SlideShare una empresa de Scribd logo
1 de 3
Descargar para leer sin conexión
Ram Dhobley, Chopde Abhay, International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 1217

ISSN: 2454-132X
Impact factor: 4.295
(Volume 3, Issue 6)
Available online at www.ijariit.com
Comparative Analysis of Traditional SCADA Systems and IOT
Implemented SCADA
Ram Dhobley
Vishwakarma Institute of Technology, Pune,
Maharashtra
ramdhobley25@gmail.com
Abhay Chopde
Vishwakarma Institute of Technology, Pune,
Maharashtra
abhay.chopade@vit.edu
Abstract: SCADA system stands as an abbreviation of Supervisory Control and Data Acquisition. It focuses on the supervisory
level and is not a full control system. It is a computer system which gathers and analyses real time data. They are useful in
monitoring and controlling a plant or industrial equipment like telecommunications, water, waste control, energy, oil-gas
refining, and transportation. It gathers information about a mishap, transfers it back to a central site and alerts the home station
about the mishap, carries out necessary analysis and control, like determining if the mishap occurred is critical, and display the
information in a logical and organized fashion. They can be relatively as simple as a system which monitors environmental
conditions of a small office building, or as complex as a system that monitors all the activity in a nuclear power plant.
IOT acts as a complementary setup to SCADA. SCADA system generates information which acts as one of the data sources for
IOT. While the focus of SCADA on monitoring and control, the focus of IOT is firmly on analyzing machine data to improve
productivity.
Keywords: Architecture, Communication, Vulnerabilities.
I. INTRODUCTION
SCADA systems are used to control dispersed. The integration of data acquisition systems with data transmission systems and HMI
software is done by the SCADA to provide a centralized monitoring and control system for multiple process inputs and outputs.
SCADA systems are designed to collect field information, transfer it to a central computer facility (via different communication
protocols), and display the information to the operator graphically or textually (via Human Machine Interface), and thus allow an
operator to monitor or control an entire system from a central location in real time. Based on the sophistication and setup of the
individual system, control of any individual system, operation, or task can be automatic. SCADA systems consist of both hardware
and software.
The Internet of things (IOT) is made up of a network of physical devices connected via electronic embedding, software setups,
sensors-actuators, network connectivity which act together for the objects to connect and exchange data. Each ‘thing’ is uniquely
identifiable through its embedded computing system and is also able to inter-operate within the existing Internet infrastructure. IOT
allows objects to be sensed or controlled remotely across different networking infrastructures. Thus it creates opportunities for more
direct integration of the physical world into computer-based systems, which results in improved efficiency, accuracy and economic
benefit and also cuts down on human intervention. When IOT is augmented with sensors and actuators, the technology becomes an
instance of the more general class of cyber-physical systems, which also encompasses technologies such as smart grids, virtual
power plants, smart homes, intelligent transportation and smart cities among many others
Ram Dhobley, Chopde Abhay, International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 1218
II. ARCHITECTURE
SCADA system is a centralized system, a software package that is positioned on top of hardware. A supervisory system gathers data
on the process and sends the commands control to the process. The SCADA is a remote terminal unit which is also known as RTU,
which performs most control actions automatically along with PLCs. The RTUs consist of the programmable logic converter which
can be preset manually. Overall, SCADA system can be classified into two parts which are Clint layer (responsible for the man
machine interaction) and Data server layer (responsible to handle the process data activities). The SCADA station refers to the
servers composed of a single PC. The data servers communicate with devices in the field through process controllers like PLCs or
RTUs. The connection of PLC to the data servers is made either directly or via networks or buses. The SCADA system utilizes a
WAN and LAN networks, which consists of internet protocols used for communication between the master station and devices. The
RTUs convert the sensor signals to digital data and sends digital data to master, according to the master feedback received by the
RTU, it applies the electrical signal to relays. RTUs or PLCs perform most of the monitoring and control operations.
Fig: Block Diagram for Architecture of SCADA
In IOT, sensors collect data from the environment or object under measurement and turn it into useful data. The data from the
sensors start in analog form, which needs to be aggregated and converted into digital streams. Data acquisition systems (DAS)
perform these data aggregation and conversion functions. The DAS joins the sensor network, groups the outputs, and performs the
ADC conversion. The Internet gateway receives the aggregated and digitized data and routes it over Wi-Fi, wired LANs, or the
Internet, to Stage 3 systems for further processing. Post data digitization and aggregation, the data may require further processing
before it enters the data center. Edge IT systems perform post processing. Data that needs more in-depth processing where feedback
doesn't have to be immediate, is forwarded to the physical data center or cloud-based systems, where more powerful IT systems can
analyze, manage, and securely store the data. The processing type which gets executed at this stage remains the same for the
platform.
III. COMMUNICATION
Server-client and server-server communication is in general on a publish-subscribe and event-driven basis and uses a TCP/IP
protocol. The controllers are then polled at a user defined polling rate, which is changes from parameter to parameter. The controllers
pass the requested parameters to the data servers. Time stamping of the process parameters is typically performed in the controllers
and this time-stamp is taken over by the data server. For controller and communication protocol to support the unsolicited data
transfer, the products must support this too. They provide communication drivers for most of the common PLCs and widely used
field-buses. VME, on the other hand, is generally not supported. A single data server can support multiple communications because
of the presence of multiple slots for interface cards. The configuration data are stored in logically centralized but physically
distributed database that is generally of a proprietary format. The RTDB resides in the memory of the servers in a proprietary format
for performance reasons. The archive and logging format are usually also proprietary.
Ram Dhobley, Chopde Abhay, International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 1219
In IOT, the “Thing” must communicate through the Internet to be considered an “IOT” node, and it must also adhere to the Internet
Engineering Task Force’s (IETF) Internet Protocol Suite. Devices must communicate with each other (D2D). Device data should
then be collected to be sent to the server infrastructure (D2S). That server infrastructure has to share device data (S2S), possibly
providing it back to devices, to analysis programs, or to people. From 30,000 feet, the protocols can be described in this framework
as:
1. MQTT: a protocol for collecting device data and communicating it to servers (D2S)
2. XMPP: a protocol best for connecting devices to people, a special case of the D2S pattern, since people are connected to
the servers
3. DDS: a fast bus for integrating intelligent machines (D2D)
4. AMQP: a queuing system designed to connect servers to each other (S2S)
IV. VULNERABILITIES
SCADA
Lack of monitoring. Without active network monitoring, it is impossible to detect suspicious activity, identify potential
threats, and quickly react to cyber-attacks.
Slow updates. With advancement, SCADA systems become more vulnerable to new attacks. Maintenance of the
firmware and the software updates may become inconvenient over time but is necessary for maximum protection.
Lack of knowledge about devices. Connecting devices to a SCADA System allows for remote monitoring and updates,
this means the knowledge about network connected devices is often incomplete.
Not understanding traffic. Managers need to know what type of traffic is going through their networks. Only then they
can make informed decisions about how to respond to potential threats.
Authentication holes. Authentication solutions can easily be defeated due to common unsafe practices such as poor
passwords, username sharing, and weak authentication.
IOT
Insecure web interface: Web server/app, there may have flaws in the code that allow the device to be attacked.
Ineffective authentication/authorization: Operability of many devices with their default (insecure) settings is a factor
of concern.
Insecure network services: if maintenance services are on open, insecure or vulnerable ports they are potential security
holes.
Lack of transport encryption: Device sending private information over an insecure protocol would allow anyone to
read it.
Privacy concerns: unencrypted information puts your personal information is at risk.
Insecure cloud interface: Cloud management interface this represents another potential security weakness.
Insecure software/firmware: The device can be patched to address discovered vulnerabilities, also, installing certain
software’s might brick the device.
V. CONCLUSION
Both the traditional SCADA systems and IOT implemented SCADA have their sets of advantages and vulnerabilities. It is being
estimated that by 2020, 50 billion devices or /things will be connected to the internet. The dynamics of entire automation industry
is changing, and this is the dawn of a new age of industrial revolution, or industry 4.0. Industry 4.0 is the name of the era responsible
for the emerging trend automation and data exchange in manufacturing technologies. It includes cyber-physical systems, the Internet
of things, cloud computing and cognitive computing. By working on the vulnerabilities possessed by IOT devices, we can very truly
shift from a traditionally implemented SCADA to an IOT implemented one and make Industry 4.0 a living reality.

Más contenido relacionado

La actualidad más candente

SMART CITY 3 novembre
SMART CITY 3 novembre SMART CITY 3 novembre
SMART CITY 3 novembre
canaleenergia
 
EMKA-Biometric Presentation
EMKA-Biometric PresentationEMKA-Biometric Presentation
EMKA-Biometric Presentation
Darrell Smith
 

La actualidad más candente (19)

SMART CITY 3 novembre
SMART CITY 3 novembre SMART CITY 3 novembre
SMART CITY 3 novembre
 
EMKA-Biometric Presentation
EMKA-Biometric PresentationEMKA-Biometric Presentation
EMKA-Biometric Presentation
 
Unit 1 q&a
Unit  1 q&aUnit  1 q&a
Unit 1 q&a
 
Lecture 17
Lecture 17Lecture 17
Lecture 17
 
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
 
715827 dzone-rc-industrial-internet
715827 dzone-rc-industrial-internet715827 dzone-rc-industrial-internet
715827 dzone-rc-industrial-internet
 
Jq2416671672
Jq2416671672Jq2416671672
Jq2416671672
 
Ak4103212215
Ak4103212215Ak4103212215
Ak4103212215
 
Chapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiesChapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologies
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic design
 
Iot
IotIot
Iot
 
On-line IDACS for Embedded Real Time Application
On-line IDACS for Embedded Real Time ApplicationOn-line IDACS for Embedded Real Time Application
On-line IDACS for Embedded Real Time Application
 
Beagle board
Beagle boardBeagle board
Beagle board
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment Templates
 
ICS security
ICS securityICS security
ICS security
 
Presentation1 160729072733
Presentation1 160729072733Presentation1 160729072733
Presentation1 160729072733
 
IoT-A ARM
IoT-A ARMIoT-A ARM
IoT-A ARM
 
Sdn Networking
Sdn NetworkingSdn Networking
Sdn Networking
 
Design & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOTDesign & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOT
 

Similar a Comparative analysis of traditional scada systems and io t implemented scada

SCADA Systems Vulnerabilities and Blockchain Technology
SCADA Systems Vulnerabilities and Blockchain TechnologySCADA Systems Vulnerabilities and Blockchain Technology
SCADA Systems Vulnerabilities and Blockchain Technology
ijtsrd
 
Scada system architecture, types and applications
Scada system architecture, types and applicationsScada system architecture, types and applications
Scada system architecture, types and applications
Uchi Pou
 

Similar a Comparative analysis of traditional scada systems and io t implemented scada (20)

Embedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control SystemEmbedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control System
 
SCADA Systems Vulnerabilities and Blockchain Technology
SCADA Systems Vulnerabilities and Blockchain TechnologySCADA Systems Vulnerabilities and Blockchain Technology
SCADA Systems Vulnerabilities and Blockchain Technology
 
elements of scada.pptx
elements of scada.pptxelements of scada.pptx
elements of scada.pptx
 
Industrial Iot and Legacy Scada system - the solution for future ?
Industrial Iot and Legacy Scada system - the solution for future ?Industrial Iot and Legacy Scada system - the solution for future ?
Industrial Iot and Legacy Scada system - the solution for future ?
 
What is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoTWhat is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoT
 
An Internet Based Interactive Data Acquisition System
An Internet Based Interactive Data Acquisition System An Internet Based Interactive Data Acquisition System
An Internet Based Interactive Data Acquisition System
 
Scada pdf
Scada pdfScada pdf
Scada pdf
 
Scada & hmi
Scada & hmiScada & hmi
Scada & hmi
 
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and DemonstrationIoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
 
SCADA.pptx supervisory control and data aquasition
SCADA.pptx supervisory control and data aquasitionSCADA.pptx supervisory control and data aquasition
SCADA.pptx supervisory control and data aquasition
 
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
 
SCADA Assignment.pptx
SCADA Assignment.pptxSCADA Assignment.pptx
SCADA Assignment.pptx
 
Internet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsInternet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, Applications
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Scada system architecture, types and applications
Scada system architecture, types and applicationsScada system architecture, types and applications
Scada system architecture, types and applications
 
IoT Notes Syllabus .pdf
IoT Notes Syllabus .pdfIoT Notes Syllabus .pdf
IoT Notes Syllabus .pdf
 
SCADA
SCADASCADA
SCADA
 
IJSRED-V2I2P15
IJSRED-V2I2P15IJSRED-V2I2P15
IJSRED-V2I2P15
 
Scada
ScadaScada
Scada
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Comparative analysis of traditional scada systems and io t implemented scada

  • 1. Ram Dhobley, Chopde Abhay, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 1217  ISSN: 2454-132X Impact factor: 4.295 (Volume 3, Issue 6) Available online at www.ijariit.com Comparative Analysis of Traditional SCADA Systems and IOT Implemented SCADA Ram Dhobley Vishwakarma Institute of Technology, Pune, Maharashtra ramdhobley25@gmail.com Abhay Chopde Vishwakarma Institute of Technology, Pune, Maharashtra abhay.chopade@vit.edu Abstract: SCADA system stands as an abbreviation of Supervisory Control and Data Acquisition. It focuses on the supervisory level and is not a full control system. It is a computer system which gathers and analyses real time data. They are useful in monitoring and controlling a plant or industrial equipment like telecommunications, water, waste control, energy, oil-gas refining, and transportation. It gathers information about a mishap, transfers it back to a central site and alerts the home station about the mishap, carries out necessary analysis and control, like determining if the mishap occurred is critical, and display the information in a logical and organized fashion. They can be relatively as simple as a system which monitors environmental conditions of a small office building, or as complex as a system that monitors all the activity in a nuclear power plant. IOT acts as a complementary setup to SCADA. SCADA system generates information which acts as one of the data sources for IOT. While the focus of SCADA on monitoring and control, the focus of IOT is firmly on analyzing machine data to improve productivity. Keywords: Architecture, Communication, Vulnerabilities. I. INTRODUCTION SCADA systems are used to control dispersed. The integration of data acquisition systems with data transmission systems and HMI software is done by the SCADA to provide a centralized monitoring and control system for multiple process inputs and outputs. SCADA systems are designed to collect field information, transfer it to a central computer facility (via different communication protocols), and display the information to the operator graphically or textually (via Human Machine Interface), and thus allow an operator to monitor or control an entire system from a central location in real time. Based on the sophistication and setup of the individual system, control of any individual system, operation, or task can be automatic. SCADA systems consist of both hardware and software. The Internet of things (IOT) is made up of a network of physical devices connected via electronic embedding, software setups, sensors-actuators, network connectivity which act together for the objects to connect and exchange data. Each ‘thing’ is uniquely identifiable through its embedded computing system and is also able to inter-operate within the existing Internet infrastructure. IOT allows objects to be sensed or controlled remotely across different networking infrastructures. Thus it creates opportunities for more direct integration of the physical world into computer-based systems, which results in improved efficiency, accuracy and economic benefit and also cuts down on human intervention. When IOT is augmented with sensors and actuators, the technology becomes an instance of the more general class of cyber-physical systems, which also encompasses technologies such as smart grids, virtual power plants, smart homes, intelligent transportation and smart cities among many others
  • 2. Ram Dhobley, Chopde Abhay, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 1218 II. ARCHITECTURE SCADA system is a centralized system, a software package that is positioned on top of hardware. A supervisory system gathers data on the process and sends the commands control to the process. The SCADA is a remote terminal unit which is also known as RTU, which performs most control actions automatically along with PLCs. The RTUs consist of the programmable logic converter which can be preset manually. Overall, SCADA system can be classified into two parts which are Clint layer (responsible for the man machine interaction) and Data server layer (responsible to handle the process data activities). The SCADA station refers to the servers composed of a single PC. The data servers communicate with devices in the field through process controllers like PLCs or RTUs. The connection of PLC to the data servers is made either directly or via networks or buses. The SCADA system utilizes a WAN and LAN networks, which consists of internet protocols used for communication between the master station and devices. The RTUs convert the sensor signals to digital data and sends digital data to master, according to the master feedback received by the RTU, it applies the electrical signal to relays. RTUs or PLCs perform most of the monitoring and control operations. Fig: Block Diagram for Architecture of SCADA In IOT, sensors collect data from the environment or object under measurement and turn it into useful data. The data from the sensors start in analog form, which needs to be aggregated and converted into digital streams. Data acquisition systems (DAS) perform these data aggregation and conversion functions. The DAS