Abstract

Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

Highlights

  • Supervisory Control And Data Acquisition (SCADA) systems are computer-based IndustrialControl Systems (ICSs) employed to gather and analyze in real time for monitoring and controlSensors 2016, 16, 821; doi:10.3390/s16060821 www.mdpi.com/journal/sensorsSensors 2016, 16, 821 purposes critical information collected from diverse equipment

  • The RSA algorithm is not appropriate for SCADA/DNP3 broadcasting due to number of keys required in transmission, but it is appropriate for unicasing [14,15,16,17,18], the algorithm selection is made based on communication requirements or/and requirements of algorithms from the arena of cryptography

  • SCADA systems have employed proprietary protocols to carry out their communication between the sensors/devices that are configured and networked as process automation systems

Read more

Summary

Introduction

Supervisory Control And Data Acquisition (SCADA) systems are computer-based IndustrialControl Systems (ICSs) employed to gather and analyze in real time for monitoring and controlSensors 2016, 16, 821; doi:10.3390/s16060821 www.mdpi.com/journal/sensorsSensors 2016, 16, 821 purposes critical information collected from diverse equipment. Due to the dramatic changes in Information Technology (IT), SCADA systems can be deployed, and their remote field devices controlled and monitored through wireless networks, which increases the potential to access, gather, and examine critical information for industrial automation [1,2,3,4]. Wireless SCADA systems can save the engineering costs often required for SCADA wired networks such as large-scale surveys, wire installation and maintenance. They provide increased transmission access to gather information from wirelessly connected field devices [5,6,7]. In a few other cases wired networks are not feasible due to the need to provide multiple access stations or are limited by the specific locations of sensors and equipment

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.