Thursday, November 15, 2018

IEC 61850 Seminar in INDIA CHENNAI 19 Nov, VADODARA 21 NOV

Dear All,

Please note the invitation to a great Seminar by Andrea Bonetti in INDIA
- CHENNAI 19 Nov
- VADODARA 21 NOV

Click HERE for details.

Saturday, November 3, 2018

IEC 61850 Tissue Data Base - In Operation Under IEC

The IEC 61850 Tissue Data Base is in operation again - now under IEC Logo.

Click HERE for accessing the Data Base:



The registration as a new user will be possible soon.

Enjoy the crucial resources.

Monday, October 8, 2018

IEC 61850-7-1 CDV Amendment 1 available for comments

The Amendment 1 of IEC 61850-7-1 is now available for comments and voting:

Communication networks and systems for power utility automation –
Part 7-1: Basic communication structure – Principles and models

IEC TC 57 just published the document 57/2035/CDV.

Ballot closes 2018-12-28.

The CDV is publicly available for comments for everybody:

Click HERE for Public CDV Commenting - you just need to register.

Please note the following:

The distributed CDV reflects the amendment 1 (corrections and extensions) to IEC 61850-7-1 Ed2.

A second document (called consolidated edition 2.1) incorporates the amendment 1 (120 pages) and the existing Ed2. The consolidated edition (195 pages) is circulated as 57/2036/INF (unfortunately not publicly available).
After the CDV/FDIS approval process the consolidated version will be published together with the amendment 1 under reference IEC 61850-7-1 Ed2.1.

The version 2.1 will introduce the latest modelling extensions.

The new version of IEC 61850-7-1 will be one of the most crucial documents of the standard series IEC 61850. As the editor of edition 1 I see that most of the content of the version 1 is still the basic information presented in this part 7-1 😊

This document shows also that the standard series is growing and getting quite complex ... for simple applications you need to understand what is mandatory and what is optional!

Monday, September 17, 2018

Technical Report Considering Protection IEDs with Digital Inputs and Output under way


The IEC TC 95 Ad Hoc Working Group 3 (AHG3 meeting in Nanjing this week) 


is discussing the scope of a new document with the following Scope;

This Technical Report aims at considering protection IEDs with digital inputs and output complying with IEC 61850 and IEC 61869 standards, in particular 
  1. subscribing streams of digital Sampled Values (SV) representing energizing inputs of the protection function.
  2. subscribing GOOSE and/or reports by the protection function (eg. cb position, cb failure).
  3. publishing GOOSE messages (e.g. trip orders).
  4. subscribing time synchronization information.
On this base, this document will give recommendations and guidelines concerning requirements and testing of protection IED with digital inputs and outputs within TC95.

Requirements regarding characteristics of the communication network are not within the scope of this Technical Report. Delays and jitter due to the network have to be taken into account by network engineering. Figure 1 below shows the functional chain of a protection function.  This Technical Report only considers the data received and publish by the protection IED as shown in figure below. 

More to come ...

Monday, September 10, 2018

IEC 61850 Applications in Germany - DKE Documents Online for Free Download

The German National Committee of IEC TC 57 (DKE K 952) has many members of various Working Groups (in the national as well as in the international groups) that discussed the IEC 61850 standard series in general and particularly how the standards could be applied to substation automation and protection. One of the key issues is the modelling and configuration using SCL.

Several documents in German and in English are available:



Click HERE for the link to the above page.

Enjoy the documents.

Tuesday, July 24, 2018

Cyber Security for Industrial Control Systems (ICS) is Going Where?

Cyber Security for Industrial Control Systems (ICS) has been discussed over many years - and it will be discussed forever. There seems to be no end of discussions and solutions ... the end may come when electric power will be switched off - caused by insecure systems.

As long as we have ICS in operation - which is very crucial! - we will see products being developed and offered that are marketed to safe the world of ICS.

Dale Peterson wrote a very nice and interesting article about "The Future of the ICS Cyber Security Detection Market" (23 July 2018).

Dale seems to expect that the ICS Cyber Security Detection Market will completely change in a few years. He may be right. My expectations is that the change will happen for ever - and ever faster.

So, you may decide to wait! This would be the worst decision you can make.

Whatever is available for your system today - use it! The wait for getting started with, e.g., encrypted ICS protocols is over - use TLS wrapper as much as possible - as soon as possible.

Click HERE for the complete article - worth to read.

Our power system highly depend on ICS - ICS highly depend on power systems. The two can live together only. Non of the two will survive without the other!!

I hope we have enough people to understand that we need more smart people to keep power flowing: means electrical engineers and IT experts ... and ...

My recommendation is that we need to get a better holistic understanding how power systems and ICS are interdependent ... we should not isolate one from the other ... already understood some hundred years ago:

"Hence we must believe that all the sciences are so interconnected, that it is much easier to study them all together than to isolate one from all others. If, therefore, anyone wishes to search out the truth of things in serious ernest, he ought not to select one special science, for all the sciences are cojoined with each other and interdependent."
Rene Descartes (1596-1650)

Finally we will have to accept that reliable electric power will be more expensive soon - moderate increased price in case we care about ICS Cyber Security - extremely expensive if we fail to protect the power system.


New Smart Grid Controller with IEC 61850, IEC 61850-5-104, and DNP3

System Corp (Perth/Australia) offers a new very powerful Smart Grid Controller for applications in:

  1. Secondary Substation Control
  2. Transformer and Asset Management
  3. Micro Grid Control and Automation
  4. Data Gateway Application
  5. IoT and Cloud Service Interfacing




Click HERE for more details.

Thursday, July 19, 2018

HMS Networks AB takes over Beck IPC

HMS has taken over the German based company Beck IPC. Beck IPC has a range of products providing IEC 61850, IEC 60870-5, and DNP3 connectivity - I have reported about their products from time to time ... just search for Beck on the blog.

Click HERE for the HMS press release.

HMS (IXXAT) sells some of the Beck com.tom (as Gateways):

Click HERE for Beck com.tom products with above standards implemented.
Click HERE for HMS Gateway products with above standards implemented.

Saturday, July 14, 2018

IEC TC 57 just published FDIS IEC 61850-8-2 (Mapping to XMPP)


IEC TC 57 just published FDIS IEC 61850-8-2 (Mapping to XMPP) - 253 pages !

(57/2020/FDIS)

Voting ends: 2018-08-24

Part 8-2: Specific communication service mapping (SCSM)
– Mapping to Extensible Messaging Presence Protocol (XMPP)

The long wait for a second SCSM is over!

The new mapping of IEC 61850 describes a specific communication service mapping
(SCSM) over the Extensible Messaging and Presence Protocol (XMPP), providing detailed
information on how to create and exchange concrete communication messages that
implement abstract services and models specified in IEC 61850-7-4, IEC 61850-7-3, and
IEC 61850-7-2.

Note that the MMS messages (defined using ASN.1) are used in IEC 61850-8-1 AND -8-2 ! The only crucial difference between the two message and model mappings (in 8-1 and 8-2) is this:

8-1 uses BER (Basic Encoding Rule) for the messages on the wire, while 8-2 uses (XER (XML Encoding Rule). The complexity of the MMS messages is the same in both mappings - because the structure and how to build messages and how to carry the 7-2 services and 7-x models are the same!

The challenges to implement 8-2 message mapping are more or less the same as with 8-1. Note that the messages in XER are far longer than with BER.

There is - of course - a difference between the two: The transport of messages in 8-2 uses XMPP.

Some may argue, that there are more tools available for XER than for BER. Ok.

IEC 61850-8-2 is far away from something simple and easy to implement and use - especially when you need only a few simple services and models.


WOW -- IEC 61850 Models Publically Available for Download

After long time, IEC has accepted to provide free online access to the IEC 61850 Models!!

Congratulation!

Excerpt from 57/2023/INF (2018-07-13):

"With IEC 61850-7-7, a machine processable format for the distribution of IEC 61850 data models has been defined. Based on that, in the future, all IEC 61850 models will be as well available in this format as namespace files (NSD files).
The namespace files are code components, that are intended to be directly processed by a computer. The purchase of the associated IEC standard carries a copyright license for the purchaser to sell software containing Code Components from this standard to end users either directly or via distributors, subject to IEC software licensing conditions, which can be found at: http://www.iec.ch/CCv1. ..."

Screenshot from the TC 57 Supporting Documents page:



Click HERE to get to the above page.

Sunday, July 8, 2018

First Draft IEC 61850-90-16 Requirements for System Management for IEC 61850

The first Draft on IEC 61850-90-16 (97 pages) has been published (57/2014/DC):

Requirements for System Management for IEC 61850

"The distribution grid is facing a massive roll out and refurbishment of automation equipment to
implement deeper monitoring and new smart grid applications. The new equipment to be deployed in order to solve today’s issues (MV voltage and reactive power regulation for example) will necessarily have to be adjustable and upgradeable in order to face challenges of tomorrow (for example massive electric vehicles fleets, low voltage automation, …) which will arrive long before the end of its 20 years’ service life. Furthermore, there is a necessity for the equipment to adapt to the evolving and growing cybersecurity threats.
The equipment will therefore need to be patched, updated and reconfigured, and this has to be done remotely due to the great number of equipment. This is a cornerstone of the System Management (SM), which refers to functionalities that are not directly linked to the operational role of the equipment but allow it to perform its operational functions in the best conditions possible. Smart Grid Devices Management also includes other functions such as asset management or supervision.
These functionalities need to be managed by the grid operator and address multiple devices from different vendors through independent Information Systems and thus the requirements and exchanges need to be standardized. As these are to be applied to IEC 61850 compliant equipment, these mechanisms need to be integrated in the standard. ..."

Comments are due by 2018-09-28

Role-based Access Control - On its way to become Standard

IEC 62351-8 is on its way to become an IEC Standard (57/2017/CD):

Power systems management and associated information exchange – Data and communications security –
Part 8: Role-based access control

The part 8 is currently a Technical Specification. This will change in the next step.

The 62 page CD has been published for commenting until 2018-09-28

"This document provides standard for access control in power systems. The power system
environment supported by this standard is enterprise-wide and extends beyond traditional
borders to include external providers, suppliers, and other energy partners. ...

The following interactions are in scope:

  • local (direct wired) access to the object by a human user;
  • local (direct wired) access to the object by a local and automated computer agent, e.g. another object at the field site;
  • direct access by a user to the object using the objects’ built-in HMI or panel;
  • remote (via dial-up or wireless media) access to the object by a human user;
  • remote (via dial-up or wireless media) access to the object by a remote automated computer agent, e.g. another object at another substation, a distributed energy resource at an end-user’s facility, or a control centre application."

Wednesday, July 4, 2018

IEEE Spectrum July 2018: 6 WAYS IoT IS VULNERABLE

IEEE Spectrum 2018-07 publishes an opinion by Stacey Higginbotham about the vulnerability of IoT devices and systems:

6 WAYS IoT IS VULNERABLE

Here is an excerpt of the six reasons why security for the Internet of Things (IoT) is different from—and more difficult to tackle than—traditional IT security:

  1. We’ve raised the stakes by connecting more physical systems and facilities to wireless networks -> Consequences of failure are more dire.
  2. IoT security is a special challenge:The adversaries are unlike any we’ve seen before.
  3. For traditional IT system, one can count on the software company’s support for a
    set amount of time. What we see: it could be 10 years, 7, 3, 2, or even 0 ...
  4. A connected product that generates a small profit may require years of updates, patches, and security evaluations.
  5. Many connected devices are built with software, hardware, and firmware that are created
    by different companies and pieced together at the end. It takes only one weak link to create a vulnerability ...
  6. Many connected devices live in environments unlike any IT system. In a home, there’s no IT manager to push patches to a connected fridge. And in an industrial setting, patching one machine might cause it to stop working with other equipment on the line.

I would summarize the challenge as follows:

IoT devices and systems require in principle the same attention, efforts and resources like traditional IT systems. The sheer unlimited number of interconnected IoT devices will work securely only if we except to spend much more money than what the market expects!

Or: Today´s solutions will be the problems of tomorrow.

Click HERE for the complete document (1 page).



Real-time Access to German Generation and Consumption of Electricity


You have real-time access to the German generation and consumption of electricity:




Click HERE for the real-time data access.



Monday, July 2, 2018

Version 2 des OE/BDEW-Whitepaper Anforderungen an sichere Steuerungs - und Telekommunikationssysteme


Version 2 des OE/BDEW-Whitepaper (komplett ĂŒberarbeitete Version!; 80 Seiten):

Anforderungen an sichere Steuerungs - und Telekommunikationssysteme
(Requirements for Secure Control and Telecommunication Systems)

verfĂŒgbar

Click HIER fĂŒr den Zugriff auf das gesamte Dokument.

"Das vorliegende Dokument definiert grundsĂ€tzliche Sicherheitsanforderungen fĂŒr Steuerungs- und
Telekommunikationssysteme fĂŒr die Prozesssteuerung in der Energieversorgung und gibt
AusfĂŒhrungshinweise zu deren Umsetzung. Hierzu werden von Fachexperten zusammengestellte,
aktuelle und branchenspezifische Empfehlungen zur Sicherstellung der Informationssicherheit
aufgefĂŒhrt.
Das Whitepaper definiert Anforderungen an Einzelkomponenten und fĂŒr aus diesen Komponenten
zusammengesetzte Systeme und Anwendungen. ErgÀnzend werden auch Sicherheitsanforderungen
an Wartungsprozesse, Projektorganisation und Entwicklungsprozesse behandelt.
Fokus dieses Dokuments sind die im Rahmen der Beschaffung zu berĂŒcksichtigenden Anforderungen
an technische Komponenten und Systeme und fĂŒr die Projektabwicklung relevanten Prozesse.
Ebenso wichtig sind organisatorische Sicherheitsmaßnahmen im Unternehmen, wie der
Aufbau einer Sicherheitsorganisation, ein angemessenes Risikomanagement oder die Schaffung
eines umfassenden Sicherheitsbewusstseins bei den Mitarbeitern (Security Awareness). Diese
organisatorischen Anforderungen stehen nicht im Fokus des Whitepapers, hierzu sei insbesondere
auf die Normen ISO/IEC 27001 und ISO/IEC 27019 verwiesen.
Das vorliegende Dokument ist eine vollstĂ€ndig ĂŒberarbeitete Neuauflage des BDEW Whitepapers
und der zugehörigen AusfĂŒhrungshinweise von Oesterreichs Energie und BDEW. Beide Dokumente
wurden zusammengefĂŒhrt und die Inhalte gemĂ€ĂŸ aktuellen Technologienentwicklungen
umfassend aktualisiert und ergÀnzt."

Die englische Version wird in KĂŒrze erscheinen.

Die hier beschriebenen Anforderungen haben erheblichen Einfluss auf Unternehmen im Kontext der Energieversorgung: mehr Mitarbeiter und mehr technische Hilfsmittel, mit denen die Anforderungen erfĂŒllt werden könnten - und damit höhere Kosten!

Wednesday, June 27, 2018

New Title of IEC TC 57 WG 17

The new title of IEC TC 57 WG 17 is:

“Power system intelligent electronic device communication and
associated data models
for microgrids,
distributed energy resources and
distribution automation

Monday, June 18, 2018

Séminaire PowerOn Dakar Sénégal 18 et 19 Juin 2018

Cet Ă©vĂšnement vous permettra de partager des connaissances et de rencontrer des experts et spĂ©cialistes de diffĂ©rents horizons afin d’Ă©changer sur les solutions aux problĂšmes que vous rencontrez, les outils de mesures-test-diagnostic des Ă©quipements Ă©lectriques, et d’obtenir de l’aide ou des conseils, ou simplement dĂ©couvrir les nouvelles techniques innovantes disponibles pour tester les transformateurs et autres Ă©quipements des postes HT.

Header-eMailing-Dakar1.jpg

  • Protection des rĂ©seaux :
  • CEI 61850 et RĂ©seaux Ă©lectriques intelligents : impact sur les spĂ©cifications, essais et maintenance des postes Ă©lectriques. PrĂ©sentĂ© par Andrea Bonetti.
  • Protection DiffĂ©rentielle des transformateurs : influence physique des relais sur les transformateurs. PrĂ©sentĂ© par Andrea Bonetti.
  • Plan de protection : mesure de l’impĂ©dance de ligne. PrĂ©sentĂ© par Andrea Bonetti.
  • Charge filerie : mesure d’impĂ©dance avec le SVERKER. PrĂ©sentĂ© par Andrea Bonetti.
  • VĂ©rification des TC/TP. PrĂ©sentĂ© par Mamadou Keita.
  • EfficacitĂ© de la Maintenance :
  • Informatisation du Suivi de Parc et de la Gestion des donnĂ©es de test
  • RĂ©seaux Souterrains :
  • Localisation de dĂ©fauts de cables. PrĂ©sentĂ© par Adeola Adebomi.
  • Diagnostic des cĂąbles souterrains. PrĂ©sentĂ© par Adeola Adebomi.
  • Transformateurs de puissance :
  • Test et Diagnostic. PrĂ©sentĂ© par Mamadou Keita.
  • Et bien d’autres thĂšmes qui seront abordĂ©s basĂ©es sur le retour d’expĂ©riences terrain

 Nous serions honorĂ©s de votre prĂ©sence et nous vous remercions de cliquer ci-dessous pour vous enregistrer.
Pour toute autre question, n’hĂ©sitez pas Ă  nous contacter.

http://fr.megger.com/seminaire-poweron-dakar-senegal

Pour toute demande d’informations, envoyez un e-mail Ă  infos@megger.com

HĂŽtel King Fahd Palace
Route des Almadies
Dakar 8181
Senegal      

Monday, June 4, 2018

Megger Offers a Wide Range of IEC 61850 GOOSE Test Tools and Experiences


Megger (Sweden) offers a wide range of test tools and experiences for testing and commissioning of systems based on IEC 61850 GOOSE.

They just published a brochure that shares some light on IEC 61850 interoperability problems and solutions for the horizontal communication (GOOSE):

IEC 61850 - GOOSE Interoperability

Click HERE for the brochure.

This document (written by one of the most experienced senior protection engineers) is really worth to download and to read! Andrea Bonetti will give you a deep inside look into the use of GOOSE messaging and how to reach interoperability.

"Interoperability is one of the most misunderstood of all business terms. It is, however, one of the most important of all predictors of success or failure. In short, interoperability is the ability of diverse systems to work together effectively and efficiently. Interoperability is a property of a product or system, whose interfaces are completely understood, to work with other products or systems, present or future, without any restricted access or implementation.

There is absolutely no doubt that Interoperability facilitates valuable business connections—across
processes, between people and information and among companies. Interoperability yields improved
collaboration and ultimately increased productivity. Providing interoperability helps customers decrease complexity and better manage heterogeneous environments—while enhancing choice and innovation in the market. Importantly, the interoperability requirement of the IEC 61850 standard has beneficially increased the “interoperability among different engineers” working for companies that are formally in competition. This increased communication among different vendors has contributed to the fact that GOOSE messaging can today be considered a working technology, even if problems still arise, like in any other technology.

With more than six years of field experience with IEC 61850 GOOSE communication in protection and control applications, it is possible today to list the main reasons for interoperability problems for multi- and single-vendor systems; however, the list of causes of interoperability failures would be longer than what indicated in this document, especially if considering the cases found during the beginning of the use of GOOSE messages.

In order to commission substations with the new IEC 61850 technology, there is need to use some new tools and methods. The key for these tools and methods is, paradoxically, implicitly available in the IEC 61850 standard itself."

Enjoy!