Wednesday, December 12, 2018

TÜV SÜD closes their IEC 61850 / UCAIUG Test Lab

TÜV SÜD (Munich, Germany) a long time provider of IEC 61850 Interoperability and Conformity Testing Services closes their Test Lab.
They emailed today says: "... Unfortunately, we do not supply Interoperability and Conformity Testing Services according to IEC 61850 any longer, which have been replaced by other focus areas in our portfolio. ...".
There was no specific reason for their decision provided.
You may ask me about my opinion. Here it is first brief statement:
  • The standard series IEC 61850 is very comprehensive - applicable in many different application domains. 
  • Implementations of the communication software for Client/Server (MMS based), Publisher/Subscriber (GOOSE), general APIs, and appropriate IED specific configuration tools are very comprehensive (and very complex!) as well.
  • The IEDs tested and certified will likely operate in applications that need many times more logical nodes (and associated FUNCTIONS) than what was tested to get a certificate.
  • MMS is also very complex regarding services and protocol. Unfortunately requires a lot of best skills to implement ... it has been implemented very well by a few companies like SystemCorp.
  • The most crucial aspect of IEC 61850 is the huge number of logical nodes (that represent so many functions). This semantic is of great importance to the energy industries.
  • One of the key issues in the years to come is this: Use the semantic of IEC 61850 and configuration language and map the needed (usually very simple and restricted) semantic configured in a SCL file automatically to JSON-Objects and communicate the JSON encoded information via http(s) or similar protocols
  • This will allow to use IEC 61850 in any project that requires to exchange the well defined semantic of IEC 61850. E.g., the semantic of the schedule logical node (FSCH and FSCC) can easily be configured in JSON. The underlying function (the SCHEDULING) needs to be implemented independently of using MMS/ASN.1 or JSON. The benefit of using JSON is here: Everybody that can program in Python or JS or ... can use the JSON encoded messages directly in the application program.
  • I am working on such a solution that makes IEC 61850 really applicable for simple applications ... http(s) and JSON are used everywhere and can be applied by everybody.
  • More to come!
  • Stay tuned.
For those simple applications with a dozen of points or so ... there would be a need for just a very simple and basic interoperability and conformance test.

Thursday, November 15, 2018

IEC 61850 Seminar in INDIA CHENNAI 19 Nov, VADODARA 21 NOV

Dear All,

Please note the invitation to a great Seminar by Andrea Bonetti in INDIA
- CHENNAI 19 Nov

Click HERE for details.

Saturday, November 3, 2018

IEC 61850 Tissue Data Base - In Operation Under IEC

The IEC 61850 Tissue Data Base is in operation again - now under IEC Logo.

Click HERE for accessing the Data Base:

The registration as a new user will be possible soon.

Enjoy the crucial resources.

Monday, October 8, 2018

IEC 61850-7-1 CDV Amendment 1 available for comments

The Amendment 1 of IEC 61850-7-1 is now available for comments and voting:

Communication networks and systems for power utility automation –
Part 7-1: Basic communication structure – Principles and models

IEC TC 57 just published the document 57/2035/CDV.

Ballot closes 2018-12-28.

The CDV is publicly available for comments for everybody:

Click HERE for Public CDV Commenting - you just need to register.

Please note the following:

The distributed CDV reflects the amendment 1 (corrections and extensions) to IEC 61850-7-1 Ed2.

A second document (called consolidated edition 2.1) incorporates the amendment 1 (120 pages) and the existing Ed2. The consolidated edition (195 pages) is circulated as 57/2036/INF (unfortunately not publicly available).
After the CDV/FDIS approval process the consolidated version will be published together with the amendment 1 under reference IEC 61850-7-1 Ed2.1.

The version 2.1 will introduce the latest modelling extensions.

The new version of IEC 61850-7-1 will be one of the most crucial documents of the standard series IEC 61850. As the editor of edition 1 I see that most of the content of the version 1 is still the basic information presented in this part 7-1 😊

This document shows also that the standard series is growing and getting quite complex ... for simple applications you need to understand what is mandatory and what is optional!

Monday, September 17, 2018

Technical Report Considering Protection IEDs with Digital Inputs and Output under way

The IEC TC 95 Ad Hoc Working Group 3 (AHG3 meeting in Nanjing this week) 

is discussing the scope of a new document with the following Scope;

This Technical Report aims at considering protection IEDs with digital inputs and output complying with IEC 61850 and IEC 61869 standards, in particular 
  1. subscribing streams of digital Sampled Values (SV) representing energizing inputs of the protection function.
  2. subscribing GOOSE and/or reports by the protection function (eg. cb position, cb failure).
  3. publishing GOOSE messages (e.g. trip orders).
  4. subscribing time synchronization information.
On this base, this document will give recommendations and guidelines concerning requirements and testing of protection IED with digital inputs and outputs within TC95.

Requirements regarding characteristics of the communication network are not within the scope of this Technical Report. Delays and jitter due to the network have to be taken into account by network engineering. Figure 1 below shows the functional chain of a protection function.  This Technical Report only considers the data received and publish by the protection IED as shown in figure below. 

More to come ...

Monday, September 10, 2018

IEC 61850 Applications in Germany - DKE Documents Online for Free Download

The German National Committee of IEC TC 57 (DKE K 952) has many members of various Working Groups (in the national as well as in the international groups) that discussed the IEC 61850 standard series in general and particularly how the standards could be applied to substation automation and protection. One of the key issues is the modelling and configuration using SCL.

Several documents in German and in English are available:

Click HERE for the link to the above page.

Enjoy the documents.

Tuesday, July 24, 2018

Cyber Security for Industrial Control Systems (ICS) is Going Where?

Cyber Security for Industrial Control Systems (ICS) has been discussed over many years - and it will be discussed forever. There seems to be no end of discussions and solutions ... the end may come when electric power will be switched off - caused by insecure systems.

As long as we have ICS in operation - which is very crucial! - we will see products being developed and offered that are marketed to safe the world of ICS.

Dale Peterson wrote a very nice and interesting article about "The Future of the ICS Cyber Security Detection Market" (23 July 2018).

Dale seems to expect that the ICS Cyber Security Detection Market will completely change in a few years. He may be right. My expectations is that the change will happen for ever - and ever faster.

So, you may decide to wait! This would be the worst decision you can make.

Whatever is available for your system today - use it! The wait for getting started with, e.g., encrypted ICS protocols is over - use TLS wrapper as much as possible - as soon as possible.

Click HERE for the complete article - worth to read.

Our power system highly depend on ICS - ICS highly depend on power systems. The two can live together only. Non of the two will survive without the other!!

I hope we have enough people to understand that we need more smart people to keep power flowing: means electrical engineers and IT experts ... and ...

My recommendation is that we need to get a better holistic understanding how power systems and ICS are interdependent ... we should not isolate one from the other ... already understood some hundred years ago:

"Hence we must believe that all the sciences are so interconnected, that it is much easier to study them all together than to isolate one from all others. If, therefore, anyone wishes to search out the truth of things in serious ernest, he ought not to select one special science, for all the sciences are cojoined with each other and interdependent."
Rene Descartes (1596-1650)

Finally we will have to accept that reliable electric power will be more expensive soon - moderate increased price in case we care about ICS Cyber Security - extremely expensive if we fail to protect the power system.

New Smart Grid Controller with IEC 61850, IEC 61850-5-104, and DNP3

System Corp (Perth/Australia) offers a new very powerful Smart Grid Controller for applications in:

  1. Secondary Substation Control
  2. Transformer and Asset Management
  3. Micro Grid Control and Automation
  4. Data Gateway Application
  5. IoT and Cloud Service Interfacing

Click HERE for more details.

Thursday, July 19, 2018

HMS Networks AB takes over Beck IPC

HMS has taken over the German based company Beck IPC. Beck IPC has a range of products providing IEC 61850, IEC 60870-5, and DNP3 connectivity - I have reported about their products from time to time ... just search for Beck on the blog.

Click HERE for the HMS press release.

HMS (IXXAT) sells some of the Beck com.tom (as Gateways):

Click HERE for Beck com.tom products with above standards implemented.
Click HERE for HMS Gateway products with above standards implemented.

Saturday, July 14, 2018

IEC TC 57 just published FDIS IEC 61850-8-2 (Mapping to XMPP)

IEC TC 57 just published FDIS IEC 61850-8-2 (Mapping to XMPP) - 253 pages !


Voting ends: 2018-08-24

Part 8-2: Specific communication service mapping (SCSM)
– Mapping to Extensible Messaging Presence Protocol (XMPP)

The long wait for a second SCSM is over!

The new mapping of IEC 61850 describes a specific communication service mapping
(SCSM) over the Extensible Messaging and Presence Protocol (XMPP), providing detailed
information on how to create and exchange concrete communication messages that
implement abstract services and models specified in IEC 61850-7-4, IEC 61850-7-3, and
IEC 61850-7-2.

Note that the MMS messages (defined using ASN.1) are used in IEC 61850-8-1 AND -8-2 ! The only crucial difference between the two message and model mappings (in 8-1 and 8-2) is this:

8-1 uses BER (Basic Encoding Rule) for the messages on the wire, while 8-2 uses (XER (XML Encoding Rule). The complexity of the MMS messages is the same in both mappings - because the structure and how to build messages and how to carry the 7-2 services and 7-x models are the same!

The challenges to implement 8-2 message mapping are more or less the same as with 8-1. Note that the messages in XER are far longer than with BER.

There is - of course - a difference between the two: The transport of messages in 8-2 uses XMPP.

Some may argue, that there are more tools available for XER than for BER. Ok.

IEC 61850-8-2 is far away from something simple and easy to implement and use - especially when you need only a few simple services and models.

WOW -- IEC 61850 Models Publically Available for Download

After long time, IEC has accepted to provide free online access to the IEC 61850 Models!!


Excerpt from 57/2023/INF (2018-07-13):

"With IEC 61850-7-7, a machine processable format for the distribution of IEC 61850 data models has been defined. Based on that, in the future, all IEC 61850 models will be as well available in this format as namespace files (NSD files).
The namespace files are code components, that are intended to be directly processed by a computer. The purchase of the associated IEC standard carries a copyright license for the purchaser to sell software containing Code Components from this standard to end users either directly or via distributors, subject to IEC software licensing conditions, which can be found at: ..."

Screenshot from the TC 57 Supporting Documents page:

Click HERE to get to the above page.

Sunday, July 8, 2018

First Draft IEC 61850-90-16 Requirements for System Management for IEC 61850

The first Draft on IEC 61850-90-16 (97 pages) has been published (57/2014/DC):

Requirements for System Management for IEC 61850

"The distribution grid is facing a massive roll out and refurbishment of automation equipment to
implement deeper monitoring and new smart grid applications. The new equipment to be deployed in order to solve today’s issues (MV voltage and reactive power regulation for example) will necessarily have to be adjustable and upgradeable in order to face challenges of tomorrow (for example massive electric vehicles fleets, low voltage automation, …) which will arrive long before the end of its 20 years’ service life. Furthermore, there is a necessity for the equipment to adapt to the evolving and growing cybersecurity threats.
The equipment will therefore need to be patched, updated and reconfigured, and this has to be done remotely due to the great number of equipment. This is a cornerstone of the System Management (SM), which refers to functionalities that are not directly linked to the operational role of the equipment but allow it to perform its operational functions in the best conditions possible. Smart Grid Devices Management also includes other functions such as asset management or supervision.
These functionalities need to be managed by the grid operator and address multiple devices from different vendors through independent Information Systems and thus the requirements and exchanges need to be standardized. As these are to be applied to IEC 61850 compliant equipment, these mechanisms need to be integrated in the standard. ..."

Comments are due by 2018-09-28

Role-based Access Control - On its way to become Standard

IEC 62351-8 is on its way to become an IEC Standard (57/2017/CD):

Power systems management and associated information exchange – Data and communications security –
Part 8: Role-based access control

The part 8 is currently a Technical Specification. This will change in the next step.

The 62 page CD has been published for commenting until 2018-09-28

"This document provides standard for access control in power systems. The power system
environment supported by this standard is enterprise-wide and extends beyond traditional
borders to include external providers, suppliers, and other energy partners. ...

The following interactions are in scope:

  • local (direct wired) access to the object by a human user;
  • local (direct wired) access to the object by a local and automated computer agent, e.g. another object at the field site;
  • direct access by a user to the object using the objects’ built-in HMI or panel;
  • remote (via dial-up or wireless media) access to the object by a human user;
  • remote (via dial-up or wireless media) access to the object by a remote automated computer agent, e.g. another object at another substation, a distributed energy resource at an end-user’s facility, or a control centre application."

Wednesday, July 4, 2018

IEEE Spectrum July 2018: 6 WAYS IoT IS VULNERABLE

IEEE Spectrum 2018-07 publishes an opinion by Stacey Higginbotham about the vulnerability of IoT devices and systems:


Here is an excerpt of the six reasons why security for the Internet of Things (IoT) is different from—and more difficult to tackle than—traditional IT security:

  1. We’ve raised the stakes by connecting more physical systems and facilities to wireless networks -> Consequences of failure are more dire.
  2. IoT security is a special challenge:The adversaries are unlike any we’ve seen before.
  3. For traditional IT system, one can count on the software company’s support for a
    set amount of time. What we see: it could be 10 years, 7, 3, 2, or even 0 ...
  4. A connected product that generates a small profit may require years of updates, patches, and security evaluations.
  5. Many connected devices are built with software, hardware, and firmware that are created
    by different companies and pieced together at the end. It takes only one weak link to create a vulnerability ...
  6. Many connected devices live in environments unlike any IT system. In a home, there’s no IT manager to push patches to a connected fridge. And in an industrial setting, patching one machine might cause it to stop working with other equipment on the line.

I would summarize the challenge as follows:

IoT devices and systems require in principle the same attention, efforts and resources like traditional IT systems. The sheer unlimited number of interconnected IoT devices will work securely only if we except to spend much more money than what the market expects!

Or: Today´s solutions will be the problems of tomorrow.

Click HERE for the complete document (1 page).

Real-time Access to German Generation and Consumption of Electricity

You have real-time access to the German generation and consumption of electricity:

Click HERE for the real-time data access.

Monday, July 2, 2018

Version 2 des OE/BDEW-Whitepaper Anforderungen an sichere Steuerungs - und Telekommunikationssysteme

Version 2 des OE/BDEW-Whitepaper (komplett überarbeitete Version!; 80 Seiten):

Anforderungen an sichere Steuerungs - und Telekommunikationssysteme
(Requirements for Secure Control and Telecommunication Systems)


Click HIER für den Zugriff auf das gesamte Dokument.

"Das vorliegende Dokument definiert grundsätzliche Sicherheitsanforderungen für Steuerungs- und
Telekommunikationssysteme für die Prozesssteuerung in der Energieversorgung und gibt
Ausführungshinweise zu deren Umsetzung. Hierzu werden von Fachexperten zusammengestellte,
aktuelle und branchenspezifische Empfehlungen zur Sicherstellung der Informationssicherheit
Das Whitepaper definiert Anforderungen an Einzelkomponenten und für aus diesen Komponenten
zusammengesetzte Systeme und Anwendungen. Ergänzend werden auch Sicherheitsanforderungen
an Wartungsprozesse, Projektorganisation und Entwicklungsprozesse behandelt.
Fokus dieses Dokuments sind die im Rahmen der Beschaffung zu berücksichtigenden Anforderungen
an technische Komponenten und Systeme und für die Projektabwicklung relevanten Prozesse.
Ebenso wichtig sind organisatorische Sicherheitsmaßnahmen im Unternehmen, wie der
Aufbau einer Sicherheitsorganisation, ein angemessenes Risikomanagement oder die Schaffung
eines umfassenden Sicherheitsbewusstseins bei den Mitarbeitern (Security Awareness). Diese
organisatorischen Anforderungen stehen nicht im Fokus des Whitepapers, hierzu sei insbesondere
auf die Normen ISO/IEC 27001 und ISO/IEC 27019 verwiesen.
Das vorliegende Dokument ist eine vollständig überarbeitete Neuauflage des BDEW Whitepapers
und der zugehörigen Ausführungshinweise von Oesterreichs Energie und BDEW. Beide Dokumente
wurden zusammengeführt und die Inhalte gemäß aktuellen Technologienentwicklungen
umfassend aktualisiert und ergänzt."

Die englische Version wird in Kürze erscheinen.

Die hier beschriebenen Anforderungen haben erheblichen Einfluss auf Unternehmen im Kontext der Energieversorgung: mehr Mitarbeiter und mehr technische Hilfsmittel, mit denen die Anforderungen erfüllt werden könnten - und damit höhere Kosten!

Wednesday, June 27, 2018

New Title of IEC TC 57 WG 17

The new title of IEC TC 57 WG 17 is:

“Power system intelligent electronic device communication and
associated data models
for microgrids,
distributed energy resources and
distribution automation

Monday, June 18, 2018

Séminaire PowerOn Dakar Sénégal 18 et 19 Juin 2018

Cet évènement vous permettra de partager des connaissances et de rencontrer des experts et spécialistes de différents horizons afin d’échanger sur les solutions aux problèmes que vous rencontrez, les outils de mesures-test-diagnostic des équipements électriques, et d’obtenir de l’aide ou des conseils, ou simplement découvrir les nouvelles techniques innovantes disponibles pour tester les transformateurs et autres équipements des postes HT.


  • Protection des réseaux :
  • CEI 61850 et Réseaux électriques intelligents : impact sur les spécifications, essais et maintenance des postes électriques. Présenté par Andrea Bonetti.
  • Protection Différentielle des transformateurs : influence physique des relais sur les transformateurs. Présenté par Andrea Bonetti.
  • Plan de protection : mesure de l’impédance de ligne. Présenté par Andrea Bonetti.
  • Charge filerie : mesure d’impédance avec le SVERKER. Présenté par Andrea Bonetti.
  • Vérification des TC/TP. Présenté par Mamadou Keita.
  • Efficacité de la Maintenance :
  • Informatisation du Suivi de Parc et de la Gestion des données de test
  • Réseaux Souterrains :
  • Localisation de défauts de cables. Présenté par Adeola Adebomi.
  • Diagnostic des câbles souterrains. Présenté par Adeola Adebomi.
  • Transformateurs de puissance :
  • Test et Diagnostic. Présenté par Mamadou Keita.
  • Et bien d’autres thèmes qui seront abordés basées sur le retour d’expériences terrain

 Nous serions honorés de votre présence et nous vous remercions de cliquer ci-dessous pour vous enregistrer.
Pour toute autre question, n’hésitez pas à nous contacter.

Pour toute demande d’informations, envoyez un e-mail à

Hôtel King Fahd Palace
Route des Almadies
Dakar 8181