Grid Awareness Under Normal Conditions and Cyber-Threats

Matija Naglic, Arun Joseph, Kaikai Pan, Marjan Popov, Mart van der Meijden, Peter Palensky

Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientific

38 Downloads (Pure)

Abstract

The situational grid awareness is becoming increasingly important for power system operations due to smaller operational margins, wide range of uncertainties entailed by renewables and highly critical infrastructure failures due to potential cyber-attacks. In this chapter, we look at some of the state-of-the-art technologies to monitor events in a power system under normal operating condition, followed by detection algorithms for regular business risk events, such as faults and equipment failures, and finally, we look into methods for quantifying vulnerability of under the rare and men-orchestrated cyber-attacks. First, we outline an architecture of a central piece of today’s grid awareness system, Wide Area Monitoring, Protection and Control technology. Next, we review an event detection method used to identify and record faults and failures in the grid. Finally, we present a method for vulnerability assessment of grids under cyber-attacks.
Original languageEnglish
Title of host publicationIntelligent Integrated Energy Systems
Subtitle of host publicationThe PowerWeb Program at TU Delft
EditorsPeter Palensky, Miloš Cvetković, Tamás Keviczky
Place of PublicationCham, Switzerland
PublisherSpringer
Chapter3
Pages55-78
Number of pages24
ISBN (Electronic)978-3-030-00057-8
ISBN (Print)987-3-030-00056-1
DOIs
Publication statusPublished - 2019

Bibliographical note

Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-care
Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.

Fingerprint

Dive into the research topics of 'Grid Awareness Under Normal Conditions and Cyber-Threats'. Together they form a unique fingerprint.

Cite this