitor structural integration with various limitations, such as one-directional movements.
Unlike robots, non-intrusive techniques exist, such as those based on computational fluid dynamics to detect and localise leakages in pipelines. Ostapkowicz, in his work [14], demonstrated the use of statistical leakage detection techniques based on pressure gradients and negative pressure waves. Experimental results were obtained by taking the pressure measurements and the fluid transmission speed. Both LDTs had good localisation accuracy and differed mainly in terms of energy consumption, i.e., the negative pressure wave had higher energy consumption because of its sampling rate compared to the gradient-based method, with lower energy consumption and accuracy. Similarly, Beush-ausen et al. [20] proposed transient leakage detection through an integrated analysis of the pressure and flow rate and the use of modified volume balance. With this technique, leakage detection was shown; however, some challenges persist. For instance, the localisation error was up to ten kilometres, some discrepancies in the flow metre were recorded, and there were limitations on the communication bandwidth and the effect of the type of fluid on this result. On the other hand, Santos et al. [21] proposed a detection method based on the usage of Doppler ultrasonic flow metres and transit-time ultrasonic flow metres. They carried out simulations to determine the impact of air bubbles on the accuracy of the detection and to understand its effectiveness. Karray et al. [22] also presented a leak detection technique based on the modified time of arrival difference, predictive Kalman filter, and the system-on-a-chip wireless sensor node. However, this work focused on reducing the energy consumption of LDMSs by incorporating data filtering, preprocessing, and compression in the algorithm. While existing statistical techniques present high accuracy in the DAL of leakages, challenges still exist, including energy consumption and single point of failure (SPOF) related to centralised implementation.
Other classical methods of DAL exist based on remote sensing, such as satellites, helicopters, vehicles, and unmanned aerial vehicles (UAVs) using radar, RGB images, or specialised cameras. S, Kostianoy et al. [23,24,25] presented the efficiency of using satellite systems for monitoring various pipeline transportation aspects. These include differentiating anthropogenic and natural effects of pipelines, ports, terminals, and the ecological impacts on the water bodies in proximity. The environmental impacts were evaluated using an integrated sea track web model to measure the spatial and temporal characteristics. Likewise, other works [26,27] demonstrated the use of a hyperspectral satellite for remote sensing in pipeline transportation by monitoring chemicals, gases, and other dynamic changes on the land, enabling the early detection of pipeline degradation. Although satellite-based monitoring provides multi-dimensional monitoring for pipelines and is suitable for difficult terrain, it is expensive to implement. Human-based monitoring systems, on the other hand, involve the use of observer vehicles, helicopters, or UAVs for the visual DAL of leakages (in addition to remote sensing, in some cases). Security personnel and community-based surveillance are also used to detect leakages, specifically those resulting from vandalism because of the size. However, studies [7,8,9] show that these techniques are expensive, ineffective, and impractical due to the very long detection times (days to weeks) and hazards to the environment.
As discussed in Section 1, IoT-based monitoring systems are increasingly being adopted for infrastructural monitoring in various industries, including the oil and gas industry. Thus, in the following subsection, we discuss various research works on these systems.

2.2. WSN/IoT-Based Pipeline Monitoring

IoT-based systems are enabled by wireless sensor networks (WSNs) consisting of multiple sensors for data collection. Many research studies [12,28,29] have enumerated their advantages in terms of vandalisation, maintainability, and energy consumption, among others, for pipeline monitoring. Hence, in this subsection, we look at various aspects of the IoT ecosystem, such as architectural designs, placement strategies, LDT, and communication protocols, which play crucial roles in the efficiency of pipeline monitoring.
Khan et al. [7] proposed an IoT architecture consisting of three layers for the different sectors of the oil and gas industry. Their aim was to improve reliability and robustness through a hierarchical design that enabled performance enhancement and predictive maintenance via collaboration, reliable communication, and intelligent decision-making among the nodes. Yelmarthi et al. [30] proposed a four-layered architectural hybrid framework (wired and WSN). The aim was to provide a low-power and generic framework usable for diverse applications. Hence, various experiments involving damage detection, posture analysis, and physical activities were conducted to test the practicability.
In addition to architectural design, an important factor that affects the efficiency of the WSN is the sensor placement strategy. Berry et al. [31] proposed sensor placements in pipeline networks based on mixed integer programming (MIP), based on the temporal characteristics of the contamination impacts noted in the pipelines. Tests were carried out using EPANET, SNL-1, and SNL-2 to analyse the sensitivity of the placement to the contamination in a periodic manner. The sensitivity analysis was based on the consensus of the placement, i.e., where two sensor placements were defined as their intersection size divided by the number of sensors in each placement. The results show that the average pairwise consensus was in the range of 86.5% to 100%, with a maximum standard deviation of 1.3%.
Similarly, Sela et al. [32] worked on the efficient failure detection of water pipelines through optimal sensor placement based on multiple approaches. The preliminary step utilised an approximate solution of the minimum set cover of the minimum test cover (MTC) problem. They also proposed a novel technique using an augmented greedy MTC-based algorithm. To determine the efficiency of this approach, tests were conducted on a water network. The results show that the novel technique is three to eight times faster than the other. Lina et al. [33] extended these results by proposing a robust placement using a robust greedy approximation (RGA) and robust mixed integer approximation (RMIO) as enhancements to the nominal greedy approximation and mixed integer optimisation problem through redundancy. Experimental results show that both RGA and RMIO outperformed their nominal versions.
Likewise, Krause et al. [34] aimed to mitigate the intrusion of pipeline networks through robust sensor placements, they optimised this placement by utilising the minimax algorithm. The experimental results included the extension of the multi-criteria optimisation and efficient placement for large networks, i.e., up to 91% of the maximum placement score achievable. Sarrate et al. [35] studied the impact of sensor accuracy on infrastructural analysis using the isolability index, i.e., setting up the placement issue on a fault diagnosis-based performance maximisation criterion in contrast to the placement following non-linear physical laws leading to mesh networks. Tests conducted on water networks to detect leakages showed improvement in fault detection and the removal of the complexity of mesh connectivity in such extensive networks.
To reduce energy consumption and improve the sensors’ lifetime, Guo et al. [36] proposed a sensor placement on an oil pipeline by considering the maximum transmission range of the sensors and messages relayed in a hop-by-hop manner, which also reduced the number of sensors placed on the pipeline. However, Elnaggar et al. [37] took a different approach to the reduction of energy consumption through sensor placement for oil pipeline monitoring. His approach involved the use of ant colony optimisation and a genetic algorithm. The simulations, which were conducted on a pipeline segment to test the communication level, showed poorer performances in the genetic and greedy algorithms compared to the ant colony optimisation. However, they maintained similar results in the overall lifetime optimisation of the WSN. Al Baseer et al. [38] proposed sensor grouping and using an adaptive clustering algorithm for intermediate data delivery to reduce energy consumption. As a result, a significant reduction between 300% to over 500% was recorded as a result of the load-sharing mechanism among the cluster heads. Moreover, this approach resulted in up to a 62% reduction compared to the heuristic approaches. Further evaluation of the experimental results shows a 50% reduction in consumption. Li et al. [39], on the other hand, proposed a generic sensor placement to optimise energy consumption in a sensor network. To achieve this, they utilised retransmission and discrete power control for single- and double-tier uniformly and non-uniformly distributed WSNs.
Multiple LDTs have been proposed or implemented based on various WSN architectural designs. Sadeghioon et al. [40] proposed a novel algorithm for leakage DAL in underground pipelines aimed at improving the sensitivity of DAL. The algorithm is based on the relative measurement of the pressure and changes that occur as a result of the interaction between the hydrocarbon and the soil surrounding the area of the leakage. The test showed an improvement in sensitivity compared to the threshold-based techniques. They furthered their research [11] by introducing a specialised sensor based on a force-sensitive resistor for ultra-low-power DAL. Still on the reduction of energy consumption, Saeed et al. [41] proposed a reliable WSN-based system for oil and gas pipelines spanning over a large geographical area. The conducted preliminary tests on energy consumption showed promising results.
One of the key factors in designing an efficient and reliable WSN/IoT-based infrastructural monitoring system is the communication protocol utilised in the system. Sensor nodes used in WSN/IoT-based systems are constrained devices that are limited by several factors, such as energy consumption, which makes existing cellular communication networks, such as 3G, 4G, LTE, and others, unsuitable for their usage [42]. Hence, alternative protocols, as shown in Figure 1, are proposed to specifically cater to the needs of IoT systems. These protocols are broadly categorised into short- and long-range communication protocols and mainly differ in their topology, communication range, throughput, and energy consumption.
Short-range communication protocols include IEEE 802.15.4 (Zigbee), IEEE 802.15.1 (Bluetooth LE), 6LowPan, Wi-Fi, and others, with a maximum communication range of about 100 m. They share some similarities, such as a throughput of 20 kbps [43] and a mesh topology for Zigbee and 6Lowpan, while Bluetooth LE, on the other hand, has a point-to-point topology.
Long-range protocols (low power wide area network protocols—LPWANs) covering up to 50 km are further divided into licensed and unlicensed LPWANs [44]. The Third Generation Partnership Project (3GPP) NB-IoT is an example of a licensed LPWAN operating on a licensed spectrum of a 200k Hz band. Its connection density involves up to one hundred thousand devices. Sigfox and LoRaWAN, on the other hand, are examples of unlicensed LPWANs. They both operate on the 868 MHz band in Europe with LoRaWAN also operating in other radio bands. Sigfox uses an ultra-narrowband signal that further reduces energy consumption and is limited by the number of daily message deliveries depending on the data rate (usually up to 100 bps). LoRaWAN also has a low data rate, and the throughput depends on multiple factors, i.e., the size of the bandwidth and the spreading factor.
Thus far, we have presented works that considered the benefits of sensor placements, such as detection time, energy consumption, sensitivity, scalability, and robustness to failures, by proposing different strategies. However, various drawbacks exist; for example, the assumption that one sensor can detect failures in multiple pipelines, or their centralised implementations (both of which make them susceptible to SPOFs). Energy consumption and the accuracy of DAL are also other concerns in the industrial application of IoT-based monitoring systems. The communication protocol choice (to ensure coverage in the place of deployment) is also a factor to consider.
In the subsequent section, we present our contribution, HyDiLLEch. However, to discuss this, we present a background on fluid mechanics to justify our design choices.

