Supervisory control and data acquisition is a system of software as well as hardware components, which allows industrial organization like power grid to complete such activities that can be described as followed. It helps the procedures of power grid industry locally and from remote locations (Ozer et al. 2015). In addition, monitoring, gathering as well as process of real time data is achieved with the help of SCADA system. It is important to interact with many devices like sensors, valves, pumps, motors along with through human-machine interface software. Along with these, combination of the technology generates security issues in performance of the system that is discussed in the present research. Possible solutions are provided in the research that would assist to minimize the risks in the usage of SCADA system in power grid
Subramani and Vijayalakhsm (2016) stated that the primary architecture of SCADA system generally starts with programmable logic, which can communicate with array of the objects like factory machines, HMIs, sensors as well as end devices. It route the information from the objects to the computer with the help of Supervisory control and data acquisition software. The software can process, distribute as well as display data in order to assist the operators and other staffs analyzing data and make vital decisions. However, security concerns over the control systems are limited to the physical attacks. The operators of supervisory control and data acquisition system rationalized that whether the management consoles are adequately isolated and unauthorized persons cannot access the network, the system can be secured on that case (Subramani and Vijayalakhsmi 2015). However, there are risks of tampering for not having technical expertise and data communication paths remain isolated that enables security issues and risks in Supervisory control and data acquisition system.
The research has aimed to investigate the risks associated with Supervisory control and data acquisition system along with its operational overview in each stage. In addition, the process of mitigating the risks are tried to achieve in the following research.
The objectives of the research can be described as followed.
The research questions can be explained as followed.
Instead of going smooth operations in Supervisory control and data acquisition system, there are several factors that contribute to growing vulnerability of the control systems at power grid industry. It includes networking of control system, insecure remote connections; standardize technologies and availability of technical information. (Chen et al. 2015) The power grid organizations have increased connectivity through making integration of control systems as well as networks of the organization. The breaches in organization security arise whether appropriate security controls do not put in the place for both networks. On the other hand, the power grid organizations access the links like dial-up modems as well as wireless communications that are utilized the for making remote diagnostics and maintenance along with examining status of the system. Standard technologies used in the organizations make transitioning to the standardized technologies like Windows of Microsoft to minimize costs and enhance scalability of system along with its performance (Yenginer et al. 2015). It results to gain knowledge regarding the systems and able to increase number of systems vulnerable to attacks. In addition, combination of SCADA and cloud computing are one of the most attention in present days for saving potential costs as well as system redundancy. However, cyber threats become a great concern and problem in SCADA system.
Ensuing cyber security in the control systems seem as daunting risk; because it needs a commitment from whole organization at power grid industry. Furthermore, there are several resources available in order to assist critical infrastructure in SCADA system for improving security (Nguyen 2014). SCADA has been hidden cloak of obscurity with information technology. The SCADA system cannot be accessed through computer network and remote access points. It results increasing security concerns in the operations of SCADA system.
The SCADA system controls critical elements of industrial automation networks. There are also issues with the services provided to them. The dangers posed through insecure SCADA systems are not hypothetical (Misyrlis et al. 2016). There are numerous events that have shown vulnerabilities of SCADA system that can affect infrastructure of real world. At present days, there are most of SCADA systems are vulnerable to the cyber-attacks like lack of monitoring, slow updates, lack of knowledge regarding the devices, not comprehending traffic as well as authentication holes. It is not possible to identify the suspicious activities and potential threats as well as quickly give reaction to the cyber attacks. In addition, SCADA system is advanced as there are more vulnerable to new attacks (Hsiao et al. 2014). Maintenance of firmware as well as software updates may not be convenient without having appropriate systems in the place. There are also lack of knowledge about the device may able to generate security issues in SCADA system.
The operations of power system are highly dependent and controlled by computerized systems. The control system of industry is resembled to central nerve system of the power system. Hence, industrial control systems have advanced logic, which can control power network. In addition, higher management of the organization requires recognizing numerous advantages of secure SCADA system (Kalbarczyk and Fulp 2014). The benefits include ensuring uptime for the system along with reliability and availability. Hence, it is required to implement proper cyber security in the system. It results security issues in SCADA system.
Present research includes an introductory part regarding the topic and followed by literature review. After literature review from different relevant articles, selection of appropriate tools is achieved. Data analysis is achieved after finding data. After data analysis, conclusion and recommendations are provided in the study.
In this chapter of the research, literature review from various articles and journals is achieved. Overview of SCADA system is described in the chapter. In addition, use of supervisory control and data acquisition system in power grid is explained in the present chapter. Operations of the system at each stage and security issues related to the system while using at power grid industry are described in the chapter. Moreover, analysis of the security issues associated to the system is presented in the report. At present days, cyber security issues are great concern for using SCADA system that is discussed in this chapter of the research. Along with these, selection of proper research work on the topic is achieved in the study.
SCADA is the category of software application program to progress control and collection of data in the process of real time from the remote locations in order to control the equipments as well as conditions (Chen et al. 2014). SCADA is generally used in power plants and oil as well as gas refining. SCADA is generally used in telecommunication and transportation as well as water and waste control. SCADA system generally includes one or more file data interface devices that interfaces the devices as well as control units and the system used in SCADA system as central host. The system is combination of radio, control and cable as well as satellite. A central host server use SCADA center and master station along with master terminal unit.
Figure 1: Overview of SCADA system
(Source: Grozev et al. 2016, p.411)
Collection of the standards as well as customer software system is utilized in order to provide SCADA as central host as well as operator terminal application. It is used to provide support to the communication system as well as monitor along with controlling the service remotely (Grozev et al. 2016). On the other hand, present generation of SCADA master station architecture is associated with the second generation system and basic difference between the open system architecture need to control with vendor as well as proprietary environment. The major enhancement in the third generation system needs to control through opening architecture of system by utilizing the open standards.
Power distribution system uses the transmission of electric power from producing station to loads through the utilization of power distribution and utility organizations rely on the manual labor in order to perform the tasks of distribution such as interrupting the power to the loads in all parameters are required to implement the system and analyze the process of implementation.
Figure 2: SCADA for power distribution system
(Source: Hoffman et al. 2016, p.241)
Use of SCADA system in power grid system collects whole data from several electrical substation and corresponding procedure of the data. The programmable logic controllers in the substation constantly monitor the process of data. It is required to control the exact systems for the substations SCADA automatically control the isolator switches as well as circuit breakers to violate the limits of parameter (Fischer et al. 2016). Hence, it is required to make continuous inspection of the parameters that can be performed without line worker. There are some of the functions in SCADA at power distribution system can be described as followed.
There are different phases of SCADA system implementation that can be divided into five phases. In the first phase of SCADA system consists of detection of requirements. There are also opportunities in the project that can be necessarily defined at the particular point. In addition, it is required to enhance the level of service in order to avoid such incidents of environment in order to comply with the needs of regulators in order to replace existing aging system (Refer to Appendix).
The second phase of initiation includes validation of requirements of the project need to establish the concepts as well as scopes to establish the summary work breakdown structure. It is essential to firm up on the opportunities and detecting the major technologies that can be used as well as obtain agreement and provide approval to the potential users of particular system. It is also vital to detect the major technologies that can be utilized and enhance productivity. It is crucial for the user management system understand the process of using SCADA system.
Figure 3: Phases of SCADA operations in power grid
(Source: Dong et al. 2015, p.341)
In the third phase of the operations, definition of the project is included. The work at this particular stage, it is required to focus on the needs of function. At this stage of project, it is required to concentrate on the functional needs as well as organizational along with reporting procedures that can be established. The opportunities are generally finalized with sites and functions. It is crucial to detect the advantages firmly in order to develop plans of realization.
The fourth stage includes design of SCADA project. This phase generally involves with preparation of making specification as well as development of tender evaluation plans. A prequalification phase needs to proceed at particular time and construct contracts as well as pay for the performance (Amin et al. 2013). In the phase of SCADA goes through a number of steps like configuration of SCADA master software and development of custom software as well as assembly of factory of RTU.
Vulnerability of power system for using SCADA system in power grid industry is one of the great concerns for the system. Attacks upon the power system are a security issue is a security issue for SCADA system in power grid industry. The target of electric infrastructure is included in that. For an instance, terrorists can attack simultaneously for substations and key transmission towers for having caused for black out in big area of grid. In addition, attacks through the power system using the power plant cooling towers for dispersing chemical as well as biological agents (Cardoso et al. 2017). Attacks through the power system make some installation by using the grid in order to damage infrastructure of computer and telecommunications.
