Search results

1 – 10 of 343
Article
Publication date: 28 November 2022

Junyan Ma and Yiping Yuan

With the rapid increase in the number of installed wind turbines (WTs) worldwide, requirements and expenses of maintenance have also increased significantly. The condition…

Abstract

Purpose

With the rapid increase in the number of installed wind turbines (WTs) worldwide, requirements and expenses of maintenance have also increased significantly. The condition monitoring (CM) of WT provides a strong “soft guarantee” for preventive maintenance. The supervisory control and data acquisition (SCADA) system records a huge amount of condition data, which has become an effective means of CM. The main objective of the present study is to summarize the application of SCADA data to fault detection in wind turbines, analyze its advantages and disadvantages and predict the potential of future investigations on the use of SCADA data for fault detection.

Design/methodology/approach

The authors first review the means of WT CM and summarize the characteristics of CM based on SCADA data. To ensure the quality of SCADA data, data preprocessing methods are analyzed and compared. Then, the failure modes of the key components are discussed and the SCADA data used for fault detection of each component are compared. Moreover, the fault detection methods for WT are classified and a general framework for fault detection is proposed. Finally, the issues in the WT fault detection method based on SCADA data are reviewed.

Findings

Based on the performed analyses, it is found that although the fault detection accuracy based on SCADA data is relatively poor, it has low capital expenses and low computational cost. More specifically, when there is scarce fault data, the normal SCADA data can be used to detect the fault time. However, the specific fault type cannot be identified in this way. When a large amount of fault data are accumulated in the SCADA system, it can not only detect the occurrence time of the fault but also identify the specific fault type.

Originality/value

The main contribution of the present study is to summarize the pre-processing methods for SCADA data, the data required for fault detection of key components and the characteristics of the fault detection model. Then we propose a general fault detection framework for wind turbines based on SCADA data, where the maintenance workers can choose the appropriate fault detection method according to different fault detection requirements and data resources. This article is expected to provide guidance for fault detection based on time-series sensor signals and be of interest to researchers, maintenance workers and managers.

Details

Sensor Review, vol. 43 no. 1
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 10 October 2008

Sandip C. Patel and Pritimoy Sanyal

Supervisory control and data acquisition (SCADA) systems are widely used by utility companies during the production and distribution of oil, gas, chemicals, electric power, and…

2354

Abstract

Purpose

Supervisory control and data acquisition (SCADA) systems are widely used by utility companies during the production and distribution of oil, gas, chemicals, electric power, and water to control and monitor these operations. A cyber attack on a SCADA system cannot only result in a major financial disaster but also in devastating damage to public safety and health. The purpose of this paper is to survey the literature on the cyber security of SCADA systems and then suggest two categories of security solutions.

Design/methodology/approach

The paper proposes the use of secure socket layer/transport layer security (SSL/TLS) and IP security (IPsec) solutions, implemented on the test‐bed at the University of Louisville, as the optimal choices when considering the level of security a solution can provide and the difficulty of implementing such a security measure. The paper analyzes these two solution choices, discuss their advantages and disadvantages, and present details on efficient ways of implementing these solutions.

Findings

The SSL/TLS solution to the protocol security using public domain toolkits such as OpenSSL may provide a fast, effective, and economical solution. However, the SSL/TLS protocol and its implementation toolkits have their limitations so this approach may need another enhancement.

Practical implications

IPsec can be used to provide IP‐level security in addition to SSL/TLS.

Originality/value

The use of these enhanced security approaches in SCADA systems should effectively reduce the vulnerability of these critical systems to malicious cyber attacks, and thereby potentially avoiding the serious consequences of such attacks.

Details

Information Management & Computer Security, vol. 16 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 June 2012

Stig Ole Johnsen

The purpose of this paper is to support the implementation of safety and security guidelines in the Norwegian oil and gas industry and verify the actual use of the guidelines by…

Abstract

Purpose

The purpose of this paper is to support the implementation of safety and security guidelines in the Norwegian oil and gas industry and verify the actual use of the guidelines by industry and authorities.

Design/methodology/approach

An action research approach was used, exploring organisational learning as described by Argyris and Schon and by Nonaka and Takeuchi as “The knowledge‐creating company.” Interviews (analysis of interviews), workshops and reviews of guidelines and audits were performed in addition to “learning workshops” trying to create understanding and compliance related to the guidelines among industry and authorities.

Findings

The guideline OLF104 is used in the Norwegian oil and gas industry, by operators and by suppliers and checked through audits. However, the guideline should influence working procedures at operators more. The guideline seems to have improved resilience.

