You are on page 1of 13

RECENT ADVANCEMENTS IN SCADA

Ansheel Banthia, Arun Pratap Singh

(BT17EEE013, B. TECH student, Department of Electrical & Electronics, VNIT, Nagpur, 440010)

(BT17EEE014, B. TECH student, Department of Electrical & Electronics, VNIT, Nagpur, 440010)

Abstract - Supervisory control and data Acquisition (SCADA) systems are primarily industrial control systems, with real

time process and distributed intelligence. They process the data and facilitate to regulate and monitor the operations in a

business. The industries desires are currently ever-changing with the advances in data communication and machine

technologies and with the provision of low value sensors, wi-fi enabled premises, open source software, and hardware to

handle vast volume of data. This seems like science fiction: the utopian world of SCADA. A system-wide control loop

reacts to alarms automatically and tunes itself perpetually, based on high-level operational set points and real-time method

response. Users are free of regular operational duties to target general improvements: developing new power potency

models, calibration the SCADA’s decision-making criteria, and dealing with the planning team on strategic initiatives. the

future could also be nearer than we expect.

Keywords – SCADA, Trends, Alarm, Cyber-security, RTU, Case studies.

Table of Contents
INTRODUCTION .................................................................................................................................................... 3
SCADA system function ..................................................................................................................................... 3
Primary elements of SCADA system ................................................................................................................. 3
Uses of SCADA .................................................................................................................................................. 4
SUPER SCADA SYSTEMS ....................................................................................................................................... 4
Background ....................................................................................................................................................... 4
Process Flow of Super SCADA System............................................................................................................... 5
SMART ALARM MANAGEMENTS ........................................................................................................................ 5
Why is Alarm management system required?.................................................................................................. 5
Dangerous options in a system upgrade .......................................................................................................... 6

1
CYBER SECURITY .................................................................................................................................................. 6
Recent trends in Cyber security ........................................................................................................................ 7
Access control and event logging ............................................................................................................ 7

The Electronic Security Perimeter (ESP) .................................................................................................. 7

Security auditing ...................................................................................................................................... 7

Designed with future necessities in mind ................................................................................................ 7

There is no back door............................................................................................................................... 7

Safety is life cycle management............................................................................................................... 8

Cost Efficient ............................................................................................................................................ 8

REMOTE TERMINAL UNITS .................................................................................................................................. 8


Advance terminal units features ....................................................................................................................... 9
SICAM A8000 Series ........................................................................................................................................ 10
RECENT INDUSTRY CASE STUDIES ...................................................................................................................... 11
CONCLUSION ...................................................................................................................................................... 12
REFRENCES .......................................................................................................................................................... 13

List of Figures
Figure 1 Block diagram of SCADA ............................................................................................................. 2
Figure 2 Super SCADA system applications and outcomes ............................................................................ 3
Figure 3 A SICAM A8000 Series Unit ....................................................................................................... 2

2
1. INTRODUCTION

The SCADA system is a common industrial process automation system, accustomed collect data from devices and sensors

situated at the remote locations and transmit information to a central location to observe and control. On one or additional

SCADA host computers, information are collected from sensors and devices.

1.1. SCADA system performs the following subsequent functions -

1. Data Acquisition

2. Network digital communication

3. information presentation

4. supervisory control

5. Alarm forecast

6. Sequence of Event Acquisition

Figure 1: Block diagram of SCADA [7]

1.2. Primary elements of SCADA system:

1. Relay sensors and control.

2. Remote telemetry Unit (RTU). These are small units deployed within the space at some locations. RTUs serve as native

collection points to gather reports from sensors and provides instruction to regulate relays.

3
3. SCADA Central control Units. These are massive pc that function central processors for SCADA systems. CENTRAL

units offer a human interface to the system and automatically control the managed system in response to device input.

4. Communication network that connects the SCADA control unit to the RTUs within the region.

1.3. Uses of SCADA

SCADA systems are accustomed automatize complicated industrial processes wherever human control is impractical -

systems wherever there are additional control factors, and additional fast-moving control factors, will manage well than

humans. SCADA System Control:

• power generation, transmission and distribution: Use of electrical utilities to observe current flow and monitor the

operation of line voltages, frequency fluctuations, relays and circuit breakers, and to create sections of the power grid on-

line or offline.

• Water and sewage: State and municipal water utilities use SCADA to observe and regulate water flow, reservoir levels,

pipe pressure and different factors.

• Buildings, facilities and environments: Facility managers use SCADA to regulate HVAC, refrigeration units, lighting

and entry systems, etc.

• Manufacturing: The SCADA system manages components inventories and processes and quality monitors to control

just-in-time producing, industrial automation and robots.

• Mass transit: Transit officers use SCADA to control electricity in subways, trams and tramcar buses; To automatize

traffic signals for rail systems; to trace and find trains and buses; And to regulate railway crossing gates.

• Traffic signal: SCADA controls traffic lights, controls traffic flow and detects out-of-order signals.

2. SUPER SCADA SYSTEMS

2.1. Background

With the adoption of (IIoT) and leveraging the most recent technologies, the connected enterprise has currently become a

reality. the massive quantity of data} generated within the industry can offer useful information once it's effectively

processed. The SCADA system helps collect data from field devices like sensors and helps in observation and control,

however they act as a standalone device and exchange information with an ERP or decision support system or data

warehouse. The reciprocity of information between devices may be a major challenge as they use proprietary computer

code with massive license prices. Thus, it's become a bottleneck for small and medium scale corporations to leverage

IIoT. Industries want processed data to conduct their processes properly and once data is generated. Processes are the

4
foremost complicated in an business and have multiple communication interfaces that exchange data between controllers

and a centralized control station. The Super SCADA system helps to beat this challenge by connecting individuals,

processes and things in an intelligent means. The system integrates SCADA with industry ERP and different industrial

information supplys using open source tools. information collected from multiple supplys is analyzed once they are

generated and displayed on a dashboard that runs as an online application with open source. prognosticative analytics and

business intelligence reports are created using open source visualisation tools to create effective decisions. These act as a

bridge between operational technologies (OT) and business data technologies by providing flexibility to perform real-time

or historical data analysis. This integration into Super SCADA helps to boost the performance of 3 core functions of the

industry like production planning, quality analysis and maintenance analysis, resulting in effective utilization of

machinery, workforce and cash by eliminating gaps within the intermediate method. This ultimately results in higher

productivity and benchmarking standards and formulating methods. moreover, all of those processes will be designed to

attach to several sorts of mobile / wearable or increased reality devices.

Figure 2: Super SCADA system applications and outcomes [1]

2.2. Process Flow of Super SCADA System

The aim of the study is to develop an open source system which will integrate information from SCADA systems, ERP

and different sources into super SCADA systems and effectively estimate machine failure times in an industry and send

active alerts. Field devices like sensors or actuators collect data regarding varied elements in a plant and transmit it to the

RTU. RTUs or PLCs collect data and transmit it to the SCADA system. process level data and business information are
5
collected from ERP and stored within the data collection of a super SCADA system. The graphical user interface (GUI)

for the Super SCADA HMI module is intended to regulate SCADA systems, manage events, send alerts (email / SMS),

trigger alarms, and examine production statistics. the information from the Super SCADA system are used for real-time

forecast analysis.

A prediction model based on {the information|the info|the information} of the Super SCADA system will be created and

also the results will be compared with the prognostication data of traditional SCADA systems. Finally, the last word

objective of the Super SCADA system is to create a easy and cheap technology which will work effectively in serving to

industries predict machine conditions and improve productivity.

3. SMART ALARM MANAGEMENTS

Workforce potency has never been more paramount in control centers. Alarm management may be a major component in

day-after-day electrical utility operations. The SCADA system automates and controls several functions in transmission

and distribution functions. Inadequate alarms issued by SCADA, issued by SCADA or each will cause electrical grid

injury, and high injuries and safety risks.

3.1. Why is Alarm management system required:

1. Motion response to special and strange events;

2. Filter the nuisance alarms and take automatic Action;

3. Reduction of errors and waste;

4. the smallest amount time spent troubleshooting grid problems;

5. Generating reports automatically; and

6. enable operators, dispatchers, or both, to specialise in significant alarms.

3.2) Some dangerous options to think about in a system upgrade include:

 Area of responsibility (AOR). Alarms for devices solely within the operator's responsibility, as appointed by

the supervisor, are shown on the system alarm and station alarm outline. The installation of AORs is effective for

proscribing supervisory control, data entry, tag placement, and alarm routing. The AOR assignment will be

restricted by the console and also the user to stop the assignment of AOR by anyone outside the room.

 By-point alarms stop. Operators can intercept individual points for alarm declaration. Events are still generated

and appear within the event outline with an alarm-inherit flag to differentiate them from different events.

6
 Triggered programs. The system will be designed in order that specific alarms or events are triggered

automatically or to activate actions programmed in response.

 Disturbance Mode (Storm Mode). alarming can be designed to control in disturbance mode, wherever low

priority alarms don't seem to be processed. Alarm Disturbance Mode suspends processing of low-priority alarms

during times of peak alarm volume.

 Alarm suppression. Control-Initiative Alarm Suppression and class-conscious Alarm Suppression:

1. Control-Initiative- Alarm Suppression: Operator-initiated commands will cause multiple alarms to seem as

direct results of commands. Control-initiative alarm suppression prevents these alarms from cluttering the alarm

table.

2. Hierarchical alarm suppression: class-conscious alarm suppression can stop an outsized variety of

alarms from cluttering the operator's display once triggered because of an outsized device going into

an alarm.

4. CYBER SECURITY

The increasing use of open standards for communication and interconnectivity has given rise to security issues. New

technologies taken for remote SCADA access, as well as wide area networks (WANs), wireless application protocols

(WAPs), and a myriad of wireless ethernet connectivity options have opened the door for hacking and different malicious

activity. SCADA technology will lure hackers, cyber criminals and cyber terrorists; Similar SCADA system practicality

accustomed control and manage data networks will be accustomed attack, confuse, mislead a company, and stop

necessary actions - and electrical grids, water will wreak havoc on pumping plants or oil pipelines. In response, the

normal divide between SCADA administration and information technology (IT) has subsided and can continue to do so.

4.1. Recent trends in Cyber security

A utility that wishes to put in a strong, secure, reliable SCADA solution which will meet current and future wants ought to

target a system:

4.1.1. Access control and event logging is: SCADA systems that enable remote connectivity should support

security paradigms of the IT industry, like secure socket layer (SSL), demilitarized zoning (DMZ), virtual private network

(VPN), and firewalls. A system supported Windows or another platform with access control capabilities prevents

accidental or malicious actions from poignant the system. solely licensed workers will use the services. Changes to any or

all file access, permission usage, and security policies are logged and may be tracked for auditing. Host-based firewalls on
7
each machine cut back the danger surface. A system should shut operator accounts to stop access to any user beyond the

room program likewise because the installation of unauthorized software. Virtual private network (VPN) connections

enable users to use system networks from unprotected public and company infrastructure for management, maintenance,

and operation.

4.1.2. The Electronic Security Perimeter (ESP) is: Promotion of network models in an established esp

environment permits secure updates while not jeopardizing the operational potency of the system. the method involves

totally distinctive access points, watching the data transferred, and getting approval from the licensed entity within the

operational surroundings. This approach eliminates the chance of automatic updates in relation to installed ESPs.

4.1.3. Security auditing is: each system should be audited before deployment to make sure that each user within the

database and network model is logged in, with timestamps and console annotations.

4.1.4. Designed with future necessities in mind: solutions ought to replicate measurability and dedication to

extensibility.

4.1.5. There is no back door: the system should promptly settle for any major authentication technology, like

biometry, persistent smartcards and access tokens, and should enable central access control at the user or machine policy

level in order that an administrator will access the out their tools. Could use.

4.1.6. Safety is life cycle management: the foremost acceptable response to a security risk isn't a policy of

elimination, however mitigation. No SCADA system will ever be fully secure, and to eliminate all risks, no matter

however small, will have to negate all rising technological developments within the industry and eventually eliminate the

SCADA system altogether. A support program that quickly reviews, tests, and approves security updates can maximize

system security and minimize the danger of upgrade-induced problems. the answer should be configurable for industry-

leading anti-virus software packages.

4.1.7. COST-EFFICENT: There are 2 types of value for security. First, there are direct prices of implementation

and maintenance. As such, the cost-benefit quantitative relation has to be rigorously thought of. Second, it's the value of

reduced practicality of the SCADA system that's a matter of safety. Removing convenient access to the SCADA system

will typically be so prejudices to the general potency of operation that it's not acceptable to implement excessive security

measures for the good thing about little security risk.

8
An example of misdirection might be a power plant in India that has enforced an IT policy bypassing remote access to the

system to eliminate potential hacking. As a result, debugging problems found at intervals the system need a

troubleshooting team to jaunt the location, presumably leading to days or weeks of service interruption. If the system had

been designed so the operator may enable remote access once necessary and otherwise close up such access, the matter

may well be detected within hours and remotely from an offsite location. during this case, a extremely strict IT policy

enforced without correct due diligence has eliminated comparatively very little risk at an excessive value to the

organization.

5. REMOTE TERMINAL UNITS

A remote terminal unit (RTU) is a microprocessor-controlled device that interfaces objects within the physical world to a

distributed system or SCADA (supervisory control and data acquisition) system, by transferring telemetry data to a

master system, and from messages. Master supervisory system to regulate connected objects victimization messages.

different terms which will be used for RTUs are remote telemetry unit and remote tele control unit. The RTU field

monitors digital and analog parameters and transmits the data to the central monitoring station. It includes setup software

to connect data input streams to data output streams, outline communication protocols, and troubleshoot installation

problems.

The RTU might include a complex circuit board that embraces the varied sections needed to perform a custom fit perform

or could include multiple circuit cards, as well as CPUs or processing, in conjunction with communication circuits, and

one or more of the following: analog inputs, Digital input, digital output, or analog output card. RTU can even be a small

process control unit with a small data base for PID, alarming, filtering, trending functions and is supplemented with some

basic (programming language) functions. because it is employed in pipelines, grid guarding systems or for instance

biosphere II project. In such environments the key will operate from -50 to 70 ° C as an example in harsh conditions,

switch its IO system only when required. for instance, it communicates via RS485 or wireless communication links in a

multi-drop configuration. during this kind of configuration its remote unit collects information and performs

straightforward control functions. It doesn't have moving components and uses little electricity and is commonly powered

by solar power.

5.1. Advance terminal units (Net Guardian 832A G5) could embrace the subsequent features:

5.1.1. All comprehensive detector platform


9
We collect all distinct and analog data in an onsite RTU. The net guardian for temperatures higher than eight 32A G5 in

turbine has 8 inputs for analog detector information, as 48 separate Alarm Inputs for distinct Sensors. Sensors connected

to RTUs input their on / off data or actual measured values (analog). information is processed. Moved via RTU and local

area network. RTUs like web Guardian 832A G5 will send email 24/7. And beeper data to the technique, supported data

provided from sensors.

5.1.2. By-product Alarm and control

Derived alarms are software-based alarms, whenever there's a user-defined combination. Events happen. industrial power

outage in an enclosure will be a minor alarm. Less The battery in an enclosure could also be a minor alarm. However a

mix of power outage and a Low batteries ought to be reported as a vital alarm, and derived controls enable us to do simply

that derivative controls take this idea a step more. they're machine-driven responses alarm Combination. Here we've

concurrent power outage and low battery setup automatically tied an impact relay to a backup generator. Such advanced

automation fixes network threats at intervals seconds whereas protective mission-critical devices.

5.1.3. Rigid, industrial grade units

Site climate is a vital issue for the SCADA system. If there's a danger of remote site after this, the humidity within the

snow reaches the peak. allows rugged engineering advanced measures to perform in harsh conditions. RTU required for

SCADA system can be created to resist very high and low temperatures, likewise as humidity and different relevant

factors in your area. net Guardian 216 has industrial temperatures ratings. This extremely sturdy RTU withstands very hot

and cold conditions, because of this rugged engineering and brutal product testing. the net Guardian operates at a

temperature of 216 between thirty two and a hundred and forty degrees Fahrenheit.

5.1.4. Non-Proprietary detector - (5V)

Using a non-proprietary detector selects a large variety of vendors. a sophisticated this will offer freedom by accepting

normal 5V input from the RTU analog detector. This compatibility problems can stop us from being "closed" in a very

single merchant.

5.1.5. Analog value Scaling

In the event of a detector setting an alarm, we are able to apprehend the severity of the situation immediately. Use detector

standardisation with analog price scaling on modern RTUs for programs translation from meaningless voltage output to

helpful detector readings. for instance, an alarm moves to a far off site, and the detector is reading four.2v. Advanced

RTU will be hidden voltage and performance "110 ° F". currently anyone can acknowledge right away to risk.
10
5.2. SICAM A8000 Series

The SICAM A8000 series may be a standard device vary for telecontrol and automation applications altogether areas of

energy provide. This device range was developed to meet the requirements of a broad field of applications. the foremost

vital options are: automatically stable modules and appropriate for thick close conditions for extended temperature vary

from -40 to +70 ° C. High voltage strength up to 5kV (IEC 60255) for direct use in substations. The BDEW report meets

tomorrow's cyber security necessities with conformity, integrated crypto chip and IPSec cryptography. Unified

Communications Interface incl. GPRS "on board". Automation work (IEC 61131-3), e.g. to regulate or load control a

regulated distribution electrical device. house saving style with a module breadth of thirty metric linear unit (without

performance for CP) ascendable by combining individual I / O modules. Long product life cycle and high investment

safety victimization standards as IEC 61850.

Figure 3: A SICAM A8000 Series Unit [4]

6. RECENT CASE STUDIES

U.K. Eastham refinery limited, based in Chennai, enforced its terminal automation system to extend system reliability and

accessibility for hydrocarbon loading operations at the refinery's Ishan terminal. The previous system resulted in multiple

operator interventions daily. Today, the responsibleness of recent developments within the SCADA system has much zero

interference, resulting in a major reduction in period and maintenance prices. The accuracy and performance of the system

have additionally helped to maximize tanker load volume and minimize the potential for safety incidents. As a result, the

loading delays that were common are not any longer a burden and also the level of client service has improved

considerably.

11
Krishsugar enforced a boiler control pre-engineered DCS solution to drive a sixteen MW turbine, wherever the fuel was

biomass with varied BTU values. The Indian company anticipated the enlargement of its plant, and so required additional

control and automation capabilities at the cogeneration plant operative on Bags from the sugar mill. The goal was to cut

back each startup time and production period to boost overall energy potency, however all this without compromising

sugar quality. SCADA Systems engineers to monitor, measure and analyze varied operations within the plant in real time

together with steam, electricity and water consumption, production potency, syrup production, steam generation, fuel

volume and water quality and quantity and provided capability to operators. Krrishsugar was truly able to succeed its

goals of fast startup, cut back period and improve energy potency, likewise as a tenth reduction in water treatment

chemicals.

