DOI QR코드

DOI QR Code

Line Security Evaluation of WANS Considering Protectability of Relays and Vulnerability of Lines

  • Hussain, Akhtar (Dept. of Electrical and Electronic Engineering, Myongji University) ;
  • Seok, Chang-Ju (Dept. of Electrical and Electronic Engineering, Myongji University) ;
  • Choi, Myeon-Song (Dept. of Electrical and Electronic Engineering, Myongji University) ;
  • Lee, Seung-Jae (Dept. of Electrical and Electronic Engineering, Myongji University) ;
  • Lim, Seong-Il (Dept. of Electrical Engineering, Kyungnam University)
  • Received : 2014.03.01
  • Accepted : 2014.07.14
  • Published : 2014.11.01

Abstract

Maloperation of protective relays is one of the major causes for cascading tripping in WANS. Another line trip followed by a previous line trip may occur due to overloading of the line, because of the load redistribution or unwanted trip of a backup relay due to change in the flow of fault current. Evaluation of each line is required by considering both of these effects. A new index named Line Security Index (LSI) is proposed in this paper which combines both Vulnerability Index (VI) and Protectability Index (PI) to completely evaluate the security of individual lines and their importance in the power grid. Computer simulations have been performed on the Korean power grid data to establish the feasibility of the proposed idea.

Keywords

1. Introduction

On one hand, power grids are among the most curtail and essential infrastructures in modern society; while on the other hand, due to an increased demand of power and economic constraints power lines are operating closer to their maximum limits. This makes them more prone and vulnerable to disturbances. When power flows normally all the lines seem to be equally important while in reality some lines are more important and tripping them may result in another line tripping possibly leading to cascading trips and ultimately resulting in large area blackouts or even a complete breakdown of the network. In order to prevent the cascading events and high magnitude blackouts, it is desirable to evaluate all the lines of a power grid and assign some index to each line to indicate the importance of individual lines in a particular network.

Improper functioning of protection relays has been one of the major causes for the cascading events [1, 2, 14]. The maloperation of relays is mainly caused by two potential incidences. One is the overloading of a line due to redistribution of a load after the tripping of a particular line (due to any reason). Another is unnecessary trip of the backup relay because of a change in flow of the fault current after the tripping of a line. Different algorithms for evaluating the vulnerability of power systems and to reduce restoration time have been proposed [3-5, 11, 15].

An algorithm which is computationally non-intensive is required for real time computations of protectability and vulnerability. This is because power networks keep on changing causing these parameters to need to be recalculated over and over. This is another challenge for evaluation of line security in power systems [13].

Overloading of the lines after redistribution of a load has been addressed in [6] and has been named Vulnerability Index (VI). This indicates the risk of a cascading tripping due to an overload after tripping that line.

Only the vulnerability analysis of power systems is not sufficient for a complete evaluation of cascading tripping. Maloperation of relays due to a change in flow of fault current is also a major cause of cascade tripping. Both of these parameters are equally important for security evaluation of power lines. A security index which will combine the effect of both the potential causes of cascading tripping is necessary to identify the importance of the individual lines in a power network.

This paper proposes the Protectability Index for each line to indicate the risk of the maloperation of a relay due to the change in flow of a fault current after tripping of a line. It combines the VI and PI to make a new index for evaluating the security of each line in a given power network and inputs the information into the new Line Security Index (LSI). The Line Security Index caters to both of the major potential causes of cascade trips. It sums the VI index proposed in [6] to the Protectability Index (PI). The paper uses a simple method for real time computation of all the indexes.

 

2. Protection Vulnerability and Protectability

When the power system is working in normal mode, all the lines seem to be in the same equipotent state. When a fault occurs in normal mode, the responsible relays are opened and clear the fault as shown in Fig. 1. With this, it is difficult to identify which line is of more importance in normal mode.

Fig. 1.Example Power System working in normal mode

In an actual case, some lines are of more importance than others. Their tripping may result in overloading of other lines and result in cascading tripping. When a line is tripped some of the relays in the network need to be reset to avoid maloperation in case of a fault. So it is essential to identify the importance of individual lines.

