IDEAS home Printed from https://ideas.repec.org/a/gam/jeners/v13y2020i6p1512-d335702.html
   My bibliography  Save this article

A Novel Risk-Based Prioritization Approach for Wireless Sensor Network Deployment in Pipeline Networks

Author

Listed:
  • Xiaojian Yi

    (School of Mechatronical Engineering, Beijing Institute of Technology, Beijing 100081, China
    Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing 100190, China)

  • Peng Hou

    (School of Mechatronical Engineering, Beijing Institute of Technology, Beijing 100081, China)

  • Haiping Dong

    (School of Mechatronical Engineering, Beijing Institute of Technology, Beijing 100081, China)

Abstract

In the face of increased spatial distribution and a limited budget, monitoring critical regions of pipeline network is looked upon as an important part of condition monitoring through wireless sensor networks. To achieve this aim, it is necessary to target critical deployed regions rather than the available deployed ones. Unfortunately, the existing approaches face grave challenges due to the vulnerability of identification to human biases and errors. Here, we have proposed a novel approach to determine the criticality of different deployed regions by ranking them based on risk. The probability of occurrence of the failure event in each deployed region is estimated by spatial statistics to measure the uncertainty of risk. The severity of risk consequence is measured for each deployed region based on the total cost caused by failure events. At the same time, hypothesis testing is used before the application of the proposed approach. By validating the availability of the proposed approach, it provides a strong credible basis and the falsifiability for the analytical conclusion. Finally, a case study is used to validate the feasibility of our approach to identify the critical regions. The results of the case study have implications for understanding the spatial heterogeneity of the occurrence of failure in a pipeline network. Meanwhile, the spatial distribution of risk uncertainty is a useful priori knowledge on how to guide the random deployment of wireless sensors, rather than adopting the simple assumption that each sensor has an equal likelihood of being deployed at any location.

