Next Article in Journal
Towards an Automatic Recognition of Artifacts and Features in Plethysmographic Traces
Previous Article in Journal
Effect of Low-Frequency Magnetic Field Stimulation on Physical Performance and Inflammation in Post-Stroke Patients: A Feasibility and Safety Study
Previous Article in Special Issue
Energy Trading Strategy for Virtual Power Plants with Incomplete Resource Aggregation Based on Hybrid Game Theory
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Smart Grid Protection, Automation and Control: Challenges and Opportunities

1
ABB Electrification Service, 08192 Sant Quirze del Vallès, Spain
2
ABB Schweiz AG, 5400 Baden, Switzerland
3
Department of Electrical Engineering, Universitat Politècnica de Catalunya—BarcelonaTech (UPC), 08222 Terrassa, Spain
*
Author to whom correspondence should be addressed.
Appl. Sci. 2025, 15(6), 3186; https://doi.org/10.3390/app15063186
Submission received: 11 February 2025 / Revised: 8 March 2025 / Accepted: 10 March 2025 / Published: 14 March 2025
(This article belongs to the Special Issue Design, Optimization and Control Strategy of Smart Grids)

Abstract

:
The evolution of Protection and Control (P&C) systems has developed though analogue and digital generations, and is presently advancing towards the utilization of Virtualization of Protection, Automation and Control environments (VPAC). This article focuses on redefining the features of traditional and modern P&C systems, Centralized Protection Automation and Control (CPAC), and VPAC, focusing on the integration of Intelligent Electronic Devices (IEDs) with secure communication that is time-effective in the centralized distribution of power and prevention of network vulnerability. Though standards such as IEC 61850-9-2 LE have been adopted, the actualization of full interoperability between diverse IED manufacturers remains elusive. With the digitization of technologies, P&C systems are naturally transitioning to virtual environments, with timing precision, redundancy and security being imperative. Latency and resource management and allocation in VPAC systems are considerable global issues. This paper discusses the issues of maintaining low operational performance in virtual substation environments while satisfying the requirements for performance in real time. The impacts of large volumes of data and artificial intelligence on the management of the grid are studied, and AI-based analytics that predict system failures and automatically change load flows are shown, as they have the potential to increase the flexibility and stability of the grid. The use of big data enables electric power utilities to enhance their protection systems, anticipate disturbances and improve energy management methods. The paper presents a comparative analysis between traditional P&C and its virtualized counterparts, with strong emphasis placed on the flexibility and scaling of VPAC resources.

1. Introduction

P&C systems, which are indispensable in intelligent grids, have undergone significant advancements in the 20th century [1]. From the early days of analogue systems to the modern digital frameworks found in electrical substations, P&C systems are now transitioning into VPAC environments. The evolution of protective relays is illustrated in Figure 1 [2,3]. Numerous factors, including the need for energy efficiency, the increase in distributed generation, the rapid advancement of technology, and the expansion of infrastructure for electric vehicle charging are driving the necessary transformation. Therefore, the utility industry has to change, and manufacturers must produce more dependable, safe, and adaptable systems to satisfy current consumer demands. The IEC 61850 standard [4] has greatly improved interoperability among IEDs from different manufacturers, fostering the development of CPAC.
The standard represents an important step toward lowering future maintenance and investment expenses, despite full interoperability still being an issue. The CPAC system architecture is centralized and offers several advantages, including easier maintenance, improved information management, and the improved coordination of protection functions. In addition, these systems are capable of supporting sophisticated digital solutions including but not limited to having real-time monitoring, predictive maintenance, and movable protection schemes, which enhance grid performance and robustness. Figure 2 depicts the model of communication related to the IEC 61850 standard from [3]. Systems centralization began in the 1960s with the work of organizations like Westinghouse Electric and ABB, in which the integration of the protection and the control functions was envisaged [2].
The works of ABB, especially during the 2000s, focused on using IEC 61850 and Ethernet standards to design and develop digitally enabled relays that were on the roadmap for future centralized PAC systems [3,5]. Consolidated PAC architectures integrate protection functions within a single-system platform, and facilitate the incorporation of distributed generation and a complex grid structure [6,7]. The evolution of the grid is characterized by the pressure to incorporate more and more distributed generation, deploy mesh topologies, and integrate large amounts of varying renewable sources. Virtualized PAC (VPAC) systems are the systems of the future that will allow the large-scale management of the grid by incorporating resources such as big data, artificial intelligence and machine learning [8]. These tools will, in turn, allow for predictive maintenance, autonomous load management, improved cybersecurity, and other things. In practice, migration to VPAC also supposes overcoming a number of challenges regarding time synchronization, redundancy, and cybersecurity, especially since cloud-based systems open their systems to new types of vulnerabilities. But even now, the VPAC systems have a very important fail-safe—the electromechanical relays. Even if there is a complete failure of the digital system, the electromechanical devices will be able to provide protection in a very reliable manner, as they are independent of software and digital communications. These devices, together with protocols for manual intervention, ensure safety and stability in the worst-case scenario. The transformation from electromechanical systems to VPAC can therefore turn power systems into more intelligent and adaptive networks. Much ongoing research is required, along with standardization like IEC 61850, and the integration of advanced technologies in overcoming the present challenges and assuring the reliable and secure operation of modern electrical grids.

2. Methodology

A systematic review of electronic resources was performed in order to analyze papers on smart grid protection, automation, and control to ensure replicability. Papers were then chosen to correspond to the specific inclusion and exclusion criteria outlined below. Using the keyword “Protection system”, 106,695 results were found from an initial search. Several key topics came up in preliminary studies, including “Protection Methods”, “smart grid”, “time synchronization”, “redundancy”, “cybersecurity”, and “Virtualization Technology”. Specific databases were used to refine the results. High-quality peer-reviewed papers were taken from SpringerLink [9], IEEE Explore [10], Web of Science [11], SCOPUS [12], ScienceDirect [13], Specialized Journals [14], and also the report provided by the IEEE PES PSRC WG K15 [14]. Keywords were combined with rigorous inclusion and exclusion criteria in order to mitigate potential bias and ensure the selection of the most relevant and highest-quality publications. In addition, the search results were subjected to a detailed analysis incorporating both recent and historical publications, thus reducing any possible bias in the final results. This rigorous review process resulted in the selection of 105 relevant publications for further analysis.
According to the McKinsey Digital 2023 Technology Trends Outlook report [15], electrification and climate technologies lead us toward a sustainable, zero-emission future. Communication and advanced connectivity technologies, such as 5G and WiFi 6, drive productivity and growth across multiple industries, while advances in generative artificial intelligence mark a new level of business and economic impact. One of the first steps in planning was to brainstorm some research questions, as follows:
  • What are the current and possible substation architectures for protection, automation and control?
  • What are the general demands during migration from CPAC to VPAC systems?
  • Describe the role of time synchronization, redundancy and cyber security in this migration.
This study will therefore provide the answers to these questions based on the review of relevant literature. To this end, this paper has discussed in detail the needs for protection, automation, and control, and finding solutions to possible shortcomings.
The structure of this paper is designed to ensure a logical progression from foundational principles to advanced system-level challenges, facilitating a comprehensive understanding of modern substation developments. It begins with an exploration of the evolution of substation architectures, providing historical context and tracing the transition toward digital modernization. Next, it addresses critical technical aspects such as time management, synchronization, redundancy, and cybersecurity, which are fundamental for ensuring reliability and resilience. Building on these core elements, the paper then examines interoperability, emphasizing the importance of seamless integration between diverse technologies and vendor solutions. Finally, it explores future challenges and autonomous network management, outlining the transformative potential of AI-driven systems in shaping next-generation substations.

3. Evolution of Substation Architectures and Digital Modernizations for Smart Substations

Traditional substations, designed in the late 20th century, rely on analogue control and legacy communication protocols like Modbus and Distributed Network Protocol (DNP), which introduce specific vulnerabilities. While still operational, many have been supplemented with additional monitoring systems. Communication between master and slave devices occurs via fiber converters, as shown in Figure 3. A failure in a fusion unit could compromise circuit protection, exposing weaknesses in this architecture.
With the development of digital technologies, the substations move from legacy analogue systems to fully integrated digital solutions. As described in [16], the architecture of the substations may involve several communication protocols coexisting due to the gradual development towards modernization. In [17], the detailed review of digital substations has shown increasing requirements for secure systems and algorithms regarding access restrictions and cyber threat detections. It also stresses that personnel operating smart substations should have sophisticated skills related to network and data analysis. The authors trace the evolution of communication protocols and automation systems, showing how these digital environments are increasingly complex environments [18]. Figure 4 presents a typical architecture for fast bus protection schemes using proprietary protocols. Once more, the relays with limited communication capability use converters for fiber communications to guarantee the effectiveness of the communications means to ensure the robustness of the protection of the power system. Figure 5 illustrates the more enhanced configuration, wherein the relays that have native IEC 61850 station bus capabilities are interconnected via an Ethernet switch and have direct fiber optic outputs from the relays. This allows the relays to perform internal logic and the protection signals to communicate without additional devices managing the logic, a serious enhancement in substation technology. Finally, Figure 6 presents a protection automation and control architecture based on IEC 61850, where Generic Object Oriented Substation Event (GOOSE) messages and sampled values are utilized. Relays subscribe to the needed sampled values for protection and metering with significant increases in design efficiency. The instrument’s transformer wiring is minimal, as all signals can be transmitted over the same Ethernet fiber network. This is another way in which modern substation integration may be improved and reliability increased. Figure 7 shows a simplified view of the transition from legacy to centralized substation; we are currently at what would be described as the fourth generation of substation.

3.1. Comparasion of a Conventional P&C Systems vs. CPAC Approach

A traditional protection and control system implements numerous distributed devices for the protection and control of different substation sections. This can bring certain operational and maintenance difficulties into the application [19,20]. In contrast, under the Centralized Protection Automation and Control approach, by centralizing all the critical intelligence into one system, the engineering, commissioning, and maintenance become easier by providing a single view for the whole substation [18]. This approach gives improved synchronism between protection and control schemes via Precision Time Protocol (PTP) and redundancy via protocols such as RSTP (Rapid Spanning Tree Protocol), MRP (Multiple Spanning Tree Protocol), HSRP (Hot Standby Router Protocol) and PPP (Point-to-Point Protocol) [2]. The CPAC concept allows the centralized configuration of multiple protection and control functions, as shown in Figure 8. It implements complex schemas and reduces lifecycle costs due to the redundancy of spare parts and the faster reconfigurations that are allowed by evolving protection requirements. On top of that, CPAC allows better flexibility in both engineering and operations, enhancing the efficiency, reliability, and adaptability of electrical substations.
The fundamentals of the CPAC allow for consolidating critical protection intelligence into one device, which permits the redundancy within to lower risks and systematically provides segregation to the sections controlled by software, allowing more flexibility in the deployment of protection and control systems, as represented in Figure 9.
Moreover, the CPAC can reduce substation lifecycle costs by as much as 15% compared to conventional ones [19]; this is mainly due to the reduced maintenance and operational costs [20]. The CPAC architecture may be implemented in different ways, i.e., centralized, hybrid and decentralized architectures. The choice depends on the protection philosophy of the substation, real-time application needs, and requirements for redundancy (Figure 10).
Table 1 comprehensively compares the conventional P&C systems with the CPAC approach in aspects of flexibility, costs, scalability, security, and operational efficiency. In the case of redundancy, standard protocols like PRP [21] and HSR [22], under the IEC 62439-3 [23], allow a communication network that is not only resilient but also minimizes recovery time in case one fails. These are inclusive of IEEE 1686 [24], IEC 62351 [25] and NERC CIP [26], among others, prescribing the protection and control measures of a system against the cyber threat. There are several recommendations, such as role-based access control, secure protocols for communication, and remote asset management, among others, regarding the safety and security of the critical electrical infrastructure systems. The centralized architectures concentrate all the important protection functions within one device, hybrid architectures integrate centralized intelligence with localized elements, and decentralized architectures distribute protection among several NPRs. From the point of view of synchronization, the CPAC systems must implement technologies such as IEEE 1588v2 [27] and IEC 61850-9-3 that reach an accuracy of 1 μs, which is of paramount importance in time-critical applications.
Redundancy protocols like PRP and HSR introduce zero recovery time upon failure for enhancing system reliability. Figure 11 illustrates this.
Expanding on the concept of hybrid architectures, Figure 12 shows an example of hybrid architecture with Numerical Protection Relays (NPR).
In this configuration, all relays must be capable of handling the Sampled Analogue Values (SAV) communication profile of IEC 61850-9-2. This enables them to function as merging units for an existing feeder. This hybrid architecture combines relays and merging units to provide process-level information to the CPAC unit, allowing for the implementation of separate process units for critical and redundant feeders to channel protection commands from the CPAC unit. This setup offers the advantages of decentralized and centralized protection schemes.
As the research focused on hybrid architectures continues, Figure 13 presents another example of a hybrid architecture with an NPR. In this configuration, the NPR located in the individual bays is interfaced with the CPAC unit via an ethernet switch.
This makes it possible for relays in the bays to offer basic local protection and handle advanced substation protection in the CPAC unit. Centralized protection requires this hybrid architecture to have a core CPAC, which allows new functionalities to be added to the substation. Its functional requirements, pros and cons are summarized in Table 2 for both the centralized and hybrid architectures of substations, with greater detail than their respective merits and demerits.
Today, maintenance in electrical substations is somewhat complicated due to the use of different electronic devices from various manufacturers. Each device requires constant care, making management more difficult and affecting the system’s efficiency. In the last decade, CPAC solutions have emerged to make hardware in substations simpler. These integrated solutions combine several functions in a single system, reducing the complexity and enhancing the efficiency of the maintenance activities, but in different brands, functionalities are quite different, and this is an essential aspect during the selection of the best solution for each substation. For example, some of the equipment from the most important brands is described in Table 3. At the time of writing, equipment from major manufacturers such as GE [28,29], Schneider Electric [30], and Ingeteam [31] does not offer compact devices with the functionalities presented by the ABB’s SSC600. These manufacturers still maintain a protection and control devices categorization depending on a certain fault, rather than assembling all functionalities in one device unit. These solutions in functionalities are only comparable with SIPROTEC 7SX85 [32], the SEL-487E [33,34,35], and the SSC600 [20,36,37,38]. Another distinct feature of the ABB SSC600 is its centralized approach, housing all protection and control functions in one device. This not only simplifies the system architecture, but also reduces complexity.

3.2. Migration from Conventional to Digital Substations

Migration from conventional substations to digital substations represents a big transformation in electrical infrastructure [40]. The challenges of conventional substations are shown in Table 4, summarizing the main drawbacks of conventional substations.
A conventional substation is burdened with several disadvantages, such as a shortage of supervision, high installation and maintenance expenses, and a lack of flexibility. Standardization through the introduction of digital technologies and standards such as IEC 61850 holds the key to overcoming most of these drawbacks, and provides a boost toward operational efficiency, security, and flexibility to meet future demands. Conventional protection relays can only provide a very basic level of protection by acting on preset settings and thresholds. Their principle of operation is the invasion of these threshold values. Central protection systems with high computing capabilities can offer sophisticated concepts, which continuously monitor the network for aberrant conditions and disturbances. Real-time data analysis, along with advanced algorithms, provides proactive and adaptive protection guarantees for a higher degree of reliability and efficiency, in line with IEC/IEEE standards [41,42]. The digitalization of a substation, in simple words, encompasses critical steps that range from conventional architecture to a completely digital AI-powered infrastructure. The road ahead from the existing scenario of conventional substations to a fully digital AI-powered substation is presented in Table 5. This holistic strategy discusses the shortcomings of the present conventional substations and probes for the latest digital technologies to develop an electrical infrastructure that would be more efficient, flexible, and future-friendly.
Presently, the commercially available models of the SSC600 from ABB have the capacity for recording anomalies, which they have had since firmware version 1.4. [37].
Table 6 summarizes the benefits, risks, challenges, and research directions of integrating Software-Defined Networks (SDN) and Programmable Data Planes (PDP) into IEC 61850 substations, focusing on network management, security, and automation. Advanced safety technologies are essential for protecting personnel and equipment. CPAC systems enhance safety through remote operations, non-conventional transformers, and arc sensors. These technologies improve accuracy and response speed, and reduce hazard exposure. Table 7 highlights key aspects and benefits of these advancements in modern electrical safety.
The autonomous local operation of IEDs and relays at the time of a complete failure of the digital system is the last line of defence in a modern substation P&C system—the loss of synchronization due to failure or redundancy of the synchronization source, or even a cyber-attack. These devices are designed for autonomous operation in the case of failure of external communications or centralized control. They are set to function in the detection and response to overcurrent, voltage, or short-circuit conditions without relying on the wider network. Modern IEDs and relays have built-in logic and local processing that can make critical decisions based on real-time input. This ensures protection for the critical assets continuously, hence enabling active autonomous fault isolation, the tripping of breakers, or the activation of any emergency operation protocol. In the event of failure in digital systems, such as time synchronization or cyber security, these relays automatically fall back to their default operational setting based on local information while maintaining the protection of the system. Besides this, almost every substation has hardwired backup systems that provide critical protection but are reliable against failures of the digital communication network. In this way, a hybrid nature will ensure that the locally autonomous P&C devices maintain substation integrity and security in the face of failures originating from the digital systems. Eventually, the protection for substations under any conditions will be achieved by combining digital and hardwired systems.