3. Computational Fluid Mechanics

Fluid transmission is categorised into different flow types, each presenting distinct characteristics corresponding to changes, such as those in velocity or pressure over space and time. However, all fluid transmissions are subjected to the principle of fluid dynamics based on the conservation of energy, mass and linear momentum [45]. As such, the state equation (any data-driven equation) can be used to define the fluid phase behaviour [46,47] by measuring the fluid properties, such as temperature, flow, pressure, and density.
Crude oil transmission in a pipeline follows these principles and, therefore, presents certain measurable property changes (in both steady and unsteady states), i.e., with leakages and no leakages. Figure 2 shows the changes in the pressure gradient travelling in a pipeline from the inlet to the outlet, with the absence of leakages. In this figure, we can see a slope representation of the changes when it is presented in the time domain, where the inlet and outlet pressures (represented by P 0 and P L , respectively) constantly decrease with distance at each measurement point. This representation differs significantly in the presence of the leakage as a result of the negative pressure wave (NPW) generated [14,48]. As shown in Figure 3, the generated NPW travels in the opposite direction from the leakage location, causes changes in the pressure at the inlet and outlet, and leads to the formation of two distinct gradients. P 0 l e a k and P L l e a k represent the inlet and outlet pressures when there is leakage. These properties (as well as other changes in the flow rates and temperature) are useful data in leakage detection, using statistical methods to advance the governing principle of fluid transmission, otherwise known as computational fluid dynamics (CFD).
CFD-based techniques include the real-time transient modelling (RTTM) mass volume balance technique (MVB), the pressure point analysis (PPA) technique, the gradient-based method (GM), and the negative pressure wave method (NPWM) [5,14,49]. In the following subsections, we present each of the aforementioned techniques including their advantages and disadvantages.

3.1. Real-Time Transient Model

RTTM is based on field instrumentation. It simulates pipeline monitoring through the hydraulic and thermodynamic properties by measuring the density, flow, pressure, temperature, and other properties of the fluid. These measurements are performed in real-time and represent the state information of the pipeline under all conditions. One of the important considerations in using RTTM involves deciding the boundary conditions, i.e., the input data, signal calculation, and processing [47]; this has a significant impact on the obtained results.

3.2. Mass Volume Balance

MVB technique is used to detect leakages when the mass balance at the outlet exceeds the threshold defined by Equation (1) [50]
ϵ ρ i n ρ o u t d d t m p
where ϵ is the defined threshold, ρ i n is the fluid density at the inlet, ρ o u t is the fluid density at the outlet, d d t m p is the change in pressure and temperature of the pipeline based on the liquid density and the cross-sectional area of the pipe.
The supervisory and data acquisition system (SCADA) typically uses the MVB in combination with other statistical methods, such as PPA for leakage detection and localisation in pipelines. The detection is determined using two variants of MVB, the simple volume balance and the modified volume balance. The simple volume balance is completely based on the principle of mass conservation, where both inlet and outlet masses are expected to be equal. The modified method, on the other hand, includes other state properties, such as the pressure or temperature to determine the leakage presence. The centralised nature of SCADA systems makes them susceptible to SPOFs. Additionally, they have high response times, are expensive, and are inflexible in regard to change [7].

3.3. Pressure Point Analysis (PPA)

The PPA technique is used to detect leakage by the periodic measurement of fluid pressure along the length of the pipeline. It uses the Bernoulli equation defined in Equation (2).
z a + P a ρ g + V a 2 2 g = z b + P b ρ g + V b 2 2 g + E a b
where E a b = λ V 2 2 g d L represents the energy head loss, λ is the coefficient of friction, V is the velocity of the fluid, d is the pipeline’s inner diameter, L is the distance between points a and b, P a represents the pressure at point a, ρ is the mass density of the fluid, g is the gravitational force, and z a is the elevation at point a.
To elaborate on the PPA technique, we consider the placement of several sensors along the pipeline, as shown in Figure 4. The measured pressure P i of each sensor is relative to its position on the pipeline. With the Bernoulli equation, this can be determined using the inlet pressure P 0 , the energy head loss, the fluid velocity, and other parameters defined in Equation (2).
Thus, the statistical detection of leakage using PPA involves the evaluation of the determined pressure against a preset threshold. This non-computationally complex method makes the implementation of PPA easy. However, this technique cannot be used to localise leakage without combining it with other techniques (e.g., MVB) [51].

3.4. Gradient-Based Method (GM)

As discussed at the beginning of the section, leakage occurrence presents two distinct steady states, resulting in different PGs from the pipeline’s inlet to its outlet. These steady states, as shown in Figure 5, are before and after the leak location. The GM technique uses these changes in PG for DAL leakages.
Q ¯ = L × d P G Q L l e a k + ( d p 0 d p L ) d P G Q L l e a k d P G 0 Q l e a k
where Q ¯ is the estimated leak location, L is the pipeline length, d p 0 is the average increment in the pipeline’s initial cross-section, d p L = average is the increment in the pipeline’s final cross-section, d P G 0 Q l e a k is the average increment in the pressure gradient before the point of leakage, d P G Q L l e a k is the average increment in the pressure gradient after the point of leakage.
For instance, we consider a leakage occurrence at a point Q in the pipeline, assuming that P G a b denotes the pressure gradient between two points, a and point b, then P G 0 Q l e a k and P G Q L l e a k represent the two gradients before and after the leakage location. Note that P G Q L l e a k < P G 0 L < P G 0 Q l e a k represent the differences in the two steady states used in GM DAL with Equation (3).
The GM technique is efficient in DAL with low computational complexity and energy consumption, and high accuracy.

3.5. Negative Pressure Wave Method (NPWM)

The negative pressure wave method (NPWM) is another LDT that is commonly used for DAL in pipelines [52]. Similar to changes in the steady state discussed in the previous subsection, an NPW is also generated in which the NPWM is based.
The generated wave, as shown in Figure 6, travels in the opposite direction from the leakage point with the speed of sound (c), calculated by Equation (4). Moreover, depending on the leakage size, the amplitude of the NPW attenuates as it travels along the pipeline. Hence, only sensors within the maximum detectable distance of the wave can detect the arrival of the NPW front. The formula for characterising the attenuation rate of the amplitude of the NPW signal is represented in Equation (5).
c = 1 ρ ( 1 K + d Y . w )
where A b is the amplitude at sensing point b, A a is the amplitude at sensing point a, α is the attenuation coefficient, e = 2.71 and D are the distances between two sensing points.
A b = A a e α D
where A b is the amplitude at sensing point b, A a is the amplitude at sensing point a, α is the attenuation coefficient, e = 2.71 and D are the distances between two sensing points.
q = D c δ t 2
where q is the distance from the point of leakage to the nearest downstream node, D is the distance between the sensors, c is the negative wave speed, t is the communication time, and δ t is the difference in the time of arrival of the signal in the upstream and downstream nodes.
Another important aspect of DAL is the time of arrival of the NPW front, which can be calculated using Equation (6) [53]. Both sensors at the sides of the leakage, i.e., the upstream and downstream sensors receive different times of arrival of the wave depending on their distances from the leakage. In general, NPWM has high accuracy in the DAL of leakages; however, due to its high sampling rate, the energy consumption is also high.
Given this background information, in the next section, we present our contributions.

