Professional Documents
Culture Documents
(BT17EEE013, B. TECH student, Department of Electrical & Electronics, VNIT, Nagpur, 440010)
(BT17EEE014, B. TECH student, Department of Electrical & Electronics, VNIT, Nagpur, 440010)
Abstract - Supervisory control and data Acquisition (SCADA) systems are primarily industrial control systems, with real
time process and distributed intelligence. They process the data and facilitate to regulate and monitor the operations in a
business. The industries desires are currently ever-changing with the advances in data communication and machine
technologies and with the provision of low value sensors, wi-fi enabled premises, open source software, and hardware to
handle vast volume of data. This seems like science fiction: the utopian world of SCADA. A system-wide control loop
reacts to alarms automatically and tunes itself perpetually, based on high-level operational set points and real-time method
response. Users are free of regular operational duties to target general improvements: developing new power potency
models, calibration the SCADA’s decision-making criteria, and dealing with the planning team on strategic initiatives. the
Table of Contents
INTRODUCTION .................................................................................................................................................... 3
SCADA system function ..................................................................................................................................... 3
Primary elements of SCADA system ................................................................................................................. 3
Uses of SCADA .................................................................................................................................................. 4
SUPER SCADA SYSTEMS ....................................................................................................................................... 4
Background ....................................................................................................................................................... 4
Process Flow of Super SCADA System............................................................................................................... 5
SMART ALARM MANAGEMENTS ........................................................................................................................ 5
Why is Alarm management system required?.................................................................................................. 5
Dangerous options in a system upgrade .......................................................................................................... 6
1
CYBER SECURITY .................................................................................................................................................. 6
Recent trends in Cyber security ........................................................................................................................ 7
Access control and event logging ............................................................................................................ 7
List of Figures
Figure 1 Block diagram of SCADA ............................................................................................................. 2
Figure 2 Super SCADA system applications and outcomes ............................................................................ 3
Figure 3 A SICAM A8000 Series Unit ....................................................................................................... 2
2
1. INTRODUCTION
The SCADA system is a common industrial process automation system, accustomed collect data from devices and sensors
situated at the remote locations and transmit information to a central location to observe and control. On one or additional
SCADA host computers, information are collected from sensors and devices.
1. Data Acquisition
3. information presentation
4. supervisory control
5. Alarm forecast
2. Remote telemetry Unit (RTU). These are small units deployed within the space at some locations. RTUs serve as native
collection points to gather reports from sensors and provides instruction to regulate relays.
3
3. SCADA Central control Units. These are massive pc that function central processors for SCADA systems. CENTRAL
units offer a human interface to the system and automatically control the managed system in response to device input.
4. Communication network that connects the SCADA control unit to the RTUs within the region.
SCADA systems are accustomed automatize complicated industrial processes wherever human control is impractical -
systems wherever there are additional control factors, and additional fast-moving control factors, will manage well than
• power generation, transmission and distribution: Use of electrical utilities to observe current flow and monitor the
operation of line voltages, frequency fluctuations, relays and circuit breakers, and to create sections of the power grid on-
line or offline.
• Water and sewage: State and municipal water utilities use SCADA to observe and regulate water flow, reservoir levels,
• Buildings, facilities and environments: Facility managers use SCADA to regulate HVAC, refrigeration units, lighting
• Manufacturing: The SCADA system manages components inventories and processes and quality monitors to control
• Mass transit: Transit officers use SCADA to control electricity in subways, trams and tramcar buses; To automatize
traffic signals for rail systems; to trace and find trains and buses; And to regulate railway crossing gates.
• Traffic signal: SCADA controls traffic lights, controls traffic flow and detects out-of-order signals.
