IDEAS home Printed from https://ideas.repec.org/a/eee/ijocip/v41y2023ics1874548223000124.html
   My bibliography  Save this article

A review on effective alarm management systems for industrial process control: Barriers and opportunities

Author

Listed:
  • Mustafa, Faizan E
  • Ahmed, Ijaz
  • Basit, Abdul
  • Alvi, Um-E-Habiba
  • Malik, Saddam Hussain
  • Mahmood, Atif
  • Ali, Paghunda Roheela

Abstract

The effective robust management of plant requires the implementation of industrial alarm systems in a very significant capacity. The core objective of alarms is to warn the operator of critical operational deviations and these operational anomalies can sometimes result in operators receiving significantly more alarms in a short period of time than they can manage, which is known as alarm flooding. In the case of any system malfunction, the alarms triggering and operators performance measure together important levels of security. Over the course of the last few decades, there has been a significant acceleration in the development of industrial automation technology, which has resulted in an increase in the total number of process sensors deployed within a specific plant. Moreover, the extensive integration of automation and security-based sensors has increased the system’s complexity and introduced a variety of operational challenges in industrial facilities. Consequently, this extensive integration has led to ineffectual system reliability, which further raised operator load volume and increased the chances of fatal conditions in certain situations. This review paper addresses the history of alarm management including major incidents that occurred in the last five decades, the development of the life cycle of alarm management, standards, and principles adopted for alarm management, techniques and methodologies developed for managing alarms, and current challenges that arise from modern control system integration.

