Professional Documents
Culture Documents
SCADA Concept PDF
SCADA Concept PDF
DATA
Control Center
•Critical Operational Data
•Performance Metering Provides network status,
SCADA is used extensively in the •Events and Alarms enables remote control,
electricity sector. Other SCADA Communication optimizes system
applications include gas and oil Methods performance, facilitates
pipelines, water utilities, transportation •Directly wired emergency operations,
networks, and applications requiring •Power line carrier dispatching repair crews and
remote monitoring and control. Similar •Microwave coordination with other
to real-time process controls found in •Radio (spread spectrum) utilities.
buildings and factory automation. •Fiber optic
Control Strategy
• Control Center
– Supervisory control and data acquisition
– Balance generation and demand (dispatching)
– Monitor flows and observe system limits
– Coordinate maintenance activities, emergency response functions
• Localized (Power Plants, Substations)
– Feedback controls (e.g., governors, voltage regulators)
– Protection (e.g., protective relays, circuit breakers)
• Key Priorities:
1. Safety
2. Protect equipment from damage
3. Reliability
4. Economics
Control Areas
Reliability Overview
• Balance generation and demand
• Balance reactive power supply and demand
• Monitor flows and observe thermal limits
• Observe power and voltage stability limits
• Operate for unplanned contingencies
• Plan, design and maintain a reliable system
• Prepare for emergencies
Reliably operate the system you have!
SCADA Functions
• Supervisory Control
• Data Acquisition
• Real Time Database
• Graphical Operator Interface
• Alarm Processing
• Data Historian/Strip Chart Trending
• Mapboard Interface
SCADA Principles of Operation
• Interface with Physical Devices
– Remote terminal unit (RTU)
– Intelligent electronic device (IED)
– Programmable logic controller (PLC)
• Communications
– Directly wired (typical for shorter distances)
– Power line carrier (less common)
– Microwave (very frequently used)
– Radio (VHF, spread spectrum)
– Fiber optic (gaining popularity)
Typical RTU Hardware
Typical IED Hardware
Typical PLC Hardware
Energy Management System
(EMS) Functions
• Control
– Automatic Generation Control (AGC)
– Voltage Control
– Interchange Transaction Scheduling
– Load Shedding & Restoration (including special
stability controls)
• Analysis
– State Estimation/Contingency Analysis
– Economic Dispatch
– Short Term Load Forecasting
Typical Control Room Layout
Typical Operator Interface
Operator Display and Control
Functions
• Display real-time network status on geographic
and schematic maps
• Control of circuit breakers and switches
• Graphical user interface -pan, zoom,
decluttering
• Dynamic coloring to show real-time changes
• On-line data modification for construction and
maintenance
• Optimization functions and decision making
support
One-Line Diagram
Alarm Processor
Frequency Control
Frequency Control
Actual
Frequency Frequency
ß Bias
Scheduled
Frequency
Area Control
Actual Net Error (ACE)
Interchange
Scheduled Net
Interchange
Frequency Regulation
64 60.05
Governor Response
Equipment Damage 60.04
63
60.03
62
Overfrequency Generation Trip 60.02
Time Correction
61
60.01
Frequency
Frequency
Governor Response Normal Frequency
Nominal Frequency Deviation and AGC
60 60.00
Corrective Action
Range
Underfrequency Load Shedding 59.99
59
Underfrequency Generation Trip Time Correction
59.98
58 Contingency Response Normal Conditions
59.97
57
59.96
Equipment Damage Governor Response
56 59.95
Typical SCADA Architecture
Primary
Server
Main Central
Application Processing
Processing LAN
Secondary Inter-site Telemetry … Telemetry
Server Gateway Server 1 Server n
Telemetry
LAN
Independent RTU Comm RTU Comm
Control Server Server
Center A Serial
Leased Links
Lines
Modem Bridge
Modem Bridge Modem
Modem
Independent Modem Bridge Modem
Phone Line
Control
Radio
Center B
Fiber Optic
RTU RTU …… RTU
RTU
RTU RTU
RTU … RTU
RTU
x y z
xx yy zz
Redundant
Paths …
IED PLC IED
SCADA Trends
• Open Protocols
– Open industry standard protocols are replacing
vendor-specific proprietary communication protocols
• Interconnected to Other Systems
– Connections to business and administrative networks
to obtain productivity improvements and mandated
open access information sharing
• Reliance on Public Information Systems
– Increasing use of public telecommunication systems
and the internet for portions of the control system
Key Technology Drivers
• Open architectures and protocols
• Microprocessor-based field equipment
– “smart” sensors and controls
• Convergence of operating systems
• Ubiquitous communications
– cheaper, better, faster
Interconnections with SCADA Networks
Application Application
Presentation Presentation
Session Session
Transport Transport
Electric System Working Group Nuclear Working Group Security Working Group
• Phase I
– Investigate the outage to determine
its causes and why it was not contained
– Interim report released 11/19/03
• Phase II
– Develop recommendations to reduce
the possibility of future outages and
minimize the scope of any that occur
– Final report released 4/5/04
– Report available at:
http://electricity.doe.gov (Blackout link)
Electric System Working Group
U.S – Canada
Steering Group
Task Force
Investigation
Team Lead
Transmission System
MAAC/ECAR/NPCC NERC & Regional
Performance,
Coordinating Group Standards/Procedures Sequence of Events
Protection, Control
& Compliance
Maintenance & Damage
100000
80000
Incidents
60000
40000
20000
0
88
89
90
91
92
93
94
95
96
97
98
99
00
01
02
03
*Q1-Q3
19
19
19
19
19
19
19
19
19
19
19
19
20
20
20
20
• One utility reported over 100,000
scans/month
Vulnerability Concerns
• Confidentiality
– Protecting information from unauthorized access
– Important for deregulation, competitive
intelligence
• Integrity
– Assuring valid data and control actions
– Most critical for real-time control applications
• Availability
– Continuity of operations
– Important for real-time control applications
– Historically addressed with redundancy
Vulnerable Points
SCADA IED
Modem
Remote Access
Remote Control
IED Network
Interface
Local Control
Remote Access
Substation
Controller
LAN 1 Network
Interface
Modem
Router to WAN
Remote Monitoring Remote Access
No Physical Damage
------
No Blackout
Minutes
Modem
SCADA Master
Substation
RTU
Connected to Network TEST
as Node 10 SET
Modem
Intruder
Operator Interface
Field Device
Scenarios •Remote Terminal Unit (RTU)
•Denial of service Protocol Analyzer •Intelligent Electronic Device (IED)
•Operator spoofing (Intruder) •Programmable Logic Controller (PLC)
•Direct manipulation
of field devices
•Combinations of above
Vulnerability implications vary significantly
depending on the scenario and application
SCADA Message Strings
Repeating easily
decipherable format
Captured by the
ASE Protocol Analyzer
Wireless SCADA Access at Substations
• Security firm Rainbow Mykotronx in Torrance, Calif.,
assessed a large southwestern utility that serves about
four million customers.
• Evaluators drove to a remote substation. Without leaving
their vehicle, they noticed a wireless network antenna.
They plugged in their wireless LAN cards, fired up their
notebook computers, and connected to the system within
five minutes because it wasn't using passwords.
• Within 10 minutes, they had mapped every piece of
equipment in the facility. Within 15 minutes, they
mapped every piece of equipment in the operational
control network. Within 20 minutes, they were talking to
the business network and had pulled off several
business reports. They never even left the vehicle.
Countermeasures to enhance
security of SCADA systems
Jeff Dagle, PE
Pacific Northwest National Laboratory
Grainger Lecture Series for the
University of Illinois at Urbana-Champaign
September 15, 2005
Critical Infrastructure Protection
July 1996 - President’s Commission on
Critical Infrastructure Protection (PCCIP)
Developed by the
President’s Critical
Infrastructure Protection
Board and the U.S.
Department of Energy in
2002 as a guideline for
improving the security of the
Nation’s SCADA systems.
Conclusion: System-Level Security Should
Be Built on a Strong Foundation
System-Level Security
•Fault-tolerant architecture
•Defense in depth security strategy
•Inherent redundancy, resiliency