Volume 17, Issue 2 (9-2020)                   JSDP 2020, 17(2): 14-3 | Back to browse issues page

XML Persian Abstract Print

Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Mahmoudi Nasr P. A Petri-net Model for Operational Cycle in SCADA Systems. JSDP. 2020; 17 (2) :14-3
URL: http://jsdp.rcisp.ac.ir/article-1-900-en.html
Mazandaran University
Abstract:   (627 Views)
Supervisory control and data acquisition (SCADA) system monitors and controls industrial processes in critical infrastructures (CIs) and plays the vital role in maintaining the reliability of CIs such as power, oil, and gas system. In fact, SCADA system refers to the set of control process, which measures and monitors sensors in remote substations from a control center. These sensors usually have a type of automated response capability when a certain criteria is met. When an abnormal system status occurs, an alarm signal is raised in control center and as a result the operator will be notified. In this way, all normal and abnormal system statuses are monitored in control center. In CI’s application, since several substation resources and their related sensors are too high (because the CI’s grid is often large, complex and wide), the number of alarms is very high. It gets worse when the operator mistakes and as a result, cascading alarms are flooded. In this condition, the rate of raising alarms may be more than clearing them.
In SCADA system, alarm clearing is one of the main duties of operators. When an alarm is raised in control center, the operator should clear it as soon as possible. However, the recent reports confirm the poor alarm clearing causes accidents in the SCADA system. As any operator mistake can increase the number of alarms and jeopardize the system reliability, alarms processing and decision-making for clearing them are a stressful and time-consuming for the SCADA operators. In a large and complex CI such as power system, when operators are overwhelmed by the system alarms, they may take wrong decisions and even ignore alarms. Alarm flooding, lots of operator’s workload and his/her fatigue as a result, are the main causes of operator’s mistake.
If generating of an alarm in a remote substation is denoted as an operational cycle in an SCADA system until clearing it by the operator in control center, the aim of this paper is modeling the operational cycle by using colored petri nets. The proposed model is based on a general approach which alarm messages are integrated with the operator’s commands. Of course, the model focuses on generating of alarms by substation resources. To verify the proposed model, a real data set of power system of Iran is used and to demonstrate the potential of the proposed model some scenarios about operator’ workload and alarm flooding are simulated.
Full-Text [PDF 3582 kb]   (248 Downloads)    
Type of Study: Research | Subject: Paper
Received: 2018/09/15 | Accepted: 2019/09/2 | Published: 2020/09/14 | ePublished: 2020/09/14

