Scada-Home Based Security System.

(1)

SCADA-HOME BASED SECURITY SYSTEM NURUL ANIS NADIA BT ZAHAR


(2)

“I hereby declared that I have read through this report and found that it has comply the partial fulfillment for awarding the degree of Bachelor of Electrical Engineering

(Control, Instrumentation, and Automation)”

Signature : ………..

Supervisor’s Name : PROF MADYA MOHD ARIFF B MAT HANAFIAH Date : APRIL 2009


(3)

i

SCADA- Based Home Security System

NURUL ANIS NADIA BT ZAHAR

Thesis submitted in accordance with the partial requirements of the Universiti Teknikal Malaysia Melaka for the

Bachelor of Electrical Engineering (Control, Instrumentation & Automation)

Faculty of Electrical Engineering Universiti Teknikal Malaysia Melaka


(4)

I hereby declared that this report is a result of my own work excepts of the excerpts that have been cited clearly in the references”

Signature : ………

Name : NURUL ANIS NADIA BT ZAHAR Date : APRIL 2009


(5)

iii

DEDICATION


(6)

ACKNOWLEDGEMENTS

First of all, I would like to thank Allah S.W.T the Almighty God because of HIS blessing I can complete this project and make this project successful. Without HIS blessing, I would not be here and would not be able to complete this project.

I would like to take an opportunity to express my deepest gratitude to my supervisor, Prof Madya Mohd Ariff b Mat Hanafiah for his engagement, support, and encouraging attitude, coursed and editorial advice in preparation during this project.

Not forgetting my dedication to my members of academic and technical staff that continuously support and guiding me directly or indirectly to complete this project in time. Their sharing of experiences help me to overcome the obstacles encountered during completing this project.

Last but not least, to my parents, family and friends for their supports, prays and helps all the way during this project been implemented. I really appreciate and grateful for what they have done. It was their kindness that given me opportunity to successfully completing our project.


(7)

v

ABSTRACT

This project is about the design and the application of SCADA system for home automation and security system. It comprises the integration of various system that normally been used for efficient security system such as burglar alarm, fire detection, water sprinkler, lighting system and others. In this project, four sensors will be used which is connected to an alarm system. The equipment that intended to be used is Programmable Logic Controller (PLC), an alarm system and sensors. InduSoft WebStudio Project will be used in this project which will control all the system we want to monitor.


(8)

ABSTRAK

Projek ini adalah berhubung dengan rekaan dan pengaplikasian sistem SCADA untuk sistem keselamatan dan pengautomasian kediaman. Ianya meliputi hubungan dengan pelbagai jenis sistem yang selalunya digunakan untuk keselamatan yang efisyen seperti penggera kecurian, pengesan api, penyembur air, system lampu dan sebagainya. Peralatan yang akan digunakan ialah Programmable Logic Controller (PLC), system penggera dan sensor. Perisian InduSoft WebStudio Project akan digunakan untuk mengawal seluruh sistem yang ingin diperhatikan.


(9)

vii

TABLE OF CONTENTS

CHAPTER TITLE PAGE

SUPERVISOR’S DECLARATION PROJECT TITLE

DECLARATION OF THESIS DEDICATION

ACKNOWLEDGEMENT ABSTRACT

ABSTRAK

LIST OF TABLES LIST OF FIGURES

LIST OF ABBREVIATION LIST OF APPENDICES

I INTRODUCTION 1

1.1 Project Background 1

1.2 Problem Statement 3

1.3 Project Objectives 4

1.4 Project Scope 4

II LITERATURE REVIEW 5

2.1 Previous Research 5

2.1.1 Design and Implementation of Smart Home System for Security System

5

2.1.2 Smarter Smart Homes: Technologies, Challenges and Opportunities


(10)

2.1.3 Improving Security for SCADA Control System 6 2.1.4 15 Great Ideas for Smart Home Security 9

2.2 Components Theory 10

2.2.1 SCADA

2.2.1.1 Human Machine Interface (HMI) 2.2.1.2 Hardware Solutions

2.2.1.3 Communication Infrastructure and Methods 2.2.1.4 Scada Architecture

10 11 12 12 13 2.2.2 InduSoft WebStudio Project

2.2.2.1 Internal Structure and Data Flow 2.2.2.1 Other Software Available in Market

16 17 19

2.2.3 PLC 20

2.2.4 Closed Circuit Television (CCTV) 23 2.2.5 Sensors

2.2.5.1 Sensors Characteristics 2.2.5.2 Home Security Sensors

25 26 27

III PROJECT METHODOLOGY 32

3.1 Project Methodology 32

3.2 Project Planning 35

IV RESULTS 36

4.1 Software Development 4.1.1 Alarm System 4.1.1.1 Truth Table 4.1.1.2 Karnaugh Map

4.2.1.3 Programmable Logic Controller (PLC) I/O Assignments for Alarm system

4.2.1.4 Simulation using CX-programmer for Alarm 36 37 37 38 39


(11)

ix

system

4.2.1.5 Ladder Diagram of Alarm system 4.2.1.6 Mnemonic Code of Alarm system 4.1.2 Scada Home Based Security

40 41 42 43

4.2 Result 46

V DISCUSSION

5.1 Project Significances

5.1.1 Significance to University 5.1.2 Significance to Industry 5.1.3 Significance to the Student 5.2 Benefits of the Smart Home

5.2.1 Convenience at the finger tip 5.2.2 Safety and intelligent security

5.3 Analysis on the effectiveness of using SCADA system 5.3.1 Advantages of Scada System

5.3.2 Disadvantages of Scada System

47 48 48 48 48 48 48 49 49 49 50

VI CONCLUSION

REFERENCES

53 55


(12)

LIST OF TABLES

NO TITLE PAGE

2.1 4.1 4.2 4.3 4.4

CCTV Parts and Accessories Truth Table

Karnaugh Map

Input Assignments for Alarm System Output Assignment for Alarm System

23 37 38 39 39 5.1 Comparison between the relevant systems for Smart Home

System


(13)

xi

LIST OF FIGURES

NO TITLE PAGE

1.1 2.1

Burglary modus operandi

Typical SCADA system architecture

2 15 2.2 2.3 2.4 2.5

Integrated SCADA architecture

The Web Studio Development Environment IWS Data Flow

Data Flow Example

16 17 18 19 2.6 2.7

Basic PLC Components System PLC System Overview

21 22

2.8 Example of CCTV applications 24

2.9 Multi-Fresnel lens type of PIR/PID 29

2.10 Basic Smoke Detector 30

2.11 3.1 3.2

Example of Burglar Alarm Flowchart of SCADA system Gantt Chart for Project Planning

31 33 34 4.1 4.5 4.6 4.7

Logic Gate Design Login Page

Basic Layout of a House Event Screen

38 43 44 44


(14)

LIST OF ABBREVIATIONS

UTeM Universiti Teknikal Malaysia Melaka PLC Programmable Logic Controller PIC Programmable Integrated Chip

SCADA Supervisory Control and Data Acquisition SMS Short Messaging System

GSM Global System Mobile HMI Human Machine Interface GUI Graphical User Interface RTUs Remote Terminal Units CCTV Closed Circuit Television

dB Decibel

PID Passive Infrared Detector PIR Passive Infrared Sensor I/O Input/Output

IWS Indusoft WebStudio IR Infra Red


(15)

xiii

LIST OF APPENDICES

NO TITLE PAGE

A InduSoft WebStudio Project 57

B Specifications of PLC OMRON 58


(16)

CHAPTER 1

INTRODUCTION

1.1 Project Background

Just as we are more conscious of national security these days, home security remains a top concern in the minds of most people. Home is a proverbial castle, and although a moat cannot be build around the house, we can - and should - take steps to make our home as safe as possible. When we do, we'll sleep easier at night, whether we are tucked into our own bed or in some place hundreds of miles away.

It is surprising the number of people who install expensive alarm systems and yet neglect basic physical security measures. A house having an alarm but offering easy entry may tempt a burglar to chance it, snatch a few valuables, and then make a quick getaway. They may gamble on the fact that because of the prevalence of false alarms, few people take any notice of an alarm sounding unless it goes on for too long. They may even try, and succeed, in silencing it.

People that make burglarizing people have three main enemies: time, light and noise. When a security home system is purchased, large enemies for burglars are created. If the system is monitored, the burglar knows that his time in our house has to be very fast because the police are dispatched on their way. The noise of the alarm is enough to get them out by themselves of our house immediately.


(17)

2

A brief description at the burglar' modus operandi is discussed-the things he looks for, how he gets in, and what does when he’s in.

The favourite method of access is a rear window. They are less likely to be observed at the back than at the front, or be caught by someone returning home at the front door. Furthermore, people tend to neglect security of the back door where frequently front doors can be seen fairly equipped with several high-security locks and bolts while rear doors have just a simple lock and windows have virtually no protection at all.

Figure 1.1: Burglary modus operandi

There are several security measures that really make a difference in protecting the house:

a) Burglars alarm

b) Security locks for doors and windows. c) CCTV


(18)

1.2 Problem Statement

The major reason in designing this project is to solve user’s problems especially in burglary cases which are increasing nowadays. Referring to the statistic that made by the nationmaster.com, Malaysia is in the rank of 26 out of 68 countries around the world in most recent burglary cases. This shows that Malaysians should improve the level of their home security in order to prevent these problems.

The funny thing about the home invasions is they have not changed at all over the years. Criminals still use the same methods to break into the houses now as they always have. Most of the burglaries involved with forcible entry, which means if the users focus on protecting their home from forced entry, their odds of being burglarized drop dramatically. Thus, having a few security measures really could really make a difference.

a) Criminals target houses that look like easy picking. If they are searching for somewhere to rob and see an unsecured home that looks empty, it is an attractive options. That is why burglary usually happens at the houses where its security system is poor and less observed.

b) By using conventional security system, users did not receive any signal when intruders enter their houses. Therefore, immediate action cannot be performed.

c) Sometimes false signals reaction occurred due to the improper situation such as over-sensitive alarm system because of lightning, damaged sensors etc.

d) A complete supervisory security system is very expensive in the market. Thus, this project is to produce a cheaper system so that it is affordable for the users to apply this system to their house.


(19)

4

1.3 Project Objectives

This project is divided into four main objectives:

a) To design the software that will control all the system we want to monitor.

b) To implement new technology for automation and security system rather than the conventional way that is not effective and safe anymore.

c) To allow the users to control their house appliances at anytime and anywhere they are.

1.4 Project Scope

After many researches done on the security system concept, there are some issues must be considered to produce a preliminary design on SCADA-Based Home Security System that are:

a) Design a system which alerts the users immediately when intruders break into their houses.

b) Design an effective and complete security system for houses.


(20)

CHAPTER TWO

LITERATURE REVIEW

This chapter consists of explanation and revision of the past projects which had been done before. It consists of theory of the components, equipments and programming languages that will be used in this project.

2.1 Previous Research

2.1.1 Design and Implementation of Smart Home System for Security System By : Mohd Zulfadli b Ibrahim

Summary :

Security systems have becoming more of a necessity rather than only an additional service to home owners. Security system via Short Messaging Services (SMS) has not been used in Malaysia yet. Thus this project is to create a security system against burglary and give signals through SMS to the user of the system about the incident so he/she can take immediate action on it. It comprises of integration between PLC, PIC programming controller, Global System Mobile (GSM) mobile communication, home automation and security system. This integration produces a Smart Home technology


(21)

6

which is coordinated by Smart Home controller and controlled by users using command interfaces.

2.1.2 Smarter Smart Homes: Technologies, Challenges and Opportunities

By : MIMOS

Summary :

This paper discusses various aspects of a smart home system especially using a combination of Power Line carrier, Radio Frequency (RF) and Internet technology to access and control your home. Current trends, key issues, standards and features of smart home systems are discussed in detail. MIMOS Smart Home System (BestariHome) design, development and commercial implementation for 230 units of terrace houses in Johor will be described. Finally, based on its broad experience from design to implementation some guidelines for smart home system designers and developers are suggested.

2.1.3 Improving Security for SCADA Control System By : Mariana Hentea

Summary :

The continuous growth of cyber security threats and attacks including the increasing sophistication of malware is impacting the security of critical infrastructure, industrial control systems, and Supervisory Control and Data Acquisition (SCADA) control systems. The reliable operation of modern infrastructures depends on computerized systems and SCADA systems. Since the emergence of Internet and World


(22)

Wide Web technologies, these systems were integrated with business systems and became more exposed to cyber threats. There is a growing concern about the security and safety of the SCADA control systems. The Presidential Decision Directive 63 document established the framework to protect the critical infrastructure and the Presidential document of 2003, the National Strategy to Secure Cyberspace stated that securing SCADA systems is a national priority. The critical infrastructure includes telecommunication, transportation, energy, banking, finance, water supply, emergency services, government services, agriculture, and other fundamental systems and services that are critical to the security, economic prosperity, and social well-being of the public.

The critical infrastructure is characterized by interdependencies (physical, cyber, geographic, and logical) and complexity (collections of interacting components). Therefore, information security management principles and processes need to be applied to SCADA systems without exception. Critical infrastructure disruptions can directly and indirectly affect other infrastructures, impact large geographic regions, and send ripples throughout the national and global economy. For example, under normal operating conditions, the electric power infrastructure requires fuels (natural gas and petroleum), transportation, water, banking and finance, telecommunication, and SCADA systems for monitoring and control.

In this paper, an analysis of key developments, architecture, potential vulnerabilities, and security concerns including recommendations toward improving security for SCADA control systems.is provided The most important issues concerning the security of SCADA systems including a perspective on enhancing security of these systems is discussed. A briefly description of the SCADA architecture, and the attributes that increase the complexity of these systems including the key developments that mark the evolution of the SCADA control systems along with the growth of potential vulnerabilities and security concerns is analyzed. Then, recommendations are provided toward an enhanced security for SCADA control systems. More efforts should be planned on reducing the vulnerabilities and improving the security operations of these systems. It is necessary to address not only the individual vulnerabilities, but the breadth


(23)

8

of risks that can interfere with critical operations. Key requirements and features needed

are described to improve the security of the current SCADA control systems. For example, in assessing the risk for SCADA systems, use of general methods for risk analysis including specific conditions and characteristics of a control system need to be applied. Effective risk analysis for SCADA systems requires a unified definition for mishap and identification of potential harm to safety.

As computer systems are more integrated, the distinction between security and safety is beginning to disappear. In bridging the gap between these domains, a unified risk framework is proposed which combines a new definition of mishap with an expanded definition of hazard to include the security event. However, methods for risk management that are based on automated tools and intelligent techniques are more beneficial to SCADA systems because they require minimum or no human intervention in controlling the processes. A unified security/safety risk framework for control systems is also identified. Implementing security features ensures higher security, reliability, and availability of control systems. Thus organizations need to reassess the SCADA control systems and risk model to achieve in depth defense solutions for these systems.

The increasing threats against SCADA control systems indicate that there should be more directions in the development of these systems. Therefore, achieving better quality and more secure SCADA control systems is a high priority. Information security management principles and processes need to be applied to SCADA systems without exception. A thought about the future of SCADA control systems is concluded. A strategy to deal with cyber attacks against the nation’s critical infrastructure requires first understanding the full nature of the threat. A depth defense and proactive solutions to improve the security of SCADA control systems ensures the future of control systems and survivability of critical infrastructure.


(24)

2.1.4 15 Great Ideas for Smart Home Security By :Joan Engebretson

Summary :

Although residential security systems sometimes are described with terms such as “commodity” and “cookie cutter,” it’s a different story at the high end of the market. There are 15 great ideas for high-end residential security system:

a) Integrating multiple system b) A single interface

c) Occupancy Sensors Save Energy d) WAV Files for Emergency Use

e) Astronomical Clock Can “Goof Proof” the System f) Remote Control and Alerts

g) Rethinking Alerts h) Two-way Wireless

i) New Communication Methods j) Phone-based Intercoms

k) Powered Door Locks l) Secure Rooms

m) Inhalation Sensors Protect Artwork n) Buried Coax Secures Perimeter o) Vibration Sensors Protect Walls


(1)

1.3 Project Objectives

This project is divided into four main objectives:

a) To design the software that will control all the system we want to monitor. b) To implement new technology for automation and security system rather than the

conventional way that is not effective and safe anymore.

c) To allow the users to control their house appliances at anytime and anywhere they are.

1.4 Project Scope

After many researches done on the security system concept, there are some issues must be considered to produce a preliminary design on SCADA-Based Home Security System that are:

a) Design a system which alerts the users immediately when intruders break into their houses.

b) Design an effective and complete security system for houses. c) Produce a cheaper system for home security.


(2)

CHAPTER TWO

LITERATURE REVIEW

This chapter consists of explanation and revision of the past projects which had been done before. It consists of theory of the components, equipments and programming languages that will be used in this project.

2.1 Previous Research

2.1.1 Design and Implementation of Smart Home System for Security System

By : Mohd Zulfadli b Ibrahim

Summary :

Security systems have becoming more of a necessity rather than only an additional service to home owners. Security system via Short Messaging Services (SMS) has not been used in Malaysia yet. Thus this project is to create a security system against burglary and give signals through SMS to the user of the system about the incident so he/she can take immediate action on it. It comprises of integration between PLC, PIC programming controller, Global System Mobile (GSM) mobile communication, home automation and security system. This integration produces a Smart Home technology


(3)

which is coordinated by Smart Home controller and controlled by users using command interfaces.

2.1.2 Smarter Smart Homes: Technologies, Challenges and Opportunities

By : MIMOS

Summary :

This paper discusses various aspects of a smart home system especially using a combination of Power Line carrier, Radio Frequency (RF) and Internet technology to access and control your home. Current trends, key issues, standards and features of smart home systems are discussed in detail. MIMOS Smart Home System (BestariHome) design, development and commercial implementation for 230 units of terrace houses in Johor will be described. Finally, based on its broad experience from design to implementation some guidelines for smart home system designers and developers are suggested.

2.1.3 Improving Security for SCADA Control System

By : Mariana Hentea

Summary :

The continuous growth of cyber security threats and attacks including the increasing sophistication of malware is impacting the security of critical infrastructure, industrial control systems, and Supervisory Control and Data Acquisition (SCADA) control systems. The reliable operation of modern infrastructures depends on computerized systems and SCADA systems. Since the emergence of Internet and World


(4)

Wide Web technologies, these systems were integrated with business systems and became more exposed to cyber threats. There is a growing concern about the security and safety of the SCADA control systems. The Presidential Decision Directive 63 document established the framework to protect the critical infrastructure and the Presidential document of 2003, the National Strategy to Secure Cyberspace stated that securing SCADA systems is a national priority. The critical infrastructure includes telecommunication, transportation, energy, banking, finance, water supply, emergency services, government services, agriculture, and other fundamental systems and services that are critical to the security, economic prosperity, and social well-being of the public.

The critical infrastructure is characterized by interdependencies (physical, cyber, geographic, and logical) and complexity (collections of interacting components). Therefore, information security management principles and processes need to be applied to SCADA systems without exception. Critical infrastructure disruptions can directly and indirectly affect other infrastructures, impact large geographic regions, and send ripples throughout the national and global economy. For example, under normal operating conditions, the electric power infrastructure requires fuels (natural gas and petroleum), transportation, water, banking and finance, telecommunication, and SCADA systems for monitoring and control.

In this paper, an analysis of key developments, architecture, potential vulnerabilities, and security concerns including recommendations toward improving security for SCADA control systems.is provided The most important issues concerning the security of SCADA systems including a perspective on enhancing security of these systems is discussed. A briefly description of the SCADA architecture, and the attributes that increase the complexity of these systems including the key developments that mark the evolution of the SCADA control systems along with the growth of potential vulnerabilities and security concerns is analyzed. Then, recommendations are provided toward an enhanced security for SCADA control systems. More efforts should be planned on reducing the vulnerabilities and improving the security operations of these systems. It is necessary to address not only the individual vulnerabilities, but the breadth


(5)

of risks that can interfere with critical operations. Key requirements and features needed are described to improve the security of the current SCADA control systems. For example, in assessing the risk for SCADA systems, use of general methods for risk analysis including specific conditions and characteristics of a control system need to be applied. Effective risk analysis for SCADA systems requires a unified definition for mishap and identification of potential harm to safety.

As computer systems are more integrated, the distinction between security and safety is beginning to disappear. In bridging the gap between these domains, a unified risk framework is proposed which combines a new definition of mishap with an expanded definition of hazard to include the security event. However, methods for risk management that are based on automated tools and intelligent techniques are more beneficial to SCADA systems because they require minimum or no human intervention in controlling the processes. A unified security/safety risk framework for control systems is also identified. Implementing security features ensures higher security, reliability, and availability of control systems. Thus organizations need to reassess the SCADA control systems and risk model to achieve in depth defense solutions for these systems.

The increasing threats against SCADA control systems indicate that there should be more directions in the development of these systems. Therefore, achieving better quality and more secure SCADA control systems is a high priority. Information security management principles and processes need to be applied to SCADA systems without exception. A thought about the future of SCADA control systems is concluded. A strategy to deal with cyber attacks against the nation’s critical infrastructure requires first understanding the full nature of the threat. A depth defense and proactive solutions to improve the security of SCADA control systems ensures the future of control systems and survivability of critical infrastructure.


(6)

2.1.4 15 Great Ideas for Smart Home Security

By :Joan Engebretson

Summary :

Although residential security systems sometimes are described with terms such as “commodity” and “cookie cutter,” it’s a different story at the high end of the market. There are 15 great ideas for high-end residential security system:

a) Integrating multiple system b) A single interface

c) Occupancy Sensors Save Energy d) WAV Files for Emergency Use

e) Astronomical Clock Can “Goof Proof” the System

f) Remote Control and Alerts g) Rethinking Alerts

h) Two-way Wireless

i) New Communication Methods j) Phone-based Intercoms

k) Powered Door Locks l) Secure Rooms

m) Inhalation Sensors Protect Artwork n) Buried Coax Secures Perimeter o) Vibration Sensors Protect Walls