Industrial Operational Technology Error Detection, Reporting, and the Subsequent Network Performance Impacts

Lauriston, Clinton (2023) Industrial Operational Technology Error Detection, Reporting, and the Subsequent Network Performance Impacts. [USQ Project]

[img] Text (Project – redacted)
Lauriston_C_Leis_Redacted.pdf

Download (4MB)

Abstract

As information technology (IT) and operational technology (OT) continue to grow and integrate into networked control systems, the risks associated with both intentional and unintentional cybersecurity and integrity grow. This is of particular concern as it supports many critical systems and infrastructure, maintaining safe and productive operational environments.

The project proposes a method to create a secure process to accurately and rapidly configure OT devices, audit the OT device blueprint, and promptly and automonomously alert the key stakeholders responsible for the integrity of the system, where it addresses the requirements without compromising network vulnerabilities, including performance and security.

This document describes the current shortfalls in information and the lack of technological use at the identified coal mine leaving them susceptible to intentional or unintentional tampering. Key stakeholder engagement was undertaken to gain a thorough understanding of the current situation, followed by bench testing and benchmarking network and device architecture and performance, to determine the feasibility of real-world project execution. The testing monitored the staged reduction in memory and the increased network utilisation with its possible impact on packet accuracy.

Of the advanced authentication testing, the field instrumentation were able to be analysed through the programmable logic controller (PLC) software, however automatic parameter authentication was not possible, due to the inability to access explicit parameters within the data frames. Conversely, the variable speed drives (VSDs) and motor management relay (MMR) were able to return their parameters, thus successfully auditable. Unfortunately they were unable to be configured remotely as the PLC software could not connect successfully through the device type manager (DTM) configuration interface. This testing regime resulted in minimal additional network loading, deeming the increased security measures suitable for implementation site-wide.

There is no information as to whether this method of authentication has been used in industry, so a particularly successful outcome of this dissertation is that with total production loss resulting in $285,554/hour, the proposed approach has a potential return on hardware investment of 1 hour and 40 minutes.


Statistics for USQ ePrint 52965
Statistics for this ePrint Item
Item Type: USQ Project
Item Status: Live Archive
Faculty/School / Institute/Centre: Current – Faculty of Health, Engineering and Sciences - School of Engineering (1 Jan 2022 -)
Supervisors: Leis, John
Qualification: Bachelor of Engineering (Honours) (Electrical/Electronic)
Date Deposited: 30 Sep 2025 00:01
Last Modified: 30 Sep 2025 00:01
Uncontrolled Keywords: networked control systems; cybersecurity
URI: https://sear.unisq.edu.au/id/eprint/52965

Actions (login required)

View Item Archive Repository Staff Only