Determining the reliability requirements of system integrity protection schemes

Mathaios Panteli, Peter A. Crossley, John Fitch

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

System Integrity Protection Schemes (SIPS) are one of the most widely used solutions to the challenges in operating and protecting large and highly complex power systems. Therefore, it must be ensured that their performance meets the reliability requirements of electrical utilities. This paper suggests the use of Safety Integrity Level (SIL) for determining the range of acceptable SIPS reliability, as expressed using the probability of failure on demand (PFD). SIL is a reliability metric widely used in the process control industry. A procedure based on SIL and fault tree analysis is proposed for determining the minimum reliability required by the SIPS individual components for achieving the predetermined desired reliability level of the protection scheme. The theory of minimal cut sets is used for this purpose. The proposed methodology is illustrated using the Dinorwig intertrip scheme, which is located in North Wales, UK, and operated by National Grid.

Original languageEnglish
Title of host publication2014 International Conference on Probabilistic Methods Applied to Power Systems, PMAPS 2014 - Conference Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479935611
DOIs
Publication statusPublished - 17 Nov 2014
Event2014 International Conference on Probabilistic Methods Applied to Power Systems, PMAPS 2014 - Durham, United Kingdom
Duration: 7 Jul 201410 Jul 2014

Other

Other2014 International Conference on Probabilistic Methods Applied to Power Systems, PMAPS 2014
Country/TerritoryUnited Kingdom
CityDurham
Period7/07/1410/07/14

Keywords

  • Dependability
  • Fault Tree Analysis
  • Reliability
  • System Integrity Protection Schemes

Fingerprint

Dive into the research topics of 'Determining the reliability requirements of system integrity protection schemes'. Together they form a unique fingerprint.

Cite this