1. [1] J. Wang, F. Yang, T. Chen, and S. L. Shah, "An overview of industrial alarm systems: main causes for alarm overloading, research status, and open problems," IEEE Transactions on Automation Science and Engineering, vol. 13, pp. 1045-1061, 2016. [DOI:10.1109/TASE.2015.2464234]
2. [2] D. Li, J. Hu, H. Wang, and W. Huang, "A distributed parallel alarm management strategy for alarm reduction in chemical plants," Journal of Process Control, vol. 34, pp. 117-125, 2015. [DOI:10.1016/j.jprocont.2015.07.008]
3. [3] Y. Wu, M. Kezunovic, and T. Kostic, "An advanced alarm processor using two-level processing structure," in Power Tech, 2007 IEEE Lausanne, 2007, pp. 125-130. [DOI:10.1109/PCT.2007.4538304]
4. [4] P. Mahmoudi-Nasr and A. Yazdian-Varjani, "An Access Management System to Mitigate Operational Threats in SCADA System", JSDP, vol. 14 (4), pp. 3-18, 2018. [DOI:10.29252/jsdp.14.4.3]
5. [5] P. Mahmoudi-Nasr and A. Yazdian-Varjani, "Toward Operator Access Management in SCADA System: Deontological Threat Mitigation," IEEE Transactions on Industrial Informatics, vol. 14, pp. 3314-3324, 2018.
6. [6] P. T. Bullemer, M. Tolsma, D. Reising, and J. Laberge, "Towards improving operator alarm flood responses: alternative alarm presentation techniques," Abnormal Situation Management Consortium, 2011.
7. [7] S. Charbonnier, N. Bouchair, and P. Gayet, "Fault template extraction to assist operators during industrial alarm floods," Engineering Applications of Artificial Intelligence, vol. 50, pp. 32-44, 2016. [DOI:10.1016/j.engappai.2015.12.007]
8. [8] R. R. R. Barbosa, R. Sadre, and A. Pras, "Exploiting traffic periodicity in industrial control networks," International journal of critical infrastructure protection, vol. 13, pp. 52-62, 2016. [DOI:10.1016/j.ijcip.2016.02.004]
9. [9] M. Kezunovic and Y. Guan, "Intelligent alarm processing: From data intensive to information rich," in System Sciences, 2009. HICSS'09. 42nd Hawaii International Conference on, 2009, pp. 1-8.
10. [10] S. Khanmohammadi, K. Rezaie, J. Jassbi, and S. Tadayon, "A model of the failure detection based on fuzzy inference system for the control center of a power system," Appl. Math. Sci, vol. 6, pp. 1747-1758, 2012.
11. [11] V. Calderaro, C. N. Hadjicostis, A. Piccolo, and P. Siano, "Failure identification in smart grids based on petri net modeling," IEEE Transactions on Industrial Electronics, vol. 58, pp. 4613-4623, 2011. [DOI:10.1109/TIE.2011.2109335]
12. [12] Y. Guan and M. Kezunovic, "Contingency-based nodal market operation using intelligent economic alarm processor," IEEE Transactions on Smart Grid, vol. 4, pp. 540-548, 2013. [DOI:10.1109/TSG.2012.2223722]
13. [13] D. Hadžiosmanović, D. Bolzoni, and P. H. Hartel, "A log mining approach for process monitoring in SCADA," International Journal of Information Security, pp. 1-21, 2012.
14. [14] Niroo Research Institue, "Substation automation systems standard (transmission and subtransmission substations), Ministry of Energy of Iran, 2008.
15. [15] T. M. Chen, J. C. Sanchez-Aarnoutse, and J. Buford, "Petri net modeling of cyber-physical attacks on smart grid," IEEE Transactions on Smart Grid, vol. 2, pp. 741-749, 2011. [DOI:10.1109/TSG.2011.2160000]
16. [16] C. Fecarotti, J. Andrews, and R. Remenyte-Prescott, "Analysis of the Design, Operation and Maintenance Options to Provide a Fault Tolerant Railway System," in Transport Research Arena (TRA) 5th Conference: Transport Solutions from Research to Deployment, 2014. [DOI:10.1201/b15938-448]
17. [17] D. C. Montgomery, Introduction to statistical quality control: John Wiley & Sons (New York), 2009.
18. [18] X. Dong, K. Hopkinson, X. Tong, X. Wang, and J. Thorp, "IP-based communication systems for wide-area frequency stability predictive control," in Critical Infrastructure (CRIS), 2010 5th International Conference on, 2010, pp. 1-7. [DOI:10.1109/CRIS.2010.5617555] [PMCID]
19. [19] J. Zhao, Y. Xu, F. Luo, Z. Dong, and Y. Peng, "Power system fault diagnosis based on history driven differential evolution and stochastic time domain simulation," Information Sciences, vol. 275, pp. 13-29, 2014. [DOI:10.1016/j.ins.2014.02.039]
20. [20] V. Rodrigo, M. Chioua, T. Hagglund, and M. Hollender, "Causal analysis for alarm flood reduction," IFAC-PapersOnLine, vol. 49, pp. 723-728, 2016. [DOI:10.1016/j.ifacol.2016.07.269]
21. [21] (2017). http://CPNTools.org

Add your comments about this article : Your username or Email:

Send email to the article author

© 2015 All Rights Reserved | Signal and Data Processing