Explore chapters and articles related to this topic
Operational Planning of Electrical Power Systems and Smart Grids
Published in B K Bala, Energy Systems Modeling and Policy Analysis, 2022
SCADA systems usually monitor and make slight changes to function optimally. They are considered to be closed-loop control systems and operate with comparatively little human interface. Modern SCADA systems essentially replace manual labor to operate electrical distribution tasks and manual processes in distribution systems with automated equipment. SCADA systems maximize the efficiency of power distribution systems by providing a real-time view into operations, data-trending and logging, maintaining desired voltages, currents and power factors. One of the key processes of a SCADA system is the ability to supervise the whole system in a real-time environment. This is accomplished by data acquisitions communicated at regular intervals. As an automation system, a SCADA system is used to acquire data from the instruments and sensors located at remote sites and to receive and transmit the data at master station central sites for controlling or monitoring purposes. The collected data can be displayed and viewed at host computers at the central site. Based on these data, automated or operator-driven supervisory control commands are sent to remote substation control devices, often referred to as field devices.
Wind Turbines, Cybersecurity, and SCADA
Published in Frank R. Spellman, The Science of Wind Power, 2022
Control systems, such as SCADA, can be vulnerable to cyber-attacks. Entities or individuals with malicious intent might take one or more of the following actions to successfully attack control systems: Disrupt the operation of control systems by delaying or blocking the flow of information through control networks, thereby denying the availability of the networks to control system operations.Make unauthorized changes to programmed instructions in PLCs, RTUs, or DCS controllers, change alarm thresholds, or issue unauthorized commends to control equipment, which could potentially result in damage to equipment (if tolerances are exceeded), premature shutdown of processes (such as prematurely shutting down transmission lines), or even disabling of control equipment.Send false information to control system operators either to disguise unauthorized changes or to initiate inappropriate actions by system operators.Modify the control system software, producing unpredictable results.Interfere with the operation of safety systems.
Supervisory Control and Data Acquisition (SCADA)
Published in Chanchal Dey, Sunit Kumar Sen, Industrial Automation Technologies, 2020
SCADA is an acronym that stands for Supervisory Control and Data Acquisition. It is a type of Industrial Control System (ICS); the other two in the clan are Distributed Control System (DCS) and Programmable Logic Controller (PLC). SCADA distinguishes itself from the other two by being a multilocation, large distant sites. A SCADA-based system normally does a supervisory control rather than the closed-loop control normally encountered in process industries. To keep a tab on the health of machines, machineries and devices, and their subsequent control on a continuous day in, day out basis is a very tedious and monotonous job and may lead to errors due to operational fatigue. Thus, a need arose to have some SCADA for geographically separated sites. The first time a SCADA system was applied was during the thirties of the last century for supervisory control of substation equipment connected to a grid.
AI-enabled IoT penetration testing: state-of-the-art and research challenges
Published in Enterprise Information Systems, 2023
Claudia Greco, Giancarlo Fortino, Bruno Crispo, Kim-Kwang Raymond Choo
Luswata et al. (2018) tested Supervisory Control and Data Acquisition (SCADA) systems using the Modbus TCP protocol to communicate. Both internal and external pentests were performed in order to examine insider threats as well as external threats, employing Smod penetration testing tool to perform DoS and ARP poisoning attacks. The results revealed the potential inability to exchange data correctly between the master and the slave in the SCADA system and that an IDS may produce misleading alerts which can have serious repercussions on attack response time and accuracy. Upadhyay, Sampalli, and Plourde (2020) used pentesting tools to test the security of Onion Omega2, a small embedded Linux server for building SCADA/IoT communication systems. Several vulnerabilities were found, including missing patches, insecure system configurations, and low-level security cipher algorithms. Hilal and Nangim (2017) built an SCADA system and analysed its network vulnerabilities. They used Wireshark to track data traffic over the network communications. The results proved that SCADA networks can be vulnerable to malware threats and attacks. Campbell (1993) discusses the use of penetration testing in Control Systems. Hossain et al. (2021) presented a risk assessment method that includes system analysis, attack modelling and analysis, penetrate the system.
Integration of SCADA and Industrial IoT: Opportunities and Challenges
Published in IETE Technical Review, 2023
A. Nechibvute, H. D. Mafukidze
Conventional SCADA systems primarily focusses on real time control and monitoring of industrial equipment and automation processes. Traditionally, SCADA systems are designed to transfer data between local and predominantly vendor-specific equipment, and they have limited capabilities to integrate with IoT devices run by embedded controller units. With the advent of industrial IoT, the latest generation of SCADA systems now overcome this integration hurdle by use of interoperable machine-to-machine (M2M) communication, thus facilitating diversely interconnected digital twin components regardless of the equipment vendor or manufacturer of the components. Digital twin technology provides for digital replication and virtual representation of the physical systems in the manufacturing industry [12–15]. The digital twins allow for data flow from the virtual model to the physical components on and the other way round. This enables an integrated and comprehensive path to managing industrial processes and improve decision making [44–46]. Digital twin technology, aided by Artificial intelligence and Big Data tools brings with it potential improvement in predictive maintenance management, testing and analysis of different scenarios before and after deployment of physical machine components in the real production environment. Investing in digital twin technology is an appropriate way to achieve greater operational efficiency, improved reliability and commissioning process for industrial process equipment while at the same time reducing costs.
Towards intuitive visualisation goals for the operation optimisation of automated container terminal based on digital twin technology
Published in Maritime Policy & Management, 2023
Ang Yang, Yang Liu, Congying Xin, Qiang Chen, Liang Wang
ACT operators use TOS to manage equipment scheduling, track the movements of containers, optimise space allocation in the yard, and make decisions based on real-time information about ACT operations. The digital twin system uses the Oracle database to store the job orders of the TOS in real-time. The user interface of TOS is shown in Figure 5. At the same time, TOS will send job orders to the SCADA system, which combines software and hardware elements generally used to control dispersed assets and industrial processes locally, using centralized data acquisition and supervisory control. Since different manufacturers supply the port equipment, SCADA must communicate with the PLC through the Open Platform Communication (OPC) protocol to issue operating instructions. Therefore, real-time data can be transmitted bidirectionally between SCADA and PLC. Under the framework of the digital twin system, the operation data of all automation equipment under SCADA will be stored in its corresponding Oracle database. All these stored data will be used as the digital infrastructure to build the digital ACT in the cyber world.