• Title/Summary/Keyword: SCADA data

Search Result 207, Processing Time 0.026 seconds

A Study on the Network Architecture for KEPCO SCADA Systems (한국전력 스카다 시스템의 네트워크 구조에 대한 연구)

  • Ryo, Woon Jong
    • Industry Promotion Research
    • /
    • v.2 no.2
    • /
    • pp.1-6
    • /
    • 2017
  • SCADA (Supervisory Control and Data Acquisition) System was first introduced to the Seoul Electricity Authority, which manages the transportation part among the three business fields that produce, transport and supply electric power in Korea. Has been using the data link with 1200 bps and 9600 bps in 5 protocols such as HARRIS 6000, BSC, HDLC, L & N and Toshiba by configuring 3 layers of EMS, SCADA and RTU computer equipments in 1: N radial form. This paper presents the OSI standard network packet flow, analyzing DataLink and Network Layer, and presents a KEPCO SCADA network model composed of X.25 high - speed communication network using 3 layers of network. We proposed a future SCADA communication structure that improved the current SCADA communication structure, defined the SCADA DB structure, introduced the concept of the remote SCADA gateway to the SCADA functional structure, applied the standard communication protocol, Multiplexing of surveillance and control in other local facilities and ensuring communication openness.

Applying Asymmetric Key Encryption to Secure Internet based SCADA

  • Robles, Rosslin John;Kim, Tai-hoon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.4 no.2
    • /
    • pp.17-21
    • /
    • 2012
  • As an acronym for Supervisory Control and Data Acquisition, SCADA is a concept that is used to refer to the management and procurement of data that can be used in developing process management criteria. The use of the term SCADA varies, depending on location. Conventionally, SCADA is connected only in a limited private network. In current times, there are also demands of connecting SCADA through the internet. The internet SCADA facility has brought a lot of advantages in terms of control, data generation and viewing. With these advantages, come the security issues regarding web SCADA. In this paper, we discuss web SCADA and its connectivity along with the issues regarding security and suggests a web SCADA security solution using asymmetric-key encryption.

Wide-Area SCADA System with Distributed Security Framework

  • Zhang, Yang;Chen, Jun-Liang
    • Journal of Communications and Networks
    • /
    • v.14 no.6
    • /
    • pp.597-605
    • /
    • 2012
  • With the smart grid coming near, wide-area supervisory control and data acquisition (SCADA) becomes more and more important. However, traditional SCADA systems are not suitable for the openness and distribution requirements of smart grid. Distributed SCADA services should be openly composable and secure. Event-driven methodology makes service collaborations more real-time and flexible because of the space, time and control decoupling of event producer and consumer, which gives us an appropriate foundation. Our SCADA services are constructed and integrated based on distributed events in this paper. Unfortunately, an event-driven SCADA service does not know who consumes its events, and consumers do not know who produces the events either. In this environment, a SCADA service cannot directly control access because of anonymous and multicast interactions. In this paper, a distributed security framework is proposed to protect not only service operations but also data contents in smart grid environments. Finally, a security implementation scheme is given for SCADA services.

Analysis for Frame Error Rate of a Data Transmission Protocol between CTC and SCADA (CTC와 SCADA간 정보전송 프로토콜에 대한 프레임 에러율 분석)

  • 강문호;이재호;황종규;박영수
    • Journal of the Korean Society for Railway
    • /
    • v.7 no.4
    • /
    • pp.296-301
    • /
    • 2004
  • This paper addresses an analysis for a railway data transmission protocol-Ethernet based data transmission between the CTC(Centralized Traffic Control System) and the SCADA(Supervisory Control and Data Acquisition) system. Fame error rates of the data transmissions are calculated and compared for the two cases that the CTC/SCADA has an extra data transmission error control(CRCI6) besides the inherent error control of the Ethernet(CRC32), and that the CTC/SCADA has no extra data transmission error control. With simulation results it has been verified that the extra data transmission error control(CRC16) contributes to lowering the frame error rate.

Security Technology for SCADA Communication Data (SCADA 통신 데이터 보호 기술)

  • Kim, Hak-Man
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2008.10a
    • /
    • pp.217-219
    • /
    • 2008
  • SCADA(Supervisory Control and Data Acquisition) is popular control and monitor areas not only in critical infrastructures such as electric power, gas, oil but also industrial applications. Increasement of cyber attack technique and frequency threats secure operation of SCADA systems. Recently many researches have been studied for protecting SCADA system against cyber attacks. This paper introduces overall security technologies in SCADA systems.

  • PDF

Secure Data Transmission Scheme between Network for Building Facilities Control System (빌딩시설 제어시스템용 안전한 망간 자료전송 방안)

  • Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.8
    • /
    • pp.102-108
    • /
    • 2018
  • The existing data transmission technology applied between the non-secure external internet and the secure internal business network has various problems when applied to the building facility management SCADA system control network. Traditional inter-network data transfer technologies involve high complexity and high costs because blacklist-based security techniques are applied to all data. However, whitelist-based security techniques can be applied to data distributed in Building Facility Management SCADA control systems because a small number of structured control data are repeatable and periodic. This simplifies the security technology applied to inter-network data transmission, enabling building facility management SCADA system control network deployment at low cost. In this paper, we proposed building control networks specialized in building facility management SCADA control systems by providing solutions to address and address these problems.

