DEVELOPMENT OF A PROCESS SECURITY ASSESSMENT TOOLBOX FOR CHEMICAL REACTION SYSTEMS. Cristina Piluso, Korkut Uygun, and Yinlun Huang Department of Chemical Engineering and Materials Science, Wayne State University. Security Assessment Page. Abstract
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
DEVELOPMENT OF A PROCESS SECURITY ASSESSMENT TOOLBOX FOR CHEMICAL REACTION SYSTEMS
Cristina Piluso, Korkut Uygun, and Yinlun Huang
Department of Chemical Engineering and Materials Science, Wayne State University
Security Assessment Page
Chemical processes are operationally more risky, environmentally more harmful, and potentially more dangerous than other types of manufacturing activities when abnormal or destructive situations arise. In the extreme, explosions, toxic release, and loss of life will occur rapidly, particularly when an adversary who has sufficient technical background on chemical operations makes a premeditated attack. Obviously, such security threatening situations must be swiftly detected, the possible impacts on production must be precisely evaluated, and operational solutions must be quickly derived.
The mathematical framework for the Fast Process Security Assessment theory is the -analysis technique (Uygun et al., AIChE J., 49(9), 2445, 2003). In the theory, a process is defined as “secure” if the time needed to detect the threat and take the essential countermeasures to eliminate the threat is less than the time it takes for the system to reach disaster conditions, assuming the worst conditions. The -analysis is to examine directly the gradient of time derivative equations of a plant dynamic model, rather than integrating them that is very time consuming. This allows quick estimation for the minimum time that the process can go to disaster under a security threat. The estimation yields lower and upper bounds on the actual time the process will take to go to disaster, which are named process critical time and security limit time, respectively.
In this work, a MATLAB-based process security assessment tool is developed for educational as well as limited industrial use. The software allows the user to define a customizable reactor system and analyze its security. Based on the Fast Process Security Assessment Theory, the software enables quick, yet thorough, vulnerability analysis. It can run scenario-simulations quickly. The basic assessment is based on process critical timeand security limit time. Additional analysis tools include: (i) priority list that enables quantitative evaluation of the effect of each variable on security, (ii) process security mapsthat are a visual aid for quick interpretation of results, (iii) “Ascent to Disaster” curves for zonal analysis of the problem, (iv) NCM matrices for identification of strictly coupled behavior in the system, and (iv) threat profiling for quantitative analysis of the security attack that leads to disaster.
The current version of the software is restricted to CSTRs where exothermic reactions take place, but is otherwise fully customizable (i.e., reaction, operation conditions, etc., can be changed readily).
Example 2: Reactor Property Change
Process Security vs. Process Safety
Ascent to Disaster Profile
Software Help Boxes
Brief descriptions or definitions of most software functions (right clicking the button)
Software: Main Page
Priority List Page
The tool highly desirable for quantitative analysis of process security
The tool ideal eventually for undergraduate education
To broaden the range of security-sensitive operations
To investigate design and operation aspects in much detail
To be available on the web site: http://che.eng.wayne.edu/~yhuang
Most significant system parameters: jacket temp. (74.56%), liquid volume (26.28%)
Fully customizable for other reaction types
Changeable of all system parameters
Example 1: Stream Data Adjustment
National Science Foundation
Sandia Nat’l Labs – Security Systems and Technology Center
EPA Nat’l Risk Assessment Research Lab – Division of Sustainable Technology
Wayne State University – Research Enhancement Program on IT