Generated by GPT-5-mini| SCADA | |
|---|---|
| Name | SCADA |
| Caption | Supervisory control and data acquisition system architecture |
SCADA Supervisory control and data acquisition systems coordinate remote monitoring and control of industrial processes, critical infrastructure, and distributed assets. They integrate human-machine interfaces, programmable controllers, telemetry, and historians to enable operators to supervise operations across utilities, manufacturing, transportation, and energy sectors. SCADA systems intersect with automation, cyber‑physical systems, industrial control systems, and operational technology in large enterprises and public utilities.
SCADA systems provide centralized supervision of geographically dispersed assets and enable real‑time data acquisition, process visualization, alarm management, and archival of telemetry. Typical deployments interconnect field devices such as RTUs and PLCs with operator consoles, historians, and enterprise systems in environments managed by corporations like Siemens, Schneider Electric, ABB, General Electric and utilities such as Pacific Gas and Electric Company, National Grid plc, Électricité de France. The architecture supports protocols and standards developed by organizations including IEC 60870-5-101, IEC 60870-5-104, IEEE 1815 (DNP3), OPC Foundation, and ISA100. SCADA integrates with control strategies used in facilities operated by firms such as Shell plc, ExxonMobil, BP, BASF, and transportation operators like New York City Transit Authority and Union Pacific Railroad.
Origins trace to early telemetry and remote control in the mid‑20th century with implementations by utilities and pipeline operators, drawing on radio telemetry projects in companies such as General Electric and institutions like Bell Labs. The 1970s and 1980s saw proliferation with vendors including Honeywell International and Emerson Electric, and standards activity via bodies like International Electrotechnical Commission and Institute of Electrical and Electronics Engineers. The 1990s and 2000s brought PC‑based HMIs, distributed control via technologies from Microsoft and database vendors like Oracle Corporation, and increased integration with corporate networks used by firms such as IBM and Siemens Energy. High‑profile incidents involving infrastructure controllers elevated attention from agencies including Department of Homeland Security (United States), National Institute of Standards and Technology, and regulators in the European Union.
A SCADA architecture typically includes human‑machine interfaces (HMIs), data acquisition servers, historians, remote terminal units (RTUs), programmable logic controllers (PLCs), and communication networks. HMIs and engineering workstations often run software from suppliers like Schneider Electric and Rockwell Automation; historians use database systems from Microsoft SQL Server, Oracle Database or time‑series platforms. Field controllers from Siemens AG, ABB Group, and Mitsubishi Electric interface with sensors and actuators installed at sites managed by companies like TransCanada Corporation and Enbridge Inc.. Redundancy and high availability are designed using clustering and virtualization technologies offered by VMware, Inc. and Red Hat, Inc.. System integrators such as Siemens and ABB combine PLC logic, HMI screens, and SCADA servers for sectors served by Exelon Corporation, National Grid plc, and EDF Energy.
SCADA communications use serial links, Ethernet, wireless radio, cellular networks, and fiber optics, employing protocols like Modbus, DNP3, IEC 61850, OPC UA, and proprietary protocols from vendors such as Honeywell and Rockwell Automation. Interoperability efforts reference standards from International Electrotechnical Commission and the OPC Foundation; industrial deployments often rely on telecom providers like AT&T and Verizon Communications for WAN connectivity. Protocol gateways and protocol converters produced by firms like Schneider Electric and HMS Industrial Networks enable integration across substations operated by National Grid plc and pipeline networks owned by Enbridge Inc..
SCADA systems have historically relied on isolation, but increased connectivity has exposed them to threats documented by United States Computer Emergency Readiness Team and ENISA. Vulnerabilities include insecure protocols, default credentials, unpatched firmware from vendors such as Siemens, Schneider Electric, and Rockwell Automation, and supply‑chain risks involving firms like Foxconn. Notable cyber incidents associated with industrial control systems have prompted investigations by FBI, Department of Homeland Security (United States), and attribution studies involving state actors tied to geopolitical events. Mitigations follow guidance from NIST publications and best practices advocated by ISA/IEC 62443 and ISO/IEC 27001; vendors and operators implement network segmentation, intrusion detection from companies such as Palo Alto Networks and CrowdStrike, and endpoint hardening by Microsoft.
SCADA is used across electric power grids managed by National Grid plc and Électricité de France, gas pipelines owned by Enbridge Inc. and TransCanada Corporation, water utilities such as Thames Water and Veolia Environnement, oil and petrochemical facilities run by Shell plc and BP, manufacturing plants operated by Toyota Motor Corporation and Siemens Mobility, and transportation systems overseen by Amtrak and Deutsche Bahn. Specialized applications appear in renewable energy farms controlled by Vestas and Ørsted A/S, building automation for conglomerates like Siemens and Honeywell International, and mining operations from companies such as BHP and Rio Tinto.
Compliance frameworks and technical standards govern SCADA deployments, including IEC 61850 for substations, IEC 62443 for industrial automation security, ISO/IEC 27001 for information security management, and regional regulatory regimes enforced by bodies such as Federal Energy Regulatory Commission and the European Union Agency for Cybersecurity (ENISA). Sectoral regulators like Ofgem, Ofwat, and the U.S. Environmental Protection Agency impose requirements on utilities and water operators that use SCADA. Certification programs and audits by firms such as Deloitte, PwC, and KPMG assist operators and vendors in meeting these obligations.
Category:Industrial control systems