2.1. Background
With the adoption of (IIoT) and leveraging the most recent technologies, the connected enterprise has currently become a
reality. the massive quantity of data} generated within the industry can offer useful information once it's effectively
processed. The SCADA system helps collect data from field devices like sensors and helps in observation and control,
however they act as a standalone device and exchange information with an ERP or decision support system or data
warehouse. The reciprocity of information between devices may be a major challenge as they use proprietary computer
code with massive license prices. Thus, it's become a bottleneck for small and medium scale corporations to leverage
IIoT. Industries want processed data to conduct their processes properly and once data is generated. Processes are the
4
foremost complicated in an business and have multiple communication interfaces that exchange data between controllers
and a centralized control station. The Super SCADA system helps to beat this challenge by connecting individuals,
processes and things in an intelligent means. The system integrates SCADA with industry ERP and different industrial
information supplys using open source tools. information collected from multiple supplys is analyzed once they are
generated and displayed on a dashboard that runs as an online application with open source. prognosticative analytics and
business intelligence reports are created using open source visualisation tools to create effective decisions. These act as a
bridge between operational technologies (OT) and business data technologies by providing flexibility to perform real-time
or historical data analysis. This integration into Super SCADA helps to boost the performance of 3 core functions of the
industry like production planning, quality analysis and maintenance analysis, resulting in effective utilization of
machinery, workforce and cash by eliminating gaps within the intermediate method. This ultimately results in higher
productivity and benchmarking standards and formulating methods. moreover, all of those processes will be designed to
The aim of the study is to develop an open source system which will integrate information from SCADA systems, ERP
and different sources into super SCADA systems and effectively estimate machine failure times in an industry and send
active alerts. Field devices like sensors or actuators collect data regarding varied elements in a plant and transmit it to the
RTU. RTUs or PLCs collect data and transmit it to the SCADA system. process level data and business information are
5
collected from ERP and stored within the data collection of a super SCADA system. The graphical user interface (GUI)
for the Super SCADA HMI module is intended to regulate SCADA systems, manage events, send alerts (email / SMS),
trigger alarms, and examine production statistics. the information from the Super SCADA system are used for real-time
forecast analysis.
A prediction model based on {the information|the info|the information} of the Super SCADA system will be created and
also the results will be compared with the prognostication data of traditional SCADA systems. Finally, the last word
objective of the Super SCADA system is to create a easy and cheap technology which will work effectively in serving to
Workforce potency has never been more paramount in control centers. Alarm management may be a major component in
day-after-day electrical utility operations. The SCADA system automates and controls several functions in transmission
and distribution functions. Inadequate alarms issued by SCADA, issued by SCADA or each will cause electrical grid
Area of responsibility (AOR). Alarms for devices solely within the operator's responsibility, as appointed by
the supervisor, are shown on the system alarm and station alarm outline. The installation of AORs is effective for
proscribing supervisory control, data entry, tag placement, and alarm routing. The AOR assignment will be
restricted by the console and also the user to stop the assignment of AOR by anyone outside the room.
By-point alarms stop. Operators can intercept individual points for alarm declaration. Events are still generated
and appear within the event outline with an alarm-inherit flag to differentiate them from different events.
6
Triggered programs. The system will be designed in order that specific alarms or events are triggered
Disturbance Mode (Storm Mode). alarming can be designed to control in disturbance mode, wherever low
priority alarms don't seem to be processed. Alarm Disturbance Mode suspends processing of low-priority alarms
1. Control-Initiative- Alarm Suppression: Operator-initiated commands will cause multiple alarms to seem as
direct results of commands. Control-initiative alarm suppression prevents these alarms from cluttering the alarm
table.
2. Hierarchical alarm suppression: class-conscious alarm suppression can stop an outsized variety of
alarms from cluttering the operator's display once triggered because of an outsized device going into
an alarm.
4. CYBER SECURITY
The increasing use of open standards for communication and interconnectivity has given rise to security issues. New
technologies taken for remote SCADA access, as well as wide area networks (WANs), wireless application protocols
(WAPs), and a myriad of wireless ethernet connectivity options have opened the door for hacking and different malicious
activity. SCADA technology will lure hackers, cyber criminals and cyber terrorists; Similar SCADA system practicality
accustomed control and manage data networks will be accustomed attack, confuse, mislead a company, and stop
necessary actions - and electrical grids, water will wreak havoc on pumping plants or oil pipelines. In response, the
normal divide between SCADA administration and information technology (IT) has subsided and can continue to do so.
