Connectivity
Monitoring energy networks – how to make it easy and secure
SOURCE: HMS NETWORKS
A solution with a high level of cybersecurity protection can guarantee that critical control data will be strictly separated from monitoring data. The solution should also be easy to use and have a compact form factor to ensure that it is suitable for retrofitting, and that it fits into existing cabinets.
Gateways for monitoring energy networks, existing systems, new devices and control systems can be connected regardless of the communication technology or the manufacturer brand.
CLOUD AND CYBER SECURITY IN CRITICAL energy applications, along withdigitalization and the IoT, is a clear trend within power plants and substations, just as it is in industrial automation. The Smart Grid is certainly a driving factor, but there are also other reasons for this change. Operators often find that only having data available in the control room is insufficient. Instead, they want to monitor transformers remotely, implement new maintenance concepts from anywhere, optimize utilization and commissioning, or retrieve environmental data online. This requires a solution with a high level of cybersecurity that guarantee critical control data to be strictly separated from monitoring data. The solution should also be easy to use and have a compact form factor to ensure that it is suitable for retrofitting and that it fits into existing cabinets. 11.202 1
By using Smart Grid gateways for monitoring energy networks, existing systems, new devices and control systems can be connected regardless of the communication technology or the manufacturer brand
Cybersecurity of utmost importance
Substations which convert high transmission voltage into consumer voltage are an important part of the electrical grid, not only for municipalities but also for the railways and industrial companies to name but a few. They usually consist of power transformers, switchgear and a lot of equipment for measurement and control. Substations are usually managed from a control room, or remotely from control centres. This control path is subject to strict security regulations as a successful hacker attack could have catastrophic consequences. There is also
i n d u str i a l e th e r n e t b o o k
a need for cloud-based monitoring. But how can this be achieved without neglecting the required cybersecurity?
Two separate data streams
In principle, there are two different data streams in substations: the first is the control data with which the control room communicates with the substation or individual devices. Control data means sending commands such as “Turn switch on”, “Measure now” or “Send measured value”. This critical communication runs in real time according to the protocols used in the energy sector such as IEC61850 or IEC60870-5-104. The security requirements are high and unauthorized data must be excluded. The second data stream delivers monitoring data from sensors and devices to the control room. Real-time communication is not required
25