Digital data communications for measurement and control. Fieldbus for use in industrial control systems

2015 ◽  
2016 ◽  
Vol 64 (4) ◽  
Author(s):  
Rafael Priego ◽  
Aintzane Armentia ◽  
Elisabet Estévez ◽  
Marga Marcos

AbstractThe Industrie 4.0 initiative emphasizes the consistent digitalization and linking of all productive units, including the definition of industrial control systems. This work proposes a model-based approach to develop Industrial Process Measurement and Control Systems. It uses modern software technologies but software complexity is wrapped using the notation, syntax and semantics of the field. It is UML modeling tool independent, due to the definition of domain profiles. It is also PLC programming tool independent, as the software architecture is generated following the PLCopen XML standard.


Energies ◽  
2019 ◽  
Vol 12 (13) ◽  
pp. 2598
Author(s):  
Asif Iqbal ◽  
Farhan Mahmood ◽  
Mathias Ekstedt

In today’s connected world, there is a tendency of connectivity even in the sectors which conventionally have been not so connected in the past, such as power systems substations. Substations have seen considerable digitalization of the grid hence, providing much more available insights than before. This has all been possible due to connectivity, digitalization and automation of the power grids. Interestingly, this also means that anybody can access such critical infrastructures from a remote location and gone are the days of physical barriers. The power of connectivity and control makes it a much more challenging task to protect critical industrial control systems. This capability comes at a price, in this case, increasing the risk of potential cyber threats to substations. With all such potential risks, it is important that they can be traced back and attributed to any potential threats to their roots. It is extremely important for a forensic investigation to get credible evidence of any cyber-attack as required by the Daubert standard. Hence, to be able to identify and capture digital artifacts as a result of different attacks, in this paper, the authors have implemented and improvised a forensic testbed by implementing a sandboxing technique in the context of real time-hardware-in-the-loop setup. Newer experiments have been added by emulating the cyber-attacks on WAMPAC applications, and collecting and analyzing captured artifacts. Further, using sandboxing for the first time in such a setup has proven helpful.


Sign in / Sign up

Export Citation Format

Share Document