2 minute read time.
Focusing on the theme of field based technologies; I took opportunity to attend an event hosted by the IET Berkshire network. Dr Sian Thomas, Head of Asset Management for the Thames Tideway Tunnel, discussed the progress on the project. Explaining specifically how untreated flows will be managed by the new tunnel.

Internet traffic flow, just like river flows need to be managed. For example, the mechanics of a DDoS attack can draw parallels to how the Thames Tideway project will administer overflows into the Thames. DDoS attacks take advantage of packet manipulation to cause floods, or , how the flow of packets can be increased to cause an overflow, resulting in severe outages to your services. Specific DDoS solutions exist to mitigate against DDoS overflows against your organisation. The legacy DDoS attack on Spamhaus is a very well documented one that showed how easy it is for DDoS attacks to cause disruption to internet services. Just like any DDoS detection solution, thresholds are monitored before traffic flows are diverted, similarly, the Tidewave project will monitor flows and ensure they are routed before untreated water reaches the main river stream.

The Tidewave project will be deploying a SCADA system that will secure the solution by using sensors, real time threshold alerts for instrumentation and controls. The field devices (valves, pumps and transmitters) that will provide data to the SCADA system will be configured to capture the right data. The actual tunnels are currently under construction and have used core engineering principals for long-life designs, including, review of how costs can be reduced for the consumer. In line with engineering principals, the project has also launched the Tidewave Legacy Program to ensure that after the tunnel has been built, the project creates its own ecosystem, including increasing opportunity for visitor attractions for the River Thames and innovation creation opportunities, such as how drone technology can tunnel maintenance activities.

Securing the cyber particulars of all national SCADA infrastructures is now a well-documented topic. This event demonstrates how principals/theories of river flow management can also be used to explain the mechanics of Layer 3 attacks . With cyber dynamics now emerging into core national infrastructures, their might just be an increase in how theories from natures law can be applied to help mature current cyber mitigation techniques to secure field based sensors used by SCADA systems.


Tidewave hosted a SCADA event where it was expected that the contract value would reach £12m. Details of the event can be seen here.