To see the other types of publications on this topic, follow the link: SCADA.

Dissertations / Theses on the topic 'SCADA'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'SCADA.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Brandi, Denis. "SCADA Lite View." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6583/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gomes, Miguel Ferreira Pereira. "Canal SCADA na Web." Master's thesis, Universidade do Porto. Reitoria, 2002. http://hdl.handle.net/10216/10358.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Studený, Radim. "Simulátor komunikace protokolů SCADA." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-377061.

Full text
Abstract:
This work describes DNP3, IEC-60870, IEC-61850 communication protocols and their implementing in SCADA systems. It further describes communication of these protocols between RaspberryPi as a slave device and Personal Computer as a master device.
APA, Harvard, Vancouver, ISO, and other styles
4

Gomes, Miguel Ferreira Pereira. "Canal SCADA na Web." Dissertação, Universidade do Porto. Reitoria, 2002. http://hdl.handle.net/10216/10358.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Strand, Simon. "SCADA-system till Unnefors sågverk." Thesis, Linköpings universitet, Institutionen för teknik och naturvetenskap, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-96319.

Full text
Abstract:
Södra Timber AB är ett företag som ägs av nordens ca 35 000 skogsägare. Företaget tar hand om nersågat skog som fraktas till nått av Södra Timber AB:s 10 sågverk. Här tar de hand om timret och tillverkar virkesråvara, trävaror och biobränsle. Sågverket önskar att till sitt timmerintaget skaffa sig ett SCADA-system ( Supervisory Control And Data Acquisition). Detta är ett övervakningssystem som kan styra och övervaka produktionen. Ett SCADA-system kan t.ex användas för att styra motorer och avläsa mätvärden som förekommer i produktion. På dataskärmen kan man få uppgifter som ström, spänning, effekt eller om motorn håller på att gå sönder. Med hjälp av ett SCADA-system skulle man med lätthet hitta. t.ex. motorer som gått sönder eller en fotocell som gått sönder och på så vis stoppa linjen innan något händer. På det viset sparar man både tid och pengar. Syftet med detta examensprojekt var att jämföra olika SCADA-system. Jämförelsen gjordes med avseende på pris, prestanda och möjligheter att bygga ut systemet mm Resultatet blev ett dokument med information om bla. SCADA-systemens priser, möjligheter till support och uppgraderings möjligheter till utbyggnad av systemen. Resultatet av detta examensprojekt ger ej tillräckligt underlag för att bedöma vilket av de 3 undersökta SCADA-systemen som är bäst för Unnefors sågverk. För att kunna utvärdera det skulle man behöva mer tid till arbetet.
APA, Harvard, Vancouver, ISO, and other styles
6

Stolpe, Pär. "Evaluation and Implementation of SCADA Systems." Thesis, Linköping University, Department of Electrical Engineering, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-971.

Full text
Abstract:

In this bachelor thesis a comparison and evaluation of six different process visualization programs has been made. The purpose of the comparison is to find a suitable program for an experiment in control, held at Linköpings universitet, but also to get an overview of the market at the time this report was written.

After the evaluation an implementation is carried out with the programs that were bought. RSLogix, InTouch, InSQL and SuiteVoyager, one programming tool, one visualization tool, a database-manager and a web-portal for interaction over the Internet.

APA, Harvard, Vancouver, ISO, and other styles
7

Rodrigues, Aniket. "SCADA security device: design and implementation." Thesis, Wichita State University, 2011. http://hdl.handle.net/10057/5195.

Full text
Abstract:
Securing SCADA systems is a critical aspect of Smart grid security. As sophisticated attacks continue to target industrial systems, the focus should be on planning and developing new security techniques that will adapt to the SCADA environment and protocols. Traditional SCADA protocols such as DNP3, Modbus and ICCP do not support encryption, authentication and data integrity in their native form. Although they can be secured with VPN tunnels, IPSEC adds significant network overhead and complexity to the end hosts. SCADA devices may lack the computing resources to implement this kind of technique. In this thesis, a security design is proposed that can help make communications between the master stations and slave devices in a SCADA network secure without putting additional overhead on the remote devices. This research designs a SCADA Security Device (SSD), which can work in conjunction with other network elements to implement a secure architecture for SCADA protocols. Several components of the SSD were implemented and tested during this research to evaluate the security features in a SCADA network.
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and Computer Science.
APA, Harvard, Vancouver, ISO, and other styles
8

Valentine, Sidney E. "PLC code vulnerabilities through SCADA systems." Thesis, University of South Carolina, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=3561883.

Full text
Abstract:

Supervisory Control and Data Acquisition (SCADA) systems are widely used in automated manufacturing and in all areas of our nation's infrastructure. Applications range from chemical processes and water treatment facilities to oil and gas production and electric power generation and distribution. Current research on SCADA system security focuses on the primary SCADA components and targets network centric attacks. Security risks via attacks against the peripheral devices such as the Programmable Logic Controllers (PLCs) have not been sufficiently addressed. Our research results address the need to develop PLC applications that are correct, safe and secure. This research provides an analysis of software safety and security threats. We develop countermeasures that are compatible with the existing PLC technologies. We study both intentional and unintentional software errors and propose methods to prevent them. The main contributions of this dissertation are: 1). Develop a taxonomy of software errors and attacks in ladder logic 2). Model ladder logic vulnerabilities 3). Develop security design patterns to avoid software vulnerabilities and incorrect practices 4). Implement a proof of concept static analysis tool which detects the vulnerabilities in the PLC code and recommend corresponding design patterns.

APA, Harvard, Vancouver, ISO, and other styles
9

Udd, Robert. "Anomaly Detection in SCADA Network Traffic." Thesis, Linköpings universitet, Programvara och system, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-122680.

Full text
Abstract:
Critical infrastructure provides us with the most important parts of modern society, electricity, water and transport. To increase efficiency and to meet new demands from the customer remote monitoring and control of the systems is necessary. This opens new ways for an attacker to reach the Supervisory Control And Data Acquisition (SCADA) systems that control and monitors the physical processes involved. This also increases the need for security features specially designed for these settings. Anomaly-based detection is a technique suitable for the more deterministic SCADA systems. This thesis uses a combination of two techniques to detect anomalies. The first technique is an automatic whitelist that learns the behavior of the network flows. The second technique utilizes the differences in arrival times of the network packets. A prototype anomaly detector has been developed in Bro. To analyze the IEC 60870-5-104 protocol a new parser for Bro was also developed. The resulting anomaly detector was able to achieve a high detection rate for three of the four different types of attacks evaluated. The studied methods of detection are promising when used in a highly deterministic setting, such as a SCADA system.
APA, Harvard, Vancouver, ISO, and other styles
10

Сердюк, О. С. "SCADA — система водозабору та очищення води." Master's thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/71278.

Full text
Abstract:
Робота присвячена дослідженню сучасних методів створення засобів водозабезпечення та очищення води використанням SCADA технологій. Метою роботи є аналіз існуючих підходів до створення систем водопостачання та їх реалізація. У роботі було розглянуто відомі методи побудови систем. Проаналізовано реалізацію цих підходів на прикладі сучасних систем прогнозування.
APA, Harvard, Vancouver, ISO, and other styles
11

Mareček, Matěj. "IDE for SCADA Development at CERN." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255482.

Full text
Abstract:
Cílem této magisterské práce je navrhnout a implementovat IDE (integrované vývojové prostředí), které zvýší efektivitu a bezpečnost vývoje pro SIMATIC WinCC Open Architecture. Tato práce je založena na výzkumu provedeném týmem z Technické univerzity v Eindhovenu a splňuje požadavky pocházející ze SCD sekce v CERN (Evropské organizace pro jaderný výzkum). Vyvinuté IDE je postaveno na platformě Eclipse, přičemž pro syntaktickou analýzu, linkování a sémantickou analýzu kódu používá Xtext framework. IDE nabízí také podporu pro nově vytvořený programovací jazyk, který umožňuje programátorům jednoduše nadefinovat šablonu pro konfigurační soubory používané WinCC OA. Interpret tohoto nového jazyka je schopen provést syntaktickou analýzu šablony a konfiguračního souboru a rozhodnout, zdali konfigurační soubor odpovídá šabloně. Praktickým výstupem této práce je integrované vývojové prostředí, které podporuje vývoj WinCC OA aplikací v CERN a periodicky provádí analýzu kódu těchto aplikací napsaného v jazyce Control script.
APA, Harvard, Vancouver, ISO, and other styles
12

Lopes, João Paulo. "Sistema SCADA para a indústria pecuária." Master's thesis, Universidade de Aveiro, 1995. http://hdl.handle.net/10773/17559.