A Study on the Development of the SCADA System using the Internet (인터넷을 이용한 SCADA 시스템 구축에 관한 연구)

  • Park, I.K.;Yoon, K.K.;Kim, Y.S.;Lee, S.G.;Ahn, B.W.
    • Proceedings of the KIEE Conference
    • /
    • 1998.07g
    • /
    • pp.2373-2376
    • /
    • 1998
  • This paper describes the development of the SCADA(Supervisory Control and Data Acquisition) system which can be controlled via the Internet. In this paper, the SCADA system is composed of a number of microprocessor-based RTU(Remote Terminal Unit)s, a MMI(Man Machine Interface) host, a SCADA server, and SCADA clients. There are two protocols used in the system. Each RTU and the MMI host are connected by a RS-485 line and CSMA/CD(Carrier Sense Multiple Access / Collision Detection) protocol is used to communicate with each other. TCP/IP(Transmission Control Protocol/Internet Protocol) is used among the MMI host, the SCADA server, and SCADA clients. The equipments installed in the field are controlled by a number of RTUs. The function of the MMI host is to acquire real-time data from RTUs and control them. The SCADA server supports data transfer between the networked MMI host and the SCADA client on the web-server through TCP/lP. Data transfer is possible regardless of the type of network only if there are TCP/lP Winsock-compatible stack driver. The SCADA client is implemented as the shape of web-page by means of JAVA language. Therefore, it runs on a web-browser such as Netscape and Explorer, and allows a number of users to access this SCADA system.

  • PDF

Security Issues in SCADA Network (SCADA 네트워크 보안 이슈)

  • Kim, Hak-Man;Kang, Dong-Joo
    • Proceedings of the KIEE Conference
    • /
    • 2007.11b
    • /
    • pp.46-47
    • /
    • 2007
  • SCADA (Supervisory Control and Data Acquisition) system has been used fur remote measurement and control on the critical infrastructures as well as modem industrial facilities. As cyber attacks increase on communication networks. SCADA network has been also exposed to cyber security problems. Especially, SCADA systems of energy industry such as electric power, gas and oil are vulnerable to targeted cyber attack and terrorism. Recently, many research efforts to solve the problems have made progress on SCADA network security. In this paper, we introduce recent security issue of SCADA network and propose the application of encryption method to Korea SCADA network.

  • PDF

A Development of Cipher Device based on Embedded Linux for Serial Communication in SCADA (임베디드 리눅스 기반의 SCADA 직렬통신 구간 암호화 장치 개발)

  • Lee, Jong-Joo;Kim, Seog-Joo;Kang, Dong-Joo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.24 no.4
    • /
    • pp.25-32
    • /
    • 2010
  • The Supervisory Control and Data Acquisition Systems (SCADA) system provides monitoring, data gathering, analysis, and control of the equipment used to manage most infrastructure. The SCADA Network is implemented in a various manner for larger utilities, and multiple types of protocol and communication interfaces are used to network the control center to remote sites. The existing SCADA equipment and protocols were designed and implemented with availability and efficiency, and as a result security was not a consideration. So, performance, reliability, flexibility and safety of SCADA systems are robust, while the security of these systems is often weak. This makes some SCADA networks potentially vulnerable to disruption of service, process redirection, or manipulation of operational data that could result in public safety concerns and/or serious disruptions to the infrastructure. To reduce the risks, therefore, there is a need to have a security device such as cipher devices or cryptographic modules for security solutions. In this paper we develop an embedded cipher device for the SCADA equipment. This paper presents a cipher device designed to improve the security of its networks, especially in the serial communication.

Symmetric Encryption Application to Cyber Security of KEPCO SCADA Network (SCADA 시스템 정보보안들 위한 대칭키 암호 적용)

  • Kang, Dong-Joo;Kim, Hak-Man
    • Proceedings of the KIEE Conference
    • /
    • 2007.11b
    • /
    • pp.291-293
    • /
    • 2007
  • SCADA (Supervisory Control and Data Acquisition) SCADA refers to the combination of telemetry and data acquisition [1]. SCADA system has been used for remote measurement and control on the critical infrastructures as well as modem industrial facilities. Electric Power system is a representative system using SCADA network for its communication. Integration between many networks and increasing threatens of terrorism have made the potential risk by cyber attacks real and bigger in power system. Recently, many researching efforts have been made on SCADA network for improving its security. In general aspect, there are already several ways to secure the system like encryption, firewall, authentication, etc. In this paper, we focus on symmetric encryption method and propose the proper key distribution method to reflect the unique characteristics of SCADA network communication.

  • PDF