Thursday, August 25, 2016

How to Exchange a Voltage Measurement with IEC 61850?

As discussed before you will find a reasonable example to learn the benefits of applying IEC 61850.
Let's look at a voltage measurement:



According to IEC Electropedia we find many names for the same semantic: voltage, Spannung, spenning, ... Ok. These help humans to understand what we are talking about. But what about machines (controllers, SCADA systems, ..)?
They have to use a data type (int16, int32, float32, ...) and a reference (address ...) for a specific protocol like Modbus. Each vendor will likely use different types and addresses.
What's about the scale in applications that use integer? Is the scale known when you read the value of a voltage? Do you know the offset or the multiplier (V, kV, mV, ...)?
How do you know where the measurement is taken in the electrical system (location in the single line diagram)?
Answers to these questions may be found in a set of documents sitting on a shelf or on someones computer - hard to find out if the owner is on vacation.
With IEC 61850 we have a model that could be implemented so that all these details are always accessible online from each device that is a source of measurements:



Phase A voltage has a standard name "MMXU.PhV.phsA" with the value, quality, timestamp, units, and scale. These names are used all over in any IEC 61850 device.

IEC 61850 services allow to retrieve the MMXU model and read the values:



The device has all information to interpret the voltage value for phase A.

Finally we need to know where the value is measured in the single line diagram. IEC 61850-6 (SCL) provides the solution specified as an SCL file (simplified SSD - Substation Specification Description):


The above voltage could be designated as follows:
MySub_400kV_3A63_BayFunction_ABC/ACMMXU1.PhV.phsA

The value is located in the device "BayController". The device is communication wise identified by an IP Address.

This information really exposes all information needed to interpret a measurement. 
Note that this name needs not to be communicated when the value is reported cyclically or issued by a limit change.The report message could only carry the value, quality and timestamp.
The SCL file has all information to configure the whole system and the devices.
Any question?
Hope you have learned this: IEC 61850 goes very far beyond a protocol! We only need the protocol when we retrieve the selfdescription or read out or report the values.
And: the nice thing is that any device that implements the standard uses the same model, configuration, and services. What else do we need?

If we would apply just a protocol like Modbus then most of the information exposed (directly from the device) through the standard IEC 61850 would have to be stored in paper docs or excel sheets ... 

Once Again: Is IEC 61850 another Protocol?

IEC 61850 and related standards like IEC 61400-25 offer very complex definitions that are intended to ease the life-cycle of the whole system: design, engineering, configuration, operation, maintenance, system extension, documentation, error diagnosis, ...
In my experience with protocols since 1982 (when I started working for Siemens) I have seen (too) many protocols coming and going. I guess I could list several hundred protocols including IEC 60870-5-10x, DNP3, Profibus FMS, Profibus DP, ...

Many experts (especially in the higher management and HR) have years of experience with one or several protocols - working with 600 baud or even 100 Mbit/s Ethernet based links. It happens quite often that those experts are promoted for higher management functions. Many of them have no experience with the approach of IEC 61850. But they often have to decide if, how and when the new technology will be used.

Because of the complexity, they may decide not to use it at all and even not trying to understand what it really could offer their engineers - at least as long as they are the persons in charge.

The real issue is (as Dee Hock, Founder of Visa put it): "The problem is never how to get new, innovative thoughts [IEC 61850] into someones mind, but how to get old ones out." One of these "old ones" is the opinion that IEC 61850 is something like DNP4 or IEC 60870-5-105 -- just another but more complex protocol (MMS, ISO 9506). This (old, too old, wrong) opinion has also a big impact on decisions, e.g., to get a green-light for attending an IEC 61850 training course. Managers and HR often have the opinion: Why do we need this comprehensive training (of 2, 3, 4, or 5 days) for just another protocol? Often the light stays at RED!
We could put it in future in a different way:

  1. IEC 61850 Protocol Training -> 1/2 day
  2. IEC 61850 Services (Client/Server, Publisher/Subscriber, Reporting, Control, Setting Groups, ...) -> 1 day
  3. IEC 61850 Modeling and Models -> 1 day
  4. IEC 61850 Engineering and Configuration -> 3 days 
  5. How to use it for protection, SCADA, monitoring, power generation applications -> x days (depending on what application you have in mind).
If you don't understand what Models and SCL provide ... either take a course or stop discussing it.

IEC 61850 is not intended to replace any other protocol with MMS! In order to harvest the fruits of the application of IEC 61850, you have to look at any other topic than protocols.

But you have to be open to take a closer look at the issues listed under bullets 2 to 5.

You will not get an answer by just reading the standards ... take a course to get a reasonable understanding.

Be an ENGINEER - not just a boss or a leader.
Click HERE for a nice illustration at LinkedIn (or optionally HERE) to see the difference between old approaches and the engineers solution. IEC 61850 is a very big vehicle to carry a lot of loads - to make life easier.

I will post some example to show you the real benefits.

Tuesday, August 23, 2016

Neues Format für viertägiges IEC 61850 Seminar im Dezember 2016 in Karlsruhe

Der Bedarf an guter mehrtägiger Schulung kollidiert oft der notwendigen Anwesenheit am Arbeitsplatz! Die NettedAutomation GmbH hat jetzt eine Antwort für Sie gefunden:

Wir bieten bieten vom

06.-09. Dezember 2016 in Karlsruhe 
drei Seminarblöcke (1 Tag, 2 Tage und 1 Tag) 

an, die einzeln oder in Kombination gebucht werden können. Sie entscheiden selbst, ob Sie nur einen Tag von Ihrem Arbeitsplatz fern bleiben möchten oder zwei, drei oder vier. Je nachdem, welche Zeit und welchen Bedarf Sie haben.

Am ersten Tag wird ein Überblick über das Normungsumfeld und die einzelnen Normen gegeben. Im Mittelpunkt stehen dabei die grundlegenden Eigenschaften und Bedeutung der Normenreihe IEC 61850 für Systemdesign, System- und Geräteengineering, Datenmodellierung, Datenmodelle, Kommunikationsmöglichkeiten (Client/Server, Publisher/Subscriber) und Sicherheitslösungen.

Am zweiten Tag werden die Modellierungsmethode, die vielfältigen Modelle (Logische Knoten), die Kommunikationsdienste und -protokolle und die System-Konfigurations-Sprache (SCL) im Detail vorgestellt.

Am dritten Tag werden anhand vieler praktischer SCL-Beispiele Systembeschreibungen (SSD), Systemkonfigurationen (SCD), Gerätekonfigurationen (ICD und CID für Server/Publisher, Client/Subscriber und Server/Subscriber) diskutiert, erstellt und formal geprüft. Dabei kommt eine Reihe von Werkzeugen und Geräten zum Einsatz.

Am vierten Tag wird das Erlernte in praktischen Übungen mit marktgängigen Geräten und Werkzeugen vertieft.

Sie können den 1. Tag, den 2. und 3. Tag sowie den 4. Tag getrennt oder in jeder Kombination buchen!

Mit unserer Schulung bereiten wir Sie hervorragend auf neue Herausforderungen vor!

Klicken Sie HIER um mehr Details und Anmeldeinformationen herunterzuladen [pdf, 320 KB].

Die mehr als 4.100 Teilnehmer meiner über 230 Seminare seit 2004 würden sicher alle bestätigen, dass das komplexe Thema IEC 61850 unbedingt eine geeignete Schulung verlangt -- und dass wir eine erst-klassische Schulung bieten!

We will offer the same seminar in English from 13-16 Dezember 2016 as well in Karlsruhe (Germany). Details will be available the next days.

Friday, August 19, 2016

New Flyer for IEC 61850 Training conducted by FMTP and NettedAutomation

FMTP (Uppsala, Sweden) and NettedAutomation (Karlsruhe, Germany) designed a new flyer for IEC 61850 training courses:


The flyer lists all crucial topics that are comprised by the various training opportunities: public or in-house, 3, 4, or 5 days ... or as many days you (our customer) want.