joins the sensor network, groups the outputs, and performs the ADC conversion. The Internet gateway receives the aggregated and digitized data and routes it over Wi-Fi, wired LANs, or the Internet, to Stage 3 systems for further processing. Post data digitization and aggregation, the data may require further processing before it enters the data center. Edge IT systems perform post processing. Data that needs more in-depth processing where feedback doesn't have to be immediate, is forwarded to the physical data center or cloud-based systems, where more powerful IT systems can analyze, manage, and securely store the data. The processing type which gets executed at this stage remains the same for the platform. III. COMMUNICATION Server-client and server-server communication is in general on a publish-subscribe and event-driven basis and uses a TCP/IP protocol. The controllers are then polled at a user defined polling rate, which is changes from parameter to parameter. The controllers pass the requested parameters to the data servers. Time stamping of the process parameters is typically performed in the controllers and this time-stamp is taken over by the data server. For controller and communication protocol to support the unsolicited data transfer, the products must support this too. They provide communication drivers for most of the common PLCs and widely used field-buses. VME, on the other hand, is generally not supported. A single data server can support multiple communications because of the presence of multiple slots for interface cards. The configuration data are stored in logically centralized but physically distributed database that is generally of a proprietary format. The RTDB resides in the memory of the servers in a proprietary format for performance reasons. The archive and logging format are usually also proprietary.
  • 3. Ram Dhobley, Chopde Abhay, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 1219 In IOT, the “Thing” must communicate through the Internet to be considered an “IOT” node, and it must also adhere to the Internet Engineering Task Force’s (IETF) Internet Protocol Suite. Devices must communicate with each other (D2D). Device data should then be collected to be sent to the server infrastructure (D2S). That server infrastructure has to share device data (S2S), possibly providing it back to devices, to analysis programs, or to people. From 30,000 feet, the protocols can be described in this framework as: 1. MQTT: a protocol for collecting device data and communicating it to servers (D2S) 2. XMPP: a protocol best for connecting devices to people, a special case of the D2S pattern, since people are connected to the servers 3. DDS: a fast bus for integrating intelligent machines (D2D) 4. AMQP: a queuing system designed to connect servers to each other (S2S) IV. VULNERABILITIES SCADA Lack of monitoring. Without active network monitoring, it is impossible to detect suspicious activity, identify potential threats, and quickly react to cyber-attacks. Slow updates. With advancement, SCADA systems become more vulnerable to new attacks. Maintenance of the firmware and the software updates may become inconvenient over time but is necessary for maximum protection. Lack of knowledge about devices. Connecting devices to a SCADA System allows for remote monitoring and updates, this means the knowledge about network connected devices is often incomplete. Not understanding traffic. Managers need to know what type of traffic is going through their networks. Only then they can make informed decisions about how to respond to potential threats. Authentication holes. Authentication solutions can easily be defeated due to common unsafe practices such as poor passwords, username sharing, and weak authentication. IOT Insecure web interface: Web server/app, there may have flaws in the code that allow the device to be attacked. Ineffective authentication/authorization: Operability of many devices with their default (insecure) settings is a factor of concern. Insecure network services: if maintenance services are on open, insecure or vulnerable ports they are potential security holes. Lack of transport encryption: Device sending private information over an insecure protocol would allow anyone to read it. Privacy concerns: unencrypted information puts your personal information is at risk. Insecure cloud interface: Cloud management interface this represents another potential security weakness. Insecure software/firmware: The device can be patched to address discovered vulnerabilities, also, installing certain software’s might brick the device. V. CONCLUSION Both the traditional SCADA systems and IOT implemented SCADA have their sets of advantages and vulnerabilities. It is being estimated that by 2020, 50 billion devices or /things will be connected to the internet. The dynamics of entire automation industry is changing, and this is the dawn of a new age of industrial revolution, or industry 4.0. Industry 4.0 is the name of the era responsible for the emerging trend automation and data exchange in manufacturing technologies. It includes cyber-physical systems, the Internet of things, cloud computing and cognitive computing. By working on the vulnerabilities possessed by IOT devices, we can very truly shift from a traditionally implemented SCADA to an IOT implemented one and make Industry 4.0 a living reality.