Distributed energy resources (DER), along with the battery energy storage systems needed to smooth out intermittency and maintain power quality, are reshaping the grid. These diverse resources contribute to grid resiliency, but can bring challenges if communications systems are not planned properly.
Planning for optimal communications systems can significantly reduce delays caused by incompatible systems and the unexpected costs that can accrue when retrofitting telecommunications infrastructure.
Data flow linking utilities with distributed energy vendors and systems is a critical factor that must be accounted for in telecom design. Vendors may need access to DER data that may be flowing, either bidirectionally or one way. This may be addressed by utilities by designating a controlled access point giving vendors a secure connection to upload this data via a restricted network section that does not expose the broader distribution network. This configuration supports data security with continued operational control while giving vendors access only to the data they need.
The level of digital intelligence embedded in the connections between utilities and DERs directly affects the complexity and functionality of the system. Serial connections represent a straightforward approach, offering simple point-to-point physical links that are inherently secure and less complex. Because these serial connections cannot be accessed remotely, cybersecurity risks may be reduced. However, the need for on-site access by technicians who may be required to travel many miles from centralized operational centers in order to make updates or modifications is a trade-off that must be considered.
Moreover, a serial connection system design lacks the flexibility and scalability of Internet Protocol (IP)-based connections, which enable remote access and more dynamic data flows. However, the trade-off for this greater flexibility may be increased cybersecurity risks that must be addressed via data protection through encryption protocols, such as IPSEC and MACSEC. System resilience may be further enhanced by security equipment, including firewalls and advanced vendor-provided solutions.
It's important to recognize that technology alone is not enough to maintain the data security utilities need. Comprehensive physical and digital security strategies will be needed for wall-to-wall protection of DER systems.