4. Contributions

In this section, we present our contributions based on distributed leakage detection and localisation. As discussed in Section 1, the OGI in Nigeria experiences high rates of failure, such as vandalisation and operational failures. This work is aimed at providing an IoT-based monitoring system that can guarantee continuous and accurate detection and localisation of leakages in the presence of these failures. However, existing leakage detection techniques have various strengths and weaknesses. For instance, the PPA technique can be used to detect leakages but cannot be used to localise them and must be combined with other techniques. NPWM can be used for both detection and localisation but it has very high energy consumption, which is not practical for resource-constrained devices in an IoT-based system. Thus, we combined some of these techniques (details provided in the subsections) in a way that could optimise their strengths while minimising their weaknesses. Additionally, this was implemented in a distributed manner to remove the susceptibility to SPOFs experienced with classical LDTs. Globally, the objectives are as follows:
  • Resilience: Remove the SPOF.
  • Coverage and sensitivity: Allow optimal connections between the sensors and determine small-sized leaks.
  • Accuracy: Ensure high accuracy in DAL.
  • Energy efficiency: Minimise energy consumption without compromising accuracy.
In Section 4.1, we first discuss the system’s design and specifications covering different aspects. Then, we present and discuss the algorithm that was implemented on these design choices in Section 4.2.

4.1. Design Consideration and Specification

In our system of design and specification, we consider different aspects, as enumerated in the previous section. First, we define the system’s architectural design and the communication protocol and network coverage between the nodes and layers. Then we consider the node placement strategy for sensitive detection and resilience to failure.

4.1.1. Architectural Design

Architectural designs for IoT systems are mostly application-based, ranging from centralised designs to distributed and hierarchical designs. In our system, we consider the efficiency of the system in regard to fault tolerance and communication aspects as the fundamental basis of our choices. Hence, we propose a three-layered hierarchical and distributed architecture aimed at reducing latency in the real-time DAL of leakages. In addition, the distributed architecture ensures robustness to SPOFs, communication failures, node failures, and other failures associated with third-party interference and natural occurrences in the pipelines.
Figure 7 shows the three-layered architectural design proposed, comprising the sensor, fog, and cloud layers.
At the sensor layer, we deploy sensors on the pipeline for the collection of information and data required for the implementation of services, such as data storage, data sharing, data preprocessing, detection, and localisation. The use of multi-spectral sensors, i.e., sensors with the capacity to collect diverse types of information, such as the negative pressure wave (NPW), its speed, and the pipeline pressure, enables this implementation. At the fog layer, we implement data and service management. The cloud layer, on the other hand, is reserved for long-term service implementations, such as historical data storage and predictive analysis. Next, we present the communication protocols proposed between the devices and the different layers.

4.1.2. Communication and Network Coverage

In Section 2, we presented several communication protocols suitable for the constrained resources of IoT-based systems. Each protocol differs in throughput, communication range, latency, and energy consumption. In our work, we consider the protocols with communication ranges that can cover long transmission pipelines, covering hundreds to thousands of kilometres, their efficiency (in terms of energy consumption), scalability (when considered for industrial deployment) and, most importantly, their availability in the intended place of deployment (POD), which is Nigeria, in our case.
The LoRaWAN network communication protocol is, thus, particularly interesting for our use case. LoRaWAN is an example of an unlicensed LPWAN that is energy-efficient, cost-effective, easy to maintain and configure, and scalable. Its efficiency for long-distance communication (30 km and above) in out-of-line and rugged terrain was demonstrated in [54]. It is also fit for industrial purposes because a LoRa base station has up to 20 km of coverage with each cell having a connection capability of 50,000 devices. This provides a highly scalable network in comparison with its counterparts, such as NB-IoT [44]. In terms of deployment costs, a LoRa base station costs four times less than that of a Sigfox base station and fifteen times less than an NB-IoT base station [44].
To increase reliability in the communication aspect of the work, we also propose the use of an available cellular network, such as 3G, 4G, or LTE as a backhaul. Figure 8 presents a typical communication system architecture. The end devices communicate with each other via the LoRa communication protocol. Other short- or long-range communication protocols between the sensors and gateways could be used at the time of deployment as needed. Devices at the fog and cloud levels also exchange information with the cellular network as the backhaul between the fog and cloud layers. Next, we present a sensor placement strategy to ensure event coverage in the system.

4.1.3. Sensor Placement for Event Coverage

In Section 2, we presented various sensor placement strategies to improve different aspects of LDMSs, including transmission capacity, the shortest distance between the node and event, or placements at key junctions, as shown in Figure 9 [32,33,36]. The drawbacks of these approaches include increased energy consumption when the nodes are always transmitting at their maximum capacity. Moreover, because of the long distance in the transmission lines, such placements fail to detect small leakages. Moreover, failures in intermediate nodes or nodes in key junctions can lead to interruption in the DAL of the leakage.
Hence, we propose the deployment of multiple sensors along each pipeline segment in the network, deploying several sensors along a pipeline segment in a network that is both robust to failure and sensitive to small leakages. We propose a new node placement strategy based on fluid propagation, specifically the NPW generated with the occurrence of the leakage in a pipeline.
Using the amplitude of the NPW (as shown in Figure 10) to determine the maximum detectable distance of small to big-sized leakages, we can ensure the sensitivity of detections by determining an optimal distance D on a pipeline of L k m : For implementation, we apply the following constraints:
  • The distance (D) between nodes should be less than half of their maximum communication range of the sensor ( S c r ) to ensure interconnectivity, data sharing, and resilience to SPOFs.
    D < S c r / 2
  • The maximum detecting distance of the NPW ( N P W m d d , which will be experimentally determined) between nodes and the event source must be adequately small to guarantee sensitivity to small-sized leaks.
    0 < D < N P W m d d
    where D is the distance obtained in Equation (7)
    With Equation (8), the distance (D) between the nodes, should be less than the N P W m d d between the upstream and downstream nodes surrounding a leakage, allowing the detectability of the NPW travelling in both directions.
  • Finally, there should be at least three sensors from the total number of sensors deployed (N) that can detect the NPW front. Note that in an ideal case, both upstream and downstream nodes are enough to detect the arrival of the NPW front. However, to remove SPOFs as described at the beginning of this subsection, we add a redundancy of one node. This ensures the continuous DAL of leakages in the presence of node failure.
    Q , [ n 1 , n 2 , n 3 : n 1 n 2 n 2 n 3 n 1 n 3 d i s t ( n i , Q ) < ( N P W m d d ) ]
    where i > 0 and dist( n i , Q) is the distance between node i and the leak location Q.
In the next subsection, we present our proposed distributed leakage detection techniques implemented in these design choices.

4.2. Hybrid Distributed Leakage Detection and Localisation Technique (HyDiLLEch)

HyDiLLEch is an LDT implemented in two versions (elaborated later) and based on the combination of some of the computational fluid dynamic detection techniques (i.e., PPA, GM, and NPWM) that were introduced in Section 3. Each LDT has strengths and weaknesses, such as leakage detectability, the accuracy of detection, and energy consumption. For instance, small leaks are detectable using the PPA LDT. It performs well under extreme conditions and has low maintenance. Both GM and NPWM can detect leakages in transient states [14]. Additionally, all three LDTs are non-invasive and can be easily deployed on existing infrastructures compared to the other LDTs [14].
However, several disadvantages are also associated with these LDTs. Consider the PPA technique, for example, it can neither detect leakages in a transient state nor independently localise [5]. The accuracy of DAL using the NPWM LDT relies on accurate detection of the arrival of the wavefront at the upstream and downstream nodes. The GM depends on the accuracy and calibration of the sensor nodes. As a result of these drawbacks, we propose the combination of these LDTs, i.e., NPWM, PPA, and GM, to take advantage of their strengths for the enhancement of DAL accuracy in a manner that minimises their negative impacts. Thus, we have HyDiLLEch, which is mainly aimed at increasing the fault tolerance of the LDMS, improving the accuracy in leakage detection, and minimising false positives in an energy-efficient and distributed manner, with the integration of multiple data sources.
The combination of these techniques enables their optimisation by clearly separating the detection and localisation phases and integrating other factors, as further explained in the following subsections.

