• Title/Summary/Keyword: 스카다시스템

Search Result 9, Processing Time 0.018 seconds

회원사 동정

  • Korea Electrical Manufacturers Association
    • NEWSLETTER 전기공업
    • /
    • no.94-12 s.109
    • /
    • pp.32-35
    • /
    • 1994
  • PDF

A Study on the Network Architecture for KEPCO SCADA Systems (한국전력 스카다 시스템의 네트워크 구조에 대한 연구)

  • Ryo, Woon Jong
    • Industry Promotion Research
    • /
    • v.2 no.2
    • /
    • pp.1-6
    • /
    • 2017
  • SCADA (Supervisory Control and Data Acquisition) System was first introduced to the Seoul Electricity Authority, which manages the transportation part among the three business fields that produce, transport and supply electric power in Korea. Has been using the data link with 1200 bps and 9600 bps in 5 protocols such as HARRIS 6000, BSC, HDLC, L & N and Toshiba by configuring 3 layers of EMS, SCADA and RTU computer equipments in 1: N radial form. This paper presents the OSI standard network packet flow, analyzing DataLink and Network Layer, and presents a KEPCO SCADA network model composed of X.25 high - speed communication network using 3 layers of network. We proposed a future SCADA communication structure that improved the current SCADA communication structure, defined the SCADA DB structure, introduced the concept of the remote SCADA gateway to the SCADA functional structure, applied the standard communication protocol, Multiplexing of surveillance and control in other local facilities and ensuring communication openness.

The Study on the Embodiment and Analysis of the Redundancy applied to SCADA (스카다시스템에 적용된 이중화기술의 구현과 분석에 관한 연구)

  • Heo, Sun-Gu;Jung, Lee-Sik;Lim, Jae-Il
    • Proceedings of the KIEE Conference
    • /
    • 2004.07d
    • /
    • pp.2341-2343
    • /
    • 2004
  • 전국의 다목적댐 발전소을 본사에서 원격 감시.제어를 행함에 있어 네트워크.감시제어시스템의 연결장애시 결정적인 데이터의 공백시간을 최소화하기 위해 적용된 이중화기술을 소프트웨어/하드웨어적으로 분석하여 SCADA 시스템의 신뢰도 향상에 목적을 두고자 한다.

  • PDF

The Comparative Study on Safety Factors at Elevator Management System Operation (승강기 관리시스템 운영 시 안전요소에 관한 비교연구)

  • Park, Joo-Bong;Shin, Seung-Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.159-162
    • /
    • 2014
  • Recently, from 2008 to 2012, there are many of elevator safety patents from patent office survey. In this paper, we analyzed the elevator safety patent from 2009 to 2013, found out safety factor is safety control, emergency stop equipment and door opening equipment. Through reliability statistics, we defined the most important things for safety elevator factor is this three things, studied the reason about many patents. Finally, we propose the Kinect Scada elevator system for prevention safety accident.

Proposal and Implementation on Non-Repudiation of Origin for DNP3 (DNP3에 적합한 발신 부인 방지 기법 제안과 그 구현)

  • Yu, Ki-Soon;Song, Kyoung-Young;Jang, Min-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.815-825
    • /
    • 2015
  • DNP3(Distributed Network Protocol) is one of the most representative protocols which is used in SCADA(Supervisory Control and Data Acquisition) system. IEC 62351 is listing the integrity, confidentiality, availability and non-repudiation or accountability as the security requirement. However, IEEE Std. 1815 that is DNP3 standards does not define a mechanism for non-repudiation or accountability. In this paper, we propose a non-repudiation of origin technique about the sender of critical ASDU and implement the proposed scheme using software such as OpenSSL and SCADA source code library.

전력제어분야 사이버 보안기술 개발동향

  • Kim, Jin Cheol;Park, Teak Geun;Lee, Kyu Cheol
    • Review of KIISC
    • /
    • v.30 no.5
    • /
    • pp.7-11
    • /
    • 2020
  • 최근 전력제어분야 사이버 보안에 대한 관심이 지속적으로 증가하면서 전력제어분야에 특화된 보안 표준화 논의를 지속적으로 진행 중이며, 국내외 보안기업에서 제어시스템 보안 솔루션을 출시하고 있다. 본 논문에서는 전력제어분야 보안기술 표준화 동향을 살펴보고, 스카다, 배전자동화시스템, AMI와 같은 전력제어시스템에 적용되는 사이버 보안기술 개발동향을 소개한다.

A Database Design Method for Wind Power Plant SCADA System based on IEC61400-25 (IEC61400-25 국제표준기반 풍력 SCADA시스템을 위한 데이터베이스 설계방안)

  • Chae, Chang Hun;Choi, Hyo Yul;Choi, Jun Suk
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.3
    • /
    • pp.151-160
    • /
    • 2012
  • In this paper, a database method for Wind Power Plant SCADA system based on IEC61400-25 was designed. To manage big data, which is produced by the introduction of international standards and large/grouping of wind power plant, database should be systematically designed. As identify the characteristics of the wind power data and reflect the requirements of a user, it would be decreasing the waste of data space and managing efficiently the system. As a result, it is expected to reduce cost and effort in development and maintenance of Wind Power Plant.

A Study and Analysis on Case Study of Security Evaluation Tool (보안성 평가 도구 사례 분석 연구)

  • Kim, Hyun-il;Park, Kyungyun;Seo, Changho;Moon, Daesung
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.347-356
    • /
    • 2019
  • Recently, the liberalization of industrial control systems has been accompanied by a major change in the structural paradigm of information systems in the public and public sectors, and potential cyber security problems in the future major infrastructure control systems that cannot respond to the level of security of existing information systems. To cope with this, a cyber security evaluation tool that can evaluate security vulnerability in three dimensions against various infrastructure control system environment is needed. However, a cyber security evaluation in the domestic environments does not have the concept of the current security status and satisfy settings of the infrastructure. Also, the most of items in that environments have had short-term inspection themselves which makes a limitation by a technical area. In order to overcome this problems, many researches are needed to apply CSET (Cyber Security Evaluation Tool) which is the US cyber security evaluation tool to the control environment of various domestic infrastructure. In this paper, first, we analyze methods to apply to the major domain through the analysis of various case studies on existing security assessement tools. Finally, we discuss future directions.