You are on page 1of 44

CHAPTER-1

WHAT IS A SMART GRID?

A smart grid [1] delivers electricity from suppliers to consumers using two-way digital
technology to control appliances at consumers' homes to save energy, reduce cost and increase
reliability and transparency.

It is capable of assessing its health in real-time, predicting its behavior, anticipatory


behavior, adaptation to new environments, handling distributed resources, stochastic demand,
and optimal response to the smart appliances. It is a tool that allows electric utilities to focus on
evolving true business drivers by enabling cost containment, end-to-end power delivery control,
and a more secure infrastructure.

The grid is considered to have observability with nodes data integration and analysis to
support advances in system operation and control. This includes power delivery integration and
high level utility strategic planning functions.

The existing transmission and distribution systems use techniques and strategies that are old
and there is limited use of digital communication and control technology. To achieve improved,
reliable and economical power delivery information flow and secure integrated communication
is proposed.

The Smart Grid with intelligent functions is expected to provide self-correction,


reconfiguration and restoration, and able to handle randomness of loads and market participants
in real time, while creating more complex interaction behavior with intelligent devices,
communication protocols, standard and smart algorithms to achieve complex interaction with
smart communication and transportation systems.

The Smart Grid is planned to have the following key characteristics:

 Self-healing: A grid, which is able to rapidly detect, analyze, respond and restore from
perturbations.

1
 Empower and incorporate the consumer: The ability to incorporate consumer
equipment and behavior in the design and operation of the grid.
 Tolerant of attack: A grid that mitigates and stands resilient to physical and cyber
security attacks.
 Provides power quality needed by 21st century users: A grid that provides a quality
of power consistent with consumer and industry needs.
 Accommodates a wide variety of generation options: A grid that accommodates a
wide variety of local and regional generation technologies (including green power).
 Fully enables maturing electricity markets: Allows competitive markets for those
who want them.
 Optimizes assets: A grid that uses IT and monitoring to continually optimize its capital
assets while minimizing operations and maintenance costs.

Overall, the Smart Grid design goals are to provide grid observability; create controllability
of assets, enhance power system performance and security; and reduce costs of operations,
maintenance, and system planning. Benefits of the Smart Grid with bring forth the following:

 Improved system performance meters.


 Better customer satisfaction.
 Improved ability to supply information for rate cases, visibility of utility operation / asset
management
 Availability of data for strategic planning, as well as better support for digital summary
 More reliable and economic delivery of power enhanced by information flow and secure
communication
 Life cycle management, cost containment, and end-to-end power delivery is improved in
the smart grid design
 Improved ability to supply accurate information for rate cases- with compounding impact
in regulatory utilities
 Input visibility of utility operation to asset management
 Impact access to historical data for strategic planning.

2
1.1 FUNCTIONS SUPPORTED BY THE SMART GRID ARCHITECTURE

For the functional scope of the Smart Grid architecture [2], eight functional scenarios have
been defined. A short description of each case is provided in the following subsections.

1.1.1 Variable-Tariff-Based Load

The key idea of this is a variable price profile given to the customer day ahead before
the delivery by a retailer. This profile is considered fixed after transmission to the customer
and, as such, the customer can rely on it. The price profile will look different for each day,
reflecting market conditions that vary from day to day. These variations will likely further
increase with expanding generation from fluctuating sources like wind power and
photovoltaics. Generally, this concept allows for integration of loads as well as of generation
units at the customer site as it is up to the customer which devices are allowed to be managed
according to the variable tariff. To enable in-home energy management, a suitable domestic
system is required together with an automatic home management device coupled to an
intelligent meter.

1.1.2 Energy Usage Monitoring and Feedback

In the “Action Plan for Energy Efficiency”, the European Commission estimates the
EU-wide energy saving potential of households at approx. 27%. As one important measure
for realizing this potential, the action plan states that awareness must be increased in order to
stimulate end-customer behavioural changes. A timely display of energy consumption is
expected to have positive effects on energy savings. Personalized and well targeted advice on
how to save energy can further help exploit the savings potential. A portal or display that
combines information about present and past consumption, comparisons to average
consumption patterns, and precise suggestions how to further lower consumption, which are

3
tailored personally to the customer, is expected to be the most effective way of realizing the
targeted increase in households’ energy efficiency.

1.1.3 Real-time Portfolio Imbalance Reduction

This function is rooted in the balancing mechanism as used by Transmission System


Operators (TSOs) throughout the world. In this context, a wholesale-market participant, that
is responsible for a balanced energy volume position, is called a Balance Responsible Party
(BRP). These parties have an obligation to plan or forecast the production and consumption
in their portfolio, as well as notify this plan to the TSO. Deviations of these plans may cause
(upward or down-ward) regulation actions by the TSO. The TSO settles the costs for the used
reserve and emergency capacity with those BRPs that had deviations from their energy
programs. On average this results in costs for the BRP referred to as imbalance costs. This
business case scenario focuses on the balancing actions by a BRP in the near-real time (i.e. at
the actual moment of delivery). Traditionally, these real-time balancing actions are
performed by power plants within the BRP’s portfolio. The key idea of this function is the
utilization of real-time flexibility of end-user customers to balance the BRP portfolio.

1.1.4 Offering (secondary) Reserve Capacity to the TSO

Taking the previous function one step further, the BRP uses these VPPs to, additionally,
bid actively into the reserve capacity markets.

1.1.5 Distribution System Congestion Management

This function is aimed at the deferral of grid reinforcements and enhancement of


network utilization to improve the quality of supply in areas with restricted capacity in lines
and transformers. The Distribution System Operator (DSO) avoids infrastructural
investments and optimizes the use of existing assets by active management using services
delivered by smart houses. By coordinated use of these services, end-customer loads can be

4
shifted away from periods at which congestion occurs and simultaneousness of local supply
and demand can be improved.

1.1.6 Distribution Grid Cell Islanding in Case of Higher- System Instability

The main principle of this is to allow the operation of a grid cell in island mode in case
of higher system instability in a market environment. The scenario has two main steps, the
first occurring before a possible instability and involves keeping a load shedding schedule
up-to-date. The second step is the steady islanded operation. The transition to the island
mode is automatic and neither end users nor the aggregator interferes with it. The system
manages the energy within the island grid and it is considered that all nodes within the
islanded grid will participate in the system.

1.1.7 Black-Start Support from Smart Houses

The most important concept of this function is to support the black start operation of the
main grid. It is assumed that after the blackout the local grid is also out of operation. The
main goal is to start up quickly in island mode and then to reconnect with the upstream
network in order to provide energy to the system.

