Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Cryptography and Network Security
Sri Lanka Institute of Information Technology
CS457 – Introduction to Information Systems Security Cryptography 1b Elias Athanasopoulos
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Cryptographic Techniques Instructor: Jerry Gao Ph.D. San Jose State University URL: May,
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Applied Cryptography for Network Security
K. Salah1 Security Protocols in the Internet IPSec.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Network Security Sorina Persa Group 3250 Group 3250.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
How HTTPS Works J. David Giese. Hyper Text Transfer Protocol BrowserHTTP Server GET / HTTP/1.1 HOST: edge-effect.github.io HEADERS BODY HTTP/ OK.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Acknowledgements: William Stallings.William Stallings All rights Reserved Session 4 Public Key Cryptography (Part 2) Network Security Essentials Application.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
What Is Needed to Build a VPN? An existing network with servers and workstations Connection to the Internet VPN gateways (i.e., routers, PIX, ASA, VPN.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Karlstad University IP security Ge Zhang
ACM 511 Introduction to Computer Networks. Computer Networks.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
Network Security David Lazăr.
Cosc 513Presentation, Fall Network Security Student: Jianping He Student ID: Instructor: ProfessorAnvari Fall 2000.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 11 September 23, 2004.
Network Security Celia Li Computer Science and Engineering York University.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
K. Salah1 Security Protocols in the Internet IPSec.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
Network security Presentation AFZAAL AHMAD ABDUL RAZAQ AHMAD SHAKIR MUHAMMD ADNAN WEB SECURITY, THREADS & SSL.
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Network Security.
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Presentation transcript:

Generator Protection Needs in a DG Environment

Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring & Control Anti-islandingAnti-islanding CommunicationsCommunications

Conference on Distributed Generation Protection EPS Protection:EPS Protection:

Conference on Distributed Generation Protection Forward Power:Forward Power: Synchronous Induction Inverter

Conference on Distributed Generation Protection Phase Faults:Phase Faults: Synchronous Induction Inverter

Conference on Distributed Generation Protection Reverse Phase:Reverse Phase: Synchronous Induction Inverter

Conference on Distributed Generation Protection Abnormal Voltage & Frequency:Abnormal Voltage & Frequency: Synchronous Induction Inverter

Conference on Distributed Generation Protection System Ground Faults:System Ground Faults: Synchronous Induction Inverter

Conference on Distributed Generation Protection System Ground Faults:System Ground Faults: Synchronous Induction Inverter

Conference on Distributed Generation Protection DG Protection:DG Protection:

Conference on Distributed Generation Protection Stator Differential:Stator Differential: Synchronous Induction Inverter

Conference on Distributed Generation Protection Generator Unbalance:Generator Unbalance: Synchronous Induction Inverter

Conference on Distributed Generation Protection Loss of Excitation:Loss of Excitation: Synchronous Induction Inverter

Conference on Distributed Generation Protection Reverse Power:Reverse Power: Synchronous Induction Inverter

Conference on Distributed Generation Protection Generator Ground Faults:Generator Ground Faults: Synchronous Induction Inverter

Conference on Distributed Generation Protection Over-Excitation:Over-Excitation: Synchronous Induction Inverter

Conference on Distributed Generation Protection Synch-Check:Synch-Check: Synchronous Induction Inverter

Conference on Distributed Generation Monitoring Metering –Voltage –Current –Real/Reactive Power –Energy Power Quality –Voltage & Current Harmonics –Power Quality Statistics Status –Breaker Position –Sequence of Events Oscillography/Data Logger

Conference on Distributed Generation Control Local Interface –Easy access to protection settings. –Display of voltage, current, energy, power factor. –Display of protection target information, breaker and disconnect status. –Control actions such as manual trip & close. Programmable Functionality –Interlocking –Auto-synchronizing –Auto-restoration

Conference on Distributed Generation Control Local Interface –Easy access to protection settings. –Display of voltage, current, energy, power factor. –Display of protection target information, breaker and disconnect status. –Control actions such as manual trip & close. Programmable Functionality –Interlocking –Auto-synchronizing –Auto-restoration

Conference on Distributed Generation Summary Due to the variety of possible implementations of distributed generation, a broad array of protective elements may be required. In addition to protection there is an opportunity to integrate a host of additional functions.

Conference on Distributed Generation Anti-islanding Survey of Methods

Conference on Distributed Generation Anti-Islanding (Passive) OF/UF, OV/UV: Advantages Applicable to conventional DGs Disadvantages Tripping time may be long for small mismatch Fails when P+jQ = 0

Conference on Distributed Generation Anti-Islanding (Passive) Voltage Vector Jump: Advantages Can operate more quickly than voltage/frequency protection Secure for single phase faults Applicable to conventional DGs Disadvantages Can be difficult to set Fails when P+jQ = 0

Conference on Distributed Generation Anti-Islanding (Passive) Rate of Change of Frequency: Advantages Can operate more quickly than voltage/frequency protection Applicable to conventional DGs Disadvantages May be difficult to reliably discriminate between an islanding event and a system disturbance. Fails when P+jQ = 0

Conference on Distributed Generation Anti-Islanding (Passive) Rate of Change of Power: Advantages Can operate more quickly than voltage/frequency protection Stable for single phase faults Applicable to conventional DGs Disadvantages Fails when P+jQ = 0

Conference on Distributed Generation Anti-Islanding (Passive) Rate of Change of Voltage & Change in PF: Advantages Can operate more quickly than voltage/frequency protection Stable for system disturbances Applicable to conventional DGs Disadvantages Fails when P+jQ = 0

Conference on Distributed Generation Anti-Islanding (Passive) Voltage Harmonic Monitoring:Voltage Harmonic Monitoring: Advantages Can operate when P+jQ = 0 Disadvantages Load may filter the harmonic content Could be affected by transient phenomenon Only applicable for inverter-based DGs

Conference on Distributed Generation Anti-Islanding (Active) High Frequency Signal:High Frequency Signal: Advantages Can operate when P+jQ = 0 Disadvantages Requires the installation of a transmitter into the EPS. High frequency signals can be attenuated by series inductance. Impacts power quality.

Conference on Distributed Generation Anti-Islanding (Active) Impedance Switching:Impedance Switching: Advantages Can operate when P+jQ = 0 Applicable to conventional DGs Disadvantages May impact on power quality Multiple units require synchronized switching

Conference on Distributed Generation Anti-Islanding (Active) Assymetrical Waveform:Assymetrical Waveform: I Advantages Can operate when P+jQ = 0 Disadvantages Only applicable for inverter-based DGs

Conference on Distributed Generation Anti-Islanding (Active) Active Frequency Drift - Sandia Frequency Shift :Active Frequency Drift - Sandia Frequency Shift : I Advantages Can operate when P+jQ = 0 Disadvantages Only applicable for inverter-based DGs

Conference on Distributed Generation Anti-Islanding (Active) Impedance Insertion:Impedance Insertion: Advantages Can operate when P+jQ = 0 Applicable to conventional DGs No impact on power quality Disadvantages Coordinated operation of breaker and impedance switch An impedance bank must be located at all locations where an island can occur

Conference on Distributed Generation Anti-Islanding (Active) Comparison of Rate of Change of Frequency:Comparison of Rate of Change of Frequency: Advantages More secure than ROCOF Applicable to conventional DGs Disadvantages Requires communication channel Fails when P+jQ = 0

Conference on Distributed Generation Anti-Islanding (Active) Power Line Carrier:Power Line Carrier: Advantages Can operate when P+jQ = 0 Applicable to conventional DGs No impact on power quality Disadvantages Requires installation of transmitter and receiver equipment. Transmitter must be very reliable May mal-operate during a system fault

Conference on Distributed Generation Summary Most passive schemes cannot guarantee fast operation as the power flow across the breaker approaches zero. Many active schemes can quickly detect an island even when the power flow through the breaker is zero prior to islanding. Of the these schemes several are applicable only for inverter-based DGs. The remaining schemes have power quality or security issues. Areas For further study How is the security of these schemes impacted as the penetration of DG increases? How is the dependability of these schemes impacted as the penetration of DG increase? How do each of the schemes impact on power quality as the penetration of DG increases?

Conference on Distributed Generation Communications Advantages: Secure Reliable Disadvantages: Expensive to build and maintain. Vertically integrated (not well suited for sharing of information).

Conference on Distributed Generation Internet Topology

Conference on Distributed Generation IPSec IPSec is a set of open standard protocols designed to address the following security issues: Confidentiality - Prevents unauthorized access to information as it is transferred across a public data network. Authenticity - Confirms the identity of the sender and receiver of the information. Integrity - Checks that information has not been altered during transmission Anti-playback - Ensures that a data transaction is only carried out once unless there is authorization for retransmission.

Conference on Distributed Generation VPN Tunnel Authentication using pre-shared keys or public key cryptography Agreement on encryption algorithms Generation of Session Keys

Conference on Distributed Generation Integrity A hash function can also be used to verify that a message has not changed while in transit from X to Y. A checksum of the message is created by X. This message is appended to the message. Both the message and the checksum are sent to Y. Y now takes the message and puts it into the same hash function. If the checksums agree then the message has not been altered.

Conference on Distributed Generation Anti-replay Protection from resent messages can be obtained by attaching a sequence number to each transmitted message. After the message is sent, the sequence counter is incremented. At the receiving end, the sequence number is compared with the sequence counter. If the values do not agree then the message is rejected.

Conference on Distributed Generation Complete Sequence

Conference on Distributed Generation Summary A VPN can provide a secure method of connecting DGs to DG stakeholders over the internet. IPSec specifically addresses the issues of authentication of users, integrity of data, anti- replay, and confidentiality. IPSec is an open framework which utilizes public domain algorithms that have withstood the test of time.

Conference on Distributed Generation Conclusions The overall cost effectiveness of a DG implementation will be increased by integrating more functionality into the DG IED. Further investigation is warranted to compare the effectiveness of anti-islanding methods for various system topologies and operating conditions. The communication capabilities of the DG IED should support the application of new networking strategies.

Conference on Distributed Generation Internet Key Exchange (Diffie-Hellman) Peer X Peer Y Peers X and Y agrees on two integers A and B A = 22 A = 22 B = 19 B = 19 X and Y each generate a Pseudo-random number i = 7 j = 8 I and J are created using A and B I = A i mod B J = A j mod B I = 22 7 mod 19 I and J are exchanged J = 22 8 mod 19 I = 2 J = 6 K1 = J i mod B K2 = I j mod B K1 = 6 7 mod B K2 = 2 8 mod 19 K1 = 5 K2 = 5 K1=K2 - these may now be used as session keys

Conference on Distributed Generation Authentication Pre-shared Keys Public Key Encryptyion Digital Signatures

Conference on Distributed Generation Authentication using Public Key Encryption (RSA) Choose two large prime numbers P & Q P = 7Q=11 Calculate N &  : Choose E such that 1 < E < N and E and  are relatively prime: (Relatively prime means that E and  have no prime factors in common) E = 7 The factors of  are 1,2,3,4,5,6,10,12,15,20,30, and 60. The factors of E are 1, 7 Find D such that D  E - 1 is evenly divisible by . The public key pair is (E,N) or (7,77) The private key pair is (D,N) or (43,77)

Conference on Distributed Generation Authentication using Public Key Encryption (RSA) The algorithm for encryption is C=T E mod N Where T is the plain text The algorithm for decryption is T=C D mod N Where C is the cipher text If Peer X wants to authenticate Peer Y, X encrypts a message with Y’s public key and sends the encrypted message to Y. If Y can successfully decrypt the message then Y proves he is the owner of the private key.

Conference on Distributed Generation Authentication using Pre-shared Keys If Peer X wants to authenticate Peer Y, X creates a checksum using the pre-shared key and sends the checksum to Y. If Y can successfully reproduce the same checksum then Y proves he has the same key.

Conference on Distributed Generation Secure Hash Function Properties Input can be any length Output is a fixed length It is relatively easy to compute the checksum The function is one-way The function is collision free

Conference on Distributed Generation Encryption