Digital relays are based on the use of microprocessors. The first digital relay was released in 1985.
One of the major differences between traditional electromechanical relays and static relays is the way the relays are wired.
Electromechanical and static relays have fixed wiring and are set to manual.
Digital relays, on the other hand, are programmable relays whose characteristics and behavior can be programmed. Most digital relays are also multifunctional.
Scope
Modern Protection Relays
Multi-function protection
Product Advantages
Provide continuity of power to consumers
Protecting network assets
Prevent life-threatening electrical accidents
Product Features
Self-checking facility
Low load relays for improved accuracy
Fast fiber optic communication with substation LAN
Adaptive relay program
Allows storage of historical data
Time Stamping
Security in Distribution Automation
General Security in Distribution Automation
Technological advances and breakthroughs have led to a significant evolution of the power grid. www.ge-drive.com As a result, the emerging “Smart Grid” and “Internet of Things” are rapidly becoming a reality. At the heart of these intelligent advances are specialized IT systems – a variety of control and automation solutions, such as distribution automation systems.
solutions, such as distribution automation systems. Automation systems are becoming increasingly interconnected in order to provide comprehensive real-time information to end-users and to achieve higher reliability and greater control. To address the increased risks associated with these interconnections, ABB offers a wide range of cybersecurity products and solutions for automation systems and critical infrastructure.
The new generation of automation systems utilizes open standards such as IEC 61850 and commercially available technologies, in particular communication protocols based on Ethernet and TCP/IP. They can also be connected to external networks, such as office intranet systems and the Internet. These changes in technology, including the adoption of open IT standards, have brought significant benefits from an operational standpoint, but they have also created cybersecurity issues previously known only to office or corporate IT systems.
To address cybersecurity risks, open IT standards are equipped with cybersecurity mechanisms. These mechanisms have been developed in a large number of enterprise applications and are proven technologies. They enable the design, development and continuous improvement of cybersecurity solutions for control systems, including distribution automation applications.
ABB recognizes the importance of cybersecurity and its role in improving the safety of power distribution networks. Customers investing in new ABB technologies can rely on system solutions that prioritize reliability and safety.
At ABB, we are meeting cybersecurity requirements at the system level and at the product level to support cybersecurity standards or recommendations from organizations such as NERC CIP, IEC 62351. IEC 62443. IEEE 1686. ENISA, and BDEW white papers.
System Hardening Ground Rules
Today’s distribution automation systems are essentially specialized IT systems.
Therefore, several of the rules for hardening automation systems apply to these systems as well. From an automation system perspective, protection and control relays are at the bottom of the hierarchy, closest to the actual main processes. It is important to apply the “defense-in-depth” information security concept, whereby each layer in the system is capable of protecting the automation system, and therefore the protection and control relays are part of this concept. The following points should be considered when planning system protection.
– Recognize and familiarize yourself with all parts of the system and the system’s communication links
– Remove all unnecessary communication links from the system
– Rate the safety level of the remaining connections and improve them using applicable methods
– Harden the system by removing or deactivating all unused processes, communication ports, and services
– Check that all applicable parts of the entire system are backed up
– Collect and store backups of system components and keep them up to date
– Remove all unnecessary user accounts
– Define password policies
– Change default passwords and use strong passwords
– Check that strong encryption and authentication is used for links from the substation to higher-level systems
– Separate public (untrusted) from automated (trusted) networks
– Isolate traffic and networks
– Use firewalls and demilitarized zones
– Evaluate systems regularly
– Use malware protection in workstations and keep it up to date It is important to utilize defense-in-depth concepts when designing automated system security. Connecting devices directly to the Internet is not recommended without adequate additional security components. Security controls should be used for the different layers and interfaces in the system. In addition to product features, strong security means enabling and using available features and enforcing their use according to company policy. Proper training of personnel accessing and using the system is also required.