In some cases we offered a 1 day introduction course - the maximum number of training days was 11 days (in three sessions) for a big transmission utility in Europe. Another training took 10 days in one block. The maximum number of attendees was 350 for 3 days:



Click HERE for a brief report of the Bangalore event.

You get whatever you need - 
wherever you are, 
whenever you are prepared to get it.
Talk to your management or HR - to get it.
You deserve it!


Click HERE for the new 2 page flyer [pdf, 1. MB]

I look forward to meeting you some time down the street.

Thursday, August 18, 2016

IEC 61859 Training Course in Stockholm is Filling-Up - Reserve your Seat Now

FMTP, KTH, OPAL RT, and NettedAutomation have scheduled a very comprehensive IEC 61850 Training in Stockholm (Sweden) for 19-23 September 2016.
The course is filling-up very fast.
Please reserve your seat as soon as possible.





Click HERE for the brochure with all details.
A similar Course (4 days) is scheduled for Karlsruhe (Germany) 10.-13. October 2016.

See you soon.

Wednesday, August 17, 2016

IEC just published Draft Guidelines for Handling Role-based Access Control in Power Systems

IEC TC 57 just published (57/1764/DC):

Draft IEC TR 62351-90-1, Power systems management and associated information exchange – Data and communications security – Part 90-1: Guidelines for Handling Role-based Access Control in Power Systems

This draft technical report addresses the handling of access control of users and automated agents
to data objects in power systems by means of role-based access control (RBAC) as defined in
IEC 62351-8. IEC 62351-8 defines three different profiles to distribute role information and
also defines a set of mandatory roles to be supported. Adoption of RBAC has shown that the
defined mandatory roles are not always sufficient and that the method for defining custom
roles should be standardized to ensure interoperability. Hence, the main focus of this
document lies in developing a standardized method for defining and engineering custom
roles, their role-to-right mappings and the corresponding infrastructure support needed to
utilize these custom roles in power systems.

Comments are welcome latest by 2016-10-07.

Tuesday, August 16, 2016

IEC 61850: Gateway for Cloud Computing and Fog Computing

Cloud computing and Fog Computing is in principle supported by a single gateway offered by HMS:

  • Bridges any signal from the process level directly to your own or third party cloud.
  • Maps any signal from Modbus, Profibus, ProfiNet, Ethernet/IP, IEC 61850, IEC 61400-25, IEC 60870-5-104 ... to Modbus, Profibus, ProfiNet, Ethernet/IP, IEC 61850, IEC 61400-25, IEC 60870-5-104 ...
  • Provides many logic functions AND, OR, Timer, Counter, ... to build applications.
  • Has digital Input and Output pins.
  • Reads M-Bus.
  • Supports Client, Server, Client/Server, Client/GOOSE-Subscription (with or more Server/GOOSE-Publishers), and Sever/GOOSE-Subscription
  • What else do you need for simple applications?

Click HERE for more information.

Next Hype: Do You Know Fog Computing?

Some 30 years ago the hype was: MAP (Manufacturing Automation Protocol). One of the next hype is "Fog Computing".

"The Manufacturing Automation Protocols (MAP) and Technical Office Protocols (TOP) were the first commercially defined and accepted functional profiles. Both arose because of the operational concerns of two large corporations, General Motors and Boeing. lt is generally accepted that MAP and TOP were the forerunners, first in adopting OSI standards and then in developing usable profiles.
lt all started at the end of the 1970s. GM had on its manufacturing plant shop floors some 20 000 programmable controllers, 2000 robots, and more than 40 000 intelligent devices, all in support of its business. The main problem was that less than one-eighth of the equipment could communicate beyond the limits of its own island of automation; the main inhibiting factor to greater integration being the lack of an appropriate communications infrastructure. As devices supplied were mostly vendor-specific, to do a particular job, they were not designed or optimised to intercommunicate or support each other's functions.
GM finally realised the gravity of their situation when they began to evaluate the cost of automation, attributing half the cost to the need for devices to intercommunicate. To resolve the matter a task force was created comprising representatives from GM's divisions and their suppliers, with the objective of developing an independent computer network protocol capable of supporting a true multi-vendor environment on the shop floor. They used the OSI model and standards as a basis for interconnection and development of further enhancements. " (Source: The Essential OSI, NSW Technical and Further Education Commission 1991)

The first MAP Profile was published in 1982, Version 1.0 in 1984, MAP 3.0 in 1988. Long time ago!

The MAP approach was understood by just a few experts. Most people believed that MAP was too complex, too ... The fieldbusses were thought as the solutions that could cover a kind of Mini-MAP and realtime communication. MAP passed away and hundreds of fieldbusses have been developed since the late 80s. The result was that myriads of automation islands hit the factory floor. These islands where bridged with OPC and so on ... Now we write 2016! Is there anything new?

Not that much. We still have the problem that the sheer unlimited number of (usually raw) signals (measurements, status, settings, ...) are polled or pushed from the sensor and actuator level all the way up to the SCADA level or even higher. This approach of signal acquisition does not scale in the future where we expect thousand of times more devices, sensors, controllers, ... as GM had to manage in the 70s. Does the Cloud Computing solve this challenge? It is unlikely that this (more or less raw data acquisition) will work?

And now? What to do? Use Fog Computing!

"Fog computing is the missing link to accelerate IoT.  It spans the continuum from Cloud to Things in order to bring compute, control, storage and networking closer to where the data is being generated.

The sheer breadth and scale of IoT solutions requires collaboration at a number of levels, including hardware, software across edge and cloud as well as the protocols and standards that enable all of our “things” to communicate. Existing infrastructures simply can’t keep up with the data volume and velocity created by IoT devices, nor meet the low latency response times required in certain use cases, such as emergency services and autonomous vehicles. The strain on networks from cloud-only or cloud-mostly models will only get worse as IoT applications and devices continue to proliferate.  In addition, the devices themselves are starting to become smarter, allowing for additional control and capabilities closer to where the data is being generated." (http://www.openfogconsortium.org/about-us/#frequently-asked-questions)

Quite interesting that the hype Cloud Computing is seen from a different perspective in 2016.

The approach of IEC 61850 (starting in 1998) is from the very beginning the same as discussed in the Fog Computing community: Compute, control, store, and networking closer to where the data is being generated (at THE process level like in substations or power generation all over). Many information models standardized in IEC 61850 and IEC 61400-25 define distributed functions like protection, active power control or reactive power compensation ... schedules for tariffs, alarming, tripping, reporting by exception (RBE), ... in order to reduce the needed bandwidth and allow for realtime and near realtime behavior.

Lesson learned: Fog Computing is already practiced in the domain of power automation - and based on well defined standards (IEC 61850 and IEC 61400-25)! Both standard series make use of the most crucial standard of MAP: MMS (Manufacturing Message Specification, ISO 9506). It took some 30 years for more people to understand the challenges! ;-) There is nothing new under the sun.

Saturday, August 6, 2016

IEC 61850-90-10 Draft Technical Report on Schedules just published

IEC TC 57 just published the Draft Technical Report:
IEC/TR 61850-90-10 Ed.1.0 (57/1762/DTR)
Communication networks and systems for power utility automation -
Part 90-10: IEC 61850 objects for scheduling

Closing date for voting is 2016-09-30

Schedules establish which behavior (e.g., tariff 1 or 2, mode 1 or 3) or expectation (e.g., forecast) is applied during specified time periods. A schedule consists of a series of entries with a setting for the value of a setpoint, the selection of a particular mode or the value of a parameter for a mode.
There are different ways to operate a scheduled entity based on the following operation principles:

  • The actual values of a scheduled entity (e.g. active and reactive power produced or consumed) are directly controlled using setpoints and controls. For example, the DER system reacts on changes of the setpoints or on controls (e.g. start or stop the DER system) in real time.
  • The functional behavior of a scheduled entity is configured to operate in a mode in which it responds to locally sensed conditions (e.g. Volt-VAr Mode in case of DER) or externally provided information (e.g. prices). 

The schedules offer a very powerful functionality that can be used in many different applications.
Currently we have two major applications in Germany  that make use of the schedules: 
  1. VHPready
  2. FNN Steuerbox
NettedAutomation has implemented the most crucial concepts on an embedded controller used in the HMS gateways.

More to come soon.

Thursday, August 4, 2016

What is a Critical Infrastructure?


According to Wikipedia:
"Critical infrastructure is a term used by governments to describe assets that are essential for the functioning of a society and economy - the infrastructure."

The first three infrastructures listed are:
  1. electricity generation, transmission and distribution;
  2. gas production, transport and distribution;
  3. oil and oil products production, transport and distribution;
  4. ...
Many other areas could be taken into account - all domains where we have some automation in one form or another you may or may NOT TRUST. So far we have trusted our teachers, our employers, our parents, our car, our friends, our banks, our electric power delivery system ... There seems to be a change coming step by step.
What could we all do about it? 
For our family we have just decided to install a 9,8 kWp Photo Voltaic system on our roof. This is - hopefully - a power harvesting machine we could trust ... as long as the sun is shining.
The latest issue discussed is on "Election Systems" according to the FederalNewsRadio:
"The Homeland Security Department is actively considering whether it should add the nation’s election system — or the individual systems that 9,000 local and state jurisdictions use to collect, tally and report votes — as an entity that needs DHS protection from cybersecurity attacks."

What if we put it all under the new term "Critical Everything" (CE)?
All depends on human beings we have to trust! I want to be such a person - my wife, my family, our friends, you, ... can trust.

When we engineers develop something, we should pay a lot of attention to make the "something" robust, safe, ... better safe than sorry.

Let's do our best in the interest of all our societies.

Sunday, July 31, 2016

Power Quality Meter Goes IEC 61850 and IEC 60870-5-104

Friday last week I was involved in installing a high level Power Quality Meter (UMG 512 from Janitza) to monitor the power for a new building:



The objective was to apply a smart gateway between the Meter and IEC 61850 and IEC 60870-5-104. It took some 90 minutes to install the meter and configure it for Modbus TCP communication. The gateway used is an HMS Anybus SG Gateway I/O.



The gateway offers connectivity to Profibus, ProfiNet, Ethernet/IP, and other protocols.
The gateway reads out 22 signals from the Meter (all new Meters from Janitza use the same addresses for the basic signals):


The Modbus signals (from an UMG 604) are listed in the gateway for polling:



As well we need to configure the Signals for IEC 61850 and IEC 60870-5-104:


The signals in IEC 61850 are configured with an SCL File. The 104 signals need manually configuration.











Finally we need to program the mapping from Modbus to IEC 61850 LNs and IEC 60870-5-104 signals. The drop-down menu is used to place the signals to the screen:



Finally the inputs are linked to the outputs:



The signals from the Meter are automatically exposed through IEC 61850 and IEC 60870-5-104 servers.
The IEDScout 4.1 from Omicron is used to connect to the IEC 61850 Server in the Gateway:



And the QTester104 receives messages from the IEC 60870-5-104 server:



Lesson learned: It took less than one hour to configure the Gateway and use it.
This is likely the easiest and fastest way to communicate Power Quality Meter signals through IEC 61850 and IEC 60870-5-104. 

Wednesday, July 27, 2016

Could You Measure a Change in Air Flow caused by a Wind Turbine in a distance of 100 km?

Assume an air flow of x m**3 per second. What happens at your position if a big wind turbine is starting to rotate in a distance of 100 km? Do you expect that you could measure that the air flow is reduced due to the wind turbine that removes energy from the air flow? It may be possible if the turbine would be located in a huge tube. So far so good.
Another question: Could you believe "that a short-circuit at Lawrence Berkeley lab one day was observed by a micro-PMU [Phasor Measurement Units] in Los Angeles, 550 kilometers away, as a 0.002 percent dip in voltage"? It is more likely that one can measure a 0.002 percent dip in 550 km distance than a change in air flow 100 km away caused by a wind turbine.
With a network of many micro-PMUs it may be possible to figure out that somebody is switching on a computer. If you install enough micro-PMUs you may get there.
With a good power quality meter and pattern recognition I could figure out when my wife switches on the Toaster or Microwave.

Each of load (in our home or in the neighborhood) has a specific finger print. So that I could see the patterns and learn what they mean - after some training.

Some people made this observation "We're watching the volts and the amps and we’re not even inside the substation. We’re five miles away. We came up with this idea: What if we were to tell the substation operator that this substation switch is opening and closing? If they were the ones opening and closing it, that’s great. But if not, that’s a pretty good sign that there’s a cyber attack at least being experimented with.”

This is a true story (I guess).

Click HERE for a news report from IEEE Spectrum.

More Big Data to come. Be aware in your home that a power quality meter connected to the copper wire some 20 to 50 m away may be watching you. What about privacy? Is it a good thing to know (almost) everything?
"For in much wisdom is much grief; and he that increaseth knowledge increaseth sorrow." (Kohelet 1:18)


FERC is about to Strengthen the Critical Infrastructure Protection (CIP) Requirements

Security is (so far) likely the most crucial key word in 2016. We all want to live in a secure world with a secure power delivery system and many other infrastructures.
There are many rules set by well known standard setting organizations. One is the US Federal Energy Regulatory Commission (FERC). They have published the Critical Infrastructure Protection (CIP) Reliability Standards years ago. Usually the rules are improved after something serious happened. What happend some months ago? Yes, the Dec 23, 2015 cyber attack on the electric grid in Ukraine.
A lot of reports have been published recently.
FERC seeks comments (in this summer) on possible modifications to the CIP Reliability Standards - and any potential impacts on the operation of the Bulk-Power System resulting from such modifications - to address the following matters:
  1. separation between the Internet and BES Cyber Systems in Control Centers performing transmission operator functions; and
  2. computer administration practices that prevent unauthorized programs from running, referred to as “application whitelisting,” for cyber systems in Control Centers.
Click HERE to access the FERC Docket No. RM16-18-000 that has all the details.

Security standards are one measure to improve the protection of technical systems - but the most crucial issue is: TRUST! Trust is what it's really all about. I hope that all readers of this IEC 61850 blog trust me! I do my best!

By the way, the security requirements on paper or in a PDF document do not protect any system. It is the human beings (you can trust) that have to understand the complexity of the power delivery system, the software applications, communication, and administration of the hardware and software. This requires well educated people - educated in many different (or even all) domains -, sufficient resources, and decisions to implement what is needed.

Rene Descartes (1596-1650) understood it already very well what we have to do: "Hence we must believe that all the sciences are so interconnected, that it is much easier to study them all together than to isolate one from all others. If, therefore, anyone wishes to search out the truth of things in serious ernest, he ought not to select one special science, for all the sciences are cojoined with each other and interdependent."

And: Teamwork makes the dream work!

Stay safe!

Saturday, July 23, 2016

IEC TC 57 Published FDIS IEC 62351-11 Security for XML Documents

Have you ever seen a multi MegaByte XML file used for system or device configurations, COMTRADE, COMFEDE, or other purposes? I have big SCL files that represent real substation specifications. What happens if one (1) single character is removed or changed by somebody ...? A change of a single character can have very severe consequences!
In order to secure XML Files in the context of IEC and other standards organizations, IEC TC 57 just published the document:
57/1753/FDIS: Power systems management and associated information exchange – Data and communications security – IEC 62351-11: Security for XML Documents

Voting closes 2016-09-02

IEC 62351-11 specifies schema, procedures, and algorithms for securing XML documents that are used within the scope of the IEC as well as documents in other domains (e.g. IEEE, proprietary, etc.). This part is intended to be referenced by standards if secure exchanges are required, unless there is an agreement between parties in order to use other recognized secure exchange mechanisms. It utilizes well-known W3C standards for XML document security and provides profiling of these standards and additional extensions.

Wednesday, July 20, 2016

PowerEDGE Offers 3 day Training Course on IEC 61850 and Related Topics in Singapore (24-26 Oct 2016)

The Asian-Pacific region is demanding for competent education services in connection with the application of advanced automation solutions based on IEC 61850 and related standards.
PowerEDGE invites you to attend the most comprehensive Training Course on IEC 61850 ... tap the experience of 230+ courses with 4,100+ attendees all over.
The training  will be conducted in Singapore on 24-26 October 2016.
Click HERE for more details and registration information.

Thursday, July 14, 2016

How to Protect Electric Power Delivery Systems?

These days we see a lot of discussions on security in the domain of electric power delivery systems. One thing is for sure: The power delivery infrastructure is under heavy stress ... just to list a few issues:

  1. Aging equipment (primary and secondary).
  2. Increasing cyber attacks.
  3. Increasing physical attacks.
  4. Aging Workforce.
  5. Political objective to reduce the rate per kWh of electric power consumed.
  6. ...

A lot has been discussed recently regarding these and other issues.

Today I would like to have a brief look on the third bullet "Physical Attack". The Wall Street Journal (WSJ) published the other day a report on physical attacks of substations in the US: "Grid Attack: How America Could Go Dark". After reading these news I decided not to post anything about that report. But: When I got up this morning I read the (bad) news about the tragic attack on humans in Nice (France) last night with 80 people on the death toll of 80, I said to myself, I have to talk about these physical attacks.

First of all, our prayers are for the French people in general and especially for those that have lost one of their loved one, for those that are insured, and those that have experienced this attack.

Second, please read the WSJ report to understand the situation of our - partly very unprotected - electric power delivery system:

Click HERE for the report.

More or less the same could be reported about many substations worldwide.

Next time we may see a truck driving into a major substation, power plant, or high voltage transmission tower, ... How can we protect ourselves and the technical systems that are needed every second in our life?

2. Timothy 3:1-5 says: "1 But understand this, that in the last days there will come times of difficulty. 2 For people will be lovers of self, lovers of money, proud, arrogant, abusive, disobedient to their parents, ungrateful, unholy, 3 heartless, unappeasable, slanderous, without self-control, brutal, not loving good, 4 treacherous, reckless, swollen with conceit, lovers of pleasure rather than lovers of God, 5 having the appearance of godliness, but denying its power."

It is unlikely that all humans will understand the importance of the electric power delivery system (and other critical infrastructures) and to control themselves NOT TO TOUCH the system (AND of course other humans)! So, we have to do our best to better physically protect the crucial stations - which is better than do nothing. Attacks will continue to happen - but we have to spent more resources to increase the physical security.

We all have to accept the increase in your electric power bill - if we want to continue using power whenever we need it - 24/7. I hope that we learn better what the real value of our electric power infrastructure is for our daily life!



KEMA (now DNV GL) has Developed a New Suite of Test Tools for IEC 61850

DNV GL (former KEMA, Arnhem/NL) has developed a suite of IEC 61850 test tools, which will be sold under license to both utilities and technology providers.
Under the name UniGrid, DNV GL provides a new and improved test tool. UniGrid enables test and simulation of a complete IEC 61850 substation automation system and it can be used for various types of conformance and interoperability tests.



The product is planned to be available later this year.

Click HERE to request a copy of the new Brochure.

Saturday, July 9, 2016

New Work Items Proposed within IEC TC 57 (IEC TS 62351-100-1)

57/1747/NP
Power systems management and associated information exchange – Data and communications security – Part 100-1: Conformance test cases for the IEC 62351-5 and its companion standards for secure data exchange communication interfaces (proposed IEC TS 62351-100-1).

The scope is to specify common available procedures and definitions for conformance and/or interoperability testing of the IEC 62351-5, the IEC 60870-5-7 and their recommendations over the IEC 62351-3. These are the security extensions for IEC 60870-5 and derivatives.

Ballot closes 2016-09-30