A utility that wishes to put in a strong, secure, reliable SCADA solution which will meet current and future wants ought to
target a system:
4.1.1. Access control and event logging is: SCADA systems that enable remote connectivity should support
security paradigms of the IT industry, like secure socket layer (SSL), demilitarized zoning (DMZ), virtual private network
(VPN), and firewalls. A system supported Windows or another platform with access control capabilities prevents
accidental or malicious actions from poignant the system. solely licensed workers will use the services. Changes to any or
all file access, permission usage, and security policies are logged and may be tracked for auditing. Host-based firewalls on
7
each machine cut back the danger surface. A system should shut operator accounts to stop access to any user beyond the
room program likewise because the installation of unauthorized software. Virtual private network (VPN) connections
enable users to use system networks from unprotected public and company infrastructure for management, maintenance,
and operation.
4.1.2. The Electronic Security Perimeter (ESP) is: Promotion of network models in an established esp
environment permits secure updates while not jeopardizing the operational potency of the system. the method involves
totally distinctive access points, watching the data transferred, and getting approval from the licensed entity within the
operational surroundings. This approach eliminates the chance of automatic updates in relation to installed ESPs.
4.1.3. Security auditing is: each system should be audited before deployment to make sure that each user within the
database and network model is logged in, with timestamps and console annotations.
4.1.4. Designed with future necessities in mind: solutions ought to replicate measurability and dedication to
extensibility.
4.1.5. There is no back door: the system should promptly settle for any major authentication technology, like
biometry, persistent smartcards and access tokens, and should enable central access control at the user or machine policy
level in order that an administrator will access the out their tools. Could use.
4.1.6. Safety is life cycle management: the foremost acceptable response to a security risk isn't a policy of
elimination, however mitigation. No SCADA system will ever be fully secure, and to eliminate all risks, no matter
however small, will have to negate all rising technological developments within the industry and eventually eliminate the
SCADA system altogether. A support program that quickly reviews, tests, and approves security updates can maximize
system security and minimize the danger of upgrade-induced problems. the answer should be configurable for industry-
4.1.7. COST-EFFICENT: There are 2 types of value for security. First, there are direct prices of implementation
and maintenance. As such, the cost-benefit quantitative relation has to be rigorously thought of. Second, it's the value of
reduced practicality of the SCADA system that's a matter of safety. Removing convenient access to the SCADA system
will typically be so prejudices to the general potency of operation that it's not acceptable to implement excessive security
8
An example of misdirection might be a power plant in India that has enforced an IT policy bypassing remote access to the
system to eliminate potential hacking. As a result, debugging problems found at intervals the system need a
troubleshooting team to jaunt the location, presumably leading to days or weeks of service interruption. If the system had
been designed so the operator may enable remote access once necessary and otherwise close up such access, the matter
may well be detected within hours and remotely from an offsite location. during this case, a extremely strict IT policy
enforced without correct due diligence has eliminated comparatively very little risk at an excessive value to the
organization.
A remote terminal unit (RTU) is a microprocessor-controlled device that interfaces objects within the physical world to a
distributed system or SCADA (supervisory control and data acquisition) system, by transferring telemetry data to a
master system, and from messages. Master supervisory system to regulate connected objects victimization messages.
different terms which will be used for RTUs are remote telemetry unit and remote tele control unit. The RTU field
monitors digital and analog parameters and transmits the data to the central monitoring station. It includes setup software
to connect data input streams to data output streams, outline communication protocols, and troubleshoot installation
problems.
The RTU might include a complex circuit board that embraces the varied sections needed to perform a custom fit perform
or could include multiple circuit cards, as well as CPUs or processing, in conjunction with communication circuits, and
one or more of the following: analog inputs, Digital input, digital output, or analog output card. RTU can even be a small
process control unit with a small data base for PID, alarming, filtering, trending functions and is supplemented with some
basic (programming language) functions. because it is employed in pipelines, grid guarding systems or for instance
biosphere II project. In such environments the key will operate from -50 to 70 ° C as an example in harsh conditions,
switch its IO system only when required. for instance, it communicates via RS485 or wireless communication links in a
multi-drop configuration. during this kind of configuration its remote unit collects information and performs
straightforward control functions. It doesn't have moving components and uses little electricity and is commonly powered
by solar power.
