Access Control System-case of Qatar Petroleum Port

  • Category:
  • Document type:
    Case Study
  • Level:
  • Page:
  • Words:


Access Control System-case of Qatar Petroleum Port

Table of Contents

Access Control System-case of Qatar Petroleum Port 3

Design Of The New Access Control System 6

Telecommunication Infrastructure 8

The Gate System 9

The License Plate Recognition Subsystem 10

Justification of the Design 11

Issues Related with the Implementation of the Project 13

Certification of Equipment 13

Substitution Of Equipment 13

Quality Assurance 14

Integration with other Systems 14

Assumptions 15

References 16

Access Control System-case of Qatar Petroleum Port

The security of a port currently draws substantial influence from integrated access control technology systems. Indeed, draw backs in the access control system translated to port lapses. Consequently, it is of much essence to come up with a design a reliable and efficient access control access system (Waltz, 1998). With the enforcing of new International Ship and Port Facility Security (ISPS) code, ports are required to be compliant with the ISPS standards with respect to access control and security in ports. Ports ought to design and thus developing access control systems with the capability of allowing their authorities to obtain a technological system adhering to the prescriptions of the law (Denning, 1999).

The technologies also ought to be capable of optimizing, reducing, and controlling the boarding flows and offering such essential services as centralized check-in service for the companies operating ships. It is thus essential to come up with automatic port access control systems that have the ability to manage goods flows, systems of security, and passengers with no comprise to the standards of security; the system should also have the ability to reduce time of access as compared to former systems. The new system ought to have the ability to reach the entrance bar and ticket printing opening time in less than 5 minutes. The new system for ports is also characteristic of automatic check-in functionalities-these features enable passengers to arrive directly at the boarding areas having not to pass via the ticket office (Nichols, R.K. & Lekkas, 2002). This reduces and optimizes he vehicle traffic flows within the port.

The access control system that will be designed for the petroleum port has connection with such other systems as Ship Companies, Port Operators, Police, Sea Guard, among others. This authorizes significant level of integration of every subject involved in the boarding processes and control procedures.

This report has a scope that analyzes the design of an advanced integrated control system with the case of Qatar Petroleum Port (Garzia, 2003). The design of the new system will be discussed from installation to implementation, touching on such aspects as barriers, credentials and Readers, locking devices, software, and control and communication layout. As a result of secrecy factors, the illustration of access control system will be in accordance to general philosophy design, with no illustration of specific details that have the ability to compromise the security system of the port.

Qatar Petroleum plays a major role in the entire cycle of the country’s oil and gas industry. In the course of the past decades, the country exhibited growth towards emerging a global leader Liquid Natural Gas production and exportation. It is worth noting that much of the country’s petroleum activity takes place in Ras Laffan industrial city-the city is found north east of Doha. The city harbors one of the leading global exporting ports of LNG and is run by Qatar Petroleum. Indeed, the Qatar Petroleum Port has a 30 million metric tons/annum capacity of exportation-it supplies destinations in the UK alongside other countries in Europe through a flee of gas container ships. Over the past years, the port city has been recording significant growth to match the pace of the ever growing global demand for its products; indeed, most recently Qatar Petroleum completed a project harboring new office and accommodation blocks.

Design Of The New Access Control System

Access Control System-case of Qatar Petroleum Port

Figure 1: General Design of the Access Control System (Garzia, 2003)

The access control system will be designed to be in compliance with traffic and security procedures of the ports. The development of the access control system will be governed by an array of limitations and prescriptions that have been imposed by a number of elements. The imposing elements are inclusive of the security plan or the port, the 2002 International Ship and Port Facility Security code, the security elevation document, the docks assignments and boarding areas, and the mean boarding time allowed for each ship company (Garzia,. & Veca,, 2002). The design of the new access control system will have a number of goals which will be inclusive of dynamic parking areas management, exit and entrance punctual control for persons and vehicles, management of the required information, and real time data statistic of entrances. The entrance/exit punctual control of vehicles has the capability of authorizing to have all the vehicle-related information in real time as per the topology (Antonucci., Garzia. & Veca, 2002). It also authorizes the entrance only the vehicles that have been authorized to enter the particular locations of the port. In addition it authorizes the calculation of the permanence time within the port in accordance to various user profiles. On the other hand, the exit/entrance punctual control of persons is characteristic of authorizing individual-related information in real time on grounds of the user profile, the entrance for only the individuals with permission, alongside the calculation of the permanence time within the port, on grounds of the different user profiles.

