skip to main content

This content will become publicly available on November 23, 2022

Title: Security of a Power System Under High Penetration of Wind Energy Considering Contingencies and Stability Margins
Security is a well-known function to any transmission operator and system planner. As the world is moving toward the decarbonization of the power industry, it is more complicated for the system operators to maintain an acceptable level of security in the power system operation. More large-scale wind farms are being incorporated into the grid, and thus, the voltage stability concern is increasing. In practice, several contingencies are imagined by the system operators to assess the reliability of the grid. Since voltage stability is one of the major menaces that can trigger voltage instability in a power system, this paper is attempting to present to the transmission system planners and operators a dedicated methodology to facilitate the incorporation of large-scale wind farms into a transmission grid under high penetration of wind power. the stability of a wind-dominated power system is discussed based on Q-V and P-V methodologies and some N-1 contingencies with the Remedial Action Schemes (RAS). Furthermore, a methodology to rank the worst contingencies and to predict the voltage collapse during the highest wind penetration level is presented. Simulations have been, extensively, carried out to examine the methodology and have provided valuable information about the static security of the wind-dominated more » power system. The results can be used by the transmission system operator to anticipate voltage instability or voltage collapse in the power system during high wind penetration levels. « less
; ;
Award ID(s):
Publication Date:
Journal Name:
IEEE 19th Student Conference on Research and Development (SCOReD)
Sponsoring Org:
National Science Foundation
More Like this
  1. This paper proposes a simple yet effective method for power system probabilistic transient stability assessment considering the wind farm uncertainties and correlations. Specifically, the inverse Nataf-transformation-based three-point estimation method and the Cornish-Fisher expansion have been integrated together to deal with the uncertainties and the correlations among different wind farms. Then, by resorting to the extended dynamic security region approach, the transient stability criterion is derived as a linear combination of nodal injection vector under a given fault condition. New indices for the identification of critical lines have also been developed. Extensive simulation results carried out on four different systems, includingmore »the practical GZ power system in China show that the computational efficiency of the proposed method is much higher than the Monte-Carlo-based method and other methods almost without the loss of accuracy. The effectiveness of the proposed method under different penetrations of wind power with different degree of correlations is also validated. It is shown that correlation among wind farms has a larger impact on the transient stability results with a higher penetration level of renewable energy.« less
  2. Power tracking is an emerging application for wind farm control designs that allows farms to participate in a wider range of grid services, such as secondary frequency regulation. Control designs that enable large wind farms to follow a time-varying power trajectory are complicated by aerodynamic interactions that make it impossible to decouple upstream wind turbine control actions from downstream power production. This coupling is particularly important in applications where the reference trajectory is changing faster than, or at a similar rate as, the propagation of turbine wakes through the farm. In this work we overcome these difficulties by using amore »dynamic wake model that accounts for wake expansion, advection, and multi-wake interactions within a model-based receding horizon controller for coordinated control of a large multi-turbine wind farm. An ensemble Kalman filter is employed for state estimation and error correction at the turbine level. We implement the controller in high-fidelity numerical simulations of a wind farm with 84 turbines and then test the controlled farm's ability to track a power reference signal. The results demonstrate the ability of the control algorithm to track two types of power reference signals used by a US independent system operator.« less
  3. In recent years, penetration of renewable energy resources into the power grid has increased significantly. Wind, as a renewable, clean, and abundantly available source of energy, has an important share in the energy mix. However, increasing the penetration of wind power in the power grid can adversely affect the power quality and introduce new operational challenges. This paper discusses issues related to the integration of wind farms in the power system, such as maximum power point tracking, fault ride-through capabilities, interarea and subsynchronous oscillations, and voltage flicker, and provides a review of the existing control strategies to address these issuesmore »in Types I, II, III, and IV wind turbines. This paper also identifies challenges and opportunities ahead.« less
  4. Voltage collapse is a type of blackout-inducing dynamic instability that occurs when the power demand exceeds the maximum power that can be transferred through the network. The traditional (preventive) approach to avoid voltage collapse is based on ensuring that the network never reaches its maximum capacity. However, such an approach leads to inefficiencies as it prevents operators to fully utilize the network resources and does not account for unprescribed events. To overcome this limitation, this paper seeks to initiate the study of voltage collapse stabilization. More precisely, for a DC star network, we formulate the problem of voltage stability asmore »a dynamic problem where each load seeks to achieve a constant power consumption by updating its conductance as the voltage changes. We show that such a system can be interpreted as a game, where each player (load) seeks to myopically maximize their utility using a gradient-based response. Using this framework, we show that voltage collapse is the unique Nash Equilibrium of the induced game and is caused by the lack of cooperation between loads. Finally, we propose a Voltage Collapse Stabilizer (VCS) controller that uses (flexible) loads that are willing to cooperate and provides a fair allocation of the curtailed demand. Our solution stabilizes voltage collapse even in the presence of non-cooperative loads. Numerical simulations validate several features of our controllers.« less
  5. The increasing penetration of cyber systems into smart grids has resulted in these grids being more vulnerable to cyber physical attacks. The central challenge of higher order cyber-physical contingency analysis is the exponential blow-up of the attack surface due to a large number of attack vectors. This gives rise to computational challenges in devising efficient attack mitigation strategies. However, a system operator can leverage private information about the underlying network to maintain a strategic advantage over an adversary equipped with superior computational capability and situational awareness. In this work, we examine the following scenario: A malicious entity intrudes the cyber-layermore »of a power network and trips the transmission lines. The objective of the system operator is to deploy security measures in the cyber-layer to minimize the impact of such attacks. Due to budget constraints, the attacker and the system operator have limits on the maximum number of transmission lines they can attack or defend. We model this adversarial interaction as a resource-constrained attacker-defender game. The computational intractability of solving large security games is well known. However, we exploit the approximately modular behavior of an impact metric known as the disturbance value to arrive at a linear-time algorithm for computing an optimal defense strategy. We validate the efficacy of the proposed strategy against attackers of various capabilities and provide an algorithm for a real-time implementation.« less