When a line is tripped in a power network due to any reason, the load of that line is redistributed to other healthy lines. The amount of load transferred can be easily calculated by using Line Outage Distribution Factor (LODF) [6].

In Fig. 2 P1, P2 and P3, the power flowing through line1, line2 and line3 are in normal mode respectively. When line1 is tripped, its load will be redistributed to line2 and line3. Power flowing through line2 and line3 after tripping of line 1 is P2+ΔP2 and P3+ΔP3 respectively, where Δ indicates the extra load of line1. Due to this extra load, line2 and line3 may get overloaded and trip. This is known as Protection Vulnerability and is addressed in detail in [6]. Protection Vulnerability depends upon the current structure of the power network. It needs to be updated after some interval of time, and LODF is a fast method to do this. Distance relays are major devices used for protection of power networks and their operation is based on some preset values [7-9, 12]. They cannot be reset in real time but their setting values can be calculated. The setting values of each relay can be calculated before and after the tripping of a line and the difference between these two values is used to compute the PI.

Fig. 2.Power flow in normal state and after line tripping

When a fault occurs in the normal network, the responsible relays get tripped and the faulty section is isolated from the rest of the network Fig. 3. When the fault occurs after the tripping of a line, the relay mounted on the backup line may maloperate due to a change in the flow of the fault current and this may lead to cascading trips.

Fig. 3.Flow of fault current before and after tripping of line

After the tripping of a line the setting values of relays in the network need to be updated. Real-time updating of relays is not possible, but those relays which need a reset can be identified. Apparent Factor is required for setting the relays [8] and a fast algorithm for computing Apparent Factor without a fault analysis has been proposed in [10]. The method only needs the Network Impedance Matrix and Certain Line Impedances.

In Fig. 3, the setting value of relay on line2 in normal state is K1. When a fault occurs at line3, then the responsible relays (R2 and R3) will get tripped and clear the fault. When line1 is tripped due to any reason and a fault occurs at the same point, the backup relay, R1, may maloperate, because the fault current flowing through L2 has been increased by ΔF. The R1 setting value should be changed to K2 after the L1 trip.

In order to analyze the line, the change in power flow ΔP and change in fault current ΔF are required to be known. The following section explains how to calculate these values in real time.

 

3. Computation of Indexes

3.1 Power flow estimation using LODF

The variation in voltage angle according to the real power variation can be given by:

LODF is used to estimate the change of the load on a line after the tripping of another line. In Fig. 2, the power flow through Line2 after Line1 that got tripped can be calculated by:

Where P2new is a new power flowing through Line2 after the Line1 outage, P2 represents the pre-outage power flow of Line2 and ΔP2 represents the Line1 load which is transferred to Line2. This increase can be written as:

Eq. (2) can be written as:

Where d(2,1) is the line outage factor, Line2 is monitored after the outage of Line1. P10 is the power flowing through Line1 before its tripping.

The Line Outage Distribution Factor d(l,k) is defined by power flow increase ratio after tripping a line in the network and depends on the network topology and system parameters. This can be calculated in a normal state by using (4) [6], [1].

This shows that d(l,k) represents LODF from line k to line l when k is tripped.

xl and xk are reactances of line l and line k respectively.

i and j are bus IDs surrounding the monitoring line (Line2).

m and n are bus IDs surrounding the tripped line (Line1).

X(a,b) is (a,b)th element of X matrix in (1).

Using (4) LODF matrix between all the tie lines in the network can be calculated as follows:

Every time the network structure or network parameters are changed, this matrix needs to be updated.

3.2 Computation of vulnerability index

The Vulnerability Index indicates the risk of cascaded tripping of distance relays due to overload. The setting of distance relays is done by using the blinder, which is determined by the Maximum Load Ability of the line. The proposed method for calculating the Vulnerability Index in paper [6] using this proximity to the relay blinder is used. This paper not only analyzes the direct impact of line tripping but also analyzes the impact of second line tripping such as in Fig. 4. This paper divides the blinder into three zones using the Maximum Load Impedance by utilizing the Boundary Resistance Value of 85% and 125% of Maximum Load Impedance which represent the severity of distance in a relay trip possibility.

Fig. 4.Computation of secondary and tertiary VIs

First level VI is calculated by applying a weighted value defined for each of the three zones. Second Level Vulnerability is calculated by first calculating the Vulnerability Index for each line by assuming the under observation line while tripped, and then an average of all the values is calculated. For Third Level Vulnerability, it is assumed that another line is tripping while the Under Observation Line has been tripped and the index computes it in the same way. The final VI is computed by summing all the primary, secondary, and tertiary VIs for that line.

3.3 Apparent factor and setting of distance relays

Due to the presence of feed lines in power systems, the distance seen by Distance Relay is known as Apparent Impedance; it differs from the Real Impedance by a factor known as Apparent Factor given as:

Here Iij and Ijk show the current flowing through protected branch and protective branch respectively shown in Fig. 5.

Fig. 5.Updating the relay setting values

Calculation of Apparent Factor using the conventional method as in (1) is a time consuming process due to the involvement of fault calculations. A fast algorithm for finding the apparent factor without fault analysis has been proposed in paper [10]. The method only needs the Network Impedance Matrix and certain Line Impedances.

Suppose the current injected from fault node F is IF which will produce voltage at each node and is given as:

ZiF is the trans-impedance between node i and F. If normal voltage of node i is Vi0, then at fault state, it will be

Vi=Vi0 +ViF. If normal state node voltage is unified in per unit, then Vi0=Vj0, branch currents can be given by (7) & (8) by putting the values of ViF and VjF from (6)

Apparent Factor can be computed by using (7) and (8) in the following way:

Once Apparent Factor is calculated, the setting values for zone 2 of Distance Relay are given as:

(Protected Line Impedance 100%) + {(50% of shortest Protecting Line Impedence) × (apparent factor/2)}

When line L2 is tripped in Fig. 5, then the setting values of relay need to be reset. For updating the setting values, we use the above mentioned formula. Apparent Factor is a sensitive element in that formula which can be calculated by using (9). The Branch Impedance can be updated by using (12). Fig. 6 shows a network where a branch with impedance Z^ is deleted between node p and q. The new impedance matrix can be calculated by using (12):

Fig. 6.Computation of new impedance matrix

The voltage at any node i in the network after deleting line between node p and q can be given by:

The new current can be calculated by integrating the polynomials after substituting the new voltage at nodes p and q as Vp^ =Vq^ − (−Z^)I^. Eq. (10) can be written as

The new impedance matrix can be calculated by substituting (11) into (10): [10]

When a line is deleted, the new admittance matrix can be calculated by using (12). Once the matrix is known, the new Apparent Factor can be calculated by using (9). Then the new setting Values of Relays can be computed.

3.4 Computation of protectability index

After finding the setting values of relays before and after the tripping of line, the difference between these two values has been analyzed and a new index, Protectability Index (PI) has been proposed. It indicates the risk of cascading tripping due to unwanted tripping of relays due to change in flow of fault current after tripping a line.

In Fig. 3, the setting value of relay in L2 before tripping of L1 is K1 and the new setting value of relay is K2 after tripping of L1 and redistribution of load. Then, PI will be calculated by using the weighted protectability defined for the different regions. Fig. 7, which is governed by equation set (13), shows the Protectability Index for each region.

Fig. 7.Weighted Protectability for each region

Where Cl - Lower limit for setting value Cu - Upper limit for setting value.

Abscissa in Fig. 7shows the new setting values of the relay being observed. Cl is the lower limit for new setting values and Cu is upper threshold for the new setting value. Both the thresholds have been set as 10% of the old setting value of the relay. Since operating current of a relay should be within 10% of the pickup current [16] and relay setting values is function of pickup current.

Similarly PI will be calculated for all other relays, and the final PI for L1 will be the sum of all the individual line PIs.

3.5 Computation of line security index

The vulnerability index is measure of how much other lines become overloaded when a line is tripped due to any reason.

VI has been computed by dividing the relay blinder into three zones by using the maximum load impedance as shown in Fig. 8. The graph show in Fig. 8 is governed by equation set (14).

Fig. 8.Weighted Vulnerability for each region

Where Rij : Load impedance of line between bus i and bus j Rmax : Maximum load impedance of the same line

The traditional setting of zone one for distance relay is adopted as 80% of the line considering measurements errors and is based on engineering experience [8]. While setting of zone two is set as 120% of its line by considering the measurement errors. By giving an additional margin of 5%, the VI computed for region one has been set to one, if the line impedance drops by 85% of its maximum impedance i.e. Rij < 0.85 × Rmax . Similarly for region three, the VI has been set as zero, if the line impedances crosses 125% of the maximum impedance i.e Rij > 1.25 × Rmax. After knowing the boundary conditions the VI for region two has been calculated by formulating a line equation between these two known points, where 0.4 is the slope of that line.

Protectability Index tells about the possibility of falsely tripping the relays planted for protection of the line with a change in the fault current. The weighted protectability for each region has been shown in Fig. 7. In order to analyze a line completely, it is essential to analyze both the indexes.

Line Security Index is the algebraic sum of both the Vulnerability Index and the Protectability Index and is given as LSI = VI + PI . The calculated LSI will indicate the importance of each individual line.

The LSI assigned to each line has a physical significance. LSI indicates the probability of total unwanted trippings. PI indicates the probability of unwanted relay operations due to change in the flow of fault current and VI indicates the probability of unwanted trippings due to overloading. Combining both will result in the probability of total unwanted operations when the line under observation is tripped.

In the example system shown in Fig. 3, each line from L1 to L3 will have an LSI. It will indicate the importance of that line. Here, importance of a line means its effect on the remaining system in terms of overloading of lines and/or tripping of other relays. The complete process for computation of LSI is explained by the flow chart shown in Fig. 9.

Fig. 9.Flow chart for LSI computation.

We can analyze the system and find the relay setting values before and after the line tripping. Once we know the importance of each line by using LSI, we can easily reset the designated relays only. Resetting of the relays in real time is not possible, and it also is difficult to determine which group of relays needs to be reset. By using the proposed LSI in this paper, we can easily find the relays which need to be reset when a particular line is tripped. Due to the simplicity of methods used for calculating, the relay setting values or load distribution the proposed index can be calculated in real time and quickly, if configuration of the network is changed.

The PI and VI values for individual relays are computed by using Figs. 7 and 8 respectively. The computed values using these figures show the probability of tripping of a single relay, so their maximum value is one. While the final PI and VI values show the total number of unwanted trippings due to the backup relay’s maloperation and line overloading respectively. If PI for a line is 2, then tripping of that line will result in two unwanted relay trips. The value 2 indicates that probability of false tripping of both the relays is one and one respectively. Similarly 2VI means two unwanted trips due to overloading, with a tripping probability of one for each of the two relays.

Every line will be assigned an LSI using the method depicted in Fig. 9. The value of LSI indicates the probability of unwanted operations. If LSI for a line is 3, it means there is probability of 3 maloperations if the Under Observed Line is tripped. The algorithm has been already realized by Korea Electric Power Corporation (KEPCO).

 

4. Test Cases

The test system has been simulated in PSCAD version 3.0 and system parameters have been taken from Korea Electric Power Supply Corporation. The system parameter files have been exported as .txt files. The text files have been used for calculating VI, PI and LSI for each line by making use of the proposed algorithm developed in C++, Visual Studio 2010. The final values of VI, PI, and LSI computed by using the developed algorithm are stored in a text file for analysis of the tested system. The tested system comprises of 259 lines and 1533 buses. The line id ranges from 0 to 258. Fig. 12 shows some part of the tested network. Due to the complexity of network only some part of it is shown. The figure only contains those lines which have a comparatively severe effect on the remaining system from protectability and/or vulnerability point of view.

Fig. 12.A Portion of tested network

4.1 Evaluation of VI

For evaluation of VI primary, secondary and tertiary indexes have been summed and the Value of Primary Index is usually zero because the blinder is set in a safe zone initially. The secondary index indicates how much the remaining system will be affected when the line of the given id is tripped and the tertiary indicates the risk of cascade tripping i.e how the remaining system will be affected when another line is tripped given that under observation line has already been tripped.

The final VI is the sum of all the above three indexes. Table 1 shows the results of only those lines which have a significantly higher VI. By analyzing the final VI from Table1, it can be concluded that line 212 is the most important line from a vulnerability point of view. VI is computed by tripping Line 212 and then line 115 given that line 212 was already tripped as shown in Fig. 10. Secondary VI for line 212 is 0.684, tertiary is 0.342, and final VI is 1.027 which is greater than one. It means at least one line will get overloaded. In this case line12 is fully overloaded and will be tripped via overloading (because VI>1). A similar interpretation is valid for all the other lines.

Table 1.Computation of VI

Fig. 10.Significance of VI

Fig. 10 shows the physical significance of VI; VI indicates number of overloaded lines. The VI for line 212 is 1.027 which means one line will get overloaded, line12.

The higher the VI, the more important the line is because when a line with a high VI is tripped, there is more possibility of other lines overloading resulting in false tripping. This may then lead to cascade tripping. Though, tripping lines with lower VI are not likely to cause any significant danger to the system.

4.2 Evaluation of PI

Similarly for computing PI the same system of 259 lines is used. In order to calculate PI, new setting values have been computed for all the connected lines. Setting values before and after the tripping of the line have been used according to Fig. 3. Ultimately, the PI for the relay has been computed by finding the sum of all the individual PI values.

Results of some of the lines which have a higher effect on the setting values of adjacent lines relays are shown in Table 2.

Table 2.Computation of PI

When a fault occurs in line11 in normal state, the responsible relays planted at both the ends of line11 get tripped and the faulty section is isolated as shown in Fig. 11, a section of Fig. 12. However, when line8 is tripped and the fault occurs at the same point on line11, then the backup relays planted on line4 and line5 may maloperate. From tripping line8, all of the fault current will flow through line4 and line5 and these two relays will need to be reset. The PI value is the index for the number of false tripping. For line8, PI is 1.939 which is around 2. With this, two relays will maloperate if line8 is tripped. The two relays are the relays at line4 and line5 as shown in Fig. 11.

Fig. 11.Significance of PI

By observing the above table, it can be concluded line8 is the most important line from a protectability point of view because its tripping will lead to two false trips (PI≈2).

A similar type of interpretation is valid for all the lines. The higher the PI, the more important the line is. When a line with higher PI is tripped and fault occurs at a protective line, there is more of a chance for falsely tripping the protected line relay. When a line with low PI is tripped, there are less chances of maloperation of the protected line relay.

4.3 Evaluation of LSI

Finally the LSI is computed by summing the VI and PI values. Below Table 3 shows LSIs of only some of the lines whose values are higher. Every line is connected between two busses. From Bus and To Bus in the following table mean the bus names between which the given lines are connected.

Table 3.Computation of LSI

The importance of a line is given by the number of false trippings which will be caused by that line. LSI indicates total number of false tripping when the given line is tripped. LSI for line8 is around two which means two maloperations. Fig. 13 shows that when line8 is tripped and a fault occurs at line11, two relays (line4 and line5) will maloperate.

Fig. 13.Significance of LSI

The LSI computed has given an importance to each line by considering both protectability and vulnerability. The higher the LSI value the greater the importance of the line is. Tripping of an important line may result in another line tripping. Ultimately, it will result in a cascade tripping and may lead to a huge blackout or complete system breakdown.

 

5. Conclusion

Protectability index has been calculated by using the setting values of a relay before and after the tripping of other lines and vulnerability index is same in [6] with different regions and different weightages for each region.

Only VI or PI cannot evaluate the importance of an electrical line completely, so this new index has been proposed. The new index, LSI, is computed with a numerical sum of both VI and PI. VI indicates the probability of number of false operations in a power network due to overloading and PI indicates the probability of number of false trips due to change in the flow of fault current. Their sum will indicate the total number of false operations in a power network. The new proposed method is based on simple and real time application methods. Finally, each index has a physical significance. By observing the index value, number of maloperations can be easily determined. It has been applied to the real system data at the Korean Electrical Power Supply Corp. The proposed method has been realized by KEPCO and has been used for monitoring and analysis of real power systems in Korea. The results have proved it to be an essential index for finding the importance of individual lines before tripping lines as to avoid cascaded line tripping and at long last avoid large scale blackouts.

References

  1. Seong-Il Lim, Chen-Ching Liu, Seung-Jae Lee, Myeon-Song Choi, and Seong-Jeong Rim. "Blocking of Zone 3 Relays to Prevent Cascaded Events" IEEE Transactions on Power Systems, Vol. 23, No. 2, MAY 2008
  2. Seong-I1 Lim, Han-Chuan Yuan, Seong-Jeong Rim, Seung-Jae Lee, Myeon-Song Choi "Adaptive Blinder for Distance Relay Based on Sensitivity Factors". International Conference on Power System Technology, 2006.
  3. Xingbin Yu and Chanan Singh "Integrated Power System Vulnerability Analysis Considering Protection Failures". Power Engineering Society General Meeting, IEEE, Volume 2, 2003.
  4. Ahmed M. A. Haidar, Azah Mohamed and Aini Hussain "Power System Vulnerability Assessment Considering a New Index Based on Power System Loss". American Journal of Applied Sciences 5, 2008.
  5. Wen-Hao Zhang, Myeon-Song Choi, Seung-Jae Lee, Il-Hyung Limand, Seong-Jeong Rim "A Probabilistic Method Based Protectability Evaluation of Distance Relay in Transmission Networks" Journal of Electrical Engineering & Technology, Vol. 3, No. 3, pp. 346-353, 2008 https://doi.org/10.5370/JEET.2008.3.3.346
  6. Sung-Jun Park, Seung-Jae Lee, Myeon-Song Choi, Tae-Wan Kim, Sang-Tae Kim and Jin-Hwan Kim "A New Index for Evaluating Protection Vulnerability" The International Conference on Advanced Power System Automation and Protection China, 2011.
  7. User manual for distance relay of 154kV transmission line protection", Xelpower, Korea, 2000.
  8. Myongji University and Korea Power exchange "A study on establishment of protective relay setting rules" Page 347, 2003
  9. Gerhard Ziegler "Numerical distance protection principles and Applications" 4th Edition Page 7 to 32, Jan 2011.
  10. Yong-Hwan Jo, Ling Xiang, Myeon-Song Choi, Ji- Seung Park, Seong-Il Lim, Sang-Tae Kim and Seung- Jae Lee" A Fast Algorithm of the Apparent Factor Calculation for Distance Relay Setting without Fault Analysis" J. Electr Eng Technol Vol. 8, No. 1: 64-69, 2013. https://doi.org/10.5370/JEET.2013.8.1.064
  11. B.A Carreras, V.E Lynch, I. Dobson, D.E Newman "Critical points and transitions in an electric power transmission model for cascading failure blackout in power systems". Chaos, Vol. 12, no. 4, pp. 985-994, December 2002. https://doi.org/10.1063/1.1505810
  12. Phadke, A.G and Throp, J.S. "Expose hidden failures to prevent cascading outages in power systems", Computer Applications in Power. IEEE, pp. 20-23, July 1996.
  13. T. Nye, C.C. Liu, and M. Hofman, "Adaptation of relay operations in real time", in proc. 15th PSCC, Sessional, Paper 6, Liege, Belgium, Aug. 2005.
  14. S.H Horowitz and A.G. Phadke, "Third zone revisited", IEEE Trans, Power Deel, Vol. 21, no. 1, pp. 23-29, Jan 2006. https://doi.org/10.1109/TPWRD.2005.860244
  15. Akhtar Hussain, Myeon-Song Choi, Seung-Jae Lee "A Novel Algorithm for Reducing Restoration Time in Smart Distribution Systems Utilizing Reclosing Dead Time" JEET, 2014. https://doi.org/10.5370/JEET.2014.9.6.1805
  16. Alstom Grid "Technical manual, differential feeder and Transformer feeder protection", 2011.

Cited by

  1. A service interruption free testing methodology for IEDs in IEC 61850-based substation automation systems vol.87, 2017, https://doi.org/10.1016/j.ijepes.2016.11.007
  2. Contingency Analysis about Restoration of outage in Distribution System vol.65, pp.8, 2016, https://doi.org/10.5370/KIEE.2016.65.8.1317
  3. Towards Cyber Security Risks Assessment in Electric Utility SCADA Systems vol.10, pp.3, 2015, https://doi.org/10.5370/JEET.2015.10.3.888