Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction...

52
Generator Protection Generator Protection Needs in a DG Needs in a DG Environment Environment

Transcript of Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction...

Page 1: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Generator Protection Needs in a Generator Protection Needs in a DG EnvironmentDG Environment

Page 2: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

IntroductionIntroduction

• ProtectionProtection• Monitoring & ControlMonitoring & Control• Anti-islandingAnti-islanding• CommunicationsCommunications

Page 3: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

ProtectionProtection

• EPS Protection:EPS Protection:

DG EPS

DG BKR EPS BKR

LOAD BKR

DISCONNECT

51N81081U 59 27

27N

59N

32 51V 67P

47

Page 4: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

ProtectionProtection

• Forward Power:Forward Power:

DG EPS

DG BKR EPS BKR

LOAD BKR

DISCONNECT

51N81081U 59 27

27N

59N

32 51V 67P

47

Synchronous Induction Inverter

Page 5: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

ProtectionProtection

• Phase Faults:Phase Faults:

DG EPS

DG BKR EPS BKR

LOAD BKR

DISCONNECT

51N81081U 59 27

27N

59N

3251V

67P

47

Synchronous Induction Inverter

Page 6: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

ProtectionProtection

• Reverse Phase:Reverse Phase:

DG EPS

DG BKR EPS BKR

LOAD BKR

DISCONNECT

51N81081U 59 27

27N

59N

32 51V 67P

47

Synchronous Induction Inverter

Page 7: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

ProtectionProtection

• Abnormal Voltage & Frequency:Abnormal Voltage & Frequency:

DG EPS

DG BKR EPS BKR

LOAD BKR

DISCONNECT

51N810

81U

59 27

27N

59N

32 51V 67P

47

Synchronous Induction Inverter

Page 8: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

ProtectionProtection

• System Ground Faults:System Ground Faults:

DG EPS

DG BKR EPS BKR

LOAD BKR

DISCONNECT

51N

81081U 59 27

32 51V 67P

47

Synchronous Induction Inverter

Page 9: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

ProtectionProtection

• System Ground Faults:System Ground Faults:

DG EPS

DG BKR EPS BKR

LOAD BKR

DISCONNECT

81081U 59 27

27N

59N

32 51V 67P

47

Synchronous Induction Inverter

Page 10: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

ProtectionProtection

• DG Protection:DG Protection:

EPS

DG BKR EPS BKR

LOAD BKR

DISCONNECT

24

DG

404687

51G

R

25

32

Page 11: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

ProtectionProtection

• Stator Differential:Stator Differential:

Synchronous Induction Inverter

EPS

DG BKR EPS BKR

LOAD BKR

DISCONNECT

24

DG

404687

51G

R

25

32

Page 12: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

EPS

DG BKR EPS BKR

LOAD BKR

DISCONNECT

24

DG

404687

51G

R

25

32

ProtectionProtection

• Generator Unbalance:Generator Unbalance:

Synchronous Induction Inverter

Page 13: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

ProtectionProtection

• Loss of Excitation:Loss of Excitation:

Synchronous Induction Inverter

EPS

DG BKR EPS BKR

LOAD BKR

DISCONNECT

24

DG

404687

51G

R

25

32

Page 14: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

EPS

DG BKR EPS BKR

LOAD BKR

DISCONNECT

24

DG

404687

51G

R

25

32

ProtectionProtection

• Reverse Power:Reverse Power:

Synchronous Induction Inverter

Page 15: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

ProtectionProtection

• Generator Ground Faults:Generator Ground Faults:

Synchronous Induction Inverter

EPS

DG BKR EPS BKR

LOAD BKR

DISCONNECT

24

DG

404687

51G

R

25

32

Page 16: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

ProtectionProtection

• Over-Excitation:Over-Excitation:

Synchronous Induction Inverter

EPS

DG BKR EPS BKR

LOAD BKR

DISCONNECT

24

DG

404687

51G

R

25

32

Page 17: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

EPS

DG BKR EPS BKR

LOAD BKR

DISCONNECT

24

DG

404687

51G

R

25

32

ProtectionProtection

• Synch-Check:Synch-Check:

Synchronous Induction Inverter

Page 18: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

MonitoringMonitoring

• Metering– Voltage

– Current

– Real/Reactive Power

– Energy

• Power Quality– Voltage & Current Harmonics

– Power Quality Statistics

• Status– Breaker Position

– Sequence of Events

• Oscillography/Data Logger

Page 19: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

ControlControl

• Local Interface– Easy access to protection settings.

– Display of voltage, current, energy, power factor.

– Display of protection target information, breaker and disconnect status.

– Control actions such as manual trip & close.

•  Programmable Functionality– Interlocking

– Auto-synchronizing

– Auto-restoration

Page 20: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

SummarySummary

• Due to the variety of possible implementations of distributed generation, a broad array of protective elements may be required.

• In addition to protection there is an opportunity to integrate a host of additional functions.

Page 21: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

Anti-islandingAnti-islanding

Survey of MethodsSurvey of Methods

Page 22: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

Anti-Islanding (Passive)Anti-Islanding (Passive)

• OF/UF, OV/UV:

Advantages• Applicable to conventional DGs

Disadvantages• Tripping time may be long for small mismatch• Fails when P+jQ = 0

DG

EPS

Island

Load

P+JQ

PG+JQGPL+JQL

Page 23: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

-1.5

0Vo

lts

T

Anti-Islanding (Passive)Anti-Islanding (Passive)

• Voltage Vector Jump:

Advantages• Can operate more quickly than voltage/frequency protection• Secure for single phase faults• Applicable to conventional DGs

Disadvantages• Can be difficult to set• Fails when P+jQ = 0

Page 24: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

Anti-Islanding (Passive)Anti-Islanding (Passive)

• Rate of Change of Frequency:Advantages

• Can operate more quickly than voltage/frequency protection

• Applicable to conventional DGs

Disadvantages

• May be difficult to reliably discriminate between an islanding event and a system disturbance.

• Fails when P+jQ = 0

Page 25: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

Anti-Islanding (Passive)Anti-Islanding (Passive)

• Rate of Change of Power:

Advantages• Can operate more quickly than voltage/frequency protection• Stable for single phase faults• Applicable to conventional DGs

Disadvantages• Fails when P+jQ = 0

capacitytheisSand

constantinertiatheisHWhere

IslandedPP

EPStoConnectedSHSH

SHPP

LG

EPSEPSGG

GGLG

)(

DG

EPS

Island

Load

P+JQ

PG+JQGPL+JQL

Page 26: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

Anti-Islanding (Passive)Anti-Islanding (Passive)

• Rate of Change of Voltage & Change in PF:

Advantages

• Can operate more quickly than voltage/frequency protection

• Stable for system disturbances

• Applicable to conventional DGs

Disadvantages

• Fails when P+jQ = 0

&

5.00 PF

0dt

dV

TRIP

DG

EPS

Island

Load

P+JQ

V

PF

Page 27: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

Anti-Islanding (Passive)Anti-Islanding (Passive)

• Voltage Harmonic Monitoring:Voltage Harmonic Monitoring:

Advantages• Can operate when P+jQ = 0

Disadvantages• Load may filter the harmonic content• Could be affected by transient phenomenon• Only applicable for inverter-based DGs

DGEPS

V

Page 28: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

Anti-Islanding (Active)Anti-Islanding (Active)

• High Frequency Signal:High Frequency Signal:

Advantages• Can operate when P+jQ = 0

Disadvantages• Requires the installation of a transmitter into the EPS.• High frequency signals can be attenuated by series inductance.• Impacts power quality.

