Remote - Spring 2013 - (Page 6)

Feature Article Key Design Consideration Questions for SCADA Communications Nicky Dibben, VP Marketing 4RF Limited As the pressure upon utilities continues, improving SAIFI and CAIDI statistics, increasing network efficiency while spending less money, squeezing the maximum performance out of assets, the challenge is on to find the areas within the network to focus on for best impact. The distribution grid is one of the key parts of the electricity network where even small improvements in network efficiency and effectiveness can have a huge impact on the bottom line of the business. Distribution automation is a key area of focus for many utilities, as it enables them to improve their business operations without requiring significant behavioural change by customers. With a huge legacy infrastructure and aging assets, where should you start? One key area is in adding monitoring and visibility to this huge distributed asset base, from substations to feeders to pole top reclosers. With access to information about the status of the assets’ current operational state and performance, the utility benefits from reduced downtime, faster service restorations, rapid identification of faults and opportunities for preventative maintenance, as well as a reduction in the number of truck rolls needed. This directly impacts the bottom line of the business. To enable this visibility, an appropriate communications solution needs to be chosen, to increase the distribution network efficiency and effectiveness without compromising the overall business. This article discusses some of the key design considerations that need to be taken into account and how point-to-multipoint narrowband SCADA radio network can successfully address these considerations. These considerations relate to key areas: control and ownership, security, a future-proof approach and manageability. Control and Ownership When monitoring and controlling your critical infrastructure, why trust your communications network to anyone but yourself? While using a publicly available solutions such as GPRS can be easy to implement, this service is not given a critical priority by the telecoms operators. With any major incident or event, the cellular network is vastly overloaded and there is no guarantee that communications will get back to the network operations center. With a privately owned and operated point-to-multipoint radio system, the network is completely within your control. Additional peace of mind is provided by using licensed spectrum bands such as 450 MHz and 900 MHz rather than license-free spectrum. With a privately owned solution, the primary investment is capital expenditure, rather than the ongoing operational expenditure of solutions such as leased lines and GPRS. This means that not only are you in complete control of the expenditure, but also a return on investment can be calculated compared to alternative solutions. Owning and controlling your own communications network means you have complete control over the quality of service and availability of the network as well as complete independence from any third party operator. Security In today’s era of increasing cyber security issues and concerns, a robust and rigorous approach to security is essential. Security is much more than just encryption. The four key pillars of security are: • Integrity: preventing the unauthorized modification of information • Availability: preventing the denial of a service • Confidentiality: preventing the unauthorised access to information • Non-repudiation: preventing the denial of an action It is not enough to address just the most commonly addressed issues of confidentiality and non-repudiation, which can be solved through the use of publicly recognised encryption and authentication standards and algorithms. Reliability is achieved through maintaining integrity and availability and these are the two most important aspects of security to consider for the monitoring and control of critical infrastructure, as documented in the NIST SP 800 82 standard. With regard to integrity, the communications network must ensure that a control message received by a remote asset is the same message that was originally sent to that asset. Catastrophic consequences could result if the system was compromised and a ‘halt’ message changed to a ‘run’ message, for example. With regard to availability, there needs to be an assurance that messages sent to a remote asset actually arrive at their destination. Again, catastrophic consequences could result if an important control message instructing a remote asset to halt never arrives. Public telecoms solutions are not designed taking into account the security measures that are required in the critical infrastructure applications of utilities. In contrast, products and solutions designed specifically for utility applications are able to embody the best practice standards recommended by the regulatory bodies and security standards groups, thus providing a comprehensive range of measures that not only take into account the four key pillars of security but also take into account the different types and sources of attack, both accidental and malicious. A point-to-multipoint narrowband SCADA radio system designed with the exact needs of utilities in mind provides maximum peace of mind from a security perspective. Security standards continue to evolve, with recommendations from bodies including NIST, NERC and the IEEE. With a wireless point-tomultipoint communications network that is entirely within your control, you are able to control the security measures within your network by upgrading the software over the air with the latest upgrades from your technology provider. Maximum security measures, designed specifically for utilities and their applications and able to evolve as the standards do, means maximum peace of mind. Future-Proof Approach The world is moving to IP / Ethernet, but not immediately. There are still a huge number of serial RTUs installed to control remote assets throughout the distribution network. Please see 4RF Continued on page 13 6 www.RemoteMagazine.com http://www.RemoteMagazine.com

Table of Contents for the Digital Edition of Remote - Spring 2013

Editor's Choice
Key Design Consideration Questions for SCADA Communications
The Evolution of Wireless Sensing: Introducing the Next Level of Remote Monitoring
Software Defined Radios: Flexibility for the SCADA Market
SCADA
Networking
Security
Onsite Power
Inudustry News

Remote - Spring 2013

https://www.nxtbook.com/nxtbooks/webcom/remote_2016winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2016fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2016
https://www.nxtbook.com/nxtbooks/webcom/remote_2016spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2015fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2015m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2015spring
https://www.nxtbook.com/nxtbooks/webcom/remote_industrialnetworking2014
https://www.nxtbook.com/nxtbooks/webcom/remote_2014fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2014m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2014spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2013winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2013m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2013fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2013summer
https://www.nxtbook.com/nxtbooks/webcom/remote_2013spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2012winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2012m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2012fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2012summer
https://www.nxtbook.com/nxtbooks/webcom/remote_2012scada
https://www.nxtbook.com/nxtbooks/webcom/remote_2012spring
https://www.nxtbook.com/nxtbooks/webcom/remote_201112
https://www.nxtbook.com/nxtbooks/webcom/remote_201110
https://www.nxtbook.com/nxtbooks/webcom/remote_201108
https://www.nxtbookmedia.com