Download PDF version

Over the last decade, fire protection has been transformed by the rise of addressable, IP-based devices embedded in networked fire alarm system infrastructure. The scalability and modular architecture of digital fire alarm systems has unlocked a new level of fire safety, for instance by pinpointing the exact location of a triggered smoke detector in an alarm, or by interfacing with public address systems for phased building evacuations. For system integrators, installation and maintenance of alarm systems have reached new levels of efficiency – including automated service alerts and far fewer false alarms – with unprecedented cost savings.

Accordingly, the world market for fire alarm systems has seen significant growth, driven by the digitization of existing systems to meet higher safety standards and legislation. Experts at Grand View Research expect the market to increase from $52.2 billion in 2016 to $93.5 billion by 2022. Addressable systems – including IP-networked smoke detectors and fire panels – already account for more than two-thirds of the alarm technologies segment. And, as analog systems are being phased out, their share will soon be 100 percent.

Networked fire alarm systems

With that said, all elements are in place for the second, even more fundamental transformation in fire protection: In the near future, a growing amount of networked fire alarm systems will be connected to the Internet of Things (IoT). In the near future, a growing amount of networked fire alarm systems will be connected to the IoTThis is part of a larger trend across industries, including smart homes and smart buildings automated by a mixture of sensor data and artificial intelligence (AI). The number of IoT-connected devices worldwide is expected to exceed 14 billion by 2022, more than half of the world’s 28.5 billion connected devices.

For technology providers like Bosch, the IoT’s level of networked intelligence calls for a strategic response. “Our strategic target for all of our electronic product categories is to be IoT-enabled by 2020,” said Volkmar Denner, CEO of Bosch. This vision is supported by “3S’s” in Bosch’s connectivity business: sensors, software, and services. In developing and implementing services and solutions for the connected world, Bosch benefits from its expertise in software and sensor technology as well as, in particular, its broad business portfolio.

Remote Services lead the way

When it comes to bringing the IoT into the fire safety segment, Bosch envisions a future in which connected devices – and their data – open up new kinds of services that offer significant benefits to end customers and system integrators. This digital transformation journey is already well underway, as IoT-based applications are already enhancing the fire safety service offering on several levels. As a prerequisite, networked system architecture such as fire panels and sensors need to connect to the internet via nodes, hubs, and gateways in a secure manner. With this connection in place, the system can communicate with a cloud application server via IP protocol to send real-time data such as device health, battery status, and event history.

Networked system architecture such as fire panels and sensors need to connect to the internet via nodes, hubs, and gateways in a secure manner

Because system integrators can access these data points from any location without physically visiting the installation on-site, the impact of the IoT so far has been most pronounced in the Remote Services segment with the following three focus areas:

  1. Remote Connect. Allows for the remote set-up of a system and programming to customer specifications. Offers cost savings, as set-up can be handled practically without leaving the office for each new installation. Requests for changes can also be implemented at faster turnaround.
  2. Remote Alert. In case of fire, the system sends an alert via the remote portal, which can be integrated with messaging systems. Integrators also receive alerts for device outages and malfunctions.
  3. Remote Maintenance. The system performs regular health checks and condition monitoring, sent at user-specified intervals. Smart fire detectors also ping administrators for electromagnetic pollution or contamination with dust.

Major efficiency gains for system integrators

While IoT-based Remote Services already provide major efficiency gains for system integrators, we’re only just scratching the surface of what is possible. At the same time, the foundation for next-generation IoT-connected services is already created today, as the integration between sensors, software, and services increases.It will not only be crucial for devices to work together within the same network

In the process of building end-to-end fire safety systems that are ready to connect with the IoT, seamless interfaces with third-party apps and platforms via APIs (Application Programming Interfaces) will be a competitive advantage for system technology providers. It will not only be crucial for devices to work together within the same network. It will be even more important that systems can communicate with apps or building management software.

On the same note, the ability to provide integrated, IoT-connected services on a secure backbone – safe from hackers and malicious attacks – will be indispensable, because system data is the most valuable resource moving forward. Analyzed correctly, this data holds the key to what comes next.        

