Next Article in Journal
Real-Time Occluded Target Detection and Collaborative Tracking Method for UAVs
Previous Article in Journal
Application of Fuzzy Logic for Collaborative Robot Control
Previous Article in Special Issue
Wide-Area Backup Protection Area Division Method Considering Communication Constraints
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A New Wide-Area Backup Protection Algorithm Based on Confidence Weighting and Conflict Adaptation

1
State Grid Henan Electric Power Research Institute, Zhengzhou 450052, China
2
State Grid Henan Electric Power Company, Zhengzhou 450052, China
3
Yanzhao Electric Power Laboratory, North China Electric Power University, Baoding 071003, China
*
Author to whom correspondence should be addressed.
Electronics 2025, 14(20), 4032; https://doi.org/10.3390/electronics14204032 (registering DOI)
Submission received: 9 September 2025 / Revised: 26 September 2025 / Accepted: 3 October 2025 / Published: 14 October 2025
(This article belongs to the Special Issue Advanced Online Monitoring and Fault Diagnosis of Power Equipment)

Abstract

To alleviate the communication burden of wide-area protection and enhance the fault tolerance of multi-source criteria, this paper introduces an improved wide-area backup protection method based on multi-source information fusion. Initially, the variation characteristics of bus sequence voltages after a fault are utilized to screen suspected fault lines, thereby reducing communication traffic. Subsequently, four basic probability assignment functions are constructed using the polarity of zero-sequence current charge, the polarity of phase-difference current charge, and the starting signals of Zone II/III distance protection from the local and adjacent lines. The confidence of each probability function is evaluated using normalized information entropy, while consistency is analyzed via Gaussian similarity, enabling dynamic allocation of fusion weights. Additionally, a conflict adaptation factor is designed to adjust the fusion strategy dynamically, improving fault tolerance in high-conflict scenarios and mitigating the impact of abnormal single criteria on decision results. Finally, the fused fault probability is used to identify the fault line. Simulation results based on the IEEE 39-bus model demonstrate that the proposed algorithm can accurately identify fault lines under different fault types and locations and remains robust under conditions such as information loss and protection maloperation or failure.

1. Introduction

In the context of modern complex power grids, traditional backup protection strategies that rely on local measurement signals face significant challenges in terms of protection setting calibration and multi-level coordination, making it difficult to fully ensure the safe and stable operation of power grids [1]. With the continuous deepening of the digitalization and intelligentization process of smart substations, the development of wide-area measurement technology and communication technology has provided complete conditions for intrastation and interstation communication across bays. It enables accurate and rapid determination of fault locations by utilizing multi-point measurement information without the need for step-by-step coordination. Therefore, wide-area protection has gradually become a research hotspot, attracting extensive attention from foreign scholars [2,3,4]. In particular, how to utilize multi-source information to develop new algorithms for wide-area protection is particularly crucial.
At present, the methods for identifying faulty components in wide-area protection can be mainly classified into three categories. The first category consists of algorithms based on switch state quantities (such as circuit breaker status, protection action signals, and directional element information). For example, agent technology is applied to wide-area backup protection algorithms in [5]. Through the exchange of switching quantity information among multiple agents, the rapid detection and accurate location of faulty components are thereby achieved. Information on directional elements and distance protection from the local line and adjacent lines is collected, and faulty components are identified and faults are determined by constructing a protection fitness function in [6]. An adjacency matrix reflecting the dynamic changes in network topology is constructed based on graph theory, and the Floyd algorithm is combined to search for tripping paths so as to determine the fault isolation set in [7]. Multi-agent technology is introduced to build a wide-area protection system, and the autonomous and collaborative capabilities of agents are leveraged to achieve adaptive protection for large-scale power grids in [8]. The Weighted Extreme Learning Machine (WELM) is adopted to process unbalanced fault data, which improves the detection accuracy and reliability of wide-area backup protection for transmission lines in [9]. Such methods have low communication volume but weak anti-interference capability; information loss or errors can easily lead to misjudgment. The second category includes algorithms based on electrical quantity information (such as voltage, current amplitude, and phase). For instance, A method using wide-area current differential is applied in wide-area protection in [10]. A wide-area current differential protection suitable for multiterminal lines was constructed by analyzing the influence of the synchronization of multiterminal lines on differential current, and the double K braking coefficient was introduced to improve the capability of withstanding phase shift errors in [11]. Dynamic adaptive thresholds and synchronization error compensation are combined in [12] to propose a new multi-terminal current differential protection criterion, while sensitivity is enhanced and the impact of synchronization deviation is suppressed. A method based on differential voltage was proposed to identify faulty lines in transmission systems in [13]. A method that is based on the distribution law of the amplitude of positive-sequence fault component voltage and combines it with the inverse-time characteristic equation to realize the online adaptive setting of protection parameters has been proposed in [14]. This method is not easily affected by capacitive current, but a discrimination dead zone exists. Such methods have better anti-interference capability than switch quantity algorithms but have high requirements for data synchronization and a heavy communication burden. The third category is multi-source information fusion algorithms that integrate information from electrical quantities and switch state quantities. A wide-area backup protection starting criterion based on the operation state of distance protection Zone III and the sum of current phasors injected into the bus is proposed in [10], and the actual faulty line is determined by calculating the voltage and current values at both ends of the line. Electrical quantities are combined with gray relational analysis in [15] to calculate the fault degree of lines for distinguishing faulty lines. Through this approach, the fault tolerance rate is improved, but high requirements are placed on the synchronization of waveform recording data. Sequence voltage sorting is used to screen suspected faulty lines, and protection action information is then fused for decision-making in [16]. A wide-area protection algorithm based on the comparison of fault charge quantities and improved evidence theory fusion is proposed in [17]. In this algorithm, fault charge quantities (electrical quantities) and distance protection activation information (switch quantities) are integrated. It is featured with low communication volume and can accurately identify faults under various error scenarios. However, in this method, when electrical quantities on one side are lost, the first evidence source will remain one, and in the subsequent fusion process, the result will tend to lean more towards line faults.
In summary, this paper presents a wide-area protection method for power systems grounded in multi-source information fusion criteria. The main contributions are outlined as follows: building upon existing applications of entropy and Gaussian similarity, this work introduces a two-dimensional “confidence weighting--consistency analysis” evaluation mechanism to achieve dynamic allocation of fusion weights. This is further coupled with a conflict adaptive factor, forming a coordinated optimization strategy that integrates “weight adjustment and fusion-strategy adaptation.” While inheriting the benefits of existing multi-source fusion approaches, the proposed method enhances algorithmic fault tolerance. In addition, a preprocessing step based on sequence voltage sorting is employed to narrow down suspected fault lines, thereby alleviating the communication burden in wide-area protection systems. PMU can use GPS clock signals to provide synchronous timing for the measured node voltages and line currents. Currently, the maximum timing accuracy of GPS reaches 1 microsecond, which provides strong hardware support for the wide-area backup protection algorithm proposed in this paper.

