Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
A SYSTEM AND METHOD FOR SECURING AN INDUSTRIAL CONTROL SYSTEM
Document Type and Number:
WIPO Patent Application WO/2015/092817
Kind Code:
A1
Abstract:
The present invention relates to systems and methods for securing control of industrial processes. The present invention provides a secure distributed control system used for controlling industrial processes. The system comprises a plurality of field devices, a controller module which includes a Field Programmable Gate Array (FPGA) module including control logic for one critical process and a master processor including control logic of all other industrial processes and an Input Output module for exchanging signals between the field devices and the controller module. The present invention also provides a method of securing a distributed control system used for controlling industrial processes, against modification of a control logic using the system of the present invention.

Inventors:
POONAMALLE THRILOK L (IN)
Application Number:
PCT/IN2014/000783
Publication Date:
June 25, 2015
Filing Date:
December 18, 2014
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
CYIENT LTD (IN)
SIVASAMY VELLIANGIRI (IN)
International Classes:
G05B19/05; G06F21/76; H04L29/06
Domestic Patent References:
WO2002019064A22002-03-07
WO2006131317A12006-12-14
Foreign References:
US6826434B12004-11-30
EP2528000A12012-11-28
EP0851358A21998-07-01
US20070152709A12007-07-05
Other References:
None
Attorney, Agent or Firm:
DAVAR, G S et al. (32 Radha Madhav Dutta Garden LaneKolkata 0, West Bengal, IN)
Download PDF:
Claims:
We Claim:

1. A secure distributed control system used for controlling industrial processes, the system comprising:

- a plurality of field devices, each of the field device is used for operations including starting and stopping an industrial process, collecting data from a sensor, monitoring an industrial process parameter for an alarm condition;

- a controller module to control a plurality of industrial processes and take necessary action on the alarm condition according to preset control logics; based on the data received from the plurality of field devices, the controller module comprising:

- a Field Programmable Gate Array (FPGA) module including control logic for at least one critical industrial process from the plurality of~ industrial processes; and

- a master processor including control logic of all other industrial processes from the plurality of industrial processes except the at least one critical process; and

- an Input Output module for exchanging signals between the plurality of field devices and the controller module.

2: The system according to claim 1 , wherein the control logic in the FPGA module is configured in a Hardware Description Language.

3. The system according to claim 1 , wherein the FPGA module is configurable only using special tools.

4. The system according to claim 2, wherein the FPGA module configuration in the Hardware Description Language prevents modification in the control logic from an intended human interruption, an offline or an online software threat including a cyber attack, a malware, a Trojan, a virus, an infected storage device or a combination thereof.

5. The system according to claim 1 , wherein the FPGA module is a hardware component which is interfaced to the master processor and the Input Output modules using a communication bus.

6. A method of securing a distributed control system used for controlling industrial processes, against modification of a control logic, the method ; comprising steps of: j

- providing a Distributed Control System including a plurality of filed devices, I a controller module and an Input Output module;

- identifying at least one critical process from a plurality of industrial processes;

- providing a Field Programmable Gate Array (FPGA) module;

- segregating a control logic of the at least one critical process from the i controller module; and

- configuring the FPGA module by writing the control logic of the at least one critical process in the FPGA module, such that the controller module comprises the FPGA module including control logic for at least one critical process and a master processor including control logic of all other processes from the plurality of industrial processes except the at least one critical process.

7. The method according to claim 6, wherein the FPGA module is configured by writing the control logic in a Hardware Description Language.

8. The method according to claim 6, wherein the configuration of the FPGA module is performed only using special tools.

9. The method according to claim 7, wherein the configuration of the FPGA module in the Hardware Description Language prevents modification in the control logic from an intended human interruption, an offline or an online software threat including a cyber attack, a malware, a Trojan, a virus, an infected storage device or a combination thereof.

Description:
A SYSTEM AND METHOD FOR SECURING AN INDUSTRIAL CONTROL SYSTEM

FIELD OF THE INVENTION

[001] The present invention relates in general to systems and methods for control of industrial processes in a plant, and more particularly to secured systems and methodsfor control of industrial processes.

BACKGROUND OF THE INVENTION

[002] In an industrial plant the control system is used to control most of the industrial processes performed at the plant. Typically, the plant has a centralized control room having a DCS (Distributed Control System) with user I/O, disc I/O, and other peripherals. Coupled to the control system network are controllers. The process I/O subsystem includes a plurality of I/O ports which are connected to various field devices throughout the plant. Field devices includes various types of analytical equipment, pressure sensors, capacitive pressure sensors, resistive temperature detectors, power switches, thermocouples, limit switches, on/off switches, flow transmitters, pressure transmitters, capacitance level switches, weigh scales, valve positioners, valve controllers, actuators, solenoids, and indicator lights. As used herein, the term "field device" encompasses these devices, as well as any other device that performs a function in a distributed control system and is known in the control art.

[003] A process industrial control system refers to a monitoring and control system, usually of an industrial system or a set of industrial processes, in which a distributed control system (DCS) may utilize controller elements to monitor and control the industrial processes. The controllers are governed by a DCS server and engineering stations that sends information to human operators who. monitor and control the industrial processes via an operator console which is located in a control room of the plant. A single DCS may contain multiple operator consoles which are used to notify human operators about industrial process conditions via alarms and viewable data. Multiple control systems like DCS & ESD (Emergency Shutdown System)may be connected by a process control communications network.

[004] Industrial control system (ICS) consists of a corporate

LAN(Enterprises Control Network) anda control system LAN. Corporate workstations, business servers, web servers, corporate database are classified into corporate LAN. Control room work station, DCS controllers, HMI (Human Machine Interface), entire production lines and processes which could be linked over industrial cable/bus networks (Modbus, Profibus, Fieldbus and others) to provide monitoring and control to a foreman's desk and Engineering Workstation are classified as the control system LAN.

[005] DCS (Distributed Control System) is used to control industrial processes in an industrial plant such as electric power generation, oil and gas refineries, chemical, automotive production and other various industries. DCSs have many unique characteristics including a need for real-time response and extremely high availability, predictability, and reliability of controls & data. The use of DCS thereby results in minimum risk to the health and safety of human beings, prevents serious damage to the environment, prevents serious production stoppages or slowdowns that result in negative impact to a nation's economy and the ability to carry out critical functions, protecting the critical infrastructure from common human errors and safeguarding them against the compromise of proprietary information.

[006] DCS is implemented in a variety of industries, to monitor and control distributed equipment used in industrial processes. DCS are dedicated systems used to control manufacturing processes that are continuous or batch-oriented. DCSs are connected to sensors and actuators and use setpoint controls, to control the process.. The input/output devices (I/O) may either be integrated with the controller or located remotely. The entire system of controllers is connected by networks for communication and monitoring. Based on information received from remote stations, automated or operator-driven supervisory commands can be pushed to remote station control devices, which are often referred to as field devices. Field devices control local operations such as opening and closing of valves and breakers, starting and stopping of pumps, motors and other processes, collecting data from sensor systems, and monitoring the local environment for alarm conditions.

[007] DCS have computational capabilities and, in addition to proportional-integral-derivative (PID) control can generally perform logic and sequential control. Even though there are dedicated safety systems and networks like ESD (Emergency Shutdown systems) available in the ICS. A power plant shutdown may result in huge economic losses.

[008] Data transfer to and from an ICS must to be evaluated for security risk. USB storage drives or the Enterprise/ICS firewall is a flawed defence. It is observed that complete prevention of ICS infection is probably impossible and that instead of complete prevention, industry must create a security architecture that can safeguard the ICS from cyber break. ICS or Supervisory Control And Data Acquisition (SCADA) system is highly complex and interconnected, ensuing in multiple potential pathways from the outside world to the process controllers.

[009] Enterprise Control Network is the corporate network, which hosts most business users, business accounting and planning systems, such as Enterprise Resource Planning (ERP) systems. Microsoft Internet Security and Acceleration (ISA) Servers protect the plant zones from the WAN. They also protect zones from each other. All traffic between security zones passes through an ISA server. Each ISA server hosts a number of functions, such as firewall services, network address translation, web proxies, virus scanning and secure web server publishing. All of the ISA servers are configured by default to block connections originating in less- trusted networks, such as the corporate WAN. The ISA servers allow connections, such as web services connections, from clients on less- trusted networks to selected servers, such as web servers, in the Perimeter Network.

[0010] DCS devices and ERP systems typically use non-hardened networking stacks, the most common operating systems is Microsoft Windows. As a result, such systems can easily fall prey to viruses, worms, and Trojans. Regardless of the quality of antivirus software installed, malware (Trojans, viruses and worms) can be inadvertently downloaded from the Internet or any other means, and these can replicate themselves on portable memory devices of all types.

[0011] Recent examples exists which shows failure of a plant operation due to the cyber attack and modification of control logic on the DCS for industrial processes. The largest electrical outage in world history also called massive blackout happened in July 2012 knocked out power to nearly 700 million people in India which is more than 10% of the world's population without electricity over two days, crippling heavy economic costs. The cause of this is suspected to be an intended human interruption or any other factor or viruses, worms, and Trojans that influence control system malfunctioning.

[0012] One such example is of the Stuxnet worm, a piece of cgmputer malware designed to harm industrial processes control. Stuxnet might migrate from the outside world to supposedly isolated and secure industrial control systems (ICS).This infected and propagated into the ICS, and was powerful enough to escape security technologies and procedures. It propagates via ERP network exposed to internet or Via infected removable drives (such as USB flash drives and external portable hard disks), or Via Local Area Network communications (such as shared network drives and other services), and infected DCS/PLC control logic files. It propagates quickly via multiple network pathways, modifies its behaviour to avoid detection by available virus detection technologies, establishes a peer-to-peer network to propagate command and control server even to equipment without direct Internet connectivity

[0013] It further modifies programming logic, causing process controllers to malfunction, hides the modified control logic programs from control engineers and system administrators to diagnose the malfunctioned system. Windows operating systems and Process Controllers fall prey to this malware. Once it detects a suitable target, it modifies control logic in specific models of Control System. The objective appears to be to sabotage a specific industrial process using variable- frequency drive control Logic. These worms are not identified and blocked even by advanced cyber security.

[0014] Cyber-crime and other electronic attacks against critical infrastructure are also on the rise. While remote cracking once required a fair amount of skill or computer knowledge, hackers can now download attack scripts and protocols from the Internet and launch them against victim sites or systems. Thus, while attack tools have become more sophisticated, they have also become easier to use. This also poses face a , ariety of significant national security threats. Stuxnet invasion and hacking of Trans-Siberian pipeline project are few typical examples of cyber and electronic attack on Industrial Control Systems.

[0015] Based on the above examples it is just to say that the present infrastructure of DCSs is not fully secured against and may lead to industrial plant failures and causing huge losses in terms of safety, money and environmental hazards. In view of the limitations inherent in the systems and method of industrial control, there exists a need for a secured DCS and method of securing the DCS in an efficient, fast, robust, flexible, cost effective, secure and environment friendly manner. The present invention fulfils this need and provides further advantages as described in the following summary.

SUMMARY OF THE INVENTION

[00 6] In view of the foregoing disadvantages inherent in the prior arts, the general purpose of the present invention is to provide an improved combination of convenience and utility, to include the advantages of the prior art, and to overcome the drawbacks inherent therein. [0017] In one aspect, the present invention providesa secure distributed control system used for controlling industrial processes. The system comprises a plurality of field devices, a controller module comprising a Field Programmable Gate Array (FPGA) module including control logic for at least one critical industrial process and a master processor including control logic of all other industrial processes except the critical process and Input Output module for exchanging signals between the plurality of field devices and the controller module.

[0018] In another aspect of the present invention, the control logic in the FPGA module is configured in a Hardware Description Language using special tools.

[0019] In yet another aspect of the present invention, the FPGA module configuration in the Hardware Description Language prevents modification in the control logic from an intended human interruption, an offline or an online software threat including a cyber attack, a malware, a Trojan, a virus, an infected storage device or a combination thereof.

[0020] In another aspect the present invention provides a method of securing a distributed control system used for controlling industrial processes, against modification of the control logic. The method comprising providing a DCS including a plurality of filed devices, controller module and Input Output module, identifying at least one critical process, p oviding a Field Programmable Gate Array (FPGA) module, segregating the control logic of the critical process from the controller module and configuring the FPGA module by writing the control logic of the at least one critical process in the FPGA module, such that the controller module comprises the FPGA module including control logic for the critical process and a master processor including control logic of all other processes except the critical process.

[0P21] These together with other aspects of the invention, along with the various features of novelty that characterize the invention, are pointed out with particularity in the claims annexed hereto and forming a part of this disclosure. For a better understanding of the invention, its operating advantages and the specific objects attained by its uses, reference should be had to the accompanying drawings and descriptive matter in which there are illustrated exemplary embodiments of the invention.

BRIEF DESCRIPTION OF THE DRAWINGS

[0022] The advantages and features of the present invention will become better understood with reference to the following more detailed description taken in conjunction with the accompanying drawings in which:

[0023] FIG. 1 illustrates a schematic diagram of the secured DCS, according to one embodiment of the present invention;

[0024] FIG. 2 illustrates a block diagram of the controller module, according to one embodiment of the present invention;

[0025] FIG. 3 illustrates a flowchart of the method of securing DCS, according to one embodiment of the present invention; and

[0026] FIG. 4 illustrates schematic diagram of the system of the present invention working along with ESD system, according to one embodiment of the present invention. [0027] Like reference numerals refer to like parts throughout the several views of the drawings.

DETAILED DESCRIPTION OF THE DRAWINGS

[0028] In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without these specific details.

[0029] As used herein, the term 'plurality' refers to the presence of more than one of the referenced item and the terms 'a', 'an', and 'at least' do not denote a limitation of quantity, but rather denote the presence of at least one of the referenced item.

[0030] The terms 'industrial process' or 'process' may be used herein interchangeably and refer to convey the same meaning.

[0031] In an exemplary embodiment, the present invention provides a method and system for securing an industrial control system. The system and method of the present invention may be used for mass implementation in an easy, cost effective, environment friendly and productive way.

[0032] It is to be understood that the improvements of the present invention are applicable to any of a number of methods and systems for securing an industrial control system, other than those which are specifically described below. Such methods and systems will be readily understood by the person of ordinary skill in the art, and are achievable by causing various changes that are themselves known in state of the art.

[0033] The trademarks, software names, etc used in the present description are property of the respective owner companies and used herein for illustrative purposes only. The applicant does not claim any rights on such terms.

[0034] Reference herein to "one embodiment" or "another embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the invention. The appearances of the phrase "in one embodiment" in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Further, the order of steps in process flowcharts or diagrams representing one or more embodiments of the invention do not inherently indicate any particular order nor imply any limitations in the invention.

[0035] Referring to FIG. 1 that illustrates a schematic diagram of the secure distributed control system 10 used for controlling industrial processes, according to one embodiment of the present invention. The system 10 comprises a plurality of field devices 12, each of the field device 12 is used for operations including starting and stopping an industrial process, collecting data from a sensor, monitoring an industrial process parameter for an alarm condition, a controller module 14 to control a plurality of industrial processes and take necessary action on the process conditions and alarm condition according to preset control logics, based on the data received from the plurality of field devices 12. The controller module 14 comprises a Field Programmable Gate Array (FPGA) module 16 including control logic for at least one critical industrial process from the plurality of industrial processes and master processor 18 including control logic of all other industrial processes from the plurality of industrial processes except the critical process. The system further includes an Input Output module 20 for exchanging signals between the plurality of field devices 12 and the controller module 14.

[0036] The field devices 12 may include various types of analytical equipments, pressure sensors, capacitive pressure sensors, resistive temperature detectors, power switches, thermocouples, limit switches, on/off switches, flow transmitters, pressure transmitters, capacitance level switches, weigh scales, valve positioners, valve controllers, actuators, solenoids, and indicator lights. As used herein, the term "field device" encompasses these devices, as well as any other device that performs a function in a distributed control system and is known in the control art.

[0037] The controller module 4 receives signals from the field devices 12 about the process parameters and takes necessary action to control the respective industrial process. The controller module 14 has programming of the control logic of all the processes about what are the correct operation parameters of a process, what is the threshold value of detected parameter, what action to be taken when there is change in the parameters. The controller module 14 receives signals from the field devices 12 via input output module 20. The input output module 20 transfers the values of different parameters of the processes collected by the field devices 12 to the controller module 14 and also transmit commands of the controller module to the filed devices for taking the necessary action. [0038] The system 100 of the present invention further includes an operator console (not shown) which allows an operator to monitor different industrial processes and give necessary commands for controlling the processes.

[0039] The controller module 14 of the present invention comprises a Field Programmable Gate Array (FPGA) module 16 and a master processor 18. A conventional DCS controller module has a single processor which includes control logic of all the plurality of industrial processes. However the system 10 of the present invention proposes the controller module 14 which comprises a Field Programmable Gate Array (FPGA) module 16 including control logic for at least one critical industrial process selected from the plurality of industrial processes and the master processor 18 including control logic of all other industrial processes from the plurality of industrial processes except the critical process. In other embodiment of the present invention more than one process may be identified as critical processes and their respective control logics may be written in the FPGA module 16.

[0040] In one embodiment of the present invention the control logic in the FPGA module 16 is configured in a Hardware Description Language. The FPGA module is configurable only using special tools and may not be configured if the special tools are not available.

[0041] FPGA (Field-programmable gate array) module is a programmable integrated circuit designed to be configured by a customer or a designer. FPGA security features at the software and intellectual property level. FPGA are pre-fabricated silicon devices that can be electrically programmed to become almost any kind of digital circuit or system. Synthesis tools translate the code into bit stream, which is downloaded to the configuration memory of the FPGA. Commonly, hardware description languages (HDL) are use to configure the device. There are also library based solutions which are optimized for a specific device.

[0042] FPGA can operate simultaneously in parallel. Not only does the parallel operation enable much higher speed, it also eliminates the need to switch tasks or contexts as with computers. For real-time applications, the main function of a computer operating system is to switch tasks to process interrupts and dispatch computer resources to the various tasks in the program. Parallel circuitry within FPGAs also produces an efficient pipeline action for signal processing applications.

[0043] HDL is the most common approach to configure a FPGA. There are two dominating languages, VHDL and Verilog. Verilog was originally a C- like programming language to model hardware. FPGAs have large resources of logic gates and RAM blocks to implement complex digital computations.

[0044] The FPGA module configuration in the Hardware Description Language prevents modification in the control logic from an intended human interruption, an offline or an online software threat including a cyber attack, a malware, a Trojan, a virus, an infected storage device or a combination thereof, thus securing the system 10 against any modification of critical process control logic. The infected storage device may be external or integral storage device such as USB, memory card, hard disk or any such storage device known in the art which is infected by any control logic affecting program.

[0045] The deterioration or modification of control logic and threat to the DCS may be any external threat or some internal threat. The external threats may come from internet, ERP Network or any other network connected to plant network, any infected mass storage device like USB, external hard-drive or any other storage device. The external threats may be in the form of any type of malware, virus, Trojan, worm, spyware or hacking of control network.

[0046] Similarly the internal threats may be some human effect like a human mistake in handling the process controls which causes the alarm condition. It may be in the form of some intended human interruption during plant operation, plant maintenance or any other plant condition. The system 10 of the present invention prevents deterioration or modification of control logics of the industrial process against external and internal threats.

[0047] In yet another embodiment of the present invention the FPGA module 16 is a hardware component which is interfaced to the master processor 18 and the Input Output modules 20 using a communication bus. This makes the implementation of the system 10 very easy. The critical process control is implemented on the FPGA module 16 which can be embedded to and existing DCS at the controller module level and utilizes the same lnput\Output available in the DCS effectively. Thus it avoids investment on new control system.

[0048] The industrial control system in addition to DCS also includes ESD (Emergency Shutdown System) which is activated in off nominal conditions and shutdowns the plant. Startup & productivity cannot be achieved unless the DCS system is completely tested again after shutdown by a cyber attack. Complete testing and commissioning of DCS is required. The system 10 of the present invention reduces the retesting and commissioning activities of the plant, since only the testing and commissioning needs to be done only for less critical processes. The critical process is safe and protected in FPGA so the testing and commissioning need to be done only for remaining less critical processes. This facilitates quicker plant startup in case of any cyber-attacks, rather than complete testing and commissioning of DCS and it also eliminates economic and environmental hazards and improves safety

[0049] Referring to FIG. 2 that illustrates a block diagram of the controller module 14, according to one embodiment of the present invention. The controller module 14 includes a FPGA module 16 and the master processor 18. The FPGA module 16 has a FPGA processor unit and is connected to memory unit, Timer unit, and I/O unit. Similarly the master controller 18 has an instruction unit, Register unit, Timer unit, ALU, Address unit, Memory unit, Integer unit, processor unit and I/O unit which are connected via a data bus.

[0050] FIG. 3 illustrates a flowchart of the method 100 of securing a distributed control system used for controlling industrial processes, against modification of the control logic, according to one embodiment of the present invention. The method 100 starts with step 110 of providing a Distributed Control System including a plurality of field devices 12, a controller module 14 and an Input Output module 20. A convention DCS available in prior art is provided and implemented in the industrial control of the processes in the plant. The field devices 12 collect information about process parameters and supply it to the controller module 14 via I/O module 20. The controller monitors all the information and provides necessary commands to the field devices based on the data and the programming of control logic in the controller module. The DCS may further include other standard components available in the prior art to be used in industrial process control and ereby included by reference. [0051] In step 20 at least one process from the plurality of industrial processes in the industrial plant is identified as a critical process. This identification may be based on the experience, or choice of the plant owner or by the designers. In another embodiment of the present invention a plurality of processes may be identified as critical processes. For example in a thermal power plant there are different operations performed by different components such as a boiler, turbine, condenser, feed water pump and stack. Plant engineers may feel that the boiler operations are critical for the plant, then the generation of steam in boiler is identified as critical process. The plant engineers may also feel that the feed water pump is also a critical component so the process is also indentified as another critical process and here two processes are identified as critical processes.

[0052] In a similar manner for a delayed coker unit in an oil refinery having a furnace, coke drum, quench tower, fractionators and reflux drum, the operator may identify coke drum operations as critical so it is used as the critical process in the method of the present invention.

[0053] Next in step 130 a Field Programmable Gate Array (FPGA) module 16 is provided. The FPGA module 16 is a programmable integrated circuit designed to be configured by a customer or a designer.

[0054] In step 140 the control logic of the identified critical process is segregated from the controller module 14. The portions of programming of control logic for the identified critical process are removed from the controller module.

[0055] Next in step 150 the FPGA module 16 is configured by writing the control logic of the critical process in the FPGA module. The removed portions of programming corresponding to identified critical process from the controller module are configured in the FPGA module such that the controller module has now two components working simultaneously; the FPGA module including control logic for the critical process and a master processor 18 including control logic of all other processes from the plurality of industrial processes except the critical process. The I/O module 20 is common for both the master controller 18 and the FPGA module 16 but the FPGA module 16 has only the control logic of critical process. In the example of thermal power plant described earlier say the control logic of the boiler drum level is in the FPGA module and the rest of the processes of the thermal power plant are controlled by the master processor.

[0056] In one embodiment of the present method, the FPGA module is configured by writing the control logic in a Hardware Description Language. In another embodiment the configuration of the FPGA module is performed only using special tools. The configuration of the FPGA module in the Hardware Description Language prevents modification in the control logic from an intended human interruption, an offline or an online software threat including a cyber attack, a malware, a Trojan, a virus, an infected storage device or any combination of them. The infected storage device may be external or integral storage device such as USB, memory card, hard disk or any such storage device known in the art which is infected by any control logic affecting program.

[0057] Design theft has the greatest concern with nuclear power projects and the due to programmable logic's integration capability, the potential for cloning and reverse-engineering becomes a concern for an increasing number and variety of such applications. Similarly the designer/vendor wants to protect a product or design embedded in their system which forms their intellectual property from being cloned or reverse engineered. The designer/vendor also wants to protect the integrity and confidentiality of a data stream being sent to or from an FPGA. Users are concerned with preventing device designs from being copied, corrupted, or otherwise interfered with. IP Security is the primary concerns of companies or IP developers whose competitive advantage is derived from their ability to implement complex proprietary designs. IP theft has grown dramatically in recent years resulting in enormous economic losses. The writing of control logic of critical process in the FPGA module using a Hardware Description Language also prevents the content being copied by copycats and prevents design and intellectual property theft. The FPGA are only configurable using special tools, this makes it more difficult from being reverse engineered and copied.

[0058] FIG. 4 illustrates schematic diagram of the system of the present invention working along with ESD system, according to one embodiment of the present invention. The ESD system has a primary and secondary ESD network which are respectively connected to two redundant Central Processing Units (CPUs) CPU1 and CPU2. These CPU performs their intended functions and interact with their respective networks to provide overall picture to other connected systems to the networks. The ESD systems further includes four redundant I/O cards to receive information from the field devices and send the commands of the CPU to the field devices and thereby controlling the field component working. ESD systems are designed to shut down the plant in case of very high priority alarm situation and very high setpoint value of any control parameter. If the ESD system receives a very high alarm signal or very high setpoint value related to any one component or process in the industrial plant, it sends a trip command and the whole plant is stopped.

[0059] The DCS as shown in FIG. 4 is the secured DCS 10 according to one embodiment of the present invention. The DCS 0 has the controller module 14 with FPGA 16 and the master processor 18 is here referred as hybrid DCS. The term 'hybrid DCS' hereafter also refers to the system 10 of the present invention. As shown it includes two redundant CPUs Hybrid CPU and Hybrid CPU2 which are connected to primary DCS network and secondary DCS network respectively. In one embodiment of the present invention the system 10 may include four optional redundant I/O cards for collecting data from the field devices directly and independent to the I/O cards of the ESD system.

[0060] The DCS system 10 is for nominal operation of the plant and does not shutdowns the plant. It operated for low priority alarms and lower setpoints. If any of the process or component shows parameter values which are in the range of DCS control then the DCS control send close command to operate the identified process or component. The lower alarm situation and lower setpoints do not require the shutdown of the whole plant and by just closing the particular process or device the other processes may work till the stopped process or component if repaired. The DCS system 10 of the present invention avoids unsafe plant operation and shutdown of the whole plant in such situations and thereby prevents huge losses incurred due to retesting and commissioning of the plant after a cyber attack. The ESD and DCS systems receive the data from field devices and based on the DCS and ESD system logics send the final signal to the field component.

[0061] FPGAs have several advantages like: - their high reliability,

- high speed,

- conceptually simple implementation,

- highly rugged and radiation hardened which made several nuclear reactors implement safety and curtail functions with FPGAs,

- greater flexibility for programming,

- faster I/O response times and specialized functionality,

- more computing power than digital signal processors,

' - low power consumption,

- achieving high level of control for longer period.

[0062] The present system 10 and method 100 using FPGAs may find a useful implementation for nuclear process control systems because of above advantages. The performance level of FPGAs and their associated software tools have advanced nowadays such that they are now being considered in the design of most of the complex digital control systems.

[0063] It is to be noted that the method of the present invention may also be implemented as an step in any existing DCS or may be developed as a part of a new independent DCS or any software in an easy, cost effective, environment friendly and productive way.

[0064] In other instances, well-known methods, procedures, and steps have not been described herein, so as not to obscure the particular embodiments of the present invention. Further, various aspects of embodiments of the present invention may be made using various systems and methods. [0065] Although a particular exemplary embodiment of the invention has been disclosed in detail for illustrative purposes, it will be recognized to those skilled in the art that variations or modifications of the disclosed invention, including the rearrangement in the steps of the method, changes in steps, variances in terms of devices may be possible. Accordingly, the invention is intended to embrace all such alternatives, modifications and variations as may fall within the spirit and scope of the present invention.

[0,066] The foregoing descriptions of specific embodiments of the present invention have been presented for purposes of illustration and description. They are not intended to be exhaustive or to limit the invention to the precise forms disclosed, and obviously many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and its practical application, to thereby enable others skilled in the art to best utilize the invention and various embodiments with various modifications as are suited to the particular use contemplated. It is understood that various omissions, substitutions of equivalents are contemplated as circumstance may suggest or render expedient, but is intended to cover the application or implementation without departing from the spirit or scope of the claims of the present invention.

Γ