Welcome to the new Energy Central — same great community, now with a smoother experience. To login, use your Energy Central email and reset your password.

Build Security into the Next Generation Smart Grid

Utilities face challenges when incorporating new technology into their transmission networks. The ability to add more intelligence to remote devices makes them more efficient but also creates the threat of intrusions. Work is underway to layer security onto new smart grid solutions to thwart outsiders.

The grid is large, complex, interconnected, and ever changing. One challenge is that its  legacy infrastructure was designed at a time when transmission systems ran autonomously and were not interconnected. Consequently, the network equipment was largely proprietary,

As technology evolved, grids became more open, more capable, and more connected. Since energy companies made large investments in their first generation equipment, they want to keep it. However, layering on needed security checks has proven difficult.

Utilities are now embracing new digital technologies, like cloud, Internet of Things (IoT), and artificial intelligence. These new solutions improve performance and are cost effective. However, they also open new potential security holes.

Strengthen Grid Security

Work is ongoing to tighten them up.  The National Institute of Standards and Technology (NIST) has been one agency at the forefront of this evolution. Their created a Smart Grid Framework and recently updated it to version 4.0. The latest iteration includes a new strategy for supporting the development of interoperable devices and provides guidance and resources, so utilities develop effective grid cybersecurity architectures.

In addition, the National Renewable Energy Lab (NREL) created the Advanced Research on Integrated Energy System (ARIES) platform. It allows energy companies to evaluate how items, like electric vehicles, connected buildings, batteries, wind turbines, and solar photovoltaic arrays impact the grid. To match the complexity of modern multilayer transmission systems, the platform is designed for multi-owner power systems and visualizes interdependencies among digital devices and networks. Then, simulation models outline how cybersecurity protocols and solutions work in the new environments.

The emerging work has potential to improve grid cybersecurity but also faces obstacles. These projects are at an early stage of development and therefore may be a bit immature. As noted, the grid is dynamic. Energy companies are under pressure to adopt new technology ASAP. Therefore, utilities may be forced to implement solutions rather than wait for these initiatives to fully take shape, possibility opening themselves up to outsiders.

Energy companies are investing in new technology to improve grid performance. The work is important, complex, and evolving. Suppliers are also creating new tools to help energy companies be sure that they do not inadvertently open up additional security holes as they adopt new technology.