Search results
1 – 10 of 343Junyan Ma and Yiping Yuan
With the rapid increase in the number of installed wind turbines (WTs) worldwide, requirements and expenses of maintenance have also increased significantly. The condition…
Abstract
Purpose
With the rapid increase in the number of installed wind turbines (WTs) worldwide, requirements and expenses of maintenance have also increased significantly. The condition monitoring (CM) of WT provides a strong “soft guarantee” for preventive maintenance. The supervisory control and data acquisition (SCADA) system records a huge amount of condition data, which has become an effective means of CM. The main objective of the present study is to summarize the application of SCADA data to fault detection in wind turbines, analyze its advantages and disadvantages and predict the potential of future investigations on the use of SCADA data for fault detection.
Design/methodology/approach
The authors first review the means of WT CM and summarize the characteristics of CM based on SCADA data. To ensure the quality of SCADA data, data preprocessing methods are analyzed and compared. Then, the failure modes of the key components are discussed and the SCADA data used for fault detection of each component are compared. Moreover, the fault detection methods for WT are classified and a general framework for fault detection is proposed. Finally, the issues in the WT fault detection method based on SCADA data are reviewed.
Findings
Based on the performed analyses, it is found that although the fault detection accuracy based on SCADA data is relatively poor, it has low capital expenses and low computational cost. More specifically, when there is scarce fault data, the normal SCADA data can be used to detect the fault time. However, the specific fault type cannot be identified in this way. When a large amount of fault data are accumulated in the SCADA system, it can not only detect the occurrence time of the fault but also identify the specific fault type.
Originality/value
The main contribution of the present study is to summarize the pre-processing methods for SCADA data, the data required for fault detection of key components and the characteristics of the fault detection model. Then we propose a general fault detection framework for wind turbines based on SCADA data, where the maintenance workers can choose the appropriate fault detection method according to different fault detection requirements and data resources. This article is expected to provide guidance for fault detection based on time-series sensor signals and be of interest to researchers, maintenance workers and managers.
Details
Keywords
Sandip C. Patel and Pritimoy Sanyal
Supervisory control and data acquisition (SCADA) systems are widely used by utility companies during the production and distribution of oil, gas, chemicals, electric power, and…
Abstract
Purpose
Supervisory control and data acquisition (SCADA) systems are widely used by utility companies during the production and distribution of oil, gas, chemicals, electric power, and water to control and monitor these operations. A cyber attack on a SCADA system cannot only result in a major financial disaster but also in devastating damage to public safety and health. The purpose of this paper is to survey the literature on the cyber security of SCADA systems and then suggest two categories of security solutions.
Design/methodology/approach
The paper proposes the use of secure socket layer/transport layer security (SSL/TLS) and IP security (IPsec) solutions, implemented on the test‐bed at the University of Louisville, as the optimal choices when considering the level of security a solution can provide and the difficulty of implementing such a security measure. The paper analyzes these two solution choices, discuss their advantages and disadvantages, and present details on efficient ways of implementing these solutions.
Findings
The SSL/TLS solution to the protocol security using public domain toolkits such as OpenSSL may provide a fast, effective, and economical solution. However, the SSL/TLS protocol and its implementation toolkits have their limitations so this approach may need another enhancement.
Practical implications
IPsec can be used to provide IP‐level security in addition to SSL/TLS.
Originality/value
The use of these enhanced security approaches in SCADA systems should effectively reduce the vulnerability of these critical systems to malicious cyber attacks, and thereby potentially avoiding the serious consequences of such attacks.
Details
Keywords
The purpose of this paper is to support the implementation of safety and security guidelines in the Norwegian oil and gas industry and verify the actual use of the guidelines by…
Abstract
Purpose
The purpose of this paper is to support the implementation of safety and security guidelines in the Norwegian oil and gas industry and verify the actual use of the guidelines by industry and authorities.
Design/methodology/approach
An action research approach was used, exploring organisational learning as described by Argyris and Schon and by Nonaka and Takeuchi as “The knowledge‐creating company.” Interviews (analysis of interviews), workshops and reviews of guidelines and audits were performed in addition to “learning workshops” trying to create understanding and compliance related to the guidelines among industry and authorities.