Smart data instead of Big Data

Needless to say, the rise of IoT-connected fire alarm systems will create massive amounts of data. This new ‘Big Data’ reality will call for improved data processing capabilities. Not just in terms of quantity: The most relevant services will be derived from smart data provided by IoT solutions in fire safety. The focus lies with data points that matter and making this data actionable by practice-oriented analysis.

For a quick glimpse into the process, our IoT data scientists are currently running comparative analyses of several fire alarm systems to gain visibility on problematic incidents, for instance when devices trigger false alarms. New services will have the potential to transform the way in which fire alarm systems are maintainedIn the next step, categorizing all systems that report such incidents into clusters would allow to give system integrators a big picture overview pinpointing exactly those among their managed systems that are at risk and need inspection, repairs, or upgrades. On the technical level, Bosch is using Mongo DB, a universal, document-based database for apps, to perform these quantitative analyses, always with a focus on new services and benefits for customers.

As our understanding of this data increases, new services will become possible that have the potential to transform the way in which fire alarm systems are maintained and managed. Whereas today, system integrators can view data points such as device status in their Remote Portal and offer basic maintenance support via cloud-connected apps, tomorrow their service approach will be much more proactive, again thanks to smart data.

The next level of IoT-powered services

In the future, data from IoT-connected systems can be leveraged to predict automatically at what exact point in time a system component is going to fail. Instead of replacing said component ahead of time, as is the case in today’s preventive maintenance approach, this new predictive service protocol allows to save cost by making maximum usage of the device’s lifespan.This new predictive service protocol allows to save cost by making maximum usage of the device’s lifespan

In the bigger picture, the data log of a particular fire alarm installation’s data can provide the basis for targeted system optimization efforts. For instance, if long-term data indicates that sensors in a particular area tend to trigger false alarms because of signal interference, the integrators can perform a deep dive into whether nearby high-voltage cabling is the cause and make adjustments to system architecture accordingly. In the same vein, integrators gain transparency on whether detectors in a certain location tend to need replacement due to dust and contamination, or if electromagnetic compatibility (EMC) with other systems like voice broadcast is causing issues – and take preventative measures.

Self-monitoring Fire alarm systems

Overall, these data points, together with constant real-time information on system health, will provide system administrators with the tools for planning and maintaining fire alarm systems in a more efficient manner. They can design and install new systems based on the data-powered learnings from previous installations. And they can provide a more customer-centric response to information requests or inquiries for system updates.

Most of all, the connection to IoT-based services will provide a new peace of mind: These upgraded fire alarm systems will quietly monitor and secure themselves, and only trigger alarms or notifications when service is needed, while system integrators can focus on more important tasks. Right now, we are building the foundation for making these new IoT-driven services a reality. But compared to what the IoT has is store for the future design of fire alarm systems in buildings, we have only seen the beginning. The biggest benefits are still to come.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

Author profile

In case you missed it

Securing The Next Generation Of 911
Securing The Next Generation Of 911

While conducting research for my 2021 Wisconsin Public Safety Commission (WIPSCOM) conference presentation, it became immediately clear that securing the nation’s public safety answering points (PSAPs) is no longer just an IT challenge. Shifting from an analog to digital operating environment — the next generation of 911 — will require strategic investments into three key areas: people, processes and technology. As call center technology evolves nationwide, the need for greater cybersecurity in the public safety space has never been more important. Internet connected systems Traditionally, PSAPs received calls over analog telephone networks consisting of copper wire transmission lines and dated cellular networks spanning a smaller area in close proximity to call centers. With the introduction of next generation 911 and the accompanying digital telephone networking services, the exposure of call center networks to would-be attackers has exponentially increased, allowing potential access from anywhere due to internet connected systems. A good analogy is thinking of the points of entry into your home. The legacy method allowed two entries into the house — the front and back door. With the introduction of digital networks, there are now more doorways into the home or call center, signifying a greater need for security and employee awareness of threats. Many of these recent attacks target people using a technique called social engineering First responder organizations Since 2019, there have been approximately 300 cyberattacks impacting local government agencies, including police stations, emergency dispatch call centers and first responder organizations. 125 of these attacks specifically focused on public safety agencies such as firefighting or EMT stations, with attacks reported in all 50 states. More recent examples show that cyberattacks focusing on our first responders are increasing at an alarming rate. Many of these recent attacks target people using a technique called social engineering. This is when attackers attempt to trick victims through telephone calls and/or emails to assist the attacker in introducing viruses to the network, provide sensitive data or share usernames and passwords to achieve their criminal motives. Cyber criminals' primary objective is to use social engineering techniques to achieve a much more serious attack: ransomware. Critical computer systems Ransomware is a type of malicious software (malware) that prevents access to sensitive files Ransomware is a type of malicious software (malware) that prevents access to sensitive files, data and critical computer systems using encryption that only the attacker can unlock. Victims must pay a random sum of money, usually in an untraceable cryptocurrency, to the attacker who promises to decrypt data once they receive the funds. A look at attacker motivations can help us all understand — and mitigate — the threat to our first responders. Here are three primary reasons why cybercriminals target public safety answering points: Monetary gain: Infecting a PSAP with ransomware can lead to significant payouts in order to restore first response services. Disruption of services: Shutting down critical services can put threat actors in the public eye while also playing a major role in multi-stage attacks. Cheap thrills: Attackers and, at times, even misguided amateurs can target critical services for notoriety or social standing. Mitigating cyber risk The human element, actions or inactions played a direct role in 85% of data breaches Regardless of the motivation, the outcome is generally the same: a disruption of first response services that are critical to protecting our communities and families. According to Verizon's 2021 Data Breach Investigations Report, the human element -- or people’s decisions, actions or inactions -- played a direct role in 85% of data breaches. As cyber threats targeting PSAPs and first responder teams continue to grow in number and severity, addressing the threat through employee awareness and education is a good first step in mitigating cyber risk. Here are four steps any PSAP can take now to assess and mitigate cyber threats targeting their organization. Security awareness training Educate employees with security awareness training - Ongoing security training efforts should occur at a general level for all PSAP employees, followed by more targeted, role-based security training for key roles and departments such as call center managers, dispatchers or those with access to sensitive data. General security awareness training efforts should focus on broad but relevant security topics employees are likely to encounter, such as how to identify a phishing email. Security training programs should occur at least annually, and training content reviewed semi-annually Role-based security training efforts should go one step further and include topics like how management should respond to ransomware payment demands or how to verify the identity of external callers asking for sensitive information or urgent payments. Security training programs should occur at least annually, and training content reviewed semi-annually to ensure completeness, accuracy and relevance of training content related to your operating environment. Physical building access Verify and strengthen employee access controls - This includes physical building access and logical access to any information or computer systems your organization operates. Most organizations have several internal or external users such as vendors, cleaning companies and other organizations who come into contact with the offices or other physical locations, increasing the risk of theft or unauthorized access via impersonation or tailgating attacks. Ensure exterior locations are sufficiently secured via electronic badge access or a minimum of key access with code entry. First responders and public service agencies should train employees to visibly display employee badges and report infringements to management in the event an attacker infiltrates the building. Multi-Factor authentication External visitors should be required to announce their arrival in advance to the organization External visitors should be required to announce their arrival in advance to the organization, enter through designated areas, check-in with a receptionist or direct contact, log their entry, show identification and wear a clearly identifiable visitor badge. Access to computer systems that contain sensitive data such as employee records or connections to other state and federal agencies should be secured via multi-factor authentication. Multifactor authentication is a security term referring to authenticating a computer system using several factors, including something you know (e.g., username or password) , something you have (e.g., smartphone) or something you are (e.g., fingerprints or voice pattern). Using two or more factors when accessing a computer system is crucial to keeping the cybercriminals out! Federal threat intelligence Leverage free resources to mature your cybersecurity posture - First responders and public service organizations have many free cybersecurity resources at their disposal. This includes federal threat intelligence via security advisories, which outline vulnerable software or hardware products they use, and direct consultation services from cyber response teams local to the area, which are taxpayer funded. The US-CISA also provides regional consultation services to assist all local government agencies Every first responder and public service organization should consider becoming a member of a relevant Information Sharing and Analysis Center (ISAC) such as the Multi-State Information Sharing and Analysis Center (MS-ISAC), as they provide free threat intelligence services and consultation resources to help boost cybersecurity. The US-Cybersecurity and Infrastructure Security Agency (US-CISA) also provides regional consultation services to assist all local government agencies in maturing their cybersecurity posture. Public service organizations Hire external security firms to identify and correct weaknesses - To the extent allowed by budgets and personnel, first responders and public service organizations should hire external security or audit firms to assess the state of their cybersecurity practices and posture. These firms specialize in security best practices and assess security controls' adequacy across a wide array of organizations. It is often useful to bring these firms in for a fresh perspective on how the organization operates and its vulnerabilities. These engagements are typically performed annually and focus on core computer systems and business processes that involve sensitive data.

Using State-Of-The-Art Technology To Prevent And Put Out Wind Turbine Fires
Using State-Of-The-Art Technology To Prevent And Put Out Wind Turbine Fires

As more and more countries in Europe and North America commit to net zero, a key strategy is replacing old fossil fuel-driven forms of power generation and replacing them with renewable energy, such as wind turbines and solar panels. The wind industry has seen a particular boom, with tens of thousands of new turbines installed every year across the globe. However, like any other heavy machinery, wind turbines can catch fire due to mechanical or electrical failures. These fires can have impacts beyond the turbine if there is secondary fire spread to surrounding lands, resulting in potentially catastrophic loss. Without this technology in place, a single fire could cost $7-8 million and cause substantial downtime. The time is now for the industry to use all available technology to prevent these incidents and reduce the risk of fires spilling into the environment. How do wind turbine fires start? Wind turbine fires can catch fire due to external causes, such as lightning strikes, or internal causes, such as mechanical or electrical failure resulting in sparks or heat in the nacelle. Most nacelle fires start at one of three points of ignition – converter and capacitor cabinets, the nacelle brake, or the transformer. Nacelle brakes are used to stop the turbine’s blades from spinning in an emergency.  Converter and capacitor cabinets and transformers are necessary for the turbine to generate power and transform it into a voltage that can be exported to the grid. An electrical fault at either location can produce arc flashes or sparks, which can ignite nearby Class A combustibles, like cables, plastics, or fiberglass. Nacelle brakes are used to stop the turbine’s blades from spinning in an emergency. The brakes can cause turbine fires, albeit due to sparks from mechanical stress and friction rather than electrical failure. While some turbines have been designed with safer, electrical brakes, mechanical brake systems are often used as a backup in the event of power or control failure. These ignition points are all necessary for the safe generation of electricity from the wind, and cannot simply be designed out. As such, wind farm owners and operators must be ready to deal with fires when they spark. Why are wind turbine fires hard to fight? Modern wind turbines often exceed 250 feet in height, while most ground-based firefighting can only reach up to 100 feet. A team sent up-tower to manually fight the fire would constitute a major health and safety risk, as turbines have limited space and escape routes – putting employees not only in direct contact with fire but at risk of being in the turbine if it collapses. As such, when turbines catch fire, they are often left to burn out, with firefighters’ efforts focused on preventing the spread and clearing the area as fiery debris falls. This results in irreparable damage to the turbine, necessitating its replacement. What is the cost of a wind turbine fire? The cost of replacing a burned-out wind turbine depends on a number of factors. First and foremost is the size and initial cost of the turbine. Turbines with more than 3MW of rated capacity can cost between $3-10 million to install during development. Replacement turbines can often cost even more, as manufacturers are likely to charge more for individual, one-off installations. Another key loss is business interruption, or how long the turbine was offline – and therefore not generating revenue. The average loss due to a turbine fire was estimated by insurance company GCube to be $4.5 million in 2015. As turbines have grown larger and therefore more expensive to replace with greater losses in revenue, we expect a fire to cost anywhere between $7-8 million for new models. How can turbine owners and manufacturers manage fire risk? Firetrace’s system is designed with flexible Heat Detection Tubing, which ruptures in response to extreme heat or open flame Turbine manufacturers are already taking steps to “design out” fire risk in turbines. For example, lightning protection systems on turbine blades safely re-direct the surge of electricity away from cables, while condition monitoring systems can identify whether a component is overheating and likely to catch fire. In order to put out any turbine fires that do start at their source, turbine owners and manufacturers can install automatic fire suppression systems at common points of ignition. Firetrace’s system is designed with flexible Heat Detection Tubing, which ruptures in response to extreme heat or open flame, releasing a clean suppression agent precisely at the source of the fire before it can spread. Wind farm owners who have taken a more proactive approach to manage risk via fire suppression systems have been able to snuff out fires before they can spread throughout the turbine or into the environment. By investing in the latest technology for fire suppression, owners and operators have avoided the worst-case scenario, saving millions in operating costs.