Full text
Abstract:
Mestrado em Engenharia Electrónica e Telecomunicações
Este trabalho foca o desenvolvimento de um sistema SCADA (Supervisory Control and Data Aquisition) com aplicabilidade directa na indústria pecuária. Como é habitual neste tipo de sistemas, a arquitectura assenta num conjunto de unidades remotas inteligentes, às quais estão ligados os sensores e actuadores, interligadas por um barramento de campo, que, por sua vez, é comandado por uma unidade central. Os dados adquiridos pelas unidades remotas são recolhidos pela unidade central em intervalos constantes e armazenados numa base de dados para mais processamento. A comunicação entre a unidade central e as unidades remotas é feita através do barramento de campo, usando um esquema depooling clássico. Todo o sistema é modular, podendo ser facilmente configurado de acordo com a aplicação final. A exploração pecuária alvo desta aplicação é dividida em duas partes - a ordenha e os alimentadores, estando aos respectivos subsistemas cometidas funções distintas. O sistema SCADA desenvolvido permite efectuar, de forma automática, a identificação de cada animal na exploração, a medição da quantidade de leite produzida, a atribuição controlada de rações, entre outras tarefas. Os dados recolhidos pela unidade central são processados 012 line por uma aplicação de gestão que é responsável pela definição das políticas de atribuição de ração aos animais assim como pela gestão da informação recolhida na exploração.
APA, Harvard, Vancouver, ISO, and other styles
13

Glas, Fredrik. "SCADA och OPC : Teori och implementering." Thesis, Mittuniversitetet, Avdelningen för elektronikkonstruktion, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-31351.

Full text
Abstract:
Även fast de flesta kanske skulle tänka på en industri när de hör talas om ett övervakande system, är det något som ökar inom fastighetsautomation idag. I och med att dagens byggnader blir mer intelligenta ökar behovet av att ha full koll på alla delar i ett fastighetssystem. Genom att implementera ett överordnat system, också kallat för SCADA system, kan en fastighet övervakas från ett och samma ställe vilket ger användaren full koll på vad som händer i en byggnad. Målet med detta arbete är att beskriva kommunikationen mellan ett överordnat och ett underliggande system samt att realisera ett SCADA system. Först beskrivs hur ett överordnat system fungerar och det följs upp med en utredning kring kommunikationsstandarden som ligger till grund för hur ett fungerande SCADA sedan kan implementeras. Med tanke på dagens användning av internet väcks genast frågan kring hur säkert ett liknande system kan implementeras i ett hus utan att det kan hackas av utomstående, vilket besvaras utifrån teorin. Slutsatsen är den att ett överordnat system har väldigt stor potential med tanke på att nästintill varje hushåll idag har internet och en dator eller mobil enhet. Kan man bortse från säkerhetsriskerna och hur stor kostnaden kan tänkas bli för att köpa sig ett liknande system är detta framtiden i våra hushåll.
Even though you probably first of all would think about industries when you hear about a monitoring system its something that is increasing in building automation today. As today's buildings become more intelligent, the need to gain full control of all parts of the system increases. By implementing a superiorvisory system, also known as a SCADA system, a property can be monitored from one location, giving the user a full overview of what's happening in the building. The aim of this work is to describe the communication between a supervisory and underlying system and to put togheter a small SCADA system. First of all is a description of how a superior system works and is followed up with an investigation about the chosen communication standard. A standard that underlies how a functional SCADA then can be implemented. Keep in mind of today's use of the Internet, it is at instance a question of how safe a similar system can be implemented in a house without being worried about third parties hacking your system. The conclusion is that this sort of system have a big potential when almost everyone has a computer and Internet at home. If you can neglect the security risks and how much the cost may be to buy a similar system is that this is the future in our houses.
APA, Harvard, Vancouver, ISO, and other styles
14

Petrov, Svetlomir. "Patch Delivery Infrastructure in SCADA Systems." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-239887.

Full text
Abstract:
As other technologies, the SCADA architecture, whose origin can be traced back to midtwentiethcentury, was not designed initially with security in mind. Recent cyber-attacks andsecurity incidents show that approaches like security through obscurity and air-gapping thesystems are not relevant anymore. An analysis from E-ISAC about the cyber-attack on theUkrainian power grid shows that the risk could be significantly mitigated with prioritizing andpatching the known vulnerabilities on the most critical assets in an organization. The problem ishow to assure the secure deployment of patches in a timely manner and to ensure that they areapplied to the correct targets. This is achievable with a patch delivery infrastructure.Within a heterogeneous environment with several operating system platforms, multiple use casesand stringent security requirements there is no standardized design which solves the problem.This was the case in large SCADA manufacturer who provides patch management service to itscustomers around the globe. The goal of the degree project was to study and model its currentpatch management workflow, the current patch delivery infrastructure and propose new designsand approaches based on the collected use cases, that must be covered by the company, andrequirements from academia and industry standards. Two new concrete designs were proposedwith different level requirements fulfilment and changes which must be done compared to the asisstate in the company. They are based on client-server and configuration manager approaches.A third multi-platform configuration management solution is briefly outlined and will require acomplete change in the patch delivery infrastructure.Lastly, an evaluation framework was applied on the current patch delivery infrastructure and thetwo concrete design proposals which ranks them according to the fulfilment of the collected usecases and requirements. One should note that the best solution which solves the problem mightnot be the best solution to be implemented in the company. Future work will be needed to makeprototypes, test and evaluate them with a better framework developed by the enterprise’s experts.
En stor nackdel med SCADA arkitekturen vars ursprung kan spåras tillbaka till 1980-talet är att den har inte utformats initialt med säkerhet i åtanke. Tidigare cyberattacker och säkerhetsincidenter visar att tillvägagångssätt som säkerhet genom obskärlighet och air-gapping av systemen är inte relevanta längre. Analyserna visar att risken kan minskas väsentligt med att prioritera och klistra in de kända sårbarheterna på de mest kritiska tillgångarna i en organisation. Problemet är hur man säkerställer säker installation av patchar i tid och för att säkerställa att de tillämpas på rätt mål. Detta kan uppnås med en patchleveransinfrastruktur. Inom en heterogen miljö med flera operativsystemplattformar, flera användningsfall och stränga säkerhetskrav finns det ingen standardiserad design som löser problemet. Detta var fallet i stor SCADA-tillverkare som tillhandahåller patch management service till sina kunder runt om i världen. Målet för examensprojektet var att studera och modellera sitt nuvarande patch managementworkflow, den nuvarande patchleveransinfrastrukturen och föreslå nya mönster och metoder baserade på de insamlade användarfall som måste omfattas av företaget och krav från akademin och industristandarder. Två nya konkreta konstruktioner föreslogs med olika nivåkravuppfyllelse och förändringar som måste göras jämfört med as-is-staten i företaget. De är baserade på klient-server och konfigurationshanteringsmetoder. En tredje lösning med flera plattforms konfigurationshanterare beskrivs kortfattat och kommer att kräva en fullständig förändring av patchleveransinfrastrukturen. Slutligen användes en utvärderingsram för den nuvarande patchleveransinfrastrukturen och de två konkreta designförslag som rangordnar dem enligt uppfyllandet av de samlade användningsfallen och kraven. Man bör notera att den bästa lösningen som löser problemet kanske inte är den bästa lösningen som ska implementeras i företaget. Framtida arbete kommer att behövas för att göra prototyper, testa och utvärdera dem med en bättre ram som utvecklats av företagets experter.
APA, Harvard, Vancouver, ISO, and other styles
15

Rak, Jan. "SCADA systém stanic pro kontrolu těsnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-316379.

