Nomenclature
AbbreviationExpansionAAR | Ambient adjusted rating. |
ASA | Area security assessment. |
DSA | Dynamic security assessment. |
D-DSA | Distributed dynamic security assessment. |
D-LSE | Distributed linear state estimation. |
ECC | Energy control center. |
EMS | Energy management system. |
FIS | Fuzzy inference system. |
GPS | Global position system. |
H-TNTP-PMU | Hierarchical transmission network topology processing utilizing synchrophasor network. |
NETS | New England test system. |
NSA | Network security assessment. |
NYPS | New York power system. |
OpSA | operational situational awareness. |
PMU | Phasor measurement unit. |
RMSE | Root mean square error. |
RTDS | Real-Time digital simulator. |
SCADA | Supervisory control and data acquisition. |
SMRS | Supervisory control and data acquisition system monitoring of relay signals. |
SOTA | State-of-the-art. |
SA | Security assessment. |
SE | State estimation. |
SSA | Substation security assessment. |
SSE | Static state estimation. |
T-S | Tagaki-Sugeno. |
TNTP | Transmission network topology processing. |
TNTP-SMRS | Supervisory control and data acquisition system monitoring of relay signal based transmission network topology processing. |
TSA | Transmission line security assessment. |
Maximum load factor. | |
Degree of the membership of input i for | |
Area security index of area i. | |
Transmission line security index of area i. | |
Substation security index of area i. | |
F | Number of FISs. |
Ambient adjusted rating current. | |
Normalized current limit for the alert state. | |
Fully emergency state initial normalized current point. | |
Fully normal state normalized current limit. | |
Measured transmission line current. | |
Normalized current. | |
Normalized current limit for the normal state. | |
Default transmission line current rating. | |
k | Number of areas. |
Number of transmission lines in area q. | |
M | Total number of transmission lines in the network. |
Number of substations in area q. | |
N | Total number of substations in the network. |
NSI | Network security index. |
Transmission line security index for the network. | |
Substation security index for the network. | |
NSI for the X approach. | |
Number of reduced rules for a | |
Number of rules of the largest FIS in the | |
P | Total number of reduced rules of each FIS fusion level for the longest vertical path in the complete D-DSA architecture. |
Q | Number of rules fired for given input for the FIS. |
r | Number of inputs for the FIS. |
S | Number of samples considered for the RMSE analysis. |
SSI limit for alert state. | |
SSI limit for emergency state. | |
Substation security index of substation j in area i. | |
Transmission line security index of transmission line k of area i. | |
TSI limit for alert state. | |
TSI limit for emergency state. | |
Lower voltage limits for alert state. | |
Upper voltage limits for alert state. | |
Lower fully emergency state initial voltage point. | |
Upper fully emergency state initial voltage point. | |
Lower voltage limits for normal state. | |
Upper voltage limits for normal state. | |
Activation level of the | |
Output of the |
Introduction
Modernizing the electric bulk power system has more dependency on renewable resources, and the demand has been growing rapidly and becoming more dynamic [1] with electrified transportation, active distribution sources and swift establishment of spot loads such as data centers. Furthermore, the electricity market has become more competitive, requiring the system to operate more economically, where transmission reconfiguration is becoming a regularly utilized tool [2], [3]. These changes in the power system result in a more dynamic power system operation where control has to be modernized.
One of the foundational applications used in the security assessment of the power system is state estimation (SE), which is used to derive the system state variables from imperfect measurements. The traditional power system was limited to static state estimation (SSE) majorly due to the higher sampling rates of the measurements from the supervisory control and data acquisition (SCADA) system, where typical measurements are received at the energy control center (ECC) every 2 s to 5 s [4], which makes the traditional SE inefficient. Furthermore, the network connectivity derived from the traditional SCADA system monitoring of relay signals (SMRS) based transmission network topology processing (TNTP-SMRS) is used in the SSE as the network model. The traditional TNTP has limitations [5]. Thus, the security assessment based on these traditional foundational applications is insufficient for modern power systems. However, the extensive deployment of the phasor measurement unit (PMU) opens up the possibility of improving the energy management system (EMS) application development, including TNTP, SE, and security assessment (SA). The typical PMU data frequency is 30Hz, and the measurements are synchronized (with reference to the global position system (GPS) time) [4]. A PMU-based reliable and efficient hierarchical transmission network topology processing approach has been proposed in [5], which can derive TNTP in every PMU data frame. Furthermore, an improved multilevel distributed linear state estimation (D-LSE) approach has been proposed in [6], where the robustness, resiliency and accuracy of the estimation are ensured by the architecture. These enhanced foundational applications of the EMS can be used to develop a more efficient dynamic security assessment (DSA) at every PMU frame, which opens up the capability for assessing the security of the power system online.
The primary methods used for DSA are time-domain simulations, which are highly accurate but computationally expensive; direct methods, which are less detailed but provide a faster assessment; and artificial intelligence – particularly neural networks and classification tools, where a thorough training process is required and is highly system-dependent. The primary challenges associated with these methods are the inefficiency, dependence on unreliable foundational applications such as TNTP-SMRS, difficulty to adopt for the high dynamicity and the intermittency introduced by the rapid development of renewable sources. The potential solution is the development of more efficient, multi-level and distributed algorithms. The aim is to achieve true real-time dynamic security assessment under uncertainties associated with the changing power system. A distributed processing architecture for contingency analysis [7], where the computation efficiency enables an online DSA assessment. Although distributed processing is helpful, the foundational application for DSA has to be efficiently designed. Several works of literature have investigated intelligent approaches for DSA. A machine-learning-based probabilistic approach is proposed in [8], where an offline training model under different operating conditions is used. Decision tree-based DSA techniques have been proposed in [9], [10], [11], and [12]. An extreme learning machine with ensemble learning-based hard limiter borderline classification is used to develop a reliable and accurate DSA in [13]. A user-oriented expert rule constraint-based DSA is proposed in [14]. An integrated DSA tool integrating real-time snapshots from the EMS with both bus/branch and node/breaker models is proposed in [15]. Usage of the traditional network model derived from SMRS is a limitation of this approach. A collaborative DSA architecture for a multi-area power system with multiple transmission system operators is proposed in [15]. A complete hierarchical architecture that integrates components to the network level is preferred over collaborative architecture established based on the traditional DSA. It is clearly identified that an efficient, reliable and distributed DSA architecture is preferred for the modern power system. Although, a complete solution is lacking in the literature. Furthermore, the dependency of literature on traditional EMS tools, such as SE and TNTP-SMRS, drastically limits the capabilities of proposed DSA techniques in the literature.
A secured power system must ensure the voltages between secure limits and power flows of the transmission lines do not violate the capacity of the transmission line. The assessment of these conditions is a security assessment. Assessing the power system security and determining the state (Normal, Alert or Emergency) is a security assessment. This paper focuses on establishing distributed dynamic security assessment (D-DSA), which comprises three levels, to assess system security efficiently. The three levels of the D-DSA are Level 1: Component level (substation security assessment (SSA) and transmission line security assessment (TSA)), Level 2: area level (area security assessment (ASA)) and Level 3: network level (network level security assessment (NSA)). The organization of the D-DSA levels is shown in Fig. 1. The state variables considered in the D-DSA are the substation voltage and transmission line current. The substation voltages are estimated from the D-LSE [6], ensuring efficiency, resiliency, and robustness. The transmission line currents feed directly from the synchrophasor units. Furthermore, the network model is derived using the H-TNTP-PMU [5] for improved efficiency and reliability of the network model. A summarized D-DSA feature that addressed shortcomings of the state-of-the-art (SOTA) identified in the literature survey is shown in Table 1. The three approaches of DSA considered in this study for comparison purposes are presented in Fig. 2.
Multi-Level hierarchical organization of the D-DSA illustrating the complexity and knowledge depth.
Advancement and the applications of dynamic security assessment (DSA). The ‘orange-line’ blocks present the contribution of this work. The ‘blue-line’ blocks present the foundational work of this paper from the authors.
The main contributions of this paper are:
A multi-level distributed dynamic security assessment (D-DSA) tool is proposed to enhance operational situational awareness (OpSA) at the energy control center. The D-DSA comprises three levels. D-DSA provides quantitative and qualitative visualization at each level so that ECC operators can easily understand the power system’s security state. The H-TNTP-PMU provides the substation and transmission line connection statuses to all three levels.
Level 3: Network Level, where NSA is conducted. First, the network level substation security index (NSI-SSI) is estimated by fusing all area level substation security indexes (ASI-SSIs), and the network level transmission line security index (NSI-SSI) is estimated by fusing all area level transmission line security indexes (ASI-TSIs). Next, the network security index (SSI) is derived from the NSI-SSI and NSI-TSI. Based on the index value, the state of the network is defined as either Normal, Alert or Emergency.
Level 2: Area Level, where ASA is conducted. ASI-SSI is estimated by fusing all substation security indexes (SSIs) in the area, and the ASI-TSI is estimated by fusing all transmission line security indexes (TSIs) in the area. Next, the area security index (SSI) is derived from the ASI-SSI and ASI-TSI. Based on the index value, the state of each area is defined as either Normal, Alert or Emergency.
Level 1: Component Level, where SSA and TSA are conducted, SSI and TSI are derived from the D-LSE and direct PMU measurements, respectively. Based on the index value, the state of each substation and transmission line is defined as either Normal, Alert or Emergency.
The D-DSA has been illustrated on two benchmark test power systems. The two power systems, a two-area four-machine power system (small network) and the IEEE 68 bus system (medium size network, inter-connected New England test system (NETS) and New York power system (NYPS) reduced equivalent model), have been implemented on a real-time power system simulator with phasor measurement units. The typical results were obtained with the D-DSA with D-LSE and H-TNTP-PMU under multiple disturbances.
Proposed D-DSA is scalable and computationally efficient due to the distributed architecture and the efficient rule arrangement of the Tagaki-Sugeno (T-S) [16] fuzzy inference system (FIS) model in each level fusions.
The rest of the paper is organized as follows: Section II presents the proposed D-DSA methodology. Typical results for D-DSA for two power system models and the discussion are presented in Section IV. Section V provides the conclusion and future directions.
Methodology
The power system can be classified into two main security state categories, namely secure and insecure, which are sub-categorized into Normal (secure), Alert (insecure), and Emergency (insecure). These three states were proposed in [17], which was inspired from [18]. The normal state can be described as the total load of the system supplied by the power system (equality constraint), and all the variables are within the normal limits (inequality constraints). The system changes to an alert level subsequent to system dynamics and when certain variables violate an alert threshold, although it is an acceptable system operating state considering equality and inequality constraints. The system can reach the emergency state due to a considerable dynamic impact. In the emergency state, inequality constraints are violated due to system state variables exceeding their acceptable thresholds, although the equality constraints are satisfied by generation supplying the required demand. At this level, the operator has to take timely control actions to avoid the system reaching the in-extremis state, where the equality constraint is violated. The primary task of the ECC operators is to take the best course of action efficiently and take the system back to its normal state. If the system reaches the in-extremis state, to avoid power systems leading to a blackout, the power supply must be disrupted for a certain number of consumers. Furthermore, a comprehensive restorative plan has to be deployed, and the loads must be connected to the system accordingly by balancing the supply and demand. This state is referred to as the restorative state.
Thus, improving OpSA at the ECC is paramount, where operators can continuously monitor the system security efficiently. The proposed D-DSA architecture is shown in Fig. 3. The SSI pre-processing is to calibrate each SSA characteristic. The TSI pre-processing is for conducting the ambient adjusted rating (AAR) [19], [20] calculation considering the ambient conditions. An efficient and reliable OpSA is paramount for the secure operation of the modern power system, where operators can take effective control action quickly and avoid inaccurate, missed or delayed control actions, which can lead the system to a cascade failure.
A. Level 1: Substation Security Assessment (SSA)
Each substation in the transmission network contributes and is critical to the overall power system operation, where the protection schemes and control devices are established. All the control actions taken by the operators at the ECC are employed on the Substations. SSA is based on the substation voltage. In D-DSA Level 1, each substation’s security is based on individual characteristics, as shown in Fig. 4. The characteristics function parameters of the low voltage portion are based on the P-V curve [21] as shown in Fig. 5. Each load substation P-V curve is unique. The voltage limits are set considering the maximum load factor (
Substation security assessment (SSA) characteristic at Level 1 of the D-DSA. The functions are calibrated for each substation.
Substation security assessment (SSA) at Level 1 of the D-DSA for load substations based on the P-V curve [21].
Each Substation voltage is estimated accurately and efficiently by the D-LSE [6], where bad, noisy or missing substation voltage measurements can occur. Thus, the D-LSE voltage values are the most accurate state values available at the ECC. The substation’s connectivity to the network derived from the H-TNTP-PMU is considered, and if the substation is not connected to the network, the substation is omitted from the aggregation.
B. Level 1: Transmission Line Security Assessment (TSA)
The transmission lines in the network are the critical power-carrying bridges from the generation to load centers. Substations are the two ends of the transmission line where the protection and controls are established. Each transmission line current is measured. The critical security factor of the transmission lines is the current carrying capacity of the conductor. The current carrying capacity of the conductor defines the amount of power that can be transmitted through at the rated voltage. The characteristic based on the normalized current (
Transmission line security assessment (TSA) characteristic at Level 1 of the D-DSA.
The transmission line’s connectivity to the network is identified from the H-TNTP-PMU. The transmission line ratings are susceptible to weather factors, including ambient temperature and wind speed [19]. The AAR current (\begin{align*} I_{AAR}& = f(Temperature, Wind~Speed) \times I_{Rated} \tag {1}\\ I_{N}& = \dfrac {I_{Measured}}{I_{AAR}} \tag {2}\end{align*}
C. Level 2: Area Security Assessment (ASA)
The ASA is derived utilizing both SSA and TSA information. The FIS based on the T-S modeling approach [16] is considered for the fusion of the individual SSIs to establish an ASI-SSI and the fusion of individual TSIs to establish an ASI-TSI. The T-S FIS is a fuzzy logic system designed to model complex systems with high accuracy, which is particularly useful in decision-making processes due to its ability to handle nonlinearities and uncertainties effectively, similar to the security assessment addressed in this paper. Unlike the traditional Mamdani-type FIS, the T-S FIS uses fuzzy rules with fuzzy sets. In the defuzzification, the consequent is calculated using the mathematical function shown in (3), where \begin{equation*} Fused~Security~Index = \dfrac {\sum _{j = 1}^{Q} W_{j} \times Z_{j}}{\sum _{j = 1}^{Q} W_{j}} \tag {3}\end{equation*}
The estimation of the activation level of the \begin{equation*} W_{j} = \prod _{i=1}^{n} \mu (i,j) \tag {4}\end{equation*}
For example, in a system with two inputs. Input 1 is “Medium” with a degree of membership at 0.3 and “Normal” with a degree of membership at 0.7. Input 2 is “Low”, with a degree of membership at 1. Under this circumstance, two rules will be fired. Rule 1 is “Input 1 is Medium, and Input 2 is Low” with an activation level of 0.3 (
1) Area Level Substation Security Assessment (ASI-SSI)
All substation SSIs are fused to derive ASI-SSI with the T-S FIS approach [16]. The size of the FIS significantly increases with the number of input SSIs (number of substations in the area). Thus, a simplification technique proposed in [22] is adopted.
The input levels through the membership functions are used to define the rules. Assuming there are r inputs and each input has three levels (Low, Medium and High, as shown in Fig. 7), \begin{equation*} p = 0.5r^{2}+1.5r+1 \tag {5}\end{equation*}
Input membership functions with three levels (Low, Medium and High) for the FIS fusion to derive ASI-SSI (from SSIs), ASI-TSI (from TSIs), ASI (from ASI-SSI and ASI-TSI), NSI-SSI (from ASI-TSIs), NSI-TSI (from ASI-TSIs) and NSI (from NSI-SSI and NSI-TSI).
2) Area Level Transmission Line Security Assessment (ASI-TSI)
The area transmission line security index (ASI-TSI) follows the same methodology as the ASI-SSI and derives the ASI-TSI for the respective area, considering the transmission lines belong to each area. Finally, at Level 2, the ASI-SSI and ASI-TSI are fused together with the FIS to derive ASI for the area.
D. Level 3: Network Security Assessment (NSA)
The power system NSA at Level 3 is based on all ASA at Level 2. All ASI-SSIs are integrated together with T-S FIS to estimate NSI-SSI, and all ASI-TSIs are integrated together using the T-S FIS to estimate NSI-TSI. Finally, a single NSI is calculated by the fusion of NSI-SSI and NSI-TSI. All the fusions are conducted utilizing the T-S FIS with reduced rules technique described in Section II-C1. The flow diagram shown in Fig. 8 illustrates the online implementation of D-DSA with the D-LSE and H-TNTP-PMU approach proposed by this paper.
Implementation of D-DSA
This study considered two power system models, The modified two-area four-machine power system and the IEEE 68 bus power system, an equivalent reduced order model of the interconnected NETS and NYPS, for implementing the D-DSA. SSA, TSA, ASA and NSA are implemented. The IEEE 68 bus power system demonstrates the scalability of the proposed D-DSA.
A. System 1: Modified Two-Area Four-Machine Power System
The Kundur’s two-area four-machine power system model [23] is a two-area symmetric system model used for transient stability analysis. Kundur’s system (the modified two-area four-machine benchmark power system) has been modified in this study, consisting of ten generators in four power plants and two additional solar power plants as generations. Power Plant 1 at substation 5 in Area 1 consists of three identical generators. Power Plant 2 at Substation 6 in Area 1 consists of two identical generators. Apart from that, Area 1 has one solar plant connected to Substation 7. In Area 2, similar to Area 1, two conventional power plants and one solar plant are established. The system contains seven loads at Substations 5L, 6L, 7L, 9L,10L, and 11L. Two double-circuit tie-lines connect this multi-area power system. All conventional generators are configured with turbine governors, automatic voltage regulators, and power system stabilizers. The establishment of H-TNTP-PMU in the modified two-area four-machine system is elaborated in [5]. The D-LSE implementation and the analysis of the system are described in [6]. In the D-DSA, each substation voltage estimation from D-LSE is used for SSA and PMU current measurement from the transmission line is used for TSA. The H-TNTP-PMU provides an accurate topology of the network at every PMU data frame, which is used for fusion in D-DSA by only considering available transmission lines and substations in the network.
B. System 2: IEEE 68 Bus Power System
The IEEE 68 bus power system model shown in Fig. 10 [24] consists of five interconnected areas, which is considered to illustrate the scalability of the D-DSA. Furthermore, the implementation of the D-LSE on the IEEE 68 bus system model is explained in [6]. Area 1 consists of generators G1 through G9. Area 2 consists of generators G10 through G13. Furthermore, Areas 3,4 and 5, respectively, consist of G14, G15 and G16. Area 1, 2, 3, 4 and 5 comprise 27, 22, 1, 1 and 1 substations, respectively, excluding generator substations. Areas 1, 2, 3, 4, and 5 have 17, 15, 1, 1, and 1 loads, respectively. The system operates at 345kV nominal voltage other than the generator substations. All conventional generators are configured with turbine governors and automatic voltage regulators. The simulation uses the RSCAD software on the Real-Time Digital Simulator (RTDS) [25]. RSCAD software PMUs are utilized for this study. The IEEE 68 bus power system model illustrates the scalability of the proposed approach.
Modified two-area four-machine power system model illustrating the test cases, including area separation (Substation 8 isolation) and the transmission line TL1111L outage.
IEEE 68 bus Benchmark System [24] illustrating the test cases of Substation 39 isolation and the transmission line TL54-53 tie line outage.
A comparison of the D-DSA FIS structure size is shown in Table 4, where
Results & Discussion
The D-DSA results are presented for the modified two-area four-machine and the IEEE 68 bus power systems. For each system, SSA, TSA, ASA and NSA were conducted. SSI, ASI-SSI, TSI, ASI-TSI, ASI, NSI-SSI, NSI-TSI and NSI are evaluated under several typical power system disturbances. Under all test cases in the qualitative assessment based on the quantitative index (SSI limits for
A. System 1: Modified Two-Area Four-Machine Power System
1) Case 1A: Critical Transmission Line Outage
The TL1111L transmission line serving a 300MW load is removed from the system. In D-DSA Engine - 1 (Network, Area and Component levels), D-LSE voltage estimated values and PMU measurements of the transmission line are used with the TNTP-SMRS. In D-DSA Engine - 2 (Network, Area and Component levels), D-LSE voltage estimated values and PMU measurements of the transmission line are used with the H-TNTP-PMU. The test case removes TL1111L and isolates Substation 11L. The results for the SSA for all the substations of the two-area four-machine system under two D-DSA engines are shown in Fig. 11. The results for the TSA for all the transmission lines in Area 2 of the two-area four-machine system are shown in Fig. 12. The results for the ASA for both areas are shown in Fig. 13. A summarized security assessment results of the Network Level and case-relevant Area Level and Component Level for Actual (using ground truth measurements for substation voltages and transmission line currents with instantaneous topology update), SOTA (noisy measurements for substation voltages and transmission line currents with TNTP-SMRS), D-DSA Engine - 1, and D-DSA Engine - 2 approaches are shown in Fig. 14. Furthermore, the reduced rule set of the FIS for Area 1 of ASI-SSI is shown in Table 12.
Substation security assessment index for TL1111L transmission line outage under D-DSA with D-LSE only and D-DSA with D-LSE and H-TNTP-PMU approaches. Area 1 Substations are shown on the left. Area 2 substations are shown on the Right.
Transmission line security assessment index for TL1111L transmission line outage under D-DSA with D-LSE only and D-DSA with D-LSE and H-TNTP-PMU approaches. Area 2 Transmission Lines are presented.
Area Security assessment index for TL1111L transmission line outage under D-DSA with D-LSE only and D-DSA with D-LSE and H-TNTP-PMU approaches.
Security assessment index for TL1111L transmission line outage under Actual, SOTA, D-DSA Engine - 1 (Network, Area 2 and Substation 11) and D-DSA Engine - 2 (Network, Area 2 and Substation 11) approaches.
Furthermore, root mean square error (RMSE) analysis using (6) is conducted for all test cases discussed above. S refers to the number of data samples in the considered window, and \begin{equation*} RMSE = \sqrt {\frac {1}{S}\sum _{i = 1}^{S} (NSI\_Actual_{i} - NSI\_X_{i})^{2}} \tag {6}\end{equation*}
Based on the RMSE analysis for the data window shown in Fig. 14 (
2) Case 1B: Critical Substation Outage
Substation 8 connecting Area 1 and Area 2 is isolated by disconnecting TL78-1, TL78-2, TL89-1 and TL89-2. Area 1 and Area 2 automatic generation control [5], [26] is reconfigured for area standalone mode. A summarized security assessment results of the Network Level and case-relevant Area Level and Component Level for Actual (using ground truth measurements for substation voltages and transmission line currents), SOTA (noisy measurements for substation voltages and transmission line currents with TNTP-SMRS), D-DSA Engine - 1, and D-DSA Engine - 2 approaches are shown in Fig. 15. Based on the RMSE analysis for the data window shown in Fig. 15 (
Security assessment index for Substation 8 isolation case under Actual, SOTA, D-DSA Engine - 1 (Network, Area 2 and Substation 9) and D-DSA Engine - 2 (Network, Area 2 and Substation 9) approaches.
3) Case 1C: Load Change
The load change scenario considered here is sequential load increment in Area 1 and Area 2. Load 7 has increased by 300 MW; next, Load 9 has increased by 300MW. Area 1 and 2 generations have increased to satisfy the load increment and tie-line flow. The generation in Area 2 has to increase rapidly to satisfy the 300MW load without Area 1 support. The topology update has not occurred in the scenario. A summarized security assessment results of the Network Level and case-relevant Area Level and Component Level for Actual (using ground truth measurements for substation voltages and transmission line currents), SOTA (noisy measurements for substation voltages and transmission line currents with TNTP-SMRS), D-DSA Engine - 1, and D-DSA Engine - 2 approaches are shown in Fig. 16. Based on the RMSE analysis for the data window shown in Fig. 16 (
Security assessment index for load changes simulated by considering 300MW load increment in L7 and L9 sequentially under Actual, SOTA, D-DSA Engine - 1 (Network, Area 2 and Substation 9) and D-DSA Engine - 2 (Network, Area 2 and Substation 9) approaches.
4) Case 1D: Extreme Outage Condition
The extreme condition is that TL1111L reconnects to Substation 11 while Substation 8 is isolated. The generation in Area 2 has to increase rapidly to satisfy the 300MW load without Area 1 support since the Area 1 tie-line supply to Area 2 is disconnected due to Substation 8 isolation. The topology is updated twice for the Substation 8 isolation and reconnecting TL1111L to the system. A summarized security assessment results of the Network Level and case-relevant Area Level and Component Level for Actual (using ground truth measurements for substation voltages and transmission line currents), SOTA (noisy measurements for substation voltages and transmission line currents with TNTP-SMRS), D-DSA Engine - 1, and D-DSA Engine - 2 approaches are shown in Fig. 17. Based on the RMSE analysis for the data window shown in Fig. 17 (
Security assessment index for extreme conditions simulated by considering both Substation 8 outage and TL1111L outage in sequence Actual, SOTA, D-DSA Engine - 1 (Network, Area 2 and Substation 9) and D-DSA Engine - 2 (Network, Area 2 and Substation 9) approaches.
B. System 2: IEEE 68 Bus Power System
The IEEE 68 bus power system model simulation and D-DSA implementation are based on the system shown in Figure 10. The IEEE 68 bus system demonstrates the scalability of the D-DSA.
1) Case 2A: Critical Transmission Line Outage
The TL54-53 tie-line is removed from the system, introducing a disturbance to the power system. The topology is updated to reflect TL54-53 outage. A summarized security assessment results of the Network Level and case-relevant Area Level and Component Level for Actual (using ground truth measurements for substation voltages and transmission line currents), SOTA (noisy measurements for substation voltages and transmission line currents with TNTP-SMRS), D-DSA Engine - 1, and D-DSA Engine - 2 approaches are shown in Fig. 18. Based on the RMSE analysis for the data window shown in Fig. 18 (
Security assessment index for TL54-53 transmission line outage under Actual, SOTA, D-DSA Engine - 1 (Network, Area 2 and Substation 53) and D-DSA Engine - 2 (Network, Area 2 and Substation 53) approaches.
2) Case 2B: Substation Outage
Substation 39 in Area 2 is isolated by disconnecting TL44-39 and TL45-39. The topology has been updated to reflect the outages of TL44-39, TL45-39, and Substation 39. A summarized security assessment results of the Network Level and case-relevant Area Level and Component Level for Actual (using ground truth measurements for substation voltages and transmission line currents), SOTA (noisy measurements for substation voltages and transmission line currents with TNTP-SMRS), D-DSA Engine - 1, and D-DSA Engine - 2 approaches are shown in Fig. 19. Based on the RMSE analysis for the data window shown in Fig. 19 (
Security assessment index for Substation 39 isolation case Actual, SOTA, D-DSA Engine - 1 (Network, Area 2 and Substation 45) and D-DSA Engine - 2 (Network, Area 2 and Substation 45) approaches.
3) Case 2C: Extreme Outage Condition
The extreme condition is that Substation 39 is removed, and TL54-53 is disconnected sequentially. The topology is updated twice for the Substation 39 isolation and disconnection of the TL54-53 transmission line from the system. A summarized security assessment results of the Network Level and case-relevant Area Level and Component Level for Actual (using ground truth measurements for substation voltages and transmission line currents), SOTA (noisy measurements for substation voltages and transmission line currents with TNTP-SMRS), D-DSA Engine - 1, and D-DSA Engine - 2 approaches are shown in Fig. 20. Based on the RMSE analysis for the data window shown in Fig. 20 (
Security assessment index for extreme conditions simulated by considering both above outages in sequence under Actual, SOTA, D-DSA Engine - 1 (Network, Area 2 and Substation 53) and D-DSA Engine - 2 (Network, Area 2 and Substation 53) approaches.
C. Visualization
One of the main objectives of the DSA tools is to provide a simple but comprehensive understanding of the power system state to the ECC operators. The DSA visualization enables this goal. A suggested visualization for the ECC operator is shown in Fig. 21. The visualization snapshot has been taken for test case 1A at the
Substation Security assessment visualization for ECC operator with all the security indexes demonstrated for the two-area four-machine power system model under TL1111L transmission line outage (Case 1A: Critical Transmission Line Outage). The snapshot is at the 68th PMU frame.
The D-DSA can be conducted at every PMU frame for automatic systems. However, that update rate for ECC visualization is impractical for a human to understand. The authors suggest that the index values on the visualization can be held for 30–60 s. Thus, the ECC operators can understand the system state and take the best course of action. The visualization at the human-readable rate can bypassed to be updated instantaneously based on the least index values (if the system getting into a substandard system state). Thus, priority is given in the order: Emergency, Alert and Normal. Furthermore, the Alert and Emergency State can be registered as another additional alarm in the EMS alarm records. Due to the hierarchical architecture of the D-DSA, the visualization can be adapted easily at substations, area control centers or network control center. Furthermore, under insecure network conditions, tracking down the malfunctioning substation, transmission line, or area is simple and straightforward with a hierarchical visualization. This directly improves the efficiency of the control actions to mitigate the insecure state or, in the worst-case scenario, deploy field teams for maintenance.
D. Discussion
A summarized list of mitigation for the SOTA shortcomings with the D-DSA is shown in Table 5. The measurement quality and availability are improved with the integration of the D-LSE. Furthermore, the network model accuracy and reliability are ensured by integrating H-TNTP-PMU. Both these foundational applications improve the accuracy of the D-DSA. RMSE analysis for each test case is summarized in Table 6. The RMSE for the D-DSA Engine 2 is lower compared to the SOTA and D-DSA Engine 1 for all test cases, which illustrates improved accuracy of the D-DSA architecture with the H-TNTP-PMU and D-LSE (D-DSA Engine - 2).
The computational overhead estimated for 50 trials on an Intel Xeon(R) Gold 3.3 GHz system with 63.7 GB RAM for all test cases of System 1 under the three approaches at different levels is shown in Table 7. Table 7 demonstrates the improved efficiency of the proposed approach that used D-LSE and the H-TNTP-PMU. The fundamental objective is to develop an assessment tool that can be completed for every PMU data frame, which requires the foundational applications to be completed in the same time frame. The computational time details for D-LSE and H-TNTP-PMU can be found in [5] and [6], respectively. It is important to mention that the computational time is based on the computational platform utilized and the computational architecture. Utilizing parallel processing with SOTA good processing units can help to achieve better efficiency.
Conclusion
Modern power system security is critical due to the increased dynamicity introduced by renewable generations and active distribution systems. Traditional methods based on applications, such as transmission network topology processing based on supervisory control and data acquisition system monitoring of relay signal and linear state estimation, are inefficient and not scalable. The inefficiency of the foundational applications directly limits the performance of the dynamic security assessment tool. This paper proposed a distributed dynamic security assessment tool that leverages hierarchical efficient and reliable transmission network topology processing with an efficient, resilient, and robust multi-level distributed linear state estimation. The three-level D-DSA architecture delivers the qualitative and quantitative security assessment of each component, each area and the network. The experiments conducted on two distinct test systems illustrate the performance of D-DSA, thus enabling its usage for real-time operation. The proposed D-DSA demonstrates improved accuracy, scalability, and computational efficiency, which enables an online application in every PMU data frame. A simple but comprehensive visualization is suggested, where the energy control center operator is informed of the qualitative security state of the power system (Normal, Alert or Emergency) with the quantitative security index and can easily locate any insecure areas or components. D-DSA provides a comprehensive power system dynamic security assessment that enhances operational situational awareness. Future work includes integrating generation units (conventional and renewable) and transformers at the component level of the D-DSA to enhance the comprehensive understanding of power system security.
ACKNOWLEDGMENT
Any opinions, findings, and conclusions or recommendations expressed in this material are those of author(s) and do not necessarily reflect the views of NSF and Duke Energy.