Font Size: a A A

Research On The 12kV Converting Station In Supervisory Control And Data Acquisition

Posted on:2018-11-16Degree:MasterType:Thesis
Institution:UniversityCandidate:REJEPOVA EJESHFull Text:PDF
GTID:2348330518466787Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Several SCADA systems have been implemented and established in past years,but main problems are still existing,such as summary high cost of the system,unsafe connection,and low speed of communication.So,research purpose of this thesis is a creating the model of perfect low-cost large distribution system,which will be fast and safe enough to manage the system in real-time and fix the problems in case of alarms.Over the past two years,there was a scientific research group in Alaska which research laying on the 12 kV distributed substation,but still research is not complete for now.This thesis describes the research on SCADA control system,threats from outer source,vulnerabilities and mitigation methods.Then I’ll proof that the information and measurements presented in this thesis is very helpful for network researchers and security professionals in collection of different information about their SCADA system.This thesis introduces the model and equipment which are need to create the SCADA system.Also this thesis introduce to us an implementation of the creation a large distributed SCADA network,its models and methods,and gives the knowns of necessary equipment and system model in distributed SCADA network system.And then explain the necessary technical equipment,features,protocols(Modbus,DNP3,DeviceNet standard,ControlNet,etc.)and components used by these kind systems.Lately,this thesis describes the security of 12 kV SCADA system of power station and network reconnaissance,the security threat of SCADA in power system,and the application of genetic algorithm to detect the loopholes in distributed SCADA system.At last,I also measured the effectiveness of different reconnaissance methods in a SCADA environment and finally make a prototype for network exploration toll.
Keywords/Search Tags:SCADA, distributed network, SCADA protocol, security of automated systems
PDF Full Text Request
Related items