Research limitations/implications

The impact of the guideline on safety and security should be more systematically assessed. It is suggested that improvement of experience and knowledge related to safety, security and resilience of distributed control systems could improve the guidelines.

Social implications

The paper shows that there is improved awareness, safety, security and resilience when process control systems are integrated with ICT systems.

Originality/value

The contribution of the paper is the exploration of a broad‐based action‐based approach, involving key stakeholders in a structured manner, to improve practices and facilitate implementation of safety and security guidelines. The contribution is also an empirical documentation of the implementation of key issues of security and safety in guidelines between two different areas of competence, ICT and process control. The paper will be of interest to the key stakeholders: the industry, authorities and the media.

Details

Information Management & Computer Security, vol. 20 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 7 February 2019

Qais Saif Qassim, Norziana Jamil, Maslina Daud, Ahmed Patel and Norhamadi Ja’affar

The common implementation practices of modern industrial control systems (ICS) has left a window wide open to various security vulnerabilities. As the cyber-threat landscape…

1502

Abstract

Purpose

The common implementation practices of modern industrial control systems (ICS) has left a window wide open to various security vulnerabilities. As the cyber-threat landscape continues to evolve, the ICS and their underlying architecture must be protected to withstand cyber-attacks. This study aims to review several ICS security assessment methodologies to identify an appropriate vulnerability assessment method for the ICS systems that examine both critical physical and cyber systems so as to protect the national critical infrastructure.

Design/methodology/approach

This paper reviews several ICS security assessment methodologies and explores whether the existing methodologies are indeed sufficient to meet the cyber security assessment exercise required to validate the security of electrical power control systems.

Findings

The study showed that most of the examined methodologies seem to concentrate on vulnerability identification and prioritisation techniques, whilst other security techniques received noticeably less attention. The study also showed that the least attention is devoted to patch management process due to the critical nature of the SCADA system. Additionally, this review portrayed that only two security assessment methodologies exhibited absolute fulfilment of all NERC-CIP security requirements, whilst the others only partially fulfilled the essential requirements.

Originality/value

This paper presents a review and a comparative analysis of several standard SCADA security assessment methodologies and guidelines published by internationally recognised bodies. In addition, it explores the adequacy of the existing methodologies in meeting cyber security assessment practices required for electrical power networks.

Details

Information & Computer Security, vol. 27 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 17 June 2019

Abdul Wahid Mir and Ramkumar Ketti Ramachandran

Supervisory control and data acquisition (SCADA) systems security is of paramount importance, and there should be a holistic approach to it, as any gap in the security will lead…

Abstract

Purpose

Supervisory control and data acquisition (SCADA) systems security is of paramount importance, and there should be a holistic approach to it, as any gap in the security will lead to critical national-level disaster. The purpose of this paper is to present the case study of security gaps assessment of SCADA systems of electricity utility company in the Sultanate of Oman against the regulatory standard and security baseline requirements published by the Authority for Electricity Regulation (AER), Government of Sultanate of Oman.

Design/methodology/approach

The security gaps assessment presented in this paper are based on the security baseline requirements that include core areas, controls for each core area and requirements for each control.

Findings

The paper provides the security gaps assessment summary of SCADA systems of electricity utility company.

Practical implications

The summary of threats and vulnerabilities presented will help stakeholders to be proactive rather than reactive in the event of any attack.

Originality/value

This case study discusses the various security challenges in smart grid based on SCADA systems and provides the summary of challenges and recommendations to overcome the same.

Details

Information & Computer Security, vol. 27 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Book part
Publication date: 4 May 2018

Salahuddin, Bakhtiar, Yusman and Fadhli

Purpose – This study aims to design and build a wireless supervisory control and data acquisition (SCADA) system based on Protocol AX.25 with the aim of monitoring the performance…

Abstract

Purpose – This study aims to design and build a wireless supervisory control and data acquisition (SCADA) system based on Protocol AX.25 with the aim of monitoring the performance of several parameters in Microhydro Power Plant (MHPP). This system can monitor several MHPP parameters such as voltage, current, frequency, and turbine rotation so that it can be accessed directly at one central location.

Design/Methodology/Approach – The design is done by taking into account the real parameters that exist in the MHPP. Some parameters that become the main object to see the performance of MHPP are voltage, current, frequency, and turbine rotation. The voltage generated by the MHPP must be adjusted to the voltage supplied by State Electricity Company to the consumer, including the phase used. The resulting stream should also be monitored for power to be adjusted to the turbine spin. The generator frequency is kept stable according to the standard frequency of the State Electricity Company generator.

