A smart grid is different from a traditional power system in that it allows incorporation of intelligent features and functions, e.g., meter reading, adaptive demand response, integration of distributed energy sources, substation automation, etc. All these intelligent features and functions are achieved by choosing appropriate communication technologies and network structures for the smart grid appropriately.
The objective of this dissertation is to develop an AHP (analytic hierarchy process) - based strategy for demand curtailment allocation that is subject to communications and cyber security limitations. Specifically, it: (1) proposes an electrical demand curtailment allocation strategy to keep the balance between supply and demand in case of the sudden supply shortage; (2) simulates the operation of the proposed demand curtailment allocation strategy considering the impact from communication network limitations and simultaneous operations of multiple smart grid applications sharing the same communication network; and (3) analyzes the performance of the proposed demand curtailment allocation strategy when selected cyber security technologies are implemented. These are explained in more details below.
An AHP-based approach to electrical demand curtailment allocation management is proposed, which determines load reduction amounts at various segments of the network to maintain the balance between generation and demand. Appropriate communication technologies and the network topology are used to implement these load reduction amounts down to the end-user. In this proposed strategy, demand curtailment allocation is quantified taking into account the demand response potential and the load curtailment priority of each distribution substation. The proposed strategy helps allocate demand curtailment (MW) among distribution substations or feeders in an electric utility service area based on requirements of the central load dispatch center.
To determine how rapidly the proposed demand curtailment strategy can be implemented, the capability of the communication network supporting the demand curtailment implementation needs to be evaluated. To evaluate the capability of different communication technologies, selected communication technologies are compared in terms of their latency, throughput, reliability, power consumption and implementation costs. Since a number of smart grid applications share the same communication network, the performance of this communication network is also evaluated considering simultaneous operation of popular smart grid applications.
Lastly, limitations of using several cyber security technologies based on different encryption methods - 3EDS (Triple Data Encryption Standard), AES (Advanced Encryption Standard), Blowfish, etc. - in deploying the proposed demand curtailment allocation strategy are analyzed. / Ph. D. / With the rapid development of smart grid, the penetration of renewable energy resources is higher than ever and keeps growing. However, the output of such variable resources usually contains sudden and unpredictable changes. Therefore, maintaining grid operations has become a challenging task, especially with high percentage of renewable energy penetration.
A smart grid is different from a traditional power system in that it allows incorporation of intelligent features and functions, e.g., meter reading, adaptive demand response, integration of distributed energy sources, substation automation, etc. On the other hand, the proper operation of smart grid requires many different smart grid applications functioning in an organized manner. Functions of all these smart grid applications are made possible by two-way communication technologies and networks. Any uncertainty or failure of the communication system will affect the operation of the power system. To analyze electric power grid operations, it is necessary to take into account the integrated communication system.
To protect end-use customers’ privacy, a reliable and secure communication network is necessary. Applying cyber security technologies, such as encryption methods, to prevent adversary attacks can protect customers’ privacy and allow the smart grid to operate reliably. Nonetheless, implementing encryption methods require extra software and hardware which increase complexity of the system. In addition, the processing of encryption/decrption also extends the system latency. Especially, by using strict cyber security standards, the operation of smart grid application may be negated. However, some smart grid applications have strict demands on fast operation speed. Therefore, it is necessary to analyze the limitation of using encryption methods on the smart grid operation.
Identifer | oai:union.ndltd.org:VTETD/oai:vtechworks.lib.vt.edu:10919/74930 |
Date | 03 February 2017 |
Creators | Bian, Desong |
Contributors | Electrical and Computer Engineering, Rahman, Saifur, Silva, Luiz A., Ghandforoush, Parviz, Mili, Lamine M., Pipattanasomporn, Manisa |
Publisher | Virginia Tech |
Source Sets | Virginia Tech Theses and Dissertation |
Detected Language | English |
Type | Dissertation |
Format | ETD, application/pdf |
Rights | In Copyright, http://rightsstatements.org/vocab/InC/1.0/ |
Page generated in 0.0023 seconds