Impacts of distributed generation on low-voltage distribution network protection

Richard Ogden, Jin Yang

Research output: Chapter in Book/Published conference outputConference publication


This paper reports work of a MEng student final year project, which looks in detail at the impacts that distributed generation can have on existing low-voltage distribution network protection systems. After a review of up-to-date protection issues, this paper will investigate several key issues that face distributed generation connections when it comes to network protection systems. These issues include, the blinding of protection systems, failure to automatically reclose, unintentional islanding, loss of mains power and the false tripping of feeders. Each of these problems impacts on protection systems in its own way. This study aims to review and investigate these problems via simulation demonstrations on one representative network to recommend solutions to practices.

Original languageEnglish
Title of host publicationProceedings, 2015 50th international Universities Power Engineering Conference
Number of pages6
ISBN (Print)978-1-4673-9682-0
Publication statusPublished - 30 Nov 2015
Event50th international Universities Power Engineering Conference - Stoke-on-Trent, United Kingdom
Duration: 1 Sept 20154 Sept 2015


Conference50th international Universities Power Engineering Conference
Abbreviated titleUPEC 2015
Country/TerritoryUnited Kingdom

Bibliographical note

© 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.


  • distributed Generation
  • low-voltage distribution network
  • protection systems


Dive into the research topics of 'Impacts of distributed generation on low-voltage distribution network protection'. Together they form a unique fingerprint.

Cite this