It is required to concentrate on the analysis of the type of threats and attacks on electric power system. In order to contribute in particular assessment and develop analysis of the existing materials that can be helpful through making communication technology. At present days, power grid is not only vulnerable to traditional terrorism like sabotage and bombing. However, there are vulnerable attacks to the new process of terrorism, which could generate several outages in the process of communication system that could attack on ISACs. Information sharing as well as analysis within industry as well as the government is involved in this.
In order to mitigate the risks related to the use of SCADA system in power grid Industry, organizations take several steps. Amin (2014) commented that there are also many efforts developed in order to protect secure as well as reliable operations of the electricity and telecommunication system. There are complex interactive network as well as system can make an initiative through organizing joint venture and program. In electric industry, there are specific standard market designs that can be prepared through making effective and strong independence of the infrastructure. The critical infrastructure of the protection advisory group need to coordinate with the security activities and concentrates in cyber, operation and physical security.
There are public key infrastructure is systematic approach that connects with the electronic environment that can be explained as systemic approach. It is vital to make square equipment database for assisting the electronic organizations after attacking. In addition, it is required to develop the specific things that can deliver the security issues for connecting the policy as well as technology in order to develop trusted environment. Moreover, security guidelines are generally compendium of making practices and accepted as the best practices. It helps to protect critical facilities along with functions in each company that evolves through time and key power plants as well as transmission lines (Liu et al. 2015). It is important to follow the security guideline such as managing vulnerability through developing threat response capability. Emergency management and developing the process of continuity and physical security are involved in this matter.
Wang and Infield (2013) asserted that Cyber security threats are a great concern for SCADA system. Dependency on the particular technology as well as SCADA system is cause for security threats. Power grid industry has becoming a dependent of the computers as well as electronics systems of communication system. It requires managing the collective attention to the security issues and interference on the technologies. The disruption of the system has been concentrated on the industries. There are different groups for developing the standards and guideline as well as processes in order to mitigate the cyber security issues. In addition, different groups are involved in development of the standard as well as guidelines as well as processes. There are some of the companies face disruptions in the control and data acquisition system.
Some of the security organizations have vital bugs in the security of some electric usage. It is important to describe the process of electric utilities that process the entire system. The process of utilizing the electric substation is connected to the system. Big organizations configure with the protection mechanisms for security. In addition, it is important to make analysis for security settings that are configured with the piece of equipments. In the case of wireless instruction, the system is vulnerable to the attacks. Some of the people use the systems in particular network and feel secure to the attacks. It is crucial to make the wireless system through directional antenna like Pringles Antenna (Mohan et al. 2015). The standards of wireless security require defining the process through proper process. In addition, direct reapplication of traditional policies of IT solution is involved with the system and makes a console in power system. Knapp and Langill (2014) stated that there are also some of the power systems for having operator made mistake during the process of entering password. It is important to make dicer application of the policies that can be used in the system. It is vital to make standard in terms of procedures and standard. Network security and encryption is helpful to overcome the security threats used for SCADA system in power grid. Applications of conventional network security measure the work and these systems are helpful to assume the components involved with the system.
SCADA is generally used in several areas from the chemical, water and gas as well as communications along with power systems (Knapp et al. 2014). There are list of applications where SCADA can be used. It is used in electric power generation and transmission as well as process of distribution. In addition, the electric use of SCAD system needs to identify the present flow as well as line voltage. It is used to monitor the operation and take sections of power grid online system.
In addition, water, waste and utilities as well as sewage are also the fields where SCADA is used. There are states as well as municipal water facilities utilize SCADA for monitor the entire operation of the circuit breakers as well as monitoring the flow of water. Oil and gas Trans as well as distribution where the system is used. Manufacturing is one of the major fields where SCADA systems are used in order to manage the parts of inventories for manufacturing just in time (Liao and He 2014). It is vital to transit the authorities for SCADA system. They use transit authorities for regulating electricity in the subways, buses and trams as well as trolley. In order to automate the traffic signal for the rail system for tracking as well as locating the trains and buses, SCADA is helpful. On the other hand, it can be used in regulating traffic lights and control the process that identifies the out of order signals.
SCADA is used in the power system widely. The applications for SCADA are increasing day after day. The applications of SCADA can be described as followed. Planning of comprehensive operations and controlling of the system can be achieved with the system. Scheduling of the fuel resource planning and optimum power flow of the system, network security as well as economic dispatch along with dispatch control can be achieved with the help of this process. In addition, it is required to use the benefits of particular system that can be useful in power grid industry.