Full text
Abstract:
The goal of this thesis is to develop SCADA/HMI system for stations on leak test. The software will be able to communicate with the station via the OCP server, by which the control station and store measured data. For this purpose, it was used more fiber processing, as for the actual communication, as well as to run the program and work with databases to store the results. The resulting program will be placed on the personal computer, which is part of the station to check for leaks.
APA, Harvard, Vancouver, ISO, and other styles
16

Samuel, Vivin Thomas. "Control of Smart Building Using Advanced SCADA." Scholar Commons, 2013. http://scholarcommons.usf.edu/etd/4935.

Full text
Abstract:
ABSTRACT For complete control of the building, a proper SCADA implementation and the optimization strategy has to be build. For better communication and efficiency a proper channel between the Communication protocol and SCADA has to be designed. This paper concentrate mainly between the communication protocol, and the SCADA implementation, for a better optimization and energy savings is derived to large scale industrial buildings. The communication channel used in order to completely control the building remotely from a distant place. For an efficient result we consider the temperature values and the power ratings of the equipment so that while controlling the equipment, we are setting a threshold values for FDD technique implementation. Building management system became a vital source for any building to maintain it and for safety purpose. Smart buildings, refers to various distinct features, where the complete automation system, office building controls, data center controls. ELC's are used to communicate the load values of the building to the remote server from a far location with the help of an Ethernet communication channel. Based on the demand fluctuation and the peak voltage, the loads operate differently increasing the consumption rate thus results in the increase in the annual consumption bill. In modern days, saving energy and reducing the consumption bill is most essential for any building for a better and long operation. The equipment - monitored regularly and optimization strategy is implemented for cost reduction automation system. Thus results in the reduction of annual cost reduction and load lifetime increase.
APA, Harvard, Vancouver, ISO, and other styles
17

Fernandes, Ricardo Jorge Nogueira. "Interfaces Web para Aplicações SCADA.[Fonte: DA]." Master's thesis, Universidade do Porto. Reitoria, 2003. http://hdl.handle.net/10216/14329.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Váňa, Martin. "Kybernetické prostředí pro systémy typu ICS/SCADA." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-400894.

Full text
Abstract:
The thesis explores the problematics of cyber environment for the ICS/SCADA systems. First, shorter section is mainly focused on general introduction into the ICS/SCADA systems and their inner workings. Communication model of a general SCADA system and its foundational elements are explained. It is mainly theoretical passage and it serves as an introduction. It is necessary for understanding the second part which is mainly practical. The appropriate system is chosen as a first thing in the practical part of the thesis for the implementation of the whole project. There are defined criteria on which the system itself is implemented. Following that the system itself is implemented under a framework called openMUC and it is tested with help of the simulators according to the objective of the thesis.
APA, Harvard, Vancouver, ISO, and other styles
19

Duisembiyeva, Akzharkyn. "Automated security analysis of a SCADA system." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-286336.

Full text
Abstract:
Supervisory control and data acquisition (SCADA) is a computer system for analysing, and monitoring data, as well as, controlling a plant in industries such as power grids, oil, gas refining, and water control. SCADA belongs to the category of critical systems that are needed to maintain the infrastructure of cities and households. Therefore, the security aspect of such a system has a significant role. The early SCADA systems were designed with the operation as the primary concern rather than security since they were a monolithic networked system without external access. However, the systems evolved, and SCADA systems were embedded with web technologies for users to monitor the data externally. These changes improved the efficiency of monitoring and productivity; however, this caused a problem of potential cyber-attacks to a SCADA system. One such example was Ukraine’s power grid blackout in 2015. Therefore, it is beneficial for the security of a SCADA system to create a threat modeling technique that can understand the critical components of SCADA, discover potential threats, and propose possible mitigation strategies. One issue when creating a threat model is the significant difference of SCADA from traditional Operational Technology (OT) systems. Another significant issue is that SCADA is a highly customisable system, and each SCADA instance can have different components. Therefore, for this work, we implemented a threat modeling language scadaLang, which is specific to the domain of a SCADA system. We started by defining the major assets of a SCADA system, attackers, entry surfaces, and built attacks and defense strategies. Then we developed a threat modeling domain-specific language scadaLang that can create a threat model for a particular instance of SCADA taking the differences in components and connections into account. As a result, we achieved a threat modeling language for SCADA, ensured the reliability of the results by peer-reviewing of an engineer familiar with the domain of the problem, and proposed a Turing test to ensure the validity of the result of scadaLang as the future development of the project.
Supervisory control and data acquisition (SCADA) är ett datorsystem för att analysera och monitorera data samt kontrollera anläggningar för industrier såsom energisystem, olja, raffinering av gas och vatten. SCADA tillhör den kategori av kritiska system som krävs för att bibehålla städer och hushålls infrastruktur. Därför är säkerhetsaspekten av ett sådant system av stor roll. De tidiga SCADA systemen var utformade med funktionen som huvudsaklig oro istället för säkerheten då de var monolitiska nätverkssystem utan extern åtkomst. Systemen utvecklades emellertid och SCADA systemen blev inbyggda med webbteknologier så att användare kan monitorera data externt. De här förändringarna förbättrade effektiviteten av monitorering och produktivitet men skapade problemet med potentiella cyber-attacker mot SCADA systemen. Ett sådant exempel är Ukrainas energy systems elavbrott som skedde 2015. Därför är det fördelaktigt för säkerheten av SCADA systemen att skapa en hotmodelleringsteknik för att bättre förstå de kritiska komponenterna av SCADA, hitta potentiella hot och föreslå potentiella förmildrande strategier. Ett problem för utvecklingen av en hotmodell är den stora skillnaden mellan SCADA från traditionella nätverkssystem inom industri. Ett annat stort problem är att SCADA är ett justerbart system och varje SCADA instans kan ha olika komponenter. Därför utvecklar vi i detta arbete ett språk för hotmodellering scadaLang som är specifikt för domänen SCADA system. Vi började med att definiera de huvudsakliga komponenterna av SCADA system, angriparna, attack ytorna och även bygga attacker samt försvarsstrategier. Sen utvecklade vi ett språk för hotmodelleringen som är domänspecifikt, scadaLang som kan skapa en hotmodell för en specifik instans av SCADA där skillnaderna på komponenter och sammankopplingar tas till hänsyn. Som resultat har vi skapat ett språk för hotmodellering för SCADA,verifierat resultat med hjälp av en ingenjör med domänkännedom och föreslagit ett Turing test för att förbättra verifieringen av resultatet som ett framtida arbete.
APA, Harvard, Vancouver, ISO, and other styles
20

Xu, Hao. "WINCC SCADA system via profibus & OPC." Thesis, Xu, Hao (2013) WINCC SCADA system via profibus & OPC. Other thesis, Murdoch University, 2013. https://researchrepository.murdoch.edu.au/id/eprint/21651/.

Full text
Abstract:
Over 1500 hours' effort were put into this intensive project with 6 weeks prior to the commencing date of the project to meet the objectives and requirements of the project. During this project, all the available devices, instruments including their configuration software were properly configured with all the expected features fully functioning. This thesis report summaries most of the work done with a reasonably detailed level to support future students with a comprehensive background to develop the project aspects in the future. A comprehensive SCADA system was designed and implemented using the configured devices and the control modules in the laboratory. The network structure of the control system was relatively large, but indeed demonstrated the capability of the automation system. Profibus communication networks in the laboratory were carefully designed and fully set up with proper labels, which would then be used as an education tool to gain the experience of industrial communication by the students. Over 500 pages of configuration manuals of devices and configuration software were created as a large part of the focus of this project. The configuration manuals contain a huge range of information which covers more than what students need during their study. Those manuals are expected to guide students for their projects and troubleshooting.
APA, Harvard, Vancouver, ISO, and other styles
21

Fernandes, Ricardo Jorge Nogueira. "Interfaces Web para Aplicações SCADA.[Fonte: DA]." Dissertação, Universidade do Porto. Reitoria, 2003. http://hdl.handle.net/10216/14329.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Burián, Michal. "Řízení inteligentní elektroinstalace pomoci SCADA systému Reliance." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-241966.

