Publication | Closed Access
Methodology for a Security/Dependability Adaptive Protection Scheme Based on Data Mining
99
Citations
2
References
2011
Year
EngineeringInformation SecuritySecurity AssessmentData Mining SecurityHardware SecuritySecurity ModellingReliability EngineeringScada SecurityData ScienceData MiningPower System RestorationReliable Power SystemSystems EngineeringPower SystemsProtection RelaysComputer EngineeringPower System StateComputer ScienceSmart Grid SecurityPower System ProtectionData SecurityCryptographySmart GridPower System ReliabilitySecuritySecurity MeasurementComputer Security Model
Recent blackouts offer testimonies of the crucial role played by protection relays in a reliable power system. It is argued that embracing the paradigm shift of adaptive protection is a fundamental step toward a reliable power grid. The purpose of this paper is to present a methodology to implement a security/dependability adaptive protection scheme. The advocated methodology aims to reduce the likelihood of manifestation of hidden failures and potential cascading events by adjusting the security/dependability balance of protection systems. The proposed methodology is based on wide-area measurements obtained with the aid of phasor measurement units. A data-mining algorithm, known as decision trees, is used to classify the power system state and to predict the optimal security/dependability bias of a critical protection scheme. The methodology is tested on a detailed 4000-bus system.
| Year | Citations | |
|---|---|---|
Page 1
Page 1