Academic literature on the topic 'SCADA communication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SCADA communication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "SCADA communication"

1

Tamy, Sara, Hicham Belhadaoui, Mahmoud Almostafa Rabbah, Nabila Rabbah, and Mounir Rifi. "SCADA Communication Real Time Protocols." Indian Journal of Science and Technology 12, no. 34 (2019): 1–6. http://dx.doi.org/10.17485/ijst/2019/v12i34/147550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gaushell, D. J., and W. R. Block. "SCADA communication techniques and standards." IEEE Computer Applications in Power 6, no. 3 (1993): 45–50. http://dx.doi.org/10.1109/67.222741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gao, Jingcheng, Jing Liu, Bharat Rajan, et al. "SCADA communication and security issues." Security and Communication Networks 7, no. 1 (2013): 175–94. http://dx.doi.org/10.1002/sec.698.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

ANAGHA., A. BOKARE. "VULNERABILITIES AND MITIGATION IN COMMUNICATION SYSTEM FOR GRID INTEGRATION OF WIND ENERGY." JournalNX - A Multidisciplinary Peer Reviewed Journal 3, no. 3 (2017): 120–22. https://doi.org/10.5281/zenodo.1463718.

Full text
Abstract:
 This paper provides the `concept of communication system challenges in power grid integration .The scada has been used as communication,fault diagnosis ,though the reliability of communication with scada in drastic environment but the problems to faced such as security ,policy, system network problems are in online internet facility. We discuss all the SCADA vulnerabilities in this paper they are attributable to the lack of a well-developed and meticulously practiced security policy also we provide some mitigation of SCADA system which is ongoing process. https://journalnx.com/journal-article/20150213
APA, Harvard, Vancouver, ISO, and other styles
5

Kołtyś, Kamil, and Robert Gajewski. "SHaPe: A Honeypot for Electric Power Substation." Journal of Telecommunications and Information Technology, no. 4 (December 30, 2015): 37–43. http://dx.doi.org/10.26636/jtit.2015.4.983.

Full text
Abstract:
Supervisory Control and Data Acquisition (SCADA) systems play a crucial role in national critical infrastructures, and any failure may result in severe damages. Initially SCADA networks were separated from other networks and used proprietary communications protocols that were well known only to the device manufacturers. At that time such isolation and obscurity ensured an acceptable security level. Nowadays, modern SCADA systems usually have direct or indirect Internet connection, use open protocols and commercial-off-the-shelf hardware and software. This trend is also noticeable in the power industry. Present substation automation systems (SASs) go beyond traditional SCADA and employ many solutions derived from Information and Communications Technology (ICT). As a result electric power substations have become more vulnerable for cybersecurity attacks and they need ICT security mechanisms adaptation. This paper shows the SCADA honeypot that allows detecting unauthorized or illicit traffic in SAS which communication architecture is defined according to the IEC 61850 standard.
APA, Harvard, Vancouver, ISO, and other styles
6

Chochtoula, Despoina, Aristidis Ilias, Yannis C. Stamatiou, and Christos Makris. "Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol." Future Internet 14, no. 8 (2022): 232. http://dx.doi.org/10.3390/fi14080232.

Full text
Abstract:
SCADA systems monitor critical industrial, energy and other physical infrastructures in order to detect malfunctions, issue alerts and, in many cases, propose or even take remedial actions. However, due to their attachment to the Internet, SCADA systems are, today, vulnerable to attacks such as, among several others, interception of data traffic, malicious modifications of settings and control operations data, malicious modification of measurements and infrastructure data and Denial-of-Service attacks. Our research focuses on strengthening SCADA systems with cryptographic methods and protection mechanisms with emphasis on data and messaging encryption and device identification and authentication. The limited availability of computing power and memory in sensors and embedded devices deployed in SCADA systems make render cryptographic methods with higher resource requirements, such as the use of conventional public key cryptography such as RSA, unsuitable. We, thus, propose Elliptic Curve Cryptography as an alternative cryptographic mechanism, where smaller key sizes are required, with lower resource requirements for cryptographic operations. Accordingly, our approach integrates Modbus, a commonly used SCADA communication protocol, with Elliptic Curve Cryptography. We have, also, developed an experimental set-up in order to demonstrate the performance of our approach and draw conclusions regarding its effectiveness in real SCADA installations.
APA, Harvard, Vancouver, ISO, and other styles
7

Ayiad, Motaz, Emily Maggioli, Helder Leite, and Hugo Martins. "Communication Requirements for a Hybrid VSC Based HVDC/AC Transmission Networks State Estimation." Energies 14, no. 4 (2021): 1087. http://dx.doi.org/10.3390/en14041087.