Suggested Citation

  • Xiaojian Yi & Peng Hou & Haiping Dong, 2020. "A Novel Risk-Based Prioritization Approach for Wireless Sensor Network Deployment in Pipeline Networks," Energies, MDPI, vol. 13(6), pages 1-15, March.
  • Handle: RePEc:gam:jeners:v:13:y:2020:i:6:p:1512-:d:335702
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1996-1073/13/6/1512/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1996-1073/13/6/1512/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Peter J. Diggle & Barry S. Rowlingson, 1994. "A Conditional Approach to Point Process Modelling of Elevated Risk," Journal of the Royal Statistical Society Series A, Royal Statistical Society, vol. 157(3), pages 433-440, May.
    2. Henry H. Willis, 2007. "Guiding Resource Allocations Based on Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 597-606, June.
    3. P. Sprent, 2007. "An Introduction to Categorical Data Analysis," Journal of the Royal Statistical Society Series A, Royal Statistical Society, vol. 170(4), pages 1178-1178, October.
    4. Barbara Tchórzewska-Cieślak & Katarzyna Pietrucha-Urbanik, 2018. "Approaches to Methods of Risk Analysis and Assessment Regarding the Gas Supply to a City," Energies, MDPI, vol. 11(12), pages 1-13, November.
    5. Marlow, David R. & Beale, David J. & Mashford, John S., 2012. "Risk-based prioritization and its application to inspection of valves in the water sector," Reliability Engineering and System Safety, Elsevier, vol. 100(C), pages 67-74.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Agnieszka Kuś & Dorota Grego-Planer, 2021. "A Model of Innovation Activity in Small Enterprises in the Context of Selected Financial Factors: The Example of the Renewable Energy Sector," Energies, MDPI, vol. 14(10), pages 1-17, May.
    2. Rogerson, Ellen C. & Lambert, James H., 2012. "Prioritizing risks via several expert perspectives with application to runway safety," Reliability Engineering and System Safety, Elsevier, vol. 103(C), pages 22-34.
    3. Alberti, Alexandre R. & Cavalcante, Cristiano A.V. & Scarf, Philip & Silva, André L.O., 2018. "Modelling inspection and replacement quality for a protection system," Reliability Engineering and System Safety, Elsevier, vol. 176(C), pages 145-153.
    4. Terje Aven, 2012. "Foundational Issues in Risk Assessment and Risk Management," Risk Analysis, John Wiley & Sons, vol. 32(10), pages 1647-1656, October.
    5. Jon T Selvik & Eirik B Abrahamsen, 2017. "On the meaning of accuracy and precision in a risk analysis context," Journal of Risk and Reliability, , vol. 231(2), pages 91-100, April.
    6. Kabir, Golam & Tesfamariam, Solomon & Francisque, Alex & Sadiq, Rehan, 2015. "Evaluating risk of water mains failure using a Bayesian belief network model," European Journal of Operational Research, Elsevier, vol. 240(1), pages 220-234.
    7. Gregory S. Parnell & Christopher M. Smith & Frederick I. Moxley, 2010. "Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model," Risk Analysis, John Wiley & Sons, vol. 30(1), pages 32-48, January.
    8. Cucala, Lionel, 2009. "A flexible spatial scan test for case event data," Computational Statistics & Data Analysis, Elsevier, vol. 53(8), pages 2843-2850, June.
    9. Michael Greenberg, 2011. "Risk analysis and port security: some contextual observations and considerations," Annals of Operations Research, Springer, vol. 187(1), pages 121-136, July.
    10. Yacov Y. Haimes & Kenneth Crowther & Barry M. Horowitz, 2008. "Homeland security preparedness: Balancing protection with resilience in emergent systems," Systems Engineering, John Wiley & Sons, vol. 11(4), pages 287-308, December.
    11. Sumitra Sri Bhashyam & Gilberto Montibeller, 2016. "In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 666-680, April.
    12. Hui Huang & Xiaomei Ma & Rasmus Waagepetersen & Theodore R. Holford & Rong Wang & Harvey Risch & Lloyd Mueller & Yongtao Guan, 2014. "A New Estimation Approach for Combining Epidemiological Data From Multiple Sources," Journal of the American Statistical Association, Taylor & Francis Journals, vol. 109(505), pages 11-23, March.
    13. Ruipeng Tong & Yanwei Zhang & Pengcheng Cui & Cunli Zhai & Meng Shi & Surui Xu, 2018. "Characteristic Analysis of Unsafe Behavior by Coal Miners: Multi-Dimensional Description of the Pan-Scene Data," IJERPH, MDPI, vol. 15(8), pages 1-18, July.
    14. Nelson B. Walker & Trevor J. Hefley & Daniel P. Walsh, 2020. "Bias correction of bounded location error in binary data," Biometrics, The International Biometric Society, vol. 76(2), pages 530-539, June.
    15. Marco Cinelli & Matteo Spada & Miłosz Kadziński & Grzegorz Miebs & Peter Burgherr, 2019. "Advancing Hazard Assessment of Energy Accidents in the Natural Gas Sector with Rough Set Theory and Decision Rules," Energies, MDPI, vol. 12(21), pages 1-17, November.
    16. Chong Li & Yingqi Li, 2023. "Factors Influencing Public Risk Perception of Emerging Technologies: A Meta-Analysis," Sustainability, MDPI, vol. 15(5), pages 1-37, February.
    17. Bier, Vicki & Gutfraind, Alexander, 2019. "Risk analysis beyond vulnerability and resilience – characterizing the defensibility of critical systems," European Journal of Operational Research, Elsevier, vol. 276(2), pages 626-636.
    18. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    19. Robin L. Dillon & Robert M. Liebe & Thomas Bestafka, 2009. "Risk‐Based Decision Making for Terrorism Applications," Risk Analysis, John Wiley & Sons, vol. 29(3), pages 321-335, March.
    20. Han, Lin & Zhao, Xudong & Chen, Zhilong & Gong, Huadong & Hou, Benwei, 2021. "Assessing resilience of urban lifeline networks to intentional attacks," Reliability Engineering and System Safety, Elsevier, vol. 207(C).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jeners:v:13:y:2020:i:6:p:1512-:d:335702. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.