A low-cost remote supervisory control capability is added to a packaging process, in which a low-voltage signal is used to communicate between a distant HMI control panel and a PLC network using the AC power line as a communication medium. The network is a star-topology and uses a Mater-slave protocol. Remote Supervisory control is achieved using a user-defined toolbox of control functions. In this system, a Programmable Logic Controller (PLC) is used to control a process and interface with the operator through a Human Machine Interface (HMI) Panel. A star topology ethernet network is used to connect the PLCs and the HMI panel.
more »
« less
Low-Cost Remote Supervisory Control System for an Industrial Process using Profibus and Profinet
In this paper we demonstrate two applications of a low-cost remote supervisory control and data acquisition system in two models. The first model is demonstrated with a Profibus-DP protocol based system in which a master Programmable Logic Controller (PLC) unit with control inputs and display outputs controls the speed and monitors the overload condition of a DC motor that is connected to a slave PLC in real time. In the upgraded model, a Profinet protocol is used to connect PLCs, and a power-line communication link is used to remotely connect the control HMI to the network. In both models, remote Supervisory control is achieved using user-defined control functions that act altogether as a block-oriented function library or toolbox. High levels of performance are achieved in real time control and data acquisition in both models.
more »
« less
- Award ID(s):
- 1801120
- PAR ID:
- 10088812
- Date Published:
- Journal Name:
- 2019 SoutheastCon
- Page Range / eLocation ID:
- 1 to 4
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
null (Ed.)Ensuring the integrity of embedded programmable logic controllers (PLCs) is critical for safe operation of industrial control systems. In particular, a cyber-attack could manipulate control logic running on the PLCs to bring the process of safety-critical application into unsafe states. Unfortunately, PLCs are typically not equipped with hardware support that allows the use of techniques such as remote attestation to verify the integrity of the logic code. In addition, so far remote attestation is not able to verify the integrity of the physical process controlled by the PLC. In this work, we present PAtt, a system that combines remote software attestation with control process validation. PAtt leverages operation permutations—subtle changes in the operation sequences based on integrity measurements—which do not affect the physical process but yield unique traces of sensor readings during execution. By encoding integrity measurements of the PLC’s memory state (software and data) into its control operation, our system allows to remotely verify the integrity of the control logic based on the resulting sensor traces. We implement the proposed system on a real PLC controlling a robot arm, and demonstrate its feasibility. Our implementation enables the detection of attackers that manipulate the PLC logic to change process state and/or report spoofed sensor readings (with an accuracy of 97% against tested attacks).more » « less
-
This study proposes a novel flexible hybrid state estimation (SE) algorithm when a realistic communication system with its irregularities is taken into account. This system is modelled by the Network Simulator 2 software tool, which is also used to calculate communication delays and packet drop probabilities. Within this setup, the system observability can be predicted, and the proposed SE can decide between using the static SE (SSE) or the discrete Kalman filter plus SSE‐based measurements and time alignment (Forecasting‐aided SE). Flexible hybrid SE (FHSE) incorporates both phasor measurement units and supervisory control and data acquisition‐based measurements, with different time stamps. The proposed FHSE with detailed modelling of the communication system is motivated by: (i) well‐known issues in SSE (time alignment of the measurements, frequent un‐observability for fixed SE time stamps etc.); and (ii) the need to model a realistic communication system (calculated communication delays and packet drop probabilities are a part of the proposed FHSE). Application of the proposed algorithm is illustrated for examples with time‐varying bus load/generation on two IEEE test cases: 14‐bus and 300‐bus.more » « less
-
In recent years, there has been a growing interest in so-called smart cities. These cities use technology to connect and enhance the lives of their citizens. Smart cities use many Internet of Things (loT) devices, such as sensors and video cameras, that are interconnected to provide constant feedback and up-to-date information on everything that is happening. Despite the benefits of these cities, they introduce a numerous new vulnerabilities as well. These smart cities are now susceptible to cyber-attacks that aim to “alter, disrupt, deceive, degrade, or destroy computer systems.” Through the use of an educational and research-based loT test-bed with multiple networking layers and heterogeneous devices connected to simultaneously support networking research, anomaly detection, and security principles, we can pinpoint some of these vulnerabilities. This work will contribute potential solutions to these vulnerabilities that can hopefully be replicated in smart cities around the world. Specifically, in the transportation section of our educational smart city several vulnerabilities in the signal lights, street lights, and the cities train network were discovered. To conduct this research two scenarios were developed. These consisted of inside the network security and network perimeter security. For the latter we were able to find extensive vulnerabilities that would allow an attacker to map the entire smart city sub-network. Solutions to this problem are outlined that utilize an Intrusion Detection System and Port Mirroring. However, while we were able to exploit the city's Programmable Logic Controller (PLC) once inside the network, it was found that due to dated Supervisory Control and Data Acquisition (SCADA) systems, there were almost no solutions to these exploits.more » « less
-
The supervisory control and data acquisition (SCADA) network in a smart grid requires to be reliable and efficient to transmit real-time data to the controller. Introducing SDN into a SCADA network helps in deploying novel grid control operations, as well as, their management. As the overall network cannot be transformed to have only SDN-enabled devices overnight because of budget constraints, a systematic deployment methodology is needed. In this work, we present a framework, named SDNSynth, that can design a hybrid network consisting of both legacy forwarding devices and programmable SDN-enabled switches. The design satisfies the resiliency requirements of the SCADA network, which are specified with respect to a set of identified threat vectors. The deployment plan primarily includes the best placements of the SDN-enabled switches. The plan may include one or more links to be installed newly. We model and implement the SDNSynth framework that includes the satisfaction of several requirements and constraints involved in the resilient operation of the SCADA. It uses satisfiability modulo theories (SMT) for encoding the synthesis model and solving it. We demonstrate SDNSynth on a case study and evaluate its performance on different synthetic SCADA systems.more » « less
An official website of the United States government