Telecommunication Infrastructure

The access control system, to be developed in the Qatar Petroleum Port, will be characteristic of an elaborate Telecommunication infrastructure (Garzia, F, Sammarco. & De Lucia, 2004). It is worth noting that the telecommunication system will be made of nodes. Each node will be independent and will authorize the connection of devices required by the access control system. To each service inside the network, a proper virtual LAN will be dedicated; this will enable equilibrate management of the band required for communication to take place (Garzia,, Sammarco, 2005). There will be connection of nodes to each other making the use of optical fibers. Notably, the connections will be redundant thus ensuring significant reliability even in cases of damage on the optical fiber. The placing of all network devices, software, and hardware is done in a cooled room, with power supply to enable 1 hour autonomy in cases of black out involving the main electrical supply.

Access Control System-case of Qatar Petroleum Port 1

Figure 2: Connection modality of Telecommunication system (Garzi, Sammarco ,Cusani, 2007)

The telecommunication system will include an ideal routing policy ensuring that the system will have high flexibility and high level of security. As a result, a number of devices with the ability to ensure secure communication and reliability will be integrated in the system. The system will use a design in which the passive routing device will be aided by load balance devices capable of allowing sharing, and alternation of duties between the various application servers. The development of all software will be based on international opened standards, relying o more diffused framework. In addition the project will be developed using a design in which the storage of data will be made using a DBMS relational database on grounds of standards provided by SQL (Vakalis, Hosgood,.Chawdry, 2006). In addition, the implementation of all the primary functions of control and management will be done on web interfaces. The web interfaces will exhibit compliance with normative accessibility and usability. Ideally, the integration and communication with other systems will be on grounds of SOAP protocol.

The Gate System

The entrance gate will have the design supporting the use of several sensors necessary to collect the information that has dedication with the automatic management. All lanes of the entrance gate makes use of a camera dedicated to the region analysis and to the image recording , cameras connected to the license plates that play the role of sending acquired data to an ideal multimedia kiosk (PortID Consortium, 2007). After receiving data from these cameras, the multimedia kiosk will be verifying the presence of the license into the appropriate black list (for unauthorized access); the white list (for authorized access); or the passenger list. The multi-media kiosk is capable of generating alarm, opening the entrance bar, alongside printing a check-in-data. It is characteristic of RFID reader normally put on use by the personnel of the port. The design of the gates will also be inclusive of two electromagnetic loops, placed near the multimedia kiosk, and have the role of avoiding the closure of the bar when a vehicle is passing through the gate (Brunner , Suter, 2008).

The License Plate Recognition Subsystem

The design of the access control system will have a license plate recognition fitted with modern generation cameras. They have the capability of acquiring data connected to high velocity traffic flows. The placing of the subsystem is done within a box whose location is within the gate entrance. There are OCR cameras embedding all software and hardware required by the license recognition-this makes sure that the system achieve high rate of recognition. Indeed, they have the ability to read and recognize the license plates available in the area with no triggering at all. It is also worth noting that the OCR cameras have other features liked low dimension thus simplifying the installation (Theoharidou, Kandias, Gritzalis, 2012). The structure of the OCR camera is inclusive of a binocular optics having a white/black high resolution element; it also embedded with color high resolution. The recognition process is divided into three phases by the OCR cameras; the management of these three phases is subject to 3 built-in components: the FPGA with the responsibility of executing pre-processing of images; DSP with the role of executing license plate recognition on real time; and CPU with the role of executing communication and management of data on license plates.

Justification of the Design

Ports have been identified as crucial nodes in extremely complex intermodal subsystems of economies that drive individuals and goods to and from various parts of the globe. In addition, ports are essential control points of borders. Another role played by ports is that of sheltering all types of marine vessels. As a result, ports need an integrated security framework that keeps into consideration the essential roles played by ports. The security system ought to be in integration with the transport chain security, corporate national, regional, and local level, with extension to far in the sea and well offshore (Ntouskas, Polemi, 2010). Port security should have the capability of preventing international unlawful acts that would otherwise compromise the safety of crew, passengers, and workers; or even still harm the economy.

Up until 9/11, the development of such facilities as ports did not put security among the top concerns. After the incidence, the development of port security retroactively became a difficult task calling for systemic intervention in all systems surrounding the port, considering all functionalities of ports.

The access control system will have the potential t satisfy the security needs of the Qatar Petroleum Port. For instance, the system will have the capability of printing directly tickets for vehicles and passengers, bearing a graphic layout of the ship company, and a bar code bearing all the necessary information. Included in the tickets, will also be the vehicle-based data whose acquisition has been subject to appropriate sensors installed at the entrance gates-ideally, these data have been found in essential to ship companies in the optimization of the boarding operations. The tickets provided by the new system will be characteristic of ideal magnetic strip qualifying them for use a key of the cabin while on board (IMO, 2003).

