35 resultados para Smart power grids
Resumo:
The growth of renewable power sources, distributed generation and the potential for alternative fuelled modes of transport such as electric vehicles has led to concerns over the ability of existing grid systems to facilitate such diverse portfolio mixes in already congested power systems. Internationally the growth in renewable energy sources is driven by government policy targets associated with the uncertainties of fossil fuel supplies, environmental issues and a move towards energy independence. Power grids were traditionally designed as vertically integrated centrally managed entities with fully dispatchable generating plant. Renewable power sources, distributed generation and alternative fuelled vehicles will place these power systems under additional stresses and strains due to their different operational characteristics. Energy storage and smart grid technologies are widely proposed as the tools to integrate these future diverse portfolio mixes within the more conventional power systems. The choice in these technologies is determined not only by their location on the grid system, but by the diversification in the power portfolio mix, the electricity market and the operational demands. This paper presents a high level technical and economic overview of the role and relevance of electrical energy storage and smart grid technologies in the next generation of renewable power systems.
Resumo:
As modern power grids move towards becoming a smart grid, there is an increasing reliance on the data that is transmitted and processed by ICT systems. This reliance introduces new digital attack vectors. Many of the proposed approaches that aim to address this problem largely focus on applying well-known ICT security solutions. However, what is needed are approaches that meet the complex concerns of the smart grid as a cyber-physical system. Furthermore, to support the automatic control loops that exist in a power grid, similarly automatic security and resilience mechanisms are needed that rely on minimal operator intervention. The research proposed in this paper aims to develop a framework that ensures resilient smart grid operation in light of successful cyber-attacks.
Resumo:
High Voltage Direct Current (HVDC) electric power transmission is a promising technology for integrating offshore wind farms and interconnecting power grids in different regions. In order to maintain the DC voltage, droop control has been widely used. Transmission line loss constitutes an import part of the total power loss in a multi-terminal HVDC scheme. In this paper, the relation between droop controller design and transmission loss has been investigated. Different MTDC layout configurations are compared to examine the effect of droop controller design on the transmission loss.
Resumo:
The increased interconnectivity and complexity of supervisory control and data acquisition (SCADA) systems in power system networks has exposed the systems to a multitude of potential vulnerabilities. In this paper, we present a novel approach for a next-generation SCADA-specific intrusion detection system (IDS). The proposed system analyzes multiple attributes in order to provide a comprehensive solution that is able to mitigate varied cyber-attack threats. The multiattribute IDS comprises a heterogeneous white list and behavior-based concept in order to make SCADA cybersystems more secure. This paper also proposes a multilayer cyber-security framework based on IDS for protecting SCADA cybersecurity in smart grids without compromising the availability of normal data. In addition, this paper presents a SCADA-specific cybersecurity testbed to investigate simulated attacks, which has been used in this paper to validate the proposed approach.
Resumo:
Globally on-shore wind power has seen considerable growth in all grid systems. In the coming decade off-shore wind power is also expected to expand rapidly. Wind power is variable and intermittent over various time scales because it is weather dependent. Therefore wind power integration into traditional grids needs additional power system and electricity market planning and management for system balancing. This extra system balancing means that there is additional system costs associated with wind power assimilation. Wind power forecasting and prediction methods are used by system operators to plan unit commitment, scheduling and dispatch and by electricity traders and wind farm owners to maximize profit. Accurate wind power forecasting and prediction has numerous challenges. This paper presents a study of the existing and possible future methods used in wind power forecasting and prediction for both on-shore and off-shore wind farms.
Resumo:
Over the last decade there has been a rapid global increase in wind power stimulated by energy and climate policies. However, as wind power is inherently variable and stochastic over a range of time scales, additional system balancing is required to ensure system reliability and stability. This paper reviews the technical, policy and market challenges to achieving ambitious wind power penetration targets in Ireland’s All-Island Grid and examines a number of measures proposed to address these challenges. Current government policy in Ireland is to address these challenges with additional grid reinforcement, interconnection and open-cycle gas plant. More recently smart grid combined with demand side management and electric vehicles have also been presented as options to mitigate the variability of wind power. In addition, the transmission system operators have developed wind farm specific grid codes requiring improved turbine controls and wind power forecasting techniques.
Resumo:
The increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in the Smart Grid has exposed them to a wide range of cyber-security issues, and there are a multitude of potential access points for cyber attackers. This paper presents a SCADA-specific cyber-security test-bed which contains SCADA software and communication infrastructure. This test-bed is used to investigate an Address Resolution Protocol (ARP) spoofing based man-in-the-middle attack. Finally, the paper proposes a future work plan which focuses on applying intrusion detection and prevention technology to address cyber-security issues in SCADA systems.
Resumo:
Greater complexity and interconnectivity across systems embracing Smart Grid technologies has meant that cyber-security issues have attracted significant attention. This paper describes pertinent cyber-security requirements, in particular cyber attacks and countermeasures which are critical for reliable Smart Grid operation. Relevant published literature is presented for critical aspects of Smart Grid cyber-security, such as vulnerability, interdependency, simulation, and standards. Furthermore, a preliminary study case is given which demonstrates the impact of a cyber attack which violates the integrity of data on the load management of real power system. Finally, the paper proposes future work plan which focuses on applying intrusion detection and prevention technology to address cyber-security issues. This paper also provides an overview of Smart Grid cyber-security with reference to related cross-disciplinary research topics.
Resumo:
A micro-grid is an autonomous system which can be operated and connected to an external system or isolated with the help of energy storage systems (ESSs). While the daily output of distributed generators (DGs) strongly depends on the temporal distribution of natural resources such as wind and solar, unregulated electric vehicle (EV) charging demand will deteriorate the imbalance between the daily load and generation curves. In this paper, a statistical model is presented to describe daily EV charging/discharging behaviour. An optimisation problem is proposed to obtain economic operation for the micro-grid based on this model. In day-ahead scheduling, with estimated information of power generation and load demand, optimal charging/discharging of EVs during 24 hours is obtained. A series of numerical optimization solutions in different scenarios is achieved by serial quadratic programming. The results show that optimal charging/discharging of EVs, a daily load curve can better track the generation curve and the network loss and required ESS capacity are both decreased. The paper also demonstrates cost benefits for EVs and operators.
Resumo:
Increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in Smart Grids potentially means greater susceptibility to malicious attackers. SCADA systems with legacy communication infrastructure have inherent cyber-security vulnerabilities as these systems were originally designed with little consideration of cyber threats. In order to improve cyber-security of SCADA networks, this paper presents a rule-based Intrusion Detection System (IDS) using a Deep Packet Inspection (DPI) method, which includes signature-based and model-based approaches tailored for SCADA systems. The proposed signature-based rules can accurately detect several known suspicious or malicious attacks. In addition, model-based detection is proposed as a complementary method to detect unknown attacks. Finally, proposed intrusion detection approaches for SCADA networks are implemented and verified using a ruled based method.
Resumo:
Increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in Smart Grids potentially means greater susceptibility to malicious attackers. SCADA systems with legacy communication infrastructure have inherent cyber-security vulnerabilities as these systems were originally designed with little consideration of cyber threats. In order to improve cyber-security of SCADA networks, this paper presents a rule-based Intrusion Detection System (IDS) using a Deep Packet Inspection (DPI) method, which includes signature-based and model-based approaches tailored for SCADA systems. The proposed signature-based rules can accurately detect several known suspicious or malicious attacks. In addition, model-based detection is proposed as a complementary method to detect unknown attacks. Finally, proposed intrusion detection approaches for SCADA networks are implemented and verified via Snort rules.
Resumo:
Due to the intermittent nature of renewable generation it is desirable to consider the potential of controlling the demand-side load to smooth overall system demand. The architecture and control methodologies of such a system on a large scale would require careful consideration. Some of these considerations are discussed in this paper; such as communications infrastructure, systems architecture, control methodologies and security. A domestic fridge is used in this paper as an example of a controllable appliance. A layered approach to smart-grid is introduced and it can be observed how each smart-grid component from physical cables, to the end-devices (or smart-applications) can be mapped to these set layers. It is clear how security plays an integral part in each component of the smart-grid so this is also an integral part of each layer. The controllable fridge is described in detail and as one potential smart-grid application which maps to the layered approach. A demonstration system is presented which involves a Raspberry Pi (a low-power, low-cost device representing the appliance controller).
Resumo:
High Voltage Direct Current (HVDC) lines allow large quantities of power to be
transferred between two points in an electrical power system. A Multi-Terminal HVDC (MTDC) grid consists of a meshed network of HVDC lines, and this allows energy reserves to be shared between a number of AC areas in an efficient manner. Secondary Frequency Control (SFC) algorithms return the frequencies in areas connected by AC or DC lines to their original setpoints after Primary Frequency Controllers have been called following a contingency. Where multiple
TSOs are responsible for different parts of a MTDC grid it may not be possible to implement SFC from a centralised location. Thus, in this paper a simple gain based distributed Model Predictive Control strategy is proposed for Secondary Frequency Control of MTDC grids which allows TSOs to cooperatively perform SFC without the need for centralised coordination.
Resumo:
The next-generation smart grid will rely highly on telecommunications infrastructure for data transfer between various systems. Anywhere we have data transfer in a system is a potential security threat. When we consider the possibility of smart grid data being at the heart of our critical systems infrastructure it is imperative that we do all we can to ensure the confidentiality, availability and integrity of the data. A discussion on security itself is outside the scope of this paper, but if we assume the network to be as secure as possible we must consider what we can do to detect when that security fails, or when the attacks comes from the inside of the network. One way to do this is to setup a hacker-trap, or honeypot. A honeypot is a device or service on a network which appears legitimate, but is in-fact a trap setup to catch breech attempts. This paper identifies the different types of honeypot and describes where each may be used. The authors have setup a test honeypot system which has been live for some time. The test system has been setup to emulate a device on a utility network. The system has had many hits, which are described in detail by the authors. Finally, the authors discuss how larger-scale systems in utilities may benefit from honeypot placement.