SlideShare a Scribd company logo
1 of 85
SMART METERING AND 
CONTROL OF TRANSMISSION 
SYSTEM 
BY 
M.SAI MANOBHIRAM 
G.DURGA RAO 
D.MOHITH
“Smart Grids” 
“A smart grid uses digital technology to 
improve reliability, security, and efficiency 
(both economic and energy) of the electric 
system from large generation, through the 
delivery systems to electricity consumers and a 
growing number of distributed-generation and 
storage resources.”
Characteristics of Smart Grid 
 Self-healing 
 Motivates and includes the consumer 
 Increases power quality 
 Accommodates all generation and storage 
options 
 Enables electrical markets 
 Optimizes assets and operates efficiently
SMART GRID vs EXISTING SYSTEM 
Existing 
• Not self healing 
• Does not allow integration of 
sources 
• Real time data is not available 
• Slow and manual 
• Mostly involves analog functions 
smart grid 
• Self healing 
• Smart grid is designed 
to integrate sources 
• Real time data is 
available 
• Fast and automatic 
• A complete digital 
system
SMART GRID INCLUDES: 
• Integrated communications 
• Sensing and measurement 
• Smart meters 
• Superconductive wires 
• Storage devices 
• Wireless communication
ADVANTAGES OF SMART GRID 
TECHNOLOGY: 
• Peak Leveling 
• Self-Healing 
• More Reliable Power 
• More Efficient Renewable Power 
• A Cleaner Mix of Energy Sources 
• Reducing our carbon Footprints
Disadvantages of smart grid 
technology: 
 Security and privacy cost. 
 Two way communications can be 
hacked. 
Technology components are expensive. 
 Present Infrastructure is inadequate and 
requires augmentation to support the 
growth of Smart Grids.
Challenges in adopting smart grid: 
 Costly 
 Complicated structure 
 Gain control of meters 
 Security and privacy 
 Hacker 
 Power theft
Smart Metering Infrastructure 
SMI is the totality of the systems and networks that 
are used to measure, collect, store, analyse, and 
use energy usage data. 
In other words, SMI includes smart meters and all 
other infrastructure components—hardware, 
software, and communication networks that are 
needed to offer advanced capabilities.
 A typical SMI network employs a two-way 
communication system and smart metering 
technology. 
 SMI also uses the same system equipment to 
send information back through the network to 
meters to capture additional data, control the 
meters, or update the meters’ firmware.
Major System components of SMI 
 A SMI system is comprised of a number of 
technologies and applications that have been 
integrated into one solution. The four major SMI 
components are: 
• Smart meters 
• Communication system 
• Meter data management systems (MDMS) 
• Home area networks (HAN)
Smart Meters 
 The measurements from both electromechanical meters 
and non-smart digital meters are collected manually by 
physical site visits and, thus, record only the readings at 
the time of the visit. 
 Smart meters are intelligent, solid-state, programmable 
devices that can perform many functions beyond 
energy consumption recordings. 
 By using built-in memories, smart meters can record and 
store readings at present intervals (e.g., 15 min, 30 min, or 
hourly) and prescheduled times.
 Typical smart meter functionalities include the following: 
i. Record interval (daily, hourly, or sub hourly) energy 
consumption and demand data 
ii. Provide bidirectional metering, which will 
accommodate distributed generations at customer 
sites 
iii. Provide notification on loss of power and service 
restoration 
iv. Provide tamper alarms and enable theft detection 
v. Provide voltage measurement, voltage alarms, and 
power quality monitoring
 Enable TOU rate billing 
 Protect meter data security 
 Communicate and interact with intelligent appliances or 
devices in a customer’s locality
Smart Meter Communications 
 Smart Meter communicates with the base station or the 
control centre on a bi-directional mode. 
 Some of the important channels that are available in 
India for communication are: GSM, Wi-Fi, PLCC, PSTN,etc 
 The type of communication available depends severely 
on the geographic location. Thus the communication 
mode used should be a combination of available 
options. 
 Here we present a brief description of technology and 
viability in Indian context.
PLCC 
 PLCC – Power Line Carrier Communication. 
 As the name indicates PLCC associates the use of power 
conductor for communication by imposing a modulated 
carrier frequency signal over them. 
 They are the prime modes of communication between 
substation in power sector. 
 The carrier signal degrades gradually along the length of 
the line. So public repeaters are used which improve the 
strength of the signal by demodulation and re-modulation
Zigbee 
 Zigbee is the only standard based wireless technology 
designed to address the unique needs of low cost low 
power wireless sensor and control networks. 
 The technology specified by short distance data 
transmission. 
 It operates in the region of 2.4GHz 
 This bandwidth is enough for the implementation of SMI 
and home automation 
 It is faster response than any other type of 
communication
 It can be made to work in 3 modes 
 Coordinator: It forms the basic root of the system. It has 
the capability to communicate with any other node 
connected to network. It can even acts as a bridge 
between two networks. 
 Router: As the name indicates it indicates like a route 
decider. It routes the data based on address information 
received and pass it to respective destination 
 End Device: It has very limited functionality of just 
communicating with the network co-ordinator.
Wi-Fi 
 Operating in the unlicensed 2.4GHz ISM band. 
 It involves broadcast and reception of data through 
radio signals in an encrypted format and its advantage 
is it cut the cost of the cables. 
 The main advantage of this over Zigbee is it can be used 
for the communications over the range of 1-10KM
Proposed Communication 
architecture 
 Nodes 1-7 represent the customers or the meters associated 
with them. 
 The nodes or meters are connected to main module placed 
at distribution transformer through Zigbee 
 As the ordinary meter transmits data of nearly 34MB per 
month. Based on memory it transfers it will be charged. 
 As the range of Zigbee is less the distance between 
Distribution transformer and nearest residential customer 
ranges from 10-50m 
 The data collected at various distribution trsnformer is sent to 
its parent substation through WiFi network as the distance 
varies from 1-10KM
 The backbone of the Smart Grid will be its network. 
 This network will connect the different components of the Smart Grid 
together, and allow two-way communication between them. 
 Net- working the components together will introduce security risks 
into the system. 
 The number of entry points that can be used to gain access to the 
electrical power system will increase when all of the components 
are networked together.
Cyber security 
 Cyber security is a concept that has become increasingly prevalent 
with the development of the smart grid technology with the 
increased use of digital information and controls technology to 
improve reliability, security, efficiency of the electric grid and the 
deployment of smart technologies (real - time, automated, 
interactive technologies that optimize the physical operation of 
appliances and consumer devices) for metering, communications 
concerning grid operations and status, and distribution automation.
Problems Occurred Due to Lack Of 
Cyber Security 
 In 2001, hackers penetrated the California Independent System Operator, which 
oversees most of the State’s electricity transmission grid; attacks were routed 
through California, Oklahoma, and China. 
 Ohio’s Davis-Besse (Oak Harbor, Ohio, the United States )nuclear power plant 
safety monitoring system was offline for five (5) hours due to the Slammer worm 
in January 2003. 
 In March 2005, security consultants within the electric industry reported that 
hackers were targeting the U.S. electric power grid and had gained access to 
U.S. utilities electronic control systems. 
 In April 2009, the Wall Street Journal reported that spies hacked into the U.S. 
electric grid and left behind computer programs that could allow them to 
disrupt service. Associated Press on August 4, 2010 reported “Hackers Try to Take 
overPower Plants.” In September 2010, cyber experts discovered for the first time 
a malicious computer code, called a worm, specifically created to take over 
systems that control the inner workings of industrial plants.
Worm 
 A worm is a small piece of software that uses security holes within 
networks to replicate itself. The worm scans the network for another 
computer that has a specific security hole. It copies itself to the new 
machine exploiting the security hole, and then starts replicating 
from that system as well. Once infected, the worm may send itself to 
everyone in your address book. Using a network in this manner, 
worms expand extremely quickly. The greatest danger from worms is 
that they will eventually use all the memory available to a computer 
or a network.
 The Stuxnet Worm was reported in an Industrial Control Systems 
Cyber Emergency Response Team Advisory on September 29, 2010. 
Stuxnet is a Malware Targeting Siemens Control Software. It can be 
used to infiltrate industrial control systems used in the power grid, 
power plants and other infrastructure. It is reported to have the 
ability to damage or possibly destroy control systems. 
 The North American Electric Reliability Corporation (NERC) and 
DOE released a report titled High-Impact, Low-Frequency Event Risk 
to the North American Bulk Power System (June 2, 2010)16 that 
identifies a certain class of high-impact, low-frequency risk shown to 
have the potential to significantly affect the reliability of the North 
American bulk power system..
 Cyber Security includes 
 Availability 
 Integrity 
 Confidentiality
Availability 
 Availability refers to ensuring timely and reliable access to 
information, which is the primary security goal of a smart-grid 
metering and control system. Malicious attacks targeting availability 
can be considered as denial-of-service attacks, which intend to 
delay, block, or even corrupt the communication in the system.
 The jamming attack is able to defer the transmission of messages 
and to distort the transmitted data signal. As a result, the legitimate 
receiver cannot recover messages out of the damaged data 
packets. 
 On the other hand, many man-in-the-middle attacks can be 
launched only when the full or partial communication channels can 
be jammed.
Integrity 
 Integrity refers to preventing or detecting the modification or 
destruction of information by unauthorized persons or systems. 
Malicious attacks targeting the integrity of a smart grid attempt to 
stealthily manipulate critical data such as meter readings, billing 
information, or control commands 
 Integrity protection can be achieved by authentication, 
certification, and attestation
Confidentiality 
 Confidentiality refers to protecting personal privacy and proprietary 
information from unauthorized access. Malicious attacks targeting 
confidentiality aim at obtaining desirable information(e.g., power 
usage, customer’s account information). 
 An emerging trend is for the smart meters to aggregate usage data 
for billing purposes and support load-balancing and other 
monitoring functions through peer-to-peer protocols that preserve 
the consumer’s privacy.
Cyber Solutions 
 Data encrypton 
 Authentication 
 Digital signatures
Data Encryption 
 Cryptography 
 Cryptography has been the most widely used 
technique to protect information from 
adversaries. A message to be protected is 
transformed using a Key that is only known to the 
Sender and Receiver. The process of 
transformation is called encryption and the 
message to be encrypted is called Plain text. 
The transformed or encrypted message is called 
Cipher text. At the Receiver, the encrypted 
message is decrypted.
Substitution cipher 
Transposition cipher
Authentication 
 Authentication is required to verify the identities of communicating 
parties to avoid imposters gaining access to information.
Digital Signatures 
A digital signature allows the signing of digital messages by the Sender 
in such a way that: 
 1. The Receiver can verify the claimed identity of the Sender 
(authentication). 
 2. The Receiver can prove and the Sender cannot deny that the 
message has been sent by the specific user (non-repudiation). 
 3. The Receiver cannot modify the message and claim that the 
modified message is the one that was received from the Sender
 Cyber solutions (academic) 
 An experimental study about the performance of a symmetric-key 
cipher (i.e., DES-CBC) and a public-key cipher (i.e., RSA) on an 
intelligent electronic device (IED) called TS7250 has been 
conducted (Wang and Lu, 2013), where the IED is used for sending 
the transformer status and receiving commands from the control 
centre.
 These experimental results show that the computational ability of an 
IED becomes a bottleneck for the delay performance when 
performing asymmetric-key cryptography 
 Due to the limited computational capabilities of devices, stringent 
timing requirements, and high data-sampling rates in the smart grid, 
traditional authentication schemes might not be applicable.
 Universal Key:The heterogeneous communication architecture of 
the smart grid has made the key management particularly 
challenging, and it is not practical to design a universal key-management 
scheme for the entire smart grid.
Authentication Security 
 Authentication is crucial to protect the integrity of data and devices 
in the smart grid. 
 A number of authentication schemes have been proposed in the 
literature for smart grids. Szilagyi and Koopman (2009 and 2010) 
proposed flexible and low-cost multicast authentication schemes for 
embedded control systems
 The basic idea is to verify truncated message authentication codes 
(MACs) across multiple packets, thereby achieving a good trade-off 
among authentication cost, delay performance, and tolerance to 
attacks. 
 Although many encryption, authentication, and key-management 
schemes have been proposed, their performance does not seem to 
fulfill the stringent timing requirements of the smart grid. Therefore, 
fine-grained and advanced security protocols still need to be 
developed for protecting different communication networks in 
smart grids.
MACs 
 Imagine that you are communicating with your friend through a 
chat client. How will your friend's machine know that the message 
he received is exactly the same message that you send?. And how 
will he verify that the message was not altered in the middle. 
 Even after implementing a secure authentication and data 
encryption, integrity of the message needs to be versified, to 
confirm, that the data was not tampered in the middle.
 In communication everything send over wire is data. So the thing 
that will give the sender and the receiver the assurance, of 
untampered data is also a small fixed length data called 
MAC(Message authentication code).
Confidentiality Security 
 In a smart grid, the utility company needs the real-time power-consumption 
data for planning purposes as well as for providing 
accurate and authentic billing. For the utility company, the 
correctness of the calculated bills is the most important issue 
 Researchers have designed privacy-preserving billing protocols 
using advanced cryptographic techniques such as zero-knowledge 
proof and homomorphic encryption
Zero-knowledge proof 
 If proving the statement requires knowledge of some secret 
information on the part of the prover, the definition implies that the 
verifier will not be able to prove the statement in turn to anyone 
else, since the verifier does not possess the secret information.
Homomorphic Encryption 
 Homomorphic encryption is a form of encryption which allows 
specific types of computations to be carried out on ciphertext and 
generate an encrypted result which, when decrypted, matches the 
result of operations performed on the plaintext. 
 This is a desirable feature in modern communication system 
architectures. Homomorphic encryption would allow the chaining 
together of different services without exposing the data to each of 
those services, for example a chain of different services from 
different companies could 1) calculate the tax 2) the currency 
exchange rate 3) shipping, on a transaction without exposing the 
unencrypted data to each of those services.[
 Using those advanced cryptographic techniques, utility companies 
only receive the commitments of the real-time power consumption 
instead of the raw data from smart meters, and customers can 
prove to the utility company that a utility bill has been correctly 
generated 
 However, from the customer’s perspective, privacy is the main 
concern.
 Garcia and Jacobs (2012) proposed the use of homomorphic 
encryption to prevent the utility company from accessing the power 
consumption data of individual households. Using those advanced 
cryptographic techniques, utility companies only receive the 
commitments of the real-time power consumption instead of the 
raw data from smart meters, and customers can prove to the utility 
company that a utility bill has been correctly generated
SELF HEALING
What is Self Healing?? 
 SELF-HEALING of power delivery systems is a concept that enables 
the identification and isolation of faulted system components and 
the restoration of service to customers supplied by healthy elements. 
 Self-healing of power distribution systems is conducted via 
Distribution Automation (DA), specifically through smart protective 
and switching devices that minimize the number of interrupted 
customers during contingency conditions by automatically isolating 
faulted components and transferring customers to an optional 
source when their normal supply has been lost. 
 Distribution Automation: Distribution Automation (DA) is a set of 
technologies that enable an electric utility to monitor, coordinate, 
and operate distribution components in a real-time mode from 
remote locations.
An illustration of self healing 
 Automatic fail over scheme for transmission fault 
 so that if one supply line fails, the customers supplied via that circuit are quickly 
transferred to the backup source by automatic failover control circuitry. 
 The limitation is while switching the load from second line to first line, the we 
need to check supply should be greater than load
 There are several additional practical aspects that need to be 
considered when implementing self-restoration, besides the DA 
system architecture it is necessary to consider loading ratings and 
voltage limits, since transferring load to a highly loaded and long 
feeder may end up generating power quality complaints (low 
voltage in this case),
FLISR an application of Distribution 
Automation 
 The smart grid concept is driving the implementation of a series of self-restoration 
schemes in the form of DA applications. The most popular of these is 
FLISR, which consists of the utilization of advanced protective and switching 
devices to automatically locate and isolate faulted feeder sections and restore 
the maximum number of customers possible located on healthy sections. 
 FLISR benefits include 
 Improve SAIDI, SAIFI, and other reliability statistics 
 Reduce “energy not supplied” (kWh) 
 Reduce fault investigation time 
 Provide “premium quality” service 
Monetary benefits: 
 Reduce customer cost of outage 
 Increase revenue (sell more energy)
Advantages of implementing FLISR 
 the advantages of implementing FLISR versus conventional 
operation for a typical distribution feeder when conventional 
operation (without FLISR) 
 there is a need for investigating the specific fault location and 
conducting manual switching to isolate the faulted area and restore 
service to customers located on healthy feeder sections. 
 Here customer trouble call may play an important role. 
 FLISR on the other side allows detecting faults and restoring affected 
customers faster and with limited human intervention. 
 When FLISR is used power is quickly restored to customers located on 
healthy sections of a feeder.
The overall objective of this approach is to identify those locations and 
combinations of devices that attain the greatest cost-benefit ratio.
RENEWABLE 
RESOURCES
 The key goal of smart grid is to promote active customer 
participation and decision making as well as to create the 
operation environment in which both utilities and electricity users 
influence each other. 
 In smart grids, users can influence utilities by adding distributed 
generation sources such as photovoltaic (PV) modules or energy 
storage at the point of use, and reacting pricing signals.
SMART GRID RENEWABLE ENERGY 
SYSTEM 
 The electricity grid to accommodate higher percentage of 
renewable energy would need large quantities of conventional 
back up power and huge energy storage. 
 Smart grid technologies and concepts reduce barriers to the 
integration of renewable resources and allow power grids to support 
a greater percentage of variable renewable resources.
 Enabling smart grid technology, such as distributed storage, 
demand response, advanced sensing, control software, information 
infrastructure, and market signals, increases the ability to influence 
and balance supply and demand. 
 With smart grid technology, grid operators can better coordinate 
and control the system in response to grid conditions, thus allowing 
integration of increasingly greater levels of renewable resources 
more effectively and at lower cost.
 Advanced Metering Instrument (AMI) and internet-based services 
engage demand response and distributed storage to 
accommodate higher penetration and cost-effective integration of 
renewable energy generation. 
 Advanced and automated integration systems, such as inverters 
and converters with communications software interfaces, enable 
distributed management and application integration for renewable 
generation.
SOLAR PV DESIGNS FOR SMART GRID 
INTEGRATION 
 A typical solar PV should provide two-way flows of power and 
communication between the smart grid and the solar PV system. 
 Three solar PV inverters are available which are the string, the 
central and the newly developed micro inverter, known also as 
integrated AC module inverter.
CENTRAL INVERTERS: 
 The conventional solar PV installations feed DC voltage to a central inverter for 
conditioning and distribution locally or across the power grid. 
 The DC voltage carried through the array to the 
central inverter may have significant fire and safety 
hazards, leading to increased costs for cabling and, 
in turn, higher costs for installation and 
maintenance.
STRING INVERTERS 
 string inverters eliminate the need for a central inverter 
by providing DC-AC conversion at the output of 
each string.
MICRO INVERTERS: 
 Recent researches focus on micro inverters 
which take the concept of string inverters to the 
next level - providing DC-AC conversion from 
each individual panel rather than an entire string. 
 algorithms for efficient DC-AC conversion, circuit protection 
and PV panel power optimization through maximum power-point tracking 
(MPPT) (di/dv) + (i/v) of the PV array is zero (derived from dP/dv = 0).
 This concept is shown in this Fig. The processor and control unit is used to control 
power flow from the PV panel to the grid and executes the MPPT algorithm, fault 
control, and digital communication routines.
BENEFITS OF SMART GRID RENEWABLE 
ENERGIES 
 First, enabling renewable energy resources to accommodate higher 
penetration with cost effective while improving power quality and 
reliability. 
 Second, integrating consumers as active players in the electricity 
system; savings, achieved by reducing peaks in demand and 
improving energy efficiency, as well as cutting greenhouse gas 
emissions. 
 Finally, voltage regulation and load following enables reducing cost 
of operations based on marginal production costs.
Future Advances and 
Implementations of SMART 
GRID
WinD EnergY
Smart grid integrates 
all the small electric 
heat pumps. 
It controls or 
coordinates a whole 
lot of heat pumps 
according to the 
variations in the 
demand side. 
If wind energy is 
utilized properly, it 
would even satisfy the 
electrical needs of the 
country easily.
ElectriC VehicleS 
We can say that the invention of 
electric vehicles was a great 
Achievement, even though it was 
Invented a long time ago, its 
Importance is seen with the advent 
of this great technology Smart Grid. 
Due to the use of electric vehicles, 
there is a significant reduce in the 
amounts of usage of fossil fuels and 
thereby reducing the green house effect. 
We can charge these vehicles whenever we need electricity and discharge this and 
give it back to the system whenever the system needs it.
ActivatioN Of EquipmentS 
This is the best feature 
of SMART GRID. We 
can know 
Peak hours times and 
the availability of 
electricity at low cost 
times. We can 
therefore use the 
electricity efficiently 
and economically.
ProsumerS
The producer is alerted 
the condition of a low 
electricity status, he can 
thereby transfer the stored 
energy to the required 
place, with just a click on 
his phone. 
No mediators are 
involved in this process
ZerO EnergY HousE 
 A zero-energy building, also known as a zero net energy (ZNE) 
building, net-zero energy building (NZEB), or net zero building, is a 
building with zero net energy consumption, meaning the total 
amount of energy used by the building on an annual basis is roughly 
equal to the amount of renewable energy created on the site. 
 These buildings still produce greenhouse gases because on cloudy 
(or non-windy) days, at night when the sun isn't shining, and on short 
winter days, conventional grid power is still the main energy source. 
 The zero net energy consumption principle is viewed as a means to 
reduce carbon emissions and reduce dependence on fossil fuels.
ZerO EnergY HousE
Conclusion 
 Smart grid is the key to integrating large amounts of renewable 
energy into the power system. The smart grid intelligently binds the 
entire energy system together and the most effective way of 
expanding the power system to meet the challenges of the future. 
 After few years smart grid roll out will revolutionize the day–to-day 
life we use energy . With the advent of this technology people get 
familiar with the theories of power systems. 
 In the 19th and 20th century electrification developed to the 
industrial revolution, likewise in the 21th century is most likely to the 
significant contribution to the transition to the sustainable society 
based on renewables to the benefit of people , the economy and 
the environment through out the world
THANK YOU

More Related Content

What's hot

Smart Grid Introduction
Smart Grid Introduction Smart Grid Introduction
Smart Grid Introduction
Nilesh Dhage
 

What's hot (20)

Storage In Smart Grids
Storage In Smart GridsStorage In Smart Grids
Storage In Smart Grids
 
Smart grid
Smart gridSmart grid
Smart grid
 
Smart Grid Introduction
Smart Grid Introduction Smart Grid Introduction
Smart Grid Introduction
 
SMART GRID TECHNOLOGY
SMART GRID TECHNOLOGYSMART GRID TECHNOLOGY
SMART GRID TECHNOLOGY
 
ppt on Smart Grid
ppt on Smart Gridppt on Smart Grid
ppt on Smart Grid
 
Smart grid
Smart gridSmart grid
Smart grid
 
smart grid:the future grid
smart grid:the future gridsmart grid:the future grid
smart grid:the future grid
 
SMART GRID TECHNOLOGY
SMART GRID TECHNOLOGYSMART GRID TECHNOLOGY
SMART GRID TECHNOLOGY
 
Phasor Measurement Unit (PMU)
 Phasor Measurement Unit (PMU) Phasor Measurement Unit (PMU)
Phasor Measurement Unit (PMU)
 
Smart Grid
Smart GridSmart Grid
Smart Grid
 
Smart grid
Smart gridSmart grid
Smart grid
 
Smart grid
Smart gridSmart grid
Smart grid
 
What is Smart grid
What is Smart gridWhat is Smart grid
What is Smart grid
 
Web based power quality monitoring system
Web based power quality monitoring systemWeb based power quality monitoring system
Web based power quality monitoring system
 
Smart grid presentation
Smart grid presentationSmart grid presentation
Smart grid presentation
 
Smart Grid ppt
Smart Grid pptSmart Grid ppt
Smart Grid ppt
 
Demand side management: Demand response
Demand side management: Demand response Demand side management: Demand response
Demand side management: Demand response
 
Policies for smart grid
Policies for smart gridPolicies for smart grid
Policies for smart grid
 
Wide Area Monitoring System WAMS & Applications
Wide Area Monitoring System WAMS & ApplicationsWide Area Monitoring System WAMS & Applications
Wide Area Monitoring System WAMS & Applications
 
Smart grid
Smart  gridSmart  grid
Smart grid
 

Viewers also liked

SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES
SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES
SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES
UPES Dehradun
 
NREL India Smart Grid Delegation
NREL India Smart Grid DelegationNREL India Smart Grid Delegation
NREL India Smart Grid Delegation
chandyGhosh
 

Viewers also liked (20)

Ppt on smart grid
Ppt  on  smart gridPpt  on  smart grid
Ppt on smart grid
 
Smart Grid Technology
Smart Grid TechnologySmart Grid Technology
Smart Grid Technology
 
Presentation on Smart Grid
Presentation on Smart GridPresentation on Smart Grid
Presentation on Smart Grid
 
Smart grid
Smart gridSmart grid
Smart grid
 
Smart grid ppt
Smart grid pptSmart grid ppt
Smart grid ppt
 
SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES
SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES
SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES
 
Smart grid
Smart gridSmart grid
Smart grid
 
Text
TextText
Text
 
Tracxn Research - Smart Grid Landscape, January 2017
Tracxn Research - Smart Grid Landscape, January 2017Tracxn Research - Smart Grid Landscape, January 2017
Tracxn Research - Smart Grid Landscape, January 2017
 
Ppt power grid design
Ppt power grid designPpt power grid design
Ppt power grid design
 
importance of reactive power in power system
importance of reactive power in power systemimportance of reactive power in power system
importance of reactive power in power system
 
Smart electrical grids challenges and opportunities
Smart electrical grids challenges and opportunitiesSmart electrical grids challenges and opportunities
Smart electrical grids challenges and opportunities
 
Smart grid
Smart gridSmart grid
Smart grid
 
Smart grid and hydo electric power power plant
Smart grid and hydo electric power power plantSmart grid and hydo electric power power plant
Smart grid and hydo electric power power plant
 
NREL India Smart Grid Delegation
NREL India Smart Grid DelegationNREL India Smart Grid Delegation
NREL India Smart Grid Delegation
 
Smart Grid Aspects of the Winter Package: Facilitating a Flexible Retail Market
Smart Grid Aspects of the Winter Package: Facilitating a Flexible Retail MarketSmart Grid Aspects of the Winter Package: Facilitating a Flexible Retail Market
Smart Grid Aspects of the Winter Package: Facilitating a Flexible Retail Market
 
Demand side management,
Demand side management, Demand side management,
Demand side management,
 
Smart grid challenge
Smart grid challengeSmart grid challenge
Smart grid challenge
 
Modelling DC smart nanogrids for local power distribution
Modelling DC smart nanogrids for local power distributionModelling DC smart nanogrids for local power distribution
Modelling DC smart nanogrids for local power distribution
 
Smart Grid in Hawaii
Smart Grid in HawaiiSmart Grid in Hawaii
Smart Grid in Hawaii
 

Similar to smart grid

Final paperenhancing distribution system through the use of real time etherne...
Final paperenhancing distribution system through the use of real time etherne...Final paperenhancing distribution system through the use of real time etherne...
Final paperenhancing distribution system through the use of real time etherne...
Genc Gjergjani
 
Smart Grid technicalDraw neat diagram for equivalent circuit of transformer.
Smart Grid technicalDraw neat diagram for equivalent circuit of transformer.Smart Grid technicalDraw neat diagram for equivalent circuit of transformer.
Smart Grid technicalDraw neat diagram for equivalent circuit of transformer.
pravingauda84
 

Similar to smart grid (20)

Smart metering and control of transmission system
Smart metering and control of transmission systemSmart metering and control of transmission system
Smart metering and control of transmission system
 
Smart Grid & SCADA Systems
Smart Grid & SCADA SystemsSmart Grid & SCADA Systems
Smart Grid & SCADA Systems
 
Advance Metering Infrastructure:Smart Meter
Advance Metering Infrastructure:Smart MeterAdvance Metering Infrastructure:Smart Meter
Advance Metering Infrastructure:Smart Meter
 
1678 1683
1678 16831678 1683
1678 1683
 
1678 1683
1678 16831678 1683
1678 1683
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
 
Journal new horizons volume 81-82
Journal new horizons volume 81-82Journal new horizons volume 81-82
Journal new horizons volume 81-82
 
Nucleus of Smart Grid: Communication
Nucleus of Smart Grid: CommunicationNucleus of Smart Grid: Communication
Nucleus of Smart Grid: Communication
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
 
Presentation1 160729072733
Presentation1 160729072733Presentation1 160729072733
Presentation1 160729072733
 
CYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRIDCYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRID
 
Smart grid communications
Smart grid communicationsSmart grid communications
Smart grid communications
 
Final paperenhancing distribution system through the use of real time etherne...
Final paperenhancing distribution system through the use of real time etherne...Final paperenhancing distribution system through the use of real time etherne...
Final paperenhancing distribution system through the use of real time etherne...
 
Smart Grid technicalDraw neat diagram for equivalent circuit of transformer.
Smart Grid technicalDraw neat diagram for equivalent circuit of transformer.Smart Grid technicalDraw neat diagram for equivalent circuit of transformer.
Smart Grid technicalDraw neat diagram for equivalent circuit of transformer.
 
The efficacy and challenges of scada and smart grid integration
The efficacy and challenges of scada and smart grid integrationThe efficacy and challenges of scada and smart grid integration
The efficacy and challenges of scada and smart grid integration
 
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
 
Smart meters.pptx
Smart meters.pptxSmart meters.pptx
Smart meters.pptx
 
Smart Home Management System Using Wireless Sensor Network (WSN)
Smart Home Management System Using Wireless Sensor Network (WSN)Smart Home Management System Using Wireless Sensor Network (WSN)
Smart Home Management System Using Wireless Sensor Network (WSN)
 
Paper on IEC 61850
Paper on IEC 61850Paper on IEC 61850
Paper on IEC 61850
 
Introduction-II.pptx
Introduction-II.pptxIntroduction-II.pptx
Introduction-II.pptx
 

Recently uploaded

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 

Recently uploaded (20)

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 

smart grid

  • 1. SMART METERING AND CONTROL OF TRANSMISSION SYSTEM BY M.SAI MANOBHIRAM G.DURGA RAO D.MOHITH
  • 2. “Smart Grids” “A smart grid uses digital technology to improve reliability, security, and efficiency (both economic and energy) of the electric system from large generation, through the delivery systems to electricity consumers and a growing number of distributed-generation and storage resources.”
  • 3. Characteristics of Smart Grid  Self-healing  Motivates and includes the consumer  Increases power quality  Accommodates all generation and storage options  Enables electrical markets  Optimizes assets and operates efficiently
  • 4. SMART GRID vs EXISTING SYSTEM Existing • Not self healing • Does not allow integration of sources • Real time data is not available • Slow and manual • Mostly involves analog functions smart grid • Self healing • Smart grid is designed to integrate sources • Real time data is available • Fast and automatic • A complete digital system
  • 5. SMART GRID INCLUDES: • Integrated communications • Sensing and measurement • Smart meters • Superconductive wires • Storage devices • Wireless communication
  • 6.
  • 7. ADVANTAGES OF SMART GRID TECHNOLOGY: • Peak Leveling • Self-Healing • More Reliable Power • More Efficient Renewable Power • A Cleaner Mix of Energy Sources • Reducing our carbon Footprints
  • 8. Disadvantages of smart grid technology:  Security and privacy cost.  Two way communications can be hacked. Technology components are expensive.  Present Infrastructure is inadequate and requires augmentation to support the growth of Smart Grids.
  • 9. Challenges in adopting smart grid:  Costly  Complicated structure  Gain control of meters  Security and privacy  Hacker  Power theft
  • 10. Smart Metering Infrastructure SMI is the totality of the systems and networks that are used to measure, collect, store, analyse, and use energy usage data. In other words, SMI includes smart meters and all other infrastructure components—hardware, software, and communication networks that are needed to offer advanced capabilities.
  • 11.  A typical SMI network employs a two-way communication system and smart metering technology.  SMI also uses the same system equipment to send information back through the network to meters to capture additional data, control the meters, or update the meters’ firmware.
  • 12. Major System components of SMI  A SMI system is comprised of a number of technologies and applications that have been integrated into one solution. The four major SMI components are: • Smart meters • Communication system • Meter data management systems (MDMS) • Home area networks (HAN)
  • 13. Smart Meters  The measurements from both electromechanical meters and non-smart digital meters are collected manually by physical site visits and, thus, record only the readings at the time of the visit.  Smart meters are intelligent, solid-state, programmable devices that can perform many functions beyond energy consumption recordings.  By using built-in memories, smart meters can record and store readings at present intervals (e.g., 15 min, 30 min, or hourly) and prescheduled times.
  • 14.  Typical smart meter functionalities include the following: i. Record interval (daily, hourly, or sub hourly) energy consumption and demand data ii. Provide bidirectional metering, which will accommodate distributed generations at customer sites iii. Provide notification on loss of power and service restoration iv. Provide tamper alarms and enable theft detection v. Provide voltage measurement, voltage alarms, and power quality monitoring
  • 15.  Enable TOU rate billing  Protect meter data security  Communicate and interact with intelligent appliances or devices in a customer’s locality
  • 16. Smart Meter Communications  Smart Meter communicates with the base station or the control centre on a bi-directional mode.  Some of the important channels that are available in India for communication are: GSM, Wi-Fi, PLCC, PSTN,etc  The type of communication available depends severely on the geographic location. Thus the communication mode used should be a combination of available options.  Here we present a brief description of technology and viability in Indian context.
  • 17. PLCC  PLCC – Power Line Carrier Communication.  As the name indicates PLCC associates the use of power conductor for communication by imposing a modulated carrier frequency signal over them.  They are the prime modes of communication between substation in power sector.  The carrier signal degrades gradually along the length of the line. So public repeaters are used which improve the strength of the signal by demodulation and re-modulation
  • 18. Zigbee  Zigbee is the only standard based wireless technology designed to address the unique needs of low cost low power wireless sensor and control networks.  The technology specified by short distance data transmission.  It operates in the region of 2.4GHz  This bandwidth is enough for the implementation of SMI and home automation  It is faster response than any other type of communication
  • 19.  It can be made to work in 3 modes  Coordinator: It forms the basic root of the system. It has the capability to communicate with any other node connected to network. It can even acts as a bridge between two networks.  Router: As the name indicates it indicates like a route decider. It routes the data based on address information received and pass it to respective destination  End Device: It has very limited functionality of just communicating with the network co-ordinator.
  • 20. Wi-Fi  Operating in the unlicensed 2.4GHz ISM band.  It involves broadcast and reception of data through radio signals in an encrypted format and its advantage is it cut the cost of the cables.  The main advantage of this over Zigbee is it can be used for the communications over the range of 1-10KM
  • 21. Proposed Communication architecture  Nodes 1-7 represent the customers or the meters associated with them.  The nodes or meters are connected to main module placed at distribution transformer through Zigbee  As the ordinary meter transmits data of nearly 34MB per month. Based on memory it transfers it will be charged.  As the range of Zigbee is less the distance between Distribution transformer and nearest residential customer ranges from 10-50m  The data collected at various distribution trsnformer is sent to its parent substation through WiFi network as the distance varies from 1-10KM
  • 22.
  • 23.  The backbone of the Smart Grid will be its network.  This network will connect the different components of the Smart Grid together, and allow two-way communication between them.  Net- working the components together will introduce security risks into the system.  The number of entry points that can be used to gain access to the electrical power system will increase when all of the components are networked together.
  • 24. Cyber security  Cyber security is a concept that has become increasingly prevalent with the development of the smart grid technology with the increased use of digital information and controls technology to improve reliability, security, efficiency of the electric grid and the deployment of smart technologies (real - time, automated, interactive technologies that optimize the physical operation of appliances and consumer devices) for metering, communications concerning grid operations and status, and distribution automation.
  • 25. Problems Occurred Due to Lack Of Cyber Security  In 2001, hackers penetrated the California Independent System Operator, which oversees most of the State’s electricity transmission grid; attacks were routed through California, Oklahoma, and China.  Ohio’s Davis-Besse (Oak Harbor, Ohio, the United States )nuclear power plant safety monitoring system was offline for five (5) hours due to the Slammer worm in January 2003.  In March 2005, security consultants within the electric industry reported that hackers were targeting the U.S. electric power grid and had gained access to U.S. utilities electronic control systems.  In April 2009, the Wall Street Journal reported that spies hacked into the U.S. electric grid and left behind computer programs that could allow them to disrupt service. Associated Press on August 4, 2010 reported “Hackers Try to Take overPower Plants.” In September 2010, cyber experts discovered for the first time a malicious computer code, called a worm, specifically created to take over systems that control the inner workings of industrial plants.
  • 26. Worm  A worm is a small piece of software that uses security holes within networks to replicate itself. The worm scans the network for another computer that has a specific security hole. It copies itself to the new machine exploiting the security hole, and then starts replicating from that system as well. Once infected, the worm may send itself to everyone in your address book. Using a network in this manner, worms expand extremely quickly. The greatest danger from worms is that they will eventually use all the memory available to a computer or a network.
  • 27.  The Stuxnet Worm was reported in an Industrial Control Systems Cyber Emergency Response Team Advisory on September 29, 2010. Stuxnet is a Malware Targeting Siemens Control Software. It can be used to infiltrate industrial control systems used in the power grid, power plants and other infrastructure. It is reported to have the ability to damage or possibly destroy control systems.  The North American Electric Reliability Corporation (NERC) and DOE released a report titled High-Impact, Low-Frequency Event Risk to the North American Bulk Power System (June 2, 2010)16 that identifies a certain class of high-impact, low-frequency risk shown to have the potential to significantly affect the reliability of the North American bulk power system..
  • 28.
  • 29.  Cyber Security includes  Availability  Integrity  Confidentiality
  • 30. Availability  Availability refers to ensuring timely and reliable access to information, which is the primary security goal of a smart-grid metering and control system. Malicious attacks targeting availability can be considered as denial-of-service attacks, which intend to delay, block, or even corrupt the communication in the system.
  • 31.  The jamming attack is able to defer the transmission of messages and to distort the transmitted data signal. As a result, the legitimate receiver cannot recover messages out of the damaged data packets.  On the other hand, many man-in-the-middle attacks can be launched only when the full or partial communication channels can be jammed.
  • 32. Integrity  Integrity refers to preventing or detecting the modification or destruction of information by unauthorized persons or systems. Malicious attacks targeting the integrity of a smart grid attempt to stealthily manipulate critical data such as meter readings, billing information, or control commands  Integrity protection can be achieved by authentication, certification, and attestation
  • 33. Confidentiality  Confidentiality refers to protecting personal privacy and proprietary information from unauthorized access. Malicious attacks targeting confidentiality aim at obtaining desirable information(e.g., power usage, customer’s account information).  An emerging trend is for the smart meters to aggregate usage data for billing purposes and support load-balancing and other monitoring functions through peer-to-peer protocols that preserve the consumer’s privacy.
  • 34. Cyber Solutions  Data encrypton  Authentication  Digital signatures
  • 35. Data Encryption  Cryptography  Cryptography has been the most widely used technique to protect information from adversaries. A message to be protected is transformed using a Key that is only known to the Sender and Receiver. The process of transformation is called encryption and the message to be encrypted is called Plain text. The transformed or encrypted message is called Cipher text. At the Receiver, the encrypted message is decrypted.
  • 37. Authentication  Authentication is required to verify the identities of communicating parties to avoid imposters gaining access to information.
  • 38. Digital Signatures A digital signature allows the signing of digital messages by the Sender in such a way that:  1. The Receiver can verify the claimed identity of the Sender (authentication).  2. The Receiver can prove and the Sender cannot deny that the message has been sent by the specific user (non-repudiation).  3. The Receiver cannot modify the message and claim that the modified message is the one that was received from the Sender
  • 39.  Cyber solutions (academic)  An experimental study about the performance of a symmetric-key cipher (i.e., DES-CBC) and a public-key cipher (i.e., RSA) on an intelligent electronic device (IED) called TS7250 has been conducted (Wang and Lu, 2013), where the IED is used for sending the transformer status and receiving commands from the control centre.
  • 40.  These experimental results show that the computational ability of an IED becomes a bottleneck for the delay performance when performing asymmetric-key cryptography  Due to the limited computational capabilities of devices, stringent timing requirements, and high data-sampling rates in the smart grid, traditional authentication schemes might not be applicable.
  • 41.  Universal Key:The heterogeneous communication architecture of the smart grid has made the key management particularly challenging, and it is not practical to design a universal key-management scheme for the entire smart grid.
  • 42. Authentication Security  Authentication is crucial to protect the integrity of data and devices in the smart grid.  A number of authentication schemes have been proposed in the literature for smart grids. Szilagyi and Koopman (2009 and 2010) proposed flexible and low-cost multicast authentication schemes for embedded control systems
  • 43.  The basic idea is to verify truncated message authentication codes (MACs) across multiple packets, thereby achieving a good trade-off among authentication cost, delay performance, and tolerance to attacks.  Although many encryption, authentication, and key-management schemes have been proposed, their performance does not seem to fulfill the stringent timing requirements of the smart grid. Therefore, fine-grained and advanced security protocols still need to be developed for protecting different communication networks in smart grids.
  • 44. MACs  Imagine that you are communicating with your friend through a chat client. How will your friend's machine know that the message he received is exactly the same message that you send?. And how will he verify that the message was not altered in the middle.  Even after implementing a secure authentication and data encryption, integrity of the message needs to be versified, to confirm, that the data was not tampered in the middle.
  • 45.  In communication everything send over wire is data. So the thing that will give the sender and the receiver the assurance, of untampered data is also a small fixed length data called MAC(Message authentication code).
  • 46. Confidentiality Security  In a smart grid, the utility company needs the real-time power-consumption data for planning purposes as well as for providing accurate and authentic billing. For the utility company, the correctness of the calculated bills is the most important issue  Researchers have designed privacy-preserving billing protocols using advanced cryptographic techniques such as zero-knowledge proof and homomorphic encryption
  • 47. Zero-knowledge proof  If proving the statement requires knowledge of some secret information on the part of the prover, the definition implies that the verifier will not be able to prove the statement in turn to anyone else, since the verifier does not possess the secret information.
  • 48. Homomorphic Encryption  Homomorphic encryption is a form of encryption which allows specific types of computations to be carried out on ciphertext and generate an encrypted result which, when decrypted, matches the result of operations performed on the plaintext.  This is a desirable feature in modern communication system architectures. Homomorphic encryption would allow the chaining together of different services without exposing the data to each of those services, for example a chain of different services from different companies could 1) calculate the tax 2) the currency exchange rate 3) shipping, on a transaction without exposing the unencrypted data to each of those services.[
  • 49.  Using those advanced cryptographic techniques, utility companies only receive the commitments of the real-time power consumption instead of the raw data from smart meters, and customers can prove to the utility company that a utility bill has been correctly generated  However, from the customer’s perspective, privacy is the main concern.
  • 50.  Garcia and Jacobs (2012) proposed the use of homomorphic encryption to prevent the utility company from accessing the power consumption data of individual households. Using those advanced cryptographic techniques, utility companies only receive the commitments of the real-time power consumption instead of the raw data from smart meters, and customers can prove to the utility company that a utility bill has been correctly generated
  • 52. What is Self Healing??  SELF-HEALING of power delivery systems is a concept that enables the identification and isolation of faulted system components and the restoration of service to customers supplied by healthy elements.  Self-healing of power distribution systems is conducted via Distribution Automation (DA), specifically through smart protective and switching devices that minimize the number of interrupted customers during contingency conditions by automatically isolating faulted components and transferring customers to an optional source when their normal supply has been lost.  Distribution Automation: Distribution Automation (DA) is a set of technologies that enable an electric utility to monitor, coordinate, and operate distribution components in a real-time mode from remote locations.
  • 53. An illustration of self healing  Automatic fail over scheme for transmission fault  so that if one supply line fails, the customers supplied via that circuit are quickly transferred to the backup source by automatic failover control circuitry.  The limitation is while switching the load from second line to first line, the we need to check supply should be greater than load
  • 54.  There are several additional practical aspects that need to be considered when implementing self-restoration, besides the DA system architecture it is necessary to consider loading ratings and voltage limits, since transferring load to a highly loaded and long feeder may end up generating power quality complaints (low voltage in this case),
  • 55. FLISR an application of Distribution Automation  The smart grid concept is driving the implementation of a series of self-restoration schemes in the form of DA applications. The most popular of these is FLISR, which consists of the utilization of advanced protective and switching devices to automatically locate and isolate faulted feeder sections and restore the maximum number of customers possible located on healthy sections.  FLISR benefits include  Improve SAIDI, SAIFI, and other reliability statistics  Reduce “energy not supplied” (kWh)  Reduce fault investigation time  Provide “premium quality” service Monetary benefits:  Reduce customer cost of outage  Increase revenue (sell more energy)
  • 56. Advantages of implementing FLISR  the advantages of implementing FLISR versus conventional operation for a typical distribution feeder when conventional operation (without FLISR)  there is a need for investigating the specific fault location and conducting manual switching to isolate the faulted area and restore service to customers located on healthy feeder sections.  Here customer trouble call may play an important role.  FLISR on the other side allows detecting faults and restoring affected customers faster and with limited human intervention.  When FLISR is used power is quickly restored to customers located on healthy sections of a feeder.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63. The overall objective of this approach is to identify those locations and combinations of devices that attain the greatest cost-benefit ratio.
  • 65.  The key goal of smart grid is to promote active customer participation and decision making as well as to create the operation environment in which both utilities and electricity users influence each other.  In smart grids, users can influence utilities by adding distributed generation sources such as photovoltaic (PV) modules or energy storage at the point of use, and reacting pricing signals.
  • 66. SMART GRID RENEWABLE ENERGY SYSTEM  The electricity grid to accommodate higher percentage of renewable energy would need large quantities of conventional back up power and huge energy storage.  Smart grid technologies and concepts reduce barriers to the integration of renewable resources and allow power grids to support a greater percentage of variable renewable resources.
  • 67.  Enabling smart grid technology, such as distributed storage, demand response, advanced sensing, control software, information infrastructure, and market signals, increases the ability to influence and balance supply and demand.  With smart grid technology, grid operators can better coordinate and control the system in response to grid conditions, thus allowing integration of increasingly greater levels of renewable resources more effectively and at lower cost.
  • 68.  Advanced Metering Instrument (AMI) and internet-based services engage demand response and distributed storage to accommodate higher penetration and cost-effective integration of renewable energy generation.  Advanced and automated integration systems, such as inverters and converters with communications software interfaces, enable distributed management and application integration for renewable generation.
  • 69. SOLAR PV DESIGNS FOR SMART GRID INTEGRATION  A typical solar PV should provide two-way flows of power and communication between the smart grid and the solar PV system.  Three solar PV inverters are available which are the string, the central and the newly developed micro inverter, known also as integrated AC module inverter.
  • 70. CENTRAL INVERTERS:  The conventional solar PV installations feed DC voltage to a central inverter for conditioning and distribution locally or across the power grid.  The DC voltage carried through the array to the central inverter may have significant fire and safety hazards, leading to increased costs for cabling and, in turn, higher costs for installation and maintenance.
  • 71. STRING INVERTERS  string inverters eliminate the need for a central inverter by providing DC-AC conversion at the output of each string.
  • 72. MICRO INVERTERS:  Recent researches focus on micro inverters which take the concept of string inverters to the next level - providing DC-AC conversion from each individual panel rather than an entire string.  algorithms for efficient DC-AC conversion, circuit protection and PV panel power optimization through maximum power-point tracking (MPPT) (di/dv) + (i/v) of the PV array is zero (derived from dP/dv = 0).
  • 73.  This concept is shown in this Fig. The processor and control unit is used to control power flow from the PV panel to the grid and executes the MPPT algorithm, fault control, and digital communication routines.
  • 74. BENEFITS OF SMART GRID RENEWABLE ENERGIES  First, enabling renewable energy resources to accommodate higher penetration with cost effective while improving power quality and reliability.  Second, integrating consumers as active players in the electricity system; savings, achieved by reducing peaks in demand and improving energy efficiency, as well as cutting greenhouse gas emissions.  Finally, voltage regulation and load following enables reducing cost of operations based on marginal production costs.
  • 75. Future Advances and Implementations of SMART GRID
  • 77. Smart grid integrates all the small electric heat pumps. It controls or coordinates a whole lot of heat pumps according to the variations in the demand side. If wind energy is utilized properly, it would even satisfy the electrical needs of the country easily.
  • 78. ElectriC VehicleS We can say that the invention of electric vehicles was a great Achievement, even though it was Invented a long time ago, its Importance is seen with the advent of this great technology Smart Grid. Due to the use of electric vehicles, there is a significant reduce in the amounts of usage of fossil fuels and thereby reducing the green house effect. We can charge these vehicles whenever we need electricity and discharge this and give it back to the system whenever the system needs it.
  • 79. ActivatioN Of EquipmentS This is the best feature of SMART GRID. We can know Peak hours times and the availability of electricity at low cost times. We can therefore use the electricity efficiently and economically.
  • 81. The producer is alerted the condition of a low electricity status, he can thereby transfer the stored energy to the required place, with just a click on his phone. No mediators are involved in this process
  • 82. ZerO EnergY HousE  A zero-energy building, also known as a zero net energy (ZNE) building, net-zero energy building (NZEB), or net zero building, is a building with zero net energy consumption, meaning the total amount of energy used by the building on an annual basis is roughly equal to the amount of renewable energy created on the site.  These buildings still produce greenhouse gases because on cloudy (or non-windy) days, at night when the sun isn't shining, and on short winter days, conventional grid power is still the main energy source.  The zero net energy consumption principle is viewed as a means to reduce carbon emissions and reduce dependence on fossil fuels.
  • 84. Conclusion  Smart grid is the key to integrating large amounts of renewable energy into the power system. The smart grid intelligently binds the entire energy system together and the most effective way of expanding the power system to meet the challenges of the future.  After few years smart grid roll out will revolutionize the day–to-day life we use energy . With the advent of this technology people get familiar with the theories of power systems.  In the 19th and 20th century electrification developed to the industrial revolution, likewise in the 21th century is most likely to the significant contribution to the transition to the sustainable society based on renewables to the benefit of people , the economy and the environment through out the world