Cyber Security of the Smart Grid

Size: px
Start display at page:

Download "Cyber Security of the Smart Grid"

Transcription

1 Cyber Security of the Smart Grid Design Document May /4/11 Group Members John Majzner Daniel Kosac Kyle Slinger Jeremy Deberg Team Advisor Manimaran Govindarasu Graduate Students Adam Hahnad Siddharth Sridhar Aditya Ashok

2 Project Overview Problem Statement: As the world becomes more interconnected and communication is more necessary, a dire problem arises when a third party tries to disrupt this communication. There is a great deal of communication taken place between power companies and the power grid. Power companies use a SCADA system (Supervisory Control And Data Acquisition) to monitor and manage their infrastructure program. This SCADA system has become more prone to attacks in the last decade due to the advancement of technology. The project we were given consists of building a realistic SCADA system, emulating real world attacks on the system, and observing the results due to these attacks. Past Accomplishments: This project has been in progress for many previous semesters with different groups taking steps towards reaching the main goal. These groups that have come before have gotten the system up to a 9 bus system. This however, only includes 2 actual RTUs, and have the other 7 emulated through a virtual machine. There have been multiple security exercises run on the system that stress the basic functionality of the embedded security. By this it implies that the security located on the VPN and built in security to the different PC s is up to par. It also implies that the networking and routes are all setup correctly. Objectives: The first objective that we face is familiarizing ourselves with the system. This was a lot more complicated than anticipated. The conceptual outline of the system is very straightforward; however you must also take into account the embedded software, and the software that is used with the Siemens devices. The group needs to learn each piece of this software and how it communicates with each other. This also needs to be taken to a deeper level if the option of exploiting a software bug is to be used. The amount of options each piece of software has is more than what the project calls for, but in view of keeping the outcome as realistic as possible, the experiment must utilize the software that will be used in the field even if most of the options will never be used. The second objective will be to scale up the SCADA system. The projected size the experiment is to reach is a 30 bus system. However, already in the project this may be a stretch due to the equipment that is available to the group. The group would need to virtualize most of the buses that would be added and the computer hardware isn t there. A more precise objective would be to scale the system at a realistic ratio of buses and implement them successfully before trying to add anymore. The third objective will be to assault the SCADA system with different security exploits. This is an objective that will be extremely vague until the end of the experiment. As the attacks progress the group will adjust the different parameters to account for things they think are a weak spot in the SCADA system. However, different ideas of things to try are already in

3 progress. One such idea is to exploit the common electric company s worker s password. It has been documented that the pattern of passwords used by this class of worker are usually very insecure. Another approach that is being considered is the deep analysis of the packets that are used in the communication between the different system pieces. The group will look to see if there are patterns that exist when different activities are triggered, such as turning off a breaker. This packet will then be emulated and passed back at the system to try to exploit security weaknesses.

4 System Overview Overall: The system is a simulation of data being transmitted over hundreds of miles and seeing how power flow of a power grid will be affected as disruptions occur. Simulation of data and distance is ISEAGE. The power flow is monitored and simulated by the Power Factory and the substations. The Control Center is to make the system more realistic to an actual power system. The Attack box is how we will disrupt the system. ISEAGE: The Internet-Scale Event and Attack Generation Environment or ISEAGE is a network simulation for the real world. This system can emulate large scale events and attacks. ISEAGE is what hooks all of our systems together to simulate them being apart by miles while allowing each terminal to sit next to each other. Control Center: The Control Center uses the software from Siemens. This software is used in actual power grid control centers to monitor the status of the lines. From this terminal we can see if breakers are open or closed and be able to trip them. Power Factory: Power factory is the program that is used for creating the power grid simulation and collecting data. The power factory has the program that collects all the data received from OPC server and can be able to see if the system will not be stable. The dynamic power anayisis from Power Factory will also show how each generator and each load will receive power if something in the system changes. OPC: The OPC is the program that connects the Power Factory to the substations on the network. The OPC run in ISEAGE to allow communication of data from Power Factory to the substation. Then from the substation it can send and receive information from the control center. Relay Substations: The Relays are connected to a substation to allow the simulation to use real physical data to make the system more realistic. These Relays cost more money then the virtuals and take up more space, this is why we only have 2. The final goal is for every substation to have a relay to create a highly realistic system.

5 The Relay s Virtual Substations We can create substations without relays by making them virtual. These virtual substations run on a virtual machine making them very low cost and not take up much space. The conversion from virtual to relay should be a simple setup process and not require digital coding to work. We use the virtual stations so when we get the relays the setup will be fast and have the system fully operational to test. Attack Box: The mu attack box is a system that can generate common types of digital attacks. DDoS attacks and corrupted information is our primary focus. Activating this device while it is hooked up to a power grid will crash the system. Our ultimate goal is to have the box trying to crash the system and the grid working as if nothing was wrong.

6 System Concept

7 Design One of the primary goals of this project is to increase the complexity of the current power system simulation. The current system contains 9 buses, along with 3 generators, 3 simulated loads, 2 real substations, and 2 real loads. Our goal is to increase the number of buses to 30, along with many new generators and loads. The simulation software used is called Power Factory, and this software ties into the control center and the virtual machines using a server called OPC. Building a New Bus: There are several things that must be done in order to create a new bus. First, the bus along with any generators, loads, transformers, and transmission lines must be created in Power Factory. This allows all aspects of the system to be simulated in a wide variety of conditions. After the bus is created in Power Factory, a virtual machine must be created to facilitate the communication with the control center. The virtual machine is used to simulate the real-world communication environment with many nodes, data delay, and possible security holes. After the virtual machine is created, all of the breakers need to be mapped in the control center. This allows the breakers to be controlled remotely. Finally, the OPC server must be setup to allow communication between Power Factory, the virtual machines, and the control center. Steps to Adding a Bus Power Factory: Power Factory is a software environment that allows all forms of power system to be built, tested, and simulated. Many types of faults can be tested, and contingency analysis can be carried out to ensure a stable and healthy system. Power factory is also designed to be able to communicate with several other programs for a simulation closer to that of reality. Bus: A bus in the simulation in Power Factory corresponds to a real world substation. There are several breakers connected to each bus, and each breaker is connected to either a generator, load, transformer, or transmission line. The data associated with a bus includes voltage, current, and power flow. A bus is created by selecting either a single bar bus or a double bar bus. Most times, a single bar bus is used for the distribution system and double bar buses are used for a transmission system. The current simulation consists of a distribution system, so single bar buses will be created. After a bus is added, the desired machines, loads, transmission lines, and transformers must be connected. Generator: Generators are an essential component of any power system. A generator can be any

8 number of machines, solar systems, or storage systems such as batteries. In our system only synchronous machines are used as generators, so these will be added to some of the additional buses. After a generator is added a plant model must be created which contains all kinds of information about how the machine operates under a variety of conditions. This model contains a file with all of this information and must be updated with each additional generator. Lines: Transmission lines are used to transport power from the generator locations to the load locations. Each bus is connected to other bus(es) through transmission lines. These lines must be included in the model because they contain resistance, inductance, and capacitance. These values vary depending on which type of cable is used, and the physical distance between buses. Transmission lines of varying lengths will be used in our model because in a real world system, substations are spaced out at different distances. Load: Loads correspond to anything connected to a bus which consumes electrical energy. In the current system there are 2 real loads and several simulated loads. We will be adding additional simulated loads. These loads contain information about real and reactive power consumed, and many times are connected to a bus through a transmission line. Transformers: Transformers are devices that are used to change the voltage level between two buses. This is necessary because generators produce power at relatively low voltage, but a higher voltage is desired for transmission. Higher voltage transmission results in lower line losses. Any time there is a voltage difference between two buses, a transformer must be used to make the connection. OPC: The server that is used to communicate between the virtual machines, Power Factory, and the control center is called OPC. There are two components that must be added: server entries for the additional breakers and explorer entries for the same information. The OPC explorer contains information about the status of the breakers and the commands that have been sent from the control center. Virtual Machine: Virtual machines are created for each bus, and are an intermediate between the control center and the Power Factory simulated bus. The virtual machines define how the information is exchanged and contain address information for the OPC server. Control Center: The control center is used as an interface between the power system and the humans that are keeping it running correctly. Information about the status of the system is available at the control center, and alarms will go off if any problems are detected in the system. Breakers can also be controlled from the control center for fault clearance and other uses. Information for each new bus must be added to the control center for the system to remain functional.

9

10 Testing System

11 Documenting Results

Design Document. Team Members: Tony Gedwillo James Parrott David Ryan. Faculty Advisor: Dr. Manimaran Govindarasu

Design Document. Team Members: Tony Gedwillo James Parrott David Ryan. Faculty Advisor: Dr. Manimaran Govindarasu 12/6/2010 SDMAY11-11 CYBER SECURITY OF SCADA SYSTEMS TEST BED Design Document Team Members: Tony Gedwillo James Parrott David Ryan Faculty Advisor: Dr. Manimaran Govindarasu Design Document Tony Gedwillo

More information

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: KALBARCZ@ILLINOIS.EDU UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014

More information

Monitoring & Control of Small-scale Renewable Energy Sources

Monitoring & Control of Small-scale Renewable Energy Sources Small Scale Renewable Energy Sources and Energy Saving: 6-17 th July 2009 Monitoring & Control of Small-scale Renewable Energy Sources Dr G A Taylor Brunel Institute of Power Systems Brunel University,

More information

Power products and systems. Intelligent solutions for power distribution Zone concept

Power products and systems. Intelligent solutions for power distribution Zone concept Power products and systems Intelligent solutions for power distribution Zone concept Securing continuous power supply ABB is one of the world's leading power and automation technology companies whose products,

More information

Testing Intelligent Device Communications in a Distributed System

Testing Intelligent Device Communications in a Distributed System Testing Intelligent Device Communications in a Distributed System David Goughnour (Triangle MicroWorks), Joe Stevens (Triangle MicroWorks) dgoughnour@trianglemicroworks.com United States Smart Grid systems

More information

IEEE TRANSACTIONS ON SMART GRID, VOL. 4, NO. 2, JUNE 2013 847

IEEE TRANSACTIONS ON SMART GRID, VOL. 4, NO. 2, JUNE 2013 847 IEEE TRANSACTIONS ON SMART GRID, VOL. 4, NO. 2, JUNE 2013 847 Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid Adam Hahn, Student Member, IEEE, Aditya Ashok, Student

More information

SCADA System Overview

SCADA System Overview Introduction SCADA systems are critical to the control and monitoring of complex cyber-physical systems. Now with advanced computer and communications technologies, SCADA systems are connected to networks

More information

Manage Utility IEDs Remotely while Complying with NERC CIP

Manage Utility IEDs Remotely while Complying with NERC CIP Manage Utility IEDs Remotely while Complying with NERC CIP Disclaimer and Copyright The information regarding the products and solutions in this document are subject to change without notice. All statements,

More information

OPERATIONS CAPITAL. The Operations Capital program for the test years is divided into two categories:

OPERATIONS CAPITAL. The Operations Capital program for the test years is divided into two categories: Filed: September 0, 00 EB-00-0 Tab Schedule Page of OPERATIONS CAPITAL.0 INTRODUCTION Operations Capital funds enhancements and replacements to the facilities required to operate the Hydro One Transmission

More information

Network Security Infrastructure Testing

Network Security Infrastructure Testing Network Security Infrastructure Testing Version 1.2 October 12, 2005 Prepared by: Sandia National Laboratories Center for SCADA Security Project Lead Ray Parks Technical Lead Jason Hills Technical Support

More information

Trusting the Data: Analytics and Visualization. Copyr i ght 2014 O SIs oft, LLC.

Trusting the Data: Analytics and Visualization. Copyr i ght 2014 O SIs oft, LLC. Trusting the Data: Analytics and Visualization Presented by John Juna About us Electric Delivery Company Providing service to approximately 3.8 million customers across Northern Illinois Manages 90,000

More information

Application-oriented testing of line differential protection end to end in the field using the corresponding RelaySimTest template

Application-oriented testing of line differential protection end to end in the field using the corresponding RelaySimTest template Application Note Application-oriented testing of line differential protection end to end in the field using the corresponding RelaySimTest template Author Jens Baumeister jens.baumeister@omicron.at Date

More information

ELECTRICAL ENGINEERING DESIGN CRITERIA APPENDIX F

ELECTRICAL ENGINEERING DESIGN CRITERIA APPENDIX F ELECTRICAL ENGINEERING DESIGN CRITERIA APPENDIX F TABLE OF CONTENTS Appendix F - Electrical Engineering Design Criteria F.1 Introduction...F-1 F.2 Codes and Standards...F-1 F.3 Switchyard and Transformers...F-1

More information

SCADA Systems Automate Electrical Distribution

SCADA Systems Automate Electrical Distribution SCADA Systems Automate Electrical Distribution PC-based supervisory control and data acquisition systems increase uptime, cut costs and improve utilization. A White Paper from InduSoft Fabio Terezinho

More information

ABB North America. Substation Automation Systems Innovative solutions for reliable and optimized power delivery

ABB North America. Substation Automation Systems Innovative solutions for reliable and optimized power delivery ABB North America Substation Automation Systems Innovative solutions for reliable and optimized power delivery Substation Automation Systems Advanced substation automation, protection and control solutions

More information

Federal Wage System Job Grading Standards for Electric Power Controlling, 5407. Table of Contents

Federal Wage System Job Grading Standards for Electric Power Controlling, 5407. Table of Contents Federal Wage System Job Grading Standards for Electric Power Controlling, 5407 Table of Contents WORK COVERED... 2 WORK NOT COVERED...2 TITLES... 2 GRADE LEVELS... 2 SPECIAL ADDITIONAL RESPONSIBILITIES...

More information

How To Protect Power System From Attack From A Power System (Power System) From A Fault Control System (Generator) From An Attack From An External Power System

How To Protect Power System From Attack From A Power System (Power System) From A Fault Control System (Generator) From An Attack From An External Power System Network Security in Power Systems Maja Knezev and Zarko Djekic Introduction Protection control Outline EMS, SCADA, RTU, PLC Attacks using power system Vulnerabilities Solution Conclusion Introduction Generator

More information

Why Can t We Be Friends?

Why Can t We Be Friends? Why Can t We Be Friends? Monitoring the Server Room by Introducing Modbus to SNMP Stanley Liu Product Manager, Data Acquisition & Control Division Overview IA devices are very useful for monitoring server

More information

Redundant Serial-to-Ethernet Data Connections for Mission-critical Devices

Redundant Serial-to-Ethernet Data Connections for Mission-critical Devices Redundant Serial-to-Ethernet Data Connections for Mission-critical Devices Daniel Lai, Moxa Product Manager daniel.lai@moxa.com The popularity of serial-to-ethernet technology has increased steadily since

More information

IEC 61850: Communication Networks and Systems in Substations

IEC 61850: Communication Networks and Systems in Substations IEC 61850: Communication Networks and Systems in Substations Sistemi e strumenti per l'automazione, A. Flammini, AA2011-2012 Background I: Power Grid Sistemi e strumenti per l'automazione A. Flammini,

More information

White Paper. Convergence of Information and Operation Technologies (IT & OT) to Build a Successful Smart Grid

White Paper. Convergence of Information and Operation Technologies (IT & OT) to Build a Successful Smart Grid White Paper Convergence of Information and Operation Technologies (IT & OT) to Build a Successful Smart Grid Contents Executive Summary... 3 Integration of IT and OT... 4 Smarter Grid using Integrated

More information

Architecting and Development of the SecureCyber: A SCADA Security platform Over Energy Smart Grid

Architecting and Development of the SecureCyber: A SCADA Security platform Over Energy Smart Grid Architecting and Development of the SecureCyber: A SCADA Security platform Over Energy Smart Grid Shahir Majed Advance Informatics School, Shahir.majed@mimos.my Suhaimi Ibrahim Advance Informatics School,

More information

Threat Modeling Framework for Electrical Distribution Scada Networks

Threat Modeling Framework for Electrical Distribution Scada Networks Middle-East Journal of Scientific Research 23 (9): 2318-2325, 2015 ISSN 1990-9233 IDOSI Publications, 2015 DOI: 10.5829/idosi.mejsr.2015.23.09.22715 Threat Modeling Framework for Electrical Distribution

More information

Simple and secure monitoring

Simple and secure monitoring Simple and secure monitoring SMA Solar Monitoring Systems SMA Solar Monitoring Systems Monitoring, informing, presenting Easily securing yield for small, large and very large solar power systems Sunday

More information

ADMS(Advanced Distribution Management System ) in Smart Grid

ADMS(Advanced Distribution Management System ) in Smart Grid ADMS(Advanced Distribution Management System ) in Smart Grid 柯 佾 寬 博 士 Yi-Kuan Ke, Ph.D. 2014/03/28 Smart Grid Solution Smart Grid Solution Overview Smart Grid Solutions Smart Network Operation - Distribution

More information

SICAM PAS - the Key to Success Power Automation compliant with IEC 61850 - and your existing system

SICAM PAS - the Key to Success Power Automation compliant with IEC 61850 - and your existing system SICAM PAS - the Key to Success Power Automation compliant with IEC 61850 - and your existing system Power Transmission & Distribution SICAM PAS - Power Automation Up-To-Date Siemens Power Transmission

More information

Design and Implementation of SCADA System Based Power Distribution for Primary Substation ( Monitoring System)

Design and Implementation of SCADA System Based Power Distribution for Primary Substation ( Monitoring System) Design and Implementation of SCADA System Based Power Distribution for Primary Substation ( Monitoring System) Aye Min Zaw 1, Hla Myo Tun 2 Department of Electronic Engineering, Mandalay Technological

More information

Hybrid Simulation von Kommunikationsnetzen für das Smart Grid

Hybrid Simulation von Kommunikationsnetzen für das Smart Grid für das Smart rid Hanno eorg 15.11.2013 Faculty of Electrical Engineering & Information Technology Communication Networks Institute Prof. Dr.-Ing. Christian Wietfeld für das Smart rid Overview Motivation

More information

SCADA Controlled Multi-Step Automatic Controlled Capacitor Banks & Filter Banks

SCADA Controlled Multi-Step Automatic Controlled Capacitor Banks & Filter Banks SCADA Controlled Multi-Step Automatic Controlled Capacitor Banks & Filter Banks Introduction SCADA (Supervisory Controlled and Data Acquisition) controlled multi-step metalenclosed automatic capacitor

More information

ATTACHMENT G. Network Operating Agreement

ATTACHMENT G. Network Operating Agreement ATTACHMENT G Network Operating Agreement 1. PURPOSE OF NETWORK OPERATING AGREEMENT The purpose of this Agreement is to identify contractual requirements related to Network Integration Transmission Service

More information

Vendor System Vulnerability Testing Test Plan

Vendor System Vulnerability Testing Test Plan INEEL/EXT-05-02613 Vendor System Vulnerability Testing Test Plan James R. Davidson January 2005 Idaho National Engineering and Environmental Laboratory Bechtel BWXT Idaho, LLC INEEL/EXT-05-02613 Vendor

More information

Vulnerabilities in SCADA and Critical Infrastructure Systems

Vulnerabilities in SCADA and Critical Infrastructure Systems International Journal of Future Generation Communication and Networking 99 Vulnerabilities in SCADA and Critical Infrastructure Systems Rosslin John Robles 1, Min-kyu Choi 1, Eun-suk Cho 1, Seok-soo Kim

More information

Monitoring Underground Power Networks

Monitoring Underground Power Networks Monitoring Underground Power Networks By Mark Stiles Merve Cankaya ABSTRACT Underground electric distribution systems are common in large cities throughout the United States. Power usage for the entire

More information

Retailman POS Multi-location Setup

Retailman POS Multi-location Setup Retailman POS Multi-location Setup The new version of Retail Man of 1.90 and above has a new way of setting up the multilocation version. There are new components that have to be taken in to account and

More information

A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems

A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems , pp. 49-56 http://dx.doi.org/10.14257/ijsh.2013.7.5.05 A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems Minkyu Choi 1 and Ronnie D. Caytiles 2 1 Security Engineering Research

More information

The PI System revolutionizes one utility s electric transmission & distribution power system data

The PI System revolutionizes one utility s electric transmission & distribution power system data OSIsoft, Inc. PI System Case Study Overview Country or Region: United States Industry: Transmission and Distribution Business Situation Operators, engineers, managers, and executives needed an easy way

More information

Power Generator Switching for Power Engineers Inc. with. Distrix Software Defined Infrastructure. A Distrix Networks Case Study.

Power Generator Switching for Power Engineers Inc. with. Distrix Software Defined Infrastructure. A Distrix Networks Case Study. Power Generator Switching for Power Engineers Inc. with Distrix Software Defined Infrastructure A Distrix Networks Case Study November, 2015 2015 Distrix Networks Ltd. All Right Reserved 1 The project

More information

PSS SINCAL - Overview -

PSS SINCAL - Overview - PSS SINCAL - Overview - PTI Day Buenos Aires, October 19/20, 2010 Dr. Michael Schwan,, Siemens PTI (Germany) www.siemens.com/energy/power-technologies PSS SINCAL Overview Page 3 Network Calculation Software

More information

Reactive Power and Importance to Bulk Power System OAK RIDGE NATIONAL LABORATORY ENGINEERING SCIENCE & TECHNOLOGY DIVISION

Reactive Power and Importance to Bulk Power System OAK RIDGE NATIONAL LABORATORY ENGINEERING SCIENCE & TECHNOLOGY DIVISION Reactive Power and Importance to Bulk Power System OAK RIDGE NATIONAL LABORATORY ENGINEERING SCIENCE & TECHNOLOGY DIVISION Outline What is Reactive Power and where does it come from? Why is it important?

More information

Monitor Simply and Securely

Monitor Simply and Securely Monitor Simply and Securely Solar Monitoring Systems from SMA Solar Monitoring Systems from SMA MONITORING, INFORMING, PRESENTING Securing yield easily for small, large and very large solar power systems

More information

Introduction To SCADA and Telemetry

Introduction To SCADA and Telemetry Introduction To SCADA and Telemetry Joe Mullaney Senior I&C Engineer MSE Technology Applications, Inc. Tetragenics Division joe.mullaney@mse-ta.com Overview Definitions What is SCADA? What is Telemetry?

More information

Network Security Landscape

Network Security Landscape Cole p01.tex V3-07/28/2009 3:46pm Page 1 Network Security Landscape COPYRIGHTED MATERIAL IN THIS PART Chapter 1 State of Network Security Chapter 2 New Approaches to Cyber Security Chapter 3 Interfacing

More information

SCADA. The Heart of an Energy Management System. Presented by: Doug Van Slyke SCADA Specialist

SCADA. The Heart of an Energy Management System. Presented by: Doug Van Slyke SCADA Specialist SCADA The Heart of an Energy Management System Presented by: Doug Van Slyke SCADA Specialist What is SCADA/EMS? SCADA: Supervisory Control and Data Acquisition Retrieves data and alarms from remote sites

More information

NERC s goal with publishing lessons learned is to provide industry with technical and understandable information that assists them with maintaining

NERC s goal with publishing lessons learned is to provide industry with technical and understandable information that assists them with maintaining NERC s goal with publishing lessons learned is to provide industry with technical and understandable information that assists them with maintaining the reliability of the bulk power system Bulk Power

More information

A MODERN DISTRIBUTION MANAGEMENT SYSTEM FOR REGIONAL ELECTRICITY COMPANIES

A MODERN DISTRIBUTION MANAGEMENT SYSTEM FOR REGIONAL ELECTRICITY COMPANIES A MODERN DISTRIBUTION MANAGEMENT SYSTEM FOR REGIONAL ELECTRICITY COMPANIES A Roberts, T Berry, W D Wilson Schneider Electric Ltd, UK SYNOPSIS This paper describes the features of a modern Distribution

More information

Web SCADA Employing Application Program Interface as Data Source

Web SCADA Employing Application Program Interface as Data Source 보안공학연구논문지 (Journal of Security Engineering), 제 7권 제 6호 2010년 12월 Web SCADA Employing Application Program Interface as Data Source Hoon Ko 1) Abstract An Application programming interface or API is a set

More information

Dong-Joo Kang* Dong-Kyun Kang** Balho H. Kim***

Dong-Joo Kang* Dong-Kyun Kang** Balho H. Kim*** Visualization Issues of Mass Data for Efficient HMI Design on Control System in Electric Power Industry Visualization in Computerized Operation & Simulation Tools Dong-Joo Kang* Dong-Kyun Kang** Balho

More information

NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives

NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives Center of excellence for secure integration, deployment and sustainment of Industrial Control Systems and Operational Technology

More information

Wireless Communications for SCADA Systems Utilizing Mobile Nodes

Wireless Communications for SCADA Systems Utilizing Mobile Nodes , pp. 1-8 http://dx.doi.org/10.14257/ijsh.2013.7.5.01 Wireless Communications for SCADA Systems Utilizing Mobile Nodes Minkyu Choi Security Engineering Research Support Center, Daejon, Republic of Korea

More information

Evolution of Control for the Smart Transmission Grid

Evolution of Control for the Smart Transmission Grid Evolution of Control for the Smart Transmission Grid Anjan Bose Washington State University Pullman, WA SCE Smart Grid Research Symposium California Institute Of Technology October, 2011 The Past (before

More information

Gunnar Björkman, ABB Mannheim. Smart Grids Security SICS Security Seminar in Kista on April 8, 2014

Gunnar Björkman, ABB Mannheim. Smart Grids Security SICS Security Seminar in Kista on April 8, 2014 Gunnar Björkman, ABB Mannheim Smart Grids Security SICS Security Seminar in Kista on April 8, 2014 Smart Grids Security Agenda Traditional Supervision and Control Evolution to Smart Grids Grid4EU A large

More information

Cyber Security of the Power Grid

Cyber Security of the Power Grid Cyber Security of the Power Grid Chen-Ching Ching Liu Professor of Power Systems University College Dublin Research for Ireland s Future Ireland -Country of natural beauty -Quality of life ranked among

More information

David Payne, P.E. Associate Director February 18, 2014

David Payne, P.E. Associate Director February 18, 2014 David Payne, P.E. Associate Director February 18, 2014 Overview of Texas A&M University State's first public institution of higher education, was opened on Oct. 4, 1876 as the Agricultural and Mechanical

More information

Understanding SCADA System Security Vulnerabilities

Understanding SCADA System Security Vulnerabilities Understanding SCADA System Security Vulnerabilities Talking Points Executive Summary Common Misconceptions about SCADA System Security Common Vulnerabilities Affecting SCADA Networks Tactics to Strengthen

More information

Using battery test equipment with asset management software. Megger is a registered trademark

Using battery test equipment with asset management software. Megger is a registered trademark WWW.MEGGER.COM Using battery test equipment with asset management software Megger is a registered trademark Subject Author Andrew Sagl Product Marketing Engineer Date April 2010 Keywords Abstract BITE,

More information

http://d-nb.info/1041302002

http://d-nb.info/1041302002 Contents 1 Introduction 1 1.1 Requirements for Evaluation Techniques 1 1.2 Performance Evaluation Techniques 2 1.2.1 Network Testbeds / Real-World Measurements 2 1.2.2 Network Simulators 3 1.2.3 Analytic

More information

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped

More information

Network Enabled Battery Health Monitoring System

Network Enabled Battery Health Monitoring System Network Enabled Battery Health Monitoring System Research Team: Fan Yang Zhengyang Liu Supervisor: Advisor: Hanlei Zhang (PhD Student) Wencong Su (PhD Student) Dr. Mo-Yuen Chow Presentation Outline Project

More information

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323

More information

APPLICATION CASE OF THE END-TO-END RELAY TESTING USING GPS-SYNCHRONIZED SECONDARY INJECTION IN COMMUNICATION BASED PROTECTION SCHEMES

APPLICATION CASE OF THE END-TO-END RELAY TESTING USING GPS-SYNCHRONIZED SECONDARY INJECTION IN COMMUNICATION BASED PROTECTION SCHEMES APPLICATION CASE OF THE END-TO-END RELAY TESTING USING GPS-SYNCHRONIZED SECONDARY INJECTION IN COMMUNICATION BASED PROTECTION SCHEMES J. Ariza G. Ibarra Megger, USA CFE, Mexico Abstract This paper reviews

More information

OPC Redundancy Power of Prevention

OPC Redundancy Power of Prevention OPC Power of Prevention MatrikonOPC-2006 Executive Summary There are thousands of highly interconnected and dynamic systems, both public and private, that make up North America s electric power grid. These

More information

High rate and Switched WiFi. WiFi 802.11 QoS, Security 2G. WiFi 802.11a/b/g. PAN LAN Cellular MAN

High rate and Switched WiFi. WiFi 802.11 QoS, Security 2G. WiFi 802.11a/b/g. PAN LAN Cellular MAN Security Issues and Quality of Service in Real Time Wireless PLC/SCADA Process Control Systems Dr. Halit Eren & Dincer Hatipoglu Curtin University of Technology (Perth Australia) 2/27/2008 1 PRESENTATION

More information

Electricity for Free? The Dirty Underbelly of SCADA and Smart Meters

Electricity for Free? The Dirty Underbelly of SCADA and Smart Meters sorry Electricity for Free? The Dirty Underbelly of SCADA and Smart Meters Jonathan Pollet, CISSP, CAP, PCIP July 2010 Table of Contents Introduction...3 Power Generation, Transmission, and Distribution...4

More information

New Supervisory Control and Data Acquisition (SCADA) Based Fault Isolation System for Low Voltage Distribution Systems

New Supervisory Control and Data Acquisition (SCADA) Based Fault Isolation System for Low Voltage Distribution Systems International Conference on Computer and Communication Engineering (ICCCE 2010), 11-13 May 2010, Kuala Lumpur, Malaysia New Supervisory Control and Data Acquisition (SCADA) Based Fault Isolation System

More information

IESO Supply Deliverability Guidelines

IESO Supply Deliverability Guidelines PUBLIC IMO_GDL_0021 IESO Supply Deliverability Guidelines Issue 3.0 This document is to be used to evaluate long-term system adequacy and connection assessments Public Disclaimer The posting of documents

More information

28 Networks and Communication Protocols

28 Networks and Communication Protocols 113 28 Networks and ommunication Protocols Trend in computer systems: personal computing. Reasons why: ost: economies of scale. lso, avoids large initial investment in timesharing system. Performance:

More information

8/27/2015. Brad Schuette IT Manager City of Punta Gorda bschuette@pgorda.us (941) 575-3354. Don t Wait Another Day

8/27/2015. Brad Schuette IT Manager City of Punta Gorda bschuette@pgorda.us (941) 575-3354. Don t Wait Another Day Brad Schuette IT Manager City of Punta Gorda bschuette@pgorda.us (941) 575-3354 2015 FRWA Annual Conference Don t Wait Another Day 1 SCADA Subsystems Management Physical Connectivity Configuration Mgmt.

More information

SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios

SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios Lucie Langer and Paul Smith firstname.lastname@ait.ac.at AIT Austrian Institute of Technology ComForEn Workshop Monday 29 th September,

More information

SMART ENERGY. The only cloud that speeds up your. cloud services. broadband for smart grids. Last Mile Keeper

SMART ENERGY. The only cloud that speeds up your. cloud services. broadband for smart grids. Last Mile Keeper SMART ENERGY cloud services broadband for smart grids Last Mile Keeper The only cloud that speeds up your Energy Management System Introduction Smart Grids are the result of the merging between power and

More information

Mladen Kezunovic Texas A&M University

Mladen Kezunovic Texas A&M University INTEGRATING DATA AND SHARING INFORMATION FROM VARIOUS IEDs TO IMPROVE MONITORING, CONDITION-BASED DIAGNOSTIC, MAINTENANCE, ASSET MANAGEMENT AND OPERATION TASKS Introduction Mladen Kezunovic Texas A&M University

More information

A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide

A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide p 1/6 White Paper A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide Francis Vander Ghinst Head of Sales & Marketing

More information

OIL PRESS 71.8 PSI FUEL. Cloud based, diagnostic, engine monitoring and reporting system. www.faria-instruments.com www.beede.com

OIL PRESS 71.8 PSI FUEL. Cloud based, diagnostic, engine monitoring and reporting system. www.faria-instruments.com www.beede.com OIL PRESS 71.8 PSI Cloud based, diagnostic, engine monitoring and reporting system www.faria-instruments.com www.beede.com Start Updating Send Data The Faria EntelNet service is a multi part system which

More information

Teleprotection Schemes and Equipment. James W. Ebrecht Young Power Equipment Scottsdale, AZ

Teleprotection Schemes and Equipment. James W. Ebrecht Young Power Equipment Scottsdale, AZ * Teleprotection Schemes and Equipment James W. Ebrecht Young Power Equipment Scottsdale, AZ Teleprotection Schemes And Equipment ~ ~ Relay Relay Teleprotection Communications channel Teleprotection Protection

More information

Dr. György Kálmán gyorgy@mnemonic.no

Dr. György Kálmán gyorgy@mnemonic.no COMMUNICATION AND SECURITY IN CURRENT INDUSTRIAL AUTOMATION Dr. György Kálmán gyorgy@mnemonic.no Agenda Connected systems historical overview Current trends, concepts, pre and post Stuxnet Risks and threats

More information

INTELLIGENT BUILDINGS BUS SYSTEMS, MyHOME. Ján Cigánek, Martin Janáček, Stanislav Števo

INTELLIGENT BUILDINGS BUS SYSTEMS, MyHOME. Ján Cigánek, Martin Janáček, Stanislav Števo INTELLIGENT BUILDINGS BUS SYSTEMS, MyHOME Ján Cigánek, Martin Janáček, Stanislav Števo Slovak University of Technology Ilkovičova 3, 812 19 Bratislava, Slovak Republic Tel.: +421 2 60291111 Fax: +421 2

More information

Application Note AP050001EN June 2013. VPN setup for the XV100

Application Note AP050001EN June 2013. VPN setup for the XV100 Application Note AP050001EN June 2013 VPN setup for the XV100 Application NoteAP050001 Table of Contents 1) Overview... 3 1.1) Background Information... 3 1.2) Short Definition... 3 1.3) Example... 4 2)

More information

AutoLog ControlMan. Remote Monitoring & Controlling Service

AutoLog ControlMan. Remote Monitoring & Controlling Service AutoLog 1 AutoLog ControlMan Remote Monitoring & Controlling Service Web browser based HMI / SCADA interface Server is hosted by Internet server hosting company Control units communicate wirelessly via

More information

APPLICATION NOTE. Increasing PV Hosting Capacity on LV Secondary Circuits with the Gridco System empower TM Solution

APPLICATION NOTE. Increasing PV Hosting Capacity on LV Secondary Circuits with the Gridco System empower TM Solution APPLICATION NOTE Increasing PV Hosting Capacity on LV Secondary Circuits with the Gridco System empower TM Solution INCREASING PV HOSTING WITH EMPOWER TM SOLUTION Executive Summary Distributed solar photovoltaic

More information

Industrial Requirements for a Converged Network

Industrial Requirements for a Converged Network Industrial Requirements for a Converged Network IEEE 802.3 SG DMLT Phoenix (AZ) Albert Tretter, Siemens AG Ethernet captures more and more Applications Traditional Markets - Industrial Automation - Factory

More information

Energy Management System (EMS) 3.0 Implementation Overview for BRP Consultation. July 2015

Energy Management System (EMS) 3.0 Implementation Overview for BRP Consultation. July 2015 Energy Management System (EMS) 3.0 Implementation Overview for BRP Consultation July 2015 Background Energy Management System EMS - Used by System Controllers to monitor, control and optimize the performance

More information

Monitor electricity supply power network system

Monitor electricity supply power network system Page 1 of 5 Monitor electricity supply power network system Level 4 Credits 10 Purpose People credited with this unit standard are able to: continuously monitor power supply trends, communication, and

More information

Internet-Accessible Power Monitoring & Control Systems

Internet-Accessible Power Monitoring & Control Systems Internet-Accessible Power Monitoring & Control Systems By GE Specification Engineers Keith B. Brock, P.E. Robert P. Hansen, PhD, P.E. Introduction Accessing electrical system information from any location

More information

Electric utilities may vary in their application of end-to-end testing

Electric utilities may vary in their application of end-to-end testing An Application Case of End-to-End Relay Testing of Communication-Based Protection Schemes Using GPS-Synchronized Secondary Injection Feature by J. Ariza, Megger USA G. Ibarra, CFE, Mexico Electric utilities

More information

EMTP STUDIES PERFORMED TO INSERT LONG AC CABLES IN THE FRENCH GRID

EMTP STUDIES PERFORMED TO INSERT LONG AC CABLES IN THE FRENCH GRID Tension (kv) Impedance (Ohms) EMTP STUDIES PERFORMED TO INSERT LONG AC CABLES IN THE FRENCH GRID frequency (Hz) Simon DESCHANVRES Yannick VERNAY RTE, CNER, Substations Department t (ms) EMTP-RV Users Group

More information

INTELLIGENT DISTRIBUTION NETWORK ANALYSIS AND INFORMATION ARCHITECTURE DESIGN

INTELLIGENT DISTRIBUTION NETWORK ANALYSIS AND INFORMATION ARCHITECTURE DESIGN INTELLIGENT DISTRIBUTION NETWORK ANALYSIS AND INFORMATION ARCHITECTURE DESIGN Yun CHEN SMEPC,State Grid China daddygirl@126.com ABSTRACT From the background of intelligent distribution network construction,

More information

Using Tofino to control the spread of Stuxnet Malware

Using Tofino to control the spread of Stuxnet Malware technical datasheet Application Note Using Tofino to control the spread of Stuxnet Malware This application note describes how to use the Tofino Industrial Security Solution to prevent the spread of the

More information

Power network telecommunication

Power network telecommunication www.siemens.com Power network telecommunication Teleprotection Answers for infrastructure and cities. Binary I/O The best protection against high-voltage grid failures When it comes to managing power networks,

More information

For the purpose of setting up a home network, all you need to worry about are two major categories of components:

For the purpose of setting up a home network, all you need to worry about are two major categories of components: Access Points, Routers, and Hubs In the first lesson, you learned about the world of wireless standards -- what frequencies are used, distances involved, and other general topics. In this lesson, you learn

More information

Cyber security measures in protection and control IEDs

Cyber security measures in protection and control IEDs Cyber security measures in protection and control IEDs K. Hagman 1, L.Frisk 1, J. Menezes 1 1 ABB AB, Sweden krister.hagman@se.abb.com Abstract: The electric power grids and power systems are critical

More information

NELSON VOLTAGE MONITOR INSTALLATION & PROGRAMMING MANUAL

NELSON VOLTAGE MONITOR INSTALLATION & PROGRAMMING MANUAL NELSON VOLTAGE MONITOR INSTALLATION & PROGRAMMING MANUAL CONTENTS GENERAL INFORMATION...3 INSTALLATION...3 FIELD WIRING...4 PROGRAMMING...4 Circuit Monitor Options...5 Power Frequency...5 Alarm Silence

More information

HyperAccess Access Control System

HyperAccess Access Control System Control System We manufacture, an advanced PC based access control solution that will give you control over who has access to your building. With you can control access on hundreds of doors for up to 10,000

More information

Using the AVR microcontroller based web server

Using the AVR microcontroller based web server 1 of 7 http://tuxgraphics.org/electronics Using the AVR microcontroller based web server Abstract: There are two related articles which describe how to build the AVR web server discussed here: 1. 2. An

More information

Efficient remote access to machines and plants with SIMATIC

Efficient remote access to machines and plants with SIMATIC Efficient remote access to machines and plants with SIMATIC Telecontrol and teleservice solutions modular, flexible and secure SIMATIC NET siemens.com/industrial-remote-access Industrial remote access

More information

The Advantages of an Integrated Factory Acceptance Test in an ICS Environment

The Advantages of an Integrated Factory Acceptance Test in an ICS Environment The Advantages of an Integrated Factory Acceptance Test in an ICS Environment By Jerome Farquharson, Critical Infrastructure and Compliance Practice Manager, and Alexandra Wiesehan, Cyber Security Analyst,

More information

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005 SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems

More information

Innovative Defense Strategies for Securing SCADA & Control Systems

Innovative Defense Strategies for Securing SCADA & Control Systems 1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: info@plantdata.com Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet

More information

Comprehensive Asset Performance Management. Power Transmission and Distribution

Comprehensive Asset Performance Management. Power Transmission and Distribution Comprehensive Asset Performance Management Power Transmission and Distribution Comprehensive Asset Performance Management Siemens Asset Performance Management System (APMS) enables utilities to get the

More information

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A. 21, rue d Artois, F-75008 PARIS D2-102 CIGRE 2012 http : //www.cigre.org CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS Massimo Petrini (*), Emiliano Casale

More information

SOLARCARE SERIES PRODUCT AND APPLICATION GUIDE

SOLARCARE SERIES PRODUCT AND APPLICATION GUIDE SOLARCARE SERIES PRODUCT AND APPLICATION GUIDE for solar energy management LEATEC Delivering Solutions for Energy Management SOLAR ENERGY DATA CENTER BUILDING 4 to8 String Monitoring with 0.% Accuracy

More information

J W Spencer School of Electrical Engineering, Electronics and Computer Science

J W Spencer School of Electrical Engineering, Electronics and Computer Science J W Spencer School of Electrical Engineering, Electronics and Computer Science To consider the electrical energy network and how it might be affected over the next 100 years and beyond to 2500. Coastal

More information