To see the other types of publications on this topic, follow the link: SCADA.

Journal articles on the topic 'SCADA'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'SCADA.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Beggs, Christopher, and Ryan McGowan. "Fostering SCADA and IT Relationships." International Journal of Cyber Warfare and Terrorism 1, no. 3 (July 2011): 1–11. http://dx.doi.org/10.4018/ijcwt.2011070101.

Full text
Abstract:
In recent years, critical infrastructure utilities have been faced with conflicting attitudes and cultural differences of where SCADA (Supervisory Control and Data Acquisition) and IT fit into an organizational structure. This lack of understanding between SCADA, IT processes, and business operations remains a concern for many utilities within the SCADA community. The importance of SCADA and IT relationships is an area of the SCADA landscape that is often unrecognised. This paper examines the results and findings of a SCADA and IT relationship survey that was undertaken to identify where SCADA operations fit within organizations around the world. It describes several proposed models that define the role and responsibility of SCADA within an organizational structure. It also presents a concept model for SCADA security responsibility and identifies key observations of SCADA and IT working together at the INL Control System Cyber Security Training in Idaho, USA. The main findings of the research suggest that clear defined roles and responsibilities for SCADA operations and SCADA security need to be established and secondly, that immediate cultural driven change is required in order to improve SCADA and IT relationships.
APA, Harvard, Vancouver, ISO, and other styles
2

Kumar, Nirmal, Kulwant Singh Rajpurohit, and Er Gaurav Srivastava. "Wireless SCADA." International Journal of Trend in Scientific Research and Development Volume-3, Issue-3 (April 30, 2019): 362–64. http://dx.doi.org/10.31142/ijtsrd22790.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Thilmany, Jean. "Scada Security?" Mechanical Engineering 134, no. 06 (June 1, 2012): 26–31. http://dx.doi.org/10.1115/1.2012-jun-1.

Full text
Abstract:
This article focuses on the introduction of advance security checks to counter negative publicity of supervisory control and data acquisition (SCADA) systems. The SCADA security concerns have come to be seen as a big deal because the systems can be found within power plants, refineries, pipelines, water treatment plants, and the telecommunications industry, where hackers could do great damage that would affect the public. In light of SCADA security concerns, security researchers have stepped up efforts to find and to call attention to the systems’ vulnerabilities. As national attention has only recently turned to SCADA security, system users have few regulatory specifications by which they must abide. In 2006, the federal government charged the North American Electric Reliability Corp., or NERC, with defining and implementing standards for critical infrastructure protection within the industry. A number of pieces of legislation have been passed and proposed to address software security. The big one right now is the Cybersecurity Act of 2012, which has been introduced by Senator Joseph Lieberman of Connecticut.
APA, Harvard, Vancouver, ISO, and other styles
4

Syamsul Arifin, M. Agus, Susanto Susanto, Deris Stiawan, Mohd Yazid Idris, and Rahmat Budiarto. "The trends of supervisory control and data acquisition security challenges in heterogeneous networks." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (May 1, 2021): 874. http://dx.doi.org/10.11591/ijeecs.v22.i2.pp874-883.

Full text
Abstract:
<p>Supervisory control and data acquisition (SCADA) has an important role in communication between devices in strategic industries such as power plant grid/network. Besides, the SCADA system is now open to any external heterogeneous networks to facilitate monitoring of industrial equipment, but this causes a new vulnerability in the SCADA network system. Any disruption on the SCADA system will give rise to a dangerous impact on industrial devices. Therefore, deep research and development of reliable intrusion detection system (IDS) for SCADA system/network is required. Via a thorough literature review, this paper firstly discusses current security issues of SCADA system and look closely benchmark dataset and SCADA security holes, followed by SCADA traffic anomaly recognition using artificial intelligence techniques and visual traffic monitoring system. Then, touches on the encryption technique suitable for the SCADA network. In the end, this paper gives the trend of SCADA IDS in the future and provides a proposed model to generate a reliable IDS, this model is proposed based on the investigation of previous researches. This paper focuses on SCADA systems that use IEC 60870-5-104 (IEC 104) protocol and distributed network protocol version 3 (DNP3) protocol as many SCADA systems use these two protocols.</p>
APA, Harvard, Vancouver, ISO, and other styles
5

Syahrizal, Endi, and Hikmatul Amri. "Analisa Rancang Bangun Sistem SCADA Pengontrolan Kelistrikan AC dan PC Laboratorium Pemrograman Gedung Elektro." INOVTEK - Seri Elektro 1, no. 1 (January 7, 2020): 21. http://dx.doi.org/10.35314/ise.v1i1.1171.

Full text
Abstract:
Penelitian ini merupakan pengujian terhadap pengontrolan kelistrikan laboratorium Gedung Elektro. Dengan adanya pengujian ini peneliti dapat melihat perbandingan antara pengontoran kelistrikan tidak menggunakan SCADA mempunyai kekurangan dalam pegawasan di mana dengan menggunakan SCADA bisa dikontrol melalui laptop. Penelitian ini menggunakan PLC Mitsubishi FX2N-48MR dan relay double pole double throw digunakan sebagai alat pengontrolan kelistrikan secara real time. Tujuan penelitian ini adalah untuk mengoptimalkan kelistrikan di laboratorium di mana apabila tidak menggunakan sistem SCADA ketika pada saat jam perkuliahan sering terjadi AC dan PC tidak dimatikan oleh mahasiswa/i. Oleh karena itu dengan adanya sistem SCADA tidak ada lagi AC dan PC yang tidak dimatikan lagi, selain itu sistem SCADA bisa menurukan pemakaian energi listrik yang sangat baik digunakan di ruangan perkuliahan. SCADA dikontrol melalui laptop dengan beban yang begitu besar. Sebelum menggunakan SCADA pemakaiannya tinggi dengan nilai Rp 183,564 sedangkan menggunakan SCADA pemakaian listrik menurun dengan nilai Rp 93,375. Hasil penelitian bahwa pengontrolan dengan sistem SCADA menurunkan biaya pemakaian sebesar 50,87 %.
APA, Harvard, Vancouver, ISO, and other styles
6

Jurnal, Redaksi Tim. "PENGENDALIAN JARINGAN DISTRIBUSI 20 KV DENGAN MENGGUNAKAN SISTEM SCADA." Energi & Kelistrikan 9, no. 1 (November 26, 2018): 41–50. http://dx.doi.org/10.33322/energi.v9i1.56.

Full text
Abstract:
In Indonesia, especially at PT PLN (Persero), SCADA has been known and started to be implemented in the control of electric power systems since the early 1980s in many other countries that are more advanced, SCADA application is growing in line with the development of computer technology and telecommunications. By the time the development is not as sophisticated SCADA now, there are thought to facilitate maneuvers on a system that is simple to use SCADA network we can supply additional power or power outage easily do so overloaded that did not happen. After implementing a SCADA system occurred saving time for 2906 minutes or 48.44 hours, and the frequency of outages 4 times less than that before implementing the SCADA system. This means that the reliability index SAIDI and SAIFI much better at the moment after the implementation of the SCADA system.
APA, Harvard, Vancouver, ISO, and other styles
7

Zhou, Xiaojun, Zhen Xu, Liming Wang, Kai Chen, Cong Chen, and Wei Zhang. "APT Attack Analysis in SCADA Systems." MATEC Web of Conferences 173 (2018): 01010. http://dx.doi.org/10.1051/matecconf/201817301010.

Full text
Abstract:
SCADA (Supervisory Control and Data Acquisition) systems play a significant role in ICS (Industrial Control System). Safety, security and stable operation is crucial to the SCADA system. However, SCADA system currently faces many security threats, of which the most harmful is the APT attack. This paper analyzes the attack surface and its own vulnerabilities of SCADA system, and analyzes the characteristics of APT attack comprehensively. Then the paper dissects the cases of real APT attack thoroughly and gives measures of SCADA security protection.
APA, Harvard, Vancouver, ISO, and other styles
8

Supriyono, Amin, M. Jasa Afroni, and Oktriza Melfazen. "PENERAPAN SCADA BERBASIS IOT UNTUK SIMULATOR KONTROL PANEL PADA CONTOH KASUS PEMBANGKIT LISTRIK TENAGA MIKROHIDRO (PLTM)." JE-UNISLA 7, no. 2 (September 15, 2022): 119. http://dx.doi.org/10.30736/je-unisla.v7i2.889.