Full text
Abstract:
The communication infrastructure of the modern Supervisory, Control and Data Acquisition (SCADA) system continues to enlarge, as hybrid High Voltage Direct Current (HVDC)/Alternating Current (AC) networks emerge. A centralized SCADA faces challenges to meet the time requirements of the two different power networks topologies, such as employing the SCADA toolboxes for both grids. This paper presents the modern communication infrastructure and the time requirements of a centralized SCADA for hybrid HVDC/AC network. In addition, a case study of a complete cycle for a unified Weighted Least Squares (WLS) state estimation is tested on a hybrid HVDC/AC transmission network, based on Voltage Source Converter (VSC). The cycle estimates the elapsed times from the sensors up to the SCADA side, including the data acquisition and the WLS processing times. The case study is carried out on the Cigre B4 DC test case network with 43 virtual Remote Terminal Unit (RTU)s installed and 10 data concentrators, all connected through a fiber-based communication network. It is concluded that the time requirements can be fulfilled for a hybrid HVDC/AC network.
APA, Harvard, Vancouver, ISO, and other styles
8

Rachmawati, Fauziah Anita, Safitri Nelly, Taufik, and Amra Siti. "SCADA Communication in Smart Grid Photovoltaic Plant." Int. J of Mechanical Materials and Industrial Engineering 2, no. 3 (2023): 29–34. https://doi.org/10.5281/zenodo.10171190.

Full text
Abstract:
<strong>Abstract –</strong>&nbsp;This study uses a network simulation software application as working tool to create a wireless communication technology in a smart grid system. the aim of this study is to apply the proposed PV plant which is integrated into the smart grid system and its communication and components coordination through Supervisory Control and Data Acquisition Systems (SCADA). The proposed system is a large-scale photovoltaic (PV) plant hybrid with diesel generator integrated into microgrid. It is a two-way communications of PV inverters using SCADA. The role of communication and control system includes PV voltage and current output control. The microgrid consists of 8MW and 18MW PV plants, 15 MW diesel generator, and 10 MW residential load and 0.16 MVA industrial load. The 24-hours data is expected to be monitored and neglectable the distance on SCADA through the implemented model. However, as the concept is built in the MATLAB Simulink platform, the system has an offset time at 10 hours of its operational. The output voltage and current show the rushed trend at the beginning of the system but getting steady as the system runs. As the results, this effected to the trend of the active power of the components of smart grid, which tends to remain steady and slower.
APA, Harvard, Vancouver, ISO, and other styles
9

Ara, Anees. "Security in Supervisory Control and Data Acquisition (SCADA) based Industrial Control Systems: Challenges and Solutions." IOP Conference Series: Earth and Environmental Science 1026, no. 1 (2022): 012030. http://dx.doi.org/10.1088/1755-1315/1026/1/012030.

Full text
Abstract:
Abstract Industrial control systems (ICS) play a vital role in monitoring and controlling the plants like power grids, oil and gas industries, manufacturing industries, and nuclear power plants. Present research and development in information and communication technologies have changed the domains of industrial control systems from traditional electromagnetic to network- based digital systems. This domain shift has created better interfaces for communication between physical processes and the control units. Eventually, making the complex process of monitoring and controlling the industries easier, with the help of internet connections and computing technologies. The field instruments such as sensors and actuators and the physical processes in industries are controlled and monitored by programmable logic controllers (PLC), remote telemetric units (RTU), and supervisory control and data acquisition systems (SCADA) with the help of communication protocols. The seamless integration of the information technologies (IT) and operational technologies (OT) make the management of the industrial environment foster. However, the inclusion of new technologies that increase the number of internet connections, the new communication protocols, and interfaces that run on open-source software, brings up new threats and challenges in addition to existing vulnerabilities in these classical legacy-based heterogeneous hardware and software systems. Due to the increase in the number of security incidents on critical infrastructures, the security considerations for SCADA systems/ICS are gaining interest among researchers. In this paper, we provide a description of SCADA/ICS components, architecture, and communication protocols. Additionally, we discuss details of existing vulnerabilities in hardware, software, and communication protocols. Further, we highlight some prominent security incidents and their motives behind them. We analyse the existing state of OT and IT security in SCADA systems by classifying the SCADA components among them. Finally, we provide security recommendations based on current trends and also discuss open research problems in SCADA security.
APA, Harvard, Vancouver, ISO, and other styles
10

Cosmin-Ionuț, Toma, Popescu Mihaela, Constantinescu Mihăiță-Daniel, and Buzatu Gabriel-Cosmin. "Remote Communication in the Substation's SCADA System." Annals of the University of Craiova Electrical Engineering Series 48 (January 23, 2025): 81–86. https://doi.org/10.52846/aucee.2024.12.

Full text
Abstract:
The aim of this paper is the implementation and validation of a mobile phone remote connection to a Supervisory Control and Data Acquisition system (SCADA) of a railway traction substation. The implementation was done not only to optimize the time in which the user intervenes within the electrical substations, in case of a fault or other event, but mostly to be able to react in unforeseen situations where the person in charge is not and cannot quickly reach the electrical substation or even the remote desktop. For this, the operator can connect to the system using the mobile phone and the corresponding mobile phone software using an interface similar to the remote desktop. Therefore, the operator can hand the fault and make the required actions or improvements. The proposed system gives the ability to optimize the intervention costs considering the required trips to the electrical substation, and even more the trip to the SCADA remote desktop station. Therefore, a wireless remote connection method is approached via the mobile phone network to the SCADA system.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "SCADA communication"

1

Delport, Pierre. "Optimisation of UHF radio SCADA systems for electrical distribution networks." Thesis, Stellenbosch : University of Stellenbosch, 2006. http://hdl.handle.net/10019.1/1905.

Full text
Abstract:
Thesis (MScEng (Electrical and Electronic Engineering))--University of Stellenbosch, 2006.<br>This thesis presents the results of an investigation to establish methods to improve the performance of area radio based communication systems for Supervisory Control and Data Acquisition (SCADA) systems. The considerable scale on which an area radio network is used as a telecommunication network is quite unique to South Africa due to a lack of high bandwidth telecommunication systems in rural areas. Research was done to establish Key Performance Indicators (KPIs) to measure the performance of the area radio telecommunication systems. Two KPIs were chosen, namely Remote Terminal Unit (RTU) availability and Control Success Rate (CSR). These KPIs were trended over a three-year period to measure the effectiveness of measures taken to improve the systems. Two measures were implemented, namely to change the RTU radios, antennas and coaxial feeder cables and to redesign the communication systems in such a way to restrict multiple RTU protocols on the same area radio telecommunication network. The installation of new digital radios together with low loss coaxial cable and specific antennas improved the RTU availability from 96.87 % for the year 2002 to 99.17 % for the year 2004, which realised in an increase of 2.83 % for 432 installed RTUs. This measure, however, did not influence the CSR. The implementation of the newly designed communication networks had a significant influence on the control success rate of the SCADA systems and the KPI increased from 77.65 % for the year 2002 to 78.76 % for the year 2003 and 80.88 % for the year 2004. A drastic increase in performance was observed after the restriction of multiple RTU protocols on the same network during May 2004, where the value for twelve months prior to September 2005 was measured at 84.38 %. The utilisation of area radio telecommunication networks was measured for two operational networks and it was found to be well within the specifications of international accepted standards. One of these networks comprised of three repeaters and 84 installed RTUs and an average utilisation of 17 % and a peak utilisation of 25 % was measured. The other network had an installed base of 4 repeaters and 15 installed RTUs’s and an average utilisation of 3 % and a peak utilisation of 8 % was measured. This compares favourable with the IEEE standard 999-1992 [20], which recommends a channel utilisation of between 40 % and 60 %. Keywords : Key performance indicators, Radio telecommunication networks, Remote terminal unit
APA, Harvard, Vancouver, ISO, and other styles
2

Chenine, Moustafa. "Wide area monitoring and control systems application communication requirements and simulation /." Licentiate thesis, Stockholm : Skolan för elektro- och systemteknik, Kungliga Tekniska högskolan, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-11316.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bayou, Lyes. "Assessment and enforcement of wireless sensor network-based SCADA systems security." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2018. http://www.theses.fr/2018IMTA0083/document.

Full text
Abstract:
La sécurité des systèmes de contrôle industriel est une préoccupation majeure. En effet, ces systèmes gèrent des installations qui jouent un rôle économique important. En outre, attaquer ces systèmes peut non seulement entraîner des pertes économiques, mais aussi menacer des vies humaines. Par conséquent, et comme ces systèmes dépendent des données collectées, il devient évident qu’en plus des exigences de temps réel, il est important de sécuriser les canaux de communication entre ces capteurs et les contrôleurs principaux. Ces problèmes sont plus difficiles à résoudre dans les réseaux de capteurs sans fil (WSN). Cette thèse a pour but d’aborder les questions de sécurité des WSN. Tout d’abord, nous effectuons une étude de sécurité approfondie du protocole WirelessHART. Ce dernier est le protocole leader pour les réseaux de capteurs sans fil industriels (WISN). Nous évaluons ses forces et soulignons ses faiblesses et ses limites. En particulier, nous décrivons deux vulnérabilités de sécurité dangereuses dans son schéma de communication et proposons des améliorations afin d’y remédier. Ensuite, nous présentons wIDS, un système de détection d’intrusion (IDS) multicouches qui se base sur les spécifications, spécialement développé pour les réseaux de capteurs sans fil industriels. L’IDS proposé vérifie la conformité de chaque action effectuée par un noeud sans fil sur la base d’un modèle formel du comportement normal attendu<br>The security in Industrial Control Systems is a major concern. Indeed, these systems manage installations that play an important economical role. Furthermore, targeting these systems can lead not only to economical losses but can also threaten human lives. Therefore, and as these systems depend on sensing data, it becomes obvious that additionally to real-time requirement, it is important to secure communication channels between these sensors and the main controllers. These issues are more challenging inWireless Sensor Networks (WSN) as the use of wireless communications brings its own security weaknesses. This thesis aims to address WSN-based security issues. Firstly, we conduct an in-deep security study of the WirelessHART protocol. This latter is the leading protocol for Wireless Industrial Sensor Networks (WISN) and is the first international approved standard. We assess its strengths and emphasize its weaknesses and limitations. In particular, we describe two harmful security vulnerabilities in the communication scheme of WirelessHART and propose improvement in order to mitigate them. Secondly, we present wIDS, a multilayer specification based Intrusion Detection System (IDS) specially tailored for Wireless Industrial Sensor Networks. The proposed IDS checks the compliance of each action performed by a wireless node based on a formal model of the expected normal behavior
APA, Harvard, Vancouver, ISO, and other styles
4

Zenkert, Patrik, and Douglas Lowén. "Automatic control of renewable energy sources at varying load." Thesis, Uppsala universitet, Elektricitetslära, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-415098.

Full text
Abstract:
With the current climate crisis with the global temperature increasing due to fossil fuels being used there are big investments in green energy. Wind power is a good alternative to fossil fueled power and already has a widespread use. One of the problems with wind poweris control and keeping the grid frequency stable during peaks and lows of power generation. In this master thesis there is a goal to implement a system which can regulate wind mills while always trying to use as much wind power as possible. A model was built in Matlab to represent the final product which was translated into a SCADA system. A fully integrated communication from SCADA computer to PLC to IED to wind mill and back was built. The simulation in the SCADA system gave satisfactory result where the wind power wasutilized to the maximum, and other conditions met. The laboratory experiment with an Arduino represented as the wind mill lacked in communication and the model did not achieveperfect results in every case. There is future work to be done, improved communication, additional or alternative automatic control and creating a bigger system with several powerproducers integrated.
APA, Harvard, Vancouver, ISO, and other styles
5

Chenine, Moustafa. "Analyzing Non-Functional Capabilities of ICT Infrastructures Supporting Power System Wide Area Monitoring and Control." Doctoral thesis, KTH, Industriella informations- och styrsystem, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-118443.