The OCR cameras will also have the ability to recognize the vehicles’ nationality and emit vocal messages in the language desired by the user; the achievement of this recognition will be subject to the multimedia kiosks placed at the entrance gates. The wireless networks incorporated in the access control system will have the capability of using an immense deal of devices, thus ensuring a series of next-generation technology services, essential for the management of the port. The system will also equip all personnel in the port with appropriate wireless terminals enabling control and management of all access data from all points of the Qatar Petroleum Port (Hammerli, Renda, 2010).

The ship company operators will be capable of, directly reading from bar code tickets using the portable terminals. As a result, they will be capable of getting information on all boarding information on vehicles and passengers. Consequently, boarding time and operations will be reduced significantly. The system will also be reputed by the capability of equipping the security department with OCR cameras that have the capacity of reading the license plates in the course of patrolling operations within the port. The cameras will be providing the security personnel with on the user profile (Polemi, Ntouskas, 2012).

Issues Related with the Implementation of the Project

Certification of Equipment

There will be examination and evaluation processes of all the equipments used in the project before it can be implemented. These processes will have the objective of establishing whether the materials used in the project meet the standards outlined by the International Ship and Port Facility Security Code and ISO. The standards of equipment and materials will apply to the whole assembly (Atrey, Kankanhalli, Jain, 2006). Incase of any modification to be done on the equipment, an approval will also have to come from the two standardization bodies. The entire project will also have to use totally unused materials and which are free from damage (Dufaux, Ouaret, Abdeljaoued, Navarro, Vergnenegre, Ebrahimi, 2006).

Substitution Of Equipment

All materials listed for substitution will have to be approved by ISO and International Ship and Port Facility Security standards before accepted for use; otherwise, the project cannot be cleared for implementation (Dufaux. Ebrahimi, 2006). The contactor given the responsibility of developing the project will be 8required to submit evidence which is supportive of the material that has been proposed for substitution; the supportive evidence is to show that the alternate material meets standards as outlined by ISO and International Ship and Port Facility Security Code.

Quality Assurance

Quality assurance calls for contractor certification before the project can be implemented. The project must have a systems contractor who will have to be approved by a certified security systems installer-this will be the proof that he/she is qualified for the development of the modern access control system. This will be followed by a visual inspection of the project; the Security Systems Contractor’s Quality Assurance Inspector will be given the responsibility of carrying out this inspection. It is upon the approval of the entire installation that permission can be granted for implementation (Yuhua Zheng and Yan Meng, 2007).

Integration with other Systems

It will be essential for the access control system, at the Qatar Petroleum Port, to be incorporated with an elaborate video surveillance subsystem (Alan , Lipton, Hironobu Fujiyoshi, Raju , Patil, 2006). Ideally, the entrance gates of the port will be fitted with a video surveillance system allowing the monitoring and recording of images which, will then be linked with the telecommunication network (Yilmaz, aved, Shah, 2006). The development of this video surveillance system will be on grounds of TCP/IP network protocol allowing a highly flexible management nature. Indeed, with proper designing of the network, it will be easy to add (at any moment) or remove cameras with no introduction of more connection cables-this will, therefore, ensure high system modularity. The cameras have the capability of sending images to the room harboring the central control with the use of wireless network. A digital way is used in the storage of the images, on ideal digital recorders. The video surveillance subsystem will have the composition of a management system, digital video-recording system, and IP video-cameras having power over dome and Ethernet functionalities (Rama, Atrey, Singh, Ramakrishnan, Kankanhalli, 2006).


The Qatar Petroleum, which manages the port, regularly updates its staff with latest technology via comprehensive training programs. This is because the new system is expected to be based on next generation technology thus security personnel might find its operation a bit complex.

The project will be cost-effective; the costs incurred in the development of the new access control system will be met by the stakeholders without straining operations of the Qatar Petroleum Port.

There will be proper communication between security personnel of the port and maritime police; this will ensure that any security threat will be investigated into and handled swiftly, thus preventing compromise with operations of the port and the economy of Qatar; considering that it significantly depends on the port’s operations.


Alan J. Lipton, Hironobu Fujiyoshi, Raju S. Patil, (2006). “Moving Target Classification and Tracking from Real-time Video”.

Antonucci, E., Garzia, F. & Veca, G.M., (2002). “The automatic vehicles access control system of the historical centre of Rome”, Sustainable City II, WIT Press, Southampton (UK), pp.853 861.