2. Selection Method of Suspected Fault Line in Wide-Area Backup Protection

2.1. Wide-Area Protection Structure

The wide-area backup protection system and existing traditional protection systems operate independently while achieving collaborative operation. Both jointly undertake the task of identifying and removing faults, providing dual guarantees for the safe and stable operation of power systems [18]. Wide-area protection structures can be divided into three categories based on the location of the central station: substation-centralized, regional-centralized, and distributed. Among them, the regional-centralized type has broad application prospects, and this paper will adopt the regional-centralized protection structure; the specific structure is shown in Figure 1.
In the specific deployment of the regional centralized architecture, the power grid is divided into several sub-regions. Each region is equipped with a single decision-making central station (master station), and the remaining substations operate collaboratively as slave stations. The master station has a built-in core decision-making module, while the slave stations are configured with substation execution terminals, forming a hierarchical “hub-node” relationship. From the perspective of structural hierarchy, data flow and control execution present a three-level architecture: the bottom level consists of IEDs (Intelligent Electronic Devices), which are responsible for collecting analog quantities, switching quantities, and various state parameters at their installation points. They complete information aggregation through the intra-substation local area network and upload it to the regional decision-making center. The middle level is composed of substation execution terminals, whose core function is to aggregate wide-area data from the underlying IEDs and transmit it to the regional decision-making center, while receiving control commands from the center, and executing them on-site. The top-level regional decision-making center serves as the core hub. On one hand, it collects global information uploaded by all slave station execution terminals in the region; on the other hand, it conducts comprehensive analysis and judgment in combination with the power grid topology model, generates control strategies, and then issues them to the execution terminals of the corresponding slave stations.

2.2. Suspected Fault Line Screening Method

To mitigate wide-area communication traffic, rather than comparing data acquired from all lines, suspected faulty lines can be identified by leveraging the variation characteristics of the zero-sequence voltage on each line’s bus subsequent to a fault [19]. This is because, upon the occurrence of a fault, the positive-sequence voltage at the bus of the faulty line diminishes, while its zero-sequence and negative-sequence voltages rise correspondingly. Based on this principle, the startup criterion for the slave station can be derived, as exemplified by Equation (1).
( U B 1 0.5 U N ) ( U B 2 0.1 U N ) ( U B 0 0.1 U N )
where U B 1 , U B 2 , U B 0 , U N represent the magnitudes of the positive-sequence, negative-sequence, and zero-sequence voltages of the bus before and after the fault, respectively.
This paper sorts the positive-sequence voltages of all buses satisfying the startup criterion in ascending order and the negative (zero)-sequence voltages in descending order. It takes the union of the top three in these rankings as the final suspected faulty buses, and the lines connecting these suspected faulty buses are the screened suspected faulty lines.

3. Protection Algorithm Based on Confidence Weighting and Collision Adaptation

3.1. Construct a Basic Probability Function

Upon the occurrence of a fault, the main protection and Zone I of distance protection operate instantaneously. If they function correctly, the fault will be cleared promptly, rendering wide-area protection unnecessary. However, if the transmitted information is lost or erroneous, such data could introduce negative interference and increase communication load. Therefore, this paper only utilizes the information from Zone II and Zone III of distance protection as the switching state variables.
Therefore, the information collected in this paper is as follows: ① electrical quantity information, that is, the amount of zero sequence fault charge and the amount of phase difference current charge on both sides of the suspected fault line and ② the protection element status information, that is, the starting information of the distance protection section II and section III. Specifically, as shown in Figure 2.
In Figure 2, the protection information domain of the fault line L3 is as follows: (1) the electrical quantities on both sides of the line; (2) 5, 6 distance protection section II and section III of the line L3; and (3) the distance protection section II and section III of the adjacent lines 1, 3, and 8 in the positive direction.

3.1.1. Fundamental Probability Function of the Polarity of the Zero-Sequence Current Charge

Considering the maximum probability of grounding fault in the line, the basic probability function of zero sequence current charge polarity is constructed based on the same direction of zero sequence current on both sides of the fault line and the opposite direction on both sides of the normal line.
According to the definition of fault charge in [20], this paper defines the integral value of zero-sequence fault current in a period of time as zero-sequence fault charge as follows:
Q = t 1 t 1 + T 2 i 0 ( t ) d t = i s u m Δ t
where i 0 ( t ) is the zero-sequence fault component current. i s u m is the cumulative value of samples of the fault current within T 2 time. Δ t is the sampling interval.
If an internal fault occurs, the polarities of the zero-sequence fault charge quantities on both sides of the line within half a cycle should be the same; for an external fault, they should be opposite.
ρ 1 = 1 + s i g n ( Q m ) · s i g n ( Q n ) 2
where s i g n ( Q m ) and s i g n ( Q n ) are the polarities of the zero-sequence fault charge quantities on both sides of the line, respectively. Therefore, if ρ 1 = 1, it indicates an internal fault; if ρ 1 = 0, it indicates an external fault. Considering a certain degree of information fault tolerance, ρ 1 = 0.5 when the zero-sequence charge quantity on one side is lost.
Therefore, define the basic probability assignment function for the polarity of zero-sequence fault charge quantity P 1 as follows:
P 1 = ρ 1

3.1.2. The Basic Probability Function of Charge Polarity of Phase Difference Current

When the system does not detect the zero-sequence current fault charge quantity, it indicates that a phase-to-phase fault has occurred. Therefore, the polarity of the phase-difference current is constructed: in the case of an internal fault, the differential currents at both ends have the same polarity; in the case of an external fault, the differential currents at both ends have opposite polarities.
Define the phase-difference current charge quantity as shown in Equation (5) as follows:
Q m x y = t 1 t 1 + T 2 ( i x ( t ) i y ( t ) ) d t Q n x y = t 1 t 1 + T 2 ( i x ( t ) i y ( t ) ) d t
where Q m x y and Q n x y denote the phase-difference charge quantities at both ends of the line, respectively, where xy represents ab, bc, and ca, respectively.
Similarly, according to Equation (3) defined as follows:
ρ x y = 1 + s i g n ( Q m x y ) · s i g n ( Q n x y ) 2
Accordingly, if ρ x y = 1 , it indicates an internal fault; if ρ x y = 0 , it signifies an external fault. Accounting for a certain degree of information fault tolerance, ρ x y = 0.5 when the phase—difference charge quantity on one side is missing. Since calculations are carried out for the three phase pairs (ab, bc, ca) and the maximum value among these three computations is adopted, the basic probability assignment function for the polarity of the phase—difference current charge quantity, denoted as P 2 , is defined as follows:
P 2 = m a x { ρ a b , ρ b c , ρ c a }
In this paper, the basic probability assignment function for the polarity of the phase-difference current charge quantity and that for the polarity of the zero-sequence fault charge quantity do not participate in the subsequent fusion process simultaneously.

3.1.3. The Basic Probability Function of the Starting Information of the Distance II and III of This Line

In this paper, the start-up signals of the distance II and III protection at both ends of the suspected fault line are collected, and the fault correlation coefficient C w of the line is set.
C w = a ( B I I + B I I ) + b ( B I I I + B I I I )
where B I I and B I I I represent the activation information of Zone II and Zone III of distance protection on one end of the line; B I I and B I I I represent the activation information of Zone II and Zone III of distance protection on the other end; a and b are the weight coefficients for Zone II and Zone III, respectively.
It is considered that the probability of a fault occurring at each point is the same in [21,22]. The reach of distance protection Zone II can be extended to 25% of the next-level line after the branch coefficient is taken into account, and the reach of distance protection Zone III can be extended to 100% of the next-level line. Thus, the weights a and b can be set as 0.8 and 0.5, respectively. At this point, the correlation coefficient is expressed as follows:
C w = 0.8 ( B I I + B I I ) + 0.5 ( B I I I + B I I I )
The threshold value of the fault correlation coefficient for the line in this paper is determined with reference to [17], which is calculated as the average value of the fault correlation coefficient C w when faults occur at the line head, mid-point, and line end. When faults occur at the line head, mid-point, or line end, both Zone II and Zone III of the line’s distance protection will be activated, with all activation signals being 1. Therefore, the fault correlation coefficient C w in all three cases is ((0.8 + 0.8) + (0.5 + 0.5) = 2.6) and, thus, the threshold value is set to 2.6.
Thus, the basic probability assignment function for Distance Protection Zone II and Zone III of this line, denoted as P 3 as follows:
P 3 = C w 2.6
where C w is the fault correlation coefficient of the distance II and III protection of the line. 2.6 is the threshold value of the fault correlation coefficient of the line. When it is greater than the threshold value, the fault of the line can be judged. Equations (9) and (10) in this paper are only used for calculating the fault correlation coefficient of the distance protection for the current line, and they have an independent relationship with Equations (11) and (12) presented later in the paper.

3.1.4. The Basic Probability Function of the Positive Adjacent Line Distance II and III Initiation Information

A failure of the master station will cause the wide-area protection system to lose central In this paper, the starting signal of the protection of the II and III sections of the distance between the adjacent positive direction adjacent lines at both ends of the suspected fault line is collected, and the positive direction adjacent line fault correlation coefficient C v is set to represent the positive direction adjacent line distance protection. The discriminant result of the line fault or not, the calculation expression is expressed as Equation (11).
C v = 0.2 B x I I + 0.5 B x I I I
where B x I I and B x I I I are the activation information of Zone II and Zone III distance protection of adjacent lines in the positive direction.
The fault correlation coefficient of adjacent lines in the positive direction reflects the judgment result of the distance protection activation signal of adjacent lines on the suspected faulty line. Assuming the number of adjacent lines in the positive direction is x , its setting value is determined with reference to [15] and set to (0.63×).
Thus, the basic probability assignment function for Zone II and Zone III distance protection of adjacent lines in the positive direction, denoted as P 4 as follows:
P 4 = C v 0.63 x
where C v is the positive direction adjacent line fault correlation coefficient. 0.63 x is the threshold value of the fault correlation coefficient of the adjacent line in the positive direction. When it is greater than the threshold value, the fault of the line can be judged. x represents the number of positive adjacent lines.

3.2. Confidence Weighting and Consistency Analysis

3.2.1. Standardized Information Entropy

The information entropy proposed by Deng Yong measures the uncertainty of evidence in [23]. When the value of the basic probability function is close to 0.5, the entropy is maximum (with the highest uncertainty); when it is close to 0 or 1, the entropy is minimum (with the highest certainty).
Using Equation (13), calculate the entropy value of the basic probability function itself as follows:
H i = p i log 2 p i + ( 1 p i ) log 2 ( 1 p i )
where H i is the information entropy. p i is the basic probability function.

3.2.2. Confidence Mapping

The confidence level is obtained by subtracting the entropy value from 1. In this way, the confidence level is inversely proportional to the entropy value; that is, the larger the entropy, the lower the confidence level.
C i = 1 H i
where C i is the confidence level of the basic probability function p i .

3.2.3. Similarity Calculation

In the multi-source information fusion of wide-area protection, the consistency analysis of basic probability function is the core link to detect the degree of conflict between multi-source criteria. The process is based on the Gaussian similarity theory and is realized by Equation (15).
S i j = exp ( p i p j ) 2 2 σ 2
where S i j is the similarity between basic probability functions; in this paper. σ is the scale parameter. This paper takes 0.316. When p i and p j are closer, S i j is higher (close to 1); the greater the difference between them, the lower the similarity (close to 0).

3.2.4. Conformance Assessment

In the wide-area protection multi-source information fusion system, consistency evaluation is a key link in quantifying the degree of similarity between a single basic probability function and the whole. This calculation process is based on the similarity matrix and is realized through the following Equation (16).
R i = 1 n 1 j i S i j
where R i is the coefficient of consistency between the i th basic probability function and all other probability functions, that is, the average value of its similarity to the other probability functions. n is the total number of basic probability functions. Equation (16) is to evaluate the compatibility of a single probability function with the whole. The probability function with high consistency is more reliable and should be given higher weight in fusion.

3.2.5. Comprehensive Evaluation and Weight Allocation

By integrating the aforementioned confidence evaluation and consistency analysis, the comprehensive evaluation coefficient of the basic probability function p i is obtained as follows:
T i = 0.6 C i + 0.4 R i
where T i is the comprehensive evaluation coefficient of the i th evidence, which combines its confidence and consistency. Evidence with high confidence and good consistency has a higher basic probability function and a higher comprehensive evaluation coefficient. Its purpose is to comprehensively evaluate the reliability of evidence and avoid relying solely on a single indicator.
By dividing the comprehensive evaluation coefficient of a single basic probability function by the sum of the comprehensive evaluation coefficients of all basic probability functions, the total weight is ensured to be 1, and Equation (19) is obtained. Its purpose is to dynamically allocate weights so that reliable evidence dominates decision-making.
W i = T i k = 1 n T k
where W i is the fusion weight value of the i th probability function. T i is the composite score of the i th probability function.

3.3. Conflict Adaptive Factors

Define the conflict factor, and dynamically adjust the fusion strategy according to the degree of conflict between basic probability functions in the system.
K = 1 n ( n 1 ) i < j 1 S i j
where K is the conflict factor; n is the number of basic probability functions.
Depending on the differences in conflict factors, different combinations of coefficients are formed, which are used in the final fusion process. When the conflict degree between multi-source criteria is low (such as the polarity criterion of zero-sequence current charge and the starting criterion of distance protection are clearly directed to the fault line, and the conflict factor K < 0.1), it indicates that the information consistency is high. At this time, the coefficient combination of (0.9,0.1) is adopted, and the fusion result obtained by confidence weighting is preferentially trusted. When the degree of conflict is moderate (0.1 ≤ K < 0.3), it means that some criteria are uncertain (such as the loss of single electrical quantity information leading to the ambiguity of criterion output). It is necessary to reduce the proportion of weighted results and improve the influence of high-confidence correction results by a (0.7,0.3) coefficient combination to balance the information conflict. When the degree of conflict is high (K ≥ 0.3) (such as when protection misoperation and information loss occur at the same time, the conclusion of multi-source criterion is significantly different), the coefficient combination of (0.5,0.5) is adopted so that the weighted results and the corrected results are equally involved in the fusion so as to avoid misjudgment caused by a single information source leading decision-making.
( α , β ) = ( 0.9 , 0.1 ) ,   K 0.1 ( 0.7 , 0.3 ) ,   0.1 K ( 0.5 , 0.5 ) ,   0.3 K 0.3
where α and β are the weight values for the subsequent final fusion.

3.4. Converged Decision-Making

(1) Weighted average: Weightedly fuse each basic probability function using the weights obtained from Equation (18). The purpose is to initially fuse all the evidence to obtain the overall failure probability.
P w = i = 1 n W i p i
where W i is the fusion weight value of the i th probability function. P w is the weighted average fault probability value of fusion decision.
(2) High-confidence correction: Based on the confidence obtained from Equation (14), correct the probability functions for which the high confidence is greater than 0.8 and the basic probability function is greater than 0.05 (to avoid interference from zero probabilities). The purpose is to give priority to relying on high-confidence evidence when there is a large conflict and avoid the influence of unreliable evidence.
P h = C i > 0.8 W i p i C i > 0.8 W i
where P h is the fault probability value of high confidence correction of fusion decision. C i > 0.8 W i p i is a weighted probability value with confidence greater than 0.8 and its own probability value greater than 0.05.
If there is no high confidence in the basic probability functions, weighted fusion is also adopted.
Combining the coefficients obtained from Equation (20) with Equation (21) and Equation (22), the fault probability function is obtained.
P f = α P w + β P h
where P f is the fault probability value of the final output after weighted average and high confidence correction.
After many simulation experiments, it can be concluded that when the suspected fault line is calculated by Equation (23) P f > 0.78, it can be judged as a fault line.

4. Wide-Area Protection Algorithm Flow

The process of the wide-area protection algorithm aims to achieve accurate identification of faulty lines through the coordinated operation between substations and the master station. It is based on screening suspected faulty lines and combines multi-source information fusion with intelligent decision-making. Figure 3 presents the flowchart of the algorithm in this paper. The specific process is as follows:
(1) Sub-station process
After the initial screening of the suspected fault line fault, the substation selects the suspected fault bus by sorting the sequence voltage of the bus satisfying the start criterion of Equation (1) and uploads the electrical quantity and protection start quantity information of the suspected fault line between the suspected buses.
(2) Main station process
(a) Data preprocessing, forming the basic probability function, obtaining the electrical quantity information and protection start-up information on both sides of the suspected fault line, preprocessing the relevant data, forming the basic probability function of zero sequence charge polarity, the basic probability function of phase difference current charge polarity, the basic probability function of distance protection information of this line, and the basic probability function of distance protection information of a square first adjacent line.
(b) The fault line is identified, and the basic probability function obtained above is fused to output the comprehensive value of the line fault probability. When P f > 0.78, it is judged to be a fault line.

5. Simulation Analysis

In order to verify the effectiveness of the algorithm, this paper uses the IEEE Standard 10-machine 39-bus system. The line voltage level is 330 kV. The simulation is carried out in PSCAD4.6.2, and the algorithm is programmed by MATLAB2024a. As shown in Figure 4, the red area is the research region of this paper. A fault is set to occur at 0.3 s at the 12.5% ( K 1 ), 50% ( K 2 ), and 87.5% ( K 3 ) positions of transmission line L 3 near bus B 3 .

5.1. Protection Performance Analysis Under Different Fault Locations and Fault Types

To verify the effectiveness of the proposed algorithm, single-phase metallic grounding faults and interphase faults occur, respectively, at different positions of K 1 - K 3 . The reference voltage of the bus is 345 kV, and the sequence voltage results of the buses within the region are shown in Table 1 and Table 2.
The bus sequence voltage data in Table 1 and Table 2 clearly show the differential variation law of bus sequence voltage after fault, which provides direct data support for the subsequent screening of suspected fault lines. In the metal grounding fault scenario, the positive sequence voltage U + of the fault line-associated bus (such as the target bus corresponding to the fault location K 1 , K 2 , K 3 ) is significantly reduced (as low as 120.41 kV), while the negative sequence voltage U and zero sequence voltage U 0 are significantly increased (up to 67.06 kV), which is completely consistent with the theoretical variation characteristics of the lower sequence component of the grounding fault-grounding fault will destroy the symmetry of the system, resulting in negative sequence and zero sequence components. The closer the fault point is to the bus, the more significant the sequence voltage changes. In the phase-to-phase fault scenario, since there is no zero-sequence component in the phase-to-phase fault, the zero-sequence voltage of all buses is 0, and the negative-sequence voltage (up to 66.12 kV) fluctuates regularly with the change in fault location. The downward trend of positive-sequence voltage (as low as 101.81 kV) is consistent with that of ground fault. However, the change range is slightly different due to the difference in fault type. The sequence voltage data of the two types of faults verify the core premise that the sequence voltage characteristics of the bus after the fault can be used as the basis for the screening of suspected faults, which lays a reliable data foundation for the subsequent locking of suspected fault buses and lines by sequence voltage sorting.
The screening results of suspected fault lines in Table 3 and Table 4 directly prove the effectiveness and practicability of the screening method based on ‘sequence voltage sorting’. From the results, it can be seen that whether the fault type is ground fault or phase-to-phase fault, whether the fault location is at the head end K 1 , middle end K 2 or end K 3 of the line, the selected suspected fault line set contains the actual fault line L 3 , and the number of suspected lines is controlled within 2–3. The value of this result lies in the following: on the one hand, through the sequence voltage sorting (positive sequence voltage ascending sequence, negative/zero sequence voltage descending sequence, taking the top three buses and related lines), the lines that may be involved in the fault are accurately locked, and the blind analysis of all lines in the whole network is avoided; on the other hand, the number of suspected lines is controlled in a small range (not the whole network line), which reduces the amount of information for subsequent data processing and communication transmission of the master station. The master station only needs to receive the electrical quantity and protection start-up information of the suspected line and does not need to process the whole network line data, which directly reduces the communication load of the wide-area protection system, which is in line with the core goal of the paper, ‘reducing communication traffic’. At the same time, the consistency of the screening results under the two types of fault scenarios also proves that the screening method is not affected by the fault type and fault location and has good versatility.
Perform algorithmic judgment on each suspected faulty line screened out under different fault types and different fault locations. The judgment results are shown in Table 5 and Table 6 below.
The judgment results of single-phase metal grounding fault in Table 5 fully verify the accuracy and fault discrimination ability of the proposed algorithm in typical grounding fault scenarios. It can be seen from the data that for the actual fault line L 3 , at the fault location K 1 , K 2 , K 3 , the final calculated fault probability P f is 0.9874, 0.9734, and 0.9874, respectively, which is much higher than the set fault determination threshold (0.78), and the value is stable above 0.97, indicating that the algorithm can give clear and reliable fault determination results for grounding faults at different locations. For non-fault lines, the fault probability is lower than 0.22, far lower than the threshold, and the value is stable at a low level, without the risk of misjudgment. The overall results show that the proposed algorithm can accurately distinguish the fault line from the non-fault line in the grounding fault scenario and is not affected by the change in the fault location, and the core discrimination performance is stable and reliable.
Table 6 verifies the applicability and discrimination accuracy of the algorithm in the non-grounded fault scenario for the judgment results of phase-to-phase faults. Different from the ground fault, the phase-to-phase fault has no zero-sequence component. Therefore, the table annotation clarifies that the zero-sequence current charge polarity basic probability function does not participate in the fusion. This logic adjustment fully conforms to the electrical characteristics of the phase-to-phase fault, reflecting the flexibility of the algorithm criterion selection. From the results, the fault probability P f of the actual fault line L 3 at the fault location K 1 , K 2 and K 3 is above 0.97 (0.9874, 0.9734, 0.9874), which is more than the judgment threshold of 0.78, and the numerical fluctuation is very small, indicating that the algorithm has high stability for the identification of phase-to-phase faults. The fault probability of the non-fault line is lower than 0.22, and there is no misjudgment. This result proves that the algorithm can adaptively select the matching criterion combination according to the fault type and still maintain accurate fault line identification ability in the phase-to-phase fault scenario, which further verifies the versatility and reliability of the algorithm.

5.2. Fault Tolerance Analysis of Protection Algorithms

(1) Taking the phase A metallic ground fault of L 3 at position K 1 as an example, the fault-tolerant performance of protection under information loss is verified. The suspected faulty lines are L 3 and L 20 .
Case 1: The zero-sequence current charge quantity on the side of L 3 close to B 3 is lost, and the distance section II of the IED2 device close to B 4 is lost;
Case 2: The zero-sequence current charge quantity on the side of L 20 close to B 3 is lost, and both distance sections II and III of IED7 on the side close to B 18 are lost.
In Table 7, the fault tolerance ability of the algorithm is verified in two extreme scenarios of ‘partial loss of electrical quantity and switching quantity’ under the background of phase A metallic ground fault. In the normal scenario, the fault probability of the fault line L 3 is 0.9874, the non-fault line is 0.2121, and the discrimination result is clear. In the scenarios of Case1 L 3 near B 3 side zero-sequence current charge loss, near B 4 side IED2 distance II segment loss) and Case2 L 3 near B 3 side zero-sequence current charge loss, near B 18 side IED7 distance II/III segment loss), the fault probability of the fault line L 3 is 0.8029 and 0.9838, respectively, which are higher than the threshold of 0.78, and can still be accurately determined as the fault line; the fault probability of the non-fault line is reduced to 0.0883 and 0.2121, respectively, and there is no risk of misjudgment. The reason for this result is that the algorithm dynamically allocates weights through the “confidence-consistency” two-dimensional evaluation. When some information is lost, the confidence of the basic probability function corresponding to the lost information is reduced, and the fusion weight is automatically reduced. The weight of other complete information (such as the distance protection information of adjacent lines) is increased accordingly, and the influence of lost information is offset by the complementarity of multi-source information. The results fully prove that the algorithm can still maintain high fault discrimination accuracy and has good fault tolerance performance in some information loss scenarios.
(2) Take the AB phase-to-phase short circuit of L 3 at position K 3 as an example. Since the basic probability P 2 takes the maximum value of the polarity of the differential charge quantity for three times (ab, bc, ca), losing any 1 or 2 differential current charge quantities will not affect the accurate judgment of P 2 . For the faulty line, consider the loss of more than 3 differential charge quantities under extreme environments; for the normal line, it is sufficient to consider the loss of any one differential current charge quantity.
Case 1: For L 3 , the differential charge quantities of ab, bc, and ca on the side close to B3 are lost, and the distance section III signal of IED1 on the side close to B 3 is lost;
Case 2: For L 4 , one differential current charge quantity on the side close to B 4 is lost, and the distance section II and III signals of IED6 on the side close to B 5 are lost.
Taking the AB phase-to-phase short-circuit fault as the background, Table 8 further verifies the fault tolerance of the algorithm in the scenario of ‘partial loss of electrical quantity (phase difference current charge) and distance protection’, and designs a more realistic loss scenario for the criterion characteristics of phase-to-phase fault. In the normal scenario, the fault probability of the fault line L 3 is 0.9874, which is accurate. In the extreme scenario of Case1 L 3 near B 3 side ab/bc/ca phase difference charge loss, near B 3 side IED1 distance III loss), because the algorithm adopts the calculation logic of ‘taking the three-phase maximum’ for the phase difference current charge (Equation (7)), even if the three-phase difference charge is all lost, the criterion failure is avoided by setting the fault-tolerant mechanism with the basic probability of 0.5 when lost. At the same time, the weight of other complete information (such as the distance of this line to section III and the distance protection of adjacent lines) is increased, and finally the fault probability of the fault line L 3 is reduced to 0.8585 (still higher than the threshold), and the non-fault line is reduced to 0.1633. In Case2 L 3 near B 4 side 1 phase charge loss, near B 5 side IED6 distance II/III segment loss) scenario, the probability of a fault line is 0.9838, which is close to the normal scene level. The results show that the algorithm designs a special fault-tolerant mechanism for the criterion characteristics of phase-to-phase faults (taking the maximum value of phase difference charge and setting the fault-tolerant value when it is lost). Even in the extreme scenario where multiple types of information are lost at the same time, the algorithm can still ensure the accurate identification of fault lines through multi-source information complementation and dynamic weight distribution, which further verifies the fault-tolerant ability of the algorithm in the scenario where phase-to-phase fault information is lost.
(3) Taking the phase A metallic grounding fault of L 3 at position K 2 as an example, verify the fault tolerance performance of the protection when the distance protection zones II and III at both ends of the L 3 line refuse to operate successively. Numbers 1 to 4, respectively, represent: the refusal of distance protection zone II to operate on the side of L 3 close to B 3 ; the refusal of distance protection zones II and III to operate on the side of L 3 close to B 3 ; the refusal of distance protection zones II and III to operate on the side of L 3 close to B 3 and the refusal of distance protection zone II to operate on the side close to B 4 ; and the refusal of distance protection zones II and III to operate at both ends of L 3 . The judgment results are shown in Table 9.
Table 9 takes the A-phase grounding fault as the background, and aims at the four extreme scenarios of “the fault line L 3 is successively rejected from the II/III section at both ends of the fault line L 3 ” (from single-ended single-segment rejection to double-segment rejection at both ends). The fault-tolerant ability of the algorithm for serious abnormal conditions such as “protection rejection” is verified. From the results, it can be seen that with the increase in the degree of rejection (Scenario 1 to Scenario 4), the fault probability of the fault line L 3 gradually decreases from 0.9381 to 0.7954, but it is always higher than the threshold of 0.78, which can still be accurately determined as the fault line; the fault probability of the non-fault line is gradually reduced from 0.2121 to 0.0099, and the discrimination result is clearer.
The key to this result is that when the distance protection refuses to operate, the consistency evaluation coefficient of the corresponding basic probability functions ( P 3 , P 4 ) decreases (the matching degree with other criteria decreases), and the fusion weight automatically decreases, while the weight of electrical quantity information (such as zero-sequence current charge polarity, which is not lost at this time) is significantly improved—zero-sequence current charge polarity is the core criterion of grounding fault. Even without the support of distance protection information, it can still dominate the fusion decision through its own high confidence. Especially in the most extreme case of scenario 4 (the distance between the two ends of the II/III section is completely rejected), the fault probability is only reduced to 0.7954, which is only 0.0154 higher than the threshold. It is just proved that the algorithm can still rely on the complementarity of electrical quantity information to realize fault discrimination when the protection is completely failed, which fully verifies the fault tolerance of the algorithm for the protection rejection scenario.
(4) According to the fault scenario of the above (3), the fault tolerance of the protection is verified when the distances II and III in the non-positive direction of the L20 line are mistakenly operated in turn. 1~2 represent the maloperation of distance II and III, respectively. The judgment results are shown in Table 10.
Table 10 takes the A-phase ground fault as the background and verifies the anti-interference ability of the algorithm for the two types of scenarios of ‘non-fault line L 20 non-positive direction distance II/III section mis-operation in turn’. The core risk of protection misoperation is that the misoperation signal will simulate the fault characteristics, which may cause the non-fault line to be misjudged as the fault line. From the results, in scenario 1 L 20 non-positive direction distance II section misoperation) and scenario 2 L 20 non-positive direction distance II/III section misoperation) the fault probability of the fault line L 3 is always stable at 0.9734, without any fluctuation, indicating that the misoperation signal does not interfere with the identification of the fault line. The fault probability of the non-fault line L 20 increases from 0.2942 to 0.7550. Although there is a significant increase, it is still lower than the threshold of 0.78 and is not misjudged as a fault line. The results show that the algorithm can effectively identify and suppress the interference of the protection misoperation signal and avoid the misjudgment of non-fault lines.

5.3. Robustness Analysis of Protection Algorithm

5.3.1. Noise Interference Analysis

In the actual operation scenario of the power system, the electrical quantity acquisition link is susceptible to factors such as equipment accuracy deviation and electromagnetic environment disturbance, resulting in noise interference, which may lead to distortion of the input information of the protection criterion, thereby affecting the accuracy of fault identification. Taking the metal fault of L 3 at K 2 position as an example, the noise interference of 15 dB and 25 dB is set, respectively, to verify the reliability of the protection algorithm when the electrical quantity information is disturbed by noise. The specific results are shown in Table 11 and Table 12.
The results of Table 11 and Table 12 show that although the value of zero-sequence charge (such as Q L 3 m , Q L 3 n , Q L 20 m , Q L 20 n ) of fault line L 3 and non-fault line L 20 fluctuates to a certain extent under different intensity noise interference, the corresponding polarity criterion (such as the basic probability function m1m1 of zero-sequence charge polarity) does not flip, and can still correctly reflect the fault characteristics. This shows that the charge polarity criterion constructed in this paper has a certain noise tolerance ability, and it is not easy to misjudge due to small fluctuations in electrical quantities. More importantly, under the multi-source information fusion framework, even if individual electrical quantities are biased due to noise interference, the system can still dynamically evaluate the confidence and consistency of each criterion through standardized information entropy and Gaussian similarity and automatically reduce the fusion weight of unreliable information, thereby maintaining the stability of the overall decision. Therefore, although the charge value changes, the final fault probability output of the algorithm remains stable, which further verifies its strong robustness and practicability in noisy environments.

5.3.2. Data Packet Loss Analysis

In order to verify the reliability of the algorithm in the scenario of data packet loss caused by communication network congestion or network attack, taking the metal grounding fault of L 3 at K 2 position as an example, the data packet loss rates of 10% and 20% are set, respectively, for testing. As shown in Figure 5 and Figure 6, the signal diagram after the loss of electrical data packets at both ends of L 3 and L 20 .
Figure 5 (10% loss rate) and Figure 6 (20% loss rate) show the waveform changes in electrical quantities at both ends of L 3 and L 20 lines after packet loss. It can be seen in the diagram—the normal waveform is continuous and complete, and the waveform appears to have breakpoints or missing segments after loss. Even if the data packet is lost, the polarity characteristics of the charge (such as the positive and negative directions) do not flip, indicating that the charge polarity criterion has a certain tolerance for data loss. The waveform diagram intuitively reflects the actual situation of data loss and provides a real input scene for subsequent algorithm processing.
The algorithm is verified based on the above packet loss situation, and the results are shown in Table 13 and Table 14 below.
Table 13 (fault line L 3 ) and Table 14 (non-fault line L 20 ) compare the fault probability P f under normal, 10% loss, and 20% loss conditions. For L 3 line: under normal, 10% loss and 20% loss, P f is always 0.9734, which is much higher than the threshold of 0.78, which can accurately determine the fault line. For L 20 line: P f is kept at 0.2121, far below the threshold, and there is no risk of misjudgment. The packet loss does not affect the final fault identification result, indicating that the algorithm is robust. Even if the charge value fluctuates (such as the zero-sequence charge of L 3 decreases from 1.8726 C to 1.4704 C), its polarity does not change, and the basic probability function P 1 can still correctly reflect the fault characteristics.

5.4. Comparative Analysis with Other Methods

Taking the A-phase metal grounding at the K 1 position of L 3 as an example.
Case 1: The distance protection amount in the IED device on both sides of L 3 is lost.
Case 2: The distance protection in IED1 near B 3 side of L 3 is lost and the distance II section of IED8 near B 18 of L 20 is malfunctioned.
In these two cases, the performance comparison between the proposed algorithm and the improved evidence theory in Reference [17] is verified. The verification results are shown in the following Figure 7 and Figure 8.
From the comparison results, in the three cases of normal, Case 1 and Case 2, the fault probability pf calculated by the algorithm proposed in this paper is better than the result of the improved evidence theory in [17]. Under normal conditions, the P f of the algorithm in this paper is close to 1, and the P f of the algorithm in the literature [17] is also higher, but the algorithm in this paper is closer to the ideal fault probability value; in the case of Case 1 and Case 2, which have the disadvantage of loss or misoperation of distance protection, the algorithm in this paper has a smaller decrease in the fault probability of fault line L3 than that in [17]. Compared with the non-fault line L 20 , the fault probability of the algorithm in this paper still maintains a low level in the case of information loss, and the fault tolerance rate is higher than that of the [17,18,19,20,21,22,23] algorithm.

6. Conclusions

Aiming at the low fault tolerance and large communication traffic of the existing wide-area protection algorithm, this paper proposes a new wide-area backup protection algorithm based on confidence weighting and conflict adaptation. Through theoretical analysis and simulation verification, the following conclusions can be drawn:
(1) The mechanism of screening suspected fault lines through sequence voltage ranking allows the substation to upload only the electrical quantities and protection activation information of the suspected lines, rather than all line data within the protection zone, thereby reducing communication traffic. However, this screening approach relies on the significant variation characteristics of bus sequence voltage after a fault. In the presence of severe harmonic interference or sudden bus load changes in the grid, the sequence voltage characteristics may become indistinct, affecting the accuracy of suspected line screening. Further optimization incorporating filtering algorithms or load correction models is therefore necessary.
(2) Four basic probability assignment functions are constructed based on the polarity of zero-sequence current variation, phase-current variation, and the activation of Section II/III distance protection for both the local line and its adjacent lines. This forms a multi-dimensional criterion system covering ground faults and phase-to-phase faults. In typical fault scenarios such as single-phase metallic grounding and AB phase-to-phase short circuits, the system provides an effective basis for fault identification. However, performance under practical conditions—such as communication delays and high renewable energy penetration—has not yet been validated. Subsequent research will expand the study to enhance the applicability of the findings in real engineering scenarios.
(3) This paper enhances the contribution of high-reliability information in fusion decision-making by introducing standardized information entropy to quantify the confidence level of criteria and combining Gaussian similarity to analyze the dynamic weight allocation mechanism for information consistency. The designed conflict adaptive factor can adjust the fusion strategy adaptively based on the degree of information conflict, ensuring accurate fault line identification even in simulation scenarios such as “partial electrical quantity loss” and “distance protection rejection/misoperation.” However, it should be noted that the robustness verification of the current algorithm is limited to the radial grid topology of the IEEE 39-node system and does not involve complex grid structures incorporating multi-terminal flexible DC and high penetration of renewable energy. Additionally, the simulation does not account for extreme cases where communication link delays exceed 100 ms. In such scenarios, reduced synchronization of multi-source information may affect the fusion decision-making performance. Future work should further expand the algorithm’s adaptability to complex grid topologies and incorporate a communication delay compensation mechanism to improve its scalability.

Author Contributions

Conceptualization, Z.L.; methodology, W.H.; validation, B.T.; formal analysis, G.H.; investigation, F.C.; data curation, X.L.; writing—original draft preparation, S.W.; writing—review and editing, Y.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Science and Technology Project of State Grid Henan Electric Power Company, grant number 521702250006. And The APC was funded by Science and Technology Project of State Grid Henan Electric Power Company.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Acknowledgments

We would like to thank the editor and the anonymous reviewers for their valuable feedback. We also appreciate the contributions of everyone who supported this research.

Conflicts of Interest

The authors Zhen Liu, Wei Han, Gaofeng Hao, Fengqing Cui and Xiaoyu Li were employed by State Grid Henan Electric Power Research Institute. The author Baojiang Tian was employed by the State Grid Henan Electric Power Company. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. Neyestanaki, M.K.; Ranjbar, A.M. An adaptive PMU-based wide area backup protection scheme for power transmission lines. IEEE Trans. Smart Grid 2015, 6, 1550–1559. [Google Scholar] [CrossRef]
  2. Mohsenian-Rad, H.; Kezunovic, M.; Rahmatian, F. Synchro-Waveforms in Wide-Area Monitoring, Control, and Protection: Real-World Examples and Future Opportunities. IEEE Power Energy Mag. 2025, 23, 69–80. [Google Scholar] [CrossRef]
  3. Sarmin, M.K.N.M.; Saadun, N.; Azmi, M.T.; Abdullah, S.K.S.; Yusuf, N.S.N.; Zamani, A.Z.M.; Vaiman, M.; Vaiman, M.; Povolotskiy, M.; Karpoukhin, M. Revolutionizing the Grid of the Future with a Wide-Area Monitoring and Control System: Phasor Measurement Unit Applications in Grid Control, Protection, and Event Analysis at Tenaga Nasional Berhad. IEEE Power Energy Mag. 2025, 23, 47–58. [Google Scholar] [CrossRef]
  4. Vahidi, S.; Ghafouri, M.; Au, M.; Kassouf, M.; Mohammadi, A.; Debbabi, M. Security of wide-area monitoring, protection, and control(WAMPAC)systems of the smart grid: A survey on challenges and opportunities. IEEE Commun. Surv. Tutor. 2023, 25, 1294–1335. [Google Scholar] [CrossRef]
  5. Tong, X.; Wang, X.; Wang, R.; Huang, F.; Dong, X.; Hopkinson, K.M.; Song, G. The Study of a Regional Decentralized Peer-to-Peer Negotiation-Based Wide-Area Backup Protection Multi-Agent System. IEEE Trans. Smart Grid 2013, 4, 1197–1206. [Google Scholar] [CrossRef]
  6. Ma, J.; Liu, C.; Thorp, J.S. A wide-area backup protection algorithm based on distance protection fitting factor. IEEE Trans. Power Deliv. 2015, 31, 2196–2205. [Google Scholar] [CrossRef]
  7. Zhang, G.; Tong, X.; Hong, Q.; Lu, X.; Booth, C.D. A novel fault isolation scheme in power system with dynamic topology using wide-area information. IEEE Trans. Ind. Inform. 2021, 18, 2399–2410. [Google Scholar] [CrossRef]
  8. Li, Z.; Yin, X.; Zhang, Z. Research on Wide-area Protection System Based on Multi-Agent. Power Syst. Prot. Control 2012, 40, 71–75. [Google Scholar]
  9. Harish, A.; Prince, A.; Jayan, M.V. Fault detection and classification for wide area backup protection of power transmission lines using weighted extreme learning machine. IEEE Access 2022, 10, 82407–82417. [Google Scholar] [CrossRef]
  10. Sharafi, A.; Sanaye-Pasand, M.; Aminifar, F. Transmission system wide-area back-up protection using current phasor measurements. Int. J. Electr. Power Energy Syst. 2017, 92, 93–103. [Google Scholar] [CrossRef]
  11. Jin, N.; Lin, X.; Xing, J.; Li, Z.; Liu, S.; Chen, L.; Ma, X.; Rong, Z.; Tong, N. Research on multiterminal current differential protection criterion with high sensitivity and synchronization error tolerance capability. IEEE Trans. Power Deliv. 2018, 33, 3085–3094. [Google Scholar] [CrossRef]
  12. Li, Z.; Wang, Z.; Liu, Y.; Tan, C.; Weng, H. The principle and implementation of current differential protection based on shaping transform capacity reduction. Power Syst. Prot. Control 2022, 50, 77–85. (In Chinese) [Google Scholar]
  13. Samantaray, S.R. A differential voltage-based wide-area backup protection scheme for transmission network. IEEE Syst. J. 2021, 16, 520–530. [Google Scholar]
  14. Chang, J.N.; Song, G. An Adaptive Coordinated Wide-Area Backup Protection Algorithm for Network Topology Variability. IEEE Trans. Power Deliv. 2024, 39, 958–969. [Google Scholar] [CrossRef]
  15. Liu, J.; Zhang, K.; Tian, Q.; Huang, S.L. Wide area backup protection algorithm based on grey correlation analysis of sequence current and multi-information fusion. Power Syst. Prot. Control 2018, 46, 19–25. [Google Scholar]
  16. He, R.; Yang, S.; Deng, J.; Feng, T.; Lai, L.L.; Shahidehpour, M. Reliability analyses of wide-area protection system considering cyber-physical system constraints. IEEE Trans. Smart Grid 2021, 12, 3458–3467. [Google Scholar] [CrossRef]
  17. Hu, T.; Jia, K.; Bi, T.; Dong, X. Wide-area protection algorithm for transmission network based on fault charge comparison and evidence theory. Power Syst. Technol. 2024, 48, 4739–4747. [Google Scholar]
  18. Hu, T. Research on Wide-Area Backup Protection of Power Grid Considering New Energy Access. Master’s Thesis, North China Electric Power University, Beijing, China, 2024. [Google Scholar] [CrossRef]
  19. Han, X.; Wang, Y.; Lü, F.; Chen, Z.; He, S.; Ma, Y. A new algorithm of wide area backup protection based on fault correlation coefficient. Power Syst. Prot. Control 2017, 45, 48–54. [Google Scholar]
  20. Kong, L.; Jiao, Y.; Liu, X.; Dai, Z.; Chong, Z. Ratio-restraining differential protection of lines based on charge. Autom. Electr. Power Syst. 2014, 38, 91–95. [Google Scholar]
  21. Cao, T.; Ma, S.; Xu, J.; Dai, C. Change-of-charge differential protection of transmission lines. Autom. Electr. Power Syst. 2013, 37, 102–107. [Google Scholar]
  22. Chen, M.; Wang, H.; Liu, Y.; Shen, S.; He, B. An adaptive backup distance relaying scheme based on communication between neighboring substations. Power Syst. Technol. 2017, 41, 630–636. [Google Scholar]
  23. Deng, Y. Uncertainty measure in evidence theory. Sci. China-Inf. Sci. 2020, 63, 210201. [Google Scholar] [CrossRef]
Figure 1. Structure diagram of regional centralized wide-area backup protection.
Figure 1. Structure diagram of regional centralized wide-area backup protection.
Electronics 14 04032 g001
Figure 2. Simple fault wiring diagram.
Figure 2. Simple fault wiring diagram.
Electronics 14 04032 g002
Figure 3. Protection algorithm flow chart.
Figure 3. Protection algorithm flow chart.
Electronics 14 04032 g003
Figure 4. IEEE 39-node topology diagram.
Figure 4. IEEE 39-node topology diagram.
Electronics 14 04032 g004
Figure 5. Comparison of 10% random loss of electrical data at both ends of L 3 and L 20 .
Figure 5. Comparison of 10% random loss of electrical data at both ends of L 3 and L 20 .
Electronics 14 04032 g005
Figure 6. Comparison of 20% random loss of electrical data at both ends of L 3 and L 20 .
Figure 6. Comparison of 20% random loss of electrical data at both ends of L 3 and L 20 .
Electronics 14 04032 g006
Figure 7. Comparison of discriminant results of fault line L 3 under different methods.
Figure 7. Comparison of discriminant results of fault line L 3 under different methods.
Electronics 14 04032 g007
Figure 8. Comparison of discriminant results of non-fault line L 20 under different methods.
Figure 8. Comparison of discriminant results of non-fault line L 20 under different methods.
Electronics 14 04032 g008
Table 1. Bus sequence voltage results from different fault positions of metallic grounding faults.
Table 1. Bus sequence voltage results from different fault positions of metallic grounding faults.
Fault LocationBus U +  (kV) U  (kV) U 0  (kV)
K 1 B 2 202.163.956.59
B 3 134.8535.5867.06
B 4 149.4317.3128.28
B 5 154.8211.3216.21
B 14 156.338.1010.19
B 18 135.1227.1751.05
Fault LocationBus U +  (kV) U  (kV) U 0  (kV)
K 2 B 2 204.203.954.40
B 3 140.8624.4442.96
B 4 130.4421.7537.18
B 5 148.0814.2121.30
B 14 154.949.6414.26
B 18 144.1618.4632.92
Fault LocationBus U +  (kV) U  (kV) U 0  (kV)
K 3 B 2 204.962.933.28
B 3 136.8317.9929.94
B 4 120.4131.6655.71
B 5 145.4520.6631.90
B 14 150.8714.3523.29
B 18 158.3913.6020.87
Table 2. Bus sequence voltage results from different fault positions between phase faults.
Table 2. Bus sequence voltage results from different fault positions between phase faults.
Fault LocationBus U +  (kV) U  (kV) U 0  (kV)
K 1 B 2 196.3111.730
B 3 108.5266.120
B 4 135.3239.720
B 5 139.3119.490
B 14 140.5810.410
B 18 128.9740.100
Fault LocationBus U +  (kV) U  (kV) U 0  (kV)
K 2 B 2 200.137.940
B 3 120.0650.380
B 4 114.5947.420
B 5 132.2823.220
B 14 137.1521.900
B 18 130.9230.890
Fault LocationBus U +  (kV) U  (kV) U 0  (kV)
K 3 B 2 202.046.000
B 3 125.3834.310
B 4 101.8160.390
B 5 130.3825.400
B 14 131.6323.950
B 18 146.2622.380
Table 3. Selection results of suspected fault lines for metallic grounding faults.
Table 3. Selection results of suspected fault lines for metallic grounding faults.
Fault LocationSuspected Faulty BusSuspected Faulty Line
K 1 B 3 , B 4 , B 18 L 3 , L 20
K 2 B 3 , B 4 , B 18 L 3 , L 20
K 3 B 3 , B 4 , B 5 L 3 , L 4
Table 4. Selection results of suspected fault lines for interphase faults.
Table 4. Selection results of suspected fault lines for interphase faults.
Fault LocationSuspected Faulty BusSuspected Faulty Line
K 1 B 3 , B 4 , B 18 L 3 , L 20
K 2 B 3 , B 4 , B 18 L 3 , L 20
K 3 B 3 , B 4 , B 5 L 3 , L 4
Table 5. Judgment results of single-phase metallic grounding fault.
Table 5. Judgment results of single-phase metallic grounding fault.
Fault LocationSuspected Faulty Line P 1 P 2 P 3 P 4 P f
K 1 L 3 110.9520.9874
L 20 00.50.560.2121
K 2 L 3 110.7940.9734
L 20 00.50.560.2121
K 3 L 3 110.9520.9874
L 4 00.50.560.2121
Note: Since it is a ground fault, P 2 does not participate in fusion decision-making; the bolded one is the faulty line.
Table 6. Judgment results of fault lines between phase faults.
Table 6. Judgment results of fault lines between phase faults.
Fault LocationSuspected Faulty Line P 1 P 2 P 3 P 4 P f
K 1 L 3 110.9520.9874
L 20 00.50.560.2121
K 2 L 3 110.7940.9734
L 20 00.50.560.2121
K 3 L 3 110.9520.9874
L 4 00.50.560.2121
Note: Since no zero-sequence charge quantity is detected, P 1 does not participate in the fusion decision-making; the bolded one is the faulty line.
Table 7. A fault discrimination results under different conditions of phase grounding.
Table 7. A fault discrimination results under different conditions of phase grounding.
Different SituationsSuspected Faulty Line P 1 P 2 P 3 P 4 P f
Normal L 3 110.9520.9874
L 20 00.50.560.2121
Case 1 L 3 0.50.6920.9520.8029
L 20 00.50.39680.0883
Case 2 L 3 110.6740.9838
L 20 0.500.560.2121
Note: Since it is a ground fault, P 2 does not participate in fusion decision-making; the bolded one is the faulty line.
Table 8. Fault discrimination results under different conditions of AB interphase short circuit.
Table 8. Fault discrimination results under different conditions of AB interphase short circuit.
Different SituationsSuspected Faulty Line P 1 P 2 P 3 P 4 P f
Normal L 3 110.9520.9874
L 4 00.50.560.2121
Case 1 L 3 0.50.8080.9520.8585
L 4 00.50.35710.1633
Case 2 L 3 110.6740.9838
L 4 0.500.560.2121
Note: Since no zero-sequence charge quantity is detected, P 1 does not participate in the fusion decision-making; the bolded one is the faulty line.
Table 9. Judgment results of protection misactivation faults.
Table 9. Judgment results of protection misactivation faults.
Line1234
L 3 0.93810.93700.91340.7954
L 20 0.21210.21210.17670.0099
Note: The bolded one is the faulty line.
Table 10. Judgment results of protection malfunction fault.
Table 10. Judgment results of protection malfunction fault.
Line12
L 3 0.97340.9734
L 20 0.29420.7550
Note: The bolded one is the faulty line.
Table 11. Judgment results of fault line L 3 under different noise interference.
Table 11. Judgment results of fault line L 3 under different noise interference.
Different SituationsQL3m/CQL3n/C
P 1
P 2
P 3
P 4
P f
Normal1.56461.8238110.7940.9734
15 dB1.45891.8497110.7940.9734
25 dB1.56411.8454110.7940.9734
Note: The bolded one is the faulty line.
Table 12. Judgment results of non-fault line L 20 under different noise interference.
Table 12. Judgment results of non-fault line L 20 under different noise interference.
Different SituationsQL20m/CQL20n/C
P 1
P 2
P 3
P 4
P f
Normal0.3021−0.328400.50.560.2121
15 dB0.3429−0.311400.50.560.2121
25 dB0.2972−0.342100.50.560.2121
Table 13. Judgment results of fault line L3 under different data packet loss rates.
Table 13. Judgment results of fault line L3 under different data packet loss rates.
Different Situations Q L 3 m /C Q L 3 n /C P 1 P 2 P 3 P 4 P f
Normal1.87262.3723110.7940.9734
10%loss1.71802.1744110.7940.9734
20%loss1.47041.8653110.7940.9734
Table 14. Judgment results of non-fault line L20 under different data packet loss rates.
Table 14. Judgment results of non-fault line L20 under different data packet loss rates.
Different Situations Q L 20 m /C Q L 20 n /C P 1 P 2 P 3 P 4 P f
Normal0.3021−0.328400.50.560.2121
10%loss0.2731−0.297100.50.560.2121
20%loss0.2374−0.259600.50.560.2121
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Liu, Z.; Han, W.; Tian, B.; Hao, G.; Cui, F.; Li, X.; Wang, S.; Wang, Y. A New Wide-Area Backup Protection Algorithm Based on Confidence Weighting and Conflict Adaptation. Electronics 2025, 14, 4032. https://doi.org/10.3390/electronics14204032

AMA Style

Liu Z, Han W, Tian B, Hao G, Cui F, Li X, Wang S, Wang Y. A New Wide-Area Backup Protection Algorithm Based on Confidence Weighting and Conflict Adaptation. Electronics. 2025; 14(20):4032. https://doi.org/10.3390/electronics14204032

Chicago/Turabian Style

Liu, Zhen, Wei Han, Baojiang Tian, Gaofeng Hao, Fengqing Cui, Xiaoyu Li, Shenglai Wang, and Yikai Wang. 2025. "A New Wide-Area Backup Protection Algorithm Based on Confidence Weighting and Conflict Adaptation" Electronics 14, no. 20: 4032. https://doi.org/10.3390/electronics14204032

APA Style

Liu, Z., Han, W., Tian, B., Hao, G., Cui, F., Li, X., Wang, S., & Wang, Y. (2025). A New Wide-Area Backup Protection Algorithm Based on Confidence Weighting and Conflict Adaptation. Electronics, 14(20), 4032. https://doi.org/10.3390/electronics14204032

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop