Advertisement

Availability Study of the Italian Electricity SCADA System in the Cloud

  • Stefano SebastioEmail author
  • Antonio Scala
  • Gregorio D’Agostino
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10242)

Abstract

Recently, the allure of the cloud is also affecting the SCADA systems. Cloud-based commercial solutions to manage small private SCADA systems are spreading, while the utilities are still evaluating the cloud adoption. For electric utility companies, reasons for moving in the cloud can be traced to the need of storing, accessing and analyzing a huge amount of records collected from their new smart meters, and managing grid-connected small-scale decentralized energy generation from renewable sources. Moreover, the cloud allows an easy and affordable deploy of monitor dashboards, populated with accurate consumption data, accessible at anytime from anywhere, directly to the customers’ smartphones. On the other hand, cloud poses fears on security, privacy and system downtime. In this work, we focus on the latter aspect analyzing the availability of the SCADA system managing the Italian power transmission network for different possible adoptions of the cloud.

Keywords

Network availability Power grid Power transmission SCADA system 

Notes

Acknowledgments

Research partially supported by the EU through the HOME/2013/CIPS/AG/4000005013 project CI2C. AS thanks CNR-PNR National Project Crisis-Lab and EU FET project DOLFINS nr 640772 for support. The contents of the paper do not necessarily reflect the position or the policy of funding parties.

References

  1. 1.
    Cloud Computing and Critical Information Infrastructures (CI2C) - network reliability analysis. http://ci2c.eu/reliability.html. Accessed 18 May 2016
  2. 2.
    White paper: Cloud computing for energy and utilities. Technical report, IBM Corporate Headquarters, October 2013Google Scholar
  3. 3.
    Alcaraz, C., Agudo, I., Nunez, D., Lopez, J.: Managing incidents in smart grids à la cloud. In: CloudCom (2011)Google Scholar
  4. 4.
    Bobbio, A., Bonanni, G., Ciancamerla, E., Clemente, R., Iacomini, A., Minichino, M., Scarlatti, A., Terruggia, R., Zendri, E.: Unavailability of critical SCADA communication links interconnecting a power grid and a Telco network. Reliab. Eng. Sys. Saf. 95(12), 1345–1357 (2010)CrossRefGoogle Scholar
  5. 5.
    Buldyrev, S.V., Parshani, R., Paul, G., Stanley, H.E., Havlin, S.: Catastrophic cascade of failures in interdependent networks. Nature 464, 1025–1028 (2010)CrossRefGoogle Scholar
  6. 6.
    Combs, L.: Cloud Computing for SCADA. Technical report, InduSoft (2013)Google Scholar
  7. 7.
    D’Agostino, G., Scala, A. (eds.): Networks of Networks: The Last Frontier of Complexity. Understanding Complex Systems. Springer, Cham (2014).  https://doi.org/10.1007/978-3-319-03518-5
  8. 8.
    Electric Light and Power - Bryon Turcotte: Electric utilities consider the cloud. http://www.elp.com/articles/powergrid_international/print/volume-17/issue-5/features/electric-utilities-consider-the-cloud.html. Accessed 18 May 2016
  9. 9.
    Geberslassie, M., Bitzer, B.: Future SCADA systems for decentralized distribution systems. In: UPEC (2010)Google Scholar
  10. 10.
    IEEE Spectrum - Katherine Tweed: Attack on california substation fuels grid security debate. http://spectrum.ieee.org/energywise/energy/the-smarter-grid/attack-on-california-substation-fuels-grid-security-debate. Accessed 28 Aug 2016
  11. 11.
    Kim, T.h.: Securing communication of SCADA components in smart grid environment. Int. J. Syst. Appl. Eng. Dev. 50(2), 135–142 (2011)Google Scholar
  12. 12.
    Manzi, E., Labbe, M., Latouche, G., Maffioli, F.: Fishman’s sampling plan for computing network reliability. IEEE Trans. Reliab. 50(1), 41–46 (2001)CrossRefGoogle Scholar
  13. 13.
    Matsui, Y., Kojima, H., Tsuchiya, T.: Modeling the interaction of power line and SCADA networks. In: HASE (2014)Google Scholar
  14. 14.
    Murray, A.T., Grubesic, T. (eds.): Critical Infrastructure - Reliability and Vulnerability. Advances in Spatial Science. Springer, Heidelberg (2007).  https://doi.org/10.1007/978-3-540-68056-7 Google Scholar
  15. 15.
    Piggin, R.: Are industrial control systems ready for the cloud? Int. J. Crit. Infrastruct. Prot. 9, 38–40 (2015)CrossRefGoogle Scholar
  16. 16.
    Piggin, R.: Securing SCADA in the cloud: managing the risks to avoid the perfect storm. In: IET ISA Instrumentation Symposium (2014)Google Scholar
  17. 17.
    Scala, A., Sebastio, S., De Sanctis Lucentini, P.G., D’Agostino, G.: A mean field model of coupled cascades in flow networks. In: CRITIS (2015)Google Scholar
  18. 18.
    Sebastio, S., D’Agostino, G., Scala, A.: Adopting the cloud to manage the electricity grid. In: IEEE International Energy Conference (ENERGYCON) (2016)Google Scholar
  19. 19.
    Sebastio, S., Trivedi, K.S., Wang, D., Yin, X.: Fast computation of bounds for two-terminal network reliability. Eur. J. Oper. Res. 238(3), 810–823 (2014)MathSciNetCrossRefzbMATHGoogle Scholar
  20. 20.
    Shooman, M.L.: Reliability of Computer Systems and Networks: Fault Tolerance. Analysis and Design. Wiley, New York (2002)CrossRefGoogle Scholar
  21. 21.
    Spellman, F.R., Bieber, R.M.: Energy Infrastructure Protection and Homeland Security. Government Institutes, Rockville (2010)Google Scholar
  22. 22.
    Stouffer, K.A., Falco, J.A., Scarfone, K.A.: SP 800–82. Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control System Configurations Such As Programmable Logic Controllers (PLC). Technical report, NIST (2011)Google Scholar
  23. 23.
    Ten, C.W., Liu, C.C., Manimaran, G.: Vulnerability assessment of cybersecurity for SCADA systems. IEEE Trans. Power Syst. 23(4), 1836–1846 (2008)CrossRefGoogle Scholar
  24. 24.
    Tornatore, M., Maier, G., Pattavina, A.: Availability design of optical transport networks. IEEE J. Sel. Areas Commun. 23(8), 1520–1532 (2006)CrossRefGoogle Scholar
  25. 25.
    Wilhoit, K.: SCADA in the Cloud: A security Conundrum? Technical report, Trend Micro (2013)Google Scholar
  26. 26.
    Yang, S., Trajanovski, S., Kuipers, F.A.: Availability-based path selection and network vulnerability assessment. Networks 66(4), 306–319 (2015)MathSciNetCrossRefGoogle Scholar
  27. 27.
    Yeh, W.C., Lin, Y.C., Chung, Y., Chih, M.: A particle swarm optimization approach based on monte carlo simulation for solving the complex network reliability problem. IEEE Trans. Reliab. 59(1), 212–221 (2010)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Stefano Sebastio
    • 1
    Email author
  • Antonio Scala
    • 1
    • 2
  • Gregorio D’Agostino
    • 1
    • 3
  1. 1.LIMS London Institute of Mathematical SciencesLondonUK
  2. 2.ISC-CNRSapienza Università di RomaRomeItaly
  3. 3.ENEA, CR “Casaccia”RomeItaly

Personalised recommendations