Full text
Abstract:
This master's thesis deals with systems which are used for supervisory control and data acquisition. The theoretical part concerns with the single systems and their comparison. The practical section describes the designed program for control of smart wiring FOXTROT. The visualization and its remote control were created in this program. The result of practical part is a lab manual.
APA, Harvard, Vancouver, ISO, and other styles
23

Acharya, Vikal. "Tool-supported vulnerability assessment for SCADA networks." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/108956/1/Vikal_Acharya_Thesis.pdf.

Full text
Abstract:
This thesis contributes to the information security of Supervisory Control and Data Acquisition Networks. It shows how to provide support for security audits to identify component-level vulnerabilities in SCADA networks. We have developed a novel process to assess the vulnerability of SCADA devices remotely. The process identifies the device in the network and its configuration, searches for its specifications using an online database, looks up vulnerabilities online, and finds software patches if any exist. Our process was validated by three case studies using industry-standard equipment that provide proof of concept demonstrations.
APA, Harvard, Vancouver, ISO, and other styles
24

Turnipseed, Ian P. "A new scada dataset for intrusion detection research." Thesis, Mississippi State University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1596111.

Full text
Abstract:

Supervisory Control and Data Acquisition (SCADA) systems monitor and control industrial control systems in many industrials and economic sectors which are considered critical infrastructure. In the past, most SCADA systems were isolated from all other networks, but recently connections to corporate enterprise networks and the Internet have increased. Security concerns have risen from this new found connectivity. This thesis makes one primary contribution to researchers and industry. Two datasets have been introduced to support intrusion detection system research for SCADA systems. The datasets include network traffic captured on a gas pipeline SCADA system in Mississippi State University’s SCADA lab. IDS researchers lack a common framework to train and test proposed algorithms. This leads to an inability to properly compare IDS presented in literature and limits research progress. The datasets created for this thesis are available to be used to aid researchers in assessing the performance of SCADA IDS systems.

APA, Harvard, Vancouver, ISO, and other styles
25

Wang, Yue. "Wind turbine condition monitoring based on SCADA data." Thesis, University of Strathclyde, 2014. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=23191.

Full text
Abstract:
Wind energy has an increasingly essential role in meeting electrical power demand and achieving environmental sustainability. The excellent offshore wind resource and the need to reduce carbon emissions from electricity generation are driving policy to increase offshore wind generation capacity in UK waters. Access and maintenance offshore can be difficult and will be more costly than onshore and availability correspondingly lower and as a result there is a growing interest in wind turbine condition monitoring allowing condition based, rather than responsive or scheduled, maintenance. Existing wind turbine condition monitoring methods, such as vibration analysis and oil debris detection, require expensive sensors. The additional costs can be substantial considering the number of turbines typically deployed in offshore wind farms and in addition, costly expertise is generally required to interpret the results. In contrast, the potential to extend the Supervisory Control and Data Acq uisition (SCADA) data based analysis approach is considerable and could add real value to the condition monitoring with little or no cost to the wind farm operator. This thesis focuses on wind turbine condition monitoring that utilises exclusively data from SCADA systems. The aim is to detect incipient wind turbine operational faults or failures before they evolve to catastrophic failures, so that preventative maintenance or corrective action can be scheduled in time, hence reducing downtime and potentially preventing wider damage. Useful component condition indicators are derived by comparing incoming operational SCADA data with the results for relevant variables, like component temperature that reflect component condition, derived from relevant models trained on SCADA data from a healthy wind turbine. Incipient failures are identified through anomalous behaviour in the variables of interest manifest in the SCADA data. This approach is first applied to individual wind turbines, but then extended to include other wind turbines operating under similar conditions to derive component condition indicators through inter-machine comparison. This is demonstrated to facilitate significant savings in computational effort and model complexity compared to the repetitive development of individual turbine models. In addition, a real time wind turbine power curve is implemented based on SCADA data, and compared with a reference power curve to identify anomalous behaviour, through minor changes in the power curve, in a timely manner.
APA, Harvard, Vancouver, ISO, and other styles
26

Гриненко, Д. В. "SCADA-система керування технологічного процесу виробництва харчових продуктів." Master's thesis, Сумський державний університет, 2021. https://essuir.sumdu.edu.ua/handle/123456789/86599.

Full text
Abstract:
Пояснювальна записка містить: 79 аркушів, 45 рисунків, 10 таблиці. Графічна частина моєї роботи включає в себе: блок-схему алгоритму роботи пристрою, структурну, функціональну та принципову електричну схему. Пояснювальна записка містить в вісім розділів: Огляд літератури; Розробка алгоритму функціонування та структурної схеми проектованого пристрою; Розробка схеми електричної функціональної та принципової пристрою; Розроблення програмного забезпечення пристрою; Вибір окремих вузлів та елементів системи; Розрахунки, що підтверджують працездатність. Перший розділ містить загальну інформацію про призначення та область використання SCADA-системи, технічні характеристики системи, огляд та обґрунтування принципу побудови системи. Другий розділ присвячений науково-дослідній роботі. Третій розділ присвячений розробці структурної схеми системи управління виробництвом пива та опис роботи керування процесом. Четвертий розділ присвячений розробці схем електричної функціональної та принципової пристрою. П’ятий розділ присвячений розробленню програмного забезпечення пристрою. Шостий розділ присвячений вибору окремих вузлів та елементів системі. Сьомий розділ присвячений розрахункам, що підтверджують його працездатність. Восьмий розділ присвячений техніко-економічній частині.
APA, Harvard, Vancouver, ISO, and other styles
27

Хитренко, О. О. "SCADA-система забезпечення процесу зберігання зерна в силосі." Master's thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/71260.

Full text
Abstract:
Завдання автоматизації комплексу по зберіганню зерна на сьогоднішній день є досить актуальним. Сучасні засоби АСУ ТП зернопереробних підприємств забезпечують зниження втрат при зберіганні і переробці зерна, заощадження енергоресурсів зернопереробних підприємств, елеваторів, мінімізацію впливу людського фактора, ризиків виникнення аварійних ситуацій роботи автоматизованих технологічних комплексів по зберіганню і переробці зерна. Останні розробки в області АСУ ТП зернопереробної галузі дають можливість автоматично прогнозувати процес самозігрівання зерна, що є дуже необхідним в забезпеченні підвищення ефективності зберігання зерна. В результаті дослідження параметрів регулятора кліматозабезпечення зерносховища було досягнуто покращення показників зберігання зерна та підвищення енергоефективності процесу.
APA, Harvard, Vancouver, ISO, and other styles
28

Byrtusová, Lucie. "Modul trasování šarží pro systém SCADA vprocesní výrobě." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442451.

Full text
Abstract:
The master thesis is focused on implementing a module for batch traceability into the existing SCADA system MagmaView. First, the theoretical part is dedicated to the research of ANSI/ISA-95 standard and traceability problematics in the process industry. First, the practical part analyses the design of the data model and model for user interaction. The next topic is the implementation of the mentioned models using several software tools such as the graphical environment of MagmaView, Groovy scripting, and communication with SQL database. Part of the implementation is also a testing project simulating a simple production process and the needs of the operator to work with the batches.
APA, Harvard, Vancouver, ISO, and other styles
29

Tesfaye, Mussie. "Secure Reprogramming of a Network Connected Device : Securing programmable logic controllers." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-104077.