Suggested Citation

  • Mustafa, Faizan E & Ahmed, Ijaz & Basit, Abdul & Alvi, Um-E-Habiba & Malik, Saddam Hussain & Mahmood, Atif & Ali, Paghunda Roheela, 2023. "A review on effective alarm management systems for industrial process control: Barriers and opportunities," International Journal of Critical Infrastructure Protection, Elsevier, vol. 41(C).
  • Handle: RePEc:eee:ijocip:v:41:y:2023:i:c:s1874548223000124
    DOI: 10.1016/j.ijcip.2023.100599
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S1874548223000124
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ijcip.2023.100599?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Hu, Yunwei & Parhizkar, Tarannom & Mosleh, Ali, 2022. "Guided simulation for dynamic probabilistic risk assessment of complex systems: Concept, method, and application," Reliability Engineering and System Safety, Elsevier, vol. 217(C).
    2. Arnaud Mignan & Matteo Spada & Peter Burgherr & Ziqi Wang & Didier Sornette, 2022. "Dynamics of severe accidents in the oil & gas energy sector derived from the authoritative ENergy-related severe accident database," PLOS ONE, Public Library of Science, vol. 17(2), pages 1-14, February.
    3. Stefansson, Hlynur & Sigmarsdottir, Sigrun & Jensson, Pall & Shah, Nilay, 2011. "Discrete and continuous time representations and mathematical models for large production scheduling problems: A case study from the pharmaceutical industry," European Journal of Operational Research, Elsevier, vol. 215(2), pages 383-392, December.
    4. Omid Zadakbar & Faisal Khan & Syed Imtiaz, 2015. "Development of Economic Consequence Methodology for Process Risk Analysis," Risk Analysis, John Wiley & Sons, vol. 35(4), pages 713-731, April.
    5. Federico Antonello & Piero Baraldi & Enrico Zio & Luigi Serio, 2022. "A novelty-based multi-objective evolutionary algorithm for identifying functional dependencies in complex technical infrastructures from alarm data," Environment Systems and Decisions, Springer, vol. 42(2), pages 177-188, June.
    6. Knowles, William & Prince, Daniel & Hutchison, David & Disso, Jules Ferdinand Pagna & Jones, Kevin, 2015. "A survey of cyber security management in industrial control systems," International Journal of Critical Infrastructure Protection, Elsevier, vol. 9(C), pages 52-80.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Saddam Aziz & Cheung-Ming Lai & Ka Hong Loo, 2023. "Performance of an Adaptive Optimization Paradigm for Optimal Operation of a Mono-Switch Class E Induction Heating Application," Mathematics, MDPI, vol. 11(13), pages 1-18, July.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Federico Antonello & Piero Baraldi & Enrico Zio & Luigi Serio, 2022. "A Novel Metric to Evaluate the Association Rules for Identification of Functional Dependencies in Complex Technical Infrastructures," Environment Systems and Decisions, Springer, vol. 42(3), pages 436-449, September.
    2. Rodofile, Nicholas R. & Radke, Kenneth & Foo, Ernest, 2019. "Extending the cyber-attack landscape for SCADA-based critical infrastructure," International Journal of Critical Infrastructure Protection, Elsevier, vol. 25(C), pages 14-35.
    3. He, Rui & Zhu, Jingyu & Chen, Guoming & Tian, Zhigang, 2022. "A real-time probabilistic risk assessment method for the petrochemical industry based on data monitoring," Reliability Engineering and System Safety, Elsevier, vol. 226(C).
    4. Juntao Chen & Quanyan Zhu & Tamer Başar, 2021. "Dynamic Contract Design for Systemic Cyber Risk Management of Interdependent Enterprise Networks," Dynamic Games and Applications, Springer, vol. 11(2), pages 294-325, June.
    5. Mohammed Alghassab, 2021. "Analyzing the Impact of Cybersecurity on Monitoring and Control Systems in the Energy Sector," Energies, MDPI, vol. 15(1), pages 1-21, December.
    6. Tom Rihm & Norbert Trautmann & Adrian Zimmermann, 2018. "MIP formulations for an application of project scheduling in human resource management," Flexible Services and Manufacturing Journal, Springer, vol. 30(4), pages 609-639, December.
    7. Rajan, Rishabh & Rana, Nripendra P. & Parameswar, Nakul & Dhir, Sanjay & Sushil, & Dwivedi, Yogesh K., 2021. "Developing a modified total interpretive structural model (M-TISM) for organizational strategic cybersecurity management," Technological Forecasting and Social Change, Elsevier, vol. 170(C).
    8. Feng, Jian Rui & Zhao, Meng-ke & Lu, Shou-xiang, 2024. "Accident spread and risk propagation mechanism in complex industrial system network," Reliability Engineering and System Safety, Elsevier, vol. 244(C).
    9. Pramod T. C. & Thejas G. S. & S. S. Iyengar & N. R. Sunitha, 2019. "CKMI: Comprehensive Key Management Infrastructure Design for Industrial Automation and Control Systems," Future Internet, MDPI, vol. 11(6), pages 1-25, June.
    10. Eric DuBois & Ashley Peper & Laura A. Albert, 2023. "Interdicting Attack Plans with Boundedly Rational Players and Multiple Attackers: An Adversarial Risk Analysis Approach," Decision Analysis, INFORMS, vol. 20(3), pages 202-219, September.
    11. Ma, Xiaoxue & Deng, Wanyi & Qiao, Weiliang & Lan, He, 2022. "A methodology to quantify the risk propagation of hazardous events for ship grounding accidents based on directed CN," Reliability Engineering and System Safety, Elsevier, vol. 221(C).
    12. Vlad Daniel SAVIN & Costel SERBAN, 2019. "Cybersecurity Vulnerabilities And Threats Of Scada Systems In Critical Infrastructures," Proceedings of the INTERNATIONAL MANAGEMENT CONFERENCE, Faculty of Management, Academy of Economic Studies, Bucharest, Romania, vol. 13(1), pages 234-237, November.
    13. Feng, Jian Rui & Yu, Guanghui & Zhao, Mengke & Zhang, Jiaqing & Lu, Shouxiang, 2022. "Dynamic risk assessment framework for industrial systems based on accidents chain theory: The case study of fire and explosion risk of UHV converter transformer," Reliability Engineering and System Safety, Elsevier, vol. 228(C).
    14. Taho Yang & Shin-Yi Lin & Yu-Hsiu Hung & Chung-Chien Hong, 2022. "A Study on the Optimization of In-Process Inspection Procedure for Active Pharmaceutical Ingredients Manufacturing Process," Sustainability, MDPI, vol. 14(6), pages 1-20, March.
    15. Liu, Qiang & Tang, Aiping & Huang, Delong & Huang, Ziyuan & Zhang, Bin & Xu, Xiuchen, 2022. "Total probabilistic measure for the potential risk of regional roads exposed to landslides," Reliability Engineering and System Safety, Elsevier, vol. 228(C).
    16. Jarmakiewicz, Jacek & Parobczak, Krzysztof & Maślanka, Krzysztof, 2017. "Cybersecurity protection for power grid control infrastructures," International Journal of Critical Infrastructure Protection, Elsevier, vol. 18(C), pages 20-33.
    17. Kaneko, Fujio & Yuzui, Tomohiro, 2023. "Novel method of dynamic event tree keeping the number of simulations in risk analysis small," Reliability Engineering and System Safety, Elsevier, vol. 231(C).
    18. Leachman, Robert C. & Johnston, Lenrick & Li, Shan & Shen, Zuo-Jun, 2014. "An automated planning engine for biopharmaceutical production," European Journal of Operational Research, Elsevier, vol. 238(1), pages 327-338.
    19. Voll, Philip & Jennings, Mark & Hennen, Maike & Shah, Nilay & Bardow, André, 2015. "The optimum is not enough: A near-optimal solution paradigm for energy systems synthesis," Energy, Elsevier, vol. 82(C), pages 446-456.
    20. CHERIFI, Tarek & HAMAMI, Lamia, 2018. "A practical implementation of unconditional security for the IEC 60780-5-101 SCADA protocol," International Journal of Critical Infrastructure Protection, Elsevier, vol. 20(C), pages 68-84.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ijocip:v:41:y:2023:i:c:s1874548223000124. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-critical-infrastructure-protection .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.