}); This would require the highest levels of guarding against intentional access to hazardous voltages. It uses the form of energy (like coal and diesel) and converts it into electrical energy. return null; } This translates into a need for much greater creepage and clearance isolation distances, as well as much higher electric-strength withstand voltages. Nicholas (Nick) Abi-Samrahas over 35 years of experience in the power and energy field across the whole power systems value chain power generation, transmission, distribution, retail and end-use. P. H. Corredor and M. E. Ruiz, Against all odds, IEEE Power Energy Mag., vol. a fault, electrical power is supplied from the installed DGs, and an optimized reconguration is demonstrated in some congurations. Still, Mr. Edison would be just as astonished as Mr. Graham Bell with the present power grid technology as it is today. [2]. Creating Custom Bells; Guardian Bells. } [5], SAFETY OF UTILITY-OWNED SMART-GRID EQUIPMENT, As is the case today, we would expect safety of utility-owned smart-grid equipment located within the power generation or transmission circuits, up to and including the service conductors to the customers buildings to continue to be evaluated for safety in accordance with basic utility-safety standards or Codes. Currently, in the United States alone it is estimated that US$6 billion is lost by electricity providers to consumer fraud in the electric grid. Electric terrorism: grid component targets, 19942004 (source: Journal of Energy Security). 5, pp. If we agree to take a modular approach to evaluating the safety of the smart-grid technology equipment, then IEC 62368-1 will be well-suited for providing the plug-in modules for evaluating the safety of the information technology and communication circuitry portion of the smart grid equipment. Smart Substations: substations are included monitoring and control non-critical and critical operational data such as power status, power factor performance, breaker, security, transformer status, etc. Participants will examine the practical aspects of the technologies, design and implementation, smart grid applications and sensing; demand side management, smart grid economics, microgrids and distributed energy resources, and fault location and service restoration (FLSIR). Energy & Power As such, a good approach to the safety evaluation of this merged technology is to take a modular approach, and evaluate the merged technologies for safety as components. The trend of connecting electrical control systems to the Internet exposes all layers of a system to possible attack. Agilent Technologies Offers Application Note on LTE-Advanced Manufacturing Test, FCC Begins Rulemaking for Drones Spectrum Allocation, FCC Proposes Updated Data Breach Reporting Requirements, FCC Cites Another Retailer for Marketing Unauthorized RF Devices, Troubleshooting EMI Issues Caused by Structural Resonances, Energy Release Quantification for LiIon Battery Failures, SCIF and Radio Frequency Secured Facility Design, Part 2, Using Multiport Connectors in High-Frequency Military and Avionics Systems, Performing Proximity Magnetic Fields Immunity Testing, High Voltage ESD Protection for Automotive Ethernet Applications, Tailoring Safety Into AudioFrequency Power-Line Susceptibility Testing, Health Monitoring and Prediction of Cells in a BatteryModule or Pack UnderOperating Condition, Getting the Best EMC from Shielded Cables Up to 2.8 GHz, Part 2, ISO Publishes ISO/IEC 24759:2017: Test Requirements for Cryptographic Modules, Chinas Latest Regulation on 2.4 GHz and 5GHzEquipment, The 6G Future: How 6G Will Transform Our Lives, Fundamentals of Electrostatic Discharge - Part One: An Introduction to ESD, NASA Space Shuttles Return to Flight: The Untold Electromagnetic Backstory, Continuing Your Professional Education in 2022, A Recipe for Success: How to Grow from EMC Novice to EMC Expert, Ohms Law Also Applies to ESDInduced Heat Pulses, RF Tech Tip: BNC Versus Threaded Connectors, FCC Adjusts Civil Monetary Penalties to Reflect Inflation, CPSC Publishes Safety Standard for Magnets, U.S. DoE to Provide Nearly $3 Billion for EV Battery Development, Manufacturing, Polymer Film Can Limit Electromagnetic Interference, Using Nanomaterials to Create a Passive Dual-Mode Heating and Cooling Device, Scientists Develop Highly Efficient Supercapacitor That Could Rival Batteries. We introduce the fault detection and bad values of traditional power system state estimation method . Accidents frequently happen at railway crossings due to the lack of quickly operating gate systems, and to fewer safety measures at the railway crossing as well. Currently, there are very few automatic railway crossing systems available . p.get = noopfn; The internet took thirteenth place on this list, highways were ranked eleventh, but sitting at the top of the list as the most important engineering achievement of the 20th century was the development of the present electric power grid. S. Massoud Amin and Anthony M. Giacomoni. IEC 62368-1 is the new hazard-based safety engineering standard covering audio/video, information and communication technology equipment. return []; args.unshift('send'); p.set = noopfn; Case 3: The smart grid with the adopted LPC can be seen as an active smart grid system; the active smart grid is reconstituted in order to minimize distribution losses in real time. The meter safety standard and switchgear standards may assume that these components are installed in Overvoltage Category IV or III environments, but the information technology equipment standard expect equipment to be installed nominally in Overvoltage Category II environments. Power-monitoring equipment is listed as examples of Category III equipment, or equipment that will be an integral part of the building wiring. He is an iNARTE Certified Product Safety Engineer. A smart power system gives its users intelligible monitoring and maintenance of the power being driven to your security system. Energy, telecommunications, transportation, and financial infrastructures are becoming increasingly interconnected, thus posing new challenges for their secure, reliable, and efficient operation. Another key value of a smart power system is the ability to remotely and safely recycle power. if (typeof arguments[2] === 'object') { Analogously, customized and cost-effective advancements are both possible and essential to enable smarter and more secure electric power infrastructures. NIST, Guidelines for smart grid cyber security, The Smart Grid Interoperability PanelCyber Security Working Group, NISTIR 7628, Gaithersburg, MD, Aug. 2010. In many ways, it will take the form of a merger of power generation, distribution, switching, and metering technology with communications and information technology, along with other applications of electrical energy. Advanced metering infrastructure (of which smart meters are a generic name for any utility side device even if it is more capable e.g. 'location': 'page_location', The implementation of advanced metering infrastructure (AMI) is widely seen as one of the first steps in the digitization of the electric grids control systems. Virtually every crucial economic and social function depends on the secure and reliable operation of these infrastructures. You can also use the thermostat's app to control the temperature. for (arg in args) { return new Tracker(); Specifically, with rapid advances in digital technologies, smart digital devices such as smart sensor transmitters, electrical protective devices and variable speed drives, are increasingly used at many nuclear power plants. (2)A safety monitoring method of power terminal based on power consumption information of power terminal is proposed, which monitors the power consumption information of side channel of power terminal in a nonintrusive way and maps the power consumption of power terminal equipment to its operation status. Nevertheless, the goal of transforming the current infrastructures into self-healing energy delivery, computer, and communications networks with unprecedented robustness, reliability, efficiency, and quality for customers and our society is ambitious. function __gtagDataLayer() { Deception consists of two possible techniques: dissimulation (hiding the real) and simulation (showing the false). Those attackers are normally driven by intellectual challenge and curiosity. Accounting for all critical assets includes thousands of transformers, line reactors, series capacitors, and transmission lines. All of these infrastructures are complex networksgeographically dispersed, nonlinear, and interacting both among themselves and with their human owners, operators, and users (see Figure 1). } } Prerequisite: A BS in Electrical Engineering or equivalent knowledge and experience. The total cost of a stronger transmission system would be about US$82 billion over the next decade. Islanding is a condition in which a portion of an electric power grid, containing both load and generation, is isolated from the remainder of the electric power grid. Military & Defense. 2004. Electrical Engineering questions and answers Investigate the safe operation of a smart power system Question: Investigate the safe operation of a smart power system This question hasn't been solved yet Ask an expert Investigate the safe operation of a smart power system Expert Answer Previous question Next question COMPANY About Chegg Current privacy laws in the United States are fragmented and vague and do not specifically address consumer energy usage. Much work remains to be done, however, to create standards that, when implemented, will adequately protect the grid from cyberattacks. This file is auto-generated */ padding: 0 !important; The threats posed by insiders are real, as is the risk of a Trojan horse embedded in the software of one of more of the control centers. Because Power System Operation, by Robert Miller and James Malinowski, presents more of the fundamental principles and methods dispatchers and operators need in a clear, easy-to-understand style. Information security frameworks for electric power utilities have also been developed by the International Council on Large Electric Systems (CIGRE). New technologies called Phasor Measurement Units (PMU) sample voltage and current many times per second at a given location, providing a snapshot of the power System at work. IEC 62368-1, Edition 1.0, 2010-01, Audio/Video, Information and Communication Technology Equipment Part 1: Safety Requirements, International Electrotechnical Commission. Next Step: After completing this course, consider taking other courses in the Power Systems Engineering certificate program to continue learning. In many complex networks, the human participants themselves are both the most susceptible to failure and the most adaptable in the management of recovery. In remote locations, stand-alone systems can be more cost-effective than extending a power line to the electricity grid (the cost of which can range from $15,000 to $50,000 per mile). window['__gaTracker'] = __gaTracker; Protecting all these diverse and widely dispersed assets is impractical. That is, rather than develop a single standard for, say, a new electrical service equipment with intelligence, for a smart meter, it would make sense to continue to use the base product safety standard for meters, but plug-in the additional telecommunications and information technology safety modules. }; sensing, communication, data management, and mathematical and theoretical foundations to support a better, faster, and higher-confidence understanding of what is going on, leading to improved state and topology estimation and fast look-ahead simulation. })(); Grid congestion and atypical power flows have been increasing during the last 25 years, while customer expectations of reliability and cyber and physical security are rising to meet the needs of a pervasively digital world. A successful terrorist attempt to disrupt the power delivery system could have adverse effects on national security, the economy, and the lives of every citizen. f.hitCallback(); They therefore provide an excellent reference point for an analysis of cybervulnerability. This article provides a brief overview of smart-grid technology, and then explores the safety considerations that should be addressed in the design of smart grid technology equipment, particularly in low-voltage AC power applications operating below 1000 V AC. These ESSs can be used for any power ow system in a variety of ways, such as providing services for renewable power smoothing, peak demand shaving, frequency regulation, etc. Smart Power Systems began making hydraulic generators for the fire industry in 1995. In April 2009, The Wall Street Journal reported that cyber spies had infiltrated the U.S. electric grid and left behind software that could be used to disrupt the system. Safe operating methods can be defined as documented guidelines for tasks and procedures that outline the preferred and safest methods of performing a task in a standardized way. }; 'timingLabel': 'event_label', This would mean that either IEC 60950-1 or IEC 62368-1 are used to evaluate the communications and information technology subsystems, and communication links would be classified TNV, limited-power circuits, or the like if metallic, and other non-metallic communication technologies such as optical or wireless would be evaluated accordingly. Besides, an. M. A. McQueen and W. F. Boyer, Deception used for cyber defense of control systems, in Proc. } else { Industrial window['__gtagTracker'] = __gtagTracker; This is extremely important, since the consequences of an attack are directly proportional to the length of time the service is disrupted. return true; While smart power systems may increase upfront cost slightly, they provide tremendous value in active supervision of power failures, smart battery charging to extend life, and power condition monitoring and reporting. In this dual operating system, the existing hierarchy, people, and management largely remain. Many of these plants burn coal and other fossil fuels that are non-renewable and greenhouse-gas producing sources of energy, and they are increasingly becoming more scarce and expensive. 861875, May 2005. The devices, in turn, process the information based on consumers learned wishes and power accordingly. In these higher overvoltage categories (IV and III), the value of the mains transient voltages is higher than it would be expected for general indoor-use Category II AC-mains connected appliances. The power system includes the devices connected to the system like the synchronous generator, motor, transformer, circuit breaker, conductor, etc. Plugs into a standard wall socket. Associate Professor, Stanford University - Cited by 9,074 - Energy systems - smart grid - power systems - energy data analytics - smart transportation & sensor networks . __gaTracker.loaded = true; Sign in to download full-size image Figure 3.23.4.2. A successful terrorist attempt to disrupt the power delivery system could have adverse effects on national security, the economy, and the lives of every citizen. They incorporated a sensor network into the new I-35W bridge (at less than 0.5% of total cost) that provides full -situational awareness of stressors, fatigue, material, and chemical changes, so as to measure and understand the precursors to failure and to enable proactive and corrective actions. A popular comparison that points out the magnitude of change in the telecommunication industry as opposed to that of the power industry is to hypothetically transport Alexander Graham Bell and Thomas Edison to the 21st century, and allow them to observe the modern forms of the telecommunications and power industries that they helped create. __gaTracker.getByName = newtracker; }); History of Evolution A smart grid combines the existing electrical infrastructure with digital technologies and advanced applications to provide a much more efficient, reliable and cost effective way to distribute energy. All rights reserved. Please contact the Science & Technology department at 858-534-3229 or unex-sciencetech@ucsd.edu for information about when this course will be offered again. Educating stakeholders and colleagues about the cyber and physical interdependencies has often been difficult, as those who are distinguished members of the community and understand power systems well but are less aware of their cybervulnerabilities routinely minimize the importance of these noveland persistentthreats. One security feature alone, such as encryption, will not be able to cover all the possible security threats. Standby power system codes and standards references. S. M. Amin, Balancing market priorities with security issues: Interconnected system operations and control under the restructured electricity enterprise, IEEE Power Energy Mag., vol. } [2] Mr. Edison would not be familiar with nuclear power plants or photovoltaic cells, as these technologies were developed after his death in 1931. The report concluded: Terrorists could emulate acts of sabotage in several other countries and destroy critical [power system] components, incapacitating large segments of a transmission network for months. window.ExactMetricsDualTracker = { Automatic Metering Infrastructure (AMI) is an approach to integrating electrical consumers based upon the development of open standards. window.dataLayer = window.dataLayer || []; Anthony M. Giacomoni is with the University of Minnesota. digital control of the energy infrastructure, integrated energy, information, and communications for the end user, transformation of the meter into a secure, two-way energy and information portal. var __gaTracker = function () { To help prevent this vulnerability, ensure the presence of battery backup coverage for all devices in your security system. if (!parameters) { for (var index = 0; index < disableStrs.length; index++) { The ability of the system to operate within system constraints ( i.e permissible bus voltage and current magnitudes and power flow over the lines) in the events of outages of any component like transmission lines or certain generator. Connect the power system to 220v mains power using the supplied cord. In addition to the physical threats to such centers and the communication links that flow in and out of them, one must be concerned about two other factors: the reliability of the operators within the centers and the possibility that insecure code has been added to a program in a center computer. __gaTracker.getAll = function () { __gtagTracker('set', { Links between the power grid and telecommunications systems as well as between electrical power lines and oil, water, and gas pipelines continue to be the lynchpins of energy supply networks. In addition, adversaries often have the potential to initiate attacks from nearly any location in the world. Reduced peak demand, which will also help lower electricity rates. An audit of 30 utility companies that received the alert showed that only seven were in full compliance, although all of the audited companies had taken some precautions. This is the reality that needs to be addressed. Communications The Academy compiled a list of twenty accomplishments that have affected virtually everyone in the world. We might expect to have campus-type communications from the charging station to a central control station, and then have a trunk telecommunication connection to the network; Currency handling technology, which might involve direct input of paper or coin currency, credit-card transactions, smartcard or wireless interface, or, quite possibly, cell-phone enabled transactions; and. 24, no. action = 'timing' === arguments[1].hitType ? Moreover, cyber, communication, and control layers add new benefits only if they are designed correctly and securely. As an increasing amount of electricity is generated from distributed renewable sources, the problem will only be exacerbated; the U.S. Department of Energy (DOE) has concluded that generating 20% of all electricity with land-based wind installations will require at least 20,000 square miles. Smart Grid technologies offer a new solution to the problem of monitoring and controlling the grid's transmission System. } For over 30 years more electrical power professionals have used this guide for safe, economical system operation than any other in print. . Normally, the customer-owned generation is required to sense the absence of utility-controlled generation and cease energizing the grid. Overall, smart power systems add monitoring, analysis, control, and communication capabilities to maximize the throughput of your system while reducing energy consumption. }; } Featured articles are reserved for IEEE PES members. Information Technology The cost of this DC storage system is only $160 per kWh compared with contemporary storage units at $400-$1000 per kWh, 14 and thus it is ideal for the low-cost energy storage of renewable energy in public and private utility grids. 14621. , and other security systems often overlook a piece of their system that can shut down the entire system if it isnt properly maintained: battery backup. IEC 60950-1, Edition 2.0, 2005-12, Information Technology Equipment Safety- Part 1: General Requirements, International Electrotechnical Commission. parameters = {}; However, design engineers are also responsible for ensuring electrical systems are designed with safety in mind. These standards include IEEE C2, National Electrical Safety Code, and CSA C22.3, Canadian Electrical Code, Part III.. Then, it suggests a modular approach of evaluating the safety of smart-grid technology based on the safety requirements of the individual merged technologies. These switches are convenient for driving LEDs, relays, and motors. In fact, its primary feature is to automatically gather information on variations in operating conditions and parameters such as voltage and consumption for different nodes connected to the grid. return false; Object.assign(hitObject, arguments[5]); } modeling, robust control, dynamic interaction in interdependent layered networks, disturbance propagation in networks, and forecasting and handling uncertainty and risk. McQueen and Boyer describe several potential dissimulation and simulation techniques that can be used for control systems. This state-of-the-art safety standard classifies energy sources, prescribes safeguards against those energy sources, and provides guidance on the application of, and requirements for those safeguards. The potential exists to create an electricity system that provides the same efficiency, precision, and interconnectivity as the billions of microprocessors that it will power. Initial systems were open-framed basic systems ranging from 5.5kW to 10kW. Information technology equipment, on the other hand, is generally utilized in Overvoltage Category II environments, or connected to outlets on branch circuits a safe distance away from the service equipment. Currently, Nick is the president of Electric Power & Energy Consulting (EPEC)and an adjunct professor withUC San Diego. } if ('undefined' !== typeof arguments[2]) { Contact: For more information about this course, please email unexengr@ucsd.edu, Course Number:ECE-40314 It enables candidates to perform advanced HV switching operations on industrial HV networks up to and including 33kV (please see course dates for further info). The proposed system enhances electrical safety by fast disconnection of the power supply in case of fault events like leakage current, electrical arc, overcurrent or overvoltage and has been designed with the goal to be integrated in smart environments . Their latest technology also allows for remote maintenance of the system, eliminating the need for costly and time-consuming on-site servicing. window.gtag = __gtagTracker; (function () { Layered security (or defense in depth) involves strategically combining multiple security technologies at each layer of a computing system in order to reduce the risk of unauthorized access due to the failure of any single security technology. Sign up to hear about Another way to protect your security system from outages is to upgrade or move to a smart power system, especially for any new construction. We should expect this standard to be used extensively for smart-grid equipment. Fast switchover. Smart meters, however, are extremely attractive targets for exploitation, since vulnerabilities can be easily monetized through manipulated energy costs and measurement readings. While the digitization of such systems will present many new security challenges, it will also provide the grid with increased flexibility to prevent and withstand potential threats. There are no sections of this course currently scheduled. Also, as the amount of off-theshelf, commercially-available ITE sub-components increases in the charging station, it becomes more infeasible to simply increase the spacings or the quality of insulation. Electric power utilities also typically own and operate at least certain portions of their own telecommunications systems, which often consist of a backbone of fiber optic or microwave links connecting major substations with spurs to smaller sites. Three of the dissimulation techniques described are: Likewise, three of the simulation techniques described are: Deception will need to play a key role in smart grid defense mechanisms. Smart Decision, 2010, unpublished internal Alcatel-Lucent article. However, if islanding prevention fails, energized lines within the island present a shock hazard to unsuspecting utility line workers who think the lines are dead.[6]. arguments[5] : 1, 5966, Mar./Apr. For the systems integrator, managed power provides the ability to provide a new suite of services to the customer that monitor, alert, manage and provide detailed reporting on systems solutions remotely. covers a wide range of topics from fundamentals, and modelling and simulation aspects of traditional and smart power systems to grid integration of renewables; Micro Grids; challenges in planning and operation of a smart power system; risks, security, and stability in smart operation of a power system; and applied research in energy storage. The best way to approach this new, merged technology is to break it down into its component technologies, then use existing or new standards to evaluate safety issues involving the component technologies. var Tracker = function () { They can also alert operators to possible threats before any systems are harmed. !window.jQuery && document.write('