• Gemalto is now part of the Thales Group, find out more.

The Evolving Smart Energy Ecosystem


The way the world produces and consumes energy is changing fast. Sustainable energy sources such as solar and wind are on the rise. Smart meters​ have become an industry standard and deployments are growing across the globe. Hybrid and electric vehicles have gone mainstream giving rise to a new breed of powerful car batteries capable of storing and sharing energy. In addition, the Internet of Things (IoT) is enabling compelling new business models that support an increasingly complex energy infrastructure.

How is the IoT driving change in the energy ecosystem?

We're in the midst of an exciting smart energy transformation. New stakeholders are joining the energy marketplace as they install solar panels on homes and businesses and purchase electric vehicles where power is stored. The IoT is a key driver of this smart grid​ evolution, enabling innovative ways to leverage devices, data and remote access to create new business opportunities for a variety of stakeholders. The trouble is, the supporting power infrastructure is stuck in the past. To capitalize on the new energy landscape and “Uberize” power production and consumption, the physical grid needs to evolve. Without it, the world will never realize the “Internet of Energy” and the full potential of the smart energy ecosystem. 

How does the energy infrastructure need to evolve in order to "uberize" energy?

It's a tall order to evolve a well-established, 100+ year old industry! From a commercial perspective, many of the current energy processes and rules are too complicated and lengthy for the new data-driven, decentralized energy landscape. Energy plans and agreements are defined in a rather rigid, process-led environment, where all actors and regulators must agree, and market roles are tightly defined, as they have been for decades. Unfortunately, the existing system does not incentivize evolving business models.

However, integrating new sustainable distributed energy resources (DER) into the existing grid, which is designed to distribute centrally generated energy, is as appealing as it is challenging. Tapping energy from renewable sources is generally more cost effective than generating energy from fossil or nuclear sources, which makes the trend very compelling; and once started, irreversible.

So, what needs to change for this exciting evolution to occur? It's a marathon, not a sprint and it involves changes on many levels. To better understand, let's examine changes one step at at time.

Separating the physical infrastructure and IoT solution management is essential

Currently, grid operators control the entire energy transaction environment, collecting money from millions of households and then distributing funds to the power plants. Unfortunately, this system has no way of including and making use of regional, distributed intelligence provided by new energy assets and the IoT. There is a growing need to decouple providing copper lines and power from the gathering of information from new assets like solar panels on the grid's edge. In other words, we are moving toward divorcing the way we finance physical infrastructure from the management of energy data and IoT deployments that enable intelligence in the field.

A more flexible infrastructure can bring in added revenues for both operators and asset owners. As people buy energy assets for their own homes and buildings, they are becoming more independent from the energy infrastructure in the process. Consequently, patterns of grid use are changing and operators are becoming consumers of big data users without being obliged to gather and manage all the data originating on the consumer side. This is an important evolution because operators are now able to aggregate information from many sources and use artificial intelligence (AI) for predictive maintenance, outage prevention and improved quality of service.


It all depends on trusting the IoT to drive the Internet of energy

The IoT and connectivity are at the center of ecosystem evolution and both must be trusted. By connecting meters and new assets to the Internet, ecosystem participants are able to use their own energy assets to become part of the revenue stream. This brings clear benefits for energy providers, enabling operators to manage over- and under-capacity in a more intelligent way – and therefore avoid extensive investment in grid capacity. However, it's crucial that grid operators trust the data they receive from these assets. The information offered by new entrants needs to be as reliable as the data produced by a grid asset that operates under full control and ownership of a grid operator.

If data is trusted and connected devices are properly protected against fraud, sustainable energy consumption can be better incentivized bringing more opportunities to "green up" energy production and consumption and imp​​​​​​rove our world. With trusted data, grid operators can identify participants taking care to adapt their usage to availability of local energy generation and reward them appropriately.

What are the security challenges specific to evolving smart energy?

For a flexible smart energy system to be successful, we need end-to-end security and privacy designed into the ecosystem to create a sustainable, trusted transaction environment. Multiple layers of digital security are required to achieve this goal including:

  1. Building a trusted and flexible transaction environment
  2. Strong encryption and secure authentication for data, devices, networks and platforms
  3. Trusted key provisioning
  4. Security life cycle management

All data flowing through the system needs strong encryption and authentication technology to ensure integrity. As the smart energy market grows increasingly complex, many different stakeholders and actors need access to encrypted data. And each party needs access to different data sets. In order for this to occur, the identity of each stakeholder needs to be authenticated and verified. Ecosystem participants need to trust implicitly that players are who they say they are.

And once authenticated, players need keys to access specific data required to play their part in the ecosystem. For instance, a homeowner needs access to their own energy usage and production information along with certain data from grid operators. Grid operators, on the other hand, need access to energy use and production data from all homeowners in a specific region as well as substations and other equipment. These access rights are dependent on security policies and keys that are provisioned throughout the ecosystem and over time.

These policies and access rights need to be securely managed and updated over time without expensive service visits to update meters and equipment in the field. For instance, when a new homeowner moves into a home with a solar installation, that person needs to be able to manage their energy usage and production quickly and easily.

In addition to all this, the ecosystem needs a flexible and trusted transaction environment that is visible to all parties involved in the transaction.

So, how do we address the four levels of security goals for the evolving smart energy ecosystem? Let's break it down by level.

How do we ensure a trusted and flexible transaction environment? 

This could be achieved through the advantages of blockchain technology and advanced ID management solutions for assets, platforms and people. Blockchain itself is the trust building entity for processing Information allowing users to see and fundamentally trust data that devices publish to the blockchain. Also important in building end-to-end trust is authenticating the source and integrity of the data that is inserted into the blockchain.

What is blockchain?

Blockchain is an example of a distributed public ledger; that is, a shared record system for transactions. It's been described as "a technology that allows people who don't know each other to trust a shared record of events".

The idea is that every authorized party involved in a particular type of transaction holds a copy of the entire ledger; there are no centralized databases. Anyone can enter a transaction onto the system, and at regular intervals these transactions are batched together into "blocks." The blocks are then formed into "chains" (hence the name) using cryptographic technology that provides high levels of security. The chronological chain of transactional information is created in such a way that each block added protects the information in the previous one. This ensures that no party in the system has the ability to modify or tamper with the data, thus guarding against fraud, theft, hacking and other misdemeanors.


How are transactions secured by blockchain?

In situations where energy assets are operated in a decentralized manner and use of them can be "Uberized" (meaning at times, use of the asset will be offered to people who ask for it versus for the owner's sole benefit), blockchain offers a cost-effective way for smart contract-based transactions with the flexibility and scalability needed for energy management. For instance, in a shared property like an apartment building, individual tenants might wish to be charged separately for their energy consumption. With blockchain technology as a central part of the system, transactions no longer need to be based on pre-defined data exchange and settlement processes. Blockchain can also support micro-transactions between individuals, a necessary component of the new Internet of Energy.

How do we protect devices, data, networks and platforms?

Another requirement of a trusted and successful shared energy economy is that device, data, networks and platforms are secure and protected across the entire ecosystem – including sensors, meters, transactions and backend systems. Operators currently calculate revenues based on data from closed meters in millions of households. They need to trust that the data they receive from millions of customers, as well as from privately owned energy assets, is accurate and reliable. Blockchain technology alone can't prevent original data from being manipulated or compromised before it is communicated over the Internet. For that, basic security infrastructure comprised of hardware and software is needed to protect the system from physical and digital tampering.

What hardware is needed for end-to-end security architecture?

Hardware components known as Hardware Security Modules (HSMs) and Secure Elements (SEs) can be embedded in connected energy systems providing an added layer of protection, data integrity and defense against cyber-attacks. Secure Elements ensure that device data is stored in a safe place and that access is granted only to authorized applications and people. It also enables over-the-air management of security credentials, software updates and evolving security capabilities across the lifecycle of solutions – another essential element to a trusted ecosystem.

What software is needed for end-to-end security architecture?

Strong encryption and authentication that uses well-vetted algorithms and end-to-end security solutions is paramount to success of the ecosystem. These solutions protect energy equipment and smart metering devices as well as secure networks while preventing fraud in the system. The solutions must adhere to state-of-the-art security principles that have been proven in other industries including government and banking. These solutions can safeguard the integrity of energy assets, applications that access them and the networks that transfer data via mutual authentication, integrity protection and confidentiality. A trusted transaction environment, secured by strong authentication hardware and software and a trusted key manager must replace the current process-led landscape. This will ensure that data is received from a legitimate source while safeguarding against data tampering and fraud at all points in the ecosystem. In addition, secure technology is needed to facilitate dynamic key and credential updates and authorizations, without costly service visits to update equipment in the field.

What does Gemalto have to offer the Smart Energy market?

A lot!  Leveraging decades of IoT and digital security expertise, Gemalto offers a suite of technology solutions to Connect, Secure and Monetize the evolving smart energy​ ecosystem. 

Contact us today using the form below.​