Findings – The remote terminal unit (RTU) system has been simulated using 2 ACS712 current sensors, voltage sensor, zero crossing point, frequency sensor, and rotation sensor functionalized to monitor MHPP parameters. The AX.25 protocol has been applicable in the wireless SCADA network for monitoring the performance of MHPP by embedding in KYL-1020UA transceiver radio using the 433 MHz frequency and the audio frequency shift keying modulation system. Radio transmitter KYL-1020UA has been successfully simulated to send data from sensors to display on the computer through SCADA built applications. The data changes in the RTU section can be displayed properly on the graphic user interface in accordance with the existing display at the MHPP location.

Research Limitations/Implications – There are only two RTUs that will be connected to communicate, in this case MHPP-1 with callsign “RTU-001” and MHPP-2 with callsign “RTU-002.” While the existing devices in the data access section parameters MHPP as master station with callsign “MSSCADA” monitoring the performance of parameters sent from the RTU. There is no collision or error in data transmission. Baudrate is varied at 1,200 bps, 2,400 bps, 4,800 bps, and 9,600 bps for effective throughput calculation and AX.25 protocol efficiency. The transmission distance is varied at 100 m, 200 m, 300 m, and 500 m to see the bit error rate with baudrate 1,200 bps and 9,600 bps.

Practical Implications – This product is expected to be applied to several MHPP locations in Aceh Province so that its monitoring system is more centralized and efficient.

Originality/Value – This research if for the efficient monitoring of several MHPP located far apart and can be monitored in one central location so that operators do not have to be located at the plant site.

Book part
Publication date: 21 November 2018

Nurul Iman Mohd Sa’at, Salwani Mohd Daud and Teddy Mantoro

The impact of mitigating flood occurrence in the rural and urban areas has become crucial as it has affected government policies for countries that are prone to flood disaster…

Abstract

The impact of mitigating flood occurrence in the rural and urban areas has become crucial as it has affected government policies for countries that are prone to flood disaster. Efforts and funds have been put up to a higher level of capabilities to ensure that coping and managing flood disaster could be resolved. Several initiatives made in managing flood are: effectively monitoring the potential at-risk inundated area, improving the river water irrigation and drainage and undertaking the environmental pollution. This chapter basically focusses more on the improvement of flood monitoring system device at the potential flood area. The approach of ubiquitous mobile SCADA offers a low-cost, portable, and small in size flood monitoring system device with easily accessible data. An easy web monitoring of environment surrounding anywhere and at any time offers a real-time data updated with a very minimum delay of each and every environment data required. There are several sensors like ultrasonic, sound, temperature and humidity, water drop and vibration sensors are equipped together with one small monitoring system platform. The alert of water level condition is notified through a beeping buzzer and light LED notation of various colors of green, yellow and red, which notify any increase of water exceeded. The platform is powered by a rechargeable battery that allows the platform to be mobile and portable. Hence, flood monitoring system platform promotes a low-cost, easy-to-handle and ubiquitous data updated device for a better monitoring system platform.

Details

Improving Flood Management, Prediction and Monitoring
Type: Book
ISBN: 978-1-78756-552-4

Keywords

Content available
Article
Publication date: 1 March 1998

139

Abstract

Details

Assembly Automation, vol. 18 no. 1
Type: Research Article
ISSN: 0144-5154

Content available
Article
Publication date: 1 March 2002

Nikki Cole

70

Abstract

Details

Sensor Review, vol. 22 no. 1
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 1 June 1994

Bill Greeves

Describes how radio telemetry can interface with process control systemssuch as supervisory control and data acquisition [SCADA] and distributedcontrol systems [DCS] greatly…

163

Abstract

Describes how radio telemetry can interface with process control systems such as supervisory control and data acquisition [SCADA] and distributed control systems [DCS] greatly increasing their power and efficiency. Outlines the basis of radio telemetry, the behaviour of electromagnetic waves, frequency and wavelengths. Uses the water industry as an example of the use of a large scale and sophisticated SCADA system to provide date collection and control links over a large area. Concludes that the versatility of radio telemetry coupled with its cost‐effectiveness means that this technology can help to expand and improve communications in an increasing number of industries.

Details

Sensor Review, vol. 14 no. 2
Type: Research Article
ISSN: 0260-2288

Keywords

1 – 10 of 343