Distributed Blockchain-Based Data Protection Framework for Modern Power Systems Against Cyber Attacks

The cyber security of modern power systems has drawn increasing attention in both academia and industry. Many detection and defense methods for cyber-attacks have therefore been proposed to enhance robustness of modern power systems. In this paper, we propose a new, distributed blockchain-based protection framework to enhance the self-defensive capability of modern power systems against cyber-attacks. We present a comprehensive discussion on how blockchain technology can be used to enhance the robustness and security of the power grid, by using meters as nodes in a distributed network which encapsulates meter measurements as blocks. Effectiveness of the proposed protection framework is demonstrated via simulation experiments on the IEEE-118 benchmark system.

[1]  Karl J. O'Dwyer,et al.  Bitcoin mining and its energy footprint , 2014 .

[2]  John Domingue,et al.  The Blockchain and Kudos: A Distributed System for Educational Record, Reputation and Reward , 2016, EC-TEL.

[3]  F. Cleveland Enhancing the Reliability and Security of the Information Infrastructure Used to Manage the Power System , 2007, 2007 IEEE Power Engineering Society General Meeting.

[4]  Michael Bedford Taylor,et al.  Bitcoin and the age of Bespoke Silicon , 2013, 2013 International Conference on Compilers, Architecture and Synthesis for Embedded Systems (CASES).

[5]  Siddharth Sridhar,et al.  Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.

[6]  Salil S. Kanhere,et al.  Blockchain in internet of things: Challenges and Solutions , 2016, ArXiv.

[7]  Chen-Ching Liu,et al.  Cyber security of a power grid: State-of-the-art , 2018, International Journal of Electrical Power & Energy Systems.

[8]  Kaamran Raahemifar,et al.  A survey on Advanced Metering Infrastructure , 2014 .

[9]  Song Tan,et al.  Online Data Integrity Attacks Against Real-Time Electrical Market in Smart Grid , 2018, IEEE Transactions on Smart Grid.

[10]  Khosrow Moslehi,et al.  Power System Control Centers: Past, Present, and Future , 2005, Proceedings of the IEEE.

[11]  Zhao Yang Dong,et al.  A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.

[12]  Xin Zhang,et al.  Cloud-Based Information Infrastructure for Next-Generation Power Grid: Conception, Architecture, and Applications , 2016, IEEE Transactions on Smart Grid.

[13]  Wei Yu,et al.  On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.

[14]  Zhao Yang Dong,et al.  Generalized FDIA-Based Cyber Topology Attack With Application to the Australian Electricity Market Trading Mechanism , 2018, IEEE Transactions on Smart Grid.

[15]  Jacob Mendel,et al.  Smart Grid Cyber Security Challenges: Overview and Classification , 2017 .

[16]  Zhao Yang Dong,et al.  The 2015 Ukraine Blackout: Implications for False Data Injection Attacks , 2017, IEEE Transactions on Power Systems.

[17]  Eduardo Castelló Ferrer The blockchain: a new framework for robotic swarm systems , 2016, Proceedings of the Future Technologies Conference (FTC) 2018.

[18]  Jin Wei,et al.  Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism , 2017, IEEE Transactions on Smart Grid.

[19]  David M. Nicol,et al.  Prevention of malware propagation in AMI , 2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[20]  An Analysis of Attacks on Blockchain Consensus ( DRAFT ) , 2016 .

[21]  Lang Tong,et al.  Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.

[22]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[23]  G. Manimaran,et al.  Cyber Attack Exposure Evaluation Framework for the Smart Grid , 2011, IEEE Transactions on Smart Grid.

[24]  Davor Svetinovic,et al.  Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams , 2018, IEEE Transactions on Dependable and Secure Computing.

[25]  David J. Hill,et al.  Improving Nonintrusive Load Monitoring Efficiency via a Hybrid Programing Method , 2016, IEEE Transactions on Industrial Informatics.

[26]  Praveen Gauravaram,et al.  Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[27]  Zhao Yang Dong,et al.  A Framework for Cyber-Topology Attacks: Line-Switching and New Attack Scenarios , 2019, IEEE Transactions on Smart Grid.

[28]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[29]  Husheng Li,et al.  Time Stamp Attack in Smart Grid: Physical Mechanism and Damage Analysis , 2012, ArXiv.

[30]  JooSeok Song,et al.  Trend of centralization in Bitcoin's distributed network , 2015, 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).

[31]  Zuyi Li,et al.  Impacts of Bad Data on the PMU based Line Outage Detection , 2015, ArXiv.

[32]  Lin Zhang,et al.  Design, Testing, and Implementation of a Linear State Estimator in a Real Power System , 2017, IEEE Transactions on Smart Grid.

[33]  Chan-Nan Lu,et al.  A Review on Distribution System State Estimation , 2017, IEEE Transactions on Power Systems.

[34]  Yongtae Shin,et al.  A security mechanism of Smart Grid AMI network through smart device mutual authentication , 2014, The International Conference on Information Networking 2014 (ICOIN2014).

[35]  Shiyan Hu,et al.  Preventive Maintenance for Advanced Metering Infrastructure Against Malware Propagation , 2016, IEEE Transactions on Smart Grid.

[36]  Amin Khodaei,et al.  State-Of-The-Art in Microgrid-Integrated Distributed Energy Storage Sizing , 2017 .

[37]  Trong Nghia Le,et al.  Advanced Metering Infrastructure Based on Smart Meters in Smart Grid , 2016 .

[38]  Lingfeng Wang,et al.  Smart meters for power grid — Challenges, issues, advantages and status , 2011 .

[39]  Lang Tong,et al.  On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures , 2013, IEEE Journal on Selected Areas in Communications.

[40]  Jiongcong CHEN,et al.  Impact analysis of false data injection attacks on power system static security assessment , 2016 .

[41]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[42]  Zuyi Li,et al.  Optimal Protection Strategy Against False Data Injection Attacks in Power Systems , 2017, IEEE Transactions on Smart Grid.

[43]  Marc Pilkington,et al.  Blockchain Technology: Principles and Applications , 2015 .

[44]  Athanasios V. Vasilakos,et al.  False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey , 2017, IEEE Transactions on Industrial Informatics.

[45]  Sunny King,et al.  PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .

[46]  F.M. Cleveland,et al.  Cyber security issues for Advanced Metering Infrasttructure (AMI) , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[47]  H. T. Mouftah,et al.  Secure multipath routing for AMI network in Smart Grid , 2012, 2012 IEEE 31st International Performance Computing and Communications Conference (IPCCC).

[48]  Zuyi Li,et al.  Local Topology Attacks in Smart Grids , 2017, IEEE Transactions on Smart Grid.

[49]  Bruno Sinopoli,et al.  Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.