DGEPS

V

Page 29: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

Anti-Islanding (Active)Anti-Islanding (Active)

• Impedance Switching:Impedance Switching:

Advantages

• Can operate when P+jQ = 0

• Applicable to conventional DGs

Disadvantages

• May impact on power quality

• Multiple units require synchronized switching

DG EPS

LoadChange

switch

IslandingEvent

Vrms

Time

Page 30: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

Anti-Islanding (Active)Anti-Islanding (Active)

• Assymetrical Waveform:Assymetrical Waveform: I

Advantages

• Can operate when P+jQ = 0

Disadvantages

• Only applicable for inverter-based DGs

sticCharacteriFPP

fKWhere

IslandedKPf

EPStoConnectedKK

KKPf

GG

EPSG

EPSGG

)(

Page 31: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

Anti-Islanding (Active)Anti-Islanding (Active)

• Active Frequency Drift - Sandia Frequency ShiftActive Frequency Drift - Sandia Frequency Shift:: I

Advantages

• Can operate when P+jQ = 0

Disadvantages

• Only applicable for inverter-based DGs

Page 32: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

Anti-Islanding (Active)Anti-Islanding (Active)

• Impedance Insertion:Impedance Insertion:

Advantages• Can operate when P+jQ = 0• Applicable to conventional DGs• No impact on power quality

Disadvantages• Coordinated operation of breaker and impedance switch• An impedance bank must be located at all locations where an island can occur

DG

EPS

Page 33: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

Anti-Islanding (Active)Anti-Islanding (Active)

• Comparison of Rate of Change of Frequency:Comparison of Rate of Change of Frequency:

Advantages

• More secure than ROCOF

• Applicable to conventional DGs

Disadvantages

• Requires communication channel

• Fails when P+jQ = 0

DG

EPS

df/dt

df/dtblocktrip

Page 34: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

Anti-Islanding (Active)Anti-Islanding (Active)

• Power Line Carrier:Power Line Carrier:

Advantages• Can operate when P+jQ = 0• Applicable to conventional DGs• No impact on power quality

Disadvantages• Requires installation of transmitter and receiver equipment.• Transmitter must be very reliable• May mal-operate during a system fault

DG

EPS

TX

RX

trip

Page 35: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

SummarySummary

• Most passive schemes cannot guarantee fast operation as the power flow across the breaker approaches zero.

• Many active schemes can quickly detect an island even when the power flow through the breaker is zero prior to islanding.

• Of the these schemes several are applicable only for inverter-based DGs.

• The remaining schemes have power quality or security issues.

Areas For further study

• How is the security of these schemes impacted as the penetration of DG increases?

• How is the dependability of these schemes impacted as the penetration of DG increase?

• How do each of the schemes impact on power quality as the penetration of DG increases?

Page 36: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

CommunicationsCommunications

Advantages:SecureReliable

Disadvantages:Expensive to build and maintain.Vertically integrated (not well suited for sharing of information).

RTU RTURTURTURTURTURTU

EPSControlCenter

Page 37: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

Internet TopologyInternet Topology

DG IED

DG IED

Internet

Virtual PrivateNetwork

Router

DGOwner

Router

DG IED

Router

Router

DGManufacturer

RouterDG IED

Router

EPSOperator

Router

Marketer

Router

DGIED

DGIED

DGIED

DGIED

Page 38: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

IPSecIPSec

IPSec is a set of open standard protocols designed to address the following security issues:

•Confidentiality - Prevents unauthorized access to information as it is transferred across a public data network.

•Authenticity - Confirms the identity of the sender and receiver of the information.

•Integrity - Checks that information has not been altered during transmission

•Anti-playback - Ensures that a data transaction is only carried out once unless there is authorization for retransmission.

Page 39: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

VPN TunnelVPN Tunnel

Peer Y

Internet

VPN Router

Peer X

VPN Router

VPN Tunnel

Authentication using pre-shared keys or public key cryptographyAgreement on encryption algorithmsGeneration of Session Keys

Page 40: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

Integrity

Peer Y

Hello

HashFunction

Peer X

Hello

12047 Hello 12047

HashFunction

12047=

A hash function can also be used to verify that a message has not changed while in transit from X to Y. A checksum of the message is created by X. This message is appended to the message. Both the message and the checksum are sent to Y. Y now takes the message and puts it into the same hash function. If the checksums agree then the message has not been altered.

Page 41: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

Anti-replayAnti-replay

CompareSequenceNumber

AppendSequenceNumber

Peer X Peer Y

Hello Hello

HelloHello 9

SequenceCount=9

Increment

SequenceCount=9

9

Increment

Protection from resent messages can be obtained by attaching a sequence number to each transmitted message. After the message is sent, the sequence counter is incremented. At the receiving end, the sequence number is compared with the sequence counter. If the values do not agree then the message is rejected.

Page 42: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

Complete SequenceComplete Sequence

Peer Y

Hello

Peer X

SessionKey

12047 120479 9Hello

SessionKey

Encryption Decryption

CheckSum

MessageSequenceNumber

Private KeyEncryption

(3DES)

42915

Page 43: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

SummarySummary

•A VPN can provide a secure method of connecting DGs to DG stakeholders over the internet.

•IPSec specifically addresses the issues of authentication of users, integrity of data, anti-replay, and confidentiality.

•IPSec is an open framework which utilizes public domain algorithms that have withstood the test of time.

Page 44: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

ConclusionsConclusions

• The overall cost effectiveness of a DG implementation will be increased by integrating more functionality into the DG IED.

• Further investigation is warranted to compare the effectiveness of anti-islanding methods for various system topologies and operating conditions.

• The communication capabilities of the DG IED should support the application of new networking strategies.

Page 45: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

Internet Key Exchange (Diffie-Hellman)Internet Key Exchange (Diffie-Hellman)

  Peer X Peer Y

  Peers X and Y agrees on two integers A and B

A = 22 A = 22 B = 19 B = 19

X and Y each generate a Pseudo-random number 

i = 7 j = 8 

I and J are created using A and B 

I = Ai mod B J = Aj mod B I = 227 mod 19 I and J are exchanged J = 228 mod 19 I = 2 J = 6

 

K1 = Ji mod B K2 = Ij mod B K1 = 67 mod B K2 = 28 mod 19 K1 = 5 K2 = 5

K1=K2 - these may now be used as session keys

Page 46: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

Authentication

• Pre-shared Keys

• Public Key Encryptyion

• Digital Signatures

Page 47: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

Authentication using Public Key Encryption (RSA)Authentication using Public Key Encryption (RSA)

77

N

QPN

60

)1()1(

QP

437

160543

7

160

1

D

XD

E

XD

Choose two large prime numbers P & Q P = 7 Q=11  Calculate N & :  Choose E such that 1 < E < N and E and are relatively prime:(Relatively prime means that E and have no prime factors in common) E = 7 The factors of are 1,2,3,4,5,6,10,12,15,20,30, and 60. The factors of E are 1, 7 Find D such that DE - 1 is evenly divisible by .

The public key pair is (E,N) or (7,77)

The private key pair is (D,N) or (43,77)

Page 48: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

Authentication using Public Key Encryption (RSA)Authentication using Public Key Encryption (RSA)

The algorithm for encryption is

C=TE mod N

Where T is the plain text

The algorithm for decryption is

T=CD mod N

Where C is the cipher text 2

77mod51

51

51

77mod2

2

43

7

T

T

C

C

C

T

If Peer X wants to authenticate Peer Y, X encrypts a message with Y’s public key and sends the encrypted message to Y. If Y can successfully decrypt the message then Y proves he is the owner of the private key .

Page 49: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

Authentication using Pre-shared KeysAuthentication using Pre-shared Keys

If Peer X wants to authenticate Peer Y, X creates a checksum using the pre-shared key and sends the checksum to Y. If Y can successfully reproduce the same checksum then Y proves he has the same key .

Pre-sharedKey

Checksum

HashFunction

HashFunction

Peer X Peer Y

XYZ XYZ

2025920259 20259 =

Page 50: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

Secure Hash Function

• Properties• Input can be any length

• Output is a fixed length

• It is relatively easy to compute the checksum

• The function is one-way

• The function is collision free

HashFunction

Message

Hello

Checksum

Hello 12047

Page 51: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation

EncryptionEncryption

Key

Hello

Key

Encryption DecryptionHello

Key 1

Hello

Key 2

Encryption DecryptionHello

Private KeyEncryption

Public KeyEncryption

35704

35704

Page 52: Generator Protection Needs in a DG Environment. Conference on Distributed Generation Introduction ProtectionProtection Monitoring & ControlMonitoring.

Conference on Distributed GenerationConference on Distributed Generation