Critically Speaking

Flexible solution for IP video transmission can secure challenging infrastructure sites

Critical infrastructure organizations are essential to the functioning of societies and economies. The role of these facilities in international commerce makes their security a top priority. But given the complex and often geographically dispersed nature of these facilities and assets, critical infrastructure security often presents a daunting challenge. Whether you’re providing security for a bridge, water treatment facility or seaport, safeguarding critical infrastructure using video surveillance technology is virtually impossible due to the widespread geographic perimeters these facilities encompass. Running cable in open waterways, rail yards, indoor and outdoor facilities, and roadway systems is usually cost-prohibitive and impractical. This can make it very difficult to efficiently and effectively monitor critical infrastructure environments.

A Powerful Solution
Recently, critical infrastructure security managers have realized the benefits of wireless video solutions for improved security management. Wireless technologies for critical infrastructure applications feature resilient system design, integrated video analytics and intelligent video distribution.

Wireless transmission of IP video creates a robust, flexible solution for security organizations looking to extend surveillance networks to hard-to-reach locations. By leveraging an integrated portfolio of wireline and wireless networked video solutions, security managers in these environments experience lower deployment and maintenance costs with increased functionality.

Furthermore, combining wireless networking technologies with analytics-enabled edge devices allows critical infrastructure security managers to capture images from virtually everywhere inside the perimeter and transmit those images to stationary command centers or mobile devices. For example, a port authority might choose to deploy wireless video cameras on harbor buoys to capture images of ships as they enter a shipping channel. Those images can be transmitted simultaneously from the open waterway to multiple stationary monitoring centers and to security patrol cars and vessels.

By integrating wireless technology into a broad networked video strategy, critical infrastructure organizations are enhancing security and operational effectiveness without incurring additional costs of building out network infrastructure.

Feeding Wireless Video
To get a solid understanding of how wireless technology works in a security environment, let’s review the basic wireless standards, as well as how wireless video feeds are secured and transmitted.

There are three main wireless technology standards commonly used in critical infrastructure video networks—WiFi, WiMax and mesh networking. Each technology offers advantages for certain applications but varies in cost. WiFi is perhaps the most commonly recognized and widely deployed wireless technology thanks to its adoption for personal computer networking in homes, small offices, airports and cafes. Also referred to as 802.11, which is the number assigned to the standard by the IEEE, the majority of WiFi technologies operate on unlicensed frequencies and are well-suited for close-range wireless video surveillance applications.

WiFi signals typically have a range of 150 feet for indoor applications and 300 feet in outdoor environments with data transmission speeds, also called bandwidth, of up to 24 MBps. At this data transfer rate, it is possible to have multiple analytics-enabled edge devices, including IP cameras and wireless video encoders, streaming video from access points on the network edge to a centralized monitoring station.

WiMax, IEEE standard 802.16, is a variation of WiFi technology designed to provide long-range wireless connectivity. WiMax networks offer connectivity at 45 MBps at a range of up to 10 miles, which makes it an ideal choice for some critical infrastructure applications. However, current commercially available WiMax solutions operate exclusively on licensed frequencies that can contribute to higher operational costs. The significantly extended range and higher bandwidth of WiMax technologies is well-suited for securing wide-area facilities that span several square miles such as ports, energy pipelines, transit lines and reservoirs.

The final form of wireless technology is called wireless mesh networking. This solution has received a lot of attention lately because of its ability to transmit data to and from mobile devices in moving patrol cars or on trains or buses. As the name indicates, mesh networks use a series of interwoven wireless signals to extend the reach of WiFi transmissions by creating a long-range backbone over which video data travels. Mesh networks are ideal for providing low bandwidth access to a large coverage area.

Securing the Network
Due to the sensitive nature of the assets being protected, the first concern many critical infrastructure security professionals raise about wireless video transmission relates to security. Since the network over which wireless video signals travel is literally thin air, it cannot be physically secured like a traditional coaxial or Ethernet cable. This gives many people the false impression that wireless technologies are highly vulnerable to attack. In actuality, with proper authentication and encryption technology, wireless transmission is equally, if not more, secure than wired networking media.

When securing critical infrastructure environments, it’s important to choose a wireless product that employs standard encryption and authentication protocols to ensure the highest level of privacy and security. Most enterprise-class wireless solutions incorporate these standards. Enterprise-class wireless solutions differ significantly from commercial-off-the-shelf products typically used in home or small office computer networks. Enterprise-class wireless solutions, designed for use in critical infrastructure video surveillance networks, are often ruggedized for operation in harsh outdoor conditions, including extreme heat, cold, rain and wind. This makes them resistant to tampering or vandalism.

In addition to their tough physical design, enterprise-class wireless technologies incorporate industry standard encryption and authentication technologies that far exceed the robustness of those found in COTS products. This ensures that wireless transmissions remain secure in transit while easily integrating with network video management platforms and other enterprise information technologies.

Transmitting Wireless Video
Along with security, the method of transmission of wireless video data is another key factor to consider in critical infrastructure environments. Wireless video signals travel over radio waves, or frequencies, to transmit data between devices without cables or cords. Higher powered signals often are used in critical infrastructure environments because of their ability to travel further distances and around greater obstacles than lower powered signals. High-powered transmissions usually require government licenses to broadcast, while low-powered transmissions are often unregulated.

Licensed frequencies are regulated by the Federal Communications Commission, and are for exclusive use by an organization in a specified geographic range. Licensed frequencies often are used in critical infrastructure applications to ensure that frequencies remain exclusive for use by security personnel, law enforcement agencies or first responders. In contrast, unlicensed frequencies are free but are open for use by anyone, which can sometimes lead to signal crossover. When deciding whether to use licensed or unlicensed frequencies, carefully consider factors such as the number of other wireless networks in close proximity, the distance over which wireless video signals will need to travel and the sensitive nature of the video being transmitted.

Technology and Analytics
A popular feature for consideration in most modern critical infrastructure video solutions is the use of video analytics. By embedding video analytics technology into wireless devices, vendors of intelligent edge devices are able to push video analytics out to the network edge. Devices such as wireless IP cameras or cameras connected to intelligent wireless video encoders sit on a wide-area security perimeter and only send back the most pertinent alarms and alerts. Wireless analytics at the edge allows critical infrastructure organizations to apply sophisticated analytics to high-quality video at the point of capture, which reduces false alarms while decreasing data transport and storage requirements. With wireless technology, organizations can simply and cost-effectively extend analytics across virtually every camera in the perimeter without the need to invest in physical wiring.

Critical infrastructure organizations often have highly diverse and complex security systems in place. In addition to traditional fire alarms and access control systems, a nuclear power facility may have sensors to detect the presence of leaking raditation. Airports also have a variety of complex access control systems to limit entry to sensitive areas including cargo handling facilities and the tarmac. Energy pipeline operators may have motion sensors deployed throughout miles of unmanned perimeter surrounding pumping facilities.

In order for wireless video solutions to provide value in these unique environments, they must integrate seamlessly with a variety of cameras, sensors and technologies. The adoption of open system design and industry standards allows for this seamless communication and information mobility between wireline and wireless network devices, video management platforms, access control systems, and other business and security systems. In addition to open standards, security managers should be looking for wireless solutions that come with robust software development kits. SDKs ensure that customized connections can be built between the wireless solution and any other networked device.

Adoption of wireless security solutions in critical infrastructure has been strong and will continue to be for many years. Security managers at these organizations must educate themselves on wireless capabilities to properly plan for the next generation of security networks. This knowledge will provide the foundation for choosing the right wireless products for specific organizational needs. Like any technology, one solution never fits all, and choosing the right wireless product will depend on that particular organization’s needs.

Featured

  • Making the Grade with Locks and Door Hardware

    Managing and maintaining locks and door hardware across a school district or university campus is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Knowing the basics of common door hardware, including locks, panic devices and door closers, can make a difference in daily operations and emergency situations. Read Now

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

Featured Cybersecurity

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3