24
SCADA-HOME BASED SECURITY SYSTEM NURUL ANIS NADIA BT ZAHAR APRIL 2009

SCADA-HOME BASED SECURITY SYSTEMeprints.utem.edu.my/2971/1/Scada-Home_Based_Security_System... · SCADA-HOME BASED SECURITY SYSTEM . ... 2.1.3 Improving Security for SCADA Control

Embed Size (px)

Citation preview

Page 1: SCADA-HOME BASED SECURITY SYSTEMeprints.utem.edu.my/2971/1/Scada-Home_Based_Security_System... · SCADA-HOME BASED SECURITY SYSTEM . ... 2.1.3 Improving Security for SCADA Control

SCADA-HOME BASED SECURITY SYSTEM

NURUL ANIS NADIA BT ZAHAR

APRIL 2009

Page 2: SCADA-HOME BASED SECURITY SYSTEMeprints.utem.edu.my/2971/1/Scada-Home_Based_Security_System... · SCADA-HOME BASED SECURITY SYSTEM . ... 2.1.3 Improving Security for SCADA Control

“I hereby declared that I have read through this report and found that it has comply the

partial fulfillment for awarding the degree of Bachelor of Electrical Engineering

(Control, Instrumentation, and Automation)”

Signature : ………………………………………………………………..

Supervisor’s Name : PROF MADYA MOHD ARIFF B MAT HANAFIAH

Date : APRIL 2009

Page 3: SCADA-HOME BASED SECURITY SYSTEMeprints.utem.edu.my/2971/1/Scada-Home_Based_Security_System... · SCADA-HOME BASED SECURITY SYSTEM . ... 2.1.3 Improving Security for SCADA Control

i

SCADA- Based Home Security System

NURUL ANIS NADIA BT ZAHAR

Thesis submitted in accordance with the partial requirements of the

Universiti Teknikal Malaysia Melaka for the

Bachelor of Electrical Engineering

(Control, Instrumentation & Automation)

Faculty of Electrical Engineering

Universiti Teknikal Malaysia Melaka

APRIL 2009

Page 4: SCADA-HOME BASED SECURITY SYSTEMeprints.utem.edu.my/2971/1/Scada-Home_Based_Security_System... · SCADA-HOME BASED SECURITY SYSTEM . ... 2.1.3 Improving Security for SCADA Control

ii

I hereby declared that this report is a result of my own work excepts of the

excerpts that have been cited clearly in the references”

Signature : ……………………………………………………………

Name : NURUL ANIS NADIA BT ZAHAR

Date : APRIL 2009

Page 5: SCADA-HOME BASED SECURITY SYSTEMeprints.utem.edu.my/2971/1/Scada-Home_Based_Security_System... · SCADA-HOME BASED SECURITY SYSTEM . ... 2.1.3 Improving Security for SCADA Control

iii

DEDICATION

For my beloved parents, En Zahar b Abd Rahman and Pn Norida bt Hanafiah

Page 6: SCADA-HOME BASED SECURITY SYSTEMeprints.utem.edu.my/2971/1/Scada-Home_Based_Security_System... · SCADA-HOME BASED SECURITY SYSTEM . ... 2.1.3 Improving Security for SCADA Control

iv

ACKNOWLEDGEMENTS

First of all, I would like to thank Allah S.W.T the Almighty God because of HIS

blessing I can complete this project and make this project successful. Without HIS

blessing, I would not be here and would not be able to complete this project.

I would like to take an opportunity to express my deepest gratitude to my

supervisor, Prof Madya Mohd Ariff b Mat Hanafiah for his engagement, support, and

encouraging attitude, coursed and editorial advice in preparation during this project.

Not forgetting my dedication to my members of academic and technical staff that

continuously support and guiding me directly or indirectly to complete this project in

time. Their sharing of experiences help me to overcome the obstacles encountered

during completing this project.

Last but not least, to my parents, family and friends for their supports, prays and

helps all the way during this project been implemented. I really appreciate and grateful

for what they have done. It was their kindness that given me opportunity to successfully

completing our project.

Thank you all.

Page 7: SCADA-HOME BASED SECURITY SYSTEMeprints.utem.edu.my/2971/1/Scada-Home_Based_Security_System... · SCADA-HOME BASED SECURITY SYSTEM . ... 2.1.3 Improving Security for SCADA Control

v

ABSTRACT

This project is about the design and the application of SCADA system for home

automation and security system. It comprises the integration of various system that

normally been used for efficient security system such as burglar alarm, fire detection,

water sprinkler, lighting system and others. In this project, four sensors will be used

which is connected to an alarm system. The equipment that intended to be used is

Programmable Logic Controller (PLC), an alarm system and sensors. InduSoft

WebStudio Project will be used in this project which will control all the system we want

to monitor.

Page 8: SCADA-HOME BASED SECURITY SYSTEMeprints.utem.edu.my/2971/1/Scada-Home_Based_Security_System... · SCADA-HOME BASED SECURITY SYSTEM . ... 2.1.3 Improving Security for SCADA Control

vi

ABSTRAK

Projek ini adalah berhubung dengan rekaan dan pengaplikasian sistem SCADA

untuk sistem keselamatan dan pengautomasian kediaman. Ianya meliputi hubungan

dengan pelbagai jenis sistem yang selalunya digunakan untuk keselamatan yang efisyen

seperti penggera kecurian, pengesan api, penyembur air, system lampu dan sebagainya.

Peralatan yang akan digunakan ialah Programmable Logic Controller (PLC), system

penggera dan sensor. Perisian InduSoft WebStudio Project akan digunakan untuk

mengawal seluruh sistem yang ingin diperhatikan.

Page 9: SCADA-HOME BASED SECURITY SYSTEMeprints.utem.edu.my/2971/1/Scada-Home_Based_Security_System... · SCADA-HOME BASED SECURITY SYSTEM . ... 2.1.3 Improving Security for SCADA Control

vii

TABLE OF CONTENTS

CHAPTER

TITLE PAGE

SUPERVISOR’S DECLARATION

PROJECT TITLE

DECLARATION OF THESIS

DEDICATION

ACKNOWLEDGEMENT

ABSTRACT

ABSTRAK

LIST OF TABLES

LIST OF FIGURES

LIST OF ABBREVIATION

LIST OF APPENDICES

I INTRODUCTION

1

1.1 Project Background 1

1.2 Problem Statement 3

1.3 Project Objectives 4

1.4 Project Scope 4

II LITERATURE REVIEW 5

2.1 Previous Research 5

2.1.1 Design and Implementation of Smart Home System

for Security System

5

2.1.2 Smarter Smart Homes: Technologies, Challenges and

Opportunities

6

Page 10: SCADA-HOME BASED SECURITY SYSTEMeprints.utem.edu.my/2971/1/Scada-Home_Based_Security_System... · SCADA-HOME BASED SECURITY SYSTEM . ... 2.1.3 Improving Security for SCADA Control

viii

2.1.3 Improving Security for SCADA Control System 6

2.1.4 15 Great Ideas for Smart Home Security 9

2.2 Components Theory 10

2.2.1 SCADA

2.2.1.1 Human Machine Interface (HMI)

2.2.1.2 Hardware Solutions

2.2.1.3 Communication Infrastructure and Methods

2.2.1.4 Scada Architecture

10

11

12

12

13

2.2.2 InduSoft WebStudio Project

2.2.2.1 Internal Structure and Data Flow

2.2.2.1 Other Software Available in Market

16

17

19

2.2.3 PLC 20

2.2.4 Closed Circuit Television (CCTV) 23

2.2.5 Sensors

2.2.5.1 Sensors Characteristics

2.2.5.2 Home Security Sensors

25

26

27

III PROJECT METHODOLOGY 32

3.1 Project Methodology 32

3.2 Project Planning 35

IV RESULTS 36

4.1 Software Development

4.1.1 Alarm System

4.1.1.1 Truth Table

4.1.1.2 Karnaugh Map

4.2.1.3 Programmable Logic Controller (PLC) I/O

Assignments for Alarm system

4.2.1.4 Simulation using CX-programmer for Alarm

36

37

37

38

39

Page 11: SCADA-HOME BASED SECURITY SYSTEMeprints.utem.edu.my/2971/1/Scada-Home_Based_Security_System... · SCADA-HOME BASED SECURITY SYSTEM . ... 2.1.3 Improving Security for SCADA Control

ix

system

4.2.1.5 Ladder Diagram of Alarm system

4.2.1.6 Mnemonic Code of Alarm system

4.1.2 Scada Home Based Security

40

41

42

43

4.2 Result 46

V DISCUSSION

5.1 Project Significances

5.1.1 Significance to University

5.1.2 Significance to Industry

5.1.3 Significance to the Student

5.2 Benefits of the Smart Home

5.2.1 Convenience at the finger tip

5.2.2 Safety and intelligent security

5.3 Analysis on the effectiveness of using SCADA system

5.3.1 Advantages of Scada System

5.3.2 Disadvantages of Scada System

47

48

48

48

48

48

48

49

49

49

50

VI CONCLUSION

REFERENCES

53

55

Page 12: SCADA-HOME BASED SECURITY SYSTEMeprints.utem.edu.my/2971/1/Scada-Home_Based_Security_System... · SCADA-HOME BASED SECURITY SYSTEM . ... 2.1.3 Improving Security for SCADA Control

x

LIST OF TABLES

NO TITLE PAGE

2.1

4.1

4.2

4.3

4.4

CCTV Parts and Accessories

Truth Table

Karnaugh Map

Input Assignments for Alarm System

Output Assignment for Alarm System

23

37

38

39

39

5.1 Comparison between the relevant systems for Smart Home

System

49

Page 13: SCADA-HOME BASED SECURITY SYSTEMeprints.utem.edu.my/2971/1/Scada-Home_Based_Security_System... · SCADA-HOME BASED SECURITY SYSTEM . ... 2.1.3 Improving Security for SCADA Control

xi

LIST OF FIGURES

NO

TITLE PAGE

1.1

2.1

Burglary modus operandi

Typical SCADA system architecture

2

15

2.2

2.3

2.4

2.5

Integrated SCADA architecture

The Web Studio Development Environment

IWS Data Flow

Data Flow Example

16

17

18

19

2.6

2.7

Basic PLC Components System

PLC System Overview

21

22

2.8 Example of CCTV applications 24

2.9 Multi-Fresnel lens type of PIR/PID 29

2.10 Basic Smoke Detector 30

2.11

3.1

3.2

Example of Burglar Alarm

Flowchart of SCADA system

Gantt Chart for Project Planning

31

33

34

4.1

4.5

4.6

4.7

Logic Gate Design

Login Page

Basic Layout of a House

Event Screen

38

43

44

44

Page 14: SCADA-HOME BASED SECURITY SYSTEMeprints.utem.edu.my/2971/1/Scada-Home_Based_Security_System... · SCADA-HOME BASED SECURITY SYSTEM . ... 2.1.3 Improving Security for SCADA Control

xii

LIST OF ABBREVIATIONS

UTeM Universiti Teknikal Malaysia Melaka

PLC Programmable Logic Controller

PIC Programmable Integrated Chip

SCADA Supervisory Control and Data Acquisition

SMS Short Messaging System

GSM Global System Mobile

HMI Human Machine Interface

GUI Graphical User Interface

RTUs Remote Terminal Units

CCTV Closed Circuit Television

dB Decibel

PID Passive Infrared Detector

PIR Passive Infrared Sensor

I/O Input/Output

IWS Indusoft WebStudio

IR Infra Red

Page 15: SCADA-HOME BASED SECURITY SYSTEMeprints.utem.edu.my/2971/1/Scada-Home_Based_Security_System... · SCADA-HOME BASED SECURITY SYSTEM . ... 2.1.3 Improving Security for SCADA Control

xiii

LIST OF APPENDICES

NO TITLE PAGE

A InduSoft WebStudio Project 57

B Specifications of PLC OMRON 58

C Printed Materials 59

Page 16: SCADA-HOME BASED SECURITY SYSTEMeprints.utem.edu.my/2971/1/Scada-Home_Based_Security_System... · SCADA-HOME BASED SECURITY SYSTEM . ... 2.1.3 Improving Security for SCADA Control

1

CHAPTER 1

INTRODUCTION

1.1 Project Background

Just as we are more conscious of national security these days, home security

remains a top concern in the minds of most people. Home is a proverbial castle, and

although a moat cannot be build around the house, we can - and should - take steps to

make our home as safe as possible. When we do, we'll sleep easier at night, whether we

are tucked into our own bed or in some place hundreds of miles away.

It is surprising the number of people who install expensive alarm systems and yet

neglect basic physical security measures. A house having an alarm but offering easy

entry may tempt a burglar to chance it, snatch a few valuables, and then make a quick

getaway. They may gamble on the fact that because of the prevalence of false alarms,

few people take any notice of an alarm sounding unless it goes on for too long. They

may even try, and succeed, in silencing it.

People that make burglarizing people have three main enemies: time, light and

noise. When a security home system is purchased, large enemies for burglars are

created. If the system is monitored, the burglar knows that his time in our house has to

be very fast because the police are dispatched on their way. The noise of the alarm is

enough to get them out by themselves of our house immediately.

Page 17: SCADA-HOME BASED SECURITY SYSTEMeprints.utem.edu.my/2971/1/Scada-Home_Based_Security_System... · SCADA-HOME BASED SECURITY SYSTEM . ... 2.1.3 Improving Security for SCADA Control

2

A brief description at the burglar' modus operandi is discussed-the things he

looks for, how he gets in, and what does when he’s in.

The favourite method of access is a rear window. They are less likely to be

observed at the back than at the front, or be caught by someone returning home at the

front door. Furthermore, people tend to neglect security of the back door where

frequently front doors can be seen fairly equipped with several high-security locks and

bolts while rear doors have just a simple lock and windows have virtually no protection

at all.

Figure 1.1: Burglary modus operandi

There are several security measures that really make a difference in protecting

the house:

a) Burglars alarm

b) Security locks for doors and windows.

c) CCTV

d) Additional features such as smoke detector, water sprinkler and etc.

Page 18: SCADA-HOME BASED SECURITY SYSTEMeprints.utem.edu.my/2971/1/Scada-Home_Based_Security_System... · SCADA-HOME BASED SECURITY SYSTEM . ... 2.1.3 Improving Security for SCADA Control

3

1.2 Problem Statement

The major reason in designing this project is to solve user’s problems especially

in burglary cases which are increasing nowadays. Referring to the statistic that made by

the nationmaster.com, Malaysia is in the rank of 26 out of 68 countries around the world

in most recent burglary cases. This shows that Malaysians should improve the level of

their home security in order to prevent these problems.

The funny thing about the home invasions is they have not changed at all over

the years. Criminals still use the same methods to break into the houses now as they

always have. Most of the burglaries involved with forcible entry, which means if the

users focus on protecting their home from forced entry, their odds of being burglarized

drop dramatically. Thus, having a few security measures really could really make a

difference.

a) Criminals target houses that look like easy picking. If they are searching for

somewhere to rob and see an unsecured home that looks empty, it is an attractive

options. That is why burglary usually happens at the houses where its security

system is poor and less observed.

b) By using conventional security system, users did not receive any signal when

intruders enter their houses. Therefore, immediate action cannot be performed.

c) Sometimes false signals reaction occurred due to the improper situation such as

over-sensitive alarm system because of lightning, damaged sensors etc.

d) A complete supervisory security system is very expensive in the market. Thus,

this project is to produce a cheaper system so that it is affordable for the users to

apply this system to their house.

Page 19: SCADA-HOME BASED SECURITY SYSTEMeprints.utem.edu.my/2971/1/Scada-Home_Based_Security_System... · SCADA-HOME BASED SECURITY SYSTEM . ... 2.1.3 Improving Security for SCADA Control

4

1.3 Project Objectives

This project is divided into four main objectives:

a) To design the software that will control all the system we want to monitor.

b) To implement new technology for automation and security system rather than the

conventional way that is not effective and safe anymore.

c) To allow the users to control their house appliances at anytime and anywhere

they are.

1.4 Project Scope

After many researches done on the security system concept, there are some

issues must be considered to produce a preliminary design on SCADA-Based Home

Security System that are:

a) Design a system which alerts the users immediately when intruders break into

their houses.

b) Design an effective and complete security system for houses.

c) Produce a cheaper system for home security.

Page 20: SCADA-HOME BASED SECURITY SYSTEMeprints.utem.edu.my/2971/1/Scada-Home_Based_Security_System... · SCADA-HOME BASED SECURITY SYSTEM . ... 2.1.3 Improving Security for SCADA Control

5

CHAPTER TWO

LITERATURE REVIEW

This chapter consists of explanation and revision of the past projects which had

been done before. It consists of theory of the components, equipments and programming

languages that will be used in this project.

2.1 Previous Research

2.1.1 Design and Implementation of Smart Home System for Security System

By : Mohd Zulfadli b Ibrahim

Summary :

Security systems have becoming more of a necessity rather than only an

additional service to home owners. Security system via Short Messaging Services (SMS)

has not been used in Malaysia yet. Thus this project is to create a security system against

burglary and give signals through SMS to the user of the system about the incident so

he/she can take immediate action on it. It comprises of integration between PLC, PIC

programming controller, Global System Mobile (GSM) mobile communication, home

automation and security system. This integration produces a Smart Home technology

Page 21: SCADA-HOME BASED SECURITY SYSTEMeprints.utem.edu.my/2971/1/Scada-Home_Based_Security_System... · SCADA-HOME BASED SECURITY SYSTEM . ... 2.1.3 Improving Security for SCADA Control

6

which is coordinated by Smart Home controller and controlled by users using command

interfaces.

2.1.2 Smarter Smart Homes: Technologies, Challenges and Opportunities

By : MIMOS

Summary :

This paper discusses various aspects of a smart home system especially using a

combination of Power Line carrier, Radio Frequency (RF) and Internet technology to

access and control your home. Current trends, key issues, standards and features of

smart home systems are discussed in detail. MIMOS Smart Home System

(BestariHome) design, development and commercial implementation for 230 units of

terrace houses in Johor will be described. Finally, based on its broad experience from

design to implementation some guidelines for smart home system designers and

developers are suggested.

2.1.3 Improving Security for SCADA Control System

By : Mariana Hentea

Summary :

The continuous growth of cyber security threats and attacks including the

increasing sophistication of malware is impacting the security of critical infrastructure,

industrial control systems, and Supervisory Control and Data Acquisition (SCADA)

control systems. The reliable operation of modern infrastructures depends on

computerized systems and SCADA systems. Since the emergence of Internet and World

Page 22: SCADA-HOME BASED SECURITY SYSTEMeprints.utem.edu.my/2971/1/Scada-Home_Based_Security_System... · SCADA-HOME BASED SECURITY SYSTEM . ... 2.1.3 Improving Security for SCADA Control

7

Wide Web technologies, these systems were integrated with business systems and

became more exposed to cyber threats. There is a growing concern about the security

and safety of the SCADA control systems. The Presidential Decision Directive 63

document established the framework to protect the critical infrastructure and the

Presidential document of 2003, the National Strategy to Secure Cyberspace stated that

securing SCADA systems is a national priority. The critical infrastructure includes

telecommunication, transportation, energy, banking, finance, water supply, emergency

services, government services, agriculture, and other fundamental systems and services

that are critical to the security, economic prosperity, and social well-being of the public.

