SCADA-HOME BASED SECURITY SYSTEM
NURUL ANIS NADIA BT ZAHAR
APRIL 2009
“I hereby declared that I have read through this report and found that it has comply the
partial fulfillment for awarding the degree of Bachelor of Electrical Engineering
(Control, Instrumentation, and Automation)”
Signature : ………………………………………………………………..
Supervisor’s Name : PROF MADYA MOHD ARIFF B MAT HANAFIAH
Date : APRIL 2009
i
SCADA- Based Home Security System
NURUL ANIS NADIA BT ZAHAR
Thesis submitted in accordance with the partial requirements of the
Universiti Teknikal Malaysia Melaka for the
Bachelor of Electrical Engineering
(Control, Instrumentation & Automation)
Faculty of Electrical Engineering
Universiti Teknikal Malaysia Melaka
APRIL 2009
ii
I hereby declared that this report is a result of my own work excepts of the
excerpts that have been cited clearly in the references”
Signature : ……………………………………………………………
Name : NURUL ANIS NADIA BT ZAHAR
Date : APRIL 2009
iii
DEDICATION
For my beloved parents, En Zahar b Abd Rahman and Pn Norida bt Hanafiah
iv
ACKNOWLEDGEMENTS
First of all, I would like to thank Allah S.W.T the Almighty God because of HIS
blessing I can complete this project and make this project successful. Without HIS
blessing, I would not be here and would not be able to complete this project.
I would like to take an opportunity to express my deepest gratitude to my
supervisor, Prof Madya Mohd Ariff b Mat Hanafiah for his engagement, support, and
encouraging attitude, coursed and editorial advice in preparation during this project.
Not forgetting my dedication to my members of academic and technical staff that
continuously support and guiding me directly or indirectly to complete this project in
time. Their sharing of experiences help me to overcome the obstacles encountered
during completing this project.
Last but not least, to my parents, family and friends for their supports, prays and
helps all the way during this project been implemented. I really appreciate and grateful
for what they have done. It was their kindness that given me opportunity to successfully
completing our project.
Thank you all.
v
ABSTRACT
This project is about the design and the application of SCADA system for home
automation and security system. It comprises the integration of various system that
normally been used for efficient security system such as burglar alarm, fire detection,
water sprinkler, lighting system and others. In this project, four sensors will be used
which is connected to an alarm system. The equipment that intended to be used is
Programmable Logic Controller (PLC), an alarm system and sensors. InduSoft
WebStudio Project will be used in this project which will control all the system we want
to monitor.
vi
ABSTRAK
Projek ini adalah berhubung dengan rekaan dan pengaplikasian sistem SCADA
untuk sistem keselamatan dan pengautomasian kediaman. Ianya meliputi hubungan
dengan pelbagai jenis sistem yang selalunya digunakan untuk keselamatan yang efisyen
seperti penggera kecurian, pengesan api, penyembur air, system lampu dan sebagainya.
Peralatan yang akan digunakan ialah Programmable Logic Controller (PLC), system
penggera dan sensor. Perisian InduSoft WebStudio Project akan digunakan untuk
mengawal seluruh sistem yang ingin diperhatikan.
vii
TABLE OF CONTENTS
CHAPTER
TITLE PAGE
SUPERVISOR’S DECLARATION
PROJECT TITLE
DECLARATION OF THESIS
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
ABSTRAK
LIST OF TABLES
LIST OF FIGURES
LIST OF ABBREVIATION
LIST OF APPENDICES
I INTRODUCTION
1
1.1 Project Background 1
1.2 Problem Statement 3
1.3 Project Objectives 4
1.4 Project Scope 4
II LITERATURE REVIEW 5
2.1 Previous Research 5
2.1.1 Design and Implementation of Smart Home System
for Security System
5
2.1.2 Smarter Smart Homes: Technologies, Challenges and
Opportunities
6
viii
2.1.3 Improving Security for SCADA Control System 6
2.1.4 15 Great Ideas for Smart Home Security 9
2.2 Components Theory 10
2.2.1 SCADA
2.2.1.1 Human Machine Interface (HMI)
2.2.1.2 Hardware Solutions
2.2.1.3 Communication Infrastructure and Methods
2.2.1.4 Scada Architecture
10
11
12
12
13
2.2.2 InduSoft WebStudio Project
2.2.2.1 Internal Structure and Data Flow
2.2.2.1 Other Software Available in Market
16
17
19
2.2.3 PLC 20
2.2.4 Closed Circuit Television (CCTV) 23
2.2.5 Sensors
2.2.5.1 Sensors Characteristics
2.2.5.2 Home Security Sensors
25
26
27
III PROJECT METHODOLOGY 32
3.1 Project Methodology 32
3.2 Project Planning 35
IV RESULTS 36
4.1 Software Development
4.1.1 Alarm System
4.1.1.1 Truth Table
4.1.1.2 Karnaugh Map
4.2.1.3 Programmable Logic Controller (PLC) I/O
Assignments for Alarm system
4.2.1.4 Simulation using CX-programmer for Alarm
36
37
37
38
39
ix
system
4.2.1.5 Ladder Diagram of Alarm system
4.2.1.6 Mnemonic Code of Alarm system
4.1.2 Scada Home Based Security
40
41
42
43
4.2 Result 46
V DISCUSSION
5.1 Project Significances
5.1.1 Significance to University
5.1.2 Significance to Industry
5.1.3 Significance to the Student
5.2 Benefits of the Smart Home
5.2.1 Convenience at the finger tip
5.2.2 Safety and intelligent security
5.3 Analysis on the effectiveness of using SCADA system
5.3.1 Advantages of Scada System
5.3.2 Disadvantages of Scada System
47
48
48
48
48
48
48
49
49
49
50
VI CONCLUSION
REFERENCES
53
55
x
LIST OF TABLES
NO TITLE PAGE
2.1
4.1
4.2
4.3
4.4
CCTV Parts and Accessories
Truth Table
Karnaugh Map
Input Assignments for Alarm System
Output Assignment for Alarm System
23
37
38
39
39
5.1 Comparison between the relevant systems for Smart Home
System
49
xi
LIST OF FIGURES
NO
TITLE PAGE
1.1
2.1
Burglary modus operandi
Typical SCADA system architecture
2
15
2.2
2.3
2.4
2.5
Integrated SCADA architecture
The Web Studio Development Environment
IWS Data Flow
Data Flow Example
16
17
18
19
2.6
2.7
Basic PLC Components System
PLC System Overview
21
22
2.8 Example of CCTV applications 24
2.9 Multi-Fresnel lens type of PIR/PID 29
2.10 Basic Smoke Detector 30
2.11
3.1
3.2
Example of Burglar Alarm
Flowchart of SCADA system
Gantt Chart for Project Planning
31
33
34
4.1
4.5
4.6
4.7
Logic Gate Design
Login Page
Basic Layout of a House
Event Screen
38
43
44
44
xii
LIST OF ABBREVIATIONS
UTeM Universiti Teknikal Malaysia Melaka
PLC Programmable Logic Controller
PIC Programmable Integrated Chip
SCADA Supervisory Control and Data Acquisition
SMS Short Messaging System
GSM Global System Mobile
HMI Human Machine Interface
GUI Graphical User Interface
RTUs Remote Terminal Units
CCTV Closed Circuit Television
dB Decibel
PID Passive Infrared Detector
PIR Passive Infrared Sensor
I/O Input/Output
IWS Indusoft WebStudio
IR Infra Red
xiii
LIST OF APPENDICES
NO TITLE PAGE
A InduSoft WebStudio Project 57
B Specifications of PLC OMRON 58
C Printed Materials 59
1
CHAPTER 1
INTRODUCTION
1.1 Project Background
Just as we are more conscious of national security these days, home security
remains a top concern in the minds of most people. Home is a proverbial castle, and
although a moat cannot be build around the house, we can - and should - take steps to
make our home as safe as possible. When we do, we'll sleep easier at night, whether we
are tucked into our own bed or in some place hundreds of miles away.
It is surprising the number of people who install expensive alarm systems and yet
neglect basic physical security measures. A house having an alarm but offering easy
entry may tempt a burglar to chance it, snatch a few valuables, and then make a quick
getaway. They may gamble on the fact that because of the prevalence of false alarms,
few people take any notice of an alarm sounding unless it goes on for too long. They
may even try, and succeed, in silencing it.
People that make burglarizing people have three main enemies: time, light and
noise. When a security home system is purchased, large enemies for burglars are
created. If the system is monitored, the burglar knows that his time in our house has to
be very fast because the police are dispatched on their way. The noise of the alarm is
enough to get them out by themselves of our house immediately.
2
A brief description at the burglar' modus operandi is discussed-the things he
looks for, how he gets in, and what does when he’s in.
The favourite method of access is a rear window. They are less likely to be
observed at the back than at the front, or be caught by someone returning home at the
front door. Furthermore, people tend to neglect security of the back door where
frequently front doors can be seen fairly equipped with several high-security locks and
bolts while rear doors have just a simple lock and windows have virtually no protection
at all.
Figure 1.1: Burglary modus operandi
There are several security measures that really make a difference in protecting
the house:
a) Burglars alarm
b) Security locks for doors and windows.
c) CCTV
d) Additional features such as smoke detector, water sprinkler and etc.
3
1.2 Problem Statement
The major reason in designing this project is to solve user’s problems especially
in burglary cases which are increasing nowadays. Referring to the statistic that made by
the nationmaster.com, Malaysia is in the rank of 26 out of 68 countries around the world
in most recent burglary cases. This shows that Malaysians should improve the level of
their home security in order to prevent these problems.
The funny thing about the home invasions is they have not changed at all over
the years. Criminals still use the same methods to break into the houses now as they
always have. Most of the burglaries involved with forcible entry, which means if the
users focus on protecting their home from forced entry, their odds of being burglarized
drop dramatically. Thus, having a few security measures really could really make a
difference.
a) Criminals target houses that look like easy picking. If they are searching for
somewhere to rob and see an unsecured home that looks empty, it is an attractive
options. That is why burglary usually happens at the houses where its security
system is poor and less observed.
b) By using conventional security system, users did not receive any signal when
intruders enter their houses. Therefore, immediate action cannot be performed.
c) Sometimes false signals reaction occurred due to the improper situation such as
over-sensitive alarm system because of lightning, damaged sensors etc.
d) A complete supervisory security system is very expensive in the market. Thus,
this project is to produce a cheaper system so that it is affordable for the users to
apply this system to their house.
4
1.3 Project Objectives
This project is divided into four main objectives:
a) To design the software that will control all the system we want to monitor.
b) To implement new technology for automation and security system rather than the
conventional way that is not effective and safe anymore.
c) To allow the users to control their house appliances at anytime and anywhere
they are.
1.4 Project Scope
After many researches done on the security system concept, there are some
issues must be considered to produce a preliminary design on SCADA-Based Home
Security System that are:
a) Design a system which alerts the users immediately when intruders break into
their houses.
b) Design an effective and complete security system for houses.
c) Produce a cheaper system for home security.
5
CHAPTER TWO
LITERATURE REVIEW
This chapter consists of explanation and revision of the past projects which had
been done before. It consists of theory of the components, equipments and programming
languages that will be used in this project.
2.1 Previous Research
2.1.1 Design and Implementation of Smart Home System for Security System
By : Mohd Zulfadli b Ibrahim
Summary :
Security systems have becoming more of a necessity rather than only an
additional service to home owners. Security system via Short Messaging Services (SMS)
has not been used in Malaysia yet. Thus this project is to create a security system against
burglary and give signals through SMS to the user of the system about the incident so
he/she can take immediate action on it. It comprises of integration between PLC, PIC
programming controller, Global System Mobile (GSM) mobile communication, home
automation and security system. This integration produces a Smart Home technology
6
which is coordinated by Smart Home controller and controlled by users using command
interfaces.
2.1.2 Smarter Smart Homes: Technologies, Challenges and Opportunities
By : MIMOS
Summary :
This paper discusses various aspects of a smart home system especially using a
combination of Power Line carrier, Radio Frequency (RF) and Internet technology to
access and control your home. Current trends, key issues, standards and features of
smart home systems are discussed in detail. MIMOS Smart Home System
(BestariHome) design, development and commercial implementation for 230 units of
terrace houses in Johor will be described. Finally, based on its broad experience from
design to implementation some guidelines for smart home system designers and
developers are suggested.
2.1.3 Improving Security for SCADA Control System
By : Mariana Hentea
Summary :
The continuous growth of cyber security threats and attacks including the
increasing sophistication of malware is impacting the security of critical infrastructure,
industrial control systems, and Supervisory Control and Data Acquisition (SCADA)
control systems. The reliable operation of modern infrastructures depends on
computerized systems and SCADA systems. Since the emergence of Internet and World
7
Wide Web technologies, these systems were integrated with business systems and
became more exposed to cyber threats. There is a growing concern about the security
and safety of the SCADA control systems. The Presidential Decision Directive 63
document established the framework to protect the critical infrastructure and the
Presidential document of 2003, the National Strategy to Secure Cyberspace stated that
securing SCADA systems is a national priority. The critical infrastructure includes
telecommunication, transportation, energy, banking, finance, water supply, emergency
services, government services, agriculture, and other fundamental systems and services
that are critical to the security, economic prosperity, and social well-being of the public.
The critical infrastructure is characterized by interdependencies (physical, cyber,
geographic, and logical) and complexity (collections of interacting components).
Therefore, information security management principles and processes need to be applied
to SCADA systems without exception. Critical infrastructure disruptions can directly
and indirectly affect other infrastructures, impact large geographic regions, and send
ripples throughout the national and global economy. For example, under normal
operating conditions, the electric power infrastructure requires fuels (natural gas and
petroleum), transportation, water, banking and finance, telecommunication, and SCADA
systems for monitoring and control.
In this paper, an analysis of key developments, architecture, potential
vulnerabilities, and security concerns including recommendations toward improving
security for SCADA control systems.is provided The most important issues concerning
the security of SCADA systems including a perspective on enhancing security of these
systems is discussed. A briefly description of the SCADA architecture, and the attributes
that increase the complexity of these systems including the key developments that mark
the evolution of the SCADA control systems along with the growth of potential
vulnerabilities and security concerns is analyzed. Then, recommendations are provided
toward an enhanced security for SCADA control systems. More efforts should be
planned on reducing the vulnerabilities and improving the security operations of these
systems. It is necessary to address not only the individual vulnerabilities, but the breadth
8
of risks that can interfere with critical operations. Key requirements and features needed
are described to improve the security of the current SCADA control systems. For
example, in assessing the risk for SCADA systems, use of general methods for risk
analysis including specific conditions and characteristics of a control system need to be
applied. Effective risk analysis for SCADA systems requires a unified definition for
mishap and identification of potential harm to safety.
As computer systems are more integrated, the distinction between security and
safety is beginning to disappear. In bridging the gap between these domains, a unified
risk framework is proposed which combines a new definition of mishap with an
expanded definition of hazard to include the security event. However, methods for risk
management that are based on automated tools and intelligent techniques are more
beneficial to SCADA systems because they require minimum or no human intervention
in controlling the processes. A unified security/safety risk framework for control
systems is also identified. Implementing security features ensures higher security,
reliability, and availability of control systems. Thus organizations need to reassess the
SCADA control systems and risk model to achieve in depth defense solutions for these
systems.
The increasing threats against SCADA control systems indicate that there should
be more directions in the development of these systems. Therefore, achieving better
quality and more secure SCADA control systems is a high priority. Information security
management principles and processes need to be applied to SCADA systems without
exception. A thought about the future of SCADA control systems is concluded. A
strategy to deal with cyber attacks against the nation’s critical infrastructure requires
first understanding the full nature of the threat. A depth defense and proactive solutions
to improve the security of SCADA control systems ensures the future of control systems
and survivability of critical infrastructure.
9
2.1.4 15 Great Ideas for Smart Home Security
By :Joan Engebretson
Summary :
Although residential security systems sometimes are described with terms such
as “commodity” and “cookie cutter,” it’s a different story at the high end of the market.
There are 15 great ideas for high-end residential security system:
a) Integrating multiple system
b) A single interface
c) Occupancy Sensors Save Energy
d) WAV Files for Emergency Use
e) Astronomical Clock Can “Goof Proof” the System
f) Remote Control and Alerts
g) Rethinking Alerts
h) Two-way Wireless
i) New Communication Methods
j) Phone-based Intercoms
k) Powered Door Locks
l) Secure Rooms
m) Inhalation Sensors Protect Artwork
n) Buried Coax Secures Perimeter
o) Vibration Sensors Protect Walls