Full text
Abstract:
This is a master’s thesis project entitled “Secure reprogramming of network connected devices”. The thesis begins by providing some background information to enable the reader to understand the current vulnerabilities of network-connected devices, specifically with regard to cyber security and data integrity. Today supervisory control and data acquisition systems utilizing network connected programmable logic controllers are widely used in many industries and critical infrastructures. These network-attached devices have been under increasing attack for some time by malicious attackers (including in some cases possibly government supported efforts). This thesis evaluates currently available solutions to mitigate these attacks. Based upon this evaluation a new solution based on the Trusted Computing Group (TCG’s) Trusted Platform Modules (TPM) specification is proposed. This solution utilizes a lightweight version of TPM and TCG’s Reliable Computing Machine (RCM) to achieve the desired security. The security of the proposed solution is evaluated both theoretically and using a prototype. This evaluation shows that the proposed solution helps to a great extent to mitigate the previously observed vulnerabilities when reprogramming network connected devices. The main result of this thesis project is a secure way of reprogramming these network attached devices so that only a valid user can successfully reprogram the device and no one else can reprogram the device (either to return it to an earlier state, perhaps with a known attack vector, or even worse prevent a valid user from programming the device).
Avhandlingen börjar med att ge lite bakgrundsinformation för att läsaren att förstå de nuvarande sårbarheten i nätverksanslutna enheter, särskilt när det gäller IT-säkerhet och dataintegritet. Idag övervakande kontroll och datainsamlingssystem använder nätverksanslutna programmerbara styrsystem används allmänt i många branscher och kritisk infrastruktur. Dessa nätverk anslutna enheter har under ökande attacker under en tid av illvilliga angripare (inklusive i vissa fall eventuellt regeringen stöds insatser). Denna avhandling utvärderar för närvarande tillgängliga lösningar för att minska dessa attacker. Baserat på denna utvärdering en ny lösning baserad på Trusted Computing Group (TCG) Trusted Platform Modules (TPM) specifikation föreslås. Denna lösning använder en lätt version av TPM och TCG:s pålitliga dator (RCM) för att uppnå önskad säkerhet. Säkerheten i den föreslagna lösningen utvärderas både teoretiskt och med hjälp av en prototyp. Utvärderingen visar att den föreslagna lösningen bidrar i stor utsträckning för att minska de tidigare observerade sårbarheter när omprogrammering nätverksanslutna enheter.  Huvudresultatet av denna avhandling projektet är ett säkert sätt omprogrammering dessa nätverksanslutna enheter så att endast ett giltigt användarnamn framgångsrikt kan omprogrammera enheten och ingen annan kan programmera enheten (antingen att återställa den till ett tidigare tillstånd, kanske med en känd attack vector, eller ännu värre förhindra en giltig användare från programmering av enheten).
APA, Harvard, Vancouver, ISO, and other styles
30

Appelgren, Filiph. "Power System Software Development : with possible SCADA System Integration." Thesis, Uppsala universitet, Elektricitetslära, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-233233.

Full text
Abstract:
In order for power system operators (such as TRANSCO) to maintain and operatethe transmission grid in a safe, secure and effcient way, automatic tools such asSCADA systems is necessary to meet demand at all times. The main purpose of thisthesis was to develop a software/prototype at the load despatch centre at TRANSCOwith the ability to monitor and communicate with power plants. The software issupposed to work in a real-time electronic market. The power plant operators candeclare their availability and capability parameters of their generating and producingunits to TRANSCO and LDC operators can send load despatch instructions to thepower plants (such as load changes and other ancillary instructions). The prototypealso has a compliance monitoring application that validates unit outputs againstdespatched instructions. If the output is outside a specific interval, a transgressionwarning is sent to the power plant informing them that they should adjust their unitoutput against the target load. If further transgression is continued, the operator atLDC can re-declare the units availability on the power plants behalf and issue a newload despatch instruction to the unit. The re-declared availability level will be valid allthe way back to when the unit issued the last availability declaration.The software was successfully developed and could perform all tasks that it wassupposed to in a satisfactory way. In order to make the development as sufficient andeffective as possible, a "dummy" power plant was created and was used to simulateunit outputs and plant operator behaviour. As the time was too short, the SCADAintegration was never investigated and was left to whom is taken over after this thesishas ended.
APA, Harvard, Vancouver, ISO, and other styles
31

Maglaras, Leandros. "Intrusion detection in SCADA systems using machine learning techniques." Thesis, University of Huddersfield, 2018. http://eprints.hud.ac.uk/id/eprint/34578/.

Full text
Abstract:
Modern Supervisory Control and Data Acquisition (SCADA) systems are essential for monitoring and managing electric power generation, transmission and distribution. In the age of the Internet of Things, SCADA has evolved into big, complex and distributed systems that are prone to conventional in addition to new threats. So as to detect intruders in a timely and efficient manner a real time detection mechanism, capable of dealing with a range of forms of attacks is highly salient. Such a mechanism has to be distributed, low cost, precise, reliable and secure, with a low communication overhead, thereby not interfering in the industrial system’s operation. In this commentary two distributed Intrusion Detection Systems (IDSs) which are able to detect attacks that occur in a SCADA system are proposed, both developed and evaluated for the purposes of the CockpitCI project. The CockpitCI project proposes an architecture based on real-time Perimeter Intrusion Detection System (PIDS), which provides the core cyber-analysis and detection capabilities, being responsible for continuously assessing and protecting the electronic security perimeter of each CI. Part of the PIDS that was developed for the purposes of the CockpitCI project, is the OCSVM module. During the duration of the project two novel OCSVM modules were developed and tested using datasets from a small-scale testbed that was created, providing the means to mimic a SCADA system operating both in normal conditions and under the influence of cyberattacks. The first method, namely K-OCSVM, can distinguish real from false alarms using the OCSVM method with default values for parameters ν and σ combined with a recursive K-means clustering method. The K-OCSVM is very different from all similar methods that required pre-selection of parameters with the use of cross-validation or other methods that ensemble outcomes of one class classifiers. Building on the K-OCSVM and trying to cope with the high requirements that were imposed from the CockpitCi project, both in terms of accuracy and time overhead, a second method, namely IT-OCSVM is presented. IT-OCSVM method is capable of performing outlier detection with high accuracy and low overhead within a temporal window, adequate for the nature of SCADA systems. The two presented methods are performing well under several attack scenarios. Having to balance between high accuracy, low false alarm rate, real time communication requirements and low overhead, under complex and usually persistent attack situations, a combination of several techniques is needed. Despite the range of intrusion detection activities, it has been proven that half of these have human error at their core. An increased empirical and theoretical research into human aspects of cyber security based on the volumes of human error related incidents can enhance cyber security capabilities of modern systems. In order to strengthen the security of SCADA systems, another solution is to deliver defence in depth by layering security controls so as to reduce the risk to the assets being protected.
APA, Harvard, Vancouver, ISO, and other styles
32

Silva, Eduardo Germano da. "A one-class NIDS for SDN-based SCADA systems." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2007. http://hdl.handle.net/10183/164632.

Full text
Abstract:
Sistemas elétricos possuem grande influência no desenvolvimento econômico mundial. Dada a importância da energia elétrica para nossa sociedade, os sistemas elétricos frequentemente são alvos de intrusões pela rede causadas pelas mais diversas motivações. Para minimizar ou até mesmo mitigar os efeitos de intrusões pela rede, estão sendo propostos mecanismos que aumentam o nível de segurança dos sistemas elétricos, como novos protocolos de comunicação e normas de padronização. Além disso, os sistemas elétricos estão passando por um intenso processo de modernização, tornando-os altamente dependentes de sistemas de rede responsáveis por monitorar e gerenciar componentes elétricos. Estes, então denominados Smart Grids, compreendem subsistemas de geração, transmissão, e distribuição elétrica, que são monitorados e gerenciados por sistemas de controle e aquisição de dados (SCADA). Nesta dissertação de mestrado, investigamos e discutimos a aplicabilidade e os benefícios da adoção de Redes Definidas por Software (SDN) para auxiliar o desenvolvimento da próxima geração de sistemas SCADA. Propomos também um sistema de detecção de intrusões (IDS) que utiliza técnicas específicas de classificação de tráfego e se beneficia de características das redes SCADA e do paradigma SDN/OpenFlow. Nossa proposta utiliza SDN para coletar periodicamente estatísticas de rede dos equipamentos SCADA, que são posteriormente processados por algoritmos de classificação baseados em exemplares de uma única classe (OCC). Dado que informações sobre ataques direcionados à sistemas SCADA são escassos e pouco divulgados publicamente por seus mantenedores, a principal vantagem ao utilizar algoritmos OCC é de que estes não dependem de assinaturas de ataques para detectar possíveis tráfegos maliciosos. Como prova de conceito, desenvolvemos um protótipo de nossa proposta. Por fim, em nossa avaliação experimental, observamos a performance e a acurácia de nosso protótipo utilizando dois tipos de algoritmos OCC, e considerando eventos anômalos na rede SCADA, como um ataque de negação de serviço (DoS), e a falha de diversos dispositivos de campo.
Power grids have great influence on the development of the world economy. Given the importance of the electrical energy to our society, power grids are often target of network intrusion motivated by several causes. To minimize or even to mitigate the aftereffects of network intrusions, more secure protocols and standardization norms to enhance the security of power grids have been proposed. In addition, power grids are undergoing an intense process of modernization, and becoming highly dependent on networked systems used to monitor and manage power components. These so-called Smart Grids comprise energy generation, transmission, and distribution subsystems, which are monitored and managed by Supervisory Control and Data Acquisition (SCADA) systems. In this Masters dissertation, we investigate and discuss the applicability and benefits of using Software-Defined Networking (SDN) to assist in the deployment of next generation SCADA systems. We also propose an Intrusion Detection System (IDS) that relies on specific techniques of traffic classification and takes advantage of the characteristics of SCADA networks and of the adoption of SDN/OpenFlow. Our proposal relies on SDN to periodically gather statistics from network devices, which are then processed by One- Class Classification (OCC) algorithms. Given that attack traces in SCADA networks are scarce and not publicly disclosed by utility companies, the main advantage of using OCC algorithms is that they do not depend on known attack signatures to detect possible malicious traffic. As a proof-of-concept, we developed a prototype of our proposal. Finally, in our experimental evaluation, we observed the performance and accuracy of our prototype using two OCC-based Machine Learning (ML) algorithms, and considering anomalous events in the SCADA network, such as a Denial-of-Service (DoS), and the failure of several SCADA field devices.
APA, Harvard, Vancouver, ISO, and other styles
33

Caldas, Amaro Fernando Freitas de. "Proposta de uma solução SCADA para a manutenção preditiva." Master's thesis, Universidade de Aveiro, 2016. http://hdl.handle.net/10773/22252.

Full text
Abstract:
Mestrado em Engenharia Mecânica
Nos dias de hoje, a manutenção ocupa uma importante função estratégica nas organizações, dado que os custos de produção constituem um fator relevante para a produtividade e competitividade das organizações. Assim, é essencial que a manutenção apresente uma vertente mais cientifica e organizada, no sentido de agilizar intervenções e atingir condições físicas que permitam o melhor desempenho do equipamento, entre outras metodologias, para que resultem na máxima e ciência do processo. A manutenção preditiva representa um novo patamar na evolução da manutenção, permitindo a previsão de uma potencial falha antes da mesma acontecer, podendo assim evitar o agravamento da condição do equipamento e intervir prematuramente. O principal objetivo da presente dissertação consiste no desenvolvimento de toda uma solução capaz de prever o agravamento de determinados parâmetros a serem monitorizados no equipamento, baseando-se na análise de series temporais e na tecnologia de redes neuronais artificiais (RNA).
Nowadays, maintenance occupies an important strategic role in organizations, once production costs are an important factor for the productivity and competitiveness of organizations. In this way it is essential that maintaining show a scientific and organized side, in order to streamline operations and achieve physical conditions that allow the best equipment performance, among other methods, to result in maximum process efficiency. Predictive maintenance is a new stage in the evolution of maintenance, allowing the prediction of a potential failure before it happens, allowing to avoid the worsening of the condition of the equipment and interven prematurely. The main objective of this dissertation is the development of an entire solution that can predict the worsening of certain parameters to be monitored in the equipment, based on time series analysis and artificial neural networks technology (RNA).
APA, Harvard, Vancouver, ISO, and other styles
34

Woodard, Chris. "Rise SCADA and electrical system: A report pertaining to the condition and serviceability of the electrical and SCADA systems of the former RISE facility." Thesis, Woodard, Chris (2013) Rise SCADA and electrical system: A report pertaining to the condition and serviceability of the electrical and SCADA systems of the former RISE facility. Other thesis, Murdoch University, 2013. https://researchrepository.murdoch.edu.au/id/eprint/14809/.

Full text
Abstract:
The former Research Institute for Sustainable Energy (RISE) testing laboratory was originally a facility for measuring, monitoring and testing a variety of renewable energy systems. The RISE facility was independent of the School of Engineering and Energy, but has recently been taken over by the School as the Engineering and Energy Laboratory. Many of the systems associated with the laboratory have not been operated for a number of years and the condition of these systems, and the equipment that is associated with them, is not known. Personnel involved with the former RISE facility have since left Murdoch taking with them their knowledge of the facility. This project was primarily concerned with re-commissioning these systems and developing an operational knowledge of the SCADA based control system. Areas to be covered in particular were: • connections to the grid from PV arrays and wind turbines • PLC system and software • inverters, solar array simulator, environmental chamber and other peripheral equipment • power supplies such as the diesel generator, motor generator set and battery banks • 3 phase permanently connected power monitors • AC and DC electrical systems Initial inspections of the electrical systems showed that two key components of the facility were found to be defective and would need to be rectified if the facility was to function properly. These components were the diesel generator which provided electricity totally independent of the grid for testing purposes, and a fault on the PLC which was affecting the operation of the electrical systems. Also several main pieces of equipment had since been removed from the facility; most notably of these being the battery banks, main test inverter and the DC supply from the wind turbines located in what is now known as the Renewable Energy Outdoor Test Area (ROTA). Several pieces of equipment required for the operation of the diesel generator would also require attention such as the fuel tank and starting battery. Approval was granted for the alternator to be repaired and placed back into service. Approval was also granted for the purchase of a replacement analogue input card to rectify the fault with the PLC. In addition to this another requirement of the project was to develop a system so that the laboratory could be used as a training facility for future students. A procedure was developed so that an electrical system consisting of actual real components; a source, a transmission and distribution system and a load could be simulated. Software was also developed using National Instruments LabVIEW software to monitor and record various power parameters from the system. The system is referred to as the “Small Electrical Distribution System”. As an aside to this a program has been developed that monitors and records voltage, current and power that is being produced by the Real PV Array located on the roof of the Energy and Engineering Laboratory building. For someone who is unfamiliar with the setup of the electrical systems that make up the Energy and Engineering Laboratory a simplified block diagram of the Main AC switchboard has been produced. Schedules have been included of all socket inlets and outlets, main AC and communications cables and the Main AC Switchboard nomenclature. The diesel generator is nearly ready to be re-commissioned after approximately 5 years of non use. Procedures have been developed so that a user can configure the Main AC switchboard so that the “Small Electrical Distribution System” can be operated safely and measurements obtained and analysed. The main goal of the project was to get the diesel generator operating; therefore this report is focused on the equipment associated with the diesel generator. The equipment focused on was the diesel generator itself, the Main AC Switchboard, the Load Bank and the PLC system. Systems such as the Main DC switchboard and Solar Array Simulator were not covered in as much detail as they are not required for the “Small Electrical Distribution System”.
APA, Harvard, Vancouver, ISO, and other styles
35

Delport, Pierre. "Optimisation of UHF radio SCADA systems for electrical distribution networks." Thesis, Stellenbosch : University of Stellenbosch, 2006. http://hdl.handle.net/10019.1/1905.

Full text
Abstract:
Thesis (MScEng (Electrical and Electronic Engineering))--University of Stellenbosch, 2006.
This thesis presents the results of an investigation to establish methods to improve the performance of area radio based communication systems for Supervisory Control and Data Acquisition (SCADA) systems. The considerable scale on which an area radio network is used as a telecommunication network is quite unique to South Africa due to a lack of high bandwidth telecommunication systems in rural areas. Research was done to establish Key Performance Indicators (KPIs) to measure the performance of the area radio telecommunication systems. Two KPIs were chosen, namely Remote Terminal Unit (RTU) availability and Control Success Rate (CSR). These KPIs were trended over a three-year period to measure the effectiveness of measures taken to improve the systems. Two measures were implemented, namely to change the RTU radios, antennas and coaxial feeder cables and to redesign the communication systems in such a way to restrict multiple RTU protocols on the same area radio telecommunication network. The installation of new digital radios together with low loss coaxial cable and specific antennas improved the RTU availability from 96.87 % for the year 2002 to 99.17 % for the year 2004, which realised in an increase of 2.83 % for 432 installed RTUs. This measure, however, did not influence the CSR. The implementation of the newly designed communication networks had a significant influence on the control success rate of the SCADA systems and the KPI increased from 77.65 % for the year 2002 to 78.76 % for the year 2003 and 80.88 % for the year 2004. A drastic increase in performance was observed after the restriction of multiple RTU protocols on the same network during May 2004, where the value for twelve months prior to September 2005 was measured at 84.38 %. The utilisation of area radio telecommunication networks was measured for two operational networks and it was found to be well within the specifications of international accepted standards. One of these networks comprised of three repeaters and 84 installed RTUs and an average utilisation of 17 % and a peak utilisation of 25 % was measured. The other network had an installed base of 4 repeaters and 15 installed RTUs’s and an average utilisation of 3 % and a peak utilisation of 8 % was measured. This compares favourable with the IEEE standard 999-1992 [20], which recommends a channel utilisation of between 40 % and 60 %. Keywords : Key performance indicators, Radio telecommunication networks, Remote terminal unit
APA, Harvard, Vancouver, ISO, and other styles
36

Kabore, Raogo. "Hybrid deep neural network anomaly detection system for SCADA networks." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0190.