4.2.1. 3-Factor Leakage Detection

Leakage detection in HyDiLLEch utilises types of information, such as predefined pressure threshold, pressure gradient, and the arrival of the NPW front at the sensor. In this work, we consider a single horizontal pipeline, as shown in Figure 11 and DAL is based on this pipeline segment, as further explained below.
  • Defining the pressure threshold: HyDiLLEch begins by utilising the PPA LDT to pre-estimate the expected pressure at every node location in the pipeline. To determine the expected pressure, the elevation parameter (z) defined in Equation (2) is set to 0, with respect to the horizontal nature of the pipeline.
    Then, we calculate the PG to estimate the expected pressure at every sensor point by rewriting Equation (2) as follows:
    P G 0 L = ( P 0 ρ g P L ρ g ) 1 L
    where P G 0 L is the pressure gradient on a horizontal pipeline, i.e., elevation z a b = 0 with length L, ( P 0 ) is the inlet pressure, ( P L ) is the outlet pressure, ρ is the fluid density, and g is the gravitational force.
    Once we determine the PG in a steady state, a threshold ϵ is set to accommodate the difference in the value read from the sensor and potential calibration error from the sensor readings. This threshold is set utilising the industrial permissible standard [14]. With this, the comparison between the actual sensor reading and the obtained value from the pre-estimation with Equation (10) is done. A difference greater than the threshold indicates possible leakage occurrence.
  • Difference in the pressure gradient: The second step in the detection phase is to check the presence of the two PGs that must be present when leakage occurs, i.e., based on the fluid dynamic properties discussed in Section 3. Assuming a leakage point Q as shown in Figure 11, the two PGs are those formed between n i and n i + 1 . Both PGs, i.e., P G 0 Q l e a k and P G Q L l e a k must be present and must respect the following conditions:
    P G 0 Q l e a k P G Q L l e a k
    P G 0 Q l e a k < P G 0 L
    P G 0 L < P G Q L l e a k
    Ensuring the correctness of Equations (11)–(13) further lessens the high false alarms associated with other LDTs.
  • Arrival of the negative pressure wave: As discussed in Section 3, all leakages must generate an NPW in the pipeline detectable by only a few sensors; the number varies based on the leak size. These sensors are noted as N P W d s in Figure 11 and are located around the areas where the pressure gradient is formed.
    The placements of these sensors (as we will see later in Section 5) are such that small leakages are detectable. Hence, the final step in the detection phase is to ensure the presence of the N P W d s . In addition, for the arrival to be considered a positive detection, at least two (upstream and downstream) sensor nodes must detect the wavefront. This condition is centred on the waves travelling in opposite directions from a leakage point. Thus, we eliminate false positives by coupling the leakage detection to the arrival of the wavefront.
    Finally, the actual presence of a leak is confirmed following the enumerated factors. Then, the leakage localisation is estimated using a similar approach, discussed in the following subsection.

4.2.2. Two-Factor Leakage Localisation

To localise the leakage, we combine the data (PG, NPW) of the sensors and narrow down the region of the leakage, i.e., the region where the NPW is detectable and the change of the gradient occurs. For instance, assuming a node n i as shown in Figure 11, which receives data from nodes n i 1 , n i + 1 and n i 2 , n i + 2 from the single- and double-hop neighbors, the leakage can be localised in two ways, as follows:
Q ¯ d p N P W = ( D × i ) + ( D q )
and
Q ¯ d p G M = ( D × i ) + G
where Q ¯ d p N P W is the leakage location based on the partial information on the NPW and estimated by Equation (6), Q ¯ d p G M is the leakage location based on the partial information on the pressure gradient, and G is the distance based on the gradient calculation.
Equations (14) and (15) calculate the absolute leakage position; the localisation is first estimated when the first leakage, i.e., the front wave, is received. Based on the speed and amplitude of these waves, the leakage location can be refined using the pressure gradients, as described in Equation (3), or by analysing the arrival time of the NPW front:
Q ¯ d p N P W = ( D × i ) + n = 1 k ( c × δ t n ) ÷ k
where Q ¯ d p N P W is an absolute leakage location, n is the n-th front end of the leakage wave, c is the negative wave speed estimated by Equation (4) of the n-th front end of the leakage wave, δ t n is the difference in arrival time of the n-th front end of the leakage wave at the upstream and downstream nodes, and k is the number of received front-end waves.
We present the main structure of HyDiLLEch in Algorithms 1 and 2. As briefly mentioned in Section 4.1.2, it is implemented in two versions, depending on the neighborhood, i.e., 1-hop (2 nodes) or 2-hop (4 nodes); they are referred to as HyDiLLEch-1 and HyDiLLEch-2. Both algorithms have similar formulations, differing only in the number of nodes involved in the neighborhood collaboration.
They are also implemented on a single horizontal pipeline segment as shown in Figure 11. For the implementation of HyDiLLEch, the sensors used are multispectral, i.e., they can detect multiple fluid properties, such as pressure, speed, or temperature, and are equipped with their batteries.
Algorithm 1 HyDiLLEch (Single-Hop)
1:
{Init-steady state}
2:
Set upper and lower PG thresholds {prevent noise}
3:
for ever do
4:
   {Activate nodes}
5:
   Obtain local P i
6:
   if  P i is greater than threshold then
7:
     Obtain pressure data from neighbours
8:
     Calculate local gradients P G ( i 1 ) ( i ) and P G ( i ) ( i + 1 ) with neighbours
9:
     if PGs are outside the PG threshold then
10:
        Scan at high frequency
11:
        for scanning time do
12:
           Obtain P i
13:
        end for
14:
        if exists P i greater than threshold, then share NPW data then
15:
          Localise using GM data (Equation (3))
16:
          Localise using NPW data (Equation (6))
17:
        else
18:
          No leak detected
19:
        end if
20:
     else
21:
        No leak detected
22:
     end if
23:
   end if
24:
   Sleep (duty cycle)
25:
end for
Algorithm 2 HyDiLLEch (Double-Hop)
1:
{Init-steady state}
2:
Set upper and lower PG thresholds {Prevent noise}
3:
for ever do
4:
   {Activate nodes}
5:
   Obtain local P i
6:
   if  P i is greater than P-threshold then
7:
     Obtain pressure data from neighbours
8:
     Calculate local gradients P G ( i 1 ) ( i ) , P G ( i 2 ) ( i ) , P G ( i ) ( i + 1 ) and P G ( i ) ( i + 2 ) with neighbours
9:
     if PGs are outside the PG threshold then
10:
        Scan at high frequency
11:
        for scanning time do
12:
          Obtain P i
13:
        end for
14:
        if exists P i greater than threshold, then share NPW data then
15:
          Localise using GM data (Equation (3))
16:
          Localise using NPW data (Equation (6))
17:
        else
18:
          No leak detected
19:
        end if
20:
     else
21:
        No leak detected
22:
     end if
23:
   end if
24:
   Sleep (duty cycle)
25:
end for
In the preliminary step on line 2 of Algorithm 1, the gradient thresholds are defined. The calculations are based on offline customisation to mitigate the classical variation of the fluid propagation model. On line 7 of Algorithm 1, each sensor captures the pressure at its respective location and propagates/receives the values to/from its predefined neighbour. The PG values are then computed to check for an unexpected pressure drop on line 8 of Algorithm 1. If so, several pressure values are sensed at high frequency—specified later—to accurately capture the wavefront of the leakage (lines 11–13 of Algorithm 1). If an NPW front is detected, the leakage localisation is computed using lines 15 and 16 of Algorithm 1. Afterward, sensors go back to sleep for a short period for the network duty cycle, i.e., the on-time and off-time periods.
In terms of the time complexity, let us consider the total number of activated nodes ( n a c t i v ) for each algorithm, the time taken to perform the arithmetic operations ( t a r i t h m ), the communication time between sensors ( t c o m m ), and the scanning time ( t s c a n ). As seen on line 7, t c o m m for every node is dependent on the number of neighbours considered, i.e., n a c t i v 1 . Additionally, on line 10, there is a fixed time scanning frequency, and the number of times the localised pressure P i is retrieved can be represented as n s c a n . Other operations, i.e., lines 8, 15, and 16 are arithmetic operations, which can be broken down (linear operations taking a unit of time to complete) into a total of n a r i t h m operations. Thus, during the uptime of the duty cycle, the time complexity is [ n a c t i v ( ( n a c t i v 1 ) t c o m m + ( n s c a n ) t s c a n + ( n a r i t h m ) t a r i t h m ) ] . Further analysis shows that the time taken to complete operations involving the calculation, localisation, and sensing of the gradients is in the order of nanoseconds to milliseconds [14,55] and, thus, negligible. Hence, the most significant difference lies in the number of neighbours considered during the communication phase for each algorithm. For instance, the average latency for LoRa-based real-time communication is 7.6 s [56]. Accordingly, the average time complexity is n a c t i v ( n a c t i v 1 ) t c o m m . However, we enabled a time-out period, which is measured as the product of the round trip time and a constant coefficient to ensure packet delivery. In our case, we experimentally determine this coefficient to receive all packets as 1.3. Therefore, the worst-case complexity can be determined as ( n a c t i v 2 ) t c o m m m a x , where t c o m m m a x is the time-out period. Consequently, we can conclude that although the time complexity is in quadratic order, the total number of nodes activated for leakage localisation is a constant fraction of all of the nodes on the pipeline receiving the front wave (as we will discuss later in the results section). Therefore, the worst-case time is also constant. Hence, globally, both HyDiLLEch-1 and HyDiLLEch-2 can scale for larger deployments.
Furthermore, the distributed and localised sensor-based implementation of HyDiLLEch eliminates the SPOFs related to centralised systems. Additionally, it maintains high DAL accuracy with minimal energy consumption. The energy consumed is reduced by utilising only a fraction of nodes in the localisation process and low-frequency sensing during detection. Thus, we will discuss and analyse the simulation results in the next subsection.

5. Simulation Results

This work aims to determine the optimal distance between nodes for sensitivity to small leakages and remove SPOFs, while also efficiently improving the accuracy of DAL. The evaluation is based on a comparative analysis with the classical implementation of NPWM and GM in terms of susceptibility to SPOFs, the accuracy of DAL, and communication efficiency. For this implementation, we used NS3 to simulate crude oil propagation and the network aspect. Note that, to cover the typical distance of LoRA-based communications while implementing the neighbourhood connectivity among the nodes, we used the Wi-Fi protocol in NS3 with changes in some of its parameters, such as the transmission power. This is feasible since previous research [57] has demonstrated that the energy usage of Wi-Fi and LoRa varies by a constant factor once the distance reaches roughly 350 m in a linear setup similar to ours. Additionally, the properties of the pipeline and oil type (the material of the pipeline, oil velocity, and others) taken into consideration in this work were sourced from Nigeria’s Department of Petroleum Resources (DPR). We enumerate these properties and the simulation parameters in Table 1 and Table 2. In the following subsection, we discuss this sensor deployment on the pipeline.

5.1. Node Placement and Sensitivity to Small Leakages

This part of the work is focused on determining the optimal distance D between the sensors. Recall that in Section 4.2, one of the conditions in the detection phase was to enable sensitivity to small leakages. To achieve this, we analysed the impacts of various leakage sizes by using their amplitudes and pressure thresholds to determine their detectability through NPWM and PPA techniques. The simulation was conducted using small-, medium-, and large-sized leakages ( 0.5 kpsi, 5 kpsi, and 20 kpsi) at various distances between the sensors. In the obtained results, as shown in Figure 12, all of the sensors can detect the leakages for the PPA LDT using the pre-defined threshold value. Contrarily, the NPW has a maximum detectable distance of 2500 m for the leakage with the highest amplitude of 20 kpsi. Whereas, the N P W m d d for the least examined amplitude ( 0.5 kpsi) is about 1500 m.
Thus, we can conclude that the NPWM, i.e., the LDT based on NPW, is not as efficient as PPA LDT in the detection. However, the HyDiLLEch detection phase is also based on NPW, which must be detectable by multiple sensors. For NPWM, the number of sensors that detects the leakages decreases as the distance between the nodes increases with the smallest leakage having a guaranteed detection by the number of sensors required (Equation (9)) at a distance of 1000 m between the nodes. In addition, all of the other conditions defined in Section 4.2 are satisfied; hence, for this work, the optimal distance D is set to 1000 m.
With D determined, HyDiLLEch is implemented on a long-haul transmission pipeline for a single-phase laminar flow. The generated pressures in the simulation follow the Bernoulli equation, defined by Equation (2).
In this work, all simulations and tests were conducted in ideal conditions, i.e., no communication or node failures. The following subsections discuss the results.

5.2. Detection and Localisation Accuracy

The DAL tests were conducted using randomised leakage points drawn from the entire length of the pipeline. The confidence interval of these leakage points is between 9880 m and 14,523 m with a confidence level of 98 % . In our previous work [16], we calculated the localisation accuracy based on a percentage, which has now been changed to distance in metres.
In the following subsections, we carry out a comparative analysis of two classical LDTs, i.e., NPWM and GM with HyDiLLEch.

5.2.1. Classical Approach

The classical LDTs were implemented by collecting all sensed data at the centralised gateway and the obtained results are shown in Figure 13. The NPWM exhibits a high level of localisation accuracy, with an error of approximately 2 m in distance and little variance across all tested leakage locations. On the other hand, the GM has an average localisation accuracy error of approximately 227 m, with high variability in all of the tests conducted. The high accuracy obtained using NPWM can be attributed to the high sampling rate of all nodes, which results in higher energy consumption compared to GM, as we will see later.
While these results show the difference in the efficiency of both LDTs in terms of localisation accuracy, the centralised implementation, i.e., a single gateway for localising the leakages, makes them susceptible to SPOFs, which disrupts DAL. Thus, we will discuss how HyDiLLEch performs relative to these drawbacks, the corresponding accuracy in DAL, and the incurred overhead.

5.2.2. HyDiLLEch

Unlike the classical implementation shown in the previous subsection, HyDiLLEch is implemented in a distributed manner. In this subsection, we discuss the results of the single-hop and double-hop versions separately. We also break down the results based on the number of nodes detecting and localising leakages (NDL) from the leakage point and the principal technique/information (dpNPW for NPW and dpGM for GM) used for the localisation. Moreover, the dpGM technique is activated on all nodes while the dpNPW is activated at a high frequency on the nodes whose gradient information differs from a neighbour, i.e., the nodes closest to the leakage area. Results for both versions are shown in Figure 14 and Figure 15. For the first comparison, in terms of NDL, the single-hop version shows an increment of three NDL compared to the centralised version with one NDL. This is made possible by the utilisation of the spatial data correlation (using each NDL geolocation, the pressure gradient, and the time of arrival of the NPW front) among multiple sensors surrounding the leakage point, represented as n 1 4 in Figure 14. Additionally, the average localisation errors from the actual leakage points for the best NDLs ( n 2 and n 3 ) are approximately 2 m and 33 m for dpNPW and dpGM, respectively. Note that these nodes are closest to the leakage locations. The remaining NDLs ( n 1 and n 4 ), which are further away from the leakage points, have a higher average localisation error (298 m for dpNPW). In these nodes, localisation with dpGM is not possible as the extreme nodes are missing information from either an upstream or downstream node, which is not required for localisation with dpNPW.
Likewise, Figure 15 shows the results for HyDiLLEch-2 (the double-hop version) with a further increment in NDL, represented as n 1 6 . The increased number of NDLs compared to HyDiLLEch-1 results from the wider collaborations in the nodes participating in the DAL process. Similar to HyDiLLEch-1, nodes that are closer to the leak locations ( n 2 , n 3 , n 4 , n 5 ) also present the highest and most improved accuracies. With dpNPW, the absolute localisation accuracy improved, with an average localisation error of 32 m across these NDLs. In addition, a lower variation was observed compared to HyDiLLEch-1. Furthermore, the average localisation at the extreme nodes ( n 1 and n 6 ) is slightly reduced. The results from the extreme nodes in both versions are kept potentially filterable at the fog layer. In the case of failures, the results from these nodes nonetheless give an average localisation error ranging between 230 and 367 m on the 20-km pipeline that we used. Furthermore, HyDiLLEch-1 and HyDiLLEch-2 showed significant improvements in NDL (up to 6) compared to 1 NDL for the centralised versions.
Finally, we note that the hybrid technique is loosely coupled to ensure the resilience of DAL in addition to enhancing the tolerance to SPOFs. This is particularly interesting in situations where performance-influencing factors, such as communication failure, node failure, and others, may be particularly detrimental to the information utilised for each localisation technique.

5.3. Communication Efficiency

The LDTs are analysed based on their communication efficiency by considering the communication costs, such as the number of packets, and the energy consumption. The obtained results are discussed in the following subsections.

5.3.1. Communication Overhead

The total number of exchanged packets for the DAL process in each LDT is shown in Figure 16. In the case of the classical LDTs (NPWM and GM), this incorporates the information between the sensors and the gateways and represents the information shared among NDLs for HyDiLLEch-1 and HyDiLLEch-2. The results depict the highest number of exchanged packets for the NPWM, while the GM depicts the lowest number of exchanges. Both HyDiLLEch-1 and HyDiLLEch-2 have a communication overhead of 50 % and 60 % , respectively, compared to GM. However, this result is more efficient compared to the classical NPWM, with a complementary increment of NDL.

5.3.2. Energy Consumption

The energy consumption evaluation for each LDT is based on the sampling rate used by each sensor as well as the radio energy consumption of the network duty cycle. Hence, the energy model is the sum of the energy consumption in different states, such as sensing, transmission, reception, sleep, and idle states based on the NS3 Wi-Fi energy model.
Figure 17 presents the energy consumption per sensor. NPWM, as shown in the figure, has the highest energy consumption because of its higher sampling compared to the other LDTs. The combination of data used by HyDiLLEch, including the separation of the detection and localisation phase (as discussed in Section 4.2), significantly decreases the energy consumption. With this, the sampling rate for the NDLs used in enhancing the localisation is less than 2 % of the NPWM sampling rate and results in slightly better accuracy.
In Figure 18, we zoom into the energy consumption of GM and the two versions of HyDiLLEch to better understand the impact of the separation of the DAL phases. While GM still maintains a lower energy consumption, the overhead accrued by HyDiLLEch-1 and HyDiLLEch-2 is minimal considering the improvement in the localisation accuracy.
Analysis of the radio energy consumption rate of the network devices per duty cycle is also conducted. Figure 19 shows the most significant changes in energy consumption in the first two cycles, which is due to the varying connection requirements for the participating nodes in the compared LDT. Subsequently, the energy consumption converges in the cycles after the connections are established.
Figure 20 shows the cumulative energy consumption for each LDT. When compared to NPWM, the total energy consumed is reduced by 86 % and 83 % for HyDiLLEch-1 and HyDiLLEch-2, respectively, in the first cycle. However, an increment of 6–7% is observed as the overhead compared to GM, but the rate of increment is similar as the cycle increases.

6. Conclusions

In this work, we presented a systematic approach to the design, development, and analysis of an IoT-based system for monitoring crude oil pipelines. We also introduced a new LDT, i.e., HyDiLLEch, which is based on several classical LDTs (GM, PPA, and NPWM) and is implemented on a unique node placement strategy for the distributed detection and localisation of leakages. The optimal distance between the sensors based on the node fluid propagation-based node placement is experimentally determined as 1000 m. This distance ensures sensitivity and accurate detection of multi-sized leakages, especially small leakages with minimal cost overhead. HyDiLLEch successfully eliminates SPOFs associated with centralised systems by increasing the number of NDLs to four and six for the single and double-hop versions of the algorithm, respectively. In addition, the accuracy of DAL in the nodes closest to the leak point is improved by an average of 15 m (ranging between 0 and 32 m) with minimised energy consumption and communication overhead. While the energy consumption is considerably reduced compared to NPWM, there is still an overhead when both algorithms are compared to the GM. Hence, the first aspect of future work will be to implement data prioritisation at the sensor layer. This could further reduce energy consumption by sharing only highly prioritised data. In addition, while we have shown that HyDiLLEch removes SPOFs, we have not tested its performance in the presence of failures. Thus, the other aspect of future work will include the introduction of different kinds of failures, such as node failures, communication failures, and others in the system. The aim is to carry out a performance analysis of the system in the presence of these failures and to determine possible areas of improvement.

Author Contributions

Conceptualization, S.A., F.L.M., N.S. and G.L.K.; methodology, S.A., F.L.M., N.S. and G.L.K.; software, S.A.; validation, S.A., F.L.M. and N.S.; investigation, S.A., F.L.M. and N.S.; resources, S.A.; data curation, S.A.; writing—original draft preparation, S.A., F.L.M. and N.S.; writing—review and editing, S.A., F.L.M., N.S. and G.L.K.; visualization, S.A., F.L.M. and N.S.; supervision, F.L.M. and N.S.; project administration, F.L.M.; funding acquisition, S.A. and F.L.M. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Petroleum Technology Development Fund (PTDF) 18/GFC/PHD/047.

Data Availability Statement

Restrictions apply to the availability of these data. Data was obtained from the Department of Petroleum Resources with a non-disclosure agreement and are not publicly available.

Conflicts of Interest

The authors declare no conflict of interest.

List of Acronyms/Abbreviations

3GPP3rd Generation Partnership Project
BLEBluetooth Low Energy
CFDComputational Fluid Dynamics
DALDetection and Localisation
GAGreedy Approximation
GMGradient-based Method
HyDiLLEchHybrid Distributed Leakage Detection and Localisation Technique
IoTInternet of Things
LDMSLeak Detection and Monitoring System
LDTLeakage Detection Technique
LoRaWANLong Range Wide Area Network
LPWANLow Power Wide Area Network
MIOMixed Integer Optimisation
MIPMixed Integer Programming
MTCMinimum Test Cover
NB-IoTNarrowband Internet of Things
NDLNodes Detecting and Localising Leakages
NPWNegative Pressure Wave
N P W d s Negative Pressure Wave Detecting Sensor
N P W m d d Negative Pressure Wave Maximum Detecting Distance
NPWMNegative Pressure Wave Method
OGIOil and Gas Industry
OLSOil Leakages and Spills
PGPressure Gradient
PIGPipeline Inspection Gauges
PODPlace of Deployment
PPAPressure Point Analysis
RFIDRadio Frequency Identification
RGARobust Greedy Approximation
RMIORobust Mixed Integer Optimisation
SCADASupervisory Control and Data Acquisition
SPOFSingle Point of Failure
UAVUnmanned Aerial Vehicles
WSNWireless Sensor Networks

References

  1. Ambituuni, A.; Hopkins, P.; Amezaga, J.; Werner, D.; Wood, J. Risk Assessment of a Petroleum Product Pipeline in Nigeria: The Realities of Managing Problems of Theft/Sabotage. In Safety and Security Engineering; Brebia, C., Garzia, F., Poljak, D., Eds.; WIT Transactions on the Built Environment; WIT Press: Southampton, UK, 2015; Volume VI, pp. 49–50. [Google Scholar] [CrossRef]
  2. Rashid, S.; Akram, U.; Qaisar, S.; Khan, S.A.; Felemban, E. Wireless Sensor Network for Distributed Event Detection Based on Machine Learning. In Proceedings of the 2014 IEEE International Conference on Internet of Things (iThings), and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom), Taipei, Taiwan, 1–3 September 2014; pp. 540–545. [Google Scholar] [CrossRef]
  3. PHMSA. Pipeline Failure Causes; Technical Report; U.S. Department of Transportation: Washington, DC, USA, 2019.
  4. Slaughter, A.; Bean, G.; Mittal, A. Connected Barrels: Transforming Oil and Gas Strategies with the Internet of Things; Technical Report; Deloitte Center for Energy Solutions: London, UK, 2015. [Google Scholar]
  5. Sheltami, T.R.; Bala, A.; Shakshuki, E.M. Wireless sensor networks for leak detection in pipelines: A survey. J. Ambient Intell. Humanised Comput. 2016, 7, 347–356. [Google Scholar] [CrossRef]
  6. SPDCN. Security, Theft, Sabotage and Spills; Technical Report; Shell Petroleum Development Company of Nigeria Limited: Abuja, Nigeria, 2017. [Google Scholar]
  7. Khan, W.Z.; Aalsalem, M.Y.; Khan, M.K.; Hossain, M.S.; Atiquzzaman, M. A reliable Internet of Things based architecture for oil and gas industry. In Proceedings of the 19th International Conference on Advanced Communication Technology (ICACT), Pyeongchang, Republic of Korea, 19–22 February 2017; pp. 705–710. [Google Scholar] [CrossRef]
  8. Shoja, S.; Jalali, A. A study of the Internet of Things in the oil and gas industry. In Proceedings of the 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI), Tehran, Iran, 22 December 2017; pp. 0230–0236. [Google Scholar] [CrossRef]
  9. Aalsalem, M.Y.; Khan, W.Z.; Gharibi, W.; Khan, M.K.; Arshad, Q. Wireless Sensor Networks in oil and gas industry: Recent advances, taxonomy, requirements, and open challenges. J. Netw. Comput. Appl. 2018, 113, 87–97. [Google Scholar] [CrossRef]
  10. Kim, J.; Sharma, G.; Boudriga, N.; Iyengar, S.S. SPAMMS: A sensor-based pipeline autonomous monitoring and maintenance system. In Proceedings of the 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010), Bangalore, India, 5–9 January 2010; pp. 1–10. [Google Scholar] [CrossRef]
  11. Sadeghioon, A.M.; Metje, N.; Chapman, D.N.; Anthony, C.J. SmartPipes: Smart Wireless Sensor Networks for Leak Detection in Water Pipelines. J. Sens. Actuator Netw. 2014, 3, 64–78. [Google Scholar] [CrossRef]
  12. Henry, N.F.; Henry, O.N. Wireless Sensor Networks based Pipeline Vandalisation and Oil Spillage Monitoring and Detection: Main Benefits for Nigeria Oil and Gas Sectors. SIJ Trans. Comput. Sci. Eng. Appl. 2015, 3, 1–6. [Google Scholar]
  13. Yu, H.; Guo, M. An efficient oil and gas pipeline monitoring systems based on wireless sensor networks. In Proceedings of the International Conference on Information Security and Intelligent Control, Yunlin, Taiwan, 14–16 August 2012; pp. 178–181. [Google Scholar] [CrossRef]
  14. Ostapkowicz, P. Leak detection in liquid transmission pipelines using simplified pressure analysis techniques employing a minimum of standard and non-standard measuring devices. Eng. Struct. 2016, 113, 194–205. [Google Scholar] [CrossRef]
  15. Ahmed, S.; Mouel, F.L.; Stouls, N. Resilient IoT-based Monitoring System for Crude Oil Pipelines. In Proceedings of the 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Paris, France, 14–16 December 2020. [Google Scholar] [CrossRef]
  16. Ahmed, S.; Mouël, F.L.; Stouls, N.; Kouyi, G.L. HyDiLLEch: A WSN-based Distributed Leak Detection and Localisation in Crude Oil Pipelines. In Proceedings of the 45th International Conference on Advanced Information Networking and Applications (AINA-2020), Toronto, ON, Canada, 12–14 May 2021. [Google Scholar] [CrossRef]
  17. Ahmed, S. Resilient IoT-Based Monitoring System for the Nigerian Oil and Gas Industry. Ph.D. Thesis, Institut National des Sciences Appliquées (INSA De Lyon), Lyon, France, 2022. [Google Scholar]
  18. Na, S.Y.; Shin, D.; Kim, J.Y.; Baek, S.J.; Lee, B.H. Pipelines Monitoring System Using Bio-mimeticRobots. Int. J. Electr. Electron. Commun. Sci. 2009, 3, 508–514. [Google Scholar]
  19. Sujatha, R.; Hariprasad, P.P. Robot based Smart Water Pipeline Monitoring System. IOP Conf. Ser. Mater. Sci. Eng. 2020, 906, 012025. [Google Scholar] [CrossRef]
  20. Beushausen, R.; Tornow, S.; Borchers, H.; Murphy, K.; Zhang, D.J. Transient Leak Detection in Crude Oil Pipelines. In Proceedings of the International Pipeline Conference, Calgary, AB, Canada, 4–8 October 2004. [Google Scholar]
  21. Santos, A.; Younis, M. A sensor network for non-intrusive and efficient leak detection in long pipelines. In Proceedings of the 2011 IFIP Wireless Days (WD), Niagara Falls, ON, Canada, 10–12 October 2011; pp. 1–6. [Google Scholar] [CrossRef]
  22. Karray, F.; Garcia-Ortiz, A.; Jmal, M.W.; Obeid, A.M.; Abid, M. EARNPIPE: A Testbed for Smart Water Pipeline Monitoring Using Wireless Sensor Network. Procedia Comput. Sci. 2016, 96, 285–294. [Google Scholar] [CrossRef]
  23. Kostianoy, A.; Solovyov, D. Operational satellite monitoring systems for marine oil and gas industry. In Proceedings of the 2010 Taiwan Water Industry Conference, Tainan, Taiwan, 28–29 October 2010; pp. 28–29. [Google Scholar]
  24. Kostianoy, A.G.; Lavrova, O.Y.; Mityagina, M.I.; Solovyov, D.M. Satellite monitoring of the Nord Stream gas pipeline construction in the Gulf of Finland. In Oil Pollution in the Baltic Sea; Springer: Berlin/Heidelberg, Germany, 2012; pp. 221–248. [Google Scholar]
  25. Kostianoy, A.; Bulycheva, E.; Semenov, A.; Krainyukov, A. Satellite monitoring systems for shipping and offshore oil and gas industry in the baltic sea. Transp. Telecommun. 2015, 16, 117. [Google Scholar] [CrossRef]
  26. Smith, A. Gas pipeline monitoring in Europe by satellite SAR. In Remote Sensing for Environmental Monitoring, GIS Applications, and Geology II; SPIE: Bellingham, WA, USA, 2003; Volume 4886, pp. 257–267. [Google Scholar]
  27. Dedikov, E.; Khrenov, N.; Lukyaschenko, V.; Salikhov, R.; Ponomarev, A.; Ovchinnikov, M.; Rodionov, I. The Russian small satellite for hyperspectral monitoring of gas pipelines. In Proceedings of the Digest of 3rd International Symposium International Academy of Astronautics, Berlin, Germany, 2–6 April 2001; pp. 235–239. [Google Scholar]
  28. Yunana, K.; Adewale, S.O.; Alfa, A.A.; Sanjay, M. An Exploratory Study of Techniques for Monitoring Oil Pipeline Vandalism. Covenant J. Eng. Technol. 2017, 1, 59–67. [Google Scholar]
  29. Azubogu, A.C.; Idigo, V.E.; Nnebe, S.U.; Oguejiofor, O.S.; Simon, E. Wireless Sensor Networks for Long Distance Pipeline Monitoring. Int. J. Electr. Comput. Energetic Electron. Commun. Eng. 2013, 7, 285–289. [Google Scholar]
  30. Yelmarthi, K.; Abdelgawad, A.; Khattab, A. An architectural framework for low-power IoT applications. In Proceedings of the 2016 28th International Conference on Microelectronics (ICM), Giza, Egypt, 17–20 December 2016; pp. 373–376. [Google Scholar] [CrossRef]
  31. Berry, J.; Hart, W.E.; Phillips, C.A.; Uber, J.G.; Watson, J.P. Sensor Placement in Municipal Water Networks with Temporal Integer Programming Models. J. Water Resour. Plan. Manag. 2006, 132, 218–224. [Google Scholar] [CrossRef]
  32. Perelman, L.S.; Abbas, W.; Koutsoukos, X.; Amin, S. Sensor placement for fault location identification in water networks: A minimun test approach. Automatica 2016, 72, 166–176. [Google Scholar] [CrossRef]
  33. Sela, L.; Amin, S. Robust sensor placement for pipeline monitoring: Mixed integer and greedy optimization. Adv. Enginnering Inform. 2018, 36, 55–63. [Google Scholar] [CrossRef]
  34. Krause, A.; Leskovec, J.; Guestrin, C.; VanBriesen, J.; Faloutsos, C. Efficient Sensor Placement Optimization for Securing Large Water Distribution Networks. J. Water Resour. Plan. Manag. 2008, 134, 516–526. [Google Scholar] [CrossRef]
  35. Sarrate, R.; Nejjari, F.; Rosich, A. Sensor placement for fault diagnosis performance maximization in Distribution Networks. In Proceedings of the 2012 20th Mediterranean Conference on Control Automation (MED), Barcelona, Spain, 3–6 July 2012; pp. 110–115. [Google Scholar] [CrossRef]
  36. Guo, Y.; Kong, F.; Zhu, D.; Saman Tosun, A.; Deng, Q. Sensor placement for lifetime maximization in monitoring oil pipelines. In Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems, ICCPS’10, Stockholm, Sweden, 13–15 April 2010. [Google Scholar] [CrossRef]
  37. Elnaggar, O.E.; Ramadan, R.A.; Fayek, M.B. WSN in Monitoring Oil Pipelines Using ACO and GA. Procedia Comput. Sci. 2015, 52, 1198–1205. [Google Scholar] [CrossRef]