Use of SCADA is helpful to provide several benefits in power grid system. It enhances the quality of service for using SCADA in power grid system. In addition, it improved the reliability of the service and minimized costs of operating. SCADA reduces the operating costs of maintenance. In addition, it is required to make flexible service with improved service and access of information (Liao and He 2014). The ability for differing capacity in the additional projects are achieved with SCADA system. Moreover, flexible billing options and improvement in accessing of information can be achieved with the help of SCADA system power grid system.
There is also maintenance and expansion of the base of the customers is one of the major advantages for using SCADA in the power system. Moreover, it is required to make proper value in the added service that would be helpful to create engineering decision. Use of SCADA reduces the system in the implementation costs. Manpower requirements are also minimized with the help of SCADA.
The features of substation SCADA system can be described as followed. It helps to monitor the parameters of substation. It controls electrical network elements remotely and safely tagging as well. There are high resolution for time stamping and sequence of reporting the event for posting the event analysis. The extra features of the substation control system are achieved by the demanding side management. In addition, volt or VAR control and preventive maintenance of the substation are major features of SCADA in control system. It is important to detect faults in isolation as well as restoration that can be achieved with the help of SCADA system in power grid industry.
The aim of the power network utilities software is to provide electrical utility with the help of tools that can improve operation of the particular system in cost effective way. In the present case scenario, there are low budgets for power utilities in order to generate distribute quality power at very minimum cost.
In addition, it is required to develop some more systems that can be helpful for effective guidance of the network. In addition, the real time data is generally processed for supervisory control and changes in the organization (Lin et al. 2014). The PNU software uses the real time SCADA data. Topology of real network components of network use detailed and defined strategy in order to achieve the target. PNU generally utilizes the combination of mathematical as well as logical techniques in order to provide effective techniques in the hosting applications. Proper approach of technology has been taken in the present research in order to collect secondary data associated to the risks involved with the use of SCADA system in power grid system. It is vital in order to investigate relation between several variables, which are already established. Hence, qualitative data analysis has been selected in the present research.
There are several features of power network utilities for using SCADA that can be listed as followed. Component modeling, suppression of big data, state estimation, and contingency analysis are including in the features of SCADA system in power network utilities. In addition, volt/var scheduling, dispatching of power flow and processor of network topology are consisted in those features.
There are several objectives of SCADA system that is described as followed.
There are several parts of SCADA system include hardware controllers and network, use interface as well as communication system and the equipments. SCADA refers to whole central system. On the other hand, the central system generally monitors data from several sensors, which makes proximity.
However, industrial SCADA consists of the central cost and master terminal unit that makes the system usable in particular case (Lin et al. 2014). There is one or more filed that gather as well as controls the unit as well as controlled by the remote. In addition, collection of the standard and custom software are used through t he system. Contemporary systems can be controlled with the help of units and there are open-loop characteristics and use predominantly use the system of communication.
There are open loop characteristics, which provide the operators at remote location with the information in order to determine status of specific piece of the equipments. There are entire substations that cause actions for taking place about the equipments and network without having physically presence. There are several scientific principles can be used in order to understand the specific matter in better method and the causes of finding the security issues in SCADA system. The research includes different factors and security issues regarding the topic.
The arrangements of the operator control as well as separation from remotely located apparatus through using the multiplexing techniques in comparatively small number of channels for interconnecting. Collection of data is gained from remotely equipments as well as controlling through communication medium. There are several functions of SCADA system that can perform several functions such as acquisition of method. Along with these, sensors as well as controls system for networked data communication and control system are included that. There are arrangements of collecting proper arrangements can be achieved with the help of this technology (Lin et al. 2016). Remotely telemetry units are generally small computerized units that can be deployed at particular sites as well as locations. Proper use of the system has been selected in the present research for having huge amount of information already present associated with the research. It would be helpful to understand the concepts of risks associated with SCADA system in power grid industry. In addition, it is required to present suitable materials of the involved risks and mitigating techniques.
There are several advantages for using SCADA system that is currently based control system that is quite vulnerable in the supervision as well as discipline. IP performance overhead in the system is one of the major advantages of using SCADA system. It is provided in the computer networks as well as network equipments through utilizing TCP/IP. On contrary, security concerns based on SCADA control system is developed trough quite vulnerable network. Stuxnet is generally sophisticated program, which was developed with code and it is complex process and able to exploit loopholes for operating system.
In the chapter of the research, relevant information is collected from different articles. Data from different sources indicate that risks are associated with the use of SCADA system in power grid. Different types of risks are analyzed in the chapter that would be helpful to identify the types of risks and possible solutions regarding the matter. In addition, it is vital to develop possible solutions for the issue that is discussed in the present chapter.
In this chapter of the research, data has been collected through the use of various primary and secondary methods that have been analyzed in the present report. The utilization of qualitative method has been achieved in the present research. Secondary data requires to analyze that is achieved in this chapter through using thematic format.
Theme 1: The use of SCADA system in power grid industry
Supervisory control and data acquisition system can be controlled through industrial system that is utilized in several modern industries such as energy, manufacturing, water transmission as well as in power grid industries (Baba et al. 2016). SCADA system makes an organization of several technologies, which allows in making process, collecting along with monitoring the system and its data. In addition, it sends useful instructions to the points, which are used to transmit data. At present days, SCADA system is used in such places like water treatment plan, supermarkets, industries as well as power grid industries.
SCADA systems have a range from simple to the large configurations in power grid system (Grozev et al. 2016). Most of the SCADA system and its applications use human machine interface software, which permits the users in order to interact with several machines for controlling the devices. In this case, HMI is generally connected to motors, valves as well as several motor devices. SCADA software usually receives useful information from programmable logic controllers or remote terminal units (Sriguruprasath et al. 2014). It helps to turn the process of receiving the information from sensors and inputted values that have provided manually. It helps to minimize waste in potential way and monitor data effectively.
Figure 4: SCADA for power generatiing stations
(Source: Huang et al. 2015, p.541)
The use of programmable Logic Controllers hardware as well as powerful bus communication system generates links with SCADA software and hardware in order to generate power stations. It helps to deliver optimal solutions for every process and operation that is flexible with advanced structures of system (Zhang et al. 2016). The functions of SCADA system in power generation consists of constant process of monitoring of speed as well as frequency. On the other hand, geographical monitoring of coal delivery as well as water treatment process is included in the functionalities of the operation. It also helps to active as well as reactive in power control system.
Theme 2: Risks involved with SCADA system while using at power grid industry
Based on the extensive analysis, formation of assurance as well as security octave have been developed and proposed for using extension of CIA-triad in power grid (Long et al. 2015). In addition, IAS Octave consists of integrity, privacy as well authentication and trustworthiness. The importance of security needs depend on the particular nature or role of the system. The needs of SCADA system has focused on health and safety of environment factors. On the other hand, availability as well as integrity of specific information in SCADA system is generally ranked according to the number system in the regard. The systems of SCADA make integrity of the information as well as deterministic hard real time. In addition, it is required to develop mechanisms protocol that would be helpful for lower resiliency to disruptive tasks (Karthikeya and Schutt 2014). There are several attacks like communication links vulnerabilities and authorization vulnerabilities can occur while using the system at power grid industry.
Theme 3: Cyber security threats in SCADA system
At present days, electricity becomes one of the most important needs based on life facilities. Thus, any disruptions in electricity cause great problem for users. SCADA systems have several security vulnerabilities that can be described as followed. Increasing interconnectivity of the networks of SCADA system has exposed a wide range of network security vulnerabilities that are related to hardware and software (Liao and He 2014). It is important to analyze those security issues for analyzing cyber security.
Cyber security issues are related to software vulnerability. One of the most common vulnerabilities is data traffic interception as well as modification. On the other hand, different vulnerabilities of cyber security threats can be associated with the operating system or firewall security. Hence, the issues occurring in the nodes of SCADA system run on real time operating system (Al-Tubi et al. 2015). These are more susceptible to the Denial of Service attacks. It is compared with the regular operating systems for having minor disruptions in messaging that can lead to important loss of the availability of system as consequences of determining real time operations. Thus, simpler protocols are preferred over the complex mechanism to improve reliability and maintainability as well performance.
Theme 4: Possible solutions to the existing security threats in SCADA system
In order to generate possible solutions to eliminate security issues related to the use of SCADA system in power grid, it is required to assess the risks involved with it. The first step requires defining the scoops of effort. In the particular step, it is required to make the system related to software and hardware as well as system interfaces that are related to the system of power grdi system (Chen et al. 2015). In the next stage, it is required to detect the possible threat sources to make successfully elimination of the vulnerabilities. The statement of SCADA system can be tailored for the system to environment. After this stage, it is required to detect SCADA system vulnerabilities sources related to the vulnerabilities as well as security needs that can be generated with risk assessment.
However, it is required to determine the adverse impact such as loss of availability, integrity as well as adverse impact of the system. It results to compromise the system through which potential threats can be managed. The seventh step needs to access the level of risks related to SCADA system by using appropriate formula. It is important to analyze the outputs that are involved in the risks level of SCADA system in power grid industry.
The whole chapter has been focused on secondary data analysis, which is named as thematic analysis. The information gathered for the research has some limitations with the objectives of research. However, it helps to encounter the objectives of the research. In addition, the information collection for the research and analysis of those data helps to conduct as well as precede the specific research for further research.
Conclusion
The developing dependence of critical infrastructure as well as industrial automation on the interconnected physical as well as cyber based control system results growing as well as previously unforeseen cyber security threat to the use of SCADA system in power grid. Thus, it becomes difficult for engineers as well as mangers to understand the issues and the process of locating the information that are needed. The research paper concludes with having a general perception of using the SCADA system and process of mitigating the risks involved with the system. In addition, it would be helpful to develop critical infrastructure as well as physical standard that would eliminate cyber security threats in using the system.
Objective 1: To analyze the operations of each stage in Supervisory control and data acquisition system in power grid industry
The operational stage in Supervisory control and data acquisition system is described in the literature review section of the research. The system is vital for the industry based organization since they assist in maintaining efficiency, process data for making smarter decisions as well as develop communications system issues in order to assist mitigate downtime. In addition, it has been tried to explain in theme 1.Thus, the objective of the research is properly justified.
Objective 2: To find out the weak points in terms of security in SCADA system
The security concerns related to the use of SCADA system in power grid is explained in the literature review chapter of the research. There are core needs for cyber security and security professionals involved with the process while using SCADA system in power grid industry. The security personnel are commonly referred as basic principles of security. In addition, the objective is matched with theme 2. Hence, taking of the objective is perfectly justified in the research.
Objective 3: To assess the risks associated with SCADA system in power transmission
The use of SCADA system in power transmission in discussed in the chapter two that analyzes the risks involved with the system. Availability and integrity as well as confidentiality are generally referred to make security issues in IT context On the other hand; the objective is linked with theme 3. Thus, the objective is justified in the research.
Objective 4: To recommend solutions for mitigating the risks involved with SCADA system
The solutions are provided after risk assessment of SCADA system in power grid. In addition, the objective is linked with the theme 4. Mapping out of document of CS network would be helpful to overcome security issues. Therefore, selection of the objective is properly justified in the research.
After risk assessment of SCADA system in using at power grid system, some steps can be taken in order to overcome the security issues involved with it; that can be described as followed.
Limitations of the research were faced for not having sufficient time to collect data from different sources. In addition, it was difficult to generalize huge amount of data, which have been collected for research. There are also small budget allocated for research that did not allow using expensive techniques for data collection as well as analysis process.
There will be opportunities for conduction of the research through collecting secondary data that helps to continue future research related to the topic. In addition, there are different ideas and opinions, which will be essential for conduction of the research. The present research is based on the risk assessment of SCADA system in power grid that helps to complete research on the advanced techniques used for risk assessment in the use of SCADA system at different industries.
References
Al-Tubi, I., Long, H., Tavner, P., Shaw, B. and Zhang, J., 2015. Probabilistic analysis of gear flank micro-pitting risk in wind turbine gearbox using supervisory control and data acquisition data. IET Renewable Power Generation, 9(6), pp.610-617.
Amin, M., 2014. A smart self-healing grid: In pursuit of a more reliable and resilient system [in my view]. IEEE Power and Energy Magazine, 12(1), pp.112-110.
Amin, S., Schwartz, G.A. and Hussain, A., 2013. In quest of benchmarking security risks to cyber-physical systems. IEEE Network, 27(1), pp.19-24.
Baba, K.V.S., Narasimhan, S.R., Jain, N.L., Singh, A., Shukla, R. and Gupta, A., 2016, September. Synchrophasor based real time monitoring of grid events in Indian power system. In Power System Technology (POWERCON), 2016 IEEE International Conference on (pp. 1-5). IEEE.
Cardoso, A., Prado, P.R., Lima, G.F. and Lamounier, E., 2017. A Virtual Reality Based Approach to Improve Human Performance and to Minimize Safety Risks When Operating Power Electric Systems. In Advances in Human Factors in Energy: Oil, Gas, Nuclear and Electric Power Industries (pp. 171-182). Springer International Publishing.
Chen, B., Matthews, P.C. and Tavner, P.J., 2015. Automated on-line fault prognosis for wind turbine pitch systems using supervisory control and data acquisition. IET Renewable Power Generation, 9(5), pp.503-513.
Chen, B., Zappalá, D., Crabtree, C.J. and Tavner, P.J., 2014. Survey of commercially available SCADA data analysis tools for wind turbine health monitoring.
Dong, X., Lin, H., Tan, R., Iyer, R.K. and Kalbarczyk, Z., 2015, April. Software-defined networking for smart grid resilience: Opportunities and challenges. In Proceedings of the 1st ACM Workshop on Cyber-Physical System Security (pp. 61-68). ACM.
Fischer, P., Feldkamp, A., Rodriguez, N. and Edwards, J., Sierra Nevada Corporation, 2016. Bi-directional data security for supervisor control and data acquisition networks. U.S. Patent 9,497,161.
Gast, D.L. and Ledford, J.R., 2014. Single case research methodology: Applications in special education and behavioral sciences. Routledge.
Grozev, D., Spasov, G., Shopov, M., Kakanakov, N. and Petrova, G., 2016, September. Experimental study of Cloud Computing based SCADA in Electrical Power Systems. In Scientific Conference Electronics (ET), International (pp. 1-4). IEEE.
Grozev, D., Spasov, G., Shopov, M., Kakanakov, N. and Petrova, G., 2016, September. Experimental study of Cloud Computing based SCADA in Electrical Power Systems. In Scientific Conference Electronics (ET), International (pp. 1-4). IEEE.
Hoffman, B., Buchler, N., Doshi, B. and Cam, H., 2016. Situational Awareness in Industrial Control Systems. In Cyber-security of SCADA and Other Industrial Control Systems (pp. 187-208). Springer International Publishing.
Hoffman, B., Buchler, N., Doshi, B. and Cam, H., 2016. Situational Awareness in Industrial Control Systems. In Cyber-security of SCADA and Other Industrial Control Systems (pp. 187-208). Springer International Publishing.
Hsiao, T.Y., Fan, J., Chang, M.C. and Lan, H.W., 2014. Dual-Master Synchronous Operation of Control Centers for Disaster Recovery. IEEE Transactions on Power Systems, 29(3), pp.1429-1430.
Huang, S.C., Lu, C.N. and Lo, Y.L., 2015. Evaluation of AMI and SCADA data synergy for distribution feeder modeling. IEEE Transactions on Smart Grid, 6(4), pp.1639-1647.
Kalbarczyk, Z. and Fulp, E., 2014, August. IICPS 2014 workshop keynote: Computing through failures and cyber attacks: Case for resilient smart power grid. In Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014).
Karp, J.F., Dew, M.A., Wahed, A.S., Fitzgerald, K., Bolon, C.A., Weiner, D.K., Morse, J.Q., Albert, S., Butters, M., Gildengers, A. and Reynolds, C.F., 2016. Challenges and solutions for depression prevention research: methodology for a depression prevention trial for older adults with knee arthritis and emotional distress. The American Journal of Geriatric Psychiatry, 24(6), pp.433-443.
Karthikeya, B.R. and Schutt, R.J., 2014. Overview of wind park control strategies. IEEE Transactions on Sustainable Energy, 5(2), pp.416-422.
Knapp, E.D. and Langill, J.T., 2014. Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Syngress.
Liao, J. and He, C., 2014, September. Wide-area monitoring protection and control of future power system networks. In Advanced Research and Technology in Industry Applications (WARTIA), 2014 IEEE Workshop on (pp. 903-905). IEEE.
Lin, H., Slagell, A., Kalbarczyk, Z., Sauer, P. and Iyer, R., 2016. Runtime semantic security analysis to detect and mitigate control-related attacks in power grids. IEEE Transactions on Smart Grid.
Liu, W.Y., Tang, B.P., Han, J.G., Lu, X.N., Hu, N.N. and He, Z.Z., 2015. The structure healthy condition monitoring and fault diagnosis methods in wind turbines: A review. Renewable and Sustainable Energy Reviews, 44, pp.466-472.
Long, H., Wang, L., Zhang, Z., Song, Z. and Xu, J., 2015. Data-driven wind turbine power generation performance monitoring. IEEE Transactions on Industrial Electronics, 62(10), pp.6627-6635.
Misyrlis, M., Kannan, R., Chelmis, C. and Prasanna, V.K., 2016. Sparse Causal Temporal Modeling to Inform Power System Defense. Procedia Computer Science, 95, pp.450-456.
Mohan, A., Khurana, H., Brainard, G. and Fischer, S., Honeywell International Inc., 2015. System and method of architectural security and resilience for microgrid systems. U.S. Patent Application 14/696,777.
Nguyen, C.K.Q., 2014. Industrial control systems (ICS) & supervisory control & data acquisition (SCADA) cybersecurity of power grid systems: Simulation/modeling/cyber defense using open source and virtualization (Doctoral dissertation, Purdue University).
Ozer, B., Arikan, O., Moral, G. and Altintas, A., 2015. Extraction of primary and secondary frequency control from active power generation data of power plants. International Journal of Electrical Power & Energy Systems, 73, pp.16-22.
Reynolds, D., Creemers, B., Nesselrodt, P.S., Shaffer, E.C., Stringfield, S. and Teddlie, C. eds., 2014. Advances in school effectiveness research and practice. Elsevier.
Riedl, R., Davis, F.D. and Hevner, A.R., 2014. Towards a NeuroIS research methodology: intensifying the discussion on methods, tools, and measurement. Journal of the Association for Information Systems, 15(10), p.I.
Saunders, M. N., Lewis, P. and Thornhill, A. (2009) Research methods for business students. 5th ed. Harlow: Prentice Hall
Smith, J.A. ed., 2015. Qualitative psychology: A practical guide to research methods. Sage.
Smith, S.C., 2014. A survey of research in supervisory control and data acquisition (SCADA) (No. ARL-TR-7093). ARMY RESEARCH LAB ABERDEEN PROVING GROUND MD COMPUTATIONAL AND INFORMATION SCIENCES DIRECTORATE.
Sriguruprasath, V., Rajesh, N.B., Viswanathan, B. and Venkatesan, G., 2014. Optimal Placement of Facts Device Using Particle Swarm Optimization Technique (PSO) and Coordinated Tuning Of the Device Using Supervisory Control and Data Acquisition (SCADA). International Journal of Applied Engineering Research, 9(18), pp.4583-4594.
Subramani, R. and Vijayalakhsmi, C., 2015. Implementation of Lagrangian Decomposition Model for Energy Efficiency using SCADA System.
Subramani, R. and Vijayalakhsmi, C., 2016. Design of Lagrangian Decomposition Model for Energy Management Using SCADA System. In Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC–16’) (pp. 353-361). Springer International Publishing.
Tarone, E.E., Gass, S.M. and Cohen, A.D., 2013. Research methodology in second-language acquisition. Routledge.
Vaioleti, T.M., 2016. Talanoa research methodology: A developing position on Pacific research. Waikato Journal of Education, 12(1).
Wang, Y. and Infield, D., 2013. Supervisory control and data acquisition data-based non-linear state estimation technique for wind turbine gearbox condition monitoring. IET Renewable Power Generation, 7(4), pp.350-358.
Wiek, A. and Lang, D.J., 2016. Transformational sustainability research methodology. In Sustainability Science (pp. 31-41). Springer Netherlands.
Yenginer, H., Cetiz, C. and Dursun, E., 2015, April. A review of energy management systems for smart grids. In Smart Grid Congress and Fair (ICSG), 2015 3rd International Istanbul (pp. 1-4). IEEE.
Zhang, Y., Wang, L., Xiang, Y. and Ten, C.W., 2015. Power system reliability evaluation with SCADA cybersecurity considerations. IEEE Transactions on Smart Grid, 6(4), pp.1707-1721.
Zhang, Y., Wang, L., Xiang, Y. and Ten, C.W., 2016. Inclusion of SCADA cyber vulnerability in power system reliability assessment considering optimal resources allocation. IEEE Transactions on Power Systems, 31(6), pp.4379-4394.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download