International Journal of Energy Engineering          
International Journal of Energy Engineering(IJEE)
Frequency: Yearly
Editor-in-Chief: Prof. Sri Bandyopadhyay(Australia)
Investigation into Remote Monitoring of Power Transformers using SCADA
Full Paper(PDF, 184KB)
This paper investigates the use of internet-based Supervisory Control and Data Acquisition (SCADA) system to monitor power transformer parameters remotely and to investigate into how personnel can have access to their system regardless of their location. There are several parameters that can be monitored for efficient operation of a power transformer, although temperature, voltage, load and bushing condition are considered in this work because they are the major cause of transformer failure. In carrying out this work, the software and hardware components required to carry out the remote monitoring function was considered. Means of preventing hackers from getting access to the network have been considered. The implementation of the monitoring system will help to save running cost by optimising maintenance schedule and reduce risk of failure to the power transformer.
Keywords:Internet-based SCADA, Automation, Power Transformers, Remote Monitoring, Maintenance Optimisation, SCADA Security
Author: Solomon Nunoo1, Edward Kofi Mahama1
1.Department of Electrical and Electronic Engineering, University of Mines and Technology
  1. G. R. Garcia and E. Gelle, 2004. SVG for SCADA Applications: A Practical Approach. [Online]. Available: 2004/papers/SVGforSCADA/
  2. D. Li, Y. Serizawa, and M. Kiuchi, “Concept Design for a Web-based Supervisory Control and Data-Acquisition (SCADA) System,” in Proc. IEEE PES Transmission and Distribution Conference and Exhibition, 2002, p.32-36.
  3. B. Qiu, and H. B. Gooi, “Web-based SCADA Display Systems (WSDS) for access via Internet,” IEEE Transactions on Power Systems, Vol. 15, No. 2, 2000, p.681-686.
  4. M. Clayton and A. Juan, 2002. A SCADA-Web Interconnection with TCP in Java. [Online] Available: ESS/GIFProject/PVSSJava/pvssweb.0.8.pdf.
  5. A.K. Wright, J.A. Kinast, and J. McCarty, “Low-Latency Cryptographic Protection for SCADA Communications”, in Proc. ACNS, 2004, p.263-277.
  6. R. Fan, L. Cheded, and O. Toker, “Internet-based SCADA: A new approach using JAVA and XML,” IEE Computing & Control Engineering Journal, Vol. 16, Issue 5, Oct.-Nov. 2005, p. 22-26.
  7. A. Goel and R. S. Mishra. “Remote Data Acquisition Using Wireless-SCADA System”, International Journal of Engineering (IJE), Vol. 3, Issue 1, 2009, p. 58-65.
  8. B. Berry, 2009. A Fast Introduction to SCADA Fundamentals and Implementation, DSP Telecom. Available:
  9. Anon, 2006. SCADA Systems for Command, Control, Communications, Computer Intelligence, Surveillance and Reconnaissance (C4ISR) Facilities. [Online] Available:
  10. D. Reynders, G. Clarke and E. Wright, Practical Modern SCADA Protocols, 60870.5 and Related Systems, Newness and Elsevier Advance Technology Limited, United Kingdom, 2004.
  11. Anon, 2004, The Fundamentals of SCADA, Bentley Press, Incorporated, [Online]. Available: collateral/whitepaper/fundscada_whitepaper.pdf.
  12. S. Nunoo, and A. K. Ofei, “Distribution Automation (DA) Using Supervisory Control and Data Acquisition (SCADA) with Advanced Metering Infrastructure (AMI)”, in Proc. IEEE Conference on Innovative Technologies for an Efficient and Reliable Electricity Supply, 2010, p. 454-458.
  13. W. H. Bartley, 2003, Investigation into Transformer Failures, [Online]. Available: download.aspx?id=191.
  14. J. M. Lynch, “An Internet Based SCADA System”, BSc Project Report, University of Southern Queensland, Queensland, Oct. 2005.
  15. Anon, 2005, Virtual Private Networking Basics, NETGEAR, Incorporated, [Online] Available: reference/esp/vpn/pdfs/FullManual.pdf.
  16. S. Ferrigni, 2003, SSL Remote Access VPNs: Is this the end of IPSec?, SANS Institute, [Online]. Available: reading_room/whitepapers/vpns/ssl-remote-access-vpns-ipsec_1285.
  17. M. Zafirovic-Vukotic, R. Moore, M. Leslie, R. Midence, and M. Pozzuoli, 2008, Securing SCADA Communications following NERC CIP Requirements, RuggedCom, Inc., [Online]. Available:
  18. F. Alsiherov, and T. Kim, 2010, “Research Trend on Secure SCADA Network Technology and Methods,” WSEAS Transactions on Systems and Control, Vol. 5, No. 8, p. 635-645.