Open Access Open Access  Restricted Access Subscription or Fee Access

Design of an SCADA-Based Water Flow and Risk Control in Monitoring Systems

Abhishek Kumar Singh

Abstract


The definition of SCADA is ‘Supervisory Control and Data Acquisition’. The major function of SCADA is for acquiring data from remote devices such as valves, pumps, transmitters etc. and providing overall control remotely from a SCADA Host software platform. This delivers process control locally so that these devices turn on and off at the right time, support your control strategy and a remote method of capturing data and events (alarms) for monitoring these processes. SCADA Host platforms also provide functions for graphical displays, alarming, trending and historical storage of data. The relationship between the customer and the focus of SCADA systems by different environment such as radio links and satellite communications, fiber optic communications networks LAN, PSTN phone lines and GSM and GPRS. In this paper we introduce a new idea in the field of better control and a more secure connection to the core of each of the bases under review. In the proposed system we allocate specified address between the lines of communication and Data from each section connected to the network (client) codes. At the core in the event of non-compliance with the default code system generate alarms. SCADA systems are used to control and monitor control processes in each of the customers used these models. The advantage of the proposed method is preventing and minimize eavesdropping and sabotage and manipulation of the data to the main server. The increasing awareness of water management problems has resulted in a need for information in ground water flow and distribution. There have been various approaches to design water monitoring networks, some of these designs have not been effective and reliable. Optimization of a monitoring network requires that the system be organized and structured with respect to the number of locations of sampling points. Monitoring and control technologies are indispensable for the safe utilization of water. They allow for the investigation of source water quality, quantity and the detection of threats, thus major the boundary conditions for the subsequent prevention and providing early warning in case of unexpected contaminations or overflow. The SCADA System is widely used nowadays to monitor and control the hardware components in industrial setting. Usually, SCADA Systems are deployed in a monolithic way with a central data center and with a large amount of wiring compulsory to connect different hardware components with the data center, the limitations of this system is that the range is 1200 m only and cost is also very high. Security becomes major issue. Recently, WSAN technology has been used to monitor Critical Infrastructure (CIs).

Full Text:

PDF

References


B. Zhu, A. Joseph, S. Sastry. A taxonomy of cyber attacks on SCADA systems, In: IEEE International Conferences on Internet of Things, and Cyber, Physical and Social Computing.

A. Shahzad, N. Xiong, M. Irfan, M. Lee, S. Hussain, B. Khaltar. A SCADA Intermediate Simulation Platform to Enhance the System Security. July 1–3, 2015 ICACT2015.

R.S. Ramachandruni, P. Poornachandran. Detecting the network attack vectors on SCADA systems, In: International Conference on Advances in Computing, Communications and Informatics (ICACCI). 2015.

G. Hamoud, R.-L. Chen, I. Bradley. Risk assessment of power systems

SCADA, 0-7803-7989-6/03/$17.00 02003 IEEE, 2003.

J. Guan, J.R. Graham, J.L. Rieb. A digraph model for risk identification and mangement in SCADA systems, 978-1-61284-4577-0085-9/11/$26.00 ©2011 IEEE. 2011.

J.E. Dagle, S.E. Widergren, J.M. Johnson. Enhancing the security of supervisory control and data acquisition (SCADA) systems: the lifeblood of modern energy infrastructures, 2002.

A. Al-Dalky, O. Abduljaleel, K. Salah, H. Otrok, M. Al-Qutayri. A modbus traffic generator for evaluating the security of SCADA systems, In: 9th International Symposium on Communication Systems, Networks & Digital Sign (CSNDSP). 2014.

M. Merabti, M. Kennedy, W. Hurst. Critical infrastructure protection: a 21st century challenge, In: Proc Int Conf Commun Inf Technol (ICCIT). March 2011.

A. Davis, H. Chang. Airport protection using wireless sensor networks, In: Proc IEEE Conf Techno Homeland Secur (HST). Nov. 2012.

J. Chen, M. Daz, L. Llopis, B. Rubio, J.M. Troya. A survey on quality of service support in wireless sensor and actor networks: requirements and challenges in the context of critical infrastructure protection, J Netw.




DOI: https://doi.org/10.37628/ijaem.v3i2.675

Refbacks

  • There are currently no refbacks.