Slide Detail For SCADA
Slide Detail For SCADA
Slide Detail For SCADA
TCIPG RG 1
Industrial Systems
Control
ICCP
Generation Substation
DNP3
Security Issues
• SCADA does not authenticate users or devices
– All SCADA protocols do not implement
authentication. Trust assumption
• Patching is really hard
– Devices have to be taken offline for patching
• Believe they are not connected
– Laptops roam around (WiFi)
– Ex. Historians are a possible leak
• Old Modems
SCADA Functions in Power Systems
• Another commonly used term is energy
management system (EMS), which is a broader
concept.
– An energy management system (EMS) is a system of
computer-aided tools used by operators of
electric utility grids to monitor, control, and optimize
the performance of
the generation and/or transmission system.
– The monitor and control functions are known
as SCADA; the optimization packages are often
referred to as "advanced applications". They are
closely related.
SCADA: Monitoring
• State estimation is the core
State Estimation
Metering measurements
Static
Structure information State Estimates of the
Estimator System state
Parameter values
• 21 measurements,
• 7 state variables
State Estimation
• Basic assumption
– Power system is in the quasi-steady-state condition
• Problem formulation
Power flow equations
• Estimation method
– weighted least-squares (WLS) estimation
• Security consideration
– bad data detection (incorporation of PMU data)
SCADA: Control
• In EMS, the time hierarchy for operations and
control decisions
Time Scale Load Variations Function in EMS Decision
seconds small, random automatic control Match the on-line generation
with the load
minutes large economic dispatch Allocate economically load
among the committed
generating units
days and wide unit commitment Start-up and shutdown of units
hours
weeks very wide Fuel, hydro, and Meet load with the installed
swings maintenance resource mix
scheduling
SCADA: Control
• SCADA control mechanisms:
– Voltage control:
• Var compensation, in-phase transformer tap settings
– Frequency control: AGC
– Topology change: line switching
– Load shedding: the last resort
– Protection device (e.g., relays) parameter setting
• Security consideration:
– The impact of malicious control command is hard to
evaluate.