scholarly journals Advanced Supervision of Smart Buildings Using a Novel Open-Source Control Platform

Sensors ◽  
2020 ◽  
Vol 21 (1) ◽  
pp. 160
Author(s):  
Peter Minarčík ◽  
Hynek Procházka ◽  
Martin Gulan

Gathering data and monitoring performance are at the heart of energy efficiency and comfort securing strategies in smart buildings. Therefore, it is crucial to present the obtained data to the user or administrator of such a building in an appropriate form. Moreover, evaluating the data in real time not only helps to maintain comfort, but also allows for a timely response from the user or operator to a possible fault. Continuous online monitoring and analysis of process behaviour, which is referred to as advanced supervision, is addressed in this paper by developing a procedure that will form an artificial operator autonomously supervising process. After introducing several techniques that are used for signal analysis, we propose an approach to advanced supervision of processes in smart buildings or other industrial control systems. The developed procedure is implemented on a control system platform that is particularly suitable for this purpose. Moreover, this platform includes a framework that provides support for the implementation of advanced control techniques and it is based on open-source tools, which is rarely seen in industrial applications. The developed advanced supervision procedure has been tested in simulation as well as in a practical case study using a real two-storey family house.

2019 ◽  
Vol 11 (3) ◽  
pp. 66 ◽  
Author(s):  
Samer Jaloudi

Most industrial and SCADA-like (supervisory control and data acquisition) systems use proprietary communication protocols, and hence interoperability is not fulfilled. However, the MODBUS TCP is an open de facto standard, and is used for some automation and telecontrol systems. It is based on a polling mechanism and follows the synchronous request–response pattern, as opposed to the asynchronous publish–subscribe pattern. In this study, polling-based and event-based protocols are investigated to realize an open and interoperable Industrial Internet of Things (IIoT) environment. Many Internet of Things (IoT) protocols are introduced and compared, and the message queuing telemetry transport (MQTT) is chosen as the event-based, publish–subscribe protocol. The study shows that MODBUS defines an optimized message structure in the application layer, which is dedicated to industrial applications. In addition, it shows that an event-oriented IoT protocol complements the MODBUS TCP but cannot replace it. Therefore, two scenarios are proposed to build the IIoT environment. The first scenario is to consider the MODBUS TCP as an IoT protocol, and build the environment using the MODBUS TCP on a standalone basis. The second scenario is to use MQTT in conjunction with the MODBUS TCP. The first scenario is efficient and complies with most industrial applications where the request–response pattern is needed only. If the publish–subscribe pattern is needed, the MQTT in the second scenario complements the MODBUS TCP and eliminates the need for a gateway; however, MQTT lacks interoperability. To maintain a homogeneous message structure for the entire environment, industrial data are organized using the structure of MODBUS messages, formatted in the UTF-8, and then transferred in the payload of an MQTT publish message. The open and interoperable environment can be used for Internet SCADA, Internet-based monitoring, and industrial control systems.


Author(s):  
Kyle Schroeder ◽  
Aftab A. Khan ◽  
James Moyne ◽  
Dawn Tilbury

Integrating traditionally separate industrial control systems can derive factory-wide benefits by leveraging more information about the ongoing process. This paper shows that connecting a networked safety system and a process control system leads to an extension of the individual benefits provided by each system. A safety system gains the ability to protect not only the machines and workers but also the product that is being built. A diagnostic system can also raise safety alarms when a process variable is outside the expected range of safe operation. This connection is explored to determine the practical impact of different methods of integration on machining and system processes. Three integration methods are possible depending on which portions of the system can be classified as “safe”. A case study integrating a diagnostics system as a non-safe sensor proves that this connection, when it is implemented on an industrial testbed, provides all of the benefits described and does not require significant changes to control software.


2020 ◽  
Author(s):  
Κωνσταντίνος Κατσιγιάννης

Στην παρούσα διατριβή αντιμετωπίζουμε το πρόβλημα της ασφάλειας των βιομηχανικών συστημάτων ελέγχου (Industrial Control Systems, ICS) και ειδικότερα των δικτυωμένων κόμβων τους, όπως τα συστήματα SCADA και PLC. Η διατριβή εστιάζει στην ανάπτυξη και υλοποίηση μεθοδολογίας ελέγχου που αφορά τον έλεγχο τρωτότητας υλοποιήσεων πρωτοκόλλων βιομηχανικών δικτύων. Οι μέθοδοι που προτείνονται, βασίζονται στην τεχνική fuzz testing, καθώς η τεχνική αυτή είναι ιδιαίτερα αποτελεσματική μέχρι σήμερα στην αποκάλυψη σφαλμάτων σε ένα ευρύ φάσμα εφαρμογών λογισμικού και πρωτοκόλλων. Προτείνουμε μια μεθοδολογία fuzz testing για έλεγχο ασφάλειας υλοποιήσεων πρωτοκόλλων ICS που επεκτείνει τις ήδη υπάρχουσες προσεγγίσεις και εργαλεία. Η προσέγγιση που ακολουθούμε προσαρμόζεται δυναμικά προσδιορίζοντας τις λειτουργίες και χαρακτηριστικά της ελεγχόμενης υλοποίησης. Στη συνέχεια αναπτύσσει συστηματικά δοκιμαστικές ακολουθίες, μειώνοντας τον χώρο δοκιμών μέσω διαμερισμού του εύρους τιμών σε κάθε πεδίο και εστιάζοντας στην εξέταση τιμών που έχουν αυξημένη πιθανότητα να προκαλέσουν σφάλματα. Προς αποτίμηση της μεθοδολογίας, παρουσιάζεται ως μελέτη περίπτωσης (case study) ο MTF-Storm, ένας προσαρμοσμένων χαρακτηριστικών (custom) πλήρως αυτοματοποιημένος ελεγκτής (tester, fuzzer), για έλεγχο σε βιομηχανικές συσκευές που υποστηρίζουν το πρωτόκολλο Modbus/TCP. Εξετάζονται πειραματικά ένας αριθμός υλοποιήσεων του πρωτοκόλλου και παρουσιάζονται τα αποτελέσματα και ευρήματα από την αποτίμηση του εργαλείου. Η διατριβή ολοκληρώνεται με την παρουσίαση συγκριτικών αποτελεσμάτων με άλλες προσεγγίσεις (εργαλεία fuzzing) που αναδεικνύουν τα πλεονεκτήματα της προτεινόμενης μεθοδολογίας.


Cybersecurity ◽  
2021 ◽  
Vol 4 (1) ◽  
Author(s):  
Sabarathinam Chockalingam ◽  
Wolter Pieters ◽  
André Teixeira ◽  
Pieter van Gelder

AbstractWater management infrastructures such as floodgates are critical and increasingly operated by Industrial Control Systems (ICS). These systems are becoming more connected to the internet, either directly or through the corporate networks. This makes them vulnerable to cyber-attacks. Abnormal behaviour in floodgates operated by ICS could be caused by both (intentional) attacks and (accidental) technical failures. When operators notice abnormal behaviour, they should be able to distinguish between those two causes to take appropriate measures, because for example replacing a sensor in case of intentional incorrect sensor measurements would be ineffective and would not block corresponding the attack vector. In the previous work, we developed the attack-failure distinguisher framework for constructing Bayesian Network (BN) models to enable operators to distinguish between those two causes, including the knowledge elicitation method to construct the directed acyclic graph and conditional probability tables of BN models. As a full case study of the attack-failure distinguisher framework, this paper presents a BN model constructed to distinguish between attacks and technical failures for the problem of incorrect sensor measurements in floodgates, addressing the problem of floodgate operators. We utilised experts who associate themselves with the safety and/or security community to construct the BN model and validate the qualitative part of constructed BN model. The constructed BN model is usable in water management infrastructures to distinguish between intentional attacks and accidental technical failures in case of incorrect sensor measurements. This could help to decide on appropriate response strategies and avoid further complications in case of incorrect sensor measurements.


Author(s):  
Uchenna Daniel Ani ◽  
Jeremy McKendrick Watson ◽  
Madeline Carr ◽  
Al Cook ◽  
Jason RC Nurse

Simulation can provide a useful means to understand issues linked to industrial network operations. For transparent, collaborative, cost-effective solutions development, and to attract the broadest interest base, simulation is critical and open source suggested, because it costs less to access, install, and use. This study contributes new insights from security and functionality characteristics metrics to underscore the use and effectiveness of open source simulators. Several open source simulators span applications in communications and wireless sensor networks, industrial control systems, and the Industrial Internet of Things. Some drivers for their use span are as follows: supported license types; programming languages; operating systems platforms; user interface types; documentation and communication types; citations; code commits; and number of contributors. Research in these simulators is built around performance and optimization relative to flexibility, scalability, mobility, and active user support. No single simulator addresses all these conceivable characteristics. In addition to modeling contexts that match real-world scenarios and issues, an effective open source simulator needs to demonstrate credibility, which can be gained partly through actively engaging experts from interdisciplinary teams along with user contributions integrated under tight editorial controls. Government-led policies and regulations are also necessary to support their wider awareness and more productive use for real-world purposes.


Electronics ◽  
2020 ◽  
Vol 9 (4) ◽  
pp. 572 ◽  
Author(s):  
Jiawen Xiong ◽  
Gang Zhu ◽  
Yanhong Huang ◽  
Jianqi Shi

Programmable logic controllers (PLCs) are special embedded computers that are widely used in industrial control systems. To ensure the safety of industrial control systems, it is necessary to verify the correctness of PLCs. Formal verification is considered to be an effective method to verify whether a PLC program conforms to its specifications, but the expertise requirements and the complexity make it hard to be mastered and widely applied. In this paper, we present a specification-mining-based verification approach for IEC 61131-3 PLC programs. It only requires users to review specifications mined from the program behaviors instead of model checking for specified specifications, which can greatly improve the efficiency of safety verification and is much easier for control system engineers to use. Moreover, we implement a proof-of-concept tool named PLCInspector that supports directly mining LTL specifications and data invariants from PLC programs. Two examples and one real-life case study are presented to illustrate its practicability and efficiency. In addition, a comparison with the existing verification approaches for PLC programs is discussed.


Sign in / Sign up

Export Citation Format

Share Document