trustworthy technologies for local area management
play

Trustworthy Technologies for Local Area Management, Monitoring, and - PowerPoint PPT Presentation

Trustworthy Technologies for Local Area Management, Monitoring, and Control Tom Overbye Number of Activities: 5 2012 Industry Workshop October 30, 2012 | 1 TCIPG Technical Clusters and Threads Trustworthy Technologies Trustworthy


  1. Trustworthy Technologies for Local Area Management, Monitoring, and Control Tom Overbye Number of Activities: 5 2012 Industry Workshop October 30, 2012 | 1

  2. TCIPG Technical Clusters and Threads Trustworthy Technologies Trustworthy Technologies Responding To and for Wide Area Monitoring for Local Area Management, Trust Assessment Managing Cyber Events and Control Monitoring, and Control Design of Semi-automated Communication and Data Active Demand Management Intrusion Detection and Model-based Assessment Delivery Response Techniques (3 activities) (6 activities) (4 activities) (6 activities) Applications Distribution Networks Experiment-based Assessment (2 activities) (2 activities) (5 activities) Component Technologies (3 activities) | 2

  3. Cluster Overview • Cluster focuses on the distribution system and the end load • Adding more renewable, but less controllable generation, will require more participation by the electric load – Distributed generation may be embedded in “demand” – Demand could drastically change with new loads – New loads can have unexpected societal impacts • New distribution technologies promise better reliability – Cyber security of distributed devices is a growing concern | 3

  4. Cluster Problem Areas • Focus on issues associated with making the distribution system and load more known and/or controllable • Directly addresses many of the core issues associated with the “smart grid” 1 Transm issionBus 138 kV 1.00 pu – Traditionally, distribution 1.050 tap 1.050 tap A A 3.3 M W 3.2 M W MVA MVA -2.0 M var -1.6 M var 13.8 kV 3 2 and load have been viewed 1.060 pu 1.063 pu A A M VA MVA 1.060 pu 1.064 pu as relatively passive A 1.062 pu A 1.067 pu VA M MVA – Key smart grid premise is to A A VA M MVA 1.067 pu 1.062 pu A A make customers participants, VA M 1.069 pu 1.064 pu 1.064 pu 1.070 pu MVA A A M VA MVA providing information to help them optimize their electricity usage – Making the distribution and demand more “active” adds cyber security issues | 4

  5. Cluster Approach • Objective of the cluster is to better determine and solve the cyber security issues related to making for a more active distribution system and demand • Distribution Network Thread – Growing number of cyber enabled distribution system devices makes password management problematic • Active Demand Management Thread – As the load becomes more active, and potentially mobile, new opportunities and challenges are emerging | 5

  6. Activity Highlights • Password Changing Protocol • Large number of distributed devices make password management difficult; activity is investigating the use of authenticated hand held devices that then communicate securely to the pole mounted devices • Development of the Information Layer for the V2G Framework Implementation • Loss of fuel tax revenue is a key concern with a transition to electric vehicles (EVs); looking at security aspects of mileage-based tax collection using GPS systems | 6

  7. Activity Highlights • Trustworthy Framework for Mobile Smart Meters • Idea is meter is on EV with reporting to utility of amount charged, and utility providing the EV with pricing options; work is progressing on development of a basic obstacle- aware routing protocol • Control of distributed reactive resources • Distributed devices like EVs and PVs can provide reactive power; algorithms needed to determine the amount of information necessary to determine the appropriate power factor | 7

  8. Cluster Impact • Demonstration of the password changing framework between a laptop and an android phone to test performance • Specification of a basic reliable routing protocol titled Obstacle- Aware Cyber-Physical Routing for Vehicle-to-Infrastructure Communication • Assessment of past mileage-based data usage projects • Development of a localized control scheme to achieve a target household power factor using smart meters and a home monitoring and control system | 8

  9. Planned Research for Coming Year • Explore camera based authentication protocols. • Continue the assessment of previous EV studies, and develop a set of key requirements for the architecture and the data collection/processing aspects • Study the issues of reliable and secure communication and routing over heterogeneous networks (WiFi/cellular/ZigBee) • Move towards validation on distributed reactive resource control algorithms on the UIUC distribution network | 9

  10. Questions? | 10

Recommend


More recommend