3.3. Virtualization of Protection, Automation and Control (VPAC)

VPAC systems for effectiveness and reliability need to be highly technically qualified in such critical environments. Data privacy laws and regulations, industrial standards, and government certifications must therefore be thoroughly studied and considered to ensure availability and high reliability. The design of the VPAC system should be made in such a way that redundancy mechanisms ensure the lowest possibility of a downtime occurrence as is practically possible. Security will be on par with encryption, strong authentication, and threat protection. Interoperability with existing equipment is of the utmost importance, coupled with adherence to open standards. It is essential to maintain lists of detailed hardware and software behavior while monitoring, and auditing should always be present to ensure integrity within a system. Besides this, the management of access control should be restricted, allowing access only to authorized persons. Finally, good backup and disaster recovery plans should be implemented to ensure that a system is resilient, if not fault-tolerant, and can recover from failures with minimum delay. VPAC systems are also deployed based on strict performance requirements, such as those governed by IEC 61850-5, so that they can remain capable of handling the increasing demands of modern power systems [47,48]. Further, some important technical challenges must be considered in the case of the deployment of VPAC in digital substation environments for achieving better performance and safety. Aspects include considerations of a virtualization solution, hardware acceleration, network virtualization, time synchronization, and redundancy [6,49]. The most active associations for promoting the standard-based, open, interoperable, and secure architecture are VPAC Alliance [50] and Edge for Smart Secondary Substation (E4S) [51]. Both indeed support the digitalization of substations to make the grid future-ready, adaptable, resilient, and intelligent. Both organizations offer a solid base for the development of both CPAC and VPAC systems. Additionally, they support having identical requirements on conventional CPAC systems and virtualized systems. However, the VPAC systems include more challenges brought about by themselves due to their virtualized features. Standardization aspects of performance requirements, application architecture, cybersecurity, testing, new firmware deployment, and operation-related considerations stand as some main features of the system [49]. Standardization needs include the capacity for flexibility and scalability in solutions and systems that are deployed, interoperability, and the ability to integrate products from various vendors into a single solution. The systems will have to be designed on the back of widely deployed global standards, such as IEC 61850, to limit vendor lock-in risks; this would ensure hardware–software compatibility. Protection and control entities modeling in conformity with the IEC 61850 standard as discrete logical devices (LD) is the basis of the application architecture. Generally, one of the goals includes assigning functionality in a flexible way according to the system requirements, avoiding traditional relay approaches, and making the choice for LD at the station level, which will provide engineering more efficiently adapted to the current technologies. The detailed overview of the architecture of the application in a virtualized substation environment is given in Table 8 below. Classical relay-based protection systems have disadvantages, such as hardware failure due to aging infrastructure or environmental causes. The complexity of these often leads to misconfigurations during installation or maintenance that affect system reliability. Most such systems also suffer from insufficient redundancy, slow response times, and limited interoperability between devices from different manufacturers. CPAC and VPAC system solutions have their own sets of associated risks. In a CPAC system, the centralization of protection functionality creates a problem whereby one single point of failure may affect an entire substation. In VPAC systems, the presence of software and virtualization introduces risks such as software vulnerabilities and performance degradation due to virtualization overhead.
CPAC and VPAC systems depend on communication networks, whereby failures or delays can impact synchronization and protection response times. A proper redundancy setup is crucial to prevent system-wide failures. Enhancing redundancy, strict software management, advanced monitoring, and strong network design are necessary. Modular architectures allow scalability, upgrades, and improved cybersecurity. Regular testing and simulations ensure system reliability and efficiency. Table 9 outlines key differences and considerations between traditional protection, CPAC, and VPAC systems.
Application-level performance requirements: These represent one of the most critical features of VPAC systems. Following IEC 61850-5, these are based on the real demands of the P&C applications themselves, and thus must be the same for traditional relay-based systems and virtualized platforms. This consistency ensures that VPAC systems will not escape the duty to live up to the same high standards as traditional P&C systems, providing reliable and timely protection and control [53].
Performance Indicators: The performance evaluation of VPAC systems will include several key metrics that guarantee operation systems are reliable [54]. One of the key metrics involves response time, which refers to the speed at which protection mechanisms can detect a fault and take remedial measures. It includes the round-trip time, tracking the complete fault-handling process, starting from fault injection, and progressing through MU signal conversion to SMV, the communication latency, VPAC preprocessing, the execution of protection algorithms, and GOOSE message transmission to trigger tripping at the MU. In fact, internally required benchmarks for the VPAC systems are very high. For example, pre-processing cycles need to be under 200 µs, and configuration cycles should be completed within 1000 µs. Virtual switches—be they by KVM or VMW—can play their role in defining overall performance, and might result in higher latencies after all. A proper system design is required to counteract additional latencies. Another important metric is that of data throughput, ensuring that the VPAC system will be able to support high volumes of data from sensors, relays, and merging units without degradation, hence allowing for real-time control and monitoring. It is also very important to have high reliability in this context; that is, the system should not be interrupted for at least a little while in order to maintain the safety and stability of electrical grids. These metrics demonstrate the need for fine engineering and system validation, because any delay in processing or the failure of any communication used can compromise the detection of fault conditions and their response. The optimization of hardware and software configuration is the key feature within the VPAC framework that ensures high-speed deterministic performance for modern power systems.
Benchmarking against standards: VPAC implementations are benchmarked against the performance standards specified by IEC 61850 to ensure that the VPAC implementations are indeed effective. During this rigorous testing and validation process, one can be assured that the VPAC system satisfies the criteria to operate in digital substations. Such an application of standards thus allows VPAC systems to be validated toward their effective performance in real-world situations, hence offering some level of confidence to their stakeholders regarding their reliability and performance [50].
Figures and Data: The graphical figures in the technical documentation [53], such as white papers, support the illustration of performance requirements provided by IEC 61850. These figures provide the reference point, enhancing the understanding of the benchmarks needed to be reached by VPAC systems. They make it very clear and concise how the levels of performance are to be attained; this makes it much easier for the engineer or decision-maker to assess whether VPAC solutions will satisfy their needs.
Challenges in the Implementation of VPAC: VPAC systems offer significant advantages but face challenges in integration with legacy infrastructure, requiring complex and costly adaptations. A common misconception is their internet connectivity; in reality, they use private networks, enhancing cybersecurity but still requiring strict protection measures. A lack of hardware standardization leads to interoperability issues, as vendors develop different specifications. Future efforts should focus on defining universal standards for seamless integration and real-time performance across vendors. Additionally, dedicated hardware resources must be efficiently managed to ensure reliability. Despite these challenges, VPAC systems hold great potential for modernizing substations while maintaining security and performance. Nevertheless, the engineering of a dedicated hardware resource would also call for managing such shared resources efficiently without compromising on system reliability [55,56,57].
The implementation cost varies by region and market demands: European substations can use simpler overcurrent relay arrangements, whereas in ANSI markets, which are generally more advanced and complex, with up to 20–30 control panels and multiple functions, the cost–benefit analysis may be clearly seen, hence justifying such deployments. These regional differences affect initial investment costs as well as operational costs.
The migration from legacy protocols like C37.94 line differential or pilot wire to modern IEC 61850-90-5 R-SV requires greater bandwidth and adaptation to specifications in accordance with the relevant standards. Please be advised that VPAC servers do not currently support C37.94 NICs.
The recommended solution is as follows: investing in a high-capacity communication infrastructure with accommodation for evolving standards in future hardware. Licensing and subscription models present additional considerations regarding upgrades, redundancy, and lifetime costs. It is crucial for organizations to evaluate whether their licensing models are perpetual or subscription-based. It is essential to ensure that redundancy is created via the duplication of VMs to maintain high availability.
This requires careful planning to avoid any disruptions during updates and to mitigate the risk associated with limited license durations. VPAC systems represent a significant shift in power system management, offering flexibility, scalability, and enhanced security. However, integration, standardization, cost, and licensing issues must be sorted out to achieve this.
With regard to centralized protection, ABB’s SCC600 [37] represents one such platform, while SCC600 SW [48] introduces the idea of virtualization to impart much higher flexibility (Table 10). In summary, in the process ahead, as the industry moves forward on these issues of standardization, cybersecurity, and judicious engineering, VPAC systems will be leading from the front.
VPAC systems require virtualization solutions, hardware acceleration, dedicated networks, time synchronization, and redundancy to ensure secure and efficient protection in digital substations. These elements guarantee performance, security, and scalability. Table 11 highlights key considerations for VPAC applications, emphasizing reliability. Future developments must focus on time management, redundancy, and cybersecurity.

4. Time Management and Synchronization

In IEC 61850-9-3:2016 [58,59], for the electrical systems design phase, the calculation of timing inaccuracy has to be done to ensure the proper processing and synchronization of time, particularly where communication utilizing sample values (SV) is used. The proper configuration of GMC will be needed with prioritized standards such as IEC 61588 and UNE-EN IEC 62439-3:2022 [23], among others, for proper synchronization [60]. The implementation of PTP is a challenging task in virtualized environments because virtualization latency occurs. However, such difficulties can be reduced by the application of different solutions, such as hardware support for PTP or passthrough [55,61].
For less critical applications, the alternative could be NTP. Precise time synchronization, which depends on proper network configuration and validation, is an important factor in modern electrical systems’ reliability and effectiveness [62]. The verification of GNSS-related requirements, such as multi-GNSS support and spoofing and interference detection, significantly improves the reliability of the system, and such considerations are critical for the stability and security of the power grid. The main aspects can be seen in Table 12. This at least challenges the latency and consistency of implementation for the Precision Time Protocol in virtualized environments.
IEC 61850-90-4 itself provides the essential time synchronization for the VPAC system, but even this in practice requires a lot of careful planning and thorough validation to impart the required precision and reliability within the critical infrastructure. Precise time synchronization is required for protection systems to perform optimally in electrical networks, mainly in applications that involve more than one input of sampled values, such as differential protection functions of transformers and buses.
Different methods for time synchronization have specific characteristics and applications [56,63,64], as given in Table 13. Each of these timing methods has a different relative accuracy, and is thus suited for different applications. GPS and PTP are the most accurate methods and are necessary for critical applications.
The IRIG-B is less accurate but is appropriate for a lot of the substation applications; NTP is appropriate where a very accurate time is not needed.
Precision Time Protocol PTP, as defined in IEEE 1588 [65], is a key enabler of high-precision synchronization for distributed systems, in particular for a critical infrastructure like electrical grids. This would mean the careful consideration and proper implementation of PTP, more so in virtual environments where accurate time would have to be distributed across all network elements. The best practices and key considerations that shall form the basis for the successful implementation of PTP, taking into consideration network configuration, latency management, consistency across virtualized environments, and strict testing and validation procedures, are summarized in Table 14. Such considerations are fundamental to maintaining the high level of precision and reliability required by today’s modern electrical systems.
Table 12. Technologies and considerations for time synchronization in electrical systems.
Table 12. Technologies and considerations for time synchronization in electrical systems.
AspectDescription
Atomic Clocks vs. Grandmaster Clocks (GMC) [60] Atomic Clocks: The vibration of atoms, such as those of cesium or rubidium, can be harnessed to provide an exceptionally precise measure of time. These atoms are a standard component in a multitude of scientific and telecommunications applications.
GMC: Can use atomic technologies, high-quality crystal oscillators, or GPS to maintain network time accuracy. They act as the primary synchronization source in a network.
Time Synchronization in Networks [65] Standards: Synchronization must comply with IEEE 1588 v2 (Precision Time Protocol, PTP) for station bus and process bus environments, and with the data models specified in IEC 61850.
Requirements: Support for SNMP MIB from Annex E of UNE-EN IEC 62439-3:2022, and automatic adjustments for daylight saving time changes.
Implementation of PTP in Virtualized Environments PTP Hardware Support on Host: Specialized hardware that supports PTP and synchronizes with an external server.
PTP Passthrough: Uses direct I/O to minimize latency and improve accuracy.
PTP Software Solutions: Specific software implementations for PTP.
Network Time Protocol (NTP): Alternative for non-critical environments.
Synchronization with External PTP Grandmaster: Synchronizes hosts and virtual machines with an external master clock.
Virtualization Tools for Time Synchronization: Virtualization tools that synchronize with the host but do not meet PTP accuracy.
Additional ConsiderationsNetwork Infrastructure: Switches and routers must support and be configured for PTP.
Latency in Virtualization: Consider latency and jitter in virtualized environments.
Consistency in Synchronization: In order to prevent drift, it is essential that all components are synchronized with the same time source.
Configuration Validation: Check and validate PTP configuration before deployment in production environments.
Table 13. Most common synchronization methods used in the field of electric utility automation.
Table 13. Most common synchronization methods used in the field of electric utility automation.
Synchronization Method [66]Typical AccuracyDescriptionApplication
GPS10 nsSynchronization based on the Global Navigation Satellite System (GNSS) with Coordinated Universal Time (UTC). Requires a hardware receiver and antenna. Generally used as a master time source. High-precision synchronization for critical applications such as power utilities and telecommunications.
PTP100 ns High-precision time distribution protocol with error correction through boundary or transparent clocks. Supports multiple sources with Best Master Clock Algorithm (BMCA) and LAN or WAN switching. Critical and time-sensitive applications such as sample values (SV) and synchrophasors.
IRIG-B [67,68]1 µs Precise time distribution requiring local cabling. Generally sourced from GPS clocks.
For Intelligent Electronic Devices (IEDs), the typical accuracy of IRIG-B time synchronization is as follows:
-
Unmodulated IRIG-B (DC-level shift): ±1 microsecond.
This version is preferred in IEDs used in critical applications such as protection relays and automation systems, ensuring precise event logging and deterministic behavior;
-
Modulated IRIG-B (1 kHz sine wave)—±100 microseconds.
While less precise, this variant is sometimes used for compatibility with legacy equipment.
Most modern IEDs adopt unmodulated IRIG-B to meet the stringent timing requirements of standards like IEC 61850, ensuring reliable event sequencing (SOE) and precise fault location through synchronized measurements.
Less critical applications such as GOOSE, MMS, and supervisory data in utility substations.
NTP200 µs (over LAN)Lower precision time distribution protocol, including its stateless derivative Simple Network Time Protocol (SNTP). Achieves better precision when distributed from a local source. Non-critical network devices and computing platforms.
Table 14. Best practices and considerations for PTP.
Table 14. Best practices and considerations for PTP.
AspectDescriptions
Network ConfigurationEnsure the network infrastructure, including switches and routers, supports PTP and is appropriately configured.
Latency and JitterSolutions that minimize latency and jitter are preferable. Enabling “latency-sensitive” features in the hypervisor can help reduce these issues.
Consistency in the
Environment
Ensure that all components in the virtualized environment are synchronized with the same time source to avoid time drift issues.
Testing and ValidationBefore deploying PTP in a production environment, it is crucial to test and validate the configuration to ensure the required level of precision.
Round Trip Time (RTT)
Testing
Conduct RTT tests using GOOSE messages between synchronized applications to verify the accuracy of synchronization.
Indeed, precise time synchronization is one of the key bases for the effective operation of protection systems in electrical networks [56]. Time synchronization accuracy directly impacts a protection system’s capability to carry out critical functions related to event stamping and digital fault recording—essential building blocks in maintaining reliability and safety within power systems. Different synchronization methods have different precisions, and selection is performed based on the application to be implemented; examples could range from transformer protection up to real-time monitoring events [65,69]. Table 15 describes important standards and guides concerning time management and synchronization within electrical substations, and forms the base for system operation in a uniform and organized way, which is critical in modern power grids for protection, control, and efficiency.
Standards and guidelines ensure electrical systems operate coherently to meet protection, control, and efficiency requirements. Time synchronization is crucial for accurate event stamping and fault recording, requiring strict precision, especially with PTP implementations. Detailed specifications, testing procedures, and best practices are essential for maintaining high accuracy in virtual and physical environments. Before deployment, systems must meet predefined accuracy thresholds and undergo validation tests. Table 16 outlines key specifications and recommended tests. Table 17 classifies time synchronization accuracy based on IEC 61850-5, detailing precision requirements and synchronization errors. Table 18 provides transfer time requirements for different message types. These elements form a comprehensive framework for ensuring effective time synchronization in modern electrical networks.

5. Redundancy

The station-level assurance enables the substation to act as a single switchgear that is unified and reliable. Safety, backup, and redundancy are the major considerations. This includes monitoring and controlling substation components, assessment and mitigation of cybersecurity risks of substation devices, and taking corrective action. Process-level assurance targets the safe and efficient operation of the selected substation processes. Data are acquired and continuously monitored against predefined criteria to meet the process operation requirements by mitigating cybersecurity risks accordingly. Redundancy in virtualized systems invariably features two active VMs such that protection functions will be retained during failures. In this respect, to achieve effective redundancy, primary and secondary systems should be isolated, having different hardware and software vendors to avoid common failure modes. The physical separation of A and B redundant systems is basic for avoiding common failure due to local events. Standards like IEC 61850-90-4:2000 and IEC TC 57, e.g., PWI TR 61850-90-20, specify minimum requirements for redundancy and LAN within VPAC systems. The VPAC system can make use of the RCT in SV messages for higher error detection and correction capability in the fault-tolerance networks using PRP or HSR. Conformity to IEC 61850 and UNE-EN IEC 62439-3:2022 norms ensures the reliability of communication and redundancy in substation automation [73,74]. PRP permits redundancy at the Process Bus, while redundancy of the station bus between different LANs must be made by RSTP. The storage of data shall be based on principles of redundancy, while the critical application control shall be supported by a Centralized Monitoring System with the integration of PRP and PTP. A well-designed redundant system has several requirements in handling failures and maintaining service availability without interruption. These requirements span hardware, software, and operational procedures, as summarized in Table 19.
The design of redundant systems for critical applications places demands on operating systems for support for redundancy protocols such as Parallel Redundancy Protocol (PRP) [74] and High availability Seamless Redundancy (HSR) [22] within virtual or software defined networks, as shown in Figure 11. It provides these protocols with the abilities of the function of virtual switches acting as Dually Attached Nodes (DAN), while aggregating traffic across applications. Limitations on PRP pairs and the transmission of packets must be overcome in real-time performance. Having a digital twin operating in parallel or on standby is key to the seamless backup and restoration of data, ensuring less than 10 milliseconds of downtime with active–active systems.
It requires, for instance, support from the operating system for active–active configurations to allow for unbroken services, even when an upgrade of the equipment is being performed or any maintenance that may be necessary is being undertaken. In the same vein, cooling systems should be duplicated in those installations with high thermal load to avoid failures. It is at this point recommended to analyze the effects of energy storage systems on availability [57]. Such measures ensure a high level of availability and resilience, following the standards and regulations of critical systems for environments including electrical substations and communication networks resilience [75,76]. Table 20 summarizes some of the major standards and legislation relevant to redundancy.
Redundancy is essential for ensuring reliable, secure, and safe substation automation and control. Adhering to standards and best practices strengthens infrastructure resilience against failures and cyber threats. Local backups and redundant systems, such as Grandmaster Clock links, maintain network protection during communication failures. Medium-voltage (MV) substations typically do not require redundant merging units, while high-voltage (HV) systems demand them due to their critical nature. Table 21 summarizes redundant systems in CPAC, detailing their advantages, disadvantages, and applications.
Deploying two CPAC or VPAC systems at the substation level enhances reliability and efficiency by ensuring continuous operation, even in the event of system failure. This redundancy allows for uninterrupted control and monitoring, optimizing investment in protection schemes without excessive costs. Redundancy is crucial for both local and remote control systems, ensuring continuous functionality during failures. It is vital to design both hardware and software redundancy to support standards like IEC 61850-0-2 and IEC 62351, ensuring smooth communication and system backup without disrupting protection functions.
Different redundancy methods enhance the availability and resilience of the system, as summarized in Table 22 by comparing methods against their advantages and disadvantages and their general effectiveness [49].
Amongst the available redundancy methods, the parallel redundancy protocol is the most effective for digital substation communication, providing seamless failover on link failure without data loss in a link failure [91]. For station buses, PRP has emerged as a standard for implementing communication redundancy. In fact, this has combined with ring network architectures to provide an effective solution that ensures the availability and dependability of protection and control systems in digital substations.

6. Comprehensive Cybersecurity Framework for VPAC Systems in Electrical Substations

Cybersecurity is important in VPAC systems deployed in electrical substations from various perspectives, including hardware, software, and management processes [73,92,93]. Standardization for the IACS security mainly includes IEC 62443 standard [94] and IEC 62351 [25]. These standards provide flexible update mechanisms, the capability to manage vulnerability, and Role-Based Access Control (RBAC) [95], which integrate with enterprise LDAP servers [96]. The challenges are very serious—from proprietary operating systems not up to date with state-of-the-art security features, to heterogeneous network technologies introducing vulnerabilities, to ensuring VM isolation for preventing breaches [97,98]. Virtualized environments introduce other risks due to the existence of the hypervisor layer, which could be compromised by “hyperjacking” attacks [99,100]. The mitigation of these challenges requires a mix of traditional cybersecurity best practices and adaptive ones specific to virtualized systems, based on standards such as the IEC 62443 [94,101] and NERC CIP [26,102,103].
The strategies presented in Table 23 are crucial for ensuring that cybersecurity risks related to VPAC systems are at their minimal levels.
Table 24 gives an overview of the Cybersecurity Standards and Practices for Electric Substations, a basic document that permits the establishment of a complete cybersecurity framework for the protection of critical infrastructures [92].
The implementation of these standards ensures the secure operation, resilience, and continuous availability of critical systems against evolving cyber threats. In [97], it incorporates all smart grid standards that describe cybersecurity issues and provide information on their contents. One of the most relevant specifications for these systems today is the IEC 62443 family of standards, which specifies cybersecurity standards, policies, and procedures for IACS (Figure 14). Cybersecurity in VPAC systems considers the big picture of security integration in hardware, software, and networks. Table 25 summarizes key cybersecurity specifications for VPAC systems and their respective implementation strategies. Commitment to such specification and implementation strategies will ensure that organizations secure their critical infrastructure against the dynamic evolution of cyber threats. Protocols and tools are the very bases for ensuring the integrity, availability, and resilience of critical infrastructures at electrical substations. Among them, the protocols and tools used in cybersecurity stand out, as presented in Table 26.

7. Interoperability

Interoperability is another crucial attribute of electrical substations, especially for VPAC systems, ensuring that communication and functionality exist among the diverse devices and systems. Although interoperability has not been well studied in general, emerging standards such as IEC 61869-13:2021 Instrument transformers Part 13: Stand-alone merging unit (SAMU) [112,113] have begun to contribute toward this important requirement through the stipulation of requirements from sensors to new sampled values merging units (SAMU). These standards are critical for achieving a uniform integrated result for different aspects of the substation. Interoperability is enabled by the UCA International Users Group [114] by providing devices compliant to the IEC 61850 standard. This certification process is important because any vendor, although in the process of developing their merging units, can claim IEC 61850 compliance, which may or may not be true. Certification by the UCA ensures that devices implement the IEC 61850 standard; thus, a better interoperability between devices from different manufacturers is assured [115]. It will bring much more reliability and efficiency into substation operations, without the risks of integration problems compromising the performance of systems. While the road to complete interoperability in VPAC systems requires the navigation of evolving standards and certification processes, the efforts put in by standardization bodies and industry groups chart a course toward more cohesive and dependable substation environments. Interoperability continues to hold a place in the spotlight as the industry will continuously evolve, and it will become an important focal point for future electrical infrastructure development [116,117].
Interoperability in smart grids faces several key challenges. First, a Common Information Model (CIM) is required to accommodate evolving business needs, but integrating new models into legacy systems remains complex. Second, harmonization between different standards like CIM and IEC 61850 is problematic due to overlapping functionalities and inconsistent data exchange formats. Lastly, validation is crucial to ensuring accurate information exchange, yet differences in system configurations and a lack of standardized validation methods create obstacles. Addressing these issues requires improved semantic models, automated ontology mapping, and refined data validation techniques [118].

8. Future of Electrical Substations, Challenges, and Advancing Towards Autonomous Network Management

These innovations enable end-users and industries to better manage production and consumption. However, the variability of renewable energy sources greatly challenges the DSO’s ability to maintain the stability of the grid. Traditional methods, such as upgrading cable sections, cannot be good enough to address such complexities that arise in modern grids [119]. One of the major trends being followed is the shift toward an AI/ML-based autonomous network management approach to improve the grid operations [120,121].
It also involves smart metering, substation virtualization, and higher data analytics on the data arriving from smart meters, PMUs, and GIS-network topology in order to develop predictive models for fault detection and real-time management. The beta version of ABB’s ADAM AI/ML fault prediction module is a prime example. It deals with the problem of incipient fault detection and increasing situational awareness, all without the need for dedicated sensors or devices. This cloud-based tool offers high-precision fault predictions that enable proactive maintenance to be performed, thus reducing downtime to a near negligible value.
Electrical substation development in technology is increasingly driving the development of electrical substations, including centralized and virtualized protection and control systems, such as the ADAM 2.0 fleet management software [122]. In the recent industry survey [123], involving over 3200 firms, it emerged that for 92%, reliability remains an issue for their operations, while 60% want to increase investments in maintenance over the next three years. This trend moves toward outcome-based agreements in maintenance, where monetary incentives are tied to the performance outcomes of improved uptimes and energy efficiency.
The integrated AI/ML-based Fault Prediction module enhances situational awareness and proactive fault detection. This brought massive improvements to maintenance planning while reducing downtimes. The system uses existing infrastructure, with capabilities for current and potential transformers, which positions it as cost-effective. Indeed, it integrates well with current operations [124,125].
Concentrating on reliability not only guards against potential losses, but also positively influences the business’s reputation and its financial performance. As the industry shifts further in the direction of predictive and autonomous network management systems, solutions like ADAM 2.0 will prove to be essential instruments for optimizations in performance, operation cost reduction, and overall network stability development, along with future definitions for electrical substations.
Ongoing activities based in the University of Belgrade include implementing a real-time simulation platform making use of HIL technology [126,127] by Q1-2025. The initiative will simulate the entire transmission network of Serbia for the validation of Autonomous Grid Management concepts, and it will explore new technologies. There are utilities like Enedis and Hydro-Québec that are embracing the advantages for a more resilient grid, moving from existing infrastructure management to adopting innovative technologies. Challenges in the transition to virtualized P&C systems include interoperability, strengthening cybersecurity, and managing huge data sets associated with predictive analytics.
Some advanced cybersecurity methods, the standardization of communication protocols and enhancements in virtual redundancy techniques should be developed in future research. Innovative predictive analytics, real-time performance optimization, and scalable VPAC systems will be crucial for improving reliability, security and efficiency in today’s P&C systems.
Artificial intelligence (AI) is transforming power systems and substations by enabling predictive and preventive fault analysis, improving reliability, and paving the way for fully autonomous network management. Traditional substations rely on deterministic protection schemes and manual intervention for fault detection and grid management. However, AI-powered systems can leverage vast amounts of real-time data, advanced analytics, and machine learning models to anticipate failures, optimize operations, and enhance decision-making.
One of the key contributions of AI in power systems is predictive maintenance. By analyzing historical and real-time operational data, AI algorithms can detect early warning signs of equipment degradation, such as anomalies in transformer temperatures, circuit breaker wear, and insulation deterioration. This reduces unexpected outages, minimizes maintenance costs, and extends equipment lifespan. Similarly, fault localization and analysis benefit from AI-powered techniques, which can rapidly identify the location and root cause of a fault by analyzing waveform distortions, transient events, and system dynamics. This leads to faster restoration times and reduced downtime.
AI also plays a crucial role in grid management and stability, helping operators optimize load balancing, voltage regulation, and frequency control. Through reinforcement learning and adaptive optimization algorithms, AI-driven systems can respond dynamically to fluctuations in demand and supply, integrating renewable energy sources more efficiently while maintaining grid reliability. Moreover, cybersecurity in substations can be enhanced using AI-based anomaly detection techniques, which monitor communication networks for signs of cyber threats, unauthorized access, or malicious attacks.
A fully autonomous power system requires a combination of intelligent fault detection, alarm management, and automated network reconfiguration. AI enables real-time fault isolation and self-healing capabilities, allowing substations to automatically reconfigure networks after disturbances, ensuring minimal service disruption. AI-driven alarm management prioritizes critical events, reducing operator workload and improving situational awareness.
Ultimately, AI-powered autonomous substations represent the future of electrical grid management, offering higher efficiency, resilience, and reliability. As AI continues to evolve, the integration of digital twins, edge computing, and decentralized decision-making will further enhance self-sustaining grid operations, leading to a new era of intelligent and autonomous energy infrastructure.
As illustrated in Figure 15, the transition from conventional substations to AI-powered systems has been driven by technological advancements in protection, automation, and digitalization. Initially, substations relied on electromechanical relays and manual fault detection, which limited their adaptability. The integration of microprocessor-based relays and SCADA systems enhanced monitoring and control, paving the way for digital substations with IEC 61850 communication.
Figure 16 highlights AI-driven solutions, such as ADAM 2.0, that enable predictive maintenance, autonomous fault detection, and real-time optimization, ensuring resilience, efficiency, and cybersecurity in future power networks.

9. Conclusions

According to the methodology and the questions posed, we reached the conclusions that we try to summarize in this section.
Traditional substations operate with CPAC systems, which rely on dedicated hardware-based devices, such as relays and centralized controllers. These systems, while reliable, are often rigid, and require significant manual intervention for configuration and maintenance. Modern digital substations leverage IEDs, process buses, and IEC 61850 communication protocols to enable seamless data exchange, remote control, and enhanced automation. These substations improve interoperability and provide real-time diagnostics, reducing maintenance efforts and improving response times. Looking towards the future, VPAC systems are emerging. These architectures replace dedicated hardware with software-defined solutions running on virtual machines or cloud-based platforms. By decoupling protection and control functions from physical devices, VPAC enables scalability, cost reduction, and enhanced cybersecurity. The increased flexibility of VPAC systems allows for dynamic reconfiguration, improving adaptability in response to grid disturbances, and facilitating integration with artificial intelligence (AI) and machine learning algorithms for predictive maintenance and fault detection.
Migrating from CPAC to VPAC requires a structured approach to ensure reliability, interoperability, and security. Key demands during the transition include the following:
  • System reliability and real-time performance—VPAC solutions must match or exceed the performance of CPAC systems, ensuring low-latency operation for protection and control functions;
  • Interoperability and legacy integration—The migration should allow for coexistence between legacy hardware and new digital systems, ensuring a smooth transition without full infrastructure replacement. Compatibility with IEC 61850 standards is critical;
  • Robust communication infrastructure—A high-speed, deterministic network is essential to handle the increased data exchange between virtualized applications and field devices;
  • Seamless deployment and minimal downtime—Planning the transition carefully is necessary to avoid service disruptions and operational risks. VPAC must be deployed in phases, allowing gradual adoption while maintaining system integrity.
  • Scalability and maintainability—VPAC must support future expansions and software updates without requiring major system overhauls, reducing long-term operational costs.
In a VPAC environment, precise time synchronization ensures accurate event recording, fault analysis, and system coordination. Technologies such as IEEE 1588 Precision Time Protocol (PTP) and GPS-based synchronization provide the required nanosecond-level accuracy. Synchronization is crucial for sampled values, sequence-of-events recording, and differential protection schemes.
Redundancy in substations has become increasingly digital, while redundancy mechanisms ensure uninterrupted operation. This includes the following:
  • Network redundancy, using PRP (Parallel Redundancy Protocol) or HSR (High-availability Seamless Redundancy);
  • Hardware redundancy, deploying multiple physical processing units;
  • Software redundancy, ensuring VPAC applications run on geographically dispersed virtual machines for fault tolerance.
Regarding cybersecurity, the migration to VPAC increases attack surfaces, making cybersecurity a critical concern. To protect substation operations, utilities must implement the following:
  • Encryption and authentication protocols to prevent unauthorized access;
  • Network segmentation and firewall protections to isolate critical assets;
  • AI-driven anomaly detection to identify and mitigate cyber threats in real time.
By integrating time synchronization, redundancy, and cybersecurity into the migration strategy, substations can achieve higher reliability, resilience, and security, fully leveraging the benefits of virtualization while safeguarding the power grid from emerging threats.
Modern distribution substations are changing, with the increasing penetration of distributed energy resources, electric vehicle charging, and virtual power plants. These innovative technologies bring about enormous opportunities for the optimization of production and consumption, but at the same time, they raise challenges with grid stability due to the variability in the energy sources. Most of these measures have proven ineffective time and again; hence the drive toward Autonomous Network Management with AI and ML techniques. This approach further enhances grid operations through smart metering, substation virtualization, and higher data analytics, thereby allowing for predictive fault detection and real-time management of the grid. One perfect example is ABB’s beta version, known as the ADAM AI/ML fault prediction module with a cloud-based solution enabling proactive maintenance. While these are being investigated, including the collaboration projects on the Hardware-in-the-Loop simulation platform, the industry is moving from pure infrastructure management toward the adoption of state-of-the-art technologies that improve resilience and efficiency.
However, critical challenges will be raised with respect to interoperability, cybersecurity, and large datasets by transitioning into VPAC systems. Overcoming such challenges will demand a structured approach, with advanced techniques for redundancy, cybersecurity measures, and strategies for integration of physical and digital systems. Ensuring that IEDs in the physical grid are well integrated with digital systems is highly crucial for grid stability and reliability. This allows the system to operate seamlessly by embedding robust backups, thereby enhancing fault detection and response with minimal disruption. Besides this, the system optimizes maintenance through the potential for predictive intervention, and adapts to evolving technologies without overhauling existing infrastructure. This will be especially important in resilience against cyber threats. They can do this by collaborating physical with digital components to avoid a possible cyberattack and ensure that the physical IEDs continue independently as a backup in case of any failure within the digital systems. This is going to be vital in terms of safety and security in protection and control systems. Considering all these complexities, Table 27 shows a full SWOT analysis that has been conducted on the strengths, weaknesses, opportunities, and threats that VPAC systems offer.
Based on these critical areas of improvement, the action plan presented in Table 28 is suggested. The final conclusion is that virtualization has huge potential and is ready for broader use, but several factors need to be considered in order to ensure the reliability, robustness, and security of the results.

Author Contributions

Literature review, conceptualization: S.R., S.B. and M.N. Implementation and investigation of the research: S.R., S.B., M.N. and X.G. Writing—original draft preparation: S.R. Writing—review and editing: S.R., S.B., M.N. and X.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Generalitat de Catalunya, grant number 2023 DI 00094 with the support of the Pla de Doctorats Industrials del Departament de Recerca i Universitats de la Generalitat de Catalunya.

Acknowledgments

The authors would like to thank Miguel Sanchez, Ricardo Gil and Lucas Chidiac from ABB Electrification Services, Spain & Portugal, and Ivan Steinbrecher from ABB Distribution Solutions, Finland, for their valuable insights and contributions to this work.

Conflicts of Interest

Authors Sergio Rubio, Marco Nunes, Xavier Gomezwere employed by the company ABB. The remaining author declares that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ADActive Directory
AIArtificial Intelligence
BESSBattery Energy Storage Systems
CIPCritical Infrastructure Protection
CMSCentralized Monitoring System
CPACCentralized Protection Automation and Control
CPUCentral Processing Unit
CSCyber Security
CTCurrent Transformer
DANDually Attached Node
DERDistributed Energy Resources
DNPDistributed Network Protocol
EMCElectromagnetic Compatibility
EMSEnergy Management System
EVElectrical Vehicle
FOFiber Optic
GMCGrandMaster Clock
GNSSGlobal Navigation Satellite System
GOOSEGeneric Object-Oriented Substation Event
GPSGlobal Positioning System
HSRHigh-Availability Seamless Redundancy
HWHardware
IEDIntelligent Electronic Device
ITInformation Technology
KVMKernel-based Virtual Machine
LDAPLight-Weight Directory Access
LDLogical Device
MACMedia Access Control
MIBManagement Information Base
MUMerge Unit
MFAMulti Factor Authentication
NERC CIPNorth American Electric Reliability Corporation Critical Infrastructure Protection
NICNetwork Interface Card
NPRNumerical Protection Relay
OSOperating System
OTOperational Technology
P&CProtection and Control
PACSProtection, Automation, and Control System.
PCIPeripheral Component Interconnect
PCIePeripheral Component Interconnect express
PDPProgrammable Data Planes
PRPParallel Redundancy Protocol
PTPPrecision Time Protocol
RBACRole Based Access Controls
RCTRedundancy Control Trailer
SANSingly Attached Nodes
SASSubstation Automation Systems
SCADASubstation Automation and Data Acquisition
SDLCSoftware Development Lifecycle
SoESequence of Events
SMVSampled Measured Values
SNMPNetwork Management Protocol
SNTPSimple Network Time Protocol
SOCSeparation of Concern
SDNSoftware-Defined Networks
SVSample Values
SWSoftware
UFLSUnderfrequency-based Load-shedding Scheme
VMVirtual Machines
vNICVirtual Network Interface Card
VLANVirtual Local Area Network
VPACVirtualization of Protection, Automation and Control

References

  1. Lundqvist, B. 100 Years of Relay Protection, the Swedish ABB Relay History; ABB Automation Products, Substation Automation Division: Västerås, Sweden, 2001. [Google Scholar]
  2. Working Group on Centralized Substation Protection and Control, IEEE Power System Relaying Committee. Advancements in Centralized Protection and Control Within a Substation. IEEE Trans. Power Deliv. 2016, 31, 1945–1952. [Google Scholar] [CrossRef]
  3. Valtari, J. Centralized Architecture of the Electricity Distribution Substation Automation—Benefits and Possibilities; Tampere University of Technology: Tampere, Finland, 2013; ISBN 978-952-15-3061-6. [Google Scholar]
  4. EN 61850-5; Communication Networks and Systems for Power Utility Automation—Part 5: Communication Requirements for Functions and Device Models. CENELEC: Brussels, Belgium, 2013.
  5. Kulmala, A.; Raipala, O.; Hovila, P.; Yazadzhijan, B.-E.; Dantas, R.; Scoble, C. Virtualised Centralised Protection and Control—Constellation Project Case Study. In Proceedings of the 27th International Conference on Electricity Distribution (CIRED 2023), Rome, Italy, 12–15 June 2023; Institution of Engineering and Technology: Rome, Italy, 2023; pp. 1670–1674. [Google Scholar]
  6. About vPAC Ready Infrastructure. Available online: https://docs.vmware.com/en/VMware-Edge-Compute-Stack/services/utility-substation-vpac-ready-infrastructure/GUID-C9BAB086-57A7-4E74-838E-D530867AC21D.html (accessed on 15 May 2024).
  7. Hamanah, W.M.; Hossain, M.I.; Shafiullah, M.; Abido, M.A. AC Microgrid Protection Schemes: A Comprehensive Review. IEEE Access 2023, 11, 76842–76868. [Google Scholar] [CrossRef]
  8. ADMS and DERMS. Available online: https://search.abb.com/library/Download.aspx?DocumentID=9AKK107046A1569&DocumentPartId= (accessed on 22 April 2024).
  9. Home | SpringerLink. Available online: https://link.springer.com/ (accessed on 2 July 2024).
  10. IEEE Xplore. Available online: https://ieeexplore.ieee.org/Xplore/home.jsp (accessed on 18 June 2024).
  11. Web of Science. Available online: https://www.webofscience.com/wos/alldb/basic-search (accessed on 18 June 2024).
  12. Scopus. Available online: https://www.scopus.com (accessed on 18 June 2024).
  13. ScienceDirect.Com | Science, Health and Medical Journals, Full Text Articles and Books. Available online: https://www.sciencedirect.com/ (accessed on 2 July 2024).
  14. Thompson, M.; Lukach, D. Centralized Substation Protection and Control_IEEE PES PSRC WG K15. 2015. Available online: https://www.pes-psrc.org/kb/report/020.pdf (accessed on 22 May 2024).
  15. McKinsey Technology Trends Outlook 2023 | McKinsey. Available online: https://www.mckinsey.com/capabilities/mckinsey-digital/our-insights/the-top-trends-in-tech#new-and-notable (accessed on 18 June 2024).
  16. Can We Use IEC 61850 for Safety Related Functions? Available online: https://www.researchgate.net/publication/306244440_Can_we_use_IEC_61850_for_safety_related_functions (accessed on 18 June 2024).
  17. Santos, G.R.; Zancul, E.; Manassero, G.; Spinola, M. From Conventional to Smart Substations: A Classification Model. Electr. Power Syst. Res. 2024, 226, 109887. [Google Scholar] [CrossRef]
  18. Flores, E.P.; Niveri, H. Centralized Protection and Control—Enhancing Reliability, Availability, Flexibility and Improving Operating Cost Efficiency of Distribution Substations; ABB: Zurich, Switzerland, 2022. [Google Scholar]
  19. Beresh, B. I22: End-of-Useful Life Assessment of P&C Devices Report to Main Committee. 2015. Available online: https://www.pes-psrc.org/kb/report/048.pdf (accessed on 1 January 2024).
  20. De Oliveira e Sousa, B.; Starck, J.; Valtari, J. Viability Assessment for Centralised Protection and Control System Architectures in Medium Voltage (MV) Substations. CIRED—Open Access Proc. J. 2017, 2017, 1531–1534. [Google Scholar] [CrossRef]
  21. Rentschler, M.; Heine, H. The Parallel Redundancy Protocol for Industrial IP Networks. In Proceedings of the 2013 IEEE International Conference on Industrial Technology (ICIT), Cape Town, South Africa, 25–28 February 2013; pp. 1404–1409. [Google Scholar]
  22. Nsaif, S.A.; Rhee, J.M. Improvement of High-Availability Seamless Redundancy (HSR) Traffic Performance for Smart Grid Communications. J. Commun. Netw. 2012, 14, 653–661. [Google Scholar] [CrossRef]
  23. UNE-EN_IEC_62439-3:2022; Redes de Comunicación Industrial. Redes de Automatización de Alta Disponibilidad. Parte 3: Protocolo de Redundancia Paralela (PRP) y Anillo Homogéneo de Alta Disponibilidad (HSR). (Ratificada Por La Asociación Española de Normalización En Marzo de 2022). UNE: Madrid, Spain, 2022.
  24. IEEE Std 1686-2022 (Revision of IEEE Std 1686-2013); IEEE Standard for Intelligent Electronic Devices Cybersecurity Capabilities. IEEE: New York, NY, USA, 2023; pp. 1–36. [CrossRef]
  25. Strobel, M.; Wiedermann, N.; Eckert, C. Novel Weaknesses in IEC 62351 Protected Smart Grid Control Systems. In Proceedings of the 2016 IEEE International Conference on Smart Grid Communications (SmartGridComm), Sydney, NSW, Australia, 6–9 November 2016; pp. 266–270. [Google Scholar]
  26. Christensen, D.; Martin, M.; Gantumur, E.; Mendrick, B. Risk Assessment at the Edge: Applying NERC CIP to Aggregated Grid-Edge Resources. Electr. J. 2019, 32, 50–57. [Google Scholar] [CrossRef]
  27. IEEE Std 1588; IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems. IEEE: New York, NY, USA, 2008.
  28. MiCOM Agile P747 Bus Protection: GE Grid Solutions. Available online: https://www.gevernova.com/grid-solutions/multilin/catalog/p747.htm (accessed on 9 August 2024).
  29. Multilin B90 Low Impedance Bus Protection System :: GE Grid Solutions. Available online: https://www.gevernova.com/grid-solutions/multilin/catalog/b90.htm (accessed on 9 August 2024).
  30. Easergy MiCOM P40. Available online: https://www.se.com/sg/en/product-range/60794-process-bus-and-iec-618509-2-le-for-protection-relays/ (accessed on 9 August 2024).
  31. Substation Automation, Protection and Control—Products | Ingeteam. Available online: https://www.ingeteam.com/en-us/power-grid-protection-and-control/substation-automation-protection-and-control/c32_19_p/products.aspx (accessed on 9 August 2024).
  32. Centralized Protection Featuring SIPROTEC 7SX85. Available online: https://www.siemens.com/global/en/products/energy/energy-automation-and-smart-grid/webinars/24-en/2407-protection-cpc-siprotec-7sx85.html (accessed on 9 August 2024).
  33. Ladd, S.B.; Raffield, T.I.; Haithcox, E.; Fultz, J.; Shrestha, A.; Chatterjee, A.; Nadkar, P. Case Study: Designing Centralized Protection and Control Systems for a Distribution Substation at Duke Energy. Available online: https://selinc.com/api/download/138747/ (accessed on 1 January 2024).
  34. Byerly, J.; Thakur, M.; Hostetler, J.; Burger, C.; Wenke, S. Distribution Digital Substation—Consolidated Protection and Digital Secondary Systems. Available online: https://selinc.com/api/download/138749/ (accessed on 1 January 2024).
  35. Protect a Range of Substation Assets Using One Relay. Available online: https://selinc.com/mktg/protect-a-range-of-substation-assets-using-one-relay/?utm_source=pardot&utm_medium=cpc&utm_content=display&utm_campaign=487E-CPC (accessed on 9 August 2024).
  36. Ganoo, P.; Joshi, S.; Valtari, J.; Niveri, H. Centralized Protection and Control System: Are We Ready for Deployment in the Chemical, Oil, and Gas Industry? IEEE Ind. Appl. Mag. 2022, 28, 48–61. [Google Scholar] [CrossRef]
  37. Centralized and Virtualized Protection and Control. Available online: https://new.abb.com/medium-voltage/digital-substations/campaigns/smart-substation-control-and-protection-ssc600 (accessed on 7 August 2024).
  38. SSC600 Toolkit. Available online: https://go.insideplus.abb.com/business-areas-and-divisions/electrification/divisions/distribution-solutions/product-groups/distribution-automation/da-sales-support/ssc600-toolkit (accessed on 9 August 2024).
  39. EN 60870-5-104; Telecontrol Equipment and Systems Part 5-104: Transmission Protocols—Network Access for IEC 60870-5-101 Using Standard Transport Profiles. CENELEC: Brussels, Belgium, 2006.
  40. Gutiérrez, S.A.; Botero, J.F.; Gómez, N.G.; Fletscher, L.A.; Leal, A. Next-Generation Power Substation Communication Networks: IEC 61850 Meets Programmable Networks. IEEE Power Energy Mag. 2023, 21, 58–67. [Google Scholar] [CrossRef]
  41. Shah, V. Protection—Evolution, Technologies and Trends. Power Res.—J. CPRI 2021, 17, 89–95. [Google Scholar] [CrossRef]
  42. Virtualization in Digital Substations. Available online: https://www.welotec.com/whitepaper/virtualization-in-digital-substations/ (accessed on 7 August 2024).
  43. EN 50160; Voltage Characteristics of Electricity Supplied by Public Electricity Networks. CENELEC: Brussels, Belgium, 2010.
  44. Implementing IP/MPLS Network-Based Synchronization for Line Differential Protection and Control. Available online: https://cse.cigre.org/cse-n031/implementing-ip/mpls-network-based-synchronization-for-line-differential-protection-and-control.html (accessed on 12 October 2024).
  45. Aichhorn, A.; Mayrhofer, R.; Krammer, H.; Kern, T. Realization of Line Current Differential Protection over IP-Based Networks Using IEEE 1588 for Synchronous Sampling. In Proceedings of the 13th International Conference on Development in Power System Protection 2016 (DPSP), Edinburgh, UK, 7–10 March 2016; pp. 1–6. [Google Scholar]
  46. Arc Fault Detection System REA. Available online: https://new.abb.com/medium-voltage/apparatus/arc-fault-protection/arc-fault-protection-system-rea (accessed on 16 November 2024).
  47. The Virtues of Virtualization. Available online: https://library.e.abb.com/public/259eadcfe59d40bba743c7764bd24713/118-123%20m2395_EN.pdf?x-sign=OmgCr+eHINwrBuyGu6OHutrOctLuI20OPGCQAc5AFbwwb1okK936gpB17DrayyvV (accessed on 18 June 2024).
  48. Smart Substation Control and Protection SSC600 SW. Available online: https://new.abb.com/medium-voltage/digital-substations/protection-relays/multiapplication/smart-substation-control-and-protection-ssc600-sw (accessed on 12 August 2024).
  49. Dayabhai, S.; Prestwich, J. A substation automation solution that uses virtualization to reduce cost while ensuring redundancy and security compliance. In Proceedings of the Power and Energy Automation Conference, Washington, DC, USA, 5–7 March 2018. [Google Scholar]
  50. vPACalliance. Available online: https://vpacalliance.com/ (accessed on 18 June 2024).
  51. E4SAlliance. Available online: https://www.e4salliance.com/ (accessed on 18 June 2024).
  52. EN IEC 62443; Security for Industrial Automation and Control Systems. CENELEC: Brussels, Belgium, 2024.
  53. Utility Substation Virtual Protection, Automation, and Control (vPAC) Ready Infrastructure; VMware, Inc.: Palo Alto, CA, USA, 2023.
  54. Virtualization of Protection and Control—Evaluation and Deployment Considerations. Available online: https://library.e.abb.com/public/3f5ff4e1c22b49a28987ffcac74eae96/White%20paper%202NGA001642_RevA_EN_finalb.pdf (accessed on 2 January 2024).
  55. Chen, R.; Zhang, Y.; Cao, C.; Zhao, Y.; Li, B.; Zhang, J.; Gu, W. Clock Synchronization in T-MPLS Network via PTP (IEEE 1588 V2). In Proceedings of the 2009 Asia Communications and Photonics Conference and Exhibition (ACP), Shanghai, China, 2–6 November 2009; Volume 2009-Supplement, pp. 1–8. [Google Scholar]
  56. Ingram, D.M.E.; Schaub, P.; Campbell, D.A.; Taylor, R.R. Evaluation of Precision Time Synchronisation Methods for Substation Applications. In Proceedings of the 2012 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication Proceedings, San Francisco, CA, USA, 24–28 September 2012; pp. 37–42. [Google Scholar]
  57. Habib, H.F.; Lashway, C.R.; Mohammed, O.A. On the Adaptive Protection of Microgrids: A Review on How to Mitigate Cyber Attacks and Communication Failures. In Proceedings of the 2017 IEEE Industry Applications Society Annual Meeting, Cincinnati, OH, USA, 1–5 October 2017; pp. 1–8. [Google Scholar]
  58. Apostolov, A. Efficient Maintenance Testing in Digital Substations Based on IEC 61850 Edition 2. Prot. Control. Mod. Power Syst. 2017, 2, 37. [Google Scholar] [CrossRef]
  59. IEC/IEEE 61850-9-3; Communication Networks and Systems for Power Utility Automation—Part 9-3: Precision Time Protocol Profile for Power Utility Automation. IEC: Geneva, Switzerland, 2016.
  60. Grand Master Clock and GPS/GNSS Timing Solutions | Case Studies | GPS Receiver Chips & Modules | FURUNO. Available online: https://www.furuno.com/en/gnss/case/grandmasterclock#Disconnect (accessed on 10 May 2024).
  61. Volgyesi, P.; Dubey, A.; Krentz, T.; Madari, I.; Metelko, M.; Karsai, G. Time Synchronization Services for Low-Cost Fog Computing Applications. In Proceedings of the 2017 International Symposium on Rapid System Prototyping (RSP), Seoul, Republic of Korea, 19–20 October 2017; pp. 57–63. [Google Scholar]
  62. Ferrari, P.; Flammini, A.; Rinaldi, S.; Prytz, G. Evaluation of Time Gateways for Synchronization of Substation Automation Systems. IEEE Trans. Instrum. Meas. 2012, 61, 2612–2621. [Google Scholar] [CrossRef]
  63. Wang, H.; Zhu, G.; Hou, M.; Wang, S. Time Synchronization Based on Multiplexing RPR Channel and IRIG-B Time Code. In Proceedings of the 2015 5th International Conference on Electric Utility Deregulation and Restructuring and Power Technologies (DRPT), Changsha, China, 26–29 November 2015; pp. 869–872. [Google Scholar]
  64. Network Timing Technology: NTP vs. PTP | Masterclock Industry Knowledge. Available online: https://www.masterclock.com/network-timing-technology-ntp-vs-ptp.html (accessed on 12 October 2024).
  65. Antonova, G.S.; Apostolov, A.; Arnold, D.; Bedrosian, P.S.; Brunner, C.; Bui, D.P.; Dickerson, W.; Dood, M.; Gerstung, H.; Giarratano, D.; et al. Standard Profile for Use of IEEE Std 1588-2008 Precision Time Protocol (PTP) in Power System Applications: IEEE PES PSRC Working Group H7/Sub C7 Members and Guests. In Proceedings of the 2012 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication Proceedings, San Francisco, CA, USA, 24–28 September 2012; pp. 31–36. [Google Scholar]
  66. Sagen, E.; Workman, K. Methods of Time Synchronization. Available online: https://cdn.selinc.com/assets/Literature/Publications/Technical%20Papers/6370_MethodsTime_KW_20090302_Web.pdf (accessed on 22 May 2024).
  67. Zeng, Y.; Chen, G. Research on Methods to Improve Precise Time Synchronization for IRIG-B Code Encoder. In Proceedings of the 2012 Asia-Pacific Power and Energy Engineering Conference, Shanghai, China, 27–29 March 2012; pp. 1–4. [Google Scholar]
  68. IRIG-B Time Code Accuracy and Connection Requirements with Comments on IED and System Design Considerations. Available online: https://www.arbiter.com/files/product-attachments/irig_accuracy_and_connection_requirements.pdf (accessed on 16 June 2024).
  69. Bian, B.; Tang, X.; Huang, X. Risk Analysis and Research Based on IEEE 1588 in Smart High Voltage Substation. In Proceedings of the IEEE PES Innovative Smart Grid Technologies, Tianjin, China, 21–24 May 2012. [Google Scholar]
  70. IEC 61588; Precision Clock Synchronization Protocol for Networked Measurement and Control Systems. IEC: Geneva, Switzerland, 2021.
  71. NIST SP 800-82; Guide to Industrial Control Systems (ICS) Security. NIST: Gaithersburg, MD, USA, 2015.
  72. IEEE Std C37.238; IEEE Standard Profile for Use of IEEE 1588 Precision Time Protocol in Power System Applications. IEEE: New York, NY, USA, 2017.
  73. Cherdantseva, Y.; Burnap, P.; Blyth, A.; Eden, P.; Jones, K.; Soulsby, H.; Stoddart, K. A Review of Cyber Security Risk Assessment Methods for SCADA Systems. Comput. Secur. 2016, 56, 1–27. [Google Scholar] [CrossRef]
  74. Antonova, G.; Frisk, L.; Tournier, J.-C. Communication Redundancy for Substation Automation. In Proceedings of the 2011 64th Annual Conference for Protective Relay Engineers, College Station, TX, USA, 11–14 April 2011; pp. 344–355. [Google Scholar]
  75. Kumar, S.; Das, N.; Islam, S. High Performance Communication Redundancy in a Digital Substation Based on IEC 62439-3 with a Station Bus Configuration. In Proceedings of the 2015 Australasian Universities Power Engineering Conference (AUPEC), Wollongong, Australia, 27–30 September 2015; pp. 1–5. [Google Scholar]
  76. Taikina-aho, M. Redundant IEC 61850 Communication Protocols in Substation Automation. Master’s Thesis, University of Vaasa, Vaasa, Finland, 2011. [Google Scholar]
  77. IEC/TR 61850-1; Communication Networks and Systems for Power Utility Automation—Part 1: Introduction and Overview. IEC: Geneva, Switzerland, 2013.
  78. EN 61850-3; Communication Networks and Systems for Power Utility Automation—Part 3: General Requirements. CENELEC: Brussels, Belgium, 2013.
  79. EN 61850-9-2; Communication Networks and Systems for Power Utility Automation—Part 9-2: Specific Communication Service Mapping (SCSM)—Sampled Values over ISO/IEC 8802-3. CENELEC: Brussels, Belgium, 2011.
  80. IEC/TR 61850-90-4; Communication Networks and Systems for Power Utility Automation—Part 90-4: Network Engineering Guidelines. IEC: Geneva, Switzerland, 2020.
  81. IEC TR 61850-90-2; Communication Networks and Systems for Power Utility Automation—Part 90-2: Using IEC 61850 for Communication Between Substations and Control Centres. IEC: Geneva, Switzerland, 2016.
  82. EN 61508-1; Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems—Part 1: General Requirements. CENELEC: Brussels, Belgium, 2010.
  83. EN 62439-1; Industrial Communication Networks—High Availability Automation Networks—Part 1: General Concepts and Calculation Methods. CENELEC: Brussels, Belgium, 2012.
  84. EN IEC 62439-3; Industrial Communication Networks—High Availability Automation Networks—Part 3: Parallel Redundancy Protocol (PRP) and High-Availability Seamless Redundancy (HSR). CENELEC: Brussels, Belgium, 2022.
  85. IEC TS 62351-1; Power Systems Management and Associated Information Exchange—Data and Communications Security—Part 1: Communication Network and System Security—Introduction to Security Issues. IEC: Geneva, Switzerland, 2007.
  86. IEC TS 60870-5-7; Telecontrol Equipment and Systems—Part 5-7: Transmission Protocols—Security Extensions to IEC 60870-5-101 and IEC 60870-5-104 Protocols (Applying IEC 62351). IEC: Geneva, Switzerland, 2013.
  87. CIP-002-3(i); Cyber Security—Critical Cyber Asset Identification. NERC: Washington, DC, USA, 2006.
  88. IEEE Std 1815; IEEE Standard for Electric Power Systems Communications—Distributed Network Protocol (DNP3). IEEE: New York, NY, USA, 2012.
  89. ISO/IEC 27001; Information Security, Cybersecurity and Privacy Protection—Information Security Management Systems—Requirements. IEC: Geneva, Switzerland, 2022.
  90. ANSI-TIA-942; Telecommunications Infrastructure Standard for Data Centers. TIA: Arlington, TX, USA, 2005.
  91. Antonova, G.S.; Sastry, S.; Vasudevan, B. Review of Digital Substation Communication Technologies. In Proceedings of the 2022 75th Annual Conference for Protective Relay Engineers (CPRE), College Station, TX, USA, 28–31 March 2022; pp. 1–26. [Google Scholar]
  92. IEEE Std C37.240-2014; IEEE Standard Cybersecurity Requirements for Substation Automation, Protection, and Control Systems. IEEE: New York, NY, USA, 2015; pp. 1–38. [CrossRef]
  93. IEEE Std 1547.3-2023 (Revision of IEEE Std 1547.3-2007); IEEE Guide for Cybersecurity of Distributed Energy Resources Interconnected with Electric Power Systems. IEEE: New York, NY, USA, 2023; pp. 1–183. [CrossRef]
  94. Dolezilek, D.; Gammel, D.; Fernandes, W. Cybersecurity Based on IEC 62351 and IEC 62443 for IEC 61850 Systems. In Proceedings of the 15th International Conference on Developments in Power System Protection (DPSP 2020), Liverpool, UK, 9–12 March 2020. 6p. [Google Scholar] [CrossRef]
  95. Ahn, G.-J.; Sandhu, R.; Kang, M.; Park, J. Injecting RBAC to Secure a Web-Based Workflow System. In Proceedings of the ACM Workshop on Role-Based Access Control, Berlin, Germany, 26–28 July 2000; pp. 1–10. [Google Scholar] [CrossRef]
  96. Koutsonikola, V.; Vakali, A. LDAP: Framework, Practices, and Trends. IEEE Internet Comput. 2004, 8, 66–72. [Google Scholar] [CrossRef]
  97. Leszczyna, R. Cybersecurity and Privacy in Standards for Smart Grids—A Comprehensive Survey. Comput. Stand. Interfaces 2018, 56, 62–73. [Google Scholar] [CrossRef]
  98. Zero Trust Maturity Model | CISA. Available online: https://www.cisa.gov/zero-trust-maturity-model (accessed on 28 May 2024).
  99. The Role of Vmtheft and Hyperjacking in Virtualization—ProQuest. Available online: https://www.proquest.com/openview/53dc5734a3fe20a0f7db99549209a8ac/1?pq-origsite=gscholar&cbl=18750&diss=y (accessed on 10 December 2024).
  100. Lathika, K. Recent Trends in IT—Virtualization. Available online: https://ssrn.com/abstract=2845483 (accessed on 22 May 2024).
  101. Cosman, E. Structuring the ISA/IEC 62443 Standards. Available online: https://gca.isa.org/blog/structuring-the-isa-iec-62443-standards (accessed on 9 September 2024).
  102. Dolezilek, D.; Hussey, L. Requirements or Recommendations? Sorting out NERC CIP, NIST, and DOE Cybersecurity. In Proceedings of the 2011 64th Annual Conference for Protective Relay Engineers, College Station, TX, USA, 11–14 April 2011; pp. 328–333. [Google Scholar]
  103. NERC. Available online: https://www.nerc.com/pa/Stand/Pages/default.aspx (accessed on 17 May 2024).
  104. Apostolov, A.; Dood, M.; Tengdin, J. Developing IEEE 1613 Standards for Communications Network in Substations. IEEE Power Energy Mag. 2004, 2, 73–75. [Google Scholar] [CrossRef]
  105. Hussain, S.M.S.; Ustun, T.S.; Kalam, A. A Review of IEC 62351 Security Mechanisms for IEC 61850 Message Exchanges. IEEE Trans. Ind. Inform. 2020, 16, 5643–5654. [Google Scholar] [CrossRef]
  106. IEEE Std 1547.4-2011; IEEE Guide for Design, Operation, and Integration of Distributed Resource Island Systems with Electric Power Systems. IEEE: New York, NY, USA, 2011; pp. 1–54. [CrossRef]
  107. Nist, G.M. The NIST Cybersecurity Framework 2.0; NIST CSWP 29; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2023.
  108. NIST SP 800-63 Digital Identity Guidelines. Available online: https://pages.nist.gov/ (accessed on 22 May 2024).
  109. Stouffer, K.; Pease, M.; Tang, C.; Zimmerman, T.; Pillitteri, V.; Lightman, S.; Hahn, A.; Saravia, S.; Sherule, A.; Thompson, M. Guide to Operational Technology (OT) Security; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2023.
  110. TPM 2.0 A Brief Introduction. Available online: https://trustedcomputinggroup.org/wp-content/uploads/TPM-2.0-A-Brief-Introduction.pdf (accessed on 22 May 2024).
  111. ISAGCQuick Start Guide: An Overview of ISA/IEC 62443 Standards Security of Industrial Automation and Control SystemsA Quick Start Guide FINAL. Available online: https://gca.isa.org/hubfs/ISAGCA%20Quick%20Start%20Guide%20FINAL.pdf (accessed on 22 May 2024).
  112. Blair, S.M.; Roscoe, A.J.; Irvine, J. Real-Time Compression of IEC 61869-9 Sampled Value Data. In Proceedings of the 2016 IEEE International Workshop on Applied Measurements for Power Systems (AMPS), Aachen, Germany, 28–30 September 2016; pp. 1–6. [Google Scholar]
  113. IEC 61869-2:2012; Instrument Transformers—Part 2: Additional Requirements for Current Transformers. IEC: London, UK, 2012. Available online: https://www.une.org/encuentra-tu-norma/busca-tu-norma/iec/?c=6050 (accessed on 10 January 2025).
  114. Home—UCAIug. Available online: https://www.ucaiug.org/default.aspx (accessed on 14 August 2024).
  115. Hong, Q.; Blair, S.M.; Catterson, V.M.; Dyśko, A.; Booth, C.D.; Rahman, T. Standardization of Power System Protection Settings Using IEC 61850 for Improved Interoperability. In Proceedings of the 2013 IEEE Power & Energy Society General Meeting, Vancouver, BC, Canada, 21–25 July 2013; pp. 1–5. [Google Scholar]
  116. Ustun, T.S. Interoperability and Interchangeability for Microgrid Protection Systems Using IEC 61850 Standard. In Proceedings of the 2016 IEEE International Conference on Power and Energy (PECon), Melaka, Malaysia, 28–29 November 2016; pp. 7–12. [Google Scholar]
  117. Ridwan, M.I.; Miswan, N.S.; Shokri, M.S.M.; Noran, M.N.; Lajim, R.M.; Awang, H.N. Interoperability in Smart Grid Using IEC 61850 Standard: A Power Utility Prospect. In Proceedings of the 2014 IEEE Innovative Smart Grid Technologies—Asia (ISGT ASIA), Kuala Lumpur, Malaysia, 20–23 May 2014; pp. 261–266. [Google Scholar]
  118. Kim, H.J.; Jeong, C.M.; Sohn, J.-M.; Joo, J.-Y.; Donde, V.; Ko, Y.; Yoon, Y.T. A Comprehensive Review of Practical Issues for Interoperability Using the Common Information Model in Smart Grids. Energies 2020, 13, 1435. [Google Scholar] [CrossRef]
  119. Stojanović, Z.; Vlaisavljević, M.; Simić, S.; Nunes, M.; Bardi, S. Testing of centralized protection in digital substations using a real-time simulator under the auspices of the IEC61850 standard. In Proceedings of the 14th PAC World Conference, Athens, Greece, 17–19 June 2024. [Google Scholar]
  120. Kabbara, N.; Nait Belaid, M.O.; Gibescu, M.; Camargo, L.R.; Cantenot, J.; Coste, T.; Audebert, V.; Morais, H. Towards Software-Defined Protection, Automation, and Control in Power Systems: Concepts, State of the Art, and Future Challenges. Energies 2022, 15, 9362. [Google Scholar] [CrossRef]
  121. Balouji, E.; Bäckström, K.; Olsson, V.; Hovila, P.; Niveri, H.; Kulmala, A.; Salo, A. Distribution network fault prediction utilising protection relay disturbance recordings and machine learning. In Proceedings of the 27th International Conference on Electricity Distribution (CIRED 2023), Rome, Italy, 12–15 June 2023; pp. 2273–2277. [Google Scholar]
  122. ADAM Fleet Management. Available online: https://new.abb.com/medium-voltage/digital-substations/software-products/adam-fleet-management (accessed on 12 October 2024).
  123. Adams, H.S. ABB Survey Reveals Staggering Downtime Costs for Manufacturers: The Urgent Need for Reliable Maintenance Strategies. Available online: https://manufacturingdigital.com/procurement-and-supply-chain/unscheduled-downtime-costs-us-125-000-per-hour-abb-survey (accessed on 12 October 2024).
  124. Aleem, S.A.; Shahid, N.; Naqvi, I.H. Methodologies in Power Systems Fault Detection and Diagnosis. Energy Syst. 2014, 6, 85–108. [Google Scholar] [CrossRef]
  125. Hunt, R.; Flynn, B.; Smith, T. The Substation of the Future: Moving Toward a Digital Solution. IEEE Power Energy Mag. 2019, 17, 47–55. [Google Scholar] [CrossRef]
  126. Pashaei, M.; Kauhaniemi, K.; Laaksonen, H. Implementation of Adaptive Centralized Protection Scheme in Active Networks with a HIL Setup. In Proceedings of the 2024 International Conference on Smart Energy Systems and Technologies (SEST), Torino, Italy, 10–12 September 2024; pp. 1–6. [Google Scholar]
  127. Santo, D. Testing Digital Substations: Advancements with HIL. Available online: https://www.typhoon-hil.com/blog/testing-digital-substations-advancements-with-hardware-in-the-loop-technology/ (accessed on 9 September 2024).
Figure 1. Different aeras of protective relays.
Figure 1. Different aeras of protective relays.
Applsci 15 03186 g001
Figure 2. Communication model for the IEC 61850 standard.
Figure 2. Communication model for the IEC 61850 standard.
Applsci 15 03186 g002
Figure 3. Typical communication architecture using Modbus/DNP protocols.
Figure 3. Typical communication architecture using Modbus/DNP protocols.
Applsci 15 03186 g003
Figure 4. Standard architecture for implementing a fast bus protection scheme using a proprietary protocol.
Figure 4. Standard architecture for implementing a fast bus protection scheme using a proprietary protocol.
Applsci 15 03186 g004
Figure 5. Typical architecture used to implement a fast bus protection scheme using IEC 61850.
Figure 5. Typical architecture used to implement a fast bus protection scheme using IEC 61850.
Applsci 15 03186 g005
Figure 6. Typical IEC 61850 P&C architecture using GOOSE messages and sampled values.
Figure 6. Typical IEC 61850 P&C architecture using GOOSE messages and sampled values.
Applsci 15 03186 g006
Figure 7. Evolution from conventional to centralized substation.
Figure 7. Evolution from conventional to centralized substation.
Applsci 15 03186 g007
Figure 8. Simplified diagram of a CPAC system.
Figure 8. Simplified diagram of a CPAC system.
Applsci 15 03186 g008
Figure 9. SoC design principle with CPAC concept.
Figure 9. SoC design principle with CPAC concept.
Applsci 15 03186 g009
Figure 10. Substation architecture alternatives.
Figure 10. Substation architecture alternatives.
Applsci 15 03186 g010
Figure 11. Fully centralized architecture with PRP-based communication redundancy.
Figure 11. Fully centralized architecture with PRP-based communication redundancy.
Applsci 15 03186 g011
Figure 12. Hybrid architecture example with numerical protection relays.
Figure 12. Hybrid architecture example with numerical protection relays.
Applsci 15 03186 g012
Figure 13. Hybrid architecture example with numerical protection relays using simplified local protection.
Figure 13. Hybrid architecture example with numerical protection relays using simplified local protection.
Applsci 15 03186 g013
Figure 14. The ISA/IEC 62443 series [101,111].
Figure 14. The ISA/IEC 62443 series [101,111].
Applsci 15 03186 g014
Figure 15. Evolution of power substations.
Figure 15. Evolution of power substations.
Applsci 15 03186 g015
Figure 16. Key element of future autonomous network management systems.
Figure 16. Key element of future autonomous network management systems.
Applsci 15 03186 g016
Table 1. Conventional P&C system vs. CPAC approach.
Table 1. Conventional P&C system vs. CPAC approach.
Criteria/Test FeatureConventional P&C SystemCPAC Approach
Flexible Configuration Flexibility is limited by the need to configure each device individually.High flexibility with rapid, centralized reconfiguration capabilities.
Commissioning and MaintenanceRequires time and effort for each individual device.Centralized configuration and maintenance streamline the process, enhancing efficiency.
Startup CostsLower initial costs due to reliance on existing devices and mature technology.Requires an initial investment in new technology and staff training.
Life-Cycle CostHigh maintenance and upgrade costs due to the distributed nature of the system.Centralization leads to cost reduction and life-cycle simplification.
ReconfigurationTime-consuming and costly; each device needs individual reconfiguration.Quick and easy reconfiguration from a central point.
Communication Infrastructure Leverages existing infrastructures but may face capacity and speed limitations.May require upgrades to support centralization and increased data traffic.
Resistance to Change Less resistance due to reliance on established technologies. Potential resistance due to the need for adopting new technologies and modifying established processes.
Protection and Control Relies on discrete, distributed devices, each responsible for specific protection and control tasks. Centralizes protection and control, consolidating multiple functions into a single management point for enhanced coordination.
System ComplexitySimpler initial configuration, but maintenance and upgrades are challenging due to dispersed devices.More complex initial configuration, but significantly easier maintenance and upgrades due to system centralization.
ScalabilityLimited scalability: expansions require significant hardware and software modifications at multiple points. Facilitates the addition of new functions and system expansion with upgrades at strategic points.
Security and Cybersecurity Inconsistent security, relying on individual device security.Enhanced cybersecurity through centralized authentication, authorization, auditing, and system hardening measures.
Factory Pre-Shipment Tests Individual testing of each relay. Tests are comparable to those conducted on conventional systems.
Commissioning TestsIndividual on-site testing of each relay with secondary injection of currents and applied voltages. Secondary injection is performed on the merging units (MUs), similar to conventional system testing.
Periodic Maintenance Tests Each relay is regularly tested throughout its operational lifespan.Sampled value (SV) simulations and GOOSE messages enable maintenance testing without altering wiring or communication setups.
Test Configuration Test equipment is configured at each stage of the relay’s lifecycle. Test equipment configuration remains unchanged, saving time in wiring and connecting equipment.
Test AutomationLimited applicability in test automation. Test process can be automated using GOOSE and SV simulation capabilities per IEC 61850 standards.
Secondary InjectionConducted directly on the protection relays. Conducted on the MUs, allowing the CPAC to disregard actual MU values during testing in simulation mode.
Time Synchronization Information is distributed without facilitating synchronization. Fault detection and analysis information is consolidated in a single location with built-in time synchronization.
Alarm Notification Alarm information is dispersed across multiple devices.Trigger information from multiple feeders is consolidated on a single alarm notification page.
Waveform Capture Waveform capture is completed individually for each relay. The same disturbance recorder function is used across all feeders, enabling waveform comparison from multiple feeders.
Sequence of Events Events are listed individually for each relay. Events from multiple feeders are presented chronologically within the CPAC system for a clear and comprehensive view.
SCADA System CostAdditional investment required for SCADA system. SCADA system advantages are provided at no additional financial cost.
Table 2. Summary of CPAC architectures.
Table 2. Summary of CPAC architectures.
CriteriaCentralized Architecture with Communication RedundancyHybrid Architecture with Numerical Protection RelaysHybrid Architecture with Numerical Protection Relays Using Simplified Local Protection
Main featureFully centralized protection system with PRP-based communications redundancy using Merging Units (MU) and CPAC systems to send and receive data over independent LAN networks. Protection system that integrates numerical protection relays capable of handling the Sampled Analogue Values (SAV) communication profile of IEC 61850-9-2, enabling them to function as merging units and provide information to the CPAC unit.Protection system with numerical protection relays in the individual bays that communicate with the centralized CPAC unit via an Ethernet switch. This setup allows simplified local protection within the bays and advanced substation-level protection within the CPAC unit.
AdvantagesThis solution ensures the availability of functional protection in cases of device failure. It enhances engineering and maintenance efficiency through identical configurations in redundant units. It also enables a redundant unit to take over during upgrades or testing.This solution facilitates the implementation of both local and advanced protection schemes, leveraging the advantages of both decentralized and centralized protection. It provides flexibility by integrating relays and merging units, allowing it to address diverse protection requirements.This solution integrates the flexibility of centralized protection with the capability to add new functionalities to the substation via the centralized CPAC unit. It also enables the efficient distribution of protection across different levels.
DisadvantagesThis solution requires a higher initial investment in redundant communication infrastructure. Additionally, the increased configuration complexity can elevate implementation and maintenance costs.The configuration and coordination of relays and fusion units will become more complex, which may result in higher implementation and maintenance costs.Greater coordination between the relays in the bays and the centralized CPAC unit is necessary to ensure optimal performance.
A robust communication infrastructure is essential to support the increased configuration complexity.
Table 3. Comparative table of protection and control devices—state of the art.
Table 3. Comparative table of protection and control devices—state of the art.
CharacteristicSIPROTEC 7SX85MULTILIN B90MICOM Agile P747Easergy MiCOM P40SEL-487EABB SSC600
BrandSIEMENSGEGESCHEINDER ELECTRICSELABB
Protection Feeders, lines, transformers, motors, generators, capacitor banks Low-impedance busbars BusbarsLines, transformers, generators, busbarsTransformers, buses, lines, feeders Lines, transformers, busbars, generators
Control and Automation Yes Yes Yes Yes Yes Yes
Monitoring and DiagnosticsAdvancedAdvancedAdvancedAdvancedAdvancedAdvanced
Communication ProtocolsIEC 61850, GOOSE, EthernetIEC 61850, DNP3, ModbusIEC 61850, DNP3, ModbusIEC 61850, DNP3, ModbusIEC 61850, DNP3, ModbusIEC 61850, GOOSE, IEC 60870-5-104 [39], Ethernet
User InterfaceGraphical display, specialized software Graphical display, specialized software Graphical display, specialized software Graphical display, specialized software Graphical display, specialized software Web HMI, Graphical display, specialized software
Flexibility and ScalabilityModular, configurable Modular, configurable Modular, configurable Modular, configurable Modular, configurable Modular, configurable, controls up to 30 devices
Firmware Updates YesYesYesYesYesYes
Customizable Functions YesNoNoNoYesYes
Reduction of DevicesNoNoNoNoYesYes
AI CapabilitiesNoNoNoNoNoYes
Table 4. Main issues associated with traditional substations.
Table 4. Main issues associated with traditional substations.
AspectDrawbacks
HardwiringCopper wiring not supervised
High costs of hardwiring CT/VTs
Long installation and manual testing
Control PanelsConventional protection relays
Different relays for different functions
The low-impedance busbar 87B requires additional secondary windings on CTs
Lower flexibility: new function requires a new relay
High costs for construction of the panels
SubstationHigh costs for the protection and control room inside the substation
Separate panels for gateways and local SCADA
Table 5. Steps to migration from conventional to digital substation.
Table 5. Steps to migration from conventional to digital substation.
StepDescriptionTasksBenefits
1 Conventional Substations—Protection and Control Existing state with copper wiring and conventional relays. Existing challenges with high costs, long installation, and low flexibility.
2 Digital Substation “Light” Hardwiring Replaced by Process Bus FOProtection and Control Replace copper hardwiring with fiber optic (FO)-based IEC 61850 Process Bus (61850-9-2LE).
Implement IEC 61850 GOOSE messaging for communication.
Faster deployment: Quicker installation process due to reduced physical wiring.
Monitored communication: Real-time monitoring of communication channels.
Cost reduction: Lower costs associated with reduced copper wiring.
Interoperability: Enhanced compatibility with various devices and manufacturers.
Faster deployment.
Monitored communication.
Cost reduction.
Improved interoperability.
3 Digital Substation “FULL” Process Bus FO + Centralized PACS Protection and Control Implement a full process bus FO infrastructure.
Deploy a centralized Protection, Automation, and Control System (PACS).
Simplification: Reduced complexity with centralized control.
Space savings: Less physical space required for equipment.
Enhanced flexibility: Easier to add new functions through software updates.
4 Digital Substation “FULL” Process Bus FO + Centralized PACS Backups/Faults + Anomalies Recordings Integrate backup systems and fault/anomalies recording capabilities within the centralized PACS.Improved reliability: Enhanced fault detection and recording for better analysis.
Data management: Centralized storage and management of fault and anomaly data.
5 Digital Substation “FULL” Process Bus FO + Centralized PACS AI Fault Analysis Implement AI-based fault analysis within the centralized PACS.Advanced diagnostics: AI algorithms provide detailed fault analysis, improving maintenance and response times.
Predictive maintenance: Early detection of potential issues before they cause significant problems.
6 Digital Substation “FULL” Process Bus FO + Centralized PACS AI Fault Analysis + AI Fault Prediction Enhance AI to include fault prediction.Proactive maintenance: AI predicts faults before they occur, allowing for proactive maintenance.
Operational efficiency: Reduced downtime and maintenance costs through predictive insights.
Table 6. Advantages, unresolved risks and challenges, and future research lines in integrating SDN and PDP with the IEC 61850 standard in electrical substations.
Table 6. Advantages, unresolved risks and challenges, and future research lines in integrating SDN and PDP with the IEC 61850 standard in electrical substations.
AspectDescription
Advantages
Network
Management
Automatic topology detection
Efficient management of multicast traffic (GOOSE, SV)
Logical partitioning (slicing) to improve QoS and prioritize critical traffic fast fault recovery
Security
and
Cybersecurity
Global visibility and control
Putting in place security measures that include the blocking of traffic or network segregation
Integration of lightweight machine learning within programmable switches for intrusion detection
Future-proofed platform for patching and cybersecurity upgrades
Automation
and
Error Reduction
Reduction in manual configuration
Decrease in human errors
In-band telemetry for real-time data collection and proactive maintenance
Unresolved Risks and Challenges
Implementation
Complexity
The effective coordination and management of SDN and PDP present significant challenges, requiring substantial investment in infrastructure and training
Critical Time RequirementsFor some critical messages inside the substation, such as Type 1A GOOSE messages, the driving requirements are very strict in terms of time (3–10 ms); any such PDP integration should make sure these requirements are met without adding unacceptable latency
Real-time performance in an SDN-based substation depends upon appropriate hardware: inappropriate switches or bad servers degrade operations. The loss of a GPS clock or weak time synchronization as a result of poor engineering will also make the protection systems disturbed, reducing stability and reliability
Security and
Resilience
Although SDNs and PDPs improve security, both also introduce new attack surfaces. Consistency with rapid response without overloading the processing of traffic remains an open issue
Lack of DatasetsOnly a few datasets that can be used to train machine learning-based security models are public, and thus, constructing generalized and effective security solutions is limited
Future Research Lines
Standardized
Frameworks
Standardized frameworks that take into account the integration of security requirements in IEC 61850 with the demand for cybersecurity in programmable networks must be developed
Telemetry and
Data Analysis
Farther research in in-band telemetry techniques and real-time data analysis to forestall failures and attacks should be considered
Automated Network ManagementFurther investigate the aspects of the combination in the use of SDN and PDPs that will enable the complete automation of network management, including firmware updates, security patching, and incident response, autonomously
Advanced
Cybersecurity
It should be carried out in the context of improved intrusion detection and response techniques, specifically binarized neural networks, and other forms of Machine Learning that efficiently operate on programmable devices
Power Quality, Line
Differential Protection Over IP and
Interoperability
One major future direction of research will be connected with the increase in the sampling rate up to 14.4 kHz in order to meet EN50160 [43] in the case of power quality monitoring and to reach Official Metering Class 0.2 S accuracy. Another technical challenge is given by the deployment of line differential protection over IP-based networks [44,45]. Plug-and-play merging units are foreseen to ease interoperability and expand system flexibility while reducing the engineering efforts and commissioning time.
Table 7. Key aspects of safety in electrical systems.
Table 7. Key aspects of safety in electrical systems.
AspectCharacteristicsBenefits
Remote OperationRemote monitoring and control
Integration with automation systems
Reduces risk by minimizing personnel exposure to electrical hazards
Increases efficiency through quick response without physical intervention
Non-Traditional Instrument Transformers Rogowski current sensors and voltage sensors Prevents hazards such as high voltages in open CTs and ferro-resonance
Easier, safer installation and maintenance
Arc Flash Sensors [46]Rapid detection of arcs via light and heat Protects personnel and equipment by quickly extinguishing arcs
Enhances system reliability and availability through reduced damage
Table 8. Summary of the architecture of applications in virtualized medium-voltage substations.
Table 8. Summary of the architecture of applications in virtualized medium-voltage substations.
InfrastructureDescription
Data and
Communication Model
IEC 61850: It is an international standard that defines data models and communication services for substation automation, ensuring seamless interoperability among devices from different manufacturers.
Software VirtualizationSoftware and hardware decoupling: It allows applications to run in virtual environments independent of physical hardware.
Virtual Machines (VMs) and containers: Applications can run in VMs or containers, virtualizing different operating system layers.
Resource Allocation
and
Management
CPU and memory: Exclusive CPU core and memory bandwidth allocation policies for critical applications.
Cache and memory partitioning: Minimizes interference between applications through cache partitioning and the exclusive reservation of memory bandwidth.
System Interoperability
and
Efficiency
Avoiding the duplication of inherited relay logic: Simplify control logic and efficiently distribute functionality.
Adaptability and scalability: Facilitates integration of new technologies and adaptation to changes in the electrical grid.
Safety
and
Reliability
Real-time protection: Meet stringent real-time data processing requirements.
High availability: Ensures continuous availability of critical applications, even during hardware or software failures.
Communication
Network
Virtual and physical networks: The deployment of network virtualization technologies facilitates the interconnection of virtualized applications with the underlying physical network infrastructure.
IEC 61850 standard: It defines communication via Ethernet, thereby facilitating data exchange and control between substation devices.
Deployment
And
Maintenance
Flexible and rapid deployment: The implementation of new applications and updates is conducted flexibly, thereby reducing the time and costs associated with maintenance.
Testing and validation: Comprehensive laboratory testing and field validation are conducted to guarantee compliance with operational requirements before deployment.
Table 9. Comparative Table: traditional P&C vs. CPAC and VPAC systems.
Table 9. Comparative Table: traditional P&C vs. CPAC and VPAC systems.
AspectTraditional Protection SystemsCPAC Systems (e.g., SSC600)VPAC Systems
Hardware FailuresHigh risk due to numerous individual relays and aging infrastructure.Centralized hardware reduces the number of components, but central failure risk exists.Virtualization reduces hardware dependency but introduces potential performance overhead.
Complexity
and Misconfiguration
Complex systems with many devices lead to a higher risk of misconfiguration.A centralized system simplifies configuration, but a misconfiguration can impact the entire system. Complexity in managing virtual environments; misconfigurations can affect multiple virtual instances.
Redundancy Often lacks sufficient redundancy; single failures can compromise protection.Dual redundancy with hot–hot modes is recommended to ensure continuous operation.Redundancy can be implemented through virtual machines but relies on robust network infrastructure.
Response TimeSlower response times, especially in detecting and isolating faults. Faster response due to centralized control and real-time processing.Performance depends on the virtualization layer; careful management is needed to avoid delays.
Interoperability Limited interoperability between different vendors’ devices. Designed for interoperability, especially with compliance with standards like IEC 61850. High interoperability due to the use of open standards and vendor-independent hardware.
Security Basic security; often reliant on physical security and legacy protocols. Advanced security with encryption, authentication, and compliance with IEC 62443 [52]. Comprehensive security measures are needed, including virtual environment protection.
Network Dependencies Less reliant on complex networks; simpler communication protocols. Highly dependent on robust network infrastructure; requires redundancy in communication paths. Strong dependency on network reliability; latency and bandwidth can impact performance.
Software Vulnerabilities Limited software components reduce the risk, but a lack of updates can expose vulnerabilities. Regular software updates and rigorous testing are essential to prevent failures. Increased risk due to the complexity of the virtual environment; robust management of the software lifecycle is critical.
Maintenance and TestingMaintenance-intensive; testing can be cumbersome due to multiple devices.Simplified maintenance with fewer devices; regular testing in simulated environments is crucial. Virtualized testing environments allow for extensive testing but require careful management.
Scalability and FlexibilityLimited scalability; difficult to adapt to new requirements. Highly scalable and flexible; easy to reconfigure and expand. Maximum scalability means it can quickly adapt to new demands and integrate new applications.
Table 10. Comparison between SSC600 (CPAC) and SSC60 SW (VPAC).
Table 10. Comparison between SSC600 (CPAC) and SSC60 SW (VPAC).
FeatureSSC600SSC600 SW
Type of ProtectionCentralizedVirtualized
Function IntegrationProtection, control, monitoring, and communicationVirtualized protection and control
InteroperabilityCompliance with IEC 61850Compliance with IEC 61850
CybersecurityAdvanced measures aligned with IEC 62443 and NERC CIPAdvanced measures aligned with IEC 62443 and NERC CIP
FlexibilityMore rigid structure due to dedicated hardwareHigh flexibility and scalability
HardwareRequires multiple physical devicesReduces the need for physical hardware
CostsPotentially higher due to additional hardwarePotentially lower due to reduced hardware
Implementation
and Updates
Requires hardware installation and updatesFaster and more efficient implementation and updates
Table 11. Key technical requirements for VPAC systems.
Table 11. Key technical requirements for VPAC systems.
Consideration AreaDescriptionAdditional Details
ComplianceEnsure compliance with laws, regulations, and security standards; obtain necessary certifications and audits.Compliance with standards like IEC 62443 and NERC CIP ensures cybersecurity and operational consistency across all substation systems.
Availability
and Reliability
Design with high robustness, including redundancy at all levels to ensure continuous operation. Implement redundancy for station and process bus traffic; network recovery methods (IEC 61850, IEC 62439-3) like PRP and HSR with zero recovery time.
Real-Time PerformanceChallenge: Historically, virtualization technologies have struggled to deliver the real-time performance required for critical applications.
Current Shift: New solutions are emerging that promise improved real-time performance.
Handling real-time operations is critical in VPAC applications, which require immediate responses. Current improvements in hardware and software are addressing these limitations.
New hardware/software solutions address historical performance issues. Immediate responses are critical for handling SMV and GOOSE traffic.
Software Development Lifecycle (SDLC) Follow SDLC best practices, excluding unnecessary services and componentsm to minimize the attack surface and performance issues. Integrating security into every stage of the software development lifecycle helps reduce vulnerabilities and ensure performance optimization.
Integrated Security Implement strong encryption, authentication protocols, and protection against internal and external threats.Ensure security across the virtual infrastructure, including hypervisors, management platforms, and data in transit and at rest.
InteroperabilityAdhere to open standards and communication protocols to interact with diverse devices and systems.VPAC systems should work seamlessly across different manufacturers, especially under IEC 61850-9-2 LE for SV communication.
System Monitoring and AuditabilityImplement continuous monitoring and auditing to detect and respond to anomalies, ensuring system integrity.Monitoring is critical for maintaining stability, especially in real-time VPAC systems. Implement logs for real-time event detection and response.
Data Integrity
and Isolation
Protection: Ensure that data in a virtualized environment are properly isolated and protected against unauthorized access through network segmentation and data encryption in transit and at rest.Network Segmentation: Divide the network into isolated segments to enhance security.
Encryption: Protect data both in transit and at rest to prevent unauthorized access.
Hypervisor Types and Solutions
(Hardware-Based Virtualization)
Type-1 Hypervisors: Run directly on the hardware, providing more predictable performance.
Type-2 Hypervisors: Run on a host operating system, which can introduce delays and security issues.
Kernel-Based Virtualization (KVM): Enables live migration and resource scheduling, though it may not be ideal for critical traffic due to switching times.
OS-Level Virtualization: Offers low resource overhead and additional services but provides less isolation.
Type-1: Lower overhead, higher performance. Ideal for production environments.
Type-2: Easier to implement but less efficient for critical applications.
KVM: Suitable for diverse workloads, but live migration requires caution.
OS-Level: Highly efficient but less isolated, making it suitable for less critical applications.
Hardware AccelerationUsage: Hardware acceleration is preferred for PAC virtualization because it provides guaranteed service for SMV and GOOSE traffic.
Type-1 Hypervisors: Utilize hardware acceleration through the host BIOS.
Type-2 Hypervisors: Dependent on the host operating system for acceleration, potentially resorting to software emulation if native support is unavailable.
Advantages: Improves performance and efficiency for intensive tasks.
Disadvantages: Requires compatible hardware and proper configurations.
Network Virtualization Real-time traffic handling: Crucial for VPAC applications that rely on SMV and GOOSE data. Technologies:
NIC Virtualization—Utilizes features like guaranteed bandwidth for SMV traffic.
SR-IOV—PCI Express extension for virtualizing NIC resources.
Potential issues: Risk of broadcast storms and internal latencies.
NIC Virtualization: Allows reservation of specific bandwidth for critical traffic.
SR-IOV: Enhances NIC resource efficiency but requires hardware support.
Latencies: Minimizing latency and managing network load is essential for performance.
Access Control Management Establish robust access control to restrict system access to authorized personnel. Utilize Role-Based Access Control (RBAC) with LDAP integration. Automation of access rights management can reduce unauthorized access risks.
Backup and Disaster RecoveryDevelop and maintain comprehensive backup and disaster recovery plans for rapid system recovery.Ensures rapid system recovery during failures. The regular testing of backup systems is necessary to validate the reliability of disaster recovery protocols.
Time Synchronization Precision: Ethernet can achieve software-based synchronization with 1 ms precision.
Advanced Protocols: IEEE 1588v2 and IEC 61850-9-3 allow for 1 μs precision, necessary for IEC 61850-9-2 process buses.
Alternatives: In the absence of GPS, the Best Master Clock algorithm can be used for synchronization.
IEEE 1588v2: Provides high precision for critical applications requiring exact synchronization.
GPS: Offers precise synchronization but depends on signal availability.
SNTP: Less precise, suitable only for less demanding systems.
Redundancy and High AvailabilityImportance: Ensuring high availability and reliability in the communication network is essential.
Standards: IEC 61850 and IEC 62439-3 define network recovery methods with zero recovery time, such as PRP and HSR.
Implementation: Redundancy is preferred for station and process bus traffic, while other applications may use virtual redundancy.
PRP and HSR: Guarantee recovery times without packet loss in case of network failures.
Virtual Redundancy: Can be less costly but is less robust than physical redundancy.
Monitoring: Crucial for maintaining network stability and preventing failures.
Virtual Resource OptimizationManagement: Efficiently managing virtual resources is crucial to avoid overload and ensure optimal system performance.
Key Areas: Proper configuration of virtual machines, virtual networks, and storage.
Configuration: Adjust virtual resources to balance load and avoid bottlenecks.
Monitoring: Track resource usage to make proactive adjustments
Virtual Infrastructure SecurityApproach: Ensure that the software and the underlying virtual infrastructure, including hypervisors and management platforms, have specific security measures for virtual environments.Security Measures: Implement regular patches and updates and protect virtualization management platforms.
Isolation: Ensure virtual resources are protected against unauthorized access.
Scalability and FlexibilityRequirement: VPAC systems must be scalable and flexible, allowing for the easy addition of new nodes and virtual resources without interrupting system operation.Scalability: Facilitate system expansion to support growth in demand.
Flexibility: Adapt the system to changing needs and infrastructure.
Hardware Material ListMaintain an inventory of all hardware components to ensure quality and compatibility.Hardware selection must comply with IEC 61850 and IEEE 1613 standards for reliability in harsh substation environments.
HardwareFlexibility: Virtualization aims to provide flexibility in hardware selection.
Environmental Requirements: Comply with environmental standards to ensure reliability in electrical substations.
Standards: Requirements specified in IEC 61850 and IEEE 1613 for electromagnetic compatibility and hardware reliability.
Regulatory Compliance: Ensures hardware suitability for industrial environments.
Robustness: Hardware must be resilient to operate in substation conditions.
Flexibility: Allows adaptation to different configurations and needs.
Software Behaviour ListProvide detailed software behavior and connection descriptions to manage system interactions effectively.Mapping the interactions between virtual and physical devices helps avoid conflicts and ensures proper system operation.
Table 15. Standards related to time management and synchronization.
Table 15. Standards related to time management and synchronization.
Standard/RecommendationDescriptionApplication
IEEE 1588 [27]Standard for a precision clock synchronization protocol for networked measurement and control systems Defines the Precision Time Protocol (PTP) for clock synchronization in networked measurement and control systems.
IEC 61850-9-3:2016 [59]Communication networks and systems for power utility automation Specifies time accuracy and synchronization requirements in substation automation networks.
IEC 61588 [70]Precision clock synchronization protocol for networked measurement and control systemsEquivalent to IEEE 1588, applicable in industrial automation and control networks.
NIST SP 800-82 [71]Guide to Industrial Control System (ICS) Security Provides guidelines for the security of industrial control systems, including aspects of time synchronization.
IEEE C37.238 [72]Standard Profile for Use of IEEE 1588 Precision Time in Power System Applications Defines the profile for using IEEE 1588 in power system applications, ensuring precise synchronization in electrical environments.
Table 16. Specifications and recommended tests.
Table 16. Specifications and recommended tests.
AspectDescriptions
Required PrecisionNetwork precision must be better than ±1 µs before commissioning.
GMC PrecisionEach Grandmaster Clock (GMC) should have an inaccuracy of less than 250 ns and maintain this precision for at least 5 s after losing the reference signal.
Current Transducer RequirementsTransducers should have an accuracy error of less than 50 ns and a drift of less than 15 µs. Once synchronized, they must maintain 1 µs precision within a 5 s window.
MU/IED
Precision [58].
Measurement units (MU) and Intelligent Electronic Devices (IEDs) must have clocks synchronized to a minimum precision of 1 µs, in accordance with T5 class of IEC 61850-5.
Network Time
Inaccuracy
Confirm that network time inaccuracy is less than ±1 µs.
GMC TestingVerify the precision of the GMC and its ability to maintain accuracy after losing the reference signal.
Slave Clock
Verification
Confirm the accuracy of slave clocks using a 1 PPS output and measure the PTP fields generated by each GMC.
Current
Transducer Testing
Confirm the correctness of the PTP message correction field and verify the accuracy of current transducers under different traffic conditions.
Network
Configuration
and Topology
Verify that all network components are configured correctly and that all clocks are synchronized to the same time domain.
Table 17. Time synchronization classes according to IEC 61850-5.
Table 17. Time synchronization classes according to IEC 61850-5.
Synchronization ClassPrecision (μs)Sync. ErrorApplication
TL>10,000Low precisionGeneral synchronization for various low-precision applications.
T010,00010 msEvent stamping with 10 ms precision.
T110001 msEvent stamping with 1 ms precision.
T2100100 μsZero-crossing tagging and data for distributed synchronization checks. Waveform-based switching tags.
T32525 μsVarious applications.
T444 μsSample tagging or synchronized sampling.
T511 μsHigh-precision sample tagging or highly synchronized sampling.
Table 18. Integrated message types according to IEC 61850-5.
Table 18. Integrated message types according to IEC 61850-5.
TypeDescriptionPerformance ClassRequirement DescriptionTransfer Time (ms)Typical Interface (IF)
1A “Trip”The trip message is the most critical fast message in the substation, with more stringent requirements than other fast messages. Also applicable to interlocking, intertrips, and logical discrimination between protection functions. P1Total transmission time must be less than a quarter cycle (5 ms for 50 Hz, 4 ms for 60 Hz). TT6: ≤3 ms3, 5, 8
4Raw Data (“Samples”) Includes output data from digitizer transducers and digital instruments, consisting of continuous streams of synchronized samples from each IED, interleaved with data from other IEDs.P7aAcceptable delay for protection functions using these samples (Equivalent to P1). TT6: ≤3 ms4, 8
P8bAcceptable delay for other functions using these samples (Equivalent to P2). TT5: ≤10 ms2, 4, 8
Table 19. Essential requirements for implementing an effective redundant system.
Table 19. Essential requirements for implementing an effective redundant system.
CategoryRequirementDescription
Hardware Duplication of Critical ComponentsEssential components like servers, power supplies, networks, and storage units must be duplicated to prevent a single point of failure.
Network Devices Routers, switches, and cables should be configured redundantly to ensure continuous connectivity.
Load BalancingWorkload distribution among active components to avoid overloading a single component.
Automatic FailoverAutomatic mechanisms to switch to a backup component in case of primary component failure.
Physical IsolationRedundant components should be in different physical locations to protect against local events affecting both systems.
Software Application RedundancyCritical applications should run on redundant instances, on the same server (virtualization) or different servers.
State and Data Management Synchronize data and maintain state consistency between active and backup systems.
Failover Mechanisms Enable seamless and automatic transition between the primary and backup systems in case of failure.
Operational ProceduresTesting and ValidationPerform regular failover tests to ensure that the backup system operates correctly.
Seamless UpdatesAllow updates and maintenance without interrupting service, using appropriate update strategies.
Patching and MaintenanceApply patches and conduct maintenance without affecting system availability.
Monitoring and Alerts Implement active monitoring with real-time alerts for failures and anomalous conditions.
Management and Procedures Documentation and Procedures Maintain comprehensive documentation of the redundant system architecture, failover procedures, and recovery plans.
Personnel TrainingTrain personnel in the redundant system’s operation, maintenance, and recovery, and conduct emergency drills.
Table 20. Standards and regulations associated with redundancy.
Table 20. Standards and regulations associated with redundancy.
Standard/RegulationDescriptions
IEC 61850 [77]Standard for electrical network automation, including redundancy in communication and protection systems to ensure high availability.
IEC 61850-3 [78]General hardware requirements for devices in electrical substations.
IEC 61850-5 [4]Performance and functionality requirements for automation and control devices in substations.
IEC 61850-9-2 [79]Standard for the transmission of sampled values and synchronization data over Ethernet.
IEC 61850-90-4 [80]Part of IEC 61850 addresses redundancy in network and communication systems.
IEC 61850-90-2 [81]Standard for integrating communication systems in substation automation, including redundancy in message communication.
IEC 61508 [82]Standard for the functional safety of electrical, electronic, and programmable systems, including redundancy requirements to ensure safety systems.
IEC 62439 [83]Standard covering protocols for redundancy in industrial networks, including PRP and HSR.
IEC 62439-3 [84]Part of IEC 62439 specifies PRP and HSR to ensure network availability.
IEC 62351 [85]Security standard for communications in industrial automation and control systems.
IEC 60870-5-7 [86]Security extensions for IEC 60870-5-104.
IEC 60870-5-104 [39]Standard for remote control of electrical power systems over a network protocol.
IEEE 1588 (PTP) [27]Standard for time synchronization over Ethernet networks, may involve redundant mechanisms to ensure time precision and availability.
NERC CIP [87]Critical Infrastructure Protection standards, including redundancy and security requirements for power grid control and protection systems.
DNP SA V5/6 [88]Standard for security and authentication in distribution automation and control networks.
ISO 27001 [89]Standard for information security management, may include measures for redundancy in handling critical data and systems.
TIA/EIA-942 [90]Standard for data center design, covering redundancy in IT infrastructure to ensure high availability.
Table 21. Different redundant systems for a CPAC system.
Table 21. Different redundant systems for a CPAC system.
SystemDescriptionAdvantagesDisadvantagesApplication
System 1 Two CPAC units to eliminate loss of protection if one CPAC fails. Only one Merging Unit (MU) per protected circuit. High availability of protection in case one CPAC unit fails.If the MU fails, the specific circuit will be unprotected. Users rely on a single multifunction relay per circuit in a conventional setup.
System 2 One CPAC unit and a multifunction relay or Intelligent Merging Unit (IMU) per circuit can act as an MU. The IMU provides protection if the CPAC unit fails.If the IMU fails, the circuit where it was used will be unprotected. Users with multifunction relays capable of acting as merging units are looking to add new functions or backup protection.
System 3 Two MUs per protected circuit to eliminate a single point of failure.No system failure will compromise protection.The number of circuits protected by the CPAC unit is halved.Clients aim to avoid a single point of failure and provide all protection and control functions at the CPAC level.
System 4 Two CPAC units for the entire system, one MU and one IMU per protected circuit.High reliability: the failure of both CPACs and an MU or IMU leaves no circuit unprotected. The system’s complexity increases due to the integration of multiple components, necessitating rigorous management and expertise to ensure seamless operation and coordination.Users seeking the highest levels of reliability.
System 5 One CPAC unit for the entire system, one MU and one IMU per protected circuit. Avoids a single point of failure by adding an IMU; the system is protected even if the CPAC, MU, or IMU fails. The number of circuits protected by the CPAC unit is halved.Users with microprocessor relays that can act as merging units and wish to add additional functions or backup protection without a single point of failure.
Table 22. Comparison of redundancy methods.
Table 22. Comparison of redundancy methods.
MethodAdvantagesDisadvantagesWeaknessesStrengthsOpportunitiesThreats
NLow initial cost. No failure tolerance.High probability of total service disruption.Simplicity in implementation. Ideal for non-critical systems.High risk of significant downtime in case of failure.
N + 1Improves resilience against single failures.Limited protection against multiple failures.Does not ensure high availability. Increases availability.Suitable for critical systems with tolerance for one failure. Risk if failures are multiple or simultaneous.
2N High availability.Expensive and complex to implement and maintain. High duplication cost. High resilience.Reduces downtime risk significantly in critical applications. Complexity in management and high operational costs.
2N + 1 Maximum availability and resilience.Very high cost and extreme complexity in design and maintenance. Complex operation and high maintenance costs.Protects against multiple failures. Ideal for mission-critical environments.Management complexity and high operational costs.
Table 23. Strategies form the basis for a resilient cybersecurity.
Table 23. Strategies form the basis for a resilient cybersecurity.
ChallengeProposed Strategy
Proprietary Operating
Systems
Implement a multi-layered security framework to enhance protection.
Heterogeneous Network
Technologies
Integrate cybersecurity measures with legacy systems while upgrading them.
VM IsolationEmploy advanced isolation techniques and conduct regular security audits.
Vulnerabilities in
Automation Systems
Ensure systems are modular, scalable, and compliant with established cybersecurity standards.
Threats in Virtualized
Environments
Utilize cutting-edge security measures to prevent and detect hyperjacking and similar threats.
Table 24. Cybersecurity standards and practices for electric substations.
Table 24. Cybersecurity standards and practices for electric substations.
StandardDescriptionApplication
IEC 61850 [94]Communication in electric substation automation systems. Facilitates information exchange between devices in substations.
IEEE 1613 [104]Environmental and testing requirements for communication network devices in electric power substations. Ensures the reliability of communication devices under adverse environmental conditions.
IEC 62439-3 [23]Highly available and redundant network protocols, such as PRP and HSR, ensure continuous communication. Ensures continuous and redundant communication in substation networks.
IEC 62443 [94]Cybersecurity standards for Industrial Automation and Control Systems (IACS).Comprehensive protection of industrial automation and control systems against cyber threats.
NERC CIP [102]Critical Infrastructure Protection standards in North America.Protects energy control systems and critical data in electric infrastructure.
IEC 62351 [25,105] Cybersecurity for energy management systems and information exchange.Protects data and communications in energy management systems.
IEEE 1686 [24] Cybersecurity standard for Intelligent Electronic Devices (IEDs).Defines cybersecurity requirements for IEDs in automation systems.
IEEE 1547.3 [93,106]Cybersecurity for distributed energy resources (DERs) interconnected with electric power systems. Ensures secure integration of DERs with electric power systems.
IEEE C37.240-2014 [92]Cybersecurity requirements for automation, protection, and control systems.Implements security measures in automation and protection systems.
NIST Cybersecurity Framework [107] Framework for improving cybersecurity in organizations (Versions 1.1 and 2.0).Provides guidelines for enhancing organizational cybersecurity.
NIST SP 800-53 Rev.5 [108]Security and privacy controls for organizations and information systems.Establishes security and privacy controls for information systems.
NIST SP 800-82 Rev. 3 [109]Guide to Industrial Control System (ICS) security. Enhances security in industrial control systems.
NIST SP 800-63 [108]Guidelines on digital identity and authentication.Defines policies and procedures for digital identity and authentication.
TPM 2.0 [110]Trusted Platform Module specification for cybersecurity evaluation. Ensures hardware integrity based on TPM standards.
CISA Zero Trust [98]The maturity model for cybersecurity is based on the Zero Trust principle.Implements a cybersecurity model that assumes no actor is inherently trusted.
IEC 61850-3 [40]Mandatory compliance for systems in substations, covering environmental and security criteria. Ensures environmental resilience and security in substation equipment.
PWI TR 61850-90-20 [25]Guidelines for redundancy systems in network and communication for utility automation. Implements redundancy systems in utility network automation.
IEC 62351:2023 SER [105]Security for data and communications in energy management systems. Protects the integrity and confidentiality of data in energy management systems.
Table 25. Cybersecurity specifications and implementation for VPAC systems.
Table 25. Cybersecurity specifications and implementation for VPAC systems.
ComponentSecurity SpecificationImplementation Strategy
Server HardwareEnsure the physical and logical integrity and security of servers. Subject servers to additional cybersecurity certifications and compliance with safety standards.
Networks Implement network segmentation and access controls. Use firewalls, VLANs, and access control lists to enforce segmentation and limit unauthorized access.
Configuration and Testing Tools Utilize secure tools that do not introduce vulnerabilities. Deploy secure configuration and testing tools that are validated and regularly updated.
Support SystemsComply with best practices in monitoring and management systems. Implement continuous monitoring and automated alerts to maintain system integrity.
Substation SoftwareProtect through regular patching and updates. Establish a rigorous patch management process to ensure timely updates and vulnerability mitigation.
Solution ManagementImplement security measures throughout the solution lifecycle. Integrate security protocols from the design phase through to decommissioning, ensuring consistent security.
Risk Assessment and Management Identify and mitigate cyber risks.Conduct regular risk assessments and implement risk mitigation strategies tailored to the specific threats.
Security Requirements for System Components Ensure all components are protected against threats. Harden all components, including hardware, software, and networks, against known vulnerabilities.
Operational Security Measures Protect the continuous and secure operation of the system.Implement real-time monitoring, incident response plans, and failover mechanisms to ensure resilience.
Hardware Protection Compliance with additional cybersecurity certifications and safety standards. Enforce strict compliance with IEC 62443 and related physical and logical security standards.
Communication ProtectionImplement network segmentation and access controls. Use secure communication protocols (e.g., TLS, VPNs) and robust authentication mechanisms to protect data in transit.
Software IntegrityEnsure software integrity through regular patches and updates. Automate software updates and patching while validating changes against cybersecurity standards.
Access Management Define roles and authentication systems for software access. Implement Role-Based Access Control (RBAC) integrated with enterprise LDAP for streamlined access management.
Table 26. Protocols and tools in cybersecurity.
Table 26. Protocols and tools in cybersecurity.
Protocol/ToolDescription
GOOSEFacilitates communication between protection and control devices in substations.
SV (sampled values)Transmits voltage and current readings within substations.
PRP
(Parallel Redundancy Protocol)
Ensures uninterrupted communication by providing network redundancy.
TPM (Trusted Platform Module)Secures the integrity of devices through hardware-based security.
Table 27. SWOT analysis for transitioning to VPAC systems.
Table 27. SWOT analysis for transitioning to VPAC systems.
AspectStrengthsWeaknessesOpportunitiesThreats
Efficiency
and
Cost
CPAC systems streamline operations and reduce costs.Transition involves managing significant technical and operational changes.Exploring SaaS and IaaS models can drive innovation and flexibility.Technological advancements may outpace current systems.
Safety
and
Flexibility
Improved safety through non-traditional sensors.Virtualized systems may experience performance issues and increased latency.Leveraging big data and AI/ML for predictive analytics can enhance fault prediction and maintenance.Increased reliance in cloud-based solutions may create single points of failure.
RedundancyAdvanced redundancy techniques like PRP enhance resilience and availability.Ensuring full interoperability between different manufacturers’ IEDs remains challenging.Developing integrated systems that combine physical and digital elements can enhance reliability.Cybersecurity threats such as malware and ransomware pose risks to virtualized systems.
Technology IntegrationAdoption of modern technologies like AI and ML improves predictive capabilities.Dependency on cloud and network infrastructure requires robust management.Partnerships and pilot programs can help identify optimal solutions and best practices.System integration with legacy technologies may lead to compatibility issues.
Data ManagementAI/ML tools like ABB’s ADAM offer high-precision predictive analytics for better maintenance.Complexity of managing large amounts of data and ensuring data integrity.Utilizing analytics and big data can improve operational efficiency and reduce downtime.Regulatory and compliance challenges may arise with evolving standards and requirements.
Table 28. Action plan from SWOT analysis.
Table 28. Action plan from SWOT analysis.
ActionGoal
Strengthening
Cybersecurity Measures
Implement advanced protocols and conduct regular assessments to protect against cyber threats.
Improving
Interoperability
Adopt open standards for seamless integration between systems and manufacturers.
Enhancing Real-Time
Performance
Invest in hardware acceleration and optimize virtualization techniques to reduce latency.
Expanding Predictive
Analytics
Utilize AI/ML tools and big data for predictive maintenance and enhanced fault detection.
Ensuring Physical and
Digital Integration
Develop strategies for coordinating physical IEDs with digital systems and establish robust backups.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Rubio, S.; Bogarra, S.; Nunes, M.; Gomez, X. Smart Grid Protection, Automation and Control: Challenges and Opportunities. Appl. Sci. 2025, 15, 3186. https://doi.org/10.3390/app15063186

AMA Style

Rubio S, Bogarra S, Nunes M, Gomez X. Smart Grid Protection, Automation and Control: Challenges and Opportunities. Applied Sciences. 2025; 15(6):3186. https://doi.org/10.3390/app15063186

Chicago/Turabian Style

Rubio, Sergio, Santiago Bogarra, Marco Nunes, and Xavier Gomez. 2025. "Smart Grid Protection, Automation and Control: Challenges and Opportunities" Applied Sciences 15, no. 6: 3186. https://doi.org/10.3390/app15063186

APA Style

Rubio, S., Bogarra, S., Nunes, M., & Gomez, X. (2025). Smart Grid Protection, Automation and Control: Challenges and Opportunities. Applied Sciences, 15(6), 3186. https://doi.org/10.3390/app15063186

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop