https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/IoTWorldToday-mobile-logo.png
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Metaverse
  • Development
  • Security
ioti.com

Energy/Utilities


Smart Grid Security Will Get Boost from AI and 5G

The energy grid is poised for major change through such technologies as AI and 5G. But with advancements come new cybersecurity challenges.
  • Written by Lauren Horwitz
  • 14th July 2020

Key takeaways from this article:

  • Smart grid technologies such as microgrids, generators and solar panels may help curb climate change and help consumers take greater control of their energy consumption.
  • Smart grid technologies create a two-way flow of data that invites new cybersecurity challenges.
  • Artificial intelligence, 5G and other technologies are poised to aid with these challenges, but the energy industry must continue to invest to get ahead of cyberattacks.

For the energy industry, securing the grid is mission-critical.

Increasingly, too, securing devices that lie beyond the centralized grid — at the edge, so to speak — is also critical as well as a moving target. Zero-trust cybersecurity, 5G connectivity and machine learning, though, may ultimately help this “smart grid,” as this connected energy grid is known, become more resilient in the face of attacks.

While the shift toward sustainable energy could help secure a better future for the planet and reduce carbon footprint, the smart grid — fueled by connected things, microgrids and so on — creates two-way, risky data flows that add complexity to an already antiquated energy grid.

Smart grid technologies can balance peak demand, flatten the load curve and make energy generation sources more efficient, said Brian Crow, Sensus’ vice president of analytic solutions, in a recent article on the role of IoT in utilities.

[IoT World, North America’s largest IoT event, is going virtual August 11-13 with a three-day virtual experience putting IoT, AI, 5G and edge into action across industry verticals. Register today]

Malicious attackers can exploit these two-way flows.

These devices at the edge have the “potential to impact grid reliability,” said Christine Hertzog, principal technical leader at Electric Power Research Institute. Malicious actors can target the grid and have the ability to “change the load in dramatic ways,” she said, “and you could then see some issues with grid reliability.”

Distributed Energy, Smart Grids Accelerate

New energy sources and distribution methods including solar panels, generators and microgrids show promise in curbing climate change and helping consumers take greater control of energy consumption during peak usage times.

Smart grid technologies decentralize energy delivery, enabling people to quickly connect to and disconnect from the larger grid and generate and deliver electricity locally. Unlike today’s massive, centralized grid, an attack or disruption of a microgrid, for example, doesn’t affect the entire system. That’s important for areas like California where wildfires can prompt spontaneous grid shutdowns.

But smart grids also create erratic demand on the larger grid and present two-way traffic to that grid, posing security risks. And these risks are amplified by aging energy grid infrastructure.

Decentralized energy production – components of which are used in smart grids – is growing. The International Energy Agency expects that renewable energy capacity will increase by 50% through 2024, with solar photovoltaics and onshore wind making up the lion’s share of that increase.

“The whole world is moving more toward that paradigm of relying on on-site power — whether it’s solar, a backup generator or another device,” said Peter Asmus, principal research analyst of Navigant Research.

“The world is shifting from large centralized resources to look more like telecom,” Asmus said. He noted that while some deployments have slowed down because of coronavirus, he anticipates a greater acceleration of decentralized energy sources over the next couple of years.

Grid Edge Brings Complexity to Already Antiquated Energy Grid

The traditional energy grid itself lags these modern developments. According to the U.S. Energy Department, 70% of the grid’s transmission lines and power transformers are more than 25 years old, and the average age of power plants is more than 30 years old. Parts of the U.S. grid network are more than a century old.

Technologies such as the Internet of Things (IoT) devices, edge computing architecture and machine learning will modernize the grid. Examples include IoT-enabled backup generators that provide additional power to a home, electric vehicle charging stations or connected thermostats. These kinds of technologies are rapidly becoming extensions of the traditional grid.

According to  the “Internet of Things in Energy Market” report, the global market for IoT in energy is expected to grow from $20.2 billion in 2020 to $35.2 billion by 2025, with a compound annual growth rate of 11.8% during the forecast period.

Just as connected devices are part of this equation, edge architecture is as well.