Full text
Abstract:
Beberapa PLTM di Indonesia belum dilengkapi dengan sistem SCADA. Ketiadaan sistem SCADA mengakibatkan pengoperasian PLTM harus dilakukan secara konvensional. Dengan sistem SCADA, pengawasan pada peralatan dapat dilakukan secara terus menerus dan terpusat sehingga pengoperasian peralatan bisa lebih optimal. Penambahan/pemasangan suatu alat (sistem SCADA) yang terkait dengan sistem operasi PLTM, tentu memerlukan ijin dari pihak pengelola PLTM. Agar dapat menggambarkan dampak adanya sistem SCADA pada sebuah PLTM tanpa harus melakukan pemasangan secara langsung pada sistem PLTM, maka diperlukan adanya simulator yang dapat digunakan sebagai interface untuk menghubungkan antara sistem SCADA dengan sebuah prototype kontrol panel PLTM yang dapat menggambarkan proses atau alur pengoperasian sebuah PLTM secara ringkas. Metode penelitian yang digunakan menggunakan metode eksperimental. Penelitian ini menghasilkan sebuah simulator kontrol panel berbasis SCADA yang menggunakan IoT sebagai kontroller serta internet sebagai perantara untuk menghubungkan manusia dengan simulator. Adapun kesimpulan dari penelitian ini yaitu Simulator dianggap membantu dalam mempelajari bagaimana mendesain sebuah sistem SCADA dengan menggunakan IoT, serta menjelaskan bagaimana alur proses PLTM dan apa saja yang dikontrol dan diawasi.
APA, Harvard, Vancouver, ISO, and other styles
9

Tükez, Enes Talha, and Adnan KAYA. "SCADA System for Next-Generation Smart Factory Environments." ICONTECH INTERNATIONAL JOURNAL 6, no. 1 (March 20, 2022): 48–52. http://dx.doi.org/10.46291/icontechvol6iss1pp48-52.

Full text
Abstract:
Today, in factories, production is spread into a wide area and became complicated. Complicated production requires a better monitoring and control system to improve efficiency. For this purpose, SCADA systems are used. SCADA systems allow industries to monitor, control and access to real-time data and data logging. Nowadays, all large-scale industries have SCADA systems. The cost of the SCADA system makes it unreachable for small and medium-size industries but a SCADA system that is designed by using C# programming language would be cheaper and could perform the same. In this study, a SCADA system has been developed to monitor and control the smart model factory system in AFSUAM. SCADA interface is created by using C# programming language and the communication between PLC and the SCADA is set by using Mitsubishi MX Component tool. With the developed SCADA system, the process of a product entering the factory as raw material, going through several processes and becoming a product from the supply chain to the distributor has been modeled on a sample marble factory model, and a graphical user interface has been created considering the purposes such as real-time monitoring, controlling, data logging and preventing errors in the context of this model.
APA, Harvard, Vancouver, ISO, and other styles
10

Vujić, Marko, and Vladimir Katić. "PRIMENA SCADA SISTEMA U SMART GRIDU." Zbornik radova Fakulteta tehničkih nauka u Novom Sadu 34, no. 03 (February 25, 2019): 474–77. http://dx.doi.org/10.24867/02be03vujic.

Full text
Abstract:
U okviru ovog rada predstavljena je uloga SCADA sistema u Smart Grid-u. Opisana je arhitektura SCADA softvera koji zadovoljava potrebe Smart Grida. Predstavljeni su parametri i kriterijumi koje moraju da ispune proizvođači SCADA softvera kako bi zadovoljili zahteve klijenata. Predstavljeni su najbolji SCADA softveri i pojedinačno anlizirani u pogledu na ispunjavanje Smart Grid standard.
APA, Harvard, Vancouver, ISO, and other styles
11

Rastogi, Rahul, and Rossouw von Solms. "IT Security for SCADA." International Journal of Cyber Warfare and Terrorism 5, no. 3 (July 2015): 19–27. http://dx.doi.org/10.4018/ijcwt.2015070102.

Full text
Abstract:
SCADA (Supervisory Control and Data Acquisition System) is a cyber-physical system, wherein IT (Information Technology) components work in conjunction with field devices to control a physical process. The security of these IT components becomes crucial in view of the damaging effects that any security breach of these IT components can have on the underlying physical process. In response to this critical issue, various governments across the world have recognized the issue of SCADA security and have initiated the creation of a regulatory framework for mandating SCADA security in their respective countries. This paper provides a brief overview of the cyber-security issues of SCADA and the implications of Stuxnet for SCADA security. The paper reviews the steps taken by the governments of India and South Africa; and it provides guidance to the owners of SCADA regarding SCADA security, as mandated by the Government of India.
APA, Harvard, Vancouver, ISO, and other styles
12

Allafi, Ibrahim, and Tariq Iqbal. "Low-Cost SCADA System Using Arduino and Reliance SCADA for a Stand-Alone Photovoltaic System." Journal of Solar Energy 2018 (May 2, 2018): 1–8. http://dx.doi.org/10.1155/2018/3140309.

Full text
Abstract:
SCADA (supervisory control and data acquisition) systems are currently employed in many applications, such as home automation, greenhouse automation, and hybrid power systems. Commercial SCADA systems are costly to set up and maintain; therefore those are not used for small renewable energy systems. This paper demonstrates applying Reliance SCADA and Arduino Uno on a small photovoltaic (PV) power system to monitor the PV current, voltage, and battery, as well as efficiency. The designed system uses low-cost sensors, an Arduino Uno microcontroller, and free Reliance SCADA software. The Arduino Uno microcontroller collects data from sensors and communicates with a computer through a USB cable. Uno has been programmed to transmit data to Reliance SCADA on PC. In addition, Modbus library has been uploaded on Arduino to allow communication between the Arduino and our SCADA system by using MODBUS RTU protocol. The results of the experiments demonstrate that SCADA works in real time and can be effectively used in monitoring a solar energy system.
APA, Harvard, Vancouver, ISO, and other styles
13

Wen, Wu, Yubao Liu, Rongfu Sun, and Yuewei Liu. "Research on Anomaly Detection of Wind Farm SCADA Wind Speed Data." Energies 15, no. 16 (August 12, 2022): 5869. http://dx.doi.org/10.3390/en15165869.

Full text
Abstract:
Supervisory control and data acquisition (SCADA) systems are critical for wind power grid integration and wind farm operation and maintenance. However, wind turbines are affected by regulation, severe weather factors, and mechanical failures, resulting in abnormal SCADA data that seriously affect the usage of SCADA systems. Thus, strict and effective data quality control of the SCADA data are crucial. The traditional anomaly detection methods based on either “power curve” or statistical evaluation cannot comprehensively detect abnormal data. In this study, a multi-approach based abnormal data detection method for SCADA wind speed data quality control is developed. It is mainly composed of the EEMD (Ensemble Empirical Mode Decomposition)-BiLSTM network model, wind speed correlation between adjacent wind turbines, and the deviation detection model based on dynamic power curve fitting. The proposed abnormal data detection method is tested on SCADA data from a real wind farm, and statistical analysis of the results verifies that this method can effectively detect abnormal SCADA wind data. The proposed method can be readily applied for real-time operation to support an effective use of SCADA data for wind turbine control and wind power prediction.
APA, Harvard, Vancouver, ISO, and other styles
14

Mesbah, Mohamed, Mahmoud Said Elsayed, Anca Delia Jurcut, and Marianne Azer. "Analysis of ICS and SCADA Systems Attacks Using Honeypots." Future Internet 15, no. 7 (July 14, 2023): 241. http://dx.doi.org/10.3390/fi15070241.

Full text
Abstract:
Supervisory control and data acquisition (SCADA) attacks have increased due to the digital transformation of many industrial control systems (ICS). Operational technology (OT) operators should use the defense-in-depth concept to secure their operations from cyber attacks and reduce the surface that can be attacked. Layers of security, such as firewalls, endpoint solutions, honeypots, etc., should be used to secure traditional IT systems. The three main goals of IT cybersecurity are confidentiality, integrity, and availability (CIA), but these three goals have different levels of importance in the operational technology (OT) industry. Availability comes before confidentiality and integrity because of the criticality of business in OT. One of the layers of security in both IT and OT is honeypots. SCADA honeypots are used as a layer of security to mitigate attacks, known attackers’ techniques, and network and system weaknesses that attackers may use, and to mitigate these vulnerabilities. In this paper, we use SCADA honeypots for early detection of potential malicious tampering within a SCADA device network, and to determine threats against ICS/SCADA networks. An analysis of SCADA honeypots gives us the ability to know which protocols are most commonly attacked, and attackers’ behaviors, locations, and goals. We use an ICS/SCADA honeypot called Conpot, which simulates real ICS/SCADA systems with some ICS protocols and ICS/SCADA PLCs.
APA, Harvard, Vancouver, ISO, and other styles
15

Primanto, Meira Dwi, and Priyo Sasmoko. "DUMMY CB SEBAGAI ALAT SIMULATOR KUBIKEL UNTUK PEMELIHARAAN PREVENTIF DAN KOREKTIF GUNA MENGURANGI FREKUENSI PADAM PENYULANG 20 KV (APLIKASI PADA SISTEM SCADA 20 KV PT.PLN (PERSERO) APD JATENG & DIY)." Gema Teknologi 18, no. 1 (October 1, 2014): 21. http://dx.doi.org/10.14710/gt.v18i1.8811.

Full text
Abstract:
Meira Dwi Primanto, Priyo Sasmoko, in paper dummy CB as cubicle simulator for preventive and corrective maintenance to reduce off frequency 20 KV feeders (20 KV scada system at APD Central Java and Yogyakarta) explain that in 2013, the APD PT.PLN Central Java and Yogyakarta are conducting integration to SCADA at 20 KV feeders in distribution substation. For the next stage has been installed SCADA maintenance should be done periodically. Maintenance can be planned or due to interference with the SCADA system. Maintenance is usually done by the team must perform SCADA Distribution feeder outages and transfer of the load. In the installation of equipment, SCADA team should get a working permit to shut down the feeder, and to transfer the load to another feeder, so that the work has to get permission. SCADA systems are already installed requires maintenance to keep the system reliability. When maintenance SCADA, feeders should be extinguished, whereas for medium voltage customers such as factories, hospitals, and airports should always be channeled electrical energy. Feeder outages and load Delegation KWH lost causes. To the authors attempt to provide solutions that can overcome the missing KWH with a tool innovations made. The author makes a tool such as a dummy circuit breaker simulator 20 KV cubicles. This tool serves Especially when employees perform maintenance or investigation SCADA Disorders, which aims for 20 KV feeders should not be extinguished when performing preventive and corrective maintenance. So the number of frequency of feeder outages can be reduced. Keywords : Dummy Circuit Breaker, 20 KV PMT, SCADA maintenance.
APA, Harvard, Vancouver, ISO, and other styles
16

Elhady, Abdelghafar M., Hazem M. El-bakry, and Ahmed Abou Elfetouh. "Comprehensive Risk Identification Model for SCADA Systems." Security and Communication Networks 2019 (August 6, 2019): 1–24. http://dx.doi.org/10.1155/2019/3914283.

Full text
Abstract:
The world is experiencing exponential growth in the use of SCADA systems in many industrial fields. The increased and considerable growth in information and communication technology has been forcing SCADA organizations to shift their SCADA systems from proprietary technology and protocol-based systems into internet-based ones. This paradigm shift has also increased the risks that target SCADA systems. To protect such systems, a risk management process is needed to identify all the risks. This study presents a detailed investigation on twenty-one scientific articles, guidelines, and databases related to SCADA risk identification parameters and provides a comparative study among them. The study next proposes a comprehensive risk identification model for SCADA systems. This model was built based on the risk identification parameters of ISO 31000 risk management principles and guidelines. The model states all risk identification parameters, identifies the relationships between those parameters, and uses a hierarchical-based method to draw complete risk scenarios. In addition, the proposed model defines the interdependency risk map among all risks stated in the model. This risk map can be used in understanding the evolution of the risks through time in SCADA systems. The proposed model is then transformed into a benchmark database containing 19,163 complete risk scenarios that can affect SCADA systems. Finally, a case study is presented to demonstrate one of the usages of the proposed model and its benchmark database. This case study provides 306 possible attack scenarios that Hacktivist can use to affect SCADA systems.
APA, Harvard, Vancouver, ISO, and other styles
17

Doja, M. N., Dharmender Saini, and Nitin Gupta. "Authorized SCADA Commands." International Journal of Technology, Knowledge, and Society 5, no. 4 (2009): 63–76. http://dx.doi.org/10.18848/1832-3669/cgp/v05i04/56013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Oprzędkiewicz, Krzysztof, and Dominik Barwacz. "SCADA for Android." Pomiary Automatyka Robotyka 18, no. 12 (December 14, 2014): 95–99. http://dx.doi.org/10.14313/par_214/95.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Sciacca, S. C., and W. R. Block. "Advanced SCADA concepts." IEEE Computer Applications in Power 8, no. 1 (1995): 23–28. http://dx.doi.org/10.1109/67.363299.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Patel, Sandip C., and Pritimoy Sanyal. "Securing SCADA systems." Information Management & Computer Security 16, no. 4 (October 10, 2008): 398–414. http://dx.doi.org/10.1108/09685220810908804.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Sun, Zhen Hua, and Xuemin Tian. "SCADA in Oilfields." Measurement and Control 43, no. 6 (July 2010): 176–78. http://dx.doi.org/10.1177/002029401004300603.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Mu’ammar, Rais, Prapto Nugroho, and Lesnanto Multa Putranto. "Design of SCADA based solar power plant for clean water irrigation system in remote areas." International Journal of Engineering & Technology 7, no. 4.44 (December 1, 2018): 71. http://dx.doi.org/10.14419/ijet.v7i4.44.26867.

Full text
Abstract:
The study aimed to design a supervisory control and data acquisition (SCADA) system to control solar power plants for clean water irrigation system during the dry season in remote areas. The SCADA system contrived is expected to be able to meet the main elements of the SCADA architecture. Accordingly, following steps were conducted, starting from designing the human machine interface (HMI) in the master station (MS), mapping out the microcontroller as a remote terminal unit (RTU) and designing the communication path between MS and RTU. Furthermore, the SCADA system was tested by the system test to evaluate the SCADA system that was designed meet minimum standard and running well. After tested, the result showed that the system is successfully designed to meet the main elements of SCADA architecture. The system is also able to monitor and control remotely, resulting in more efficient control of user work as well as rapid decision making in order to minimize damage potential when an interruption occurs. For both control and monitor, the MS and RTU in the SCADA system wirelessly communicate.
APA, Harvard, Vancouver, ISO, and other styles
23

Khairuddin, Muhammad, Zakiyah Amalia, Edi Sulistyo Budi, Adelia Dwi Puspitasari, Alfiandi Aulia Rahmadani, and Firman Bagus Prasetyo. "Implementasi sistem SCADA dengan metode kontrol PID pada motor DC penggerak conveyor belt." JURNAL ELTEK 20, no. 2 (October 28, 2022): 41. http://dx.doi.org/10.33795/eltek.v20i2.353.

Full text
Abstract:
Sistem SCADA (Supervisory Control and Data Acquisition) merupakan teknologi komputer yang banyak digunakan pada sistem kendali di dunia industri saat ini. Pada penelitian ini sistem SCADA digunakan pada plant motor penggerak konveyor karena plant tersebut sangat banyak digunakan di industri, hampir semua jenis industri menggunakan konveyor untuk memindahkan barang dari satu tempat ketempat lainnya. Implementasi kontrol yang digunakan pada penelitian ini adalah metode kontrol PID (Proportional Integral Derivative) yang akan mengoreksi error secara otomatis dari pengukuran variabel input sensor kecepatan dengan menggunakan rotary encoder sehingga kecepatan putaran motor DC bisa sesuai dengan nilai setpoint yang ditentukan melalui sistem SCADA. Kontroler utama pada sistem ini adalah PLC (Programmable Logic Controller) Siemens S7-1200 yang berperan sebagai RTU (Remote Terminal Unit) pada sistem SCADA. Nilai parameter PID yang ditentukan pada sistem SCADA adalah Kp = 0,25, Ti = 0,8 dan Td= 0,08. Berdasarkan hasil pengujian, sistem SCADA bisa mengendalikan plant dengan baik dengan nilai error steady state sebesar 1,1% - 3,4% baik saat conveyor belt bekerja dengan beban maupun tanpa beban. Dengan sistem SCADA, monitoring sistem bisa dilakukan dari jarak jauh tanpa harus datang langsung ke lokasi tempat plant berada sehingga lebih memudahkan proses monitoring dan kontrol plant di dunia industri. ABSTRACT The SCADA (Supervisory Control and Data Acquisition) system is a computer technology that is widely used in control systems in today's industrial world. In this study, the SCADA system was used in a motor conveyor driving because the plant is very widely used in industry, almost all types of industry use conveyors to move goods from one place to another. The control implementation used in this study is the PID (Proportional Integral Derivative) control method which will correct errors of the speed sensor input variable using a rotary encoder so that the DC motor rotation speed match the setpoint value determined through the SCADA system. The main controller in this system is the Siemens S7-1200 PLC (Programmable Logic Controller) which acts as the RTU (Remote Terminal Unit) on the SCADA system. The PID parameter values determined in the SCADA system are Kp = 0.25, Ti = 0.8 and Td = 0.08. Based on the test results, the SCADA system can control the plant well with a steady state error value of 1.1% - 3.4% both when the conveyor belt is working with or without load. With the SCADA system, monitoring the system can be done remotely without having to come directly to the location where the plant is located, making it easier for the process of monitoring and controlling plants in the industrial world.
APA, Harvard, Vancouver, ISO, and other styles
24

Gogić, Damjan. "DDOS NAPAD NA SCADA PODSISTEM SMART GRID-A." Zbornik radova Fakulteta tehničkih nauka u Novom Sadu 34, no. 01 (December 20, 2018): 135–38. http://dx.doi.org/10.24867/01be38gogic.

Full text
Abstract:
U ovom radu su analizirane posledice DDoS napada na SCADA podsistem Smart Grid-a. Za potrebe testiranja razvijena je DERMS (Distributed Energi Resource Management System) aplikacija za upravljanje distribuiranim izvorima električne energije. U okviru aplikacije su razvijene tri različite arhitekture SCADA podsistema nad kojima su izvršavani DDoS napadi. Pomoću DDoS simulatora izvršava se napad na SCADA podsistem. Tokom napada su merene performanse sistema u zavisnosti od broja napadača i različitih arhitektura SCADA podsistema.
APA, Harvard, Vancouver, ISO, and other styles
25

Shen, Zi Qi, Wei Deng, Wei Pei, Lian Shun Mu, and Hong Ouyang. "Design and Implementation of Microgrid SCADA Platform." Advanced Materials Research 732-733 (August 2013): 1358–64. http://dx.doi.org/10.4028/www.scientific.net/amr.732-733.1358.

Full text
Abstract:
Microgrid and traditional power system are different in terms of operation and control. SCADA reliability directly affects the operational control capacity of the microgrid. Based on the actual needs of the microgrid operation control and energy management, the author designed microgrid SCADA platform, including architecture, information exchange mechanism and data services, and then developed actual microgrid SCADA test platform. Through long-time test, the SCADA platform could achieve reliable microgrid operation and management.
APA, Harvard, Vancouver, ISO, and other styles
26

Wang, Hao, and Nathan Lau. "DURESS SCADA: A simulation platform to study user interface design for cybersecurity of industrial control systems." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66, no. 1 (September 2022): 115–19. http://dx.doi.org/10.1177/1071181322661173.

Full text
Abstract:
Supervisory Control and Data Acquisition (SCADA) systems are widely adopted in critical infrastructures and prime targets of cyberattacks. Ecological Interface Design (EID) is postulated to be an invaluable framework for supporting operators to cope with cyber intrusions, particularly zero-day attacks because prior research has demonstrated effectiveness of ecological interfaces during unanticipated events. However, a suitable research platform is absent for studying user interface in cybersecurity of SCADA systems. This paper presents a SCADA system simulation being designed and implemented for the DURESS thermohydraulic process control simulation common in EID studies. Based on the open literature and industrial standards to ensure representativeness of industrial SCADA systems, the simulation includes two programable logical controllers, seven routers, and a server in a wired communication network. These components should be sufficient to study human response to common cyberattacks on SCADA systems and support future work in prototyping and evaluating user interfaces for SCADA cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
27

Omarov, A., and V. Barabanov. "DEVELOPMENT OF AN ENTERPRISE POWER EQUIPMENT MONITORING SYSTEM USING THE WINCC SCADA SYSTEM." IZVESTIA VOLGOGRAD STATE TECHNICAL UNIVERSITY, no. 3(238) (April 21, 2020): 76–79. http://dx.doi.org/10.35211/1990-5297-2020-3-238-76-79.

Full text
Abstract:
The SCADA system was developed. The development process is described. The main elements that make up the SCADA system are described. The algorithm of functioning of the SCADA system, its capabilities, and the main advantages of its use were described in detail.
APA, Harvard, Vancouver, ISO, and other styles
28

Alimi, Oyeniyi Akeem, Khmaies Ouahada, Adnan M. Abu-Mahfouz, Suvendi Rimer, and Kuburat Oyeranti Adefemi Alimi. "A Review of Research Works on Supervised Learning Algorithms for SCADA Intrusion Detection and Classification." Sustainability 13, no. 17 (August 26, 2021): 9597. http://dx.doi.org/10.3390/su13179597.

Full text
Abstract:
Supervisory Control and Data Acquisition (SCADA) systems play a significant role in providing remote access, monitoring and control of critical infrastructures (CIs) which includes electrical power systems, water distribution systems, nuclear power plants, etc. The growing interconnectivity, standardization of communication protocols and remote accessibility of modern SCADA systems have contributed massively to the exposure of SCADA systems and CIs to various forms of security challenges. Any form of intrusive action on the SCADA modules and communication networks can create devastating consequences on nations due to their strategic importance to CIs’ operations. Therefore, the prompt and efficient detection and classification of SCADA systems intrusions hold great importance for national CIs operational stability. Due to their well-recognized and documented efficiencies, several literature works have proposed numerous supervised learning techniques for SCADA intrusion detection and classification (IDC). This paper presents a critical review of recent studies whereby supervised learning techniques were modelled for SCADA intrusion solutions. The paper aims to contribute to the state-of-the-art, recognize critical open issues and offer ideas for future studies. The intention is to provide a research-based resource for researchers working on industrial control systems security. The analysis and comparison of different supervised learning techniques for SCADA IDC systems were critically reviewed, in terms of the methodologies, datasets and testbeds used, feature engineering and optimization mechanisms and classification procedures. Finally, we briefly summarized some suggestions and recommendations for future research works.
APA, Harvard, Vancouver, ISO, and other styles
29

Yusuf Jr, Ramadhan, M. Ansyar Bora, and Albertus L. Setyabudi. "PENGEMBANGAN ALAT ANTI OFFLINE DI PT. PLN BATAM DENGAN MENGGUNAKAN METODE BRAINSTORMING DAN QFD." ILTEK : Jurnal Teknologi 17, no. 02 (December 9, 2022): 79–87. http://dx.doi.org/10.47398/iltek.v17i02.17.

Full text
Abstract:
Penelitian ini bertujuan untuk mengetahui faktor apa saja yang membuat sistem SCADA tidak berfungsi, faktor apa saja yang dibutuhkan untuk mendeteksi kerusakan SCADA, dan bagaimana mendesain alat anti offline SCADA sesuai kebutuhan user. Teknik pengumpulan data yang digunakan dalam penelitian ini observasi, wawancara dan kuesioner. Metode analisis data yang digunakan dalam penelitian ini adalah brainstorming dan QFD. Hasil penelitian menunjukkan bahwa berdasarkan House of Quality, bobot tertinggi adalah yang pertama menggunakan Microcontroller ESP 32 dengan presentase bobot yaitu 33.9%, yang kedua menggunakan Telegram API dengan bobot 29.9%, yang ketiga ergonomis dengan bobot 11%. Dimana ketiga respon teknis ini menjadi jawaban untuk memenuhi kebutuhan konsumen. Berdasarkan pengolahan dan analisa data yang telah dilakukan, dapat disimpulkan bahwa, beberapa hal yang membuat sistem SCADA tidak berfungsi, yaitu: baterai sebagai back up supply SCADA mengalami kerusakan, sehingga saat tegangan AC pada gardu tersebut mati karna padam listrik atau gangguan, sistem SCADA menjadi offline, jaringan SCADA pada gardu distribusi tersebut terputus, MCB AC pada gardu trip, perangkat RTU pada gardu hang. Untuk dapat mendeteksi kendala-kendala yang dapat menyebabkan sistem SCADA menjadi offline, dibutuhkan pengembangan alat monitoring baterai yang sebelumnya telah dibuat. Dalam hal ini penelitian menggunakan metode brainstorming dan QFD agar dapat merancang alat anti offline pada sistem SCADA yang sesuai dengan kebutuhan user. Hasil analisis dari Brainstorming dan QFD dapat diambil kesimpulan bahwa user menginginkan peralatan yang berdimensi tidak besar, dan mudah untuk dilakukan instalasi dan pengawatan. User juga menginginkan peralatan ini menggunakan microcontroller terbaru sehingga handal dan biaya pembuatannya murah. Penambahan fitur yang diinginkan oleh user pada alat ini yaitu dapat memonitor baterai dan mengirim alarm saat baterai rusak, dapat memonitor kondisi MCB AC dan memberi alarm saat MCB AC trip, dapat memonitor kondisi Motorized Circuit Breaker pada penyulang dan memberikan alarm saat penyulang gagal dioperasikan melalui SCADA, dapat memonitor suhu dan kelembaban udara pada gardu distribusi serta memberi alarm saat suhu dan kelembaban udara pada gardu distribusi tidak normal, serta fungsi untuk mereset suplai RTU saat kondisi RTU hang. Semua data ini dapat dimonitor melalui aplikasi Telegram di smart phone user.
APA, Harvard, Vancouver, ISO, and other styles
30

Thoullah, Chaidir Kurnia, and Itqan Tasyriqan. "ASESMEN KERENTANAN KEAMANAN INFORMASI SISTEM SCADA DENGAN METODE OCTAVE ALLEGRO." ICIT Journal 5, no. 2 (August 15, 2019): 181–90. http://dx.doi.org/10.33050/icit.v5i2.433.

Full text
Abstract:
System SCADA (Supervisory Control And Data Acquisition) merupakan sebuah system yang dibuat untuk pengambilan data, menyimpannya, analisa dan juga untuk mengendalikan suatu plant/system yang umumnya dilakukan secara jarak jauh. Untuk meningkatkan efisiensi, saat ini, system SCADA telah dipakai secara luas dalam berbagai bidang industry, seperti manufaktur, pembangkit listrik, oil & gas, telekomunikasi dan transportasi. Dalam perkembangannya, system ini tidak hanya terkoneksi secara intern saja, bahkan terkoneksi dengan internet untuk komunikasi antar komponennya maupun pengambilan informasi data sebagai bagian dari pendukung keputusan. Dengan terkoneksinya dengan system ekstern dalam hal ini internet, maka keamanan informasi system SCADA ini akan menjadi sangat rentan. Oleh karena itu, identifikasi terhadap resiko keamanan yang mungkin saja terjadi untuk memperoleh gambaran yang lengkap status keamanan system ini menjadi sangat diperlukan. Paper ini pengaplikasikan metode operationally critical threat, asset and vulnerability evaluation (OCTAVE) allegro untuk meng-asses resiko keamanan dari system SCADA. Metode ini focus pada asset informasi dan membandingkan wadah informasi yang berbeda-beda seperti database, kertas fisik dan manusia. Tujuan studi ini adalah untuk menyoroti berbagai kerentanan, resiko serta mengusulkan pendekatan mitigasi resiko yang teridentifikasi dari keamanan system SCADA. Penelitian ini diharapkan bisa digunakan sebagai dasar untuk meningkatkan keamanan system SCADA. Kata Kunci SCADA, OCTAVE Allegro, Informasi, Resiko Keamanan.
APA, Harvard, Vancouver, ISO, and other styles
31

Aziz Abdullah, Binnaser. "IMPLEMENTING INTERNET PROTOCOL (IP) BASED SUPERVISORY CONTROL AND DATA ACQUISITION (SCADA) NETWORK SYSTEM." International Journal of Engineering Applied Sciences and Technology 7, no. 7 (November 1, 2022): 214–17. http://dx.doi.org/10.33564/ijeast.2022.v07i07.033.

Full text
Abstract:
SCADA (supervisory control and data acquisition) is a system that monitors and control industrial, infrastructure, or facility- based processes. Scada systems integrate data acquisition systems with data transmission systems and graphical software in order to provide a centrally located "monitor and control" system for numerous process inputs and outputs. The sensors and metering devices are connected to field control devices. These control devices take real-world physical input signals from the sensors and, convert the signals to digital data and make decisions based on programmed logic or commands from the system operators. The control devices are connected control room environments where the hmi software systems are used by system operators to interact withthe control devices. IP SCADA is a plug and play feature in the IDP 600 terminal series that allow common SACDA devices such as remote terminal units (RTU) and PLC to be connected to SCADA networks using the IsatData Pro satellite service. IP SCADA is well suited for SCADA devices that are located in remote sites where other communication services are unavailable, unreliable or cost prohibitive and for sites that have low data usage requirements. IP-based SCADA Network systems provides many benefits like Unlimited locations for servers and clients, Service takeover and remote support, Data saving & Global Coverage.
APA, Harvard, Vancouver, ISO, and other styles
32

Gumelar B, Muhammad Adi, and Eko Ariyanto. "IMPLEMENTASI SCADA UNTUK MONITORING DAN CONTROLING SERTA KOORDINASI SISTEM PROTEKSI GARDU INDUK SISTEM 1,5 BREAKER PADA GARDU INDUK TEGANGAN EKSTRA TINGGI BERBASIS ARDUINO MEGA 2560 DENGAN TAMPILAN HMI." Gema Teknologi 19, no. 3 (October 31, 2017): 14. http://dx.doi.org/10.14710/gt.v19i3.21880.

Full text
Abstract:
Muhammad Adi Gumelar B, Eko Ariyanto, SCADA is one tool that can monitor and control the system at the substation and can coordinate the protection system area when a disturbance occurs. SCADA monitors the device continuously. This paper is to understand Differential protection areas, CCP, Buspro, and CBF that work when there is interference, namely internal and external interference by applying SCADA as its coordination. 12V DC relay is used as PMT, ACS712 as CT, and Ethernet Shield as Modbus to connect Arduino Mega 2560 with SCADA. Arduino Mega 2560 functions as a controlling center of input and output. The input used is the ACS712 sensor as a detector of the current flowing in the circuit. The Arduino Mega 2560 output signal will be sent to SCADA using an Ethernet Shield and router. Status of substations 1.5 breakers can be monitored with HMI from anywhere by using the SCADA application. In the event of a disturbance, each ACS712 will start reading the current changes and will be processed by Arduino Mega 2560, so that it can determine the protection area that works and trip the relay, SCADA will automatically record disturbances and give an alarm to occur by turning on the protection LED and sounding buzzer alarm. Keywords: 1.5 Breaker, Substation, Protection, SCADA.ReferencesHimpunan Buku Pedoman Pemeliharaan Master Station Scada SKDIR 0520-3.K/DIR/2014 Master Station SCADA No. Dokumen: PDM/PGI/04:2014). Jakarta. PT. PLN (Persero).Nurpadmi.2011. Studi Tentang Modbus Protokol pada Sistem Kontrol. Jurnal Teknologi, Volume 1. Nomor2. Cepu: Pusat Pengembangan Sumber Daya Manusia Minyak dan Gas Bmi.Arduino & Genuino Products. Arduino MEGA 2560 & Genuino MEGA2560. https://www.arduino.cc/en/Main/arduinoBoardMega2560. Diakses tanggal 26 Juni 2017.
APA, Harvard, Vancouver, ISO, and other styles
33

Simeonova, Tsvetelina. "Peculiarities of distributed systems, SCADA and IoT." Yearbook Telecommunications 7 (August 12, 2021): 65–70. http://dx.doi.org/10.33919/ytelecomm.20.7.8.

Full text
Abstract:
The aim of the work is to consider and compare the features of distributed systems, SCADA and IIoT. Both SCADA and IoT include sensors and data collection. Although they differ in many respects, they share a common goal. The idea of a smart grid leads to the integration of SCADA and IoT. SCADA is useful for monitoring and managing installations or industrial equipment. The Internet of Things is a collection of physical devices with different implementations, software upgrades, sensors, actuators, and network connectivity, all of which work together to enable objects to connect and exchange data. The focus of the article is the consideration, as distributed systems and in comparative terms, of the development of industrial technologies IoT and SCADA. The presentation will include a summary of the characteristics of these two technologies and a structural-functional analysis of the efficiency in the integration of the latest generations of SCADA systems in the functionality of IoT. The possibilities for integration are shown, as well as the prerequisites for this. The results can be used as recommendations in the areas of design and operation.
APA, Harvard, Vancouver, ISO, and other styles
34

М. И. Кабен, Б. Б. Исабекова, and Ж. Б. Исабеков. "МЕТОДОЛОГИЯ ПОСТРОЕНИЯ SCADA СИСТЕМ." Bulletin of Toraighyrov University. Physics & Mathematics series, no. 2.2022 (June 30, 2022): 104–12. http://dx.doi.org/10.48081/zytu2810.

Full text
Abstract:
"С быстрым развитием информационных технологий люди становятся все более и более зависимыми от автоматических технологий в некоторых специальных отраслях, таких как нефть, электроэнергетика и химия. Как новая технология, SCADA широко применяется в этих областях, что значительно сокращает потребность в рабочей силе и в то же время повышает эффективность. Тем не менее, шаблоны данных, полученные из разных УТБ (удаленных терминальных блоков), несовместимы, что создает некоторые трудности для вторичной разработки программного обеспечения для сбора и анализа данных. Что касается этой проблемы, SOA вводится в построение SCADA и предлагается новая методология. Рабочий процесс методологии подробно описан в данной статье. Приведен пример построения SCADA в автоматизации, который доказывает обоснованность предложенного метода. В этой статье введено понятие SOA и описано ESB как классическое SOA приложение, затем ESB используется для построения SCADA сети и анализа данных. Подробно описан процесс детализации с D-S теорией доказательства. Проводится анализ разработанной проектом приемной камеры с целью определения возможных проблем при эксплуатации насосной станции и предлагаются меры для улучшения условий ее работы. Ключевые слова: SCADA-системы, методология построения, система автоматизации, мониторинг, надежность и безопасность сетей SCADA."
APA, Harvard, Vancouver, ISO, and other styles
35

Aghenta, Lawrence Oriaghe, and Mohammad Tariq Iqbal. "Low-Cost, Open Source IoT-Based SCADA System Design Using Thinger.IO and ESP32 Thing." Electronics 8, no. 8 (July 24, 2019): 822. http://dx.doi.org/10.3390/electronics8080822.

Full text
Abstract:
Supervisory Control and Data Acquisition (SCADA) is a technology for monitoring and controlling distributed processes. SCADA provides real-time data exchange between a control/monitoring centre and field devices connected to the distributed processes. A SCADA system performs these functions using its four basic elements: Field Instrumentation Devices (FIDs) such as sensors and actuators which are connected to the distributed process plants being managed, Remote Terminal Units (RTUs) such as single board computers for receiving, processing and sending the remote data from the field instrumentation devices, Master Terminal Units (MTUs) for handling data processing and human machine interactions, and lastly SCADA Communication Channels for connecting the RTUs to the MTUs, and for parsing the acquired data. Generally, there are two classes of SCADA hardware and software; Proprietary (Commercial) and Open Source. In this paper, we present the design and implementation of a low-cost, Open Source SCADA system by using Thinger.IO local server IoT platform as the MTU and ESP32 Thing micro-controller as the RTU. SCADA architectures have evolved over the years from monolithic (stand-alone) through distributed and networked architectures to the latest Internet of Things (IoT) architecture. The SCADA system proposed in this work is based on the Internet of Things SCADA architecture which incorporates web services with the conventional (traditional) SCADA for a more robust supervisory control and monitoring. It comprises of analog Current and Voltage Sensors, the low-power ESP32 Thing micro-controller, a Raspberry Pi micro-controller, and a local Wi-Fi Router. In its implementation, the current and voltage sensors acquire the desired data from the process plant, the ESP32 micro-controller receives, processes and sends the acquired sensor data via a Wi-Fi network to the Thinger.IO local server IoT platform for data storage, real-time monitoring and remote control. The Thinger.IO server is locally hosted by the Raspberry Pi micro-controller, while the Wi-Fi network which forms the SCADA communication channel is created using the Wi-Fi Router. In order to test the proposed SCADA system solution, the designed hardware was set up to remotely monitor the Photovoltaic (PV) voltage, current, and power, as well as the storage battery voltage of a 260 W, 12 V Solar PV System. Some of the created Human Machine Interfaces (HMIs) on Thinger.IO Server where an operator can remotely monitor the data in the cloud, as well as initiate supervisory control activities if the acquired data are not in the expected range, using both a computer connected to the network, and Thinger.IO Mobile Apps are presented in the paper.
APA, Harvard, Vancouver, ISO, and other styles
36

Abbas, Hosny A. "Future SCADA challenges and the promising solution: the agent-based SCADA." International Journal of Critical Infrastructures 10, no. 3/4 (2014): 307. http://dx.doi.org/10.1504/ijcis.2014.066354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Камран Сулейманов, Камран Сулейманов. "ЗАДАЧИ ОЦЕНКИ СОСТОЯНИЯ ЭЭС, ОБОСНОВАНИЕ НЕОБХОДИМОСТИ ИНТЕГРАЦИИ ИИС SCADA/EMS И PMU." PAHTEI-Procedings of Azerbaijan High Technical Educational Institutions 17, no. 06 (May 18, 2022): 71–78. http://dx.doi.org/10.36962/pahtei17062022-71.

Full text
Abstract:
Рассматриваются системы SCADA/EMS и WAMS как основа интеллектуализации электрической системы. Изложенное вызывает необходимость совершенствования и развития принципов, систем режимного управления в час¬ти управления стационарными и переходными режимами. Также описана архитектура, фейзорная технология, данные задачи, решаемые в структуре WAMS, возможности интеграции систем SCADA и WAMS. Ключевые слова: оценивания состояния, телеизмерения, контрольные уравнения, SCADA/EMS, PMU
APA, Harvard, Vancouver, ISO, and other styles
38

Камран Сулейманов, Камран Сулейманов. "ЗАДАЧИ ОЦЕНКИ СОСТОЯНИЯ ЭЭС, ОБОСНОВАНИЕ НЕОБХОДИМОСТИ ИНТЕГРАЦИИ ИИС SCADA/EMS И PMU." PAHTEI-Procedings of Azerbaijan High Technical Educational Institutions 17, no. 06 (May 18, 2022): 71–78. http://dx.doi.org/10.36962/pahtei17062022-71.

Full text
Abstract:
Рассматриваются системы SCADA/EMS и WAMS как основа интеллектуализации электрической системы. Изложенное вызывает необходимость совершенствования и развития принципов, систем режимного управления в час¬ти управления стационарными и переходными режимами. Также описана архитектура, фейзорная технология, данные задачи, решаемые в структуре WAMS, возможности интеграции систем SCADA и WAMS. Ключевые слова: оценивания состояния, телеизмерения, контрольные уравнения, SCADA/EMS, PMU
APA, Harvard, Vancouver, ISO, and other styles
39

Shahzad, Aamir, Kalum Priyanath Udagepola, Young-keun Lee, Soojin Park, and Malrey Lee. "The Sensors Connectivity within SCADA Automation Environment and New Trends for Security Development during Multicasting Routing Transmission." International Journal of Distributed Sensor Networks 2015 (2015): 1–15. http://dx.doi.org/10.1155/2015/738687.

Full text
Abstract:
This study examined the security of SCADA system and its protocols, more specifically, SCADA/DNP3 protocol security. To achieve the study goals, a SCADA simulation environment is designed for water pumping process through connectivity of intelligent sensors, the payload is constructed, and security is deployed inside DNP3 protocol stack and then bytes are multicast to subcontrollers.
APA, Harvard, Vancouver, ISO, and other styles
40

McCarthy, John, and William Mahoney. "SCADA Threats in the Modern Airport." International Journal of Cyber Warfare and Terrorism 3, no. 4 (October 2013): 32–39. http://dx.doi.org/10.4018/ijcwt.2013100104.

Full text
Abstract:
Critical infrastructures are ubiquitous in the modern world and include electrical power systems, water, gas, and other utilities, as well as trains and transportation systems including airports. This work is concerned with Supervisory Control and Data Acquisition (SCADA) systems that are at the heart of distributed critical infrastructures within airports. Modern airports are highly competitive cost driven operations that offer a range of public and private services. Many airport systems such as car parking and building control systems are SCADA controlled. This is achieved with sensors and controllers monitored over a large, geographically disperse area. To increase efficiency and to achieve cost savings, SCADA systems are now being connected to information technology system networks using TCP/IP. The merging of SCADA systems into the main IT network backbone is presenting new security problems for IT security managers. Historically, proprietary solutions, closed systems, ad-hoc design and implementation, and long system life cycles have led to significant challenges in assessing the true security posture of SCADA systems. To address this, this work seeks how SCADA systems are being integrated into the IT network within a modern airport. From this new standpoint we will be able to identify ways in which SCADA may be vulnerable to malicious attack via the IT network. The results of this work could offer solutions to increase security within airports.
APA, Harvard, Vancouver, ISO, and other styles
41

Vicente, Luís, Fernando Carreira, Francisco M. Campos, Mário J. G. C. Mendes, João M. F. Calado, and Gamboa Carvalho. "Supervision System 4.0 for a Road Tanker Washing Robot Manipulator." Applied Sciences 13, no. 14 (July 23, 2023): 8500. http://dx.doi.org/10.3390/app13148500.

Full text
Abstract:
The washing of road tankers is currently still a manual process that requires an operator to place the washing head into the tanks. To increase productivity and operator safety, it is essential to implement automated systems with Fault Detection and Isolation (FDI) capabilities. On the other hand, the industry 4.0 paradigm promotes the use of collaborative systems that integrate with the other organization’s processes. Realizing this new vision requires Supervision, Control and Data Acquisition (SCADA) systems with FDI modules that integrate with collaborative systems and promote the digitalization of companies. This paper proposes a SCADA system for a new road tanker washing robot, aimed at integrating all systems and communication networks of the organization and future FDI modules. To this end, this paper proposes a communication architecture based on open protocols and a common database to connect SCADA to the lower and higher levels of automation. Furthermore, this paper describes the various aspects of SCADA system development, from synoptic design to validation. To support the development of the SCADA system, a Digital Twin (DT) of the road tanker washing robot was used, allowing to test and validate its functionality through this virtual prototype. The results show that the proposed SCADA system and underlying information architecture are suitable for supervision of a robotized wash operation and that the use of a Digital Twin facilitates SCADA system design and validation.
APA, Harvard, Vancouver, ISO, and other styles
42

Ndukwe, Cherechi, M. Tariq Iqbal, and Jahangir Khan. "An Open Source LoRa Based, Low-Cost IoT Platform for Renewable Energy Generation Unit Monitoring and Supervisory Control." Journal of Energy and Power Technology 4, no. 1 (November 16, 2021): 1. http://dx.doi.org/10.21926/jept.2201007.

Full text
Abstract:
SCADA provides real-time system monitoring by constant communication and data exchange between various system devices to achieve data visualization and logging. Presently, in industrial systems, commercial SCADA systems are being used for data monitoring and control. These systems can be expensive, and as such can only be afforded by select industries. Even at these costs, the commercial SCADA systems face some challenges, which include interoperability and scalability issues. Research has shown that these problems can be solved by the introduction of low-cost materials and open-source software to achieve data monitoring for all levels of processes. This paper proposes an open source, low-cost Internet of Things (IoT)-based SCADA system that employs the IoT architecture for SCADA functions. The proposed system is an improvement to the existing IoT solutions by eliminating cloud based IoT platforms and introducing a single machine system. This solution increases the robustness of the system while reducing costs. The proposed system prototype consists of voltage and current sensors, Arduino Uno microcontroller and Raspberry Pi. The sensors acquire data from the monitored unit. The Arduino Uno receives the data and processes them for transmission to the Raspberry Pi using the LoRa communication technology. At the Raspberry Pi, the local Chirpstack platform processes the data and displays the measured data using the Grafana dashboard for real-time data monitoring, and the data is stored in an InfluxDB database. For system validation purposes, the prototype is designed, developed, and set up to monitor the panel voltage, current and battery voltage of a solar photovoltaic system. The results obtained from the experimental set-up are compared with the test data from physical digital multimeters. The system presented in this paper is a low-cost, open source, scalable and interoperable system. This, therefore, makes the proposed SCADA system an alternative for commercial SCADA systems, especially for select applications. The system proposed in this paper can be deployed to large industrial systems with appropriate upgrades and customization. The main contribution of this research is the design and development of a SCADA system that performs all the functions of a proprietary SCADA system at a very low-cost with scalable and interoperability features which are the main limitations of the traditional SCADA systems.
APA, Harvard, Vancouver, ISO, and other styles
43

Oyucu, Saadin, Onur Polat, Muammer Türkoğlu, Hüseyin Polat, Ahmet Aksöz, and Mehmet Tevfik Ağdaş. "Ensemble Learning Framework for DDoS Detection in SDN-Based SCADA Systems." Sensors 24, no. 1 (December 27, 2023): 155. http://dx.doi.org/10.3390/s24010155.

Full text
Abstract:
Supervisory Control and Data Acquisition (SCADA) systems play a crucial role in overseeing and controlling renewable energy sources like solar, wind, hydro, and geothermal resources. Nevertheless, with the expansion of conventional SCADA network infrastructures, there arise significant challenges in managing and scaling due to increased size, complexity, and device diversity. Using Software Defined Networking (SDN) technology in traditional SCADA network infrastructure offers management, scaling and flexibility benefits. However, as the integration of SDN-based SCADA systems with modern technologies such as the Internet of Things, cloud computing, and big data analytics increases, cybersecurity becomes a major concern for these systems. Therefore, cyber-physical energy systems (CPES) should be considered together with all energy systems. One of the most dangerous types of cyber-attacks against SDN-based SCADA systems is Distributed Denial of Service (DDoS) attacks. DDoS attacks disrupt the management of energy resources, causing service interruptions and increasing operational costs. Therefore, the first step to protect against DDoS attacks in SDN-based SCADA systems is to develop an effective intrusion detection system. This paper proposes a Decision Tree-based Ensemble Learning technique to detect DDoS attacks in SDN-based SCADA systems by accurately distinguishing between normal and DDoS attack traffic. For training and testing the ensemble learning models, normal and DDoS attack traffic data are obtained over a specific simulated experimental network topology. Techniques based on feature selection and hyperparameter tuning are used to optimize the performance of the decision tree ensemble models. Experimental results show that feature selection, combination of different decision tree ensemble models, and hyperparameter tuning can lead to a more accurate machine learning model with better performance detecting DDoS attacks against SDN-based SCADA systems.
APA, Harvard, Vancouver, ISO, and other styles
44

El-Menshawy, A., Z. Gul, and I. El-Thalji. "Azure machine learning studio and SCADA data for failure detection and prediction purposes: A case of wind turbine generator." IOP Conference Series: Materials Science and Engineering 1201, no. 1 (November 1, 2021): 012086. http://dx.doi.org/10.1088/1757-899x/1201/1/012086.

Full text
Abstract:
Abstract Most industrial systems have supervisory control and data acquisition (SCADA) systems that collect and store process parameters. SCADA data is seen as a valuable source to get and extract insights about the asset health condition and associated maintenance operations. It is still unclear how appliable and valid insights SCADA data might provide. The purpose of this paper is to explore the potential benefits of SCADA data for maintenance purposes and discuss the limitations from a machine learning perspective. In this paper, a two-year SCADA data related to a wind turbine generator is extracted and analysed using several machine learning algorithms, i.e., two-class boosted decision tree, two-class decision forest, k-means clustering on Azure ML learning studio. It is concluded that the SCADA data can be useful for failure detection and prediction once rich training data is given. In a failure prediction context, data richness means ensuring that fault features are presented in the training data. Moreover, the logs file can be used as labelled data to supervise some algorithms once they are reported in a more rigorous manner (timing, description).
APA, Harvard, Vancouver, ISO, and other styles
45

Ning, Hua, Kaijun Liu, and Yuan Li. "Research on SCADA system security reinforcement method based on distributed Pareto algorithm." Journal of Computational Methods in Sciences and Engineering 22, no. 2 (March 28, 2022): 697–709. http://dx.doi.org/10.3233/jcm-215910.

Full text
Abstract:
As the SCADA system develops continuously, the dissemination of malicious network behaviors has brought great risk to the normal operation of enterprises, meanwhile resulting in huge economic burden to personal work and life. Therefore, the security reinforcement strategy is crucial to the field of network security management and analysis of the SCADA system. Some researchers have started to investigate on how to minimize the cost of realizing the SCADA system reinforcement strategy. However, the SCADA system administrators are facing a very challenging problem, that’s the reinforcement budget is less than the minimal input of SCADA system security reinforcement. The core of this problem lies on how to choose a subset from massive security reinforcement strategies, so as to minimize the risks from not patching all essential security vulnerabilities within the budget. Based on a deep comparative analysis of existing multi-objective optimization technologies, this paper proposes a multi-objective optimization method based on system attack tree model, and uses Pareto algorithm to solve this problem. The experimental results demonstrate that the Pareto algorithm can effectively make the multi-objective decision in security reinforcement strategy, and can solve practical issues in actual SCADA system security reinforcement practice.
APA, Harvard, Vancouver, ISO, and other styles
46

Coffey, Kyle, Richard Smith, Leandros Maglaras, and Helge Janicke. "Vulnerability Analysis of Network Scanning on SCADA Systems." Security and Communication Networks 2018 (March 13, 2018): 1–21. http://dx.doi.org/10.1155/2018/3794603.

Full text
Abstract:
Supervisory Control and Data Acquisition (SCADA) systems and Industrial Control Systems (ICSs) have controlled the regulation and management of Critical National Infrastructure environments for decades. With the demand for remote facilities to be controlled and monitored, industries have continued to adopt Internet technology into their ICS and SCADA systems so that their enterprise can span across international borders in order to meet the demand of modern living. Although this is a necessity, it could prove to be potentially dangerous. The devices that make up ICS and SCADA systems have bespoke purposes and are often inherently vulnerable and difficult to merge with newer technologies. The focus of this article is to explore, test, and critically analyse the use of network scanning tools against bespoke SCADA equipment in order to identify the issues with conducting asset discovery or service detection on SCADA systems with the same tools used on conventional IP networks. The observations and results of the experiments conducted are helpful in evaluating their feasibility and whether they have a negative impact on how they operate. This in turn helps deduce whether network scanners open a new set of vulnerabilities unique to SCADA systems.
APA, Harvard, Vancouver, ISO, and other styles
47

Söğüt, Esra, and O. Ayhan Erdem. "A Multi-Model Proposal for Classification and Detection of DDoS Attacks on SCADA Systems." Applied Sciences 13, no. 10 (May 13, 2023): 5993. http://dx.doi.org/10.3390/app13105993.

Full text
Abstract:
Industrial automation and control systems have gained increasing attention in the literature recently. Their integration with various systems has triggered considerable developments in critical infrastructure systems. With different network structures, these systems need to communicate with each other, work in an integrated manner, be controlled, and intervene effectively when necessary. Supervision Control and Data Acquisition (SCADA) systems are mostly utilized to achieve these aims. SCADA systems, which control and monitor the connected systems, have been the target of cyber attackers. These systems are subject to cyberattacks due to the openness to external networks, remote controllability, and SCADA-architecture-specific cyber vulnerabilities. Protecting SCADA systems on critical infrastructure systems against cyberattacks is an important issue that concerns governments in many aspects such as economics, politics, transport, communication, health, security, and reliability. In this study, we physically demonstrated a scaled-down version of a real water plant via a Testbed environment created including a SCADA system. In order to disrupt the functioning of the SCADA system in this environment, five attack scenarios were designed by performing various DDoS attacks, i.e., TCP, UDP, SYN, spoofing IP, and ICMP Flooding. Additionally, we evaluated a scenario with the baseline behavior of the SCADA system that contains no attack. During the implementation of the scenarios, the SCADA system network was monitored, and network data flow was collected and recorded. CNN models, LSTM models, hybrid deep learning models that amalgamate CNN and LSTM, and traditional machine learning models were applied to the obtained data. The test results of various DDoS attacks demonstrated that the hybrid model and the decision tree model are the most suitable for such environments, reaching the highest test accuracy of 95% and 99%, respectively. Moreover, we tested the hybrid model on a dataset that is used commonly in the literature which resulted in 98% accuracy. Thus, it is suggested that the security of the SCADA system can be effectively improved, and we demonstrated that the proposed models have a potential to work in harmony on real field systems.
APA, Harvard, Vancouver, ISO, and other styles
48

Gao, Zhenyu, Pan Chen, Zhonghua Chen, Guochao Shi, Zhoncai Liu, and Shiwei Feng. "Application of Edge Computing and SCADA System in Second Class Substation." E3S Web of Conferences 237 (2021): 02005. http://dx.doi.org/10.1051/e3sconf/202123702005.

Full text
Abstract:
This article adopts the way of progressive transformation of edge calculation and the combination of the substation, this paper makes a brief introduction to the calculation of edge, and describes its development situation at home and abroad, and then stand for intelligent SCADA system on 750 kV substation briefly, the architecture will eventually margin calculation and combination of SCADA system, discuss the practicability of EC SCADA system.
APA, Harvard, Vancouver, ISO, and other styles
49

Plumstead, Adam, and Pete Samson. "SCADA Master Planning for Water and Wastewater Utilities." Journal AWWA 115, no. 8 (October 2023): 12–21. http://dx.doi.org/10.1002/awwa.2158.

Full text
Abstract:
Key TakeawaysSupervisory control and data acquisition (SCADA) provides water utilities with data for regulatory compliance, monitoring and alarm management of life safety systems, and protecting public health.Utilities often make the mistake of taking a passive approach to managing a SCADA system, not giving it the special attention and detailed planning it requires to stay current.A SCADA master plan can fit any organization's size, complexity, and budget.
APA, Harvard, Vancouver, ISO, and other styles
50

Lysova, Natalya V. "DEVELOPMENT OF THE SCADA-SYSTEM ELEMENTS TO FORM A PAPER WEB FOR DYNAMIC DATA VISUALIZATION." Автоматизация процессов управления 2, no. 68 (2022): 29–36. http://dx.doi.org/10.35752/1991-2927-2022-2-68-29-36.

Full text
Abstract:
Nowadays the introduction of intelligent technologies is closely connected with the development of modern information and control systems. Modern SCADA systems are an enabling technology for monitoring and control of dynamic systems in many industries. The article describes the main functions and features of SCADA systems and their typical structure. Italso deals with the important network technologies in systems controlled by SCADA systems and their application. The analysis shows that an integrated SCADA system into automated control systems is the basis for ensuring high economic performance of an enterprise. Based on DataRate the SCADA system elements were developed to control the paper web casting system as part of a large industrial automated control system for dynamic data visualization. An algorithm of interaction and data transfer between elements of a virtual system using the Matrikon OPC software package is described. The use of the DataRate system for visualizing the results of the Simulink-model in forming the mass of the paper web is substantiated.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography