SlideShare a Scribd company logo
2
Most read
4
Most read
10
Most read
Power System Security
Power System Operation and Control PPT
161310109051
What is power system security?
 Power system security may be looked upon as the probability of the system’s
operating point remaining within acceptable ranges, given the probabilities of
changes in the system (contingencies) and its environment.
 Dy Liacco first pointed out in 1967 that a power system may be identified to be
operating in a number of states.
Power system security Contd..
Preventive state
 The preventive state is actually the normal state. The term ‘preventive’ was used to
stress the ‘Security’ aspect of the normal operation.
 Normal operating condition usually means that all the apparatus are running within
their prescribed limits, and all the system variables are within acceptable ranges.
 The system should also continue to operate ‘normally’ even in the case of credible
contingencies. The operator should ‘foresee’ such contingencies (disturbances) and
take preventive control actions (as economically as possible) such that the system
integrity and quality of power supply is maintained.
Emergency state
 The power system enters an emergency state when some of the components
operating limits are violated; some of the states wander outside the acceptable
ranges, or when the system frequency starts to decrease.
 The control objective in the emergency state is to relieve system stress by
appropriate actions.
 Economic considerations become secondary at this stage.
Restorative state
 Restorative state is the condition when some parts (or whole) of the system has lost
power.
 The control objective in this state is to steer the system to a normal state again by
taking appropriate actions.
Major components of security
assessment:-
 System monitoring
 Contingency analysis
 Preventive and corrective actions
System Monitoring
 The prerequisite for security assessment of a power system is the knowledge of the
system states. Monitoring the system is therefore the first step.
 Measurement devices dispersed throughout the system help in getting a picture of
the current operating state. The measurements can be in the form of power
injections, power flows, voltage, current, status of circuit breakers, switches,
transformer taps, generator output etc., which are telemetered to the control
centre.
 Usually a state estimator is used in the control centre to process these telemetered
data and compute the best estimates of the system states.
 Remote control of the circuit breakers, disconnector switches, transformer taps etc.
is generally possible. The entire measurement and control system is commonly
known as supervisory control and data acquisition (SCADA) system.
Contingency Analysis
 Contingency definition involves preparing a list of probable contingencies.
 Contingency selection process consists of selecting the set of most probable
contingencies in preferred; they need to be evaluated in terms of potential risk to
the system. Usually, fast power flow solution techniques such as DC power flow are
used to quickly evaluate the risks associated with each contingency.
 Finally, the selected contingencies are ranked in order of their security, till no
violation of operating limits is observed.
Algorithm for contingency analysis
On-line security assessment
 On-line security assessment
techniques use near-real-time
measurements from different
locations in a power system, and
continuously update the security
assessment of the system.
 The highly interconnected nature of
modern power systems, and
deregulated energy market scenarios,
operating conditions and even the
topology of a power system changes
frequently. Off-line techniques for
security assessment are therefore no-
longer reliable in modern power
systems.
Power system security

More Related Content

PDF
Power system security
PPTX
Definition & Classification Of Power System Stability
PPT
Generation shift factor and line outage factor
PPSX
Heffron phillips model
PPTX
PSOC.pptx
PPTX
FUNCTIONS AND ROLES OF LOAD DESPATCH CENTRES.pptx
PPT
Voltage and Frequency Control of the Grid
PPTX
Equipment and Stability Constraints : System Operation
Power system security
Definition & Classification Of Power System Stability
Generation shift factor and line outage factor
Heffron phillips model
PSOC.pptx
FUNCTIONS AND ROLES OF LOAD DESPATCH CENTRES.pptx
Voltage and Frequency Control of the Grid
Equipment and Stability Constraints : System Operation

What's hot (20)

PPTX
Classification Of Power System Stability
PPTX
static series synchronus compensator
PPTX
Power system security and smart grid
PPT
Basic types of facts controllers
PDF
Introduction to power system analysis
PDF
Introduction
PPTX
Power System Stabilizer
PPTX
Objectives of shunt compensation
PPTX
Flexible AC Transmission Sytstem
DOCX
Training report-in-a-132-k-v-substation
PPTX
Computer aided design of electrical machine
PDF
Statcom
PDF
Pashen's law
PDF
Facts controllers
PPTX
Generator and Transformer Protection (PART 1)
PDF
Power flow analysis
PPT
3 reactive power and voltage control
PPTX
Input output , heat rate characteristics and Incremental cost
PPT
PPTX
FACTS DEVICES
Classification Of Power System Stability
static series synchronus compensator
Power system security and smart grid
Basic types of facts controllers
Introduction to power system analysis
Introduction
Power System Stabilizer
Objectives of shunt compensation
Flexible AC Transmission Sytstem
Training report-in-a-132-k-v-substation
Computer aided design of electrical machine
Statcom
Pashen's law
Facts controllers
Generator and Transformer Protection (PART 1)
Power flow analysis
3 reactive power and voltage control
Input output , heat rate characteristics and Incremental cost
FACTS DEVICES
Ad

Similar to Power system security (20)

PPTX
PSA_Unit-6 electrical engineering subject.pptx
PPTX
Security analysis black and white 2007
PPTX
psoc subject topic - SYSTEM SECURITY.pptx
PPTX
Contigency analysis and security system taking different cases
PPT
EE554Introductrion power sytability .ppt
PPTX
STATE TRANSITION DIAGRAM in psoc subject
PDF
Wide area protection-and_emergency_control (1)
PPT
CHAPTER- 4.ppt
PPTX
Cyber security in power sector
PPTX
Cybersecurityinpowersector 181124194055
PPTX
18EE81_PSOC_8th Semester.pptx
PDF
G41044251
PDF
On-line Power System Static Security Assessment in a Distributed Computing Fr...
PPTX
Security challenges to power grid and smart grid infrastructures
PPTX
Cyber security of power grid
PDF
Cybersecurity of powergrid
PPTX
The art of securing microgrid control systems
PDF
Cluster Computing Environment for On - line Static Security Assessment of lar...
PPT
Interconnection power system
PDF
15ee81 module1[www.vtuloop.com].pdf
PSA_Unit-6 electrical engineering subject.pptx
Security analysis black and white 2007
psoc subject topic - SYSTEM SECURITY.pptx
Contigency analysis and security system taking different cases
EE554Introductrion power sytability .ppt
STATE TRANSITION DIAGRAM in psoc subject
Wide area protection-and_emergency_control (1)
CHAPTER- 4.ppt
Cyber security in power sector
Cybersecurityinpowersector 181124194055
18EE81_PSOC_8th Semester.pptx
G41044251
On-line Power System Static Security Assessment in a Distributed Computing Fr...
Security challenges to power grid and smart grid infrastructures
Cyber security of power grid
Cybersecurity of powergrid
The art of securing microgrid control systems
Cluster Computing Environment for On - line Static Security Assessment of lar...
Interconnection power system
15ee81 module1[www.vtuloop.com].pdf
Ad

More from Adani Institute of Infrastructure Engineering College (14)

Recently uploaded (20)

PDF
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
PDF
August 2025 - Top 10 Read Articles in Network Security & Its Applications
PPT
Total quality management ppt for engineering students
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PDF
Visual Aids for Exploratory Data Analysis.pdf
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PPTX
CyberSecurity Mobile and Wireless Devices
PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
PPTX
Software Engineering and software moduleing
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PPTX
Feature types and data preprocessing steps
PPTX
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
Design Guidelines and solutions for Plastics parts
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PPTX
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
PDF
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
August 2025 - Top 10 Read Articles in Network Security & Its Applications
Total quality management ppt for engineering students
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
Visual Aids for Exploratory Data Analysis.pdf
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
CyberSecurity Mobile and Wireless Devices
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
Software Engineering and software moduleing
distributed database system" (DDBS) is often used to refer to both the distri...
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
Feature types and data preprocessing steps
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
Categorization of Factors Affecting Classification Algorithms Selection
Design Guidelines and solutions for Plastics parts
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf

Power system security

  • 1. Power System Security Power System Operation and Control PPT 161310109051
  • 2. What is power system security?  Power system security may be looked upon as the probability of the system’s operating point remaining within acceptable ranges, given the probabilities of changes in the system (contingencies) and its environment.  Dy Liacco first pointed out in 1967 that a power system may be identified to be operating in a number of states.
  • 4. Preventive state  The preventive state is actually the normal state. The term ‘preventive’ was used to stress the ‘Security’ aspect of the normal operation.  Normal operating condition usually means that all the apparatus are running within their prescribed limits, and all the system variables are within acceptable ranges.  The system should also continue to operate ‘normally’ even in the case of credible contingencies. The operator should ‘foresee’ such contingencies (disturbances) and take preventive control actions (as economically as possible) such that the system integrity and quality of power supply is maintained.
  • 5. Emergency state  The power system enters an emergency state when some of the components operating limits are violated; some of the states wander outside the acceptable ranges, or when the system frequency starts to decrease.  The control objective in the emergency state is to relieve system stress by appropriate actions.  Economic considerations become secondary at this stage.
  • 6. Restorative state  Restorative state is the condition when some parts (or whole) of the system has lost power.  The control objective in this state is to steer the system to a normal state again by taking appropriate actions.
  • 7. Major components of security assessment:-  System monitoring  Contingency analysis  Preventive and corrective actions
  • 8. System Monitoring  The prerequisite for security assessment of a power system is the knowledge of the system states. Monitoring the system is therefore the first step.  Measurement devices dispersed throughout the system help in getting a picture of the current operating state. The measurements can be in the form of power injections, power flows, voltage, current, status of circuit breakers, switches, transformer taps, generator output etc., which are telemetered to the control centre.  Usually a state estimator is used in the control centre to process these telemetered data and compute the best estimates of the system states.  Remote control of the circuit breakers, disconnector switches, transformer taps etc. is generally possible. The entire measurement and control system is commonly known as supervisory control and data acquisition (SCADA) system.
  • 9. Contingency Analysis  Contingency definition involves preparing a list of probable contingencies.  Contingency selection process consists of selecting the set of most probable contingencies in preferred; they need to be evaluated in terms of potential risk to the system. Usually, fast power flow solution techniques such as DC power flow are used to quickly evaluate the risks associated with each contingency.  Finally, the selected contingencies are ranked in order of their security, till no violation of operating limits is observed.
  • 11. On-line security assessment  On-line security assessment techniques use near-real-time measurements from different locations in a power system, and continuously update the security assessment of the system.  The highly interconnected nature of modern power systems, and deregulated energy market scenarios, operating conditions and even the topology of a power system changes frequently. Off-line techniques for security assessment are therefore no- longer reliable in modern power systems.