Edge computing architecture brings compute and data closer to the devices and users that need them to improve response times and reduce bandwidth needs. Myriad devices have emerged and reside at the edge rather than in the cloud, which requires a round trip from device to the cloud and back, increasing bandwidth requirements, reducing response time and potentially posing securing risks.

“This is what we would call ‘grid edge,’ and it’s a paradigm shift,” Hertzog said. “We used to consider cybersecurity like the fort concept: You have a perimeter. But when you’re talking about the edge of the grid and cloud-based apps, you’re blowing up that concept,” she said.

Grid edge architecture adds risk and complexity to the grid. Edge devices may not have been patched and updated frequently, may have less vigorous authentication protocols applied, may share a network with other key IT systems and become a target for infiltration, or they may house poorly written code that is easy to penetrate and thus a target for malicious attackers.

These kinds of security risks have been amplified as utilities turn to IoT for better grid management and as consumers take advantage of devices at the edge, such as connected energy meters and home-charging stations for electric cars. As a result, security breaches can now be bidirectional, enabling grids to be penetrated not only via their own networks but also via consumer devices connected to the grid.

To combat security issues, businesses are implementing private networks for IoT. In a recent Omdia survey on IoT adoption, 97% of respondents said that they had considered or are using private networks for IoT deployments to bolster security.

AI, Zero-Trust Cybersecurity

A potential antidote to these risks is the emergence of machine learning and AI-enabled tools to aid IT pros. Machine learning tools can identify threats among the vast number of alerts that IT pros may receive. AI-enabled cybersecurity tools are becoming key to edge security, because humans simply can’t keep up with all the information.

“On a massive scale, that data starts to go beyond what the human brain capacity is able to do,” Hertzog said. “We’re getting so much additional information through new tools and capability, but the ability to assimilate and make sense of that is going to be a big challenge.”

Companies such as National Grid Partners have enlisted AI for cybersecurity monitoring and anticipate using automation for other tasks, such as predictive maintenance and customer service.

Hertzog said that AI is critical for validating identity at the edge, which requires a zero-trust cybersecurity strategy. The underlying principle of zero trust is to never trust and always verify.

Hertzog noted that this approach to cybersecurity requires intelligence at the edge to achieve that identity authentication. “We need distributed intelligence to deliver that zero trust down to the granular level,” she said. “AI would be involved in looking at all the activity and seeing if there were any anomalies.”

“We can take this data and inform our decision-making,” Hertzog said. She emphasized that true AI for this use case may be in the distance, but automated monitoring is already in place.

Hertzog also noted, however, that automation in decision-making can only take place if the data derived is accurate, clean and ready to use.

“Garbage in, garbage out,” Hertzog said. Hertzog noted that poor data quality is compelling reasons for utilities to put the work into data management for cybersecurity. “Studies indicate that about 80% of the time spent on a project involving AI is getting that data into the right format — just getting it ready to be used for AI.”

AI will also require greater speed and network slicing — which allows networks to be partitioned to provide different levels of access to the grid to enable granular security policy setting. Such fine-grained policies are needed to protect these distributed networks.

Hertzog and others have noted that corollary technologies such as 5G connectivity, the new wireless standard, could bolster zero-trust security by providing the network bandwidth to enable the speed and data intensiveness needed for intelligent activity at the edge.

“5G is a game changer,” Hertzog said. “It will enable this concept of slicing networks and the ability to define security policies more granularly. That has some ramifications for zero trust.”

At the same time, Hertzog said, while 5G will bolster smart grid security, the infrastructure required isn’t coming tomorrow. “It will take a decade to roll out,” she said.

Tags: Edge computing Smart meters Embedded Computing Metaverse Energy/Utilities Technologies Internet of Things World 2020 Conference Coverage

Related Content


  • Image shows an Oil and gas industry pump jack
    Digital Oil Field Technology Brings Well Sites Online
    mCloud plans to connect to more than 3,000 well sites by the end of 2023
  • Image shows downtown, Near North, Chicago Riverwalk, Marina City skyscrapers on the background
    Smart Street Lighting Coming to 30 Cities in the U.S. and Canada
    While many cities have already transitioned to LED streetlights, only a minority have also made the switch to control and dimming features
  • Image shows a communication satellite over the Earth.
    Dubai to Use Satellite IoT Terminals for Utilities Industry
    The move follows the nation’s wider roadmap to incorporate space technologies into its grid
  • Image shows an ISQ unmanned aerial vehicle
    Hannover Messe 2022: Unmanned Aerial Vehicle Inspection Drones
    ISQ’s inspection drones have been developed to help streamline operations at solar farms

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Latest News

  • IoT-Enabled Bug Monitoring  System Finds Forest Threats
  • Firefly-Inspired Robots Enable Motion Tracking, Communication
  • Chinese Researchers Develop Mind-Controllable Metasurface
  • Image shows National Quantum Computing Centre (NQCC) deputy director for innovation Simon Plant at Quantum Summit 2022
    Quantum Summit 2022: U.K. National Quantum Computing Centre Update

Roundups

View all

IoT Product Roundup: Canonical, InfluxData, Wiliot and More

23rd June 2022

IoT Product Roundup: Cisco, Telit, Draganfly and More

9th June 2022

IoT Deals, Partnerships Roundup: Google, Arm, Senet and More

26th May 2022

White Papers

View all

The Role of Manufacturing Technology in Continuous Improvement Ebook

6th April 2022

IIoT Platform Trends for Manufacturing in 2022

6th April 2022

Latest Videos

View all
Image shows Unilever's Alberto Prado at AI Summit 2022 in London

AI Summit 2022: Unilever’s Alberto Prado

Prado talks about how Unilever is using AI to accelerate the speed of new discoveries and gives them access to more breakthrough innovation

Image Shows John Lewis' Barry Panai at AI Summit London 2022

AI Summit 2022: John Lewis’ Barry Panayi on AI in Retail

Panayi talks about data and AI in retail and how individuals and the technology can work together

E-books

View all

How Remote Access Helps Enterprises Improve IT Service and Employee Satisfaction

12th January 2022

An Integrated Approach to IoT Security

6th November 2020

Webinars

View all

Rethinking the Database in the IoT Era

18th May 2022

Jumpstarting Industrial IoT solutions with an edge data management platform

12th May 2022

AI led Digital Transformation of Manufacturing: Time is NOW

9th December 2021

Special Reports

View all

Omdia’s Smart Home Market Dynamics Report

7th January 2022

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

IoT Security Best Practices for Industry and Enterprise

20th October 2020

Twitter

IoTWorldToday, IoTWorldSeries

IoT Product Roundup: Nokia, Energous, Dashbot and more dlvr.it/STRKDh https://t.co/YgTAI5SXSB

6th July 2022
IoTWorldToday, IoTWorldSeries

A new #IoT bug monitoring system from @CENSIS121 is helping the UK’s #forestry industry fight pests, and save money… twitter.com/i/web/status/1…

6th July 2022
IoTWorldToday, IoTWorldSeries

NHTSA Boss Hints at Federally Regulating Autonomous Vehicles dlvr.it/STQrrw https://t.co/Yjp1UKuaE5

6th July 2022
IoTWorldToday, IoTWorldSeries

Nvidia Powered Driverless Three-Wheelers Set to Debut dlvr.it/STQq0H https://t.co/RrYyVPgFzB

6th July 2022
IoTWorldToday, IoTWorldSeries

New Drone System Aims for Full Autonomy dlvr.it/STQnvV https://t.co/S4O8hb6gQh

6th July 2022
IoTWorldToday, IoTWorldSeries

Bosch, VW Approved to Develop Automated Driving dlvr.it/STQllD https://t.co/neI30dVmC6

6th July 2022
IoTWorldToday, IoTWorldSeries

🤔 Looking for 3 Strategies to Avoid IoT Key Theft? We’ve got you covered! As tech companies continue to develop an… twitter.com/i/web/status/1…

5th July 2022
IoTWorldToday, IoTWorldSeries

AI Summit 2022: Unilever’s Alberto Prado dlvr.it/STMpRN https://t.co/1dyLREr8N6

5th July 2022

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X