Energy companies are deploying more edge computing applications. The processing power and capabilities of these systems have been increasing. As a result, utilities need to take steps to ensure that their edge ystems are not only functional but also secure.
Edge systems are becoming smaller and more powerful. Consequently, they are supporting increasingly sophisticated functions, like machine learning, image recognition, compute-intense processes, and delivery of real time data.
These powerful capabilities also create new potential security holes. Therefore, energy companies need to ensure that their transactions are protected.
Security at the Microprocessor Level
One emerging way to secure edge transactions is integrating security into microprocessors. Market leaders Intel, AMD, and Texas Instruments are developing a new generation of chips that feature advanced high assurance boot up, hardware firewall domains, run-time attestation, and secure enclaves.
One challenge is the work is an early stage of development. Typically, a period of trail-and-error follows, so energy companies may need to be cautious in adopting the new security features.
Edge computing continues to gain acceptance in energy companies. Consequently, they need to protect information generated by these systems. Microprocessor security is one way to protect their data, but right now, the technology is an early stage of development, one where limitations are evident. So, utilities should move cautiously when deploying these new security solutions. ย ย