Full text
Abstract:
Les systèmes SCADA sont de plus en plus ciblés par les cyberattaques en raison de nombreuses vulnérabilités dans le matériel, les logiciels, les protocoles et la pile de communication. Ces systèmes utilisent aujourd'hui du matériel, des logiciels, des systèmes d'exploitation et des protocoles standard. De plus, les systèmes SCADA qui étaient auparavant isolés sont désormais interconnectés aux réseaux d'entreprise et à Internet, élargissant ainsi la surface d'attaque. Dans cette thèse, nous utilisons une approche deep learning pour proposer un réseau de neurones profonds hybride efficace pour la détection d'anomalies dans les systèmes SCADA. Les principales caractéristiques des données SCADA sont apprises de manière automatique et non supervisée, puis transmises à un classificateur supervisé afin de déterminer si ces données sont normales ou anormales, c'est-à-dire s'il y a une cyber-attaque ou non. Par la suite, en réponse au défi dû au temps d’entraînement élevé des modèles deep learning, nous avons proposé une approche distribuée de notre système de détection d'anomalies afin de réduire le temps d’entraînement de notre modèle
SCADA systems are more and more targeted by cyber-attacks because of many vulnerabilities inhardware, software, protocols and the communication stack. Those systems nowadays use standard hardware, software, operating systems and protocols. Furthermore, SCADA systems which used to be air-gaped are now interconnected to corporate networks and to the Internet, widening the attack surface.In this thesis, we are using a deep learning approach to propose an efficient hybrid deep neural network for anomaly detection in SCADA systems. The salient features of SCADA data are automatically and unsupervisingly learnt, and then fed to a supervised classifier in order to dertermine if those data are normal or abnormal, i.e if there is a cyber-attack or not. Afterwards, as a response to the challenge caused by high training time of deep learning models, we proposed a distributed approach of our anomaly detection system in order lo lessen the training time of our model
APA, Harvard, Vancouver, ISO, and other styles
37

Khan, Ahsan Al Zaki. "Intrusion Detection System Design and Performance Evaluation for SCADA Networks." University of Toledo / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1575950415516331.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Lindqvist, Anna. "Threats to smart buildings : Securing devices in a SCADA network." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176723.

Full text
Abstract:
This paper examines the possibilities of performing tests with the aim to ensure that devices in a SCADA network can be deemed secure before deployment. SCADA systems are found in most industries and have recently seen an increased use in building automation, most importantly the healthcare sector, which means that a successful attack toward such a system could endanger lives of patients and healthcare professionals.The method of testing was created to examine whether devices conflicted with the security flaws identified by OWASP IoT Top 10 list, meaning that OWASP IoT Top 10 was the foundation for the methodology used in this paper.Results of the tests show that the devices used in testing are not in conflict with the OWASP IoT Top 10 list when using the default settings. However, some settings that can be enabled on the devices would constitute a security risk if enabled.
APA, Harvard, Vancouver, ISO, and other styles
39

Polônia, Pablo Valério. "Proposta de arquitetura orientada a recursos para SCADA na Web." Florianópolis, SC, 2011. http://repositorio.ufsc.br/xmlui/handle/123456789/95678.

Full text
Abstract:
Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnológico, Programa de Pós-Graduação em Engenharia de Automação e Sistemas, Florianópolis, 2011
Made available in DSpace on 2012-10-26T04:49:05Z (GMT). No. of bitstreams: 1 299173.pdf: 2790960 bytes, checksum: 3a2ce4ee4fd5dc7d5f239e8d7350372c (MD5)
Esta dissertação descreve uma proposta de arquitetura de software para aplicações típicas de Sistemas de Supervisão e Aquisição de Dados (SCADA), utilizando a World Wide Web como plataforma. O objetivo é mostrar como os requisitos característicos de aplicações SCADA podem ser incorporados em uma arquitetura condizente com os princípios arquiteturais que fundamentam a Web, dado que as arquiteturas comumente propostas para SCADA, baseadas em Chamadas Remota de Procedimento (RPC, na sigla em inglês), apresentam problemas de forte acoplamento, manutenção de estado e interfaces especializadas, que dificultam uma integração plena com a Web. Para isto é projetada uma Arquitetura Orientada a Recursos (ROA, na sigla em inglês), que utiliza as tecnologias da Web (HTTP, URI e tipos de mídia) de acordo com seus princípios de arquitetura. A arquitetura é projetada utilizando como cenário uma Célula Flexível de Manufatura (CFM), ambiente característico de um SCADA. As funcionalidades típicas de SCADA são projetadas como recursos e expostas para clientes que podem exibir sinóticos em uma IHM, esperar pelo disparo de alarmes, controlar o processo, configurar dispositivos e abastecer com dados sistemas de MES/ERP. Uma implementação é realizada, para demonstrar como se dá a interação entre aplicações na arquitetura. Nesta implementação um aplicativo SCADA (Mango M2M) teve sua arquitetura de software estudada e modificada para se adaptar as necessidades da arquitetura proposta. Como resultado, obtém-se uma arquitetura que cobre os requisitos típicos de aplicações SCADA, integrando-se à Web de forma condizente com seus princípios arquiteturais. Posteriormente a arquitetura projetada é comparada com uma arquitetura baseada em Web Services RPC e as diferenças em termos de integração com a Web e no cumprimento dos requisitos típicos de SCADA são analisadas
APA, Harvard, Vancouver, ISO, and other styles
40

Farde, Andreas, and Carl Svinge. "SCADA-system för mindre företag - en inkörsport till Industri 4.0." Thesis, KTH, Hållbar produktionsutveckling (ML), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-255833.

Full text
Abstract:
Den digitala fabriken behöver inte kräva stora investeringar och fördelarna är stora för företag som vill öka sin konkurrenskraft. Med hjälp av den digitala fabriken kan man utveckla varje enskild process eller hela fabriken samt övervaka sin produktion med större precision. Syftet med detta arbete var hur en digitaliserad fabrik kan öka konkurrenskraften, vilka resurser som krävs för att digitalisera och vilka problem som kan uppstå när man digitaliserar. Arbetet har byggts på en specifik studie hos ett litet företag med en redan framtagen prototyp som vidareutvecklades och installerades i ett skapat nätverkssystem med syfte att meddela tillståndet fabriken eller tillverkningsmaskinerna befinner sig i. Studien har gått ut på att jämföra nyckeltal (KPI:er) som är mätta manuellt och automatiskt. De manuellt mätta nyckeltalen samlades in via en framtagen mall, och de automatiska mätta nyckeltalen samlades in via en prototyp som omfattade en RAPID SCADA implementation. Detta för att praktiskt få en uppfattning över vad skillnaden och fördelen är mellan att mäta nyckeltal manuellt eller mäta det automatiskt. KPI:erna som tas fram är baserade på OEE, men det lyfts även fram att utvecklingen till andra viktiga mätvärden kan tas fram från denna grund. Systemet som är framtaget är flexibelt nog för att kunna ses som ett enkelt verktyg att använda för att skräddarsy en lösning som passar hos varje enskild SME. Arbetet visar att digitalisering inte nödvändigtvis måste kräva stora investeringar eller hög kompetens. Det som kan vara bekymmersamt för ett mindre företag är däremot tiden som kan behövas läggas ner för att förstå varför och hur systemet ska byggas då personal kan vara en bristvara.
The digital industry does not need a huge investment and the advantages are many for companies that wants to gain competitiveness. With the implementation of a digital factory you can develop each process or the whole factory and at the same time monitor the production with greater precision. The reason for this study is how a digital factory can improve their competitiveness, what resources are necessary and which problems are likely to occur and how to solve them. The study has taken place at a specific small industry with an already established prototype that was further developed and installed in a created network system with purpose to communicate the status of the factory or each single machine. The study's main focus has been to compare manually taken key performance indicators through a form, and automatically taken key performance indicators from the digital system with the help of the prototype which included a RAPID SCADA implementation. This is for practical enlightenment over the difference between a manually and an automatic system and which one to prefer. The KPI:s are based on OEE, but it also highlight that the development to other measurement tools can easily be achieved from this base. The system that has beencreated are flexible and adaptable to be used as a tailor fit solution that most SME can use. The study shows that an implementation of a digital solution does not necessarily need huge means of investments or high personal competence. The worrying part from the perspective of a smaller company is the time it takes to learn why and how the system should be built.
APA, Harvard, Vancouver, ISO, and other styles
41

Olsson, Anders. "Automationsfabriken." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-17944.

Full text
Abstract:
Möjligheternas värld är en utställning som ska presenteras på olika mässor. Hjärtat i utställningen är automationsfabriken som är en automatiserad anläggning som ska tillverka leksaksbilar. Automationsfabriken ska invigas på mässan Scanautomatic och ProcessTeknikden 9-11 oktober 2012. Då möjligheternas värld är ett samarbete mellan näringsliv och skola bidrar företag och skolor med hjälp och samarbetar för att projektet ska bli lyckat. Prevas del i projektet är att ta fram ett styrsystem i form av ett MES och SCADA system till fabriken samtatt göra hemsidan där bilar kan beställas och integrera den med styrsystemet. Målet med examensarbetet är att utveckla styrsystemet och ta fram ett HMI genom att använda programvaror från Wonderware. Slutprodukten är i form av kod och objekt, och den funktionalitet de skapar tillsammans. Styrsystemet ska kunna kopplas upp mot fabriken och styra produktionen, förutsatt att övriga delar i projektet levererar det de ska. Arbetet började med att studera fabriken och etablera ett gränssnitt mellan styrsystemet ochPLCn som styr produktionsutrustningen, samt att ta fram ett grundläggande HMI. Sedan har ett simuleringsläge tagits fram med utgångspunk från gränssnittet för att simulera produktionsmiljön. Utifrån den här simuleringsmiljön och ett HMI har sedan funktioner tagits fram en i taget och testats, för att tillsammans senare utgöra den helhet som är styrsystemet. Här finns funktioner som beslutsprocesser för skapandet av nya produktions- och leveransordrar, hämtning av kundordrar, styrning av pick´n place enheten, informationshantering av innehållet i bufferten, samt registrering av alla ordrar och operationer i ett manufacturing execution system (MES). Styrsystemet har slutsligen kopplats samman med databasen där nya kundordrar registreras och genom att använda simuleringsmiljön och det HMI som utvecklats för fabriken har styrsystemet testats med goda resultat där styrsystemet klarar av att hantera hela produktionen från orderingång till leverans.
Möjligheternas värld is an exhibition that will be presented at various fairs. The heart of the exhibition is Automationsfabriken which is an automated facility that will manufacture toy cars. Automationsfabriken will be introduced at the fair Scanautomatic & ProcessTeknik, which takes place 9-11 October 2012. As Möjligheternas värld is a collaboration between industry and school, both businesses and schools are included in the project and work towards the success of the project. Prevas part of the project is to develop a control system in the form of a MES and SCADA system for the factory, to create the website where cars can be ordered, and to integrate the website with the control system. The goal of my thesis job is to develop the control system and to create an HMI using software from Wonderware. The final product is in the form of code and objects, and the functionality they create together. The control system should be able to connect to the factory and manage the production, provided that the other parts of the project are delivered according to the plan. The work began with a study of the factory, and to establish an interface between the control system and the PLC that controls the production equipment, as well as developing a basic HMI. After this was done a simulation environment was developed from the established interface in order to simulate the production environment. Based on this simulation environment and the HMI, functions has been developed one by one and tested in order to later become the whole which is the control system. It features functions such as decision-making for the creation of new production- and delivery orders, retrieval of customer orders, control of the pick´n placeunit, information handling of the content of the buffer, as well as registration of all orders and operations in the manufacturing execution system (MES). Finally the control system was connected to the database containing new customer order, and by using the simulation environment and the developed HMI for the factory the control system could be tested in order to confirm that the control system could handle the entire production from the intake of customer orders to delivery.
APA, Harvard, Vancouver, ISO, and other styles
42

Pisco, Rafael Gonçalves Paralta da Silva. "SCADA em Androide." Master's thesis, 2015. https://repositorio-aberto.up.pt/handle/10216/79593.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Pisco, Rafael Gonçalves Paralta da Silva. "SCADA em Androide." Dissertação, 2015. https://repositorio-aberto.up.pt/handle/10216/79593.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Gao, Jun. "Omni SCADA intrusion detection." Thesis, 2020. http://hdl.handle.net/1828/11745.

Full text
Abstract:
We investigate deep learning based omni intrusion detection system (IDS) for supervisory control and data acquisition (SCADA) networks that are capable of detecting both temporally uncorrelated and correlated attacks. Regarding the IDSs developed in this paper, a feedforward neural network (FNN) can detect temporally uncorrelated attacks at an F1 of 99.967±0.005% but correlated attacks as low as 58±2%. In contrast, long-short term memory (LSTM) detects correlated attacks at 99.56±0.01% while uncorrelated attacks at 99.3±0.1%. Combining LSTM and FNN through an ensemble approach further improves the IDS performance with F1 of 99.68±0.04% regardless the temporal correlations among the data packets.
Graduate
APA, Harvard, Vancouver, ISO, and other styles
45

Hsu, Yi-Cheng, and 徐翊城. "SCADA System Security Survey." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/93331808624564874774.

Full text
Abstract:
碩士
國立中正大學
通訊資訊數位學習碩士在職專班
100
The supervisory control and data acquisition (SCADA) system is the core of the critical infrastructures, which becomes the target of cyber criminals due to the endless stream of vulnerability, political purpose and problems of management. In this study, we survey a series of the SCADA systems security issues (including vulnerability and incident response management cycle) and give a closer look at how to provide consistent SCADA security from the integration viewpoint. The security managers or specialists are able to have a comprehensive knowledge about SCADA system security protection recommendations and expect to eliminate security threats via this preliminary study.
APA, Harvard, Vancouver, ISO, and other styles
46

Bernardo, Alberto Jorge da Costa Maia. "Arquitecturas para sistemas SCADA distribuídos." Master's thesis, 1993. http://hdl.handle.net/10216/11018.

Full text
Abstract:
Dissertação apresentada para obtenção do grau de Mestre em Engenharia Electrotécnica e de Computadores, na Faculdade de Engenharia da Universidade do Porto, sob a orientação do Prof. Doutor José Manuel Mendonça
APA, Harvard, Vancouver, ISO, and other styles
47

Ferreira, Álvaro Miguel Almeida. "Desenvolvimento de uma aplicação scada." Master's thesis, 2013. https://repositorio-aberto.up.pt/handle/10216/88935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Faria, Carlos Manuel Morgado. "Protocolos SCADA nos Plataformas Efacec." Master's thesis, 2013. https://repositorio-aberto.up.pt/handle/10216/97871.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Bernardo, Alberto Jorge da Costa Maia. "Arquitecturas para sistemas SCADA distribuídos." Dissertação, 1993. http://hdl.handle.net/10216/11018.

Full text
Abstract:
Dissertação apresentada para obtenção do grau de Mestre em Engenharia Electrotécnica e de Computadores, na Faculdade de Engenharia da Universidade do Porto, sob a orientação do Prof. Doutor José Manuel Mendonça
APA, Harvard, Vancouver, ISO, and other styles
50

Ferreira, Álvaro Miguel Almeida. "Desenvolvimento de uma aplicação scada." Dissertação, 2013. https://repositorio-aberto.up.pt/handle/10216/88935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography