Documente Academic
Documente Profesional
Documente Cultură
Overview
Supervisory Control and Data Acquisition (SCADA) solutions provide a base for operation of Distribution Management
Systems (DMS) and Distribution Automation (DA). SCADA provides means for computerized handling of remote
installations, minimizing the number and length of outages, reducing the cost of maintenance and achieving safer control
of substations. System parameters shown on the SCADA screens must present reliable and precise information reflecting
the infrastructure condition. Equivalently to that, commands sent to remote sites by the SCADA operator must be
promptly executed and the back indication information sent to the control center computer should be reliable as well.
Modern SCADA systems allow seamless network communication from any Remote Terminal Units (RTUs) to any
RTU and from any RTU to the SCADA computer via the Front End processor (FEP), IP Gateway, OPC Server, etc.
While implementing a DMS/DA system solution, electric utilities must pay special attention to issues, which are unique
for data communications1). Therefore SCADA system engineers must also have high level of applicable
communication expertise to assure that the telemetry functions will properly operate.
Implementation of SCADA solutions requires use of secure communications in order to avoid fraud related events to
take place. Control systems can be vulnerable to variety of attacks, examples of which have already occurred.
Successful attacks on control systems could have devastating consequences, such as endangering public health and
safety; damaging the environment; or causing a loss of production, generation or distribution of public utilities 10).
Among the commonly cited SCADA security threats are the following 12):
a) Interception of Messages - Illegal “listening “ and recording of data transactions among remote sites and the
control center is a relatively simple/ easy to implement action.
b) Fabrication of Messages - Initiated creating of forged messages intended to execute specific (risky) functions at
remote sites or making the control center to “believe” that some event happened.
c) Replay of Messages – Simply implemented by delayed resending of intercepted “true” messages from the
control center to remote site or vice versa, in order to “confuse” the site receiving the message.
d) Corrupted Message - Resending of intercepted messages after the content of the original message was
intentionally “altered” to other values or presenting a “not true” condition.
Implementing high level of data security across the network achieved by encryption, use of password and authentication
methods (as outlined in this paper), may result in major operating and cost benefits for the utility as they can add more
operating functions to their system without being worried about SCADA related frauds 8).
Data Communication
Electric utility experts have learned over years that SCADA plays an important part in providing means for upgrading
their operating productivity. To achieve these goals one must implement a system, which is based on high quality
communications. Among the popular communication media used in SCADA systems are fiber-optic links, telephone
and leased lines, VHF/UHF conventional radio including the 800 MHz trunked radio, analog and digital wireless
networks, digital infrastructure operating over Internet Protocol (IP) 7), UHF and 900 Mhz Multiple Address Systems
(MAS), microwave, satellite, etc. 3).
When designing wireless communication links between field-installed RTUs and the control center, the system
integrator must a special attention has to be paid to selecting the right data communication protocol, which in a properly
designed system is carefully chosen for the specific media 5).
Networked Communications
In a complex system, one may have to utilize a combination of several media types, accordingly selected for all
segments of the network. As shown in Figure 2 below, some RTUs are configured to serve as a data communication
node for routing commands to and from other RTUs. Using the seven-layer protocol (Figure 1 above), upon receiving a
set of frames the related RTU detects whether those frames were addressed to that site or were intended for another
RTU or the FEP. RTUs, which are acting as Store and Forward (S&F) repeaters or as communication nodes, will
forward the received frames to their final destination (or the next intermediate node). Once the data transaction among
the sites is done and a complete error-free message reaches its designated site, that RTU will send an "end-to-end"
acknowledgement to the source (RTU or FEP, or vice versa) confirming the integrity of the received message.
Note: Most of widely used three-layer protocols, (such as the IEC 60870-5-101 or DNP 3.0) do not have the Network
Layer and therefore RTUs cannot be utilized as a communication node.
Printer Primary
MCC
RTU & Data
Local Ethernet Comm. Node
IP
Main
Line Gateway
ToolBox
Based IP Wireline Comm.
Remote Wireline
ToolBox Comm.
Implementati on
Specific Concern How Severe Difficulty
Record and Ret ransmit L H E D
Change of Co mmand L H E D
Access to RTUs L H E D
Access to MCC L H E D
SS RS-232
(Authenticated
Link)
Authenticated
Radio sub-network Dial
SC
(Authenticated RF Link) (Unauthenticated
RS-485 PSTN Link)
(Authenticated Link)
SC
SC SC/SS
SC SC
@@@@@@@@@