5.1. Advance terminal units (Net Guardian 832A G5) could embrace the subsequent features:
turbine has 8 inputs for analog detector information, as 48 separate Alarm Inputs for distinct Sensors. Sensors connected
to RTUs input their on / off data or actual measured values (analog). information is processed. Moved via RTU and local
area network. RTUs like web Guardian 832A G5 will send email 24/7. And beeper data to the technique, supported data
Derived alarms are software-based alarms, whenever there's a user-defined combination. Events happen. industrial power
outage in an enclosure will be a minor alarm. Less The battery in an enclosure could also be a minor alarm. However a
mix of power outage and a Low batteries ought to be reported as a vital alarm, and derived controls enable us to do simply
that derivative controls take this idea a step more. they're machine-driven responses alarm Combination. Here we've
concurrent power outage and low battery setup automatically tied an impact relay to a backup generator. Such advanced
automation fixes network threats at intervals seconds whereas protective mission-critical devices.
Site climate is a vital issue for the SCADA system. If there's a danger of remote site after this, the humidity within the
snow reaches the peak. allows rugged engineering advanced measures to perform in harsh conditions. RTU required for
SCADA system can be created to resist very high and low temperatures, likewise as humidity and different relevant
factors in your area. net Guardian 216 has industrial temperatures ratings. This extremely sturdy RTU withstands very hot
and cold conditions, because of this rugged engineering and brutal product testing. the net Guardian operates at a
temperature of 216 between thirty two and a hundred and forty degrees Fahrenheit.
Using a non-proprietary detector selects a large variety of vendors. a sophisticated this will offer freedom by accepting
normal 5V input from the RTU analog detector. This compatibility problems can stop us from being "closed" in a very
single merchant.
In the event of a detector setting an alarm, we are able to apprehend the severity of the situation immediately. Use detector
standardisation with analog price scaling on modern RTUs for programs translation from meaningless voltage output to
helpful detector readings. for instance, an alarm moves to a far off site, and the detector is reading four.2v. Advanced
RTU will be hidden voltage and performance "110 ° F". currently anyone can acknowledge right away to risk.
10
5.2. SICAM A8000 Series
The SICAM A8000 series may be a standard device vary for telecontrol and automation applications altogether areas of
energy provide. This device range was developed to meet the requirements of a broad field of applications. the foremost
vital options are: automatically stable modules and appropriate for thick close conditions for extended temperature vary
from -40 to +70 ° C. High voltage strength up to 5kV (IEC 60255) for direct use in substations. The BDEW report meets
tomorrow's cyber security necessities with conformity, integrated crypto chip and IPSec cryptography. Unified
Communications Interface incl. GPRS "on board". Automation work (IEC 61131-3), e.g. to regulate or load control a
regulated distribution electrical device. house saving style with a module breadth of thirty metric linear unit (without
performance for CP) ascendable by combining individual I / O modules. Long product life cycle and high investment
U.K. Eastham refinery limited, based in Chennai, enforced its terminal automation system to extend system reliability and
accessibility for hydrocarbon loading operations at the refinery's Ishan terminal. The previous system resulted in multiple
operator interventions daily. Today, the responsibleness of recent developments within the SCADA system has much zero
interference, resulting in a major reduction in period and maintenance prices. The accuracy and performance of the system
have additionally helped to maximize tanker load volume and minimize the potential for safety incidents. As a result, the
loading delays that were common are not any longer a burden and also the level of client service has improved
considerably.