Atrey, P.K., Kankanhalli, M.S., Jain, R., “, (2006). A framework for information assimilation in multimedia surveillance systems”, ACM Multimedia Systems Journal.

B. Hammerli, A. Renda, (2010). Protecting critical infrastructure in the EU, Centre for European Policy Studies, Belgium, 2010.

Brunner E., Suter M., (2008). International CIIP Handbook 2008/9: An inventory of 25 national and 7 international Critical Infrastructure Protection Policies, Center for Security Studies, ETH Zurich, Switzerland.

Denning, D. E., (1999). “Information Warfare and Security”, Addison-Wesley, Boston (USA).

F. Dufaux, M. Ouaret, Y. Abdeljaoued, A. Navarro, F. Vergnenegre, T. Ebrahimi, (2006). “Privacy Enabling Technology for Video Surveillance”, Proc. SPIE 6250, 2006.

F. Dufaux, T. Ebrahimi, (2006). “Scrambling for Video Surveillance with Privacy”, Proc. IEEE Workshop on Privacy Research In Vision, New York, NY, June 2006.

Garzia, F. & Veca, G. M., (2002). “Integrated security systems for hazard prevention, management and control in the Italian high speed train line”, Risk Analysis III, WIT Press, Southampton (UK), pp.287-293.

Garzia, F., (2003). “The integrated safety/security system of the Accademia Nazionale dei Lincei at Corsini Palace in Rome”, Proc. of International Conference on Integrating Historic Preservation with Security, Fire Protection, Life Safety and Building Management Systems, Rome (Italy),pp.77-99.

Garzia, F., Sammarco, E. & De Lucia, M., (2004). “The security telecommunication system of the Vatican City State”, Risk Analysis IV, WIT Press, Southampton (UK), pp.773-782.

Garzia, F., Sammarco, E., (2005). “The integrated security system of the Vatican City State”, SAFE 2005, WIT Press, Southampton (UK), pp.391-403.

Garzia, F., Sammarco, E.,Cusani, R. (2007). “The integrated access control system of the Vatican City State”, SAFE 2007, WIT Press, Southampton (UK), pp.431-440.

I.Vakalis, B.Hosgood, P.Chawdry, (2006). “Biometrics for Border Security – An Overview”, Technical Report EUR 22359 EN, European Communities.

IMO (2003). , International Ship and Port Facility Security Code and SOLAS Amendments 2002, IMO Publications.

M. Theoharidou, M. Kandias, D. Gritzalis, (2012). “Securing transportation-critical infrastructures: Trends and perspectives”, in Proc. of the 7th IEEE International Conference in Global Security, Safety and Sustainability, pp. 171-178, Springer (LNICST 0099), Greece.

N. Polemi, T. Ntouskas, (2012). “Open issues and proposals in the IT security management of commercial ports: The S-Port national case”, in Proc. of the 27th IFIP International Information Security and Privacy Conference, pp. 567-572, Springer (IFIP AICT 376), Greece.

Nichols, R.K. & Lekkas, P.C., (2002). “Wireless Security: Models, Threats, and Solutions“, McGraw-Hill”, New York (USA).

PortID Consortium, “(2007). Study for the Analysis and the Conceptual Development of an European port Access Identification Card (EPAIC)”, Final Report, QINETIC/07/03289,19 Dec 2007.

Rama, K.G.S., Atrey, P.K., Singh, V.K., Ramakrishnan, K., Kankanhalli, M.S., (2006). “A Design Methodology For Selection and Placement of Sensors in Multimedia Surveillance Systems”, The 4th ACM International Workshop on Video Surveillance and Sensor Networks, Santa Barbara, CA, USA.

Regulation (EC) No 725/2004 of the European Parliament and of the Council of 31 March 2004 on enhancing ship and port facility security, European Union law, /en/index.htm

SYNERGASIA/S-Port project, (accessed 20 March 2013).

T. Ntouskas, N. Polemi, (2010). “A secure, collaborative environment for the security management of port information systems”, in Proc. of the 5th International Conference on the Internet and Web Applications and Services, pp. 374-379, IEEE Press, Spain.

Waltz, E., (1998). “Information Warfare – Principles and operations”, Artech House Publisher, Boston (USA.

Yilmaz, A., Javed, O., and Shah, M. (2006). “Object Tracking: A Survey”, ACM Comput. Surv. 38, 4, Article 13 Dec

Yuhua Zheng and Yan Meng, (2007). “Adaptive Object Tracking using Particle Swarm Optimization”, Proceedings of the 2007 IEEE International Symposium on Computational Intelligence in Robotics and Automation, Jacksonville, FL, USA, June 20 23, 2007, pp 43-49.