Findings
The guideline OLF104 is used in the Norwegian oil and gas industry, by operators and by suppliers and checked through audits. However, the guideline should influence working procedures at operators more. The guideline seems to have improved resilience.
Research limitations/implications
The impact of the guideline on safety and security should be more systematically assessed. It is suggested that improvement of experience and knowledge related to safety, security and resilience of distributed control systems could improve the guidelines.
Social implications
The paper shows that there is improved awareness, safety, security and resilience when process control systems are integrated with ICT systems.
Originality/value
The contribution of the paper is the exploration of a broad‐based action‐based approach, involving key stakeholders in a structured manner, to improve practices and facilitate implementation of safety and security guidelines. The contribution is also an empirical documentation of the implementation of key issues of security and safety in guidelines between two different areas of competence, ICT and process control. The paper will be of interest to the key stakeholders: the industry, authorities and the media.
Details
Keywords
Qais Saif Qassim, Norziana Jamil, Maslina Daud, Ahmed Patel and Norhamadi Ja’affar
The common implementation practices of modern industrial control systems (ICS) has left a window wide open to various security vulnerabilities. As the cyber-threat landscape…
Abstract
Purpose
The common implementation practices of modern industrial control systems (ICS) has left a window wide open to various security vulnerabilities. As the cyber-threat landscape continues to evolve, the ICS and their underlying architecture must be protected to withstand cyber-attacks. This study aims to review several ICS security assessment methodologies to identify an appropriate vulnerability assessment method for the ICS systems that examine both critical physical and cyber systems so as to protect the national critical infrastructure.
Design/methodology/approach
This paper reviews several ICS security assessment methodologies and explores whether the existing methodologies are indeed sufficient to meet the cyber security assessment exercise required to validate the security of electrical power control systems.
Findings
The study showed that most of the examined methodologies seem to concentrate on vulnerability identification and prioritisation techniques, whilst other security techniques received noticeably less attention. The study also showed that the least attention is devoted to patch management process due to the critical nature of the SCADA system. Additionally, this review portrayed that only two security assessment methodologies exhibited absolute fulfilment of all NERC-CIP security requirements, whilst the others only partially fulfilled the essential requirements.
Originality/value
This paper presents a review and a comparative analysis of several standard SCADA security assessment methodologies and guidelines published by internationally recognised bodies. In addition, it explores the adequacy of the existing methodologies in meeting cyber security assessment practices required for electrical power networks.
Details
Keywords
Abdul Wahid Mir and Ramkumar Ketti Ramachandran
Supervisory control and data acquisition (SCADA) systems security is of paramount importance, and there should be a holistic approach to it, as any gap in the security will lead…
Abstract
Purpose
Supervisory control and data acquisition (SCADA) systems security is of paramount importance, and there should be a holistic approach to it, as any gap in the security will lead to critical national-level disaster. The purpose of this paper is to present the case study of security gaps assessment of SCADA systems of electricity utility company in the Sultanate of Oman against the regulatory standard and security baseline requirements published by the Authority for Electricity Regulation (AER), Government of Sultanate of Oman.
Design/methodology/approach
The security gaps assessment presented in this paper are based on the security baseline requirements that include core areas, controls for each core area and requirements for each control.
Findings
The paper provides the security gaps assessment summary of SCADA systems of electricity utility company.
Practical implications
The summary of threats and vulnerabilities presented will help stakeholders to be proactive rather than reactive in the event of any attack.
Originality/value
This case study discusses the various security challenges in smart grid based on SCADA systems and provides the summary of challenges and recommendations to overcome the same.
Details
Keywords
Salahuddin, Bakhtiar, Yusman and Fadhli
Purpose – This study aims to design and build a wireless supervisory control and data acquisition (SCADA) system based on Protocol AX.25 with the aim of monitoring the performance…
Abstract
Purpose – This study aims to design and build a wireless supervisory control and data acquisition (SCADA) system based on Protocol AX.25 with the aim of monitoring the performance of several parameters in Microhydro Power Plant (MHPP). This system can monitor several MHPP parameters such as voltage, current, frequency, and turbine rotation so that it can be accessed directly at one central location.
Design/Methodology/Approach – The design is done by taking into account the real parameters that exist in the MHPP. Some parameters that become the main object to see the performance of MHPP are voltage, current, frequency, and turbine rotation. The voltage generated by the MHPP must be adjusted to the voltage supplied by State Electricity Company to the consumer, including the phase used. The resulting stream should also be monitored for power to be adjusted to the turbine spin. The generator frequency is kept stable according to the standard frequency of the State Electricity Company generator.
Findings – The remote terminal unit (RTU) system has been simulated using 2 ACS712 current sensors, voltage sensor, zero crossing point, frequency sensor, and rotation sensor functionalized to monitor MHPP parameters. The AX.25 protocol has been applicable in the wireless SCADA network for monitoring the performance of MHPP by embedding in KYL-1020UA transceiver radio using the 433 MHz frequency and the audio frequency shift keying modulation system. Radio transmitter KYL-1020UA has been successfully simulated to send data from sensors to display on the computer through SCADA built applications. The data changes in the RTU section can be displayed properly on the graphic user interface in accordance with the existing display at the MHPP location.
Research Limitations/Implications – There are only two RTUs that will be connected to communicate, in this case MHPP-1 with callsign “RTU-001” and MHPP-2 with callsign “RTU-002.” While the existing devices in the data access section parameters MHPP as master station with callsign “MSSCADA” monitoring the performance of parameters sent from the RTU. There is no collision or error in data transmission. Baudrate is varied at 1,200 bps, 2,400 bps, 4,800 bps, and 9,600 bps for effective throughput calculation and AX.25 protocol efficiency. The transmission distance is varied at 100 m, 200 m, 300 m, and 500 m to see the bit error rate with baudrate 1,200 bps and 9,600 bps.
Practical Implications – This product is expected to be applied to several MHPP locations in Aceh Province so that its monitoring system is more centralized and efficient.
Originality/Value – This research if for the efficient monitoring of several MHPP located far apart and can be monitored in one central location so that operators do not have to be located at the plant site.
Details
Keywords
Nurul Iman Mohd Sa’at, Salwani Mohd Daud and Teddy Mantoro
The impact of mitigating flood occurrence in the rural and urban areas has become crucial as it has affected government policies for countries that are prone to flood disaster…
Abstract
The impact of mitigating flood occurrence in the rural and urban areas has become crucial as it has affected government policies for countries that are prone to flood disaster. Efforts and funds have been put up to a higher level of capabilities to ensure that coping and managing flood disaster could be resolved. Several initiatives made in managing flood are: effectively monitoring the potential at-risk inundated area, improving the river water irrigation and drainage and undertaking the environmental pollution. This chapter basically focusses more on the improvement of flood monitoring system device at the potential flood area. The approach of ubiquitous mobile SCADA offers a low-cost, portable, and small in size flood monitoring system device with easily accessible data. An easy web monitoring of environment surrounding anywhere and at any time offers a real-time data updated with a very minimum delay of each and every environment data required. There are several sensors like ultrasonic, sound, temperature and humidity, water drop and vibration sensors are equipped together with one small monitoring system platform. The alert of water level condition is notified through a beeping buzzer and light LED notation of various colors of green, yellow and red, which notify any increase of water exceeded. The platform is powered by a rechargeable battery that allows the platform to be mobile and portable. Hence, flood monitoring system platform promotes a low-cost, easy-to-handle and ubiquitous data updated device for a better monitoring system platform.
Details
Keywords
Abstract
Describes how radio telemetry can interface with process control systemssuch as supervisory control and data acquisition [SCADA] and distributedcontrol systems [DCS] greatly…
Abstract
Describes how radio telemetry can interface with process control systems such as supervisory control and data acquisition [SCADA] and distributed control systems [DCS] greatly increasing their power and efficiency. Outlines the basis of radio telemetry, the behaviour of electromagnetic waves, frequency and wavelengths. Uses the water industry as an example of the use of a large scale and sophisticated SCADA system to provide date collection and control links over a large area. Concludes that the versatility of radio telemetry coupled with its cost‐effectiveness means that this technology can help to expand and improve communications in an increasing number of industries.
Details