  38. Albaseer, A.; Baroudi, U. Cluster-Based Node Placement Approach for Linear Pipeline Monitoring. IEEE Access 2019, 7, 92388–92397. [Google Scholar] [CrossRef]
  39. Li, R.; Wenting, M.; Huang, N.; Kang, R. Deployment-based lifetime optimization for linear wireless sensor networks considering both retransmission and discrete power control. PLoS ONE 2017, 12, e0188519. [Google Scholar] [CrossRef]
  40. Sadeghioon, A.M.; Metje, N.; Chapman, D.; Anthony, C. Water pipeline failure detection using distributed relative pressure and temperature measurements and anomaly detection algorithms. Urban Water J. 2018, 15, 287–295. [Google Scholar] [CrossRef]
  41. Saeed, H.; Ali, S.; Rashid, S.; Qaisar, S.; Felemban, E. Reliable monitoring of oil and gas pipelines using wireless sensor network (WSN) — REMONG. In Proceedings of the 2014 9th International Conference on System of Systems Engineering (SOSE), Glenelg, Australia, 9–13 June 2014; pp. 230–235. [Google Scholar] [CrossRef]
  42. Mahmoud, M.S.; Mohamad, A.A.H. A Study of Efficient Power Consumption Wireless Communication Techniques/ Modules for Internet of Things (IoT) Applications. Adv. Internet Things 2016, 6, 19–29. [Google Scholar] [CrossRef]
  43. IoT device standards. In Proceedings of the 2014 IEEE Hot Chips 26 Symposium (HCS), Cupertino, CA, USA, 10–12 August 2014; pp. 1–37. [CrossRef]
  44. Kais, M.; Eddy, B.; Frederic, C.; Fernand, M. A comparative study of LPWAN technologies for large-scale IoT deployment. ICT Express 2019, 5, 1–7. [Google Scholar] [CrossRef]
  45. Wendt, J.F. Computational Fluid Dynamics: An Introduction; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2008. [Google Scholar]
  46. Equations of State. In Developments in Petroleum Science; Elsevier: Amsterdam, The Netherlands, 1998; pp. 129–166. [CrossRef]
  47. Henrie, M.; Carpenter, P.; Nicholas, R.E. Chapter 4-Real-Time Transient Model–Based Leak Detection. In Pipeline Leak Detection Handbook; Henrie, M., Carpenter, P., Nicholas, R.E., Eds.; Gulf Professional Publishing: Boston, MA, USA, 2016; pp. 57–89. [Google Scholar] [CrossRef]
  48. Sowinski, J.; Dziubinski, M. Analysis of the impact of pump system control on pressure gradients during emergency leaks in pipelines. E3S Web Conf. 2018, 44, 00166. [Google Scholar] [CrossRef]
  49. Lu, H.; Iseley, T.; Behbahani, S.; Fu, L. Leakage detection techniques for oil and gas pipelines: State-of-the-art. Tunn. Undergr. Space Technol. 2020, 98, 103249. [Google Scholar] [CrossRef]
  50. Stouffs, P.; Giot, M. Pipeline leak detection based on mass balance: Importance of the packing term. J. Loss Prev. Process Ind. 1993, 6, 307–312. [Google Scholar] [CrossRef]
  51. Bai, Y.; Bai, Q. Leak Detection Systems. In Subsea Pipeline Integrity and Risk Management; Elsevier: Amsterdam, The Netherlands, 2014; pp. 125–143. [Google Scholar] [CrossRef]
  52. Tian, C.H.; Yan, J.C.; Huang, J.; Wang, Y.; Kim, D.S.; Yi, T. Negative pressure wave based pipeline Leak Detection: Challenges and algorithms. In Proceedings of the 2012 IEEE International Conference on Service Operations and Logistics, and Informatics, Suzhou, China, 8–10 July 2012; pp. 372–376. [Google Scholar] [CrossRef]
  53. Wan, J.; Yu, Y.; Wu, Y.; Feng, R.; Yu, N. Hierarchical Leak Detection and Localization Method in Natural Gas Pipeline Monitoring Sensor Networks. Sensors 2012, 12, 189–214. [Google Scholar] [CrossRef] [PubMed]
  54. Jamali-Rad, H.; Campman, X.; MacKay, I.; Walk, W.; Beker, M.; van den Brand, J.; Jan Bulten, H.; van Beveren, V. IoT-based wireless seismic quality control. Lead. Edge 2018, 37, 214–221. [Google Scholar] [CrossRef]
  55. Henesy, J.; Patterson, D. Computer Architecture: A Quantitative Approach; Morgan Kaufmann Publishers: Burlington, MA, USA, 2017. [Google Scholar]
  56. Fahmida, S.; Modekurthy, V.P.; Ismail, D.; Jain, A.; Saifullah, A. Real-Time Communication over LoRa Networks. In Proceedings of the 2022 IEEE/ACM Seventh International Conference on Internet-of-Things Design and Implementation (IoTDI), Milano, Italy, 4–6 May 2022; pp. 14–27. [Google Scholar] [CrossRef]
  57. Klimiashvili, G.; Tapparello, C.; Heinzelman, W. LoRa vs. Wi-Fi Ad Hoc: A Performance Analysis and Comparison. In Proceedings of the 2020 International Conference on Computing, Networking and Communications (ICNC), Big Island, HI, USA, 17–20 February 2020; pp. 654–660. [Google Scholar] [CrossRef]
Figure 1. Wireless communication technologies [42].
Figure 1. Wireless communication technologies [42].
Sensors 23 04298 g001
Figure 2. Steady fluid transmission in a pipeline.
Figure 2. Steady fluid transmission in a pipeline.
Sensors 23 04298 g002
Figure 3. Leakage effects on the pressure gradient and NPW generation.
Figure 3. Leakage effects on the pressure gradient and NPW generation.
Sensors 23 04298 g003
Figure 4. Pressure point measurements in a pipeline.
Figure 4. Pressure point measurements in a pipeline.
Sensors 23 04298 g004
Figure 5. The pressure gradient distribution after a leak.
Figure 5. The pressure gradient distribution after a leak.
Sensors 23 04298 g005
Figure 6. Negative pressure wave generated by a leak.
Figure 6. Negative pressure wave generated by a leak.
Sensors 23 04298 g006
Figure 7. Network architecture.
Figure 7. Network architecture.
Sensors 23 04298 g007
Figure 8. Network architecture with communication protocols.
Figure 8. Network architecture with communication protocols.
Sensors 23 04298 g008
Figure 9. Sensor placement on long transmission crude oil pipelines.
Figure 9. Sensor placement on long transmission crude oil pipelines.
Sensors 23 04298 g009
Figure 10. Event coverage on the proposed architecture.
Figure 10. Event coverage on the proposed architecture.
Sensors 23 04298 g010
Figure 11. Detection and localisation of leakages.
Figure 11. Detection and localisation of leakages.
Sensors 23 04298 g011
Figure 12. Detectability of leakages by the number of sensors and distance.
Figure 12. Detectability of leakages by the number of sensors and distance.
Sensors 23 04298 g012
Figure 13. Average localisation accuracy of classical NPWM and GM.
Figure 13. Average localisation accuracy of classical NPWM and GM.
Sensors 23 04298 g013
Figure 14. HyDiLLEch-1 average localisation accuracy by NDLs.
Figure 14. HyDiLLEch-1 average localisation accuracy by NDLs.
Sensors 23 04298 g014
Figure 15. HyDiLLEch-2 average localisation accuracy by NDL.
Figure 15. HyDiLLEch-2 average localisation accuracy by NDL.
Sensors 23 04298 g015
Figure 16. Communication overhead by the number of packets.
Figure 16. Communication overhead by the number of packets.
Sensors 23 04298 g016
Figure 17. Sampling energy consumption of the sensors.
Figure 17. Sampling energy consumption of the sensors.
Sensors 23 04298 g017
Figure 18. Sampling energy consumption of the LDTs with separated DAL phases.
Figure 18. Sampling energy consumption of the LDTs with separated DAL phases.
Sensors 23 04298 g018
Figure 19. Radio energy consumption.
Figure 19. Radio energy consumption.
Sensors 23 04298 g019
Figure 20. Cumulative energy consumption.
Figure 20. Cumulative energy consumption.
Sensors 23 04298 g020
Table 1. Pipeline and oil characteristics.
Table 1. Pipeline and oil characteristics.
Pipeline/Oil CharacteristicsValue/Type
MaterialCarbon Steel
Pipeline Length (L)20 km
Wall thickness (w)0.323 m
Inside diameter (d)0.61 m
Height/elevation (z)0 m
Oil kinetic viscosity2.90 mm 2 /s
Temperature50 C
Oil density ( ρ )837 kg/m 3
Inlet pressure ( P 0 )1000 psi
Reynolds no ( R e )1950
Velocity (V)2 m/s
Molecular Mass (m)229
Oil elasticity (K) 1.85 × 10 5 psi
Carbon steel elasticity (Y) 3 × 10 6 psi
Gravitational force (g)9.81 m/s 2
Constant (e) 2.718
Coefficient of friction ( λ ) 0.033
Wave speed (c)14.1 m/s
Table 2. Network simulation parameters.
Table 2. Network simulation parameters.
Network ParametersValue/Type
Number of sensors21
Number of gateways1
PHY/MAC model802.11ax Ad hoc
Transmit power80 dBm
Transmit distance20 km
Error modelYANS
Propagation LossLog-distance
Path Loss ( L 0 )46.67 dB
Reference distance ( d 0 )1 m
Path-Loss Exponent ( σ ) 3.0
Packet size32 bytes
Data rate1 Kbps
Distance between sensors1 km
Duty cycle 70 %
Low Frequencys
High Frequencyms
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ahmed, S.; Le Mouël, F.; Stouls, N.; Lipeme Kouyi, G. Development and Analysis of a Distributed Leak Detection and Localisation System for Crude Oil Pipelines. Sensors 2023, 23, 4298. https://doi.org/10.3390/s23094298

AMA Style

Ahmed S, Le Mouël F, Stouls N, Lipeme Kouyi G. Development and Analysis of a Distributed Leak Detection and Localisation System for Crude Oil Pipelines. Sensors. 2023; 23(9):4298. https://doi.org/10.3390/s23094298

Chicago/Turabian Style

Ahmed, Safuriyawu, Frédéric Le Mouël, Nicolas Stouls, and Gislain Lipeme Kouyi. 2023. "Development and Analysis of a Distributed Leak Detection and Localisation System for Crude Oil Pipelines" Sensors 23, no. 9: 4298. https://doi.org/10.3390/s23094298

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop