Securing Real-Time AI in Critical Infrastructure

How DeltaGrid Energy's network of Smart Meters, substations, edge IoT devices (PLCs, SCADA gateways, line monitors), and AI-driven control applications (hosted across AWS, Azure, and on-prem K3s clusters) were secured with Hopr's Korvette WoSPs.

A graphic brand icon for the Korvette WoSP from Hopr.co with the tagline 'a workload security proxy for kubernetes endpoints'
Korvettes are Workload Security Proxies (WoSPs) designed and built to rigorously defend critical infrastructure devices and applications across clouds and organizational domains.

CASE STUDY:
DeltaGrid Energy — Securing Realtime AI in IoT Infrastructure

In 2024, the energy sector saw a dramatic 70% surge in cyberattacks compared to the previous year. Infrastructure managers and operators like DeltaGrid Energy faced a new wave of cyber threats
that probed and attacked sensitive IoT devices, API endpoints, and AI control applications.

API Credential Theft
98% of workloads at DeltaGrid were talking over APIs. And the API endpoints leaked data due to key theft. Third party API users were the most vulnerable.
Session Hijacking
API Key theft was just the beginning. AI adversaries were discovering and weaponizing microservice communications in real time.
Third Party Access
Operating across AWS, Azure, and on-prem Kubernetes clusters gave DeltaGrid the real-time operating agility it needed — but it left it too exposed.

Hopr's Korvette™ WoSPs enable DeltaGrid Energy to secure its IoT devices, APIs, and AI applications without a loss of agility

Graphic icon of workload credential rotation
Cloud Native AMTD
Workloads performing sensitive financial transactions and risk modelling are protected from untrusted or malicious access. Untrusted access attempts are immediately discovered and rejected.
Ephemeral Credentials
Access credentials to application workloads requires ephemeral credentials that can only be known by trusted workloads. Threats can't find and re-use credentials — they’re obsolete when the session closes.
Graphic icon depicting network of interconnected nodes
Seamless Networking
IoT networks operate with frequent identity trust verification that enables seamless connectivity among device workloads in different environments — even with third parties.

AI Control for Dynamic Load Shedding

DeltaGrid uses real-time AI to detect energy usage. During a heat wave the AI reads data spikes and remotely instructs smart meters and HVAC control devices to reduce load in high-risk zones to prevent transformer overload.
API Threat Protection Icon
01
Data Collection via APIs

DeltaGrid collects data from smart meters and environmental sensors across the grid which continuously send telemetry (e.g., voltage, current, temperature, usage patterns) to DeltaGrid’s AI model hosted on AWS. The data is transmitted via APIs using static tokens or long-lived identity certificates, vulnerable to credential theft and session hijacking.

motorcycle with sidecar
02
AI Inference and Decisions

The AI model analyzes the data telemetry to predict hotspots or transformer stress points. It generates an automated decision to initiate load reduction in specific zones — targeting devices like thermostats or meters. Without real-time identity trust verification of API endpoints malicious data could be used when it arrives with a compromised token.

app with sidecar
03
Command Dispatch to Systems

Based on the decisions of its AI application, the DeltaGrid control system sends API instructions back to specific customer smart meters and connected devices to reduce the load or shift usage. Without identity trust verification, attackers could redirect or forge control commands, causing physical disruption or service denial.

app with sidecar tested
04
Acknowledgement and Feedback

The DeltaGrid smart meters and IoT devices acknowledge the command, and send updated operational status back to the AI system for ongoing analysis in a continuous feedback loop. A compromised or cloned IoT device can send false feedback without ephemeral identity verification and encrypted, tamper-evident telemetry, the system can be gamed.

Benefits for IoT Infrastructure

Exfiltrated API credentials 

Eliminate Cyber Risk. Korvette WoSPs defend critical infrastructure IoT devices from tampering and immediately recognize, log, and reject untrusted attempts to access a sensitive IoT device.

Exfiltrated API credentials 

Enforce Zero Trust by Default. Each API data transaction includes realtime identity trust verification and dynamic access credentials to ensure a high level of trust before data is shared.

Exfiltrated API credentials 

Stronger Security Posture. Prevent credential theft and abuse with hopping credentials that make it nearly impossible for attackers to discover or exploit workload access and API endpoints.

Exfiltrated API credentials 

Improved Compliance. Simple automation with built-in audit logs and immediate threat detection and rejection help meet regulatory and safety  requirements.
IoT Access Control and Data Protection

DeltaGrid Energy's Solution — the Korvette

DeltaGrid Energy operates critical energy infrastructure across multiple US States and has a growing number of AI applications to process large amounts of sensor data and adjust control systems in real-time to avoid loss of service.
They deployed Korvette-S WoSPs within their cloud environments, and Korvette-SE WoSPs at the edge with customers and other energy networks to build a Zero Trust network.

Korvette Application Network

Korvette WoSPs, designed for the Zero Trust era, assured secure and trusted internal and edge API transactions.

Traditional API Protection

DeltaGrid Energy's API protections could not verify identity trust, nor prevent AI-attacks that abused stolen API keys.

Abstract graphic icon of a naval corvette within a Kubernetes hexagon

Designed for IoT.
Ready for the Future.

Whether you’re connecting Energy, Water, Communications, or other critical infrastructure, Hopr's Korvette delivers secure, compliant, and future proof protection.
Assure control of your IoT and data.
Shrink your attack surface.
Guaranteed data confidentiality.
icon of a smart phone

Schedule a Demo and Learn More About the Korvette

Schedule a demo of the Korvette to learn more about its advantages and discuss your use case during a short call with one of our experts.
Schedule a Call