The critical infrastructure is characterized by interdependencies (physical, cyber,

geographic, and logical) and complexity (collections of interacting components).

Therefore, information security management principles and processes need to be applied

to SCADA systems without exception. Critical infrastructure disruptions can directly

and indirectly affect other infrastructures, impact large geographic regions, and send

ripples throughout the national and global economy. For example, under normal

operating conditions, the electric power infrastructure requires fuels (natural gas and

petroleum), transportation, water, banking and finance, telecommunication, and SCADA

systems for monitoring and control.

In this paper, an analysis of key developments, architecture, potential

vulnerabilities, and security concerns including recommendations toward improving

security for SCADA control systems.is provided The most important issues concerning

the security of SCADA systems including a perspective on enhancing security of these

systems is discussed. A briefly description of the SCADA architecture, and the attributes

that increase the complexity of these systems including the key developments that mark

the evolution of the SCADA control systems along with the growth of potential

vulnerabilities and security concerns is analyzed. Then, recommendations are provided

toward an enhanced security for SCADA control systems. More efforts should be

planned on reducing the vulnerabilities and improving the security operations of these

systems. It is necessary to address not only the individual vulnerabilities, but the breadth

Page 23: SCADA-HOME BASED SECURITY SYSTEMeprints.utem.edu.my/2971/1/Scada-Home_Based_Security_System... · SCADA-HOME BASED SECURITY SYSTEM . ... 2.1.3 Improving Security for SCADA Control

8

of risks that can interfere with critical operations. Key requirements and features needed

are described to improve the security of the current SCADA control systems. For

example, in assessing the risk for SCADA systems, use of general methods for risk

analysis including specific conditions and characteristics of a control system need to be

applied. Effective risk analysis for SCADA systems requires a unified definition for

mishap and identification of potential harm to safety.

As computer systems are more integrated, the distinction between security and

safety is beginning to disappear. In bridging the gap between these domains, a unified

risk framework is proposed which combines a new definition of mishap with an

expanded definition of hazard to include the security event. However, methods for risk

management that are based on automated tools and intelligent techniques are more

beneficial to SCADA systems because they require minimum or no human intervention

in controlling the processes. A unified security/safety risk framework for control

systems is also identified. Implementing security features ensures higher security,

reliability, and availability of control systems. Thus organizations need to reassess the

SCADA control systems and risk model to achieve in depth defense solutions for these

systems.

The increasing threats against SCADA control systems indicate that there should

be more directions in the development of these systems. Therefore, achieving better

quality and more secure SCADA control systems is a high priority. Information security

management principles and processes need to be applied to SCADA systems without

exception. A thought about the future of SCADA control systems is concluded. A

strategy to deal with cyber attacks against the nation’s critical infrastructure requires

first understanding the full nature of the threat. A depth defense and proactive solutions

to improve the security of SCADA control systems ensures the future of control systems

and survivability of critical infrastructure.

Page 24: SCADA-HOME BASED SECURITY SYSTEMeprints.utem.edu.my/2971/1/Scada-Home_Based_Security_System... · SCADA-HOME BASED SECURITY SYSTEM . ... 2.1.3 Improving Security for SCADA Control

9

2.1.4 15 Great Ideas for Smart Home Security

By :Joan Engebretson

Summary :

Although residential security systems sometimes are described with terms such

as “commodity” and “cookie cutter,” it’s a different story at the high end of the market.

There are 15 great ideas for high-end residential security system:

a) Integrating multiple system

b) A single interface

c) Occupancy Sensors Save Energy

d) WAV Files for Emergency Use

e) Astronomical Clock Can “Goof Proof” the System

f) Remote Control and Alerts

g) Rethinking Alerts

h) Two-way Wireless

i) New Communication Methods

j) Phone-based Intercoms

k) Powered Door Locks

l) Secure Rooms

m) Inhalation Sensors Protect Artwork

n) Buried Coax Secures Perimeter

o) Vibration Sensors Protect Walls