• Title/Summary/Keyword: Supervisory control and data acquisition

Search Result 117, Processing Time 0.026 seconds

Research on key management for supervisory control and data acquisition system (원격 감시 제어시스템에서 키 관리 방안 연구)

  • Lee, Keonjik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.4
    • /
    • pp.29-42
    • /
    • 2020
  • SCADA (Supervisory Control and Data Acquisition) systems for remote monitoring, data acquisition and control are applied to major industrial infrastructures including power, water and railroad. Recently, there are many researches on key management scheme for secure communication due to change to the open network environment. These systems are located at far distances and are connected to the main control center through various types of communication methods. Due to the nature of these systems, they are becoming the significant targets of cyber attack. We propose an efficient key management scheme which is established on ID-based cryptosystem without an expensive computation on MTU (Master Terminal Unit), Sub-MTU, and RTU (Remote Terminal Unit). The proposed method is secure and effective in key management among multiple legitimate devices.

A Study on the Improvement of Electric Supervisory in Apartment Complex (아파트 단지의 전력감시반 개선 연구)

  • 홍규장;김채규
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 1993.10a
    • /
    • pp.51-54
    • /
    • 1993
  • In this paper, it is proposed the the SCADA(Supervisory control and Data Acquisition) system in Apartment complex. The proposed SCADA system make use of the computer CRT(Cathod RAy Tube), which automatically observe the Electrical Facility, Elvator Facility, Fire Alarm Facility and process in the real-time data. In order to improve the hardware performance and the information process, the SCADA system composed of master-slave topology and decentralized the supervisory Facility. This system is expected the retrenchment of construction expenditure and the level-up of supervisory execution.

  • PDF

The Current technology state of "Supervisory Control And Data Acquisition System(SCADA)" and development plan in the city-gas industry (긴급제언 - 원격감시제어시스템의(SCADA) 기술현황과 도시가스산업에서의 발전방안)

  • Choi, In-Hwan
    • Journal of the Korean Professional Engineers Association
    • /
    • v.43 no.3
    • /
    • pp.28-33
    • /
    • 2010
  • The related industrial technologies are also being developed in medicine, education, the military, transportation, process management, security management and information technology industries due to a rapid progress in telecommunications technology. The supervisory remote control system is based upon telecommunications technology. The supervisory remote control systems are used in various ways such as city gas, water supply and drainage, environment, power, communication and device control fields. The supervisory remort control system became a solution with complex systems and important technologies in electricity, city gas filed that require safety management skills. The supervisory remote control system as a special technology has a lot of practical applications. In this paper, Let me examine the present status of remort control system applications and present development plans and alternatives in city-gas industrial technology.

  • PDF

Wide-Area SCADA System with Distributed Security Framework

  • Zhang, Yang;Chen, Jun-Liang
    • Journal of Communications and Networks
    • /
    • v.14 no.6
    • /
    • pp.597-605
    • /
    • 2012
  • With the smart grid coming near, wide-area supervisory control and data acquisition (SCADA) becomes more and more important. However, traditional SCADA systems are not suitable for the openness and distribution requirements of smart grid. Distributed SCADA services should be openly composable and secure. Event-driven methodology makes service collaborations more real-time and flexible because of the space, time and control decoupling of event producer and consumer, which gives us an appropriate foundation. Our SCADA services are constructed and integrated based on distributed events in this paper. Unfortunately, an event-driven SCADA service does not know who consumes its events, and consumers do not know who produces the events either. In this environment, a SCADA service cannot directly control access because of anonymous and multicast interactions. In this paper, a distributed security framework is proposed to protect not only service operations but also data contents in smart grid environments. Finally, a security implementation scheme is given for SCADA services.

Sensors Network and Security and Multimedia Enhancement

  • Woo, Seon-mi;Lee, Malrey
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.64-68
    • /
    • 2016
  • These fields are integrated to visualize and finalize the proposed development, in simulation environment. SCADA (supervisory control and data acquisition) systems and distributed control systems (DCSs) are widely deployed in all over the world, which are designed to control the industrial infrastructures, in real ways. To supervise and control the various parts of designed systems; trends to require a deep knowledge to understand the overall functional needs of industries, which could be a big challenge. Industrial field devices (or network sensors) are usually distributed in many locations and are controlled from centralized site (or main control center); the communication provides various signs of security issues. To handle these issues, the research contribution will twofold: a method using cryptography is deployed in critical systems for security purposes and overall transmission is controlled from main controller site. At controller site, multimedia components are employed to control the overall transmission graphically, such as system communication, bytes flows, security embedded parameters and others, by the means of multimedia technology.

Preparation of Reliable Measurement Data by Using State Estimation (상태추정을 이용한 고 신뢰도 측정데이터 확보방안 연구)

  • Kim, Hong-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.5
    • /
    • pp.1020-1025
    • /
    • 2007
  • EMS(energy management system) and SCADA(supervisory control and data acquisition) systems are used for reliable and efficient operation of electrical power systems. Various functions in EMS such as power flow, contingency analysis, security analysis essentially need accurate data set for reliable operation. State estimation can be a tool for providing these data. In this paper, programs for observability analysis and bad data processing are developed. Fundamental algorithms are introduced and validity of the proposed techniques is inspected with test cases.

  • PDF

A Security Analysis of a Key Management Scheme for PCS/SCADA Sensor Networks (PCS/SCADA 센서 네트워크용 키 관리 프로토콜에 대한 보안 분석)

  • Park, DongGook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.2
    • /
    • pp.123-131
    • /
    • 2009
  • Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. Recently, Nilsson et al. proposed a key management scheme for PCS/SCADA, which was claimed to provide forward and backward secrecies. In this paper, we define four different types of adversaries or attackers in wireless sensor network environments in order to facilitate the evaluation of protocol strength. We then analyze Nilsson et al. 's protocol and show that it does not provide forward and backward secrecies against any type of adversary model.

Improving a Forward & Backward Secure Key Management Scheme for Wireless Sensor Networks

  • Park, Dong-Gook
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.4
    • /
    • pp.521-524
    • /
    • 2009
  • Park proposed a forward & backward Secure key management scheme in wireless sensor networks for Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems [7]. The scheme, however, is still vulnerable to an attack called "sandwich attack": two nodes captured at times $t_1$ and $t_2$, respectively, surrenders all the group keys used between times $t_1$ and $t_2$. In this paper, we propose a fix to the scheme, which can limit the vulnerable time duration to an arbitrarily chosen time span while keeping the forward and backward secrecy of the scheme untouched.

A Forward & Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA

  • Park, Dong-Gook
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.98-106
    • /
    • 2009
  • Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. In this paper, a key management scheme is proposed to defeat node capture attack by offering both forward and backward secrecies. Our scheme overcomes the pitfalls which Nilsson et al.'s scheme suffers from, and is not more expensive than their scheme.