Do Settingless Relays truly improve Protection Ideas?

  • Thread starter Thread starter EverGreen1231
  • Start date Start date
  • Tags Tags
    Ideas Protection
Click For Summary

Discussion Overview

The discussion revolves around the efficacy and implications of settingless relays in electrical protection schemes, particularly in comparison to traditional methods. Participants explore the potential advantages, such as improved detection of high impedance faults, while also questioning the complexity introduced by new technologies and the associated risks, including cybersecurity concerns.

Discussion Character

  • Debate/contested
  • Exploratory
  • Technical explanation

Main Points Raised

  • Some participants question how settingless relaying schemes improve upon traditional methods, suggesting that they may not provide sufficient economic justification for widespread adoption.
  • Others argue that while state estimators could potentially detect abnormal conditions effectively, their reliability is contingent on proper functioning, raising concerns about complexity and vulnerability to cyber attacks.
  • One participant highlights the need for a cost-benefit analysis, advocating for pilot demonstrations to gather data on reliability and performance metrics before making significant changes.
  • Concerns are raised about the cybersecurity implications of introducing networked elements into protection systems, with some suggesting that non-networked systems are inherently more secure.
  • Another participant counters that even air-gapped systems can be vulnerable to hacking, emphasizing the need for transparency regarding cybersecurity risks in any cost-benefit evaluation.

Areas of Agreement / Disagreement

Participants express a range of views on the benefits and drawbacks of settingless relays, with no consensus reached on their overall efficacy or the justification for their implementation. The discussion remains unresolved regarding the balance between simplicity and complexity in protection schemes.

Contextual Notes

Participants acknowledge limitations in their understanding of cybersecurity, which may affect the depth of the discussion on that topic. Additionally, the economic implications of adopting new technologies are noted as a critical factor that remains to be fully explored.

EverGreen1231
Messages
75
Reaction score
11
I have more of a discussion type question than one about Electrical Concepts (though I suppose it will devolve into that area). I've been doing a bit of reading about settingless relaying schemes and was wondering how they really improve over the traditional methods?

The method of Dynamic State Estimation seems to do precisely the same thing as any other differential protection scheme, except it looks to be better at detecting high impedance faults.

Simplicity is beautiful, and, in many areas, superior to the obfuscation that "new technology" tends to introduce. If protection schemes are meant be as simple as functionally possible, would it be entirely prudent to complicate the methods by introducing State estimation and communication between remote areas? Thoughts?
 
Engineering news on Phys.org
The KISS principle versus "smart complexity" That's a pretty philosophical topic.

I could absolutely imagine that a state estimator, if working correctly, could detect many abnormal conditions on the grid, or in a power plant, or in almost any engineered creation. The problem is the "if working correctly" qualifier.

Need I point out that more complex software-based gadgets not only have more ways to go wrong naturally; they also necessarily make us more vulnerable to cyber attack.

Any KISS versus complexity debate must reduce to costs versus benefits. Costs and benefits can best be estimated by, first stop drinking the EPRI cool aid, and second by installing pilot advisory only demonstrations for a number of years. Collect data on reliability, true and false positives and true and false negatives.

Instead of the power grid, you might get a better conversation raising the same points in a Boeing versus Airbus philosophical debate about automation in aircraft cockpits.
 
  • Like
Likes   Reactions: EverGreen1231
This corroborates my thoughts. There doesn't, at first glance, seem to be enough economic "skin in the game" to get all excited and change an entire paradigm of thought. HIF are a problem, but not one that occurs frequently enough and in a manner damaging enough to worry too much about. The other proposed areas of improvement are similarly "small." One could correctly correlate this to the idea of High volume, slim margin: Settingless relays may make sense, but only over several years, and assuming the "if working correctly" caveat is not violated significantly within that time frame.

I'm not the one to speak intelligently on Cyber security as my knowledge of the discipline is lamentably slack, but the word "necessarily" caught my attention (as was, perhaps, intended). Would you explain?

I'll have to look-up more about the Boeing vs Airbus debate before I dare tread those pastures. ;)
 
Last edited:
EverGreen1231 said:
n Cyber security as my knowledge of the discipline is lamentably slack, but the word "necessarily" caught my attention (as was, perhaps, intended). Would you explain?

Perhaps in this instance the simplest explanation is, if you don't need to run an ethernet cable to it (ie mechanical safetys, contacts ect) you can't exactly hack into it. In other words what's not on a network is by definition not open to network intrusion. Introducing a cyber element into anything necessarily opens this door as no standalone system can differentiate between auhorized and unauthorized access.
 
krater said:
Perhaps in this instance the simplest explanation is, if you don't need to run an ethernet cable to it (ie mechanical safetys, contacts ect) you can't exactly hack into it. In other words what's not on a network is by definition not open to network intrusion. Introducing a cyber element into anything necessarily opens this door as no standalone system can differentiate between auhorized and unauthorized access.

Good advice. But the Stuxnet virus demonstrated conclusively that air-gapped systems with no net connection, can still be hacked.

Even if the probability of a successful hack is small, your board of directors will ask the question. "Do we own anything that is possible to hack by any means ; yes or no?". You are forced to say, "Yes."

A smaller board question, "Is this new thing impossible to hack ; yes or no?" You are forced to say, "No," if the thing is digital.

The board is not interested in actual risks. Their questions are for CYA purposes only.

The point is that you must include the risk of hacking in the cost-benefits to be fully transparent.
 

Similar threads

  • · Replies 2 ·
Replies
2
Views
6K
Replies
24
Views
8K
  • · Replies 1 ·
Replies
1
Views
3K
Replies
4
Views
10K
Replies
29
Views
5K
Replies
12
Views
3K
Replies
9
Views
7K
  • Poll Poll
  • · Replies 17 ·
Replies
17
Views
7K
  • · Replies 4 ·
Replies
4
Views
4K