YESCO implemented the SCADA solution for improved access to data that was usually not out there to boost

performance. Safety and accident issues are prime problems for gas and different organizations. the industrial internet of

Things (IIoT) combined with modern supervisory control and data acquisition (SCADA) systems provides the flexibility

to realize larger access and insights from a wider array of assets and tools for higher data-driven call support. This

industrial IoT application permits oil and gas corporations to be additional proactive with maintenance and safety

management programs to drive operational excellence

DEPCOM designs, builds and operates power-utility-scale solar energy plants. With all the expansion, the company wants

a supervisory control and data acquisition (SCADA) system which will scale quickly and simply for years to come.

SCADA, an industrial application platform for building versatile solutions within the human-machine interface (HMI) and

also the Industrial internet of Things (IIoT). modern SCADA systems enable unlimited licensing DEPCOM to feature

tags, clients and comes at no further price. DEPCOM uses ignition for observation and controlling solar energy plants and

for data analysis, troubleshooting, design and reporting. By analyzing historical information from the SCADA system,

DEPCOM continuously improves plant performance and potency.

After winning a privatization contract for the US Army to manage electricity, gas, steam and potable water distribution

and waste assortment systems, ease-of-use was additionally a serious goal for Dion Utilities. the corporate visaged itself

with aging infrastructure in 3 forts. To upgrade boiler control systems, as well as to standardize control among far-flung

military bases, Doyon opted to use an ascendable pre-engineered control solution that might be simply enforced as a result

of existing the plants were recalled. victimization pre-engineered control software, Doyon had a turnkey that provided

precise control and data management that might expect to remain in effect through the 50-year life of the contract.

12
7. CONCLUSION

There hasn’t been any real advancement in SCADA technology for 20 years”

Costs for basic SCADA components are expected to continue to decline in the future. This trend will support SCADA use

in organizations with assets of lower individual value, leading to larger, more dispersed SCADA systems. Simultaneously,

larger organizations will take advantage of the growing number of value-priced, wide-area communications options to

interconnect geographically dispersed SCADA and business systems. SCADA software developers must understand how

to leverage new technological advances in communications without excluding legacy systems. Low-level SCADA

integration will be simplified. The size and complexity of SCADA will increase at an accelerating rate, requiring the

creation of tools and integration methods that provide fast, error-free replication for common SCADA tasks. Successful

cooperation between vendors will be essential in providing the maximum benefit to the customer

8. REFERENCES

[1] Mr. VijayaRamaraju Poosapati MCA, (Ph.D), Prof. Vedavathi Katneni MCA, M.Phil, Ph.D, Mr. Vijay Killu Manda,

MCA, MBA, " Super SCADA Systems: A Prototype for Next Gen SCADA System ", IAETSD JOURNAL FOR

ADVANCED RESEARCH IN APPLIED SCIENCES, VOLUME 5, ISSUE 3, MAR/2018, 1-9.

[2] Blair P. Sooley , " The Future of SCADA "', FLORIDA WATER RESOURCES JOURNAL, MAY 2011. 1-4.

[3] Rajeev Kumar, M.L.Dewal, Kalpana Saini, “Utility of SCADA in Power Generation and Distribution System ”,

IEEE, July 2010, 1-6.

[4] Rajeev Kumar, "Recent Advances in SCADA alarm system", International Journal of Smart Homes, vol. 4, No. 4, Oct

2010, pp. 1-9.

[5] T. Paukatong, H. Paul, B. Igel, K. Ramanathan, “Technological Dependency in the Electricity Industry: An

Assessment Framework,” presented at IAMOT 2003, ENSGSI, Nancy, 54063, France, 2003.

[6] T. Paukatong, “Technological Problems Found during Implementation of the Self-reliance Technology: Case of

EGAT-SCADA,” presented at CEPSI 2004, Shanghai, China, 2004.

[7] Colin Bayliss, "Transmission and Distribution Electrical Engineering", Second edition 1999, ISBN 0 7506 4056

13

You might also like