Full text
Abstract:
The strain on modern electrical power systems has led to an ever-increasing utilization of new information and communication technologies (ICT) to improve their efficiency and reliability. Wide area monitoring and control (WAMC) systems offer many opportunities to improve the real-time situational awareness in the power system. These systems are essen-tially SCADA systems but with continuous streaming of measurement data from the power system. The quality of WAMC systems and the applications running on top of them are heavily, but not exclusively, dependent on the underlying non-functional quality of the ICT systems. From an ICT perspective, the real-time nature of WAMC systems makes them susceptible to variations in the quality of the supporting ICT systems. The non-functional qualities studied as part of this research are performance, interoperability and cyber security. To analyze the performance of WAMC ICT systems, WAMC applications were identified, and their requirements were elicited. Furthermore, simulation models capturing typical utility communication infrastructure architectures were implemented. The simulation studies were carried out to identify and characterize the latency in these systems and its impact on data quality in terms of the data loss. While performance is a major and desirable quality, other non-functional qualities such as interoperability and cyber security have a significant impact on the usefulness of the sys-tem. To analyze these non-functional qualities, an enterprise architecture (EA) based framework for the modeling and analysis of interoperability and cyber security, specialized for WAMC systems, is proposed. The framework also captures the impact of cyber security on the interoperability of WAMC systems. Finally, a prototype WAMC system was imple-mented to allow the validation of the proposed EA based framework. The prototype is based on existing and adopted open-source frameworks and libraries. The research described in this thesis makes several contributions. The work is a systematic approach for the analysis of the non-functional quality of WAMC ICT systems as a basis for establishing the suitability of ICT system architectures to support WAMC applications. This analysis is accomplished by first analyzing the impact of communication architectures for WAMC systems on the latency. Second, the impact of these latencies on the data quali-ty, specifically data currency (end to end delay of the phasor measurements) and data in-completeness (i.e., the percentage of phasor measurements lost in the communication), is analyzed. The research also provides a framework for interoperability and cyber security analysis based on a probabilistic Monte Carlo enterprise architecture method. Additionally, the framework captures the possible impact of cyber security on the interoperability of WAMC data flows. A final result of the research is a test bed where WAMC applications can be deployed and ICT architectures tested in a controlled but realistic environment.<br><p>QC 20130218</p>
APA, Harvard, Vancouver, ISO, and other styles
6

Oliveira, J?nior Carlos Augusto de. "Desenvolvimento de um protocolo de comunica??o para automa??o de subesta??es m?veis via sat?lite." Universidade Federal do Rio Grande do Norte, 2005. http://repositorio.ufrn.br:8080/jspui/handle/123456789/15427.

Full text
Abstract:
Made available in DSpace on 2014-12-17T14:56:04Z (GMT). No. of bitstreams: 1 CarlosAOJ.pdf: 1085948 bytes, checksum: 14c962ba5a82f983a474383c27475bb0 (MD5) Previous issue date: 2005-12-19<br>One of the most important decisions to turn a substation automatic and no attended it relates to the communication media between this substation and Operation Center. Generally energy companies uses radio or optic fiber, depending of distances and infrastructure of each situation. This rule applies to common substations. Mobile substations are a particular case, therefore they are conceived for use at provisional situations, emergencies, preventive or corrective maintenance. Thus the telecommunication solution used at common substations are not applied so easily to mobile substations, due absence of infrastructure (media) or difficulty to insert the mobile substation data in existing automation network not long. The ideal media must supply covering in a great geographic area to satisfy presented requirements. The implantation costs of this big infrastructure are expensive, however a existing operator may be used. Two services that fulfill that requirements are satellite and cellular telephony. This work presents a solution for automation of mobile substations through satellite. It was successfully implanted at a brazilian electric energy concessionaire named COSERN. The operation became transparent to operators. Other gotten benefits had been operational security, quality in the supply of electric energy and costs reduction. The project presented is a new solution, designed to substations and general applications where few data should be transmitted, but there is difficulties in relation to the media. Despite the satellite having been used, the same resulted can be gotten using celullar telephony, through Short Messages or packet networks as GPRS or EDGE.<br>Uma das decis?es t?cnicas mais importantes para se automatizar uma subesta??o e torn?-la desassistida refere-se ao meio de comunica??o entre esta subesta??o e o Centro de Opera??es. Normalmente as empresas do setor el?trico optam por usar r?dio ou fibra ?tica, dependendo das dist?ncias e infra-estrutura dispon?vel em cada situa??o. Essa regra se aplica a subesta??es comuns. Subesta??es m?veis s?o um caso particular, pois s?o concebidas para uso em situa??es sazonais, emerg?ncias, manuten??es preventivas ou corretivas. Dessa forma, as solu??es de telecomunica??es para subesta??es comuns n?o s?o facilmente aplic?veis ?s m?veis, seja devido ? inexist?ncia de infra-estrutura (meio de comunica??o), ou ? dificuldade de inserir, em um curto espa?o de tempo, as informa??es da subesta??o m?vel numa rede de automa??o existente. Considera-se, ent?o, que para atender aos requisitos de mobilidade apresentados, o meio de comunica??o ideal deve fornecer cobertura em uma grande ?rea geogr?fica. Os custos de implanta??o de uma infra-estrutura desse porte s?o muito elevados, por?m os servi?os de uma operadora existente podem ser usados. Dois servi?os que atendem bem a esses requisitos s?o o sat?lite e a telefonia celular. Neste trabalho, ? apresentada uma solu??o para automa??o de subesta??es m?veis atrav?s de enlace via sat?lite. O projeto foi implantado na concession?ria de energia COSERN, com sucesso. A opera??o tornou-se transparente aos operadores. Outros benef?cios obtidos foram seguran?a operacional, qualidade no fornecimento de energia el?trica e redu??o de custos. A solu??o apresentada ? um projeto piloto, voltado n?o s? para subesta??es, mas para aplica??es cujo volume de dados transmitidos seja pequeno, e h? dificuldades quanto ao meio de comunica??o. Apesar do sat?lite ter sido usado, pode-se obter o mesmo resultado usando-se a telefonia celular, atrav?s de Short Messages ou via rede de comuta??o de pacotes, como o GPRS ou o EDGE.
APA, Harvard, Vancouver, ISO, and other styles
7

Srp, Jakub. "Simulátor průmyslové komunikace standardu IEC 61850." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413076.

Full text
Abstract:
This thesis is focused on IEC 61850 communication protocols SMV, GOOSE and MMS and their implementation in SCADA systems. There is a simulator, run on Raspberry Pi, that generates data according to IEC 61850 and transmits the data using protocols in question. The simulation consist of various virtual devices e.g. surge protection, undervoltage protection, circuit breaker, disconnector, HMI. The MMS protocol is used for station control. Simulation can be user-defined from textual configuration file.
APA, Harvard, Vancouver, ISO, and other styles
8

Ahmed, Sipan. "Java integrering med PLC." Thesis, Högskolan i Gävle, Avdelningen för elektroteknik, matematik och naturvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-33196.

Full text
Abstract:
Digitization has been given a greater role in the monitoring and control of a processing plant. This trend will grow globally to achieve a smarter production chain that generates ecenomic profits. The purpose of this thesis was to develop an existing process that respresents an automated drilling station. THis i scontrolled by integrating Java-netbeans software into the PLC hardware with a user interface that can read the data flow of PLC.The drilling station is controlled by PLC. This work describes the possible methods for achieving integration between Java-netbeans and PLC.  The essential part of the work was literature study, programming of source code and programming of PLC. This work achieved all the objectives.<br>Digitaliseringen har fått en större roll i övervakning och styrning av en processanläggning. Denna trend kommer att växa globalt för att uppnå en smartare produktionskedja som giver ekonomiska vinster. Syftet med detta examensarbete var att utveckla en befintlig process som föreställer en automatiserad borrstation. Detta styrs genom lufttryck, sensorer, cylindrar och relä ventiler. Utvecklingen skedde genom att integrera Java-netbeans mjukvara till PLC hårdvaran med ett användargränssnitt som kan läsa av dataflödet av PLC. Borrstationen styrs av PLC. I detta arbete beskrivs vilka möjliga metoder det finns för att uppnå integrering mellan Java-netbeans och PLC. Arbetets essentiella delar var litteraturstudie, programmering av källkod och programmering av PLC. Detta arbete uppnådde alla målsättningar.
APA, Harvard, Vancouver, ISO, and other styles
9

Zapletal, Filip. "Uživatelské rozhraní pro řízení technologií." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-264977.

Full text
Abstract:
This paper describes systems and user interfaces for monitoring and supervisory control of technological equipment. It describes basic approaches used to solve this problem, commonly used communication protocols and existing user interfaces. Based on those findings are defined requirements for design of a modern user interface for technology supervision and control, particularly in the area of clean and waste water distribution systems. The thesis concludes with a description of a user interface based on defined requirements and finally compares them with existing systems.
APA, Harvard, Vancouver, ISO, and other styles
10

Eriksson, Joakim. "Representation of asynchronous communication protocols in Scala and Akka." Thesis, Linköpings universitet, Programvara och system, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-96660.

Full text
Abstract:
This thesis work investigates how to represent protocols for asynchronous communication in the Scala programming language and the Akka actor framework, to be run on Java Virtual Machine (JVM). Further restrictions from the problem domain - the coexistence of multiple protocol instances sharing the same Java thread - imply that neither an asynchronous call waiting for response nor anything else can block the underlying Java threads. A common way to represent asynchronous communication protocols is to use state machines. This thesis seeks a way to shrink the size of and to reduce the complexity of the protocol implementations by representing sequences of asynchronous communication calls (i.e. sequences of sent and received messages) as a type of procedure. The idea is find a way to make the procedures that contain asynchronous calls look like synchronous communication procedures by hiding the asynchronous details. In other words, the resulting procedure code should show what to do and not so much focus on how to overcome the impediment of the asynchronous calls. With the help of an asynchronous communication protocol toy example, this report shows how such an protocol can be implemented with a combination of a state machine and a procedure representation in Scala and Akka. The procedure representation hides away the asynchronous details by using the Scala capability to use CPS-transformed delimited continuations. As a sub-problem, this thesis also shows how to safely schedule asynchronous communication timeouts with help of Scala and Akka within the restrictions of the thesis problem domain.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "SCADA communication"

1

IEEE Power Engineering Society. Substations Committee. and IEEE Standards Board, eds. IEEE recommended practice for master/remote supervisory control and data acquisition (SCADA) communications. Institute of Electrical and Electronics Engineers, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Semiotica del formato: Misure, peso, volume, proporzioni, scala. Mimesis, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "SCADA communication"

1

Khelil, Abdelmajid, Daniel Germanus, and Neeraj Suri. "Protection of SCADA Communication Channels." In Critical Infrastructure Protection. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28920-0_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mahmood, Abdun Naser, Christopher Leckie, Jiankun Hu, Zahir Tari, and Mohammed Atiquzzaman. "Network Traffic Analysis and SCADA Security." In Handbook of Information and Communication Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-04117-4_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pramod, T. C., and N. R. Sunitha. "SCADA: Analysis of Attacks on Communication Protocols." In Proceedings of International Symposium on Sensor Networks, Systems and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75683-7_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kilpatrick, Tim, Jesus Gonzalez, Rodrigo Chandia, Mauricio Papa, and Sujeet Shenoi. "An Architecture for SCADA Network Forensics." In IFIP Advances in Information and Communication Technology. Springer New York, 2006. http://dx.doi.org/10.1007/0-387-36891-4_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Thornton, Zach, and Thomas Morris. "Enhancing a Virtual SCADA Laboratory Using Simulink." In IFIP Advances in Information and Communication Technology. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26567-4_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Robles, Rosslin John, and Tai-hoon Kim. "An Encryption Scheme for Communication Internet SCADA Components." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13346-6_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Song, Jae-gu, Sungmo Jung, and Seoksoo Kim. "Study on the Future Internet System through Analysis of SCADA Systems." In Communication and Networking. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17587-9_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Birnbaum, Zachary, Matthew Davis, Salman Salman, et al. "Cyber-Resilient SCADA Systems via Secure State Restoration." In IFIP Advances in Information and Communication Technology. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62840-6_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ju, Seunghwan, Jaekyoung Lee, Joonyoung Park, and Junshin Lee. "Secure Concept of SCADA Communication for Offshore Wind Energy." In Advances in Parallel and Distributed Computing and Ubiquitous Services. Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0068-3_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Redwood, Owen, Joshua Lawrence, and Mike Burmester. "A Symbolic Honeynet Framework for SCADA System Threat Intelligence." In IFIP Advances in Information and Communication Technology. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26567-4_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "SCADA communication"

1

Vigya, Aiswarya Raveendran, Lagineni Mahendra, and RK Senthil Kumar. "Conformance testing tool for Power SCADA Communication Protocol." In 2024 IEEE PES Innovative Smart Grid Technologies - Asia (ISGT Asia). IEEE, 2024. https://doi.org/10.1109/isgtasia61245.2024.10876362.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Toma, Cosmin-Ionut, Mihaela Popescu, Mihăiţă-Daniel Constantinescu, and Gheorghe-Eugen Subţirelu. "Wireless Communication for SCADA System of a Railway Electrical Substation." In 2024 International Conference on Applied and Theoretical Electricity (ICATE). IEEE, 2024. http://dx.doi.org/10.1109/icate62934.2024.10749365.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chijioke Ahakonye, Love Allen, Kalibbala Jonathan Mukisa, Cosmas Ifeanyi Nwakanma, and Dong-Seong Kim. "Eco-Secure SCADA: Towards Machine Learning Reliability for Green Cybersecurity." In 2025 International Conference on Artificial Intelligence in Information and Communication (ICAIIC). IEEE, 2025. https://doi.org/10.1109/icaiic64266.2025.10920796.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Aditya and Chandra Sekhar Dash. "LightGBM-Powered Solutions for Backdoor Malware Detection in SCADA Networks." In 2024 International Conference on Communication, Computing and Energy Efficient Technologies (I3CEET). IEEE, 2024. https://doi.org/10.1109/i3ceet61722.2024.10994149.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shahzad, AAmir, and Shahrulniza Musa. "Securing SCADA communication using hybrid cryptography." In the 6th International Conference. ACM Press, 2012. http://dx.doi.org/10.1145/2184751.2184823.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Obeid, Fadi, and Philippe Dhaussy. "RITA Secure Communication Protocol : Application to SCADA." In Eighth International Conference on Networks & Communications. Academy & Industry Research Collaboration Center (AIRCC), 2016. http://dx.doi.org/10.5121/csit.2016.61504.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Daniela, Tudorica. "Communication security in SCADA pipeline monitoring systems." In 2011 RoEduNet International Conference 10th Edition: Networking in Education and Research. IEEE, 2011. http://dx.doi.org/10.1109/roedunet.2011.5993706.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shabani, Hikma, Musse Mohamud Ahmed, Sheroz Khan, Shihab Ahmed Hameed, Mohamed Hadi Habaebi, and Alhareth Zyoud. "Novel IEEE802.15.4 Protocol for Modern SCADA communication systems." In 2014 IEEE 8th International Power Engineering and Optimization Conference (PEOCO). IEEE, 2014. http://dx.doi.org/10.1109/peoco.2014.6814498.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Herrera, A. "RF front-end for V-SCADA communication networks." In IEE Colloquium on RF and Microwave Circuits for Commercial Wireless Applications. IEE, 1997. http://dx.doi.org/10.1049/ic:19970164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bou-Harb, Elias. "Passive inference of attacks on SCADA communication protocols." In ICC 2016 - 2016 IEEE International Conference on Communications. IEEE, 2016. http://dx.doi.org/10.1109/icc.2016.7510609.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "SCADA communication"

1

Vaidhynathan, Deepthi, Kumaraguru Prabakar, Akanksha Singh, et al. Enabling Interoperable SCADA Communications for PV Inverters through Embedded Controllers. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1787835.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tzonev, Nick. PR-396-183905-R01 Autonomous System For Monitoring Pipeline River Crossings. Pipeline Research Council International, Inc. (PRCI), 2021. http://dx.doi.org/10.55274/r0012110.

Full text
Abstract:
The goal of the GHZ-2-01 Project is to develop and lab-test a system for monitoring underground pipeline facilities at remote river crossings where access to power and wireline communications is not readily available. A next generation real-time river crossing monitoring solution requires an integration of various sensor types, data computation capabilities, and low power wireless connectivity which would: - utilize proven sensors technologies such as accelerometers, inclinometer strings and float-out buoys to detect dangerous conditions, - be able to recognize and minimize false alarms by examining a combination of sensors, - alarm on contact with hydrocarbons, - require minimal maintenance, - be easily scalable, both geographically and as a network, - provide seamless integration into Supervisory Control and Acquisition (SCADA) systems, and - be economical. There is a related webinar.
APA, Harvard, Vancouver, ISO, and other styles
3

García Marrugo, Alexandra I., Katherine Olston, Josh Aarts, Dashiell Moore, and Syed Kaliyadan. SCANA: Supporting students’ academic language development at The University of Sydney. Journal of the Australian and New Zealand Student Services Association, 2023. http://dx.doi.org/10.30688/janzssa.2023-2-01.

Full text
Abstract:
In 2021, the Learning Hub at The University of Sydney launched the Student Communication and Needs Analysis (SCANA). This program of support consists of a screening language task and associated support interventions in first year units of study (UoS). The self-marking online screening tool developed by the Language Testing Research Centre at The University of Melbourne classifies students into three bands, with Band 1 identifying students at risk of academic failure due to insufficient language proficiency. All students in selected UoS are encouraged to take SCANA and offered academic language support according to their needs. Students identified in Band 1 are advised to attend discipline-specific support targeting the language issues associated with written assignments. These students are also informed about other offerings, such as one-on-one consultations, generic academic workshops, peer-facilitated programs, and self-access resources. Students in Bands 2 and 3 are also offered options according to their level. The results from Semester 1 2022 showed that students identified in Band 1 who attended at least two support workshops obtained, on average, 12 more points in their final grade and were up to five times less likely to fail than those in Band 1 who did not attend any workshops. These promising results have motivated faculty to expand the program from seven UoS in 2021 to 32 UoS in 2023.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography