Fig 7 - uploaded by Alaeddin Bobat
Content may be subject to copyright.
SCADA pages on the screen (a) dam and (b) catchment area.  

SCADA pages on the screen (a) dam and (b) catchment area.  

Source publication
Article
Full-text available
The industrial control systems, which include supervisory control and data acquisition (SCADA) systems, distributed control systems, and other smaller control system configurations such as skid-mounted programmable logic controllers are often used in the industrial control sectors. The SCADA systems are generally used to control dispersed assets us...

Context in source publication

Context 1
... optic, and Internet technology. The system incorporates redun- dancy to maximize data availability under a wide range of hydrological and meteorological conditions. Through the use of this system, the dams can be oper- ated more safely and emergency plans can be more effectively coordinated and implemented with the emergency management agencies (Fig. ...

Similar publications

Article
Full-text available
Industrial control system (ICS) is term used to describe various types of control systems and associated instrumentation that include controls used to automate industrial processes, devices, networks and software. Developing the ICS systems require a combination of multidisciplinary, multi-technology (hardware/software) to cover the technical domai...
Article
Full-text available
One of many duties of teachers is as a facilitators of students learning activities, as facilitator a teacher has to be capable in serving various kinds of instructional media. This research aims to develop instructional media by applying the computer assisted as simulation trainer of DCS in order to run processing control system, and analyzing cha...
Article
Full-text available
The programmable Logic Controller (PLC) is the central controlling unit in the industry or a process. The effective operation of the process and safety considerations if programmed appropriately can meet the required objectives. The present technical paper briefly distinguishes the present automation systems and the past technologies to identify an...
Preprint
Full-text available
Internet of Things (IoT) can be widely used in various applications such as manufacturing industry,achieving high operational efficiency and increased productivity.The exploitation of IoT paradigm made more feasible the use of distributed control systems (DCS) where more than one PLCs implement an industrial application.In case of having more than...
Article
Full-text available
Industrial control systems (ICSs), supervisory control and data acquisition (SCADA) systems, and distributed control systems (DCSs) are fundamental components of critical infrastructure (CI). CI supports the operation of transportation and health systems, electric and thermal plants, and water treatment facilities, among others. These infrastructur...

Citations

... Organisations' and countries' economic growth and sustainability largely depend on the critical infrastructure such as power stations, oil and gas refineries. Numerous organisations use Supervisory Control and Data Acquisition (SCADA) systems to control and monitor critical infrastructures (Bobat, Gezgin & Aslan 2015). Li et al. (2017) indicated that a SCADA system provides local and remote monitoring of the processes, equipment and devices in real time. ...
Article
Full-text available
Background: A Supervisory Control and Data Acquisition (SCADA) system is critical for remote monitoring and control of devices in various industries such as power utilities, oil and gas refineries, and manufacturing. Previous generations of SCADA systems have numerous limitations in today’s business environment. The latest technological advancements have brought forth new SCADA architecture variants that can be configured to ensure optimised operations. There is a need to assess the latest SCADA architectures that are posed to replace previous generations. Objectives: This research study aims to review various SCADA architectures and proposes an optimum SCADA system architecture for power utility. The proposed architecture is compared with the existing power utility SCADA system to highlight the impact and benefits of the proposed architecture. Methods: The research uses a qualitative approach and a comparative case study method to compare 10 SCADA architectures against a literature review-based criterion. A Multi-Criteria Decision-Making (MCDM) matrix is used to evaluate SCADA architectures and proposes an optimum Internet-of-Things (IoT)-SCADA system architecture for the power utility case study. Results: The research proposed an IoT-SCADA system architecture for optimum system functioning and compared the proposed architecture with the existing utility SCADA architecture. Moreover, the impact and benefits of the proposed architecture to the utility company are presented. Conclusion: The proposed IoT-SCADA system architecture has the potential to resolve many of the challenges encountered with previous generations of SCADA system architectures.
... The Industrial Internet of Things (IIoT) or Industry 4.0 has led to constant exploration and development in new industrial control and monitoring, industrial automation, working service process, data analysis of assembly lines, and new commercial models. There are many successful and actual examples available in relevant studies, such as adopting the Supervisory Control and Data Acquisition (SCADA) [1] system and the Programmable Logic Controller (PLC) [2] to establish a reservoir control system [3]. Hence, the Industrial Control System (ICS) [4] is perceived as playing a critical role in technological transitions and national security. ...
Article
Full-text available
The advanced connection requirements of industrial automation and control systems have sparked a new revolution in the Industrial Internet of Things (IIoT), and the Supervisory Control and Data Acquisition (SCADA) network has evolved into an open and highly interconnected network. In addition, the equipment of industrial electronic devices has experienced complete systemic integration by connecting with the SCADA network, and due to the control and monitoring advantages of SCADA, the interconnectivity and working efficiency among systems have been tremendously improved. However, it is inevitable that the SCADA system cannot be separated from the public network, which indicates that there are concerns over cyber-attacks and cyber-threats, as well as information security breaches, in the SCADA network system. According to this context, this paper proposes a module based on the token authentication service to deter attackers from performing distributed denial-of-service (DDoS) attacks. Moreover, a simulated experiment has been conducted in an energy management system in the actual field, and the experimental results have suggested that the security defense architecture proposed by this paper can effectively improve security and is compatible with real field systems.
... Sci. 2020, 10, 8179 2 of 18 water supply reservoirs, and water treatment systems [1][2][3]. Although the utilization of CPSs in these infrastructure systems has proven to be efficient, they are vulnerable to cyber-physical attacks. ...
Article
Full-text available
This study proposes a novel detection model for the detection of cyber-attacks using remote sensing data on water distribution systems (i.e., pipe flow sensor, nodal pressure sensor, tank water level sensor, and programmable logic controllers) by machine learning approaches. The most commonly used and well-known machine learning algorithms (i.e., k-nearest neighbor, support vector machine, artificial neural network, and extreme learning machine) were compared to determine the one with the best detection performance. After identifying the best algorithm, several improved versions of the algorithm are compared and analyzed according to their characteristics. Their quantitative performances and abilities to correctly classify the state of the urban water system under cyber-attack were measured using various performance indices. Among the algorithms tested, the extreme learning machine (ELM) was found to exhibit the best performance. Moreover, this study not only has identified excellent algorithm among the compared algorithms but also has considered an improved version of the outstanding algorithm. Furthermore, the comparison was performed using various representative performance indices to quantitatively measure the prediction accuracy and select the most appropriate model. Therefore, this study provides a new perspective on the characteristics of various versions of machine learning algorithms and their application to different problems, and this study may be referenced as a case study for future cyber-attack detection fields.
... The breakthrough represented by CPSs has affected several water-based infrastructures, such as reservoirs [49], water and wastewater treatment plants [50] and water distribution systems [51]. These CPSs exploit the interaction between the physical water assets and the networked devices which were designed to monitor, operate and supervise the physical processes, such as sensor networks [52][53][54], mobile sensors [55] and smart meters [56,57]. ...
Article
Full-text available
This paper presents a bibliographical review of definitions, classifications and applications concerning cyber attacks in networked control systems (NCSs) and cyber-physical systems (CPSs). This review tackles the topic from a control-oriented perspective, which is complementary to information or communication ones. After motivating the importance of developing new methods for attack detection and secure control, this review presents security objectives, attack modeling, and a characterization of considered attacks and threats presenting the detection mechanisms and remedial actions. In order to show the properties of each attack, as well as to provide some deeper insight into possible defense mechanisms, examples available in the literature are discussed. Finally, open research issues and paths are presented.
... These systems, which combine physical processes with cyber networking, are defined as cyber-physical systems (Lee, 2008). The past few years have witnessed the emergence of cyber-physical systems in different components of the water supply sector, such as the water distribution system (Rasekh et al., 2016), water supply reservoirs (Bobat et al., 2015) and treatment plants (Spellman, 2013). ...
Article
Modern Water Distribution Systems (WDSs) are often controlled by Supervisory Control and Data Acquisition (SCADA) systems and Programmable Logic Controllers (PLCs) which manage their operation and maintain a reliable water supply. As such, and with the cyber layer becoming a central component of WDS operations, these systems are at a greater risk of being subjected to cyberattacks. This paper offers a model-based methodology based on a detailed hydraulic understanding of WDSs combined with an anomaly detection algorithm for the identification of complex cyberattacks that cannot be fully identified by hydraulically based rules alone. The results show that the proposed algorithm is capable of achieving the best-known performance when tested on the data published in the BATtle of the Attack Detection ALgorithms (BATADAL) competition (http://www.batadal.net).
... These distributed systems are vulnerable to a variety of cyber and physical attacks. A typical water treatment system is composed of programmable logic controllers (PLCs), sensors, actuators and a physical process to be monitored via supervisory control and data acquisition (SCADA) system [7]. PLCs control the physical process based on the sensor readings received over the communication networks. ...
... These distributed systems are controlled by Programmable Logic Controllers (PLCs) and monitored by sensors and smart meters. To operate these networks, an operator supervises the system through a centralized computer using a Supervisory Control and Data Acquisition (SCADA) system [8]. PLCs gather data coming from the sensors and use this information to compute control actions to be sent to the actuators. ...
Conference Paper
In this manuscript, we present a detailed case study about model-based attack detection procedures for Cyber-Physical Systems (CPSs). In particular, using EPANET (a simulation tool for water distribution systems), we simulate a Water Distribution Network (WDN). Using this data and sub-space identification techniques, an input-output Linear Time Invariant (LTI) model for the network is obtained. This model is used to derive a Kalman filter to estimate the evolution of the system dynamics. Then, residual variables are constructed by subtracting data coming from EPANET and the estimates of the Kalman filter. We use these residuals and the Bad-Data and the dynamic Cumulative Sum (CUSUM) change detection procedures for attack detection. Simulation results are presented - considering false data injection and zero-alarm attacks on sensor readings, and attacks on control input - to evaluate the performance of our model-based attack detection schemes. Finally, we derive upper bounds on the estimator-state deviation that zero-alarm attacks can induce.
... Similar transformations are ongoing in the water supply sector, involving a broad range of critical infrastructures, such as reservoirs (Bobat et al. 2015), water and wastewater treatment plants (Spellman 2013), and water distribution systems-or smart water networks. The latter are CPS built on the interaction between physical water assets and networked devices designed to monitor, operate, and supervise all physical processes in the distribution system. ...
Article
This work contributes a modelling framework to characterize the effect of cyber-physical attacks (CPAs) on the hydraulic behavior of water distribution systems. The framework consists of an attack model and a MatLab toolbox named epanetCPA. The former identifies the components of the cyber infrastructure (e.g., sensors or Programmable Logic Controllers) that are potentially vulnerable to attacks, whereas the latter allows determining the exact specifications of an attack (e.g., timing or duration) and simulating it with EPANET. The framework is applied to C-Town network for a broad range of illustrative attack scenarios. Results show that the hydraulic response of the network to a cyber-physical attack depends not only on the attack specifications, but also on the system initial conditions and demand at the junctions. It is also found that the same hydraulic response can be obtained by implementing completely different attacks. This has some important implications on the design of attack detection mechanisms, which should identify anomalous behaviors in a water network as well as the cyber components being hacked. Finally, the manuscript presents some ideas regarding the next steps needed to thoroughly assess the risk of cyber-attacks on water distribution systems.
Article
Full-text available
The vigorous development of the Industrial Internet of Things brings the advanced connection function of the new generation of industrial automation and control systems. The Supervisory Control and Data Acquisition (SCADA) network is converted into an open and highly interconnected network, where the equipment connections between industrial electronic devices are integrated with a SCADA system through a Modbus protocol. As SCADA and Modbus are easily used for control and monitoring, the interconnection and operational efficiency between systems are highly improved; however, such connectivity inevitably exposes the system to the open network environment. There are many network security threats and vulnerabilities in a SCADA network system. Especially in the era of the Industrial Internet of Things, any security vulnerability of an industrial system may cause serious property losses. Therefore, this paper proposes an encryption and verification mechanism based on the trusted token authentication service and Transport Layer Security (TLS) protocol to prevent attackers from physical attacks. Experimentally, this paper deployed and verified the system in an actual field of energy management system. According to the experimental results, the security defense architecture proposed in this paper can effectively improve security and is compatible with the actual field system.