Submitted by: Reeha Shareef(19-MS-EE-76) Course Schedule Week no. Date Task Assignment 1 18-09-2019 Write contents of MS thesis proposal. Assignment 1 Write 15 references about your topic. Due date 25-09-2019 2 25-09-2019 Write aim of your project and 3-4 Assignment 1 objectives of selected project. submitted
3 2-10-2019 Make title page of project proposal. Assignment 2
Due date 9-10-2019 4 9-10-2019 Write problem statement of your Assignment 2 project. Write review paper and submitted submit it after mid.
6 23-10-2019 Assignment 3 was thoroughly checked Submission of
and reviews and suggestion was given Assignment 3 on course folder 7 30-10-2019 Write Literature review Assignment 4 Due date 6-11-2019 8 6-11-2019 Nil Nil MID EXAMS 9 27-11-2019 Make a course folder of all previous Assignment 5 lectures and write research methodology Due date 4-12-2019 10 4-12-2019 11 11-12-2019 12 18-12-2019 13 25-12-2019 14 01-01-2019 16 08-01-2019 17 FINAL EXAMS Lecture 07: In this lecture course folder was thoroughly checked, suggestion and reviews was given to improve the course folder. Lecture 08: Key Points was discussed from slides Lecture 09: In this lecture the format of Research Paper was discussed. Following are the main headings of Research paper Title Abstract contain research paper, importance of study, proposed solution, application of the research, main finding of paper Introduction mainly contain four to five paragraph Case study is the systemic description Methodology Result and discussion Conclusion contain present approach, strength and expert opinion Research Methodology The designed System architecture consists of three main steps: Mobile phone program Server side program (SSP) SCADA controlling program (SCP) [5]-[6].
Mobile phone program
The mobile phone program is designed by using J2ME (Java Micro Edition downloaded) to a mobile phone with GPRS (general packet radio service) or WAP (wireless application protocol). The program sends the data required for the web server in accordance with the protocol using preferably GPRS or WAP internet access technology, receives the data sent by web server, and informs it to the user with the help of graphical interface analyzing this knowledge in its structure. The application routine has two stages. At the first stage, current and voltage values of the system, state of motor 1 and motor 2 (ON/OFF), and bucket position value are sent to the mobile phone from the SCADA server. The data received by the mobile phone are interpreted by the J2ME application and some related graphical animations are offered to the user. At the second stage, an authorized user can control the SCADA system values via the mobile phone by using its user name and password. In our case study, authorized users can control the state of motor 1, motor 2, and the system on/off position by using the J2ME application program in the mobile phone.
Figure 1. Designed mobile based system
Server side program
A Server side program (SSP) can be designed by using any server side script. The proposed mobile phone based SCADA automation system. In this application, ASP is used as a SSP in order to get fast response to a lower number of users than Java Servlet that supports excessive users. It receives the request data sent by the program integrated into the mobile phone. It reads the values belonging to the state or position database located in the computer in which the web server is installed. These data are sent to the mobile phone via Internet in accordance with the program in the mobile phone and the protocol between them [10]–[12].
Figure 1. Data flow diagram of the designed system.
SCADA controlling programs
This program is installed in the same computer with the SCADA system and has a visual interface, receives the data pertaining to the state of the system connecting with SCADA, and saves it to the condition-stating database in the computer in which the web server is installed. Two different programs have been designed and used to monitor and control the SCADA system via mobile phone. The remote control program mobile to SCADA has been used to control the SCADA system via mobile phone, while the remote supervisor program (SCADA) to mobile has been used to monitor the SCADA system via mobile phone. TCP/IP offers reliability by providing connection-oriented, end-to-end reliable packet delivery through an Internet network. It does this by sequencing bytes with a forwarding acknowledgment number that indicates to the destination the next byte the source expects to receive. Bytes not acknowledged within a specified period are retransmitted. The reliability mechanism of TCP/IP allows devices to deal with lost, delayed, duplicate, or misread packets. A time-out mechanism allows devices to detect lost packets and request retransmission. References: [1] Beaver et al., and K. N. Levitt, “SCADA Key Establishment”, IEEE Network, vol. 8, no. 3, pp. 26 – 41, 2005. [2] Dawson et al., “Industrial Network Security”, IEEE Transactions on Software Engineering, vol. 13, pp. 222-232, February 2006. [3] Choi et al, “Computer System Intrusion Detection: A Survey”, 2007. http://www.cs.virginia.edu/~jones/IDSresearch/Documents/jones-sielken-survey-v11.pdf [4] Rezai et al., “An Intrusion Detection Model”, ISA-The Instrumentation, Systems and Automation Society, December 24, 2008. [5] Jiang et al. and D. Garvey, "The Development of a Process and Equipment Monitoring (PEM) Toolbox and its Application to Sensor Calibration Monitoring", The Fourth International Conference on Quality and Reliability, Beijing, China, 2009. [6] Wang, "Network Security on the Plant Floor", In Tech Magazine, Instrumentation Systems and Automation Society, Research Triangle Park, NC, pp. 20 – 22, 2010. [7] Antonini et al. and D. Garvey, "Development and Application of Fault Detectability Performance of SCADA", Journal of Pattern Recognition Research, vol. 1, 2011. [8] Kristan Stoddart, Sequential Analysis. New York, NY: John Wiley & Sons, 2012. [9] Raj Kumar and D.G khatot, “SCADA: Supervisory Control and Data Acquisition”, ISA- The Instrumentation, Systems, and Automation Society, no. 3 June 2013. [10] Scott R. Graham and Stuart H. Kurkowski, "Technical Review of On-line Monitoring Techniques for Performance Assessment: Part II Theoretical Issues", U.S. Nuclear Regulatory Commission, 2014. [11] J.A. Jardini and L.C. Magrini, “Monitoring Controller's "DNA Sequence for System Security”, ISA Emerging Technologies Conference, Instrumentation Systems and Automation Society, Houston, September 2015. [12] S.K Ghosh, “Proactive Fault Monitoring in Enterprise Servers,” Proceedings of the 2016 International Conference on Computer Design, pp. 3-10, June 2016. [13] K. Gross, "Continuous System Telemetry Harness", Tech. Rep., 2017 [Online] Available: research.sun.com/sunlabsday/docs.2004/talks/1.03_ Gross.pdf. [14] Baker et al., "Development and Application of Fault Detectability Performance of SCADA", Journal of Pattern Recognition Research, vol. 1, 2018. [15] M. Lehtonen, "Scheduling Theory", Algorithms and Systems, 2018. [16] S.K. Mitra and L.C. Magrini, “Monitoring Controller's "DNA Sequence for System Security”, ISA Emerging Technologies Conference, Instrumentation Systems and Automation Society, Houston, September 2019.