More dynamics in distribution grids
PV, wind, storage, heat pumps, EVs and the smart meter rollout are increasing the need for observability, automation and faster response in distribution grid operations
BMWE funding under the 8th Energy Research Programme
CloudEnerChain connects IEDs, RTUs, cloud services and grid control technology through an HSM- and TCN-secured interoperability layer, forming an end-to-end chain of trust for KRITIS-compliant grid operations
Project rationale
A continuous chain of trust across substation systems, communications, cloud and control centre is the foundation for secure digital applications in grid operations
36 months
funding period
7 partners
research, software, operations
03EI4113A
BMWE funding
OT, IT, Cloud
secure interfaces across the stack
Context
CloudEnerChain addresses the point where more IEDs, more cloud connectivity and KRITIS-compliant cybersecurity are simultaneously required and existing approaches reach their limits
PV, wind, storage, heat pumps, EVs and the smart meter rollout are increasing the need for observability, automation and faster response in distribution grid operations
Across IEDs, RTUs, SCADA systems and cloud platforms, many environments still lack continuous open information models. Proprietary solutions make cross-vendor interoperability harder
In critical energy infrastructure, identity, integrity and authenticity must be verifiable across the full communication chain. Point solutions such as gateways or VPNs are not enough on their own
Inside the test environments
These environments represent key levels in power grids, from secondary systems and substation control technology to control rooms and digitally supported operations.
The project focuses on making data flows and digital functions secure, reliable and interoperable across these layers
Connecting the field level
The test hall represents the physical infrastructure of the power grid. It is where the interaction between digital components and existing assets begins
A central question is how operational data can be captured reliably and prepared for further use
Information where it is needed
In the control room, system states, warnings and recommendations need to arrive reliably. This is where digital information has to prove its value in day-to-day operations
That requires trustworthy data and digital applications that support grid operations in a meaningful way
Trying out digital functions safely
Before new digital functions are used in operational contexts, they need to be evaluated in a protected setting. These environments help assess interaction, timing and system behaviour at an early stage
This makes it possible to examine interoperability, security and reliability before later deployment
Visibility at substation level
Digital secondary substations stand for the point where information from the distribution grid is consolidated and transferred into higher-level systems
They stand for the transition from substation data to a shared interoperability layer and operational applications
Image motifs from the testing infrastructures of the Fraunhofer Center for Digital Energy. Source: Fraunhofer Center for Digital Energy, predominantly © Martin Braun. Source: Fraunhofer page
State of the art and novel approach
IEDs, RTUs, SCADA systems, cloud platforms and IoT devices communicate via protocols such as IEC 61850 and IEC 60870-5-104. Growing digitalisation and bidirectional data exchange raise requirements for interoperability, IT security and verifiable end-to-end communication integrity across all system boundaries.
Modern power grids connect secondary systems (IEDs, RTUs), substation control technology, SCADA systems and cloud platforms via protocols such as IEC 61850, IEC 60870-5-104 and MQTT. Security and information models are often still vendor-specific and poorly interoperable. Vendor lock-in still limits end-to-end solutions
Gateways, firewalls and VPN links can secure individual segments, but they do not create a consistent, verifiable end-to-end level of trust from the field endpoint via cloud services to the control centre. Missing open standards deepen this structural security gap
CloudEnerChain combines an interoperability layer with a vendor-agnostic metadata model (IEC 61850/61970), HSM-based trust anchors and TCN integration. AI-powered monitoring and endpoint attack detection complete the approach into a holistic end-to-end security architecture
What the project is about
The research combines security architecture, interoperability, monitoring, digital applications, data infrastructures and transferability into one coherent picture.
Work structure
Five work packages connect security architecture, interoperability, monitoring, digital applications, data infrastructures and transferability.
A cloud-based interoperability layer with a technology-open metadata model based on IEC 61850 and IEC 61970 connects heterogeneous system landscapes, including IoT, smart metering and secondary systems, without proprietary dependencies or vendor lock-in
Hardware Security Modules (HSM) and Trusted Core Networks (TCN) establish an end-to-end secured, continuously verifiable chain of trust from the field endpoint to the control centre, complemented by Secure-by-Design architectures and endpoint detection and response mechanisms
IoT platforms, smart meter gateway administration (SMGWA) and edge computing enable scalable, real-time-capable data processing that meets regulatory requirements without compromising IT security or data sovereignty
AI-based anomaly detection, real-time load management and flexible resource control are developed as concrete value-added services, tested in simulation, lab and field environments, and evaluated for transferability across different grid contexts
An AI-powered assistance system monitors grid status in real time, detects IT security events and anomalies early, and generates concrete action recommendations for control room operators to respond effectively
All architecture components and services are designed for regulatory compliance and cross-sector transferability. Project results are documented as a replicable blueprint for secure digitalisation across the energy sector
From challenge to solution
Threat modelling, requirements analysis and security architecture based on real-world KRITIS energy scenarios. Attack vectors are identified and the Secure-by-Design concept for the full system landscape is established
Data flows and interfaces are designed using open protocols (IEC 61850, IEC 60870-5-104, MQTT) and a vendor-agnostic interoperability data model. TCN anchors security across the communication chain
HSM and TCN are integrated into field devices, cloud components and control systems. An AI-powered monitoring and assistance system detects anomalies early and generates preventive and reactive action recommendations
Cloud-based value-added services for real-time load management and flexibility control of distributed resources are developed as proof-of-concept and assessed for regulatory compliance
Architecture and services are evaluated in simulation, lab and real field test environments at operational grid operators for practicability, scalability and transferability across grid contexts
Expected project results
A technology-open metadata model based on IEC 61850/IEC 61970 and standardised interfaces reduce integration effort, prevent vendor lock-in and enable seamless data exchange between IEDs, SCADA systems and cloud platforms across system and organisational boundaries
HSM-based trust anchors, TCN implementation and AI-powered anomaly and attack detection at critical endpoints (RTUs, gateways) increase resilience of KRITIS infrastructure against targeted cyberattacks and compromised devices in the field
Monitoring and assistance systems with aggregated real-time data, together with value-added services for load management and flexibility control of distributed resources, deliver concrete operational benefits, validated in real field test environments at urban grid operators
Project consortium
Partners at a glance
The consortium combines research expertise, platform development and operational perspectives
Research partners contribute IT security, simulation and data-model expertise for digital power grids
Software and technology partners contribute platforms, interfaces and grid control systems
Grid-operator partners contribute operational requirements, practical constraints and transferability into operations
News
During the kick-off on March 10 and 11, 2026, in Aachen, the consortium aligned on shared goals, practical relevance and the next steps toward secure, interoperable digitalisation in power grids.