• Title/Summary/Keyword: SCADA system

Search Result 290, Processing Time 0.035 seconds

A Study on the Development of the SCADA System using the Internet (인터넷을 이용한 SCADA 시스템 구축에 관한 연구)

  • Park, I.K.;Yoon, K.K.;Kim, Y.S.;Lee, S.G.;Ahn, B.W.
    • Proceedings of the KIEE Conference
    • /
    • 1998.07g
    • /
    • pp.2373-2376
    • /
    • 1998
  • This paper describes the development of the SCADA(Supervisory Control and Data Acquisition) system which can be controlled via the Internet. In this paper, the SCADA system is composed of a number of microprocessor-based RTU(Remote Terminal Unit)s, a MMI(Man Machine Interface) host, a SCADA server, and SCADA clients. There are two protocols used in the system. Each RTU and the MMI host are connected by a RS-485 line and CSMA/CD(Carrier Sense Multiple Access / Collision Detection) protocol is used to communicate with each other. TCP/IP(Transmission Control Protocol/Internet Protocol) is used among the MMI host, the SCADA server, and SCADA clients. The equipments installed in the field are controlled by a number of RTUs. The function of the MMI host is to acquire real-time data from RTUs and control them. The SCADA server supports data transfer between the networked MMI host and the SCADA client on the web-server through TCP/lP. Data transfer is possible regardless of the type of network only if there are TCP/lP Winsock-compatible stack driver. The SCADA client is implemented as the shape of web-page by means of JAVA language. Therefore, it runs on a web-browser such as Netscape and Explorer, and allows a number of users to access this SCADA system.

  • PDF

Development of Unified SCADA System Based on IEC61850 in Wave-Offshore Wind Hybrid Power Generation System (파력-해상풍력 복합발전시스템의 IEC61850기반 통합 SCADA시스템 개발)

  • Lee, Jae-Kyu;Lee, Sang-Yub;Kim, Tae-Hyoung;Ham, Kyung-Sun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.5
    • /
    • pp.811-818
    • /
    • 2016
  • This paper suggests a structure of power control system in floating wave-offshore wind hybrid power generation system. We have developed an unified SCADA(Supervisory Control and Data Acquisition) system which can be used to monitor and control PCS(Power Conversion System) based on IEC61850. The SCADA system is essential to perform the algorithm like proportional distribution and data acquisition, monitoring, active power, reactive power control in hybrid power generation system. IEC61850 is an international standard for electrical substation automation systems. It was made to compensate the limitations of the legacy industrial protocols such as Modbus. In order to test the proposed SCADA system and algorithm, we have developed the wind-wave simulator based Modbus. We have designed a protocol conversion device based on real-time Linux for the communication between Modbus and IEC61850. In this study, SCADA system consists of four 3MW class wind turbines and twenty-four 100kW class wave force generator.

A Study on the Network Architecture for KEPCO SCADA Systems (한국전력 스카다 시스템의 네트워크 구조에 대한 연구)

  • Ryo, Woon Jong
    • Industry Promotion Research
    • /
    • v.2 no.2
    • /
    • pp.1-6
    • /
    • 2017
  • SCADA (Supervisory Control and Data Acquisition) System was first introduced to the Seoul Electricity Authority, which manages the transportation part among the three business fields that produce, transport and supply electric power in Korea. Has been using the data link with 1200 bps and 9600 bps in 5 protocols such as HARRIS 6000, BSC, HDLC, L & N and Toshiba by configuring 3 layers of EMS, SCADA and RTU computer equipments in 1: N radial form. This paper presents the OSI standard network packet flow, analyzing DataLink and Network Layer, and presents a KEPCO SCADA network model composed of X.25 high - speed communication network using 3 layers of network. We proposed a future SCADA communication structure that improved the current SCADA communication structure, defined the SCADA DB structure, introduced the concept of the remote SCADA gateway to the SCADA functional structure, applied the standard communication protocol, Multiplexing of surveillance and control in other local facilities and ensuring communication openness.

A Study on the Secure Plan of Security in SCADA Systems (SCADA 시스템의 안전성 확보방안에 관한 연구)

  • Kim, Young-Jin;Lee, Jung-Hyun;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.145-152
    • /
    • 2009
  • SCADA(Supervisory Control And Data Acquisition) systems are widely used for control and monitoring of critical infrastructures including electricity, gas and transportation. Any compromise in the security of SCADA systems could result in massive chaos and disaster at a national level if a malicious attacker takes the control of the system. Therefore, sound countermeasures must be provided when the SCADA systems are being developed as well as when they are being operated. Unlike general information processing system, SCADA systems have different service responses, communication protocols and network architectures and therefore a different approach should be applied to each SCADA systems that takes into consideration of each system's security characteristics and architectures. In addition, legal basis should be established to ensure the nationwide management of the systems security. This paper examines the vulnerabilites of SCADA systems and proposes action plans to protect the systems against cyber attacks.

A SCADA Testbed Implementation Architecture for Security Assessment (SCADA 시스템의 보안성 평가를 위한 테스트베드 구성)

  • Lee, Jong-Joo;Kim, Seog-Joo;Kang, Dong-Joo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.24 no.4
    • /
    • pp.50-56
    • /
    • 2010
  • Supervisory Control and Data Acquisition Systems (SCADAs) is real-time monitor and control systems. SCADA systems are used to monitor or control chemical and transportation processes, in municipal water supply systems, electric power generation, transmission and distribution, gas and oil pipelines, and other distributed processes. SCADA refers to a large-scale distributed system. The supervisory control system is placed on top of a real time control system to control external processes. Emerging security technologies and security devices are decreasing the vulnerability of the power system against cyber threats. Dealing with these threats and analyzing vulnerabilities is an important task for equipment such as RTU, IED and FEP. To reduce such risks, we develop such a SCADA testbed. This paper presents the development of a testbed designed to assess the vulnerabilities SCADA networks(including serial communication).

Research Trends of SCADA Digital Forensics and Future Research Proposal (SCADA 디지털포렌식 동향과 향후 연구 제안)

  • Shin, Jiho;Seo, Jungtaek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1351-1364
    • /
    • 2019
  • When SCADA is exposed to cyber threats and attacks, serious disasters can occur throughout society. This is because various security threats have not been considered when building SCADA. The bigger problem is that it is difficult to patch vulnerabilities quickly because of its availability. Digital forensics procedures and techniques need to be used to analyze and investigate vulnerabilities in SCADA systems in order to respond quickly against cyber threats and to prevent incidents. This paper addresses SCADA forensics taxonomy and research trends for effective digital forensics investigation on SCADA system. As a result, we have not been able to find any research that goes far beyond traditional digital forensics on procedures and methodologies. But it is meaningful to develop an approach methodology using the characteristics of the SCADA system, or an exclusive tool for SCADA. Analysis techniques mainly focused on PLC and SCADA network protocol. It is because the cyber threats and attacks targeting SCADA are mostly related to PLC or network protocol. Such research seems to continue in the future. Unfortunately, there is lack of discussion about the 'Evidence Capability' such as the preservation or integrity of the evidence extracting from SCADA system in the past researches.

Security Issues in SCADA Network (SCADA 네트워크 보안 이슈)

  • Kim, Hak-Man;Kang, Dong-Joo
    • Proceedings of the KIEE Conference
    • /
    • 2007.11b
    • /
    • pp.46-47
    • /
    • 2007
  • SCADA (Supervisory Control and Data Acquisition) system has been used fur remote measurement and control on the critical infrastructures as well as modem industrial facilities. As cyber attacks increase on communication networks. SCADA network has been also exposed to cyber security problems. Especially, SCADA systems of energy industry such as electric power, gas and oil are vulnerable to targeted cyber attack and terrorism. Recently, many research efforts to solve the problems have made progress on SCADA network security. In this paper, we introduce recent security issue of SCADA network and propose the application of encryption method to Korea SCADA network.

  • PDF

Building IEC 61850 SCADA system based on TETRA (TETRA 기반 IEC 61850 SCADA 시스템 구축)

  • Song, Byung-Kwen;Jeong, Tae-Ui
    • Journal of IKEEE
    • /
    • v.13 no.3
    • /
    • pp.87-94
    • /
    • 2009
  • TETRA(TErrestrial Trunked RAdio) is the wireless communication system generally adopted to public network and backbone network, as the technology of Trunked Radio System specified by ETSI(European Telecommunications Standards Institute) and currently adopted to the Electric Power IT Backbone Network in Korea. IEC 61850 is the protocol proposed for SAS(Substation Automation System) of SCADA(Supervisory Control And Data Acquisition) system. In this paper, IEC 61850 Server and Client simulator are used based on Linux operating system. The multi-functional gateway, which transforms the communication based on TCP/IP between IEC 61850 Server Simulator and Client Simulator to the one based on TETRA Packet Data Service, is developed such that IEC 61850 SCADA system is constructed based on TETRA.

  • PDF

Control and Monitoring Process Industrial Automation based on SCADA system using Android Smartphone (안드로이드 스마트폰을 이용한 SCADA 시스템 기반의 제어및모니터링 과정산업자동화)

  • Budhi, Prayoga;Isnanto, Isnanto;Kim, Jeong-Hun;Park, Sung-Jun
    • Proceedings of the KIPE Conference
    • /
    • 2013.07a
    • /
    • pp.126-127
    • /
    • 2013
  • In industry, Supervisory Control and Data Acquisition (SCADA) system plays critical role to ensure production is monitored and controlled rigorously and in timely manner. Having a cost saving yet still effective SCADA system would be much desired by Industry. SCADA itself is a field with constant development and research like how this paper investigates on creating an extremely low cost device, which can be adapted to many different SCADA applications through some very basic programming when combined with relevant peripherals. Much of the process in some expensive SCADA application based on smartphone application is due to specialized communication infrastructure. This paper addresses the needs by developing low cost and integrated wireless SCADA system. The system features capability on accessing the performance of remotely situated device parameter, such as temperature, control analog or digital input output on real time basis. We use existing mobile network capability through Bluetooth communication channel.

  • PDF

A Study on the SCADA Simulator (SCADA 시뮬레이터에 관한 연구)

  • Lee, Heung-Jae;Lim, Chang-Ho;Ahn, Bok-Shin;Park, Young-Moon
    • Proceedings of the KIEE Conference
    • /
    • 1997.07c
    • /
    • pp.936-938
    • /
    • 1997
  • Up to date, operator assistance systems -fault diagnosis system, fault restoration system etc.- are developed for power system automation. In this condition, an efficiency test of assistance system must be performed to prove application in real power system. This paper presents an SCADA simulator for an efficiency test of the operator assistance system, which is developed in the SCADA system. The proposed simulator is implemented under Win95 with Pentium-PC.

  • PDF