SlideShare a Scribd company logo
Ram Dhobley, Chopde Abhay, International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 1217

ISSN: 2454-132X
Impact factor: 4.295
(Volume 3, Issue 6)
Available online at www.ijariit.com
Comparative Analysis of Traditional SCADA Systems and IOT
Implemented SCADA
Ram Dhobley
Vishwakarma Institute of Technology, Pune,
Maharashtra
ramdhobley25@gmail.com
Abhay Chopde
Vishwakarma Institute of Technology, Pune,
Maharashtra
abhay.chopade@vit.edu
Abstract: SCADA system stands as an abbreviation of Supervisory Control and Data Acquisition. It focuses on the supervisory
level and is not a full control system. It is a computer system which gathers and analyses real time data. They are useful in
monitoring and controlling a plant or industrial equipment like telecommunications, water, waste control, energy, oil-gas
refining, and transportation. It gathers information about a mishap, transfers it back to a central site and alerts the home station
about the mishap, carries out necessary analysis and control, like determining if the mishap occurred is critical, and display the
information in a logical and organized fashion. They can be relatively as simple as a system which monitors environmental
conditions of a small office building, or as complex as a system that monitors all the activity in a nuclear power plant.
IOT acts as a complementary setup to SCADA. SCADA system generates information which acts as one of the data sources for
IOT. While the focus of SCADA on monitoring and control, the focus of IOT is firmly on analyzing machine data to improve
productivity.
Keywords: Architecture, Communication, Vulnerabilities.
I. INTRODUCTION
SCADA systems are used to control dispersed. The integration of data acquisition systems with data transmission systems and HMI
software is done by the SCADA to provide a centralized monitoring and control system for multiple process inputs and outputs.
SCADA systems are designed to collect field information, transfer it to a central computer facility (via different communication
protocols), and display the information to the operator graphically or textually (via Human Machine Interface), and thus allow an
operator to monitor or control an entire system from a central location in real time. Based on the sophistication and setup of the
individual system, control of any individual system, operation, or task can be automatic. SCADA systems consist of both hardware
and software.
The Internet of things (IOT) is made up of a network of physical devices connected via electronic embedding, software setups,
sensors-actuators, network connectivity which act together for the objects to connect and exchange data. Each ‘thing’ is uniquely
identifiable through its embedded computing system and is also able to inter-operate within the existing Internet infrastructure. IOT
allows objects to be sensed or controlled remotely across different networking infrastructures. Thus it creates opportunities for more
direct integration of the physical world into computer-based systems, which results in improved efficiency, accuracy and economic
benefit and also cuts down on human intervention. When IOT is augmented with sensors and actuators, the technology becomes an
instance of the more general class of cyber-physical systems, which also encompasses technologies such as smart grids, virtual
power plants, smart homes, intelligent transportation and smart cities among many others
Ram Dhobley, Chopde Abhay, International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 1218
II. ARCHITECTURE
SCADA system is a centralized system, a software package that is positioned on top of hardware. A supervisory system gathers data
on the process and sends the commands control to the process. The SCADA is a remote terminal unit which is also known as RTU,
which performs most control actions automatically along with PLCs. The RTUs consist of the programmable logic converter which
can be preset manually. Overall, SCADA system can be classified into two parts which are Clint layer (responsible for the man
machine interaction) and Data server layer (responsible to handle the process data activities). The SCADA station refers to the
servers composed of a single PC. The data servers communicate with devices in the field through process controllers like PLCs or
RTUs. The connection of PLC to the data servers is made either directly or via networks or buses. The SCADA system utilizes a
WAN and LAN networks, which consists of internet protocols used for communication between the master station and devices. The
RTUs convert the sensor signals to digital data and sends digital data to master, according to the master feedback received by the
RTU, it applies the electrical signal to relays. RTUs or PLCs perform most of the monitoring and control operations.
Fig: Block Diagram for Architecture of SCADA
In IOT, sensors collect data from the environment or object under measurement and turn it into useful data. The data from the
sensors start in analog form, which needs to be aggregated and converted into digital streams. Data acquisition systems (DAS)
perform these data aggregation and conversion functions. The DAS joins the sensor network, groups the outputs, and performs the
ADC conversion. The Internet gateway receives the aggregated and digitized data and routes it over Wi-Fi, wired LANs, or the
Internet, to Stage 3 systems for further processing. Post data digitization and aggregation, the data may require further processing
before it enters the data center. Edge IT systems perform post processing. Data that needs more in-depth processing where feedback
doesn't have to be immediate, is forwarded to the physical data center or cloud-based systems, where more powerful IT systems can
analyze, manage, and securely store the data. The processing type which gets executed at this stage remains the same for the
platform.
III. COMMUNICATION
Server-client and server-server communication is in general on a publish-subscribe and event-driven basis and uses a TCP/IP
protocol. The controllers are then polled at a user defined polling rate, which is changes from parameter to parameter. The controllers
pass the requested parameters to the data servers. Time stamping of the process parameters is typically performed in the controllers
and this time-stamp is taken over by the data server. For controller and communication protocol to support the unsolicited data
transfer, the products must support this too. They provide communication drivers for most of the common PLCs and widely used
field-buses. VME, on the other hand, is generally not supported. A single data server can support multiple communications because
of the presence of multiple slots for interface cards. The configuration data are stored in logically centralized but physically
distributed database that is generally of a proprietary format. The RTDB resides in the memory of the servers in a proprietary format
for performance reasons. The archive and logging format are usually also proprietary.
Ram Dhobley, Chopde Abhay, International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 1219
In IOT, the “Thing” must communicate through the Internet to be considered an “IOT” node, and it must also adhere to the Internet
Engineering Task Force’s (IETF) Internet Protocol Suite. Devices must communicate with each other (D2D). Device data should
then be collected to be sent to the server infrastructure (D2S). That server infrastructure has to share device data (S2S), possibly
providing it back to devices, to analysis programs, or to people. From 30,000 feet, the protocols can be described in this framework
as:
1. MQTT: a protocol for collecting device data and communicating it to servers (D2S)
2. XMPP: a protocol best for connecting devices to people, a special case of the D2S pattern, since people are connected to
the servers
3. DDS: a fast bus for integrating intelligent machines (D2D)
4. AMQP: a queuing system designed to connect servers to each other (S2S)
IV. VULNERABILITIES
SCADA
Lack of monitoring. Without active network monitoring, it is impossible to detect suspicious activity, identify potential
threats, and quickly react to cyber-attacks.
Slow updates. With advancement, SCADA systems become more vulnerable to new attacks. Maintenance of the
firmware and the software updates may become inconvenient over time but is necessary for maximum protection.
Lack of knowledge about devices. Connecting devices to a SCADA System allows for remote monitoring and updates,
this means the knowledge about network connected devices is often incomplete.
Not understanding traffic. Managers need to know what type of traffic is going through their networks. Only then they
can make informed decisions about how to respond to potential threats.
Authentication holes. Authentication solutions can easily be defeated due to common unsafe practices such as poor
passwords, username sharing, and weak authentication.
IOT
Insecure web interface: Web server/app, there may have flaws in the code that allow the device to be attacked.
Ineffective authentication/authorization: Operability of many devices with their default (insecure) settings is a factor
of concern.
Insecure network services: if maintenance services are on open, insecure or vulnerable ports they are potential security
holes.
Lack of transport encryption: Device sending private information over an insecure protocol would allow anyone to
read it.
Privacy concerns: unencrypted information puts your personal information is at risk.
Insecure cloud interface: Cloud management interface this represents another potential security weakness.
Insecure software/firmware: The device can be patched to address discovered vulnerabilities, also, installing certain
software’s might brick the device.
V. CONCLUSION
Both the traditional SCADA systems and IOT implemented SCADA have their sets of advantages and vulnerabilities. It is being
estimated that by 2020, 50 billion devices or /things will be connected to the internet. The dynamics of entire automation industry
is changing, and this is the dawn of a new age of industrial revolution, or industry 4.0. Industry 4.0 is the name of the era responsible
for the emerging trend automation and data exchange in manufacturing technologies. It includes cyber-physical systems, the Internet
of things, cloud computing and cognitive computing. By working on the vulnerabilities possessed by IOT devices, we can very truly
shift from a traditionally implemented SCADA to an IOT implemented one and make Industry 4.0 a living reality.

More Related Content

PDF
Embedded Web Server based Interactive data acquisition and Control System
PPTX
Security Issues in SCADA based Industrial Control Systems
PDF
Energy Meters using Internet of Things Platform
PPTX
Lecture 4
PPTX
Lecture 11
PPTX
Lecture 9
PPTX
Lecture 15
PPTX
Lecture 5
Embedded Web Server based Interactive data acquisition and Control System
Security Issues in SCADA based Industrial Control Systems
Energy Meters using Internet of Things Platform
Lecture 4
Lecture 11
Lecture 9
Lecture 15
Lecture 5

What's hot (19)

PPT
SMART CITY 3 novembre
PPTX
EMKA-Biometric Presentation
DOCX
PPTX
Lecture 17
PDF
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
PDF
715827 dzone-rc-industrial-internet
PDF
Jq2416671672
PDF
Ak4103212215
PDF
Chapter 5 IoT Design methodologies
PPTX
Ppt 3 - IOT logic design
PPT
PDF
On-line IDACS for Embedded Real Time Application
PDF
Beagle board
PPTX
IoT Levels and Deployment Templates
PDF
ICS security
PPTX
Presentation1 160729072733
PPTX
IoT-A ARM
PPTX
Sdn Networking
PDF
Design & Implementation Of Fault Identification In Underground Cables Using IOT
SMART CITY 3 novembre
EMKA-Biometric Presentation
Lecture 17
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
715827 dzone-rc-industrial-internet
Jq2416671672
Ak4103212215
Chapter 5 IoT Design methodologies
Ppt 3 - IOT logic design
On-line IDACS for Embedded Real Time Application
Beagle board
IoT Levels and Deployment Templates
ICS security
Presentation1 160729072733
IoT-A ARM
Sdn Networking
Design & Implementation Of Fault Identification In Underground Cables Using IOT
Ad

Similar to Comparative analysis of traditional scada systems and io t implemented scada (20)

PDF
Embedded Web Server based Interactive data acquisition and Control System
PDF
SCADA Systems Vulnerabilities and Blockchain Technology
PPTX
elements of scada.pptx
PDF
Industrial Iot and Legacy Scada system - the solution for future ?
PPTX
What is SCADA system? SCADA Solutions for IoT
DOCX
An Internet Based Interactive Data Acquisition System
PDF
Scada pdf
PDF
Scada & hmi
PPTX
Supervisory control for data acquisition
PPTX
SCADA system for electrical engineering. Seminor topic
PDF
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
PPTX
SCADA.pptx supervisory control and data aquasition
PPTX
4-DCSBBVVB BMNBMNBNMV BMNBMNBMNVBMNVBVMN .pptx
PDF
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
PPTX
SCADA Assignment.pptx
PPTX
Internet of things (IoT)- Introduction, Utilities, Applications
PPTX
Internet of things
PPTX
Internet of things
PDF
IoT-Unit111111111111111111111111111_1.pdf
PDF
Scada system architecture, types and applications
Embedded Web Server based Interactive data acquisition and Control System
SCADA Systems Vulnerabilities and Blockchain Technology
elements of scada.pptx
Industrial Iot and Legacy Scada system - the solution for future ?
What is SCADA system? SCADA Solutions for IoT
An Internet Based Interactive Data Acquisition System
Scada pdf
Scada & hmi
Supervisory control for data acquisition
SCADA system for electrical engineering. Seminor topic
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
SCADA.pptx supervisory control and data aquasition
4-DCSBBVVB BMNBMNBNMV BMNBMNBMNVBMNVBVMN .pptx
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
SCADA Assignment.pptx
Internet of things (IoT)- Introduction, Utilities, Applications
Internet of things
Internet of things
IoT-Unit111111111111111111111111111_1.pdf
Scada system architecture, types and applications
Ad

Recently uploaded (20)

PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Cloud computing and distributed systems.
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Empathic Computing: Creating Shared Understanding
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
A Presentation on Artificial Intelligence
PDF
Approach and Philosophy of On baking technology
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Electronic commerce courselecture one. Pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Unlocking AI with Model Context Protocol (MCP)
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Spectroscopy.pptx food analysis technology
Digital-Transformation-Roadmap-for-Companies.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Chapter 3 Spatial Domain Image Processing.pdf
Cloud computing and distributed systems.
“AI and Expert System Decision Support & Business Intelligence Systems”
Spectral efficient network and resource selection model in 5G networks
Encapsulation_ Review paper, used for researhc scholars
Empathic Computing: Creating Shared Understanding
NewMind AI Weekly Chronicles - August'25-Week II
A Presentation on Artificial Intelligence
Approach and Philosophy of On baking technology
The AUB Centre for AI in Media Proposal.docx
Electronic commerce courselecture one. Pdf

Comparative analysis of traditional scada systems and io t implemented scada

  • 1. Ram Dhobley, Chopde Abhay, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 1217  ISSN: 2454-132X Impact factor: 4.295 (Volume 3, Issue 6) Available online at www.ijariit.com Comparative Analysis of Traditional SCADA Systems and IOT Implemented SCADA Ram Dhobley Vishwakarma Institute of Technology, Pune, Maharashtra ramdhobley25@gmail.com Abhay Chopde Vishwakarma Institute of Technology, Pune, Maharashtra abhay.chopade@vit.edu Abstract: SCADA system stands as an abbreviation of Supervisory Control and Data Acquisition. It focuses on the supervisory level and is not a full control system. It is a computer system which gathers and analyses real time data. They are useful in monitoring and controlling a plant or industrial equipment like telecommunications, water, waste control, energy, oil-gas refining, and transportation. It gathers information about a mishap, transfers it back to a central site and alerts the home station about the mishap, carries out necessary analysis and control, like determining if the mishap occurred is critical, and display the information in a logical and organized fashion. They can be relatively as simple as a system which monitors environmental conditions of a small office building, or as complex as a system that monitors all the activity in a nuclear power plant. IOT acts as a complementary setup to SCADA. SCADA system generates information which acts as one of the data sources for IOT. While the focus of SCADA on monitoring and control, the focus of IOT is firmly on analyzing machine data to improve productivity. Keywords: Architecture, Communication, Vulnerabilities. I. INTRODUCTION SCADA systems are used to control dispersed. The integration of data acquisition systems with data transmission systems and HMI software is done by the SCADA to provide a centralized monitoring and control system for multiple process inputs and outputs. SCADA systems are designed to collect field information, transfer it to a central computer facility (via different communication protocols), and display the information to the operator graphically or textually (via Human Machine Interface), and thus allow an operator to monitor or control an entire system from a central location in real time. Based on the sophistication and setup of the individual system, control of any individual system, operation, or task can be automatic. SCADA systems consist of both hardware and software. The Internet of things (IOT) is made up of a network of physical devices connected via electronic embedding, software setups, sensors-actuators, network connectivity which act together for the objects to connect and exchange data. Each ‘thing’ is uniquely identifiable through its embedded computing system and is also able to inter-operate within the existing Internet infrastructure. IOT allows objects to be sensed or controlled remotely across different networking infrastructures. Thus it creates opportunities for more direct integration of the physical world into computer-based systems, which results in improved efficiency, accuracy and economic benefit and also cuts down on human intervention. When IOT is augmented with sensors and actuators, the technology becomes an instance of the more general class of cyber-physical systems, which also encompasses technologies such as smart grids, virtual power plants, smart homes, intelligent transportation and smart cities among many others
  • 2. Ram Dhobley, Chopde Abhay, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 1218 II. ARCHITECTURE SCADA system is a centralized system, a software package that is positioned on top of hardware. A supervisory system gathers data on the process and sends the commands control to the process. The SCADA is a remote terminal unit which is also known as RTU, which performs most control actions automatically along with PLCs. The RTUs consist of the programmable logic converter which can be preset manually. Overall, SCADA system can be classified into two parts which are Clint layer (responsible for the man machine interaction) and Data server layer (responsible to handle the process data activities). The SCADA station refers to the servers composed of a single PC. The data servers communicate with devices in the field through process controllers like PLCs or RTUs. The connection of PLC to the data servers is made either directly or via networks or buses. The SCADA system utilizes a WAN and LAN networks, which consists of internet protocols used for communication between the master station and devices. The RTUs convert the sensor signals to digital data and sends digital data to master, according to the master feedback received by the RTU, it applies the electrical signal to relays. RTUs or PLCs perform most of the monitoring and control operations. Fig: Block Diagram for Architecture of SCADA In IOT, sensors collect data from the environment or object under measurement and turn it into useful data. The data from the sensors start in analog form, which needs to be aggregated and converted into digital streams. Data acquisition systems (DAS) perform these data aggregation and conversion functions. The DAS joins the sensor network, groups the outputs, and performs the ADC conversion. The Internet gateway receives the aggregated and digitized data and routes it over Wi-Fi, wired LANs, or the Internet, to Stage 3 systems for further processing. Post data digitization and aggregation, the data may require further processing before it enters the data center. Edge IT systems perform post processing. Data that needs more in-depth processing where feedback doesn't have to be immediate, is forwarded to the physical data center or cloud-based systems, where more powerful IT systems can analyze, manage, and securely store the data. The processing type which gets executed at this stage remains the same for the platform. III. COMMUNICATION Server-client and server-server communication is in general on a publish-subscribe and event-driven basis and uses a TCP/IP protocol. The controllers are then polled at a user defined polling rate, which is changes from parameter to parameter. The controllers pass the requested parameters to the data servers. Time stamping of the process parameters is typically performed in the controllers and this time-stamp is taken over by the data server. For controller and communication protocol to support the unsolicited data transfer, the products must support this too. They provide communication drivers for most of the common PLCs and widely used field-buses. VME, on the other hand, is generally not supported. A single data server can support multiple communications because of the presence of multiple slots for interface cards. The configuration data are stored in logically centralized but physically distributed database that is generally of a proprietary format. The RTDB resides in the memory of the servers in a proprietary format for performance reasons. The archive and logging format are usually also proprietary.
  • 3. Ram Dhobley, Chopde Abhay, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 1219 In IOT, the “Thing” must communicate through the Internet to be considered an “IOT” node, and it must also adhere to the Internet Engineering Task Force’s (IETF) Internet Protocol Suite. Devices must communicate with each other (D2D). Device data should then be collected to be sent to the server infrastructure (D2S). That server infrastructure has to share device data (S2S), possibly providing it back to devices, to analysis programs, or to people. From 30,000 feet, the protocols can be described in this framework as: 1. MQTT: a protocol for collecting device data and communicating it to servers (D2S) 2. XMPP: a protocol best for connecting devices to people, a special case of the D2S pattern, since people are connected to the servers 3. DDS: a fast bus for integrating intelligent machines (D2D) 4. AMQP: a queuing system designed to connect servers to each other (S2S) IV. VULNERABILITIES SCADA Lack of monitoring. Without active network monitoring, it is impossible to detect suspicious activity, identify potential threats, and quickly react to cyber-attacks. Slow updates. With advancement, SCADA systems become more vulnerable to new attacks. Maintenance of the firmware and the software updates may become inconvenient over time but is necessary for maximum protection. Lack of knowledge about devices. Connecting devices to a SCADA System allows for remote monitoring and updates, this means the knowledge about network connected devices is often incomplete. Not understanding traffic. Managers need to know what type of traffic is going through their networks. Only then they can make informed decisions about how to respond to potential threats. Authentication holes. Authentication solutions can easily be defeated due to common unsafe practices such as poor passwords, username sharing, and weak authentication. IOT Insecure web interface: Web server/app, there may have flaws in the code that allow the device to be attacked. Ineffective authentication/authorization: Operability of many devices with their default (insecure) settings is a factor of concern. Insecure network services: if maintenance services are on open, insecure or vulnerable ports they are potential security holes. Lack of transport encryption: Device sending private information over an insecure protocol would allow anyone to read it. Privacy concerns: unencrypted information puts your personal information is at risk. Insecure cloud interface: Cloud management interface this represents another potential security weakness. Insecure software/firmware: The device can be patched to address discovered vulnerabilities, also, installing certain software’s might brick the device. V. CONCLUSION Both the traditional SCADA systems and IOT implemented SCADA have their sets of advantages and vulnerabilities. It is being estimated that by 2020, 50 billion devices or /things will be connected to the internet. The dynamics of entire automation industry is changing, and this is the dawn of a new age of industrial revolution, or industry 4.0. Industry 4.0 is the name of the era responsible for the emerging trend automation and data exchange in manufacturing technologies. It includes cyber-physical systems, the Internet of things, cloud computing and cognitive computing. By working on the vulnerabilities possessed by IOT devices, we can very truly shift from a traditionally implemented SCADA to an IOT implemented one and make Industry 4.0 a living reality.