Embedded Ethernet technology has been utilized increasingly widely as the communication mode in the substation automation system(SAS).This paper introduces the current applying situation about embedded Ethernet in SAS...Embedded Ethernet technology has been utilized increasingly widely as the communication mode in the substation automation system(SAS).This paper introduces the current applying situation about embedded Ethernet in SAS First.After analyzing the protocol levels used in SAS based on embedded Ethernet and the differences between the TCP and UDP,UDP/IP is selected as the communication protocol between the station-level and bay-level devices for its real-time characteristic.Then a new kind of implementation of the embedded Ethernet is presented based on hardware protocol stack.The designed scheme can be implemented easily,reduce cost significantly and shorten developing cycle.展开更多
Greater complexity and interconnectivity across systems embracing electrical power technologies has meant that cyber-security issues have attracted significant attention. In this paper a simulation environment for int...Greater complexity and interconnectivity across systems embracing electrical power technologies has meant that cyber-security issues have attracted significant attention. In this paper a simulation environment for intrusion detection system in IEC 61850 standard-based substation automation system is provided to test simulated attacks on IEDs (intelligent electronic devices). Intrusion detection is the process of detecting malicious attacker, so it is an effective and mature security mechanism to protect electrical facility. However, it is not harnessed when securing IEC 61850 automated substation. To prove the detection capability of the system testing environment was developed to analyze and test attacks simulated with different test cases. It shows that the simulation environment works accordingly to various network traffic scenarios and eventually proves the functionality of intrusion detection system to be later deployed in the real IEC 61850 based substation automation system site.展开更多
The problem of logical node(LN)importance quantification in an IEC 61850 based substation automation system(SAS)is investigated in this paper.First,a weighted and directed static complex network model is established b...The problem of logical node(LN)importance quantification in an IEC 61850 based substation automation system(SAS)is investigated in this paper.First,a weighted and directed static complex network model is established by analyzing the characteristics of SAS,according to IEC 61850.Then,we propose a method,which combines topology value and information adjunction value by introducing a first-order linear feedback controller to quantify the value of LNs.On this basis,some definitions for equivalent network conversion are proposed to greatly reduce the complexity of the original network topology.Also,the absolute value and relative value are introduced to quantify LN importance from the perspective of the node’s necessity and influence,respectively.Finally,simulation results of the case study demonstrate that the proposed method is effective and provides a broader and clearer perspective for viewing the logical node importance for IEC61850 based SAS.展开更多
Korea Electric Power Corporation in charge of the power IT project "Development of Prototype for Advanced Substation Automation System based on the Digital Control Technology", is performing the verification of perf...Korea Electric Power Corporation in charge of the power IT project "Development of Prototype for Advanced Substation Automation System based on the Digital Control Technology", is performing the verification of performance of the substation automation system based on IEC 61850. In order to verify a transformer protective lED that might be operating in substation automation system, the new standardized document and procedures are required in the aspect of the utility like KEPCO. But there is nothing to describe systematically how to verify IEC 6 1850 based lED in the system environment except an individual IED testing way. This paper will present the substation automation system based ways and procedures to verify the protective function of the IED using UML (Unified Modeling Language).展开更多
As the smart grid concepts are emphasized lately, the need to modernize the power engineering education is also well recognized. This paper presents a set of newly developed modeling, simulation and testing tools aime...As the smart grid concepts are emphasized lately, the need to modernize the power engineering education is also well recognized. This paper presents a set of newly developed modeling, simulation and testing tools aimed at better understanding of the design concept and related applications for protective relaying and substation automation solutions for the smart grid. Since the smart grid applications require integration of data from multiple IEDs (intelligent electronic devices), understanding properties of each IED type in detail, as well as their responses to the power system events is needed. In addition, understanding the communication requirements to perform data integration is also important. To illustrate how the mentioned smart grid issues may be taught, the following advanced teaching approaches are presented: (1) Use of modeling and simulation means to better understand interaction between the relays and power system; (2) Use of IED test facilities to better understand performance of physical devices used for protection, monitoring and control; (3) Utilization of communication network modeling tools to simulate the communication network within SAS (substation automation system). Examples showing the use of proposed techniques for teaching the fundamentals and applications are presented. The examples demonstrate the adequacy and efficiency of the proposed techniques.展开更多
A substation system requires that communica-tion be transmitted reliably,accurately and in real-time.Aimed at solving problems,e.g.,flow confliction and sensi-tive data transmission,a model of the communication sys-te...A substation system requires that communica-tion be transmitted reliably,accurately and in real-time.Aimed at solving problems,e.g.,flow confliction and sensi-tive data transmission,a model of the communication sys-tem of an agent-based automated substation is introduced.The running principle is discussed in detail and each type of agent is discussed further.At the end,the realization of the agent system applied to the substation is presented.The outcome shows that the communication system of an agent-based automated substation improves the accuracy and reliability of the data transfer and presents it in real-time.展开更多
文摘Embedded Ethernet technology has been utilized increasingly widely as the communication mode in the substation automation system(SAS).This paper introduces the current applying situation about embedded Ethernet in SAS First.After analyzing the protocol levels used in SAS based on embedded Ethernet and the differences between the TCP and UDP,UDP/IP is selected as the communication protocol between the station-level and bay-level devices for its real-time characteristic.Then a new kind of implementation of the embedded Ethernet is presented based on hardware protocol stack.The designed scheme can be implemented easily,reduce cost significantly and shorten developing cycle.
文摘Greater complexity and interconnectivity across systems embracing electrical power technologies has meant that cyber-security issues have attracted significant attention. In this paper a simulation environment for intrusion detection system in IEC 61850 standard-based substation automation system is provided to test simulated attacks on IEDs (intelligent electronic devices). Intrusion detection is the process of detecting malicious attacker, so it is an effective and mature security mechanism to protect electrical facility. However, it is not harnessed when securing IEC 61850 automated substation. To prove the detection capability of the system testing environment was developed to analyze and test attacks simulated with different test cases. It shows that the simulation environment works accordingly to various network traffic scenarios and eventually proves the functionality of intrusion detection system to be later deployed in the real IEC 61850 based substation automation system site.
基金This work was supported in part by the National Natural Science Foundation of China(U1866209)。
文摘The problem of logical node(LN)importance quantification in an IEC 61850 based substation automation system(SAS)is investigated in this paper.First,a weighted and directed static complex network model is established by analyzing the characteristics of SAS,according to IEC 61850.Then,we propose a method,which combines topology value and information adjunction value by introducing a first-order linear feedback controller to quantify the value of LNs.On this basis,some definitions for equivalent network conversion are proposed to greatly reduce the complexity of the original network topology.Also,the absolute value and relative value are introduced to quantify LN importance from the perspective of the node’s necessity and influence,respectively.Finally,simulation results of the case study demonstrate that the proposed method is effective and provides a broader and clearer perspective for viewing the logical node importance for IEC61850 based SAS.
文摘Korea Electric Power Corporation in charge of the power IT project "Development of Prototype for Advanced Substation Automation System based on the Digital Control Technology", is performing the verification of performance of the substation automation system based on IEC 61850. In order to verify a transformer protective lED that might be operating in substation automation system, the new standardized document and procedures are required in the aspect of the utility like KEPCO. But there is nothing to describe systematically how to verify IEC 6 1850 based lED in the system environment except an individual IED testing way. This paper will present the substation automation system based ways and procedures to verify the protective function of the IED using UML (Unified Modeling Language).
文摘As the smart grid concepts are emphasized lately, the need to modernize the power engineering education is also well recognized. This paper presents a set of newly developed modeling, simulation and testing tools aimed at better understanding of the design concept and related applications for protective relaying and substation automation solutions for the smart grid. Since the smart grid applications require integration of data from multiple IEDs (intelligent electronic devices), understanding properties of each IED type in detail, as well as their responses to the power system events is needed. In addition, understanding the communication requirements to perform data integration is also important. To illustrate how the mentioned smart grid issues may be taught, the following advanced teaching approaches are presented: (1) Use of modeling and simulation means to better understand interaction between the relays and power system; (2) Use of IED test facilities to better understand performance of physical devices used for protection, monitoring and control; (3) Utilization of communication network modeling tools to simulate the communication network within SAS (substation automation system). Examples showing the use of proposed techniques for teaching the fundamentals and applications are presented. The examples demonstrate the adequacy and efficiency of the proposed techniques.
文摘A substation system requires that communica-tion be transmitted reliably,accurately and in real-time.Aimed at solving problems,e.g.,flow confliction and sensi-tive data transmission,a model of the communication sys-tem of an agent-based automated substation is introduced.The running principle is discussed in detail and each type of agent is discussed further.At the end,the realization of the agent system applied to the substation is presented.The outcome shows that the communication system of an agent-based automated substation improves the accuracy and reliability of the data transfer and presents it in real-time.