11
Krishsugar enforced a boiler control pre-engineered DCS solution to drive a sixteen MW turbine, wherever the fuel was
biomass with varied BTU values. The Indian company anticipated the enlargement of its plant, and so required additional
control and automation capabilities at the cogeneration plant operative on Bags from the sugar mill. The goal was to cut
back each startup time and production period to boost overall energy potency, however all this without compromising
sugar quality. SCADA Systems engineers to monitor, measure and analyze varied operations within the plant in real time
together with steam, electricity and water consumption, production potency, syrup production, steam generation, fuel
volume and water quality and quantity and provided capability to operators. Krrishsugar was truly able to succeed its
goals of fast startup, cut back period and improve energy potency, likewise as a tenth reduction in water treatment
chemicals.
YESCO implemented the SCADA solution for improved access to data that was usually not out there to boost
performance. Safety and accident issues are prime problems for gas and different organizations. the industrial internet of
Things (IIoT) combined with modern supervisory control and data acquisition (SCADA) systems provides the flexibility
to realize larger access and insights from a wider array of assets and tools for higher data-driven call support. This
industrial IoT application permits oil and gas corporations to be additional proactive with maintenance and safety
DEPCOM designs, builds and operates power-utility-scale solar energy plants. With all the expansion, the company wants
a supervisory control and data acquisition (SCADA) system which will scale quickly and simply for years to come.
SCADA, an industrial application platform for building versatile solutions within the human-machine interface (HMI) and
also the Industrial internet of Things (IIoT). modern SCADA systems enable unlimited licensing DEPCOM to feature
tags, clients and comes at no further price. DEPCOM uses ignition for observation and controlling solar energy plants and
for data analysis, troubleshooting, design and reporting. By analyzing historical information from the SCADA system,
After winning a privatization contract for the US Army to manage electricity, gas, steam and potable water distribution
and waste assortment systems, ease-of-use was additionally a serious goal for Dion Utilities. the corporate visaged itself
with aging infrastructure in 3 forts. To upgrade boiler control systems, as well as to standardize control among far-flung
military bases, Doyon opted to use an ascendable pre-engineered control solution that might be simply enforced as a result
of existing the plants were recalled. victimization pre-engineered control software, Doyon had a turnkey that provided
precise control and data management that might expect to remain in effect through the 50-year life of the contract.
12
7. CONCLUSION
There hasn’t been any real advancement in SCADA technology for 20 years”
Costs for basic SCADA components are expected to continue to decline in the future. This trend will support SCADA use
in organizations with assets of lower individual value, leading to larger, more dispersed SCADA systems. Simultaneously,
larger organizations will take advantage of the growing number of value-priced, wide-area communications options to
interconnect geographically dispersed SCADA and business systems. SCADA software developers must understand how
to leverage new technological advances in communications without excluding legacy systems. Low-level SCADA
integration will be simplified. The size and complexity of SCADA will increase at an accelerating rate, requiring the
creation of tools and integration methods that provide fast, error-free replication for common SCADA tasks. Successful
cooperation between vendors will be essential in providing the maximum benefit to the customer
8. REFERENCES
[1] Mr. VijayaRamaraju Poosapati MCA, (Ph.D), Prof. Vedavathi Katneni MCA, M.Phil, Ph.D, Mr. Vijay Killu Manda,
MCA, MBA, " Super SCADA Systems: A Prototype for Next Gen SCADA System ", IAETSD JOURNAL FOR
[2] Blair P. Sooley , " The Future of SCADA "', FLORIDA WATER RESOURCES JOURNAL, MAY 2011. 1-4.
[3] Rajeev Kumar, M.L.Dewal, Kalpana Saini, “Utility of SCADA in Power Generation and Distribution System ”,
[4] Rajeev Kumar, "Recent Advances in SCADA alarm system", International Journal of Smart Homes, vol. 4, No. 4, Oct
[5] T. Paukatong, H. Paul, B. Igel, K. Ramanathan, “Technological Dependency in the Electricity Industry: An
Assessment Framework,” presented at IAMOT 2003, ENSGSI, Nancy, 54063, France, 2003.
[6] T. Paukatong, “Technological Problems Found during Implementation of the Self-reliance Technology: Case of
[7] Colin Bayliss, "Transmission and Distribution Electrical Engineering", Second edition 1999, ISBN 0 7506 4056
13