1.1.8 Integration of Forecasting Techniques

The volatility of the production level of distributed generators, like renewables and
CHP, makes forecasting a necessary tool for market participation. The market actor with the
lowest forecasting error will have the most efficient market participation. Moreover, the
usage of intelligent management tools for handling the information about the uncertainties of
large-scale wind generation will improve the system-wide operational costs, fuel and CO 2
savings. The Smart Grid architecture under development must interact with these forecasting
tools and additionally ensure accurate data collection for these tools.

5
CHAPTER-2
A TRANSMISSION VIEW

Power Grids today face many challenges that they were not designed and engineered to
handle. Congestion and atypical power flows threaten to overwhelm the system while demand
increases for higher reliability and better security and protection. The potential ramifications of
grid failures have never been greater as transport, communications, finance, and other critical
infrastructures depend on secure, reliable electricity supplies for energy and control. Because
modern infrastructure systems are so highly interconnected, a change in conditions at any one
location can have immediate impacts over a wide area, and the effect of a local disturbance even
can be magnified as it propagates through a network. Large-scale cascade failures can occur
almost instantaneously and with consequences in remote regions or seemingly unrelated
businesses.

On the North American power grid, for example, transmission lines link all electricity
generation and distribution on the continent. Wide-area outages in the late 1990s and summer
2003 underscore the grid’s vulnerability to cascading effects.

Practical methods, tools, and technologies based on advances in the fields of computation,
control, and communications are allowing power grids and other infrastructures to locally self-
regulate, including automatic reconfiguration in the event of failures, threats, or disturbances. It
is important to note that the key elements and principles of operation for interconnected power
systems were established before the 1960s, before the emergence of extensive computer and
communication networks. Computation is now heavily used in all levels of the power network:
for planning and optimization, fast local control of equipment, and processing of field data. But
coordination across the network happens on a slower timescale. Some coordination occurs under
computer control, but much of it is still based on telephone calls between system operators at the
utility control centers, even—or especially—during emergencies.

6
2.1 How to Make an Electric Power Transmission System Smart[3]

Power transmission systems also suffer from the fact that intelligence is only applied locally
by protection systems and by central control through the supervisory control and data acquisition
(SCADA) system. In some cases, the central control system is too slow, and the protection
systems (by design) are limited to protection of specific components only.

To add intelligence to an electric power transmission system, we need to have independent


processors in each component and at each substation and power plant. These processors must
have a robust operating system and be able to act as independent agents that can communicate
and cooperate with others, forming a large distributed computing platform. Each agent must be
connected to sensors associated with its own component or its own substation so that it can
assess its own operating conditions and report them to its neighboring agents via the
communications paths. Thus, for example, a processor associated with a circuit breaker would
have the ability to communicate with sensors built into the breaker and communicate those
sensor values using high-bandwidth fiber communications connected to other such processor
agents. We shall use a circuit breaker as an example. We will assume that the circuit breaker has
a processor built into it with connections to sensors within the circuit breaker (Figure1).

Figure.1 Circuit Breaker with Sensors


7
We also provide communication ports for the processor where the communication paths
follow the electrical connection paths. This processor agent now forms the backbone of the smart
grid as will be discussed later. We propose a system that acts very fast (although not always as
fast as the protections system), and like the protection system, its agents act independently while
communicating with each other. As such, the smart grid is not responsible for removing faulted
components, which is still the job of the protection system, but acts to protect the system in times
of emergencies in a much faster and more intelligent manner than the central control system.

2.1.1 The Advantages of an Intelligent Processor in Each Component, Substation, and


Power Plant

We presently have two kinds of intelligent systems used to protect and operate transmission
systems: the protection systems and the SCADA/EMS/independent system operator (ISO)
systems.

Modern computer and communications technologies now allow us to think beyond existing
protection systems and the central control systems to a fully distributed system that places
intelligent devices at each component, substation, and power plant. This distributed system will
enable us to build a truly smart grid.

The advantage of this becomes apparent when we see that each component’s processor
agent has inputs from sensors in the component, thus allowing the agent to be aware of its own
state and to communicate it to the other agents within the substation. On a system level, each
agent in a substation or power plant knows its own state and can communicate with its
neighboring agents in other parts of the power system. Having such independent agents, which
know about their own component or substation states through sensor connections, allows the
agents to take command of various functions that are not performed by either the protection
systems or the central control systems.

8
2.1.2 Power Systems Components as Plug-and-Play Interconnects

One of the problems common to the management of central control facilities is the fact that
any equipment changes to a substation or power plant must be described and entered manually
into the central computer system’s database and electrical one-line diagrams. Often, this work is
done some time after the equipment is installed, resulting in a permanent set of incorrect data and
diagrams in use by the operators. What is needed is the ability to have this information entered
automatically when the component is connected to the substation— much as a computer
operating system automatically updates itself when a new disk drive or other device is
connected.

When a new device is added to a substation, the new device automatically reports data such
as device parameters and device interconnects to the central control computers. Therefore, the
central control computers get updated data as soon as the component is connected; they do not
have to wait until the database is updated by central control personnel.

Figure 2 shows a substation bus-bar pair connected by a set of disconnect switches and a
circuit breaker (the component processors are shown in orange). Each processor has
communication paths connecting it with processors of the substation component in the same
pattern as the electrical connections in the substation.

9
Figure 2 Sub Station Bus-Bus Pair

When a new component is added to the substation it also has a built-in processor. When the
new device is connected, the communication path (Figure 3) is connected to the processor of the
device it connects to electrically. When the new component’s processor and communication path
are activated, it can report its parameters and interconnects to the central control system, which
can use the information to update its own database.

10
Figure 3 Incoming Device To System

2.1.3 Diagnostic Monitoring of all Transmission Equipment

Placing the processing of sensor data in a local agent avoids the problem of sending that
data to the central computer via the limited-capacity SCADA communications. The means for
processing the local sensor data can be designed by the component manufacturer, and the agent
then only needs to send appropriate alarms to the central computers. If the component is under
such stress that the local agent determines it is in danger of being damaged, it can initiate
shutdown through appropriate interconnects to the protections systems associated with the
component.

11
2.1.4 Grid Computing

Grid computing can be described as a world in which computational power is as readily


available as electric power and other utilities. According to Irving et al. in “Plug into Grid
Computing,”

Grid computing could offer an inexpensive and efficient means for participants to
compete (but also cooperate) in providing reliable, cheap, and sustainable electrical
energy supply.

In addition, potential applications for the future power systems include all aspects that
involve computation and are connected, such as monitoring and control, market entry and
participation, regulation, and planning. Grid computing holds the promise for addressing the
design, control, and protection of electric power infrastructure as a Complex Adaptive System
(CAS).

2.1.5 Self-Healing Network Using Distributed Computer Agents


A typical sequence seen in large power system blackouts follows these steps:

1) a transmission problem, such as a sudden outage of major lines, occurs


2) further outages of transmission lines due to overloads leave the system islanded
3) frequency declines in an island with a large generation load imbalance
4) generation is taken off line due to frequency error
5) the island blacks out
6) the blackout lasts a long time due to the time needed to get generation back online.

A self-healing grid can arrest this sequence. In Figure 4 we show three power plants
connected to load substations through a set of looped transmission lines. Each plant and each
substation will have its own processor (designated by a small red box in the figure). Each plant
and substation processor is now interconnected in the same manner as the transmission system
itself.

12
Figure 4 Interconnected Power Plants & Load Sub-Station

In Figure 5 we impose an emergency on the system; it has lost two transmission connections
and is broken into two electrical islands. The processors in each island measure their own
frequency and determine that there are load/generation imbalances in each island that must be
corrected to prevent being shut down. The processors would have to determine the following:

 the frequency in each island


 what constitutes each island
 what loads and what power plants are connected to each island
 what is the load versus generation balance in each island
 what control actions can be made to restore the load/generation balance

13
Figure 5. Emergency Imposed On System

14
The substation and power plant processors form a distributed computer network that
operates independently of the central control system and can analyze the power system state and
take emergency control actions in a time frame that cannot be done by central computer systems.

How to effectively sense and control a widely dispersed, globally interconnected system is a
serious technological problem. It is even more complex and difficult to control this sort of
system for optimal efficiency and maximum benefit to the consumers while still allowing all its
business components to compete fairly and freely. A similar need exists for other infrastructures,
where future advanced systems are predicated on the near-perfect functioning of today’s
electricity, communications, transportation, and financial services.
In the coming decades, electricity’s share of total energy is expected to continue growing, and
more intelligent processes will be introduced into this network. For example, controllers based
on power electronics combined with wide-area sensing and management systems have the
potential to improve the situational awareness, precision, reliability, and robustness of power
systems. It is envisioned that the electric power grid will move from an electromechanically
controlled system to an electronically controlled network in the next two decades.

15
CHAPTER-3
A DISTRIBUTION VIEW

Utilities deliver power to their customers through a network of power plants, transmission
lines, substations, and distribution systems. A distribution system carries power from substation
transformers through feeder circuits to distribution transformers located near customers.
Distribution transformers step voltage down from primary voltages of 4 to 34 kV to secondary
voltages of 120 to 480 V for delivery.

The distribution system needs many changes to come in sync with the requirements for the
implementation of smart grids. For this optimization on various levels is needed to be
incorporated in the present distribution system. The various optimizations desired are-

 Demand Optimization: This is to manage peak load via control of power consumption.
This would defer upgrades, optimize generation & renewables.
 Delivery Optimization: This is to reduce delivery losses in distribution systems which
would result into less energy wastes and higher profit margins.
 Asset Optimization: It includes prognostics for proactive equipment maintenance to
reduce outages and make workers focused.
 Reliability Optimization: It includes Wide Area Protection and control which would
result in increased reliability and network performance.
 Renewables Optimization: It includes use of forecasting and smoothing which provides
compensation for production variability. This is the key step for meeting targets
especially in areas with weak grids.

16
3.1 DISTRIBUTION AUTOMATION

Distribution Automation (DA) refers to monitoring, control and communication functions


located out on the feeder. From a design perspective, the most important aspects of distribution
automation are in the areas of protection and switching (often integrated into the same device).
There are DA devices today that can cost-effectively serve as an “intelligent node” in the
distribution system. These devices can interrupt fault current, monitor currents and voltages,
communicate with one-another, and automatically reconfigure the system to restore customers
and achieve other objectives.

The ability to quickly and flexibly reconfigure an interconnected network of feeders is a key
component of Smart Grid. This ability, enabled by DA also requires distribution components to
have enough capacity to accept the transfer and requires the protection system to be able to
properly isolate a fault in the reconfigured topology.

Both of these issues have an impact on system design. Presently, most distribution systems
are designed based on a main trunk three phase feeder with single-phase laterals. The main trunk
carries most power away from the substation through the center of the feeder service territory.
Single phase laterals are used to connect the main trunk to customer locations. Actual
distribution systems have branching, normally-open loops, and other complexities, but the
overarching philosophy remains the same.

A Smart Grid does not just try to connect substations to customers for the lowest cost.
Instead, a Smart Grid is an enabling system that can be quickly and flexibly be reconfigured.
Therefore, future distribution systems will be designed more as an integrated Grid of distribution
lines, with the Grid being connected to multiple substations. Design, therefore, shifts from a
focus on feeders to a focus on a system of interconnected feeders. Traditional distribution
systems use time-current coordination for protection devices. These devices assume that faster
devices are topologically further from the substation.

17
In a Smart Grid, topology is flexible and this assumption is problematic. From a design
perspective, system topology and system protection will have to be planned together to ensure
proper protection coordination for a variety of configurations.

3.2 DISTRIBUTION OPTIMIZATION

3.2.1 DAO MODEL [4]

A new method, the Distributed Asset Optimization (DAO) Model, has been developed to
provide an engineering basis for predicting hourly loading at any point between the substation
and the customer. The DAO Model calculates the power flowing through each distribution
transformer by reconciling hourly substation data with end-use customer data. The approach
used is relatively simple; however, because of the scale of the data and calculations, the system
as a whole presents many challenges and involves a comprehensive process. Because most
customer energy use is read on one of many possible monthly billing cycles, and because the
connectivity of customers to transformers to substations changes over time, this reconciliation
exercise is not straightforward. Furthermore, the data required resides in different departments of
a utility, often in incompatible databases. But by tackling these issues, the DAO Model can
estimate power flow through the distribution system. Knowledge of transformer loadings and
system connectivity provides the insights required to make better planning and operating
decisions.

3.2.1.1 Data Collection

The DAO Model brings together data collected from information systems distributed
throughout the utility. The data includes:
 customer information and billing data
 customer hourly consumption data from metering and load research
 distribution transformer, feeder, and substation bank characteristics

18
 connectivity data for the distribution system
 available substation SCADA data

The DAO Model reconciles customer meter data to feeder SCADA data to calculate power
through transformers. The foundation for the DAO Model process is the creation of hourly load
profiles for individual customers. The process would be much simplified if such profiles were
available for all customers. However, at most utilities, hourly load data is only available for a
small subset of customers, usually very large customers and those metered for load research
purposes. How to turn a preponderance of monthly data into hourly data is the subject of the
DAO Model. Below the different stages of the process are discussed.

3.2.1.2 Data Validation


After data collection, a battery of validation tests is run on all data. These tests check
transformer connectivity, customer to transformer proximity, and duplicate or inconsistent
customer records. In addition, sanity checks are run that compare total annual customer energy
by feeder to total annual energy measured by SCADA data. Validation, editing, and estimation
routines are also executed to scan and correct all received energy data histories for gaps,
duplicate readings, spikes, and other anomalous patterns.

3.2.1.3 Establish Weather Sensitivity


All customer energy data, whether monthly, daily, or hourly, are correlated with historical
weather for the location of each meter; the result is one Tuning Equation for each meter point,
which embodies weather sensitivity (separately for cooling and heating end uses) as well as the
fraction of non-weather sensitive end uses. (If customer data are in monthly billing periods, the
tuning equation acts on whole billing periods; if customer data are daily or hourly, the tuning
equation acts on calendar weeks.) If only monthly billing data is available and read on different
billing cycles, as many as 14 or more bills are required to cover the tuning period completely
(with the first bill ending before the beginning of the tuning period, and the last bill partially
exceeding the end of the tuning period).

19
3.2.1.4 Data Categorization and Creation of Load Shape Library
Data from customers with hourly and daily data are normalized. Normalization of hourly
data removes scale (annual energy and demand), weather sensitivity, and day-type dependence;
normalization of daily data similarly removes scale and weather sensitivity, but not day-type
dependence. All customer data that fulfills certain quality minimum requirements are organized
in a load shape library, where normalized load shapes are organized by revenue class, rate code,
heating and cooling weather sensitivity, and load factor.

The next step in the modeling process is to assign monthly customers to the best matching
hourly and daily load shape in the load shape library. This is accomplished by matching revenue
class, rate code, heating and cooling weather sensitivity, and load factor. Customers with daily
metering are assigned hourly load shapes from the library in a comparable way.

3.2.2 Customer Model Rendering

Once both weather sensitivity and matching library load shapes have been determined for
each customer, the model can be used to simulate an hourly load profile for the original training
period or any other time period under various weather conditions. This load shape creation step
has been labeled rendering. The rendering algorithm provides not only hourly energy but also
hourly reactive energy, power factor, and phase information. The hourly customer profile is
recreated in several steps. First, daily energy is estimated for each customer by taking its
weather-sensitivity model coefficients in combination with actual or predicted weather data.
Then the customer’s matched daily and hourly library shapes are applied to provide daily
allocations of the tuning equation’s energy and hourly modulation of daily results.

For the minority of customers with daily meters, only a matching hourly profile from the
load shape library is required in combination with the customer’s own daily values to yield the
complete hourly profile. A very small minority of customers have hourly meters. For these
meters, rendering simply consists of combining their weather-sensitivity coefficients with their
actual hourly values and simulating a load shape for future time periods or alternate weather.

20
3.2.3 Aggregation to Transformers and to Feeders

With customer hourly profiles in hand, the load shape of a distribution transformer can be
rendered. The customer hourly profiles are aggregated hour-by-hour and yield a transformer
profile of hourly consumption and power factor values for the desired time period. A similar
process is followed to render a feeder, whereby all transformers connected to the feeder are
aggregated hour-by-hour, to yield a feeder profile of hourly consumption and power factor
values for the desired time period. Feeder results also include load by phase.

3.2.4 Calibration

To compensate for unaccounted-for energy, such as line losses, transformer losses, and
unmetered end uses that can occur between the customer meter and feeder, a calibration process
must be applied. Currently, unaccounted-for energy is determined by comparing measured
SCADA data to the sum of rendered transformer energy on a weekly and daily, feeder-by-feeder
basis. Corresponding calibration factors are derived for each feeder, week, and day type and used
to render hourly feeder profiles.

3.3 Transformer Aging

One significant area where the DAO Model is being applied is in analyzing distribution
transformer hot spots and overloading events to proactively identify transformers at risk of
failure. Distribution planners have long monitored hot spot temperature on substation
transformers using SCADA data; e.g., bank oil temperatures. However, lack of SCADA data for
distribution transformers has prevented the analysis of overloading, loss of life, and transformer
failure at the distribution transformer level.

The DAO Model changes that paradigm. While the nominal lifetime of a transformer is
only 10–20 years, under average loading conditions the transformer’s life can exceed this value
by several times. On the other hand, if customer load grows more than expected over time, and
the transformer load exceeds capacity even for a few hours or a few days of the year, a

21
transformer can suddenly fail long before its expected lifetime is over. (The nominal lifetime is
the expected time to failure if the transformers were operated continuously at the nameplate
capacity and rated ambient conditions. The pace at which a transformer ages, increases
dramatically, if the load exceeds nameplate capacity at ambient conditions. Most transformers
are operated well below nameplate capacity most of the time, and their achieved lifetimes
frequently can exceed nominal lifetimes by a multiple.)

Aging of the transformer occurs most rapidly during a time of overloading, combined with a
high ambient temperature. This effect is taken into account by an “aging multiplier”. The aging
multiplier is 1 if the transformer is loaded at 100% of nominal capacity at rated ambient
conditions. It increases dramatically as either or both of these conditions are exceeded. In
addition to the aging multiplier we show its cumulative effect, as “consumed life” in hours. Note
that a transformer experiences almost all of its annual “aging” in a relatively small number of
overload events.

In a typical utility, about one-tenth of one percent of transformers fails unexpectedly in any
given year. While this relatively small number may appear to be an acceptable risk, the location
of such failures is hard to predict, and their timing is often coincident with other problems typical
for a peak day. The replacement is costly in terms of labor that must be rushed to the site, public
relations problems, and, in some states public utility commission fines that may be levied.
Knowing which transformers are most likely to fail in the near future is valuable information to a
utility.

3.4 Transformer Load Management Reporting

Typical transformer load management reports in use at utilities today provide a monthly
estimate of the peak load on a transformer by applying a load factor to monthly usage. The
monthly usage is the addition of billing usage for each of the customers assigned to the
transformer. Generally, confidence in these reports is low due to data consistency issues and
assumptions that are too general. Transformer loads are used in a number of business processes

22
such as sizing new facilities, determining where customers have added load, and troubleshooting
customer problems.

A reliable accurate data source for transformer loading increases efficiency and reduces
errors in these processes. For example, the warehouse is out of stock of a 1000-kVA padmount
transformer and you need one tomorrow. A loading report, run for all 1000-kVA underground
transformers that are loaded less than 50%, would locate an underutilized transformer that could
be changed out.

3.5 Feeder Performance Management

By virtue of its bottom-up modeling of the customer to the feeders and banks, the DAO
Model has application in feeder performance management. Typically circuit analysis tools used
at utilities use a connected kVA method to spread load from the breaker to the normally open
point. The connected kVA method assumes that transformers of the same size have the same
loading; i.e., all 100-kVA transformers are loaded equivalently. The peak amps are typically a
snapshot from SCADA or manual substation reads.

The DAO Model allows transfer of simulated transformer loads, based on actual customer
usage, to circuit analysis tools and outage management systems’ switching analysis tools.
Because the data is hourly, alternate scenarios, such as an off peak hour or a particular day can
be analyzed. The more accurate load data provides more accurate voltage profiles, load analysis,
and protection coordination analysis. These are key items for managing feeder performance. In
addition, the model provides base load, heating load, and cooling load components at any point
along the feeder. This information delivers the ability to forecast feeder loading for a specific
weather scenario for switching and capacity planning. Standard reporting tools enable charting,
data visualization, statistical analysis, and data export tools to help users analyze data.

23
3.6 Load Forecasting

Because of its inherent ability to respond to alternative and extreme weather scenarios, the
DAO solution is a powerful tool in supporting both short- and long-term load forecasting. Short-
term weather forecasts can be fed to the model to obtain a realistic prediction of loads by feeders
for next day or next week analysis. Historic year-to-year load changes that have been observed
system-wide or at individual substations can be analyzed to determine the relative impact of
weather or customer changes in causing the load growth or decrease. Conversely, by applying
expected growth rates by revenue class and region, load growth on individual parts of the
distribution system can be accurately forecasted.

24
CHAPTER-4

SMART HOMES FOR SMART GRID

The residential, Small Office/Home Office (SOHO) and commercial building sector
together is responsible for over 50% of Europe’s electricity consumption. The current electricity
distribution system treats home and working environments as consisting of isolated and passive
individual units. This severely limits the achieved energy efficiency and sustainability, as it
ignores the potential delivered by homes, offices, and commercial buildings which are seen as
intelligent networked collaborations.

In order to achieve next-generation energy efficiency and sustainability, a novel smart grid
Information and Communication Technology (ICT) architecture based on Smart Houses
interacting with Smart Grids is needed. This architecture enables the aggregation of houses as
intelligent networked collaborations, instead of seeing them as isolated passive units in the
energy grid.

The ICT architecture [2] under development by a consortium of leading parties in ICT for
energy introduces a holistic concept and technology for smart houses as they are situated and
intelligently managed within their broader environment. This concept seriously considers smart
homes and buildings as proactive customers (“prosumers”) that negotiate and collaborate as an
intelligent network in close interaction with their external environment.

The smart home and building environment includes a diverse number of units: neighbouring
local energy consumers (other smart houses), the local energy grid, associated available power
and service trading markets, as well as local producers (environmentally friendly energy
resources such as solar and (micro)CHP etc.)

25
The architecture is based on a carefully selected mixture of innovations from recent R&D
projects in the forefront of European Smart Grid research. These innovations include:

 In-house energy management based on user feedback, real-time tariffs, intelligent control
of appliances and provision of (technical and commercial) services to grid operators and
energy suppliers.

 Aggregation software architecture based on agent technology for service delivery by


clusters of smart houses to wholesale market parties and grid operators.

 Usage of Service Oriented Architecture (SOA) and strong bidirectional coupling with the
enterprise systems for system-level coordination goals and handling of real-time tariff
metering data.

4.1 Aggregation of Houses as Intelligently Networked Collaborations

SmartHouse/SmartGrid concepts will exploit the potential that is created when homes,
offices and commercial buildings are treated as intelligently networked collaborations. The
SmartHouses will be able to communicate, interact and negotiate with both customers and
energy devices in the local grid. As a result, the electricity system can be operated more
efficiently because consumption will be better predicted and adapted to the available energy
supply, even when the proportion of variable renewable generation is high. A commercial
aggregator could exercise the task of jointly coordinating the energy use of the SmartHouses or
commercial consumers that have a contract with it and additionally deliver services to grid
management performed by the network operators.

26
Figure. 6 A SMART HOME AREA NETWORK

4.2 Technical Measures

The main technical measures on which the functionalities of the ICT architecture are based
include:

1. End User Feedback: Aims at an interface to the end user in order to give feedback on
his/her energy behaviour and on the availability of (local) clean electricity.
2. Automated Decentralized Control of Distributed Generation and Demand
Response: Aims at a better local match between demand and supply, at customer

27
acceptance of management strategies, and at a more effective reaction to near-real time
changes at the electricity market level (e.g. due to fluctuations in large-scale wind energy
production) and grid operations (e.g. for congestion management and reserve capacity
operations).
3. Control for Grid Stability and Islanding Operation: Aims at the delivery of services
by smart houses to be used by network operators to maintain or restore stability in
(distribution) networks in an active manner. Here, the particular focus is on the capability
to run local power networks in islanded mode and reaction of end-user systems to critical
situations in the grid.

28
CHAPTER-5

AUTOMATIC METER READING

Automatic Meter Reading (AMR), also known as Remote Meter Reading, refers to the
system that uses a communication technique to automatically collect the meter readings and
other relevant data from meters installed by the electricity provider without the need to
physically visit the meters. The development of AMR [5] technology has catapulted meter data
to centre stage of the Smart Grid implementation plan. It has been realized that AMR has
benefits beyond meter reading because it provides crucial data on and insight into other areas of
operations.

5.1 DATA RETRIEVAL

For residential customers, there are a number of data retrieval considerations. Most are
billed monthly and, thus, a monthly consumption read is sufficient. However, in fully
deregulated markets some residential meters may need to be read daily. This may be a growing
trend, especially when the potential benefits of deregulation are made available to more
residential customers.

Utilities need to monitor whether the meter has been tampered with, in any way, which
could result in a loss of revenue. They also need to collect meter data for customers that are
moving out or getting disconnected. This may need to be collected separately from the billing
cycle.

For commercial and industrial customers, data retrieval frequency usually depends on size.
Small commercial customers’ meters are usually read monthly for consumption. However, large
commercial and industrial customers have advanced metering system- like volume correctors,
which are usually read daily. These remote-monitoring devices, attached to meters and
correctors, store hourly consumption profiles.

29
5.2 COMMUNICATION TECHNOLOGIES

For data retrieval, the choice of communication technology depends upon various factors.
AMR forms the basis for utilities who want to improve customer service and satisfaction by
delivering accurate billing to its entire customer base in a timely manner. Often, estimated bills
are the leading cause of customer dissatisfaction. Some of the key technologies for Advanced
Meter Reading are given below:

5.2.1 RF COMMUNICATIONS

Radio Frequency (RF) remains the most widely accepted method of communication
between meter and data collection. A meter is mounted with a small module, usually behind the
index, where it converts the movement of wriggler into pulse counts and stores them, taking into
account the count rate and other factors. These modules are Encoders and Transmitters, put
together as a single unit.

These RF devices are activated by a “wake-up” signal from the data collection system, and
the device sends back the latest meter read and other information, like tamper status, to the data
collection system. Since, these devices are battery-powered, using this wake-up technique helps
conserve battery life. In some cases, however, RF devices regularly transmit readings, and the
data collection system does not wake-up the device.

In terms of data collection method, there are three most popular ways to read these RF
devices. These are detailed below:

Radio-equipped Handheld Computer

A meter reader carrying a rugged handheld computer equipped with a radio receiver walks
by homes, without actually entering the premises. The devices send their reads to the handheld
computer. The meter reader accepts the read, and keeps moving on his/her route.

The meter reader does not enter the readings manually, eliminating any manual entry errors.
This system is normally used to read those accounts within the utility service that have high-cost
or hazardous-to-read meters.

30
Drive-by or Mobile Data Collection

Mobile data collection uses vehicles equipped with radio units to read RF module-equipped
meters via radio, without the need to access the meter.

A radio transreceiver is installed in a utility vehicle. Route information is downloaded from


the utility billing system and loaded into this radio transreceiver. While driving along a meter-
reading route, the transreceiver broadcasts a radio wake-up signal to all RF meter modules within
range and receives the meter readings when they respond. Completed reads are uploaded to the
billing system for bill generation.

Mobile data collection systems now come with state-of-the-art GPS mapping systems which
allow the users to see their data collection process, and analyze any missed readings before
leaving a route. Once the route has been completed and the meter reader has returned to the
office, the system administrator then has the capability to play-back the route that was driven that
day, and identify opportunities to optimize routes and improve meter-reading reliability.

Fixed Network Data-collection

Fixed network deployment is usually done as a migration from the mobile data collection
system. The fixed network is usually installed over saturated areas where advanced metering
data, variable reads, unscheduled reads or operational improvements are required.

This saturated deployment spreads the cost of the network components over multiple
meters. Utility whose business objectives will only be met by more granular data (often daily or
reading several times a day) and the ability to collect the latest reading are considering a fixed
network.

5.2.2 TELEPHONE-BASED COMMUNICATION

Telephone-based remote metering devices are of two types, based upon their mode of
communication, inbound or outbound.

31
Inbound Systems

In this type of systems, the modules call a central master data collection computer at
prescheduled times and provide the hourly consumption data.

Outbound Systems

In this type of communication, the master station calls the remote meter module and collects
the data. This is useful where on-demand reads may be required as well.

5.2.3 OTHER COMMUNICATION METHODS

In places where it is difficult to make a regular phone line available, cellular transreceivers
are currently being evaluated at some sites as a communication medium. While cellular offers
reduced installation costs, other factors are still being evaluated, including network availability
and reliability, cost of service and battery life.

In addition, various other communication mediums, like satellite and powerline carrier are
being experimented within small numbers.

5.3 SMART METERS[6]

The usage-reporting device at each customer site is called a smart meter. It’s a
computerized replacement of the electrical meter attached to the exterior of many of our homes
today. Each smart meter contains a processor, nonvolatile storage, and communication facilities.
Although in many respects, the smart meter’s look and function is the same as its unsophisticated
predecessor, its additional features make it more useful. Smart meters can track usage as a
function of time of day, disconnect a customer via software, or send out alarms in case of
problems. The smart meter can also interface directly with “smart” appliances to control them—
for example, turn down the air conditioner during peak periods.

32
One of the smart grid’s most attractive features is its ability to support widespread customer
energy generation. For example, many farms now offset energy costs by producing electricity
using methane generators, solar panels, and wind turbines. In the new smart grid, farmers can
sell excess energy generated back to the utility, thereby reducing or eliminating energy costs.
Obviously, this not only changes the electrical grid’s economics but provides attractive
incentives for customers to deploy (hopefully clean) power generation technology. If widely
adopted, this could substantially lower the provider generating capacity required to support the
nation’s needs.

Although the long-term vision for the smart grid involves global energy management and
home area networks that can control smart appliances, current deployments evolve around the
deployment of onsite smart meters. Currently, several million homes and businesses have
upgraded to these new meters in the US alone, with an additional 40 million scheduled for
deployment in the next three years.

33
CHAPTER-6
SECURITY

Smart Grid security is to be taken very seriously. The smart grid requires developing and
deploying extensive computer and communication infrastructure that supports significantly
increased situational awareness and allows finer-grained command and control. This is necessary
to support major applications and systems such as demand-response wide-area measurement and
control, electricity storage and transportation, and distribution automation.

Any complex system has vulnerabilities and challenges, and the smart grid is no exception.
Numerous challenges will arise with the integration of cyber and physical systems, along with
such factors as human behavior, commercial interests, regulatory policy, and even political
elements. Some challenges will be quite similar to those of traditional networks, but involving
more complex interactions. The following areas need to be considered [9]

6.1 Trust
For control systems, we define trust as our confidence that, during some specific interval,

• the appropriate user is accessing accurate data created by the right device at the expected
location at the proper time, communicated using the expected protocol
• the data hasn’t been modified

Many people view the grid’s control systems as operating in an environment of implicit
trust, which has influenced design decisions. If some participants aren’t trustworthy, new
methods of addressing this beyond existing monitoring approaches might be required.

6.2 Communication and Device Security

Traditional electric-grid communications have relied predominantly on serial


communication environments to provide monitoring and control. Serial communication is
reliable, is predictable, and, owing to the nature of the communications protocols, provides some
containment. However, increasing numbers of smart-grid deployments are using Internet

34
technologies, broadband communication, and nondeterministic communication environments.
This issue is compounded by the rapid deployment of smart-grid systems without adequate
security and reliability planning. For example, whereas traditionally communications involved
devices that were in areas with physical access controls (such as fences and locked buildings),
two-way meters being deployed now are accessible by consumers and adversaries.
Consequently, we must consider automatic meter reading (AMR) environments hostile in such
cases.

Smart meters are extremely attractive targets for malicious hackers, largely because
vulnerabilities can easily be monetized. Hackers who compromise a meter can immediately
manipulate their energy costs or fabricate generated energy meter readings. This kind of
immediacy of return on the hacker investment has proven to be a great motivator in the past.

6.3 Privacy

As the grid incorporates smart metering and load management, user and corporate privacy is
increasingly becoming an issue. Electricity use patterns could lead to disclosure of not only how
much energy customers use but also when they’re at home, at work, or traveling. When at home,
it might even be possible to deduce information about specific activities (for example, sleeping
versus watching television). It might also be possible to discover what types of appliances and
devices are present by compromising either the customer’s home area network or the AMR
network. Also, increases in power draw might suggest changes in business operations. Such
energy-related information could support criminal targeting of homes or provide business
intelligence to competitors. Further research is needed in mitigating such threats.

6.4 Security Management Issues Complexity

The complexity and scale of future power systems that incorporate smart-grid concepts will
introduce many security challenges. Currently, a large utility communicates with thousands of

35
devices to manage the electrical grid. Both the volume of data and the number of devices with
which a utility communicates is likely to increase by several orders of magnitude. With these
larger networks, routine maintenance, managing trust, and monitoring for cyber intrusion
become challenges.

6.5 SOLUTION

The most effective solution for securing the Smart Grid will be based on Public Key
Infrastructure (PKI) technologies [10]. While PKI is complex, many of the items responsible for
the complexity can be significantly reduced by including the following five main technical
elements:

• PKI Standards
• Smart Grid PKI tools
• Device Attestation
• Trust Anchor Security
• Certificate Attributes

6.5.1 Smart Grid PKI Standards

PKI is a powerful tool that can be used to provide secure authentication and authorization
for Security Association (SA) and key establishment. They provide a mechanism for defining
naming conventions, certificate constraints, and certificate policies, but they do not specify how
these should be used. These standards rightfully leave these details to the organizations
implementing the PKI. Therefore the development of PKI standards for use by the critical
infrastructure industry is proposed.

The standards would be used to establish requirements on the PKI operations of energy
service providers (e.g. utilities, generators, etc) as well as Smart Grid device manufacturers.

36
Standards could include such items as acceptable security policies (e.g. PKI certificate policies
used for issuing each type of certificate in the system), certificate formats, and PKI practices.

6.5.2 Smart Grid PKI Tools

Even with the above standards, Smart Grid operators would have to familiarize themselves
with PKI concepts, terminology, risks, best practices and the above mentioned standards. This is
not likely to provide a cost-effective solution. However, given such a set of standards, it would
be possible for vendors to develop Smart Grid PKI Tools which are based on these standards.

Such tools would greatly ease the process of managing the PKI components needed to
support the Smart Grid application. These tools will be knowledgeable of the appropriate Smart
Grid certificate policy and certificate format standards, and will be used to programmatically
enforce compliance to those standards. Such tools will enhance interoperability, reduce the
burden of running the PKI, and ensure that appropriate security requirements are adhered to. The
tools could both automate and enforce the appropriate requirements for each PKI operation such
as vetting certificate signing requests (CSR), or certificate revocation.

For example, the tools would know the different requirements for handling CSRs for human
system administrators. The tools would aid with system deployment, PKI operations, and system
auditing, all in accordance with the standard model policy. Most importantly, these tools will
eliminate the need for symmetric key configuration, which is an inherently insecure and
expensive process.

6.5.3 Device Attestation


An enhanced security function is device attestation. Device attestation techniques provide a
method to securely ascertain if a device has been tampered with, as well as the true identity of a
device (prior to any on-site provisioning). With device attestation techniques, accredited
manufacturers can factory-install device attestation certificates in each Smart Grid device.

37
These device attestation certificates are used only to assert the device manufacturer, model,
serial number, and that the device has not been tampered with. These certificates coupled with
the appropriate authentication protocol can be used by the energy service provider to ensure that
the device is exactly what it claims to be. In order to support device attestation, the device will
need a FIPS 140 hardware security module (HSM), and will need high assurance boot (HAB)
functionality.

6.5.4 Trust Anchor Security

One major component of a secure PKI enabled system is the requirement that each relying
party (RP) (any device that uses the certificate of a second party to authenticate the second party)
must have secure methods to load and store the root of trust or trust anchor (TA). The TA is
typically a Certificate Authority (CA) at the top of a CA hierarchy. Relying Parties trust
certificate holders because they trust the TA which trusts a CA which trusts the end certificate
holders.

This trust is evidenced by a chain of certificates rooted at the Trust Anchor. If an adversary
could change the root of trust for any RP, that RP could be easily compromised. The challenge
for the operator is to ensure that each secure device obtains the correct TA information.

One method to doing this without needing to preload the TA certificate into every device is
as follows. Each accredited manufacture will preload the device with a Manufactures certificate
identifying the make, model and serial number of the device, and a “pre-provisioned TA
Certificate. After a Smart Grid operator purchases a Smart Grid device, the manufacturer would
issue the operator a TA Transfer Certificate, which would instruct the device to accept the
operator’s root CA certificate as the new trust anchor, and only the operator’s root CA
certificate. The TA Transfer Certificate would be constrained to specific devices (based on serial
number).

38
In addition to secure TA management, each PKI enabled Smart Grid device should have the
ability to securely load and store a local policy database (LPD). This local policy database is a
set of rules that define how the device can use its certificate, and what types of certificates it
should accept when acting as an RP. The LPD would be a signed object, stored in the HSM, and
signed by a Policy Signing server trusted by the TA. It would be possible for the same PKI tools
to automate the management of the LPD as the TA certificate.

6.5.5 Certificate Attributes

In order for portions of the Smart Grid to continue to function while major portions of the
grid infrastructure are unreachable, it will be essential for Smart Grid devices to be able to
authenticate and determine the authorization status for each other (as well as human system
administrators) without the need to reach a back-end security server.

In order to do this, two additional capabilities would be required. First, Smart Grid
certificates will require policy attributes to indicate the applicability of the certificate to a given
application. Second, a local source of performing certificate status will be required. This can be
accomplished in a number of ways.
For example, it would not be difficult or costly to distribute local certificate status servers
throughout the grid. A possibly better method involves having each certificate subject
periodically obtain a signed certificate status for his own certificate. The certificate subject
would store this status and provide it to an RP when authenticating to the RP. The RP would
determine, based on local policy, if this status was new enough to accept, and if so, the
associated certificate could then be evaluated.

It would also be recommended that all certificate subjects were loaded with the chain of
certificates between themselves and their TA, and select chains of certificates between the
subject’s TA and the TAs of other agencies with which the local agency has cross-signed or
otherwise trusts. Management of theses chains of certificates, and ensuring that devices receive
the proper set, would again be automated by tools.

39
CHAPTER-7
RELIABILITY

Renewable resources, while supplementing the generation capability of the grid and
addressing some environmental concerns, aggravate the reliability due to their volatility.
Demand response and electric storage resources are necessary for addressing economics of the
grid and are perceived to support grid reliability through mitigating peak demand and load
variability. Electric transportation resources are deemed helpful to meeting environmental targets
and can be used to mitigate load variability. Balancing the diversity of the characteristics of these
resource types presents challenges in maintaining grid reliability [7].

Reliability has always been in the forefront of power grid design and operation due to the
cost of outages to customers. In the US, the annual cost of outages in 2002 is estimated to be in
the order of $79B [5] which equals to about a third of the total electricity retail revenue of $249B
[6]. A similar estimate based on 2008 retail revenue would be of the order of $109B. Much
higher estimates have been reported by others. The reliability issues in modern power grids are
becoming increasingly more challenging. Factors contributing to the challenges include:

 Aggravated grid congestion, driven by uncertainty, diversity and distribution of energy


supplies due to environmental and sustainability concerns. The power flow patterns in
real-time can be significantly different from those considered in the design or off-line
analyses.

 More numerous, larger transfers over longer distances increasing volatility and reducing
reliability margins. This phenomenon is aggravated by energy markets.

 The grid being operated at its “edge” in more locations and more often because of:
 Insufficient investment and limited rights of way

40
 Increasing energy consumption and peak demand creating contention for limited
transfer capability
 Aging infrastructure
 Maximizing asset utilization driven by modern tools for monitoring, analyzing and
control

 Consolidation of operating entities giving rise to a larger “foot print” with more complex
problems and requiring smaller error margins and shorter decision times. This problem
may be aggravated by depletion of experienced personnel due to retirement, etc.

7.1 DISTRIBUTION MANAGEMENT FUNCTIONS


The reliability problem also arises due to faults occurring in the system. A set of advanced
automation functions [8] is developed to combat this problem. These new distribution
management functions can be summarized as follows:

7.1.1 The Fault Diagnosis and Alarm Processing Function:


This function is automatically triggered immediately after the occurrence of a fault. It
produces a diagnosis of events on the basis of a set of pre-defined scenarios (a comparison of the
remote information flow is made with the patterns predefined by experienced operators). The
diagnosis produces an analysis of the type of fault enabling the operator to quickly understand
what happened in the network under its control. The function can also detect missing remote
control signals.

7.1.2 The Fault Location Function:


After detecting and analyzing the fault, it is necessary to find the location of the fault. The
goal of this function is to quickly determine the section of the feeder where the fault occurred.
This is performed by analyzing the information sent from fault indicators to the control center.
Operators can then intervene and isolate the fault area by remotely opening the corresponding
switches. The degree of accuracy depends on the density of fault indicators on the MV network.

41
7.1.3 The Service Restoration Function:
After locating the fault, this function finds all the plans allowing power restoration to lost
customers of the non-faulted section of the feeder while considering technical constraints. Each
plan consists of a series of actions, (opening/closing of switching devices) leading to power
restoration.

42
CONCLUSION

With the increasing world population, thereby increasing demand, and depleting resources
the need to be ‘smart’ and efficient in our energy usage has become an imperative.
Implementation of Smart Grid concept would go a long way in solving many of the present
energy issues and problems. The whole network needs to be upgraded to meet the requirements
i.e. at transmission as well as distribution level. Researches are going on to find the optimal
solution and new technology to make all the desired characteristics possible.

Smart Meters, Smart Homes, Smart City and so on would constitute the Smart Grid. As the
new technologies would be invented and existing ones boosted up to meet the desired
specifications the Smart Grid would become a reality and change the whole energy pattern
throughout the world.

43
REFERENCES

[1] http://en.wikipedia.org/wiki/Smart_grid
[2] Koen Kok, Stamatis Karnouskos, David Nestle, Aris Dimeas, Anke Weidlich, Cor Warmer,
Philipp Strauss, Britta Buchholz, Stefan Drenkard, Nikos Hatziargyriou and Vali Lioliou, “Smart
Houses For A Smart Grid”, in 20th International Conference on Electricity Distribution Prague,
8-11 June 2009, CIRED2009 Session 4 Paper No 0751.
[3] S. Massoud Amin and Bruce F. Bollenberg, “Toward A Smart Grid” in IEEE Power and
Energy Magazine in September/October 2005.
[4] Robert C. Sonderegger, Debbie Henderson, Steven Bubb and Julie Steury, “Distributed Asset
Insight” in IEEE Power and Energy Magazine in may/june 2004.
[5] Arun Sehgal, “AMR offers multiple benefits” in Pipeline and Gas Technology in April/May
2005.
[6] Patrick McDaniel and Stephen McLaughlin , Pennsylvania State University, “Security and
Privacy Challenges in the Smart Grid” in IEEE Computer And Reliability Socities in May/June
2009.
[7] Khosrow Moslehi and Ranjit Kumar, “Smart Grid - A Reliability Perspective” submitted to
IEEE PES Conference on “Innovative Smart Grid Technologies” January 19-20, 2010, NIST
Conference Center, Washington, DC.
[8] Xavier Mamo, Sylvie Mallet, Thierry Coste and Sebastien Grenard, ” Distribution automation: the
cornerstone for Smart Grid development strategy” 978-1-4244-4241-6/09/$25.00 ©2009 IEEE.
[9] Himanshu Khurana, MarkHadley, Ning Lu, and DeborahA. Frincke, “Smart-Grid Security
Issues” in IEEE computer and reliability societies, 1540-7993/10/$26.00 © 2010 IEEE in
January/February 2010.
[10] Anthony R. Metke, Randy L. Ekl and Schaumburg, IL USA, “ Smart Grid Security Technology”
in 978-1-4244-6266-7/10/$26.00 ©2010 IEEE.

44

You might also like