PAMS Software Promotes Accountability Of Fire Service Responders
PAMS Software Promotes Accountability Of Fire Service Responders

The fire service has always struggled with maintaining accurate accountability of personnel who are responding or operating in emergencies. Lack of firefighter accountability is often cited as a contributing factor in Line of Duty Deaths (LODD). Compounding the accountability challenge are volunteer responders who can be coming from anywhere, with some going to the station and others going direct. The existing accountability tools and processes were unreliable and failed when needed the most. Need for reliable and accurate system As a firefighter and Incident Commander, Justin Brundage witnessed firsthand the data gaps of the tools and processes commonly used. A reliable and accurate system was needed in the fire service to avoid unnecessary risk to responses and responders. The intuitive process fits within an existing response workflow and provides an end-to-end solution  Seeking to address the problem, Brundage co-founded Incident Management Technology, whose Personnel Accountability Management System (PAMS) software is a solution for maintaining accurate and reliable firefighter accountability. The intuitive process fits within an existing response workflow and provides an end-to-end solution for firefighter accountability. The software was developed to solve operational gaps in emergency response and to help departments operate more effectively and safely. Real-time operations With the PAMS system, all personnel can see the available, deployed, and responding staff and resources in real-time on a mobile app or web browser. Responding apparatus are also viewable in real-time, including all the personnel on the apparatus. At an incident, the software tools simplify the accurate tracking and management of all personnel on the scene and enable a shared common picture of the who, what, and where of all responders at all times. PAMS gives department members and officers the information they need in real-time to optimize their responses. “We do this by sharing availability and response information throughout the department on a smartphone app,” says Brundage. Operational safety In addition to the improvement in operational safety that agencies get from PAMS, the software also improves response. “When all responders can see the other responders’ destinations and estimated times of arrival (ETAs) they can adapt and optimize the response efficiency by responding where they are needed most and not duplicating unnecessarily,” says Brundage.  PAMS software functions as an electronic equivalent to tag-based systems, which are ineffective, cumbersome, and error-prone. The key difference is that, by being electronic, the “accountability” information is viewable to anyone connected to the agency in real-time, regardless of location. Computer-aided dispatch (CAD) The software manages the responder throughout the lifecycle of the emergency response New incidents are sent to the responder mobile app automatically from computer-aided dispatch (CAD). Responders mark up if they are responding, and the system calculates and shares each responder's destination and ETA. The software manages the responder throughout the lifecycle of the emergency response. The entire department can see who is responding, who is assigned to each responding apparatus, who is operating at the incident, and where they are operating. Because this is an electronic process managing the personnel, is much easier with timers on task activities, and a simple and quick participatory action research (PAR) process. Fits in emergency workflow PAMS software is designed to fit into the existing workflow of an emergency response. “As responders ourselves we understand the burden of adding more operational requirements to the already chaotic moments of response and incident mitigation,” says Brundage. PAMS was built to work effectively on the equipment that is in many cases already deployed and installed in the response apparatus. The mobile app is available for iOS and Android and is used by the personnel responders, and then the web app is browser-based and can run on a browser window on tablets, mobile computing devices (MDCs), and laptops. Affordable, But has a lack of awareness In rolling out the product, awareness has proven to be a challenge for Incident Management Technology. “As a startup company most agencies that would benefit from the system aren’t aware that a solution like this even exists,” says Brundage. The system is expanding features and functionality to maximize incident response effectiveness The system is expanding features, functionality, and integrations rapidly intending to build an affordable solution for all fire departments to minimize their operational risks and to maximize their incident response effectiveness. Benefits of the software “We are currently having success with organic growth and the network effect,” says Brundage. “Our current customers are showing the system and validating the benefits to other agencies local to them, and we are increasing our awareness that way every day.” He adds, “We love doing web demos and talking to fire and EMS departments. Most fire departments have the same operational challenges, and the feedback we receive from customers and prospects is what we use to drive our next phase of software development.”

vfd