Share

WG Area

This section is dedicated to the daily activities of the different SC D2 working bodies. A place to put, retrieve and store information related to the development of the work, maintains the contact details of members and invited experts and, in general, whatever use could be decided by each team.

A password is needed to access each Working Group, password that will be distributed by the Convener or Secretary of each entity.

Summary

D2.40 Cyber risks and cyber security for the next generation of digital systems in Electric Power Utilities

This WG follows the work delivered in 2014 by WG D2.31 (Security architecture principles for digital systems in Electric Power Utilities (EPUs)). WG D2.31 has clarified security architecture principles in 3 main areas: “Graded Security“ approach, modelling of cyber-attacks and remote services.

The focus of this new working group is to build on and deepen the conclusions made by WGD2.31. The scope of this work will cover the discussion of general security architecture principles for digital systems, but will mainly focus on upcoming application, connectivity and requirements of digital systems in EPUs and hence cover the evolving technology and continuous rise in the risk landscape.

D2.43 Enabling software defined networking for EPU telecom applications

Consideration of Software Defined Network (SDN) is an extension to the growing adoption of virtualization within the EPU in solving new challenges such as distributed energy resources (DER) which benefit from an agile infrastructure and network.  

The IEEE P1915.1™ standard specifies security framework, models, analytics, and requirements for Software Defined Networking and Network Function Virtualization (SDN/NFV) and addresses security models, terminology, and analytics, essential components of SDN/NFV environments to ensure confidentiality, integrity and availability.  As utility interest in SDN/NFV technologies is growing, it will be very important for utilities to be aware of the cybersecurity implications of using these technologies.

Overall the scope of this working group is to produce a framework of guidelines for an EPU to tailor procurement, deployment, and management of SND/NFV technologies.

JWG D2/B2.39 "Design, deployment and maintenance of Optical Cables associated to Overhead HV Transmission Lines"

Optical cables associated to overhead HV transmission lines have become the main medium to support the telecommunications needs of HV Power utilities (Operation, Protections, Maintenance…).

The aim of this JWG is to produce practical guidelines according to the experience of different power utilities in the design and deployment of HV line optical cables and their maintenance.  These guidelines will focus on OPGW cables as well as on OPPC cables. 

D2.44 Usage of public or private wireless communication infrastructures for monitoring and maintenance of grid assets and facilities

Wireless communication services delivered over either public or private infrastructures open the way for many new monitoring and maintenance applications in the power system. Large scale collection of non-time-critical data across the grid renders possible a more proactive approach to asset life-cycle management and to the monitoring and surveillance of technical sites. Field worker personal communication terminals may be used for local wireless connection to intelligent substation assets for identification, status collection, or local measurements. The field worker may connect to remote data servers for obtaining further information on the asset or on the larger system in order to undertake more appropriate actions. Still the same field worker may need technical support and more specific expertise, inside or outside the utility perimeter, and may hence connect through his terminal to central support platforms. Communication is a central issue in all these contexts: reachability with adequate throughput is the enabling factor for new operation processes in the asset maintenance and system monitoring paradigm.

D2.45 Impact of governance regulations and constraints on EPU sensitive data distribution and location of data storage

The scope of this working group is to produce guidelines for assessing the impact of governance regulations and constraints on EPU sensitive data distribution and location of storage.

D2.46 Cybersecurity: future threats and impact on Electric Power Utility organizations and operations

The cybersecurity threat landscape is rapidly evolving. EPUs need a prediction of the evolution of these threats, the corresponding changes to local laws and regulations, and the need for standardization. The planning horizon for these estimates should be divided between the near term (next 10 years) and the long term (next 20 years). The assessment of the impact should include recommended changes to EPU cybersecurity policies, procedures and organizational directives, and recommended solutions to improve the security posture of EPU organizations and operations.

JWG D2/C6.47 Advanced consumer-side energy-resource management systems

The amount of “active” Distributed Energy Resources (DER), including various types of electricity generation and storage is constantly growing and constitutes already a notable part of total installed capacity and consumed energy in many countries. Taken together with more traditional “passive” DER like consumer controllable loads and recent electrical vehicles-to-grid technology these resources can potentially provide many advantages both to Electric Power Utilities (EPUs) and consumers. Currently a major part of these DER do not play an active and positive role in a power system. Often they are forced to work autonomously, or with restricted power injection towards EPU networks. Main reasons for these limitation reside in the technical complexity of control of a huge amount of DER and due to the lack of residential market instruments, motivating DER owners to provide energy services.

Recent advances in Industrial Internet of Things, Blockchain and other new information and communication technologies (ICT), as well as methodology and experience gathered e.g. in Transactive Energy pilot projects, provide a potential platform to deal with the DER control challenge.