Blockchain Technology for Information Security of the Energy Internet: Fundamentals, Features, Strategy and Application

In order to ensure the information security, most of the important information including the data of advanced metering infrastructure (AMI) in the energy internet is currently transmitted and exchanged through the intranet or the carrier communication. The former increases the cost of network construction, and the latter is susceptible to interference and attacks in the process of information dissemination. The blockchain is an emerging decentralized architecture and distributed computing paradigm. Under the premise that these nodes do not need mutual trust, the blockchain can implement trusted peer-to-peer communication for protecting the important information by adopting distributed consensus mechanisms, encryption algorithms, point-to-point transmission and smart contracts. In response to the above issues, this paper firstly analyzes the information security problems existing in the energy internet from the four perspectives of system control layer, device access, market transaction and user privacy. Then blockchain technology is introduced, and its working principles and technical characteristics are analyzed. Based on the technical characteristics, we propose the multilevel and multichain information transmission model for the weak centralization of scheduling and the decentralization of transaction. Furthermore, we discuss that the information transmission model helps solve some of the information security issues from the four perspectives of system control, device access, market transaction and user privacy. Application examples are used to illustrate the technical features that benefited from the blockchain for the information security of the energy internet.

[1]  Michail Maniatakos,et al.  GPS spoofing effect on phase angle monitoring and control in a real-time digital simulator-based hardware-in-the-loop environment , 2017, IET Cyper-Phys. Syst.: Theory & Appl..

[2]  Yu-Hsiu Lin,et al.  An Advanced Home Energy Management System Facilitated by Nonintrusive Load Monitoring With Automated Multiobjective Power Scheduling , 2015, IEEE Transactions on Smart Grid.

[3]  Sunny Behal,et al.  Detection of DDoS attacks and flash events using novel information theory metrics , 2017, Comput. Networks.

[4]  Raj Jain,et al.  An Internet of Things Framework for Smart Energy in Buildings: Designs, Prototype, and Experiments , 2015, IEEE Internet of Things Journal.

[5]  Juan M. Corchado,et al.  Blockchain Technology: A Review of the Current Challenges of Cryptocurrency , 2019, BLOCKCHAIN.

[6]  Dmitry S. Silnov,et al.  Development and implementation of a Honeypot-trap , 2017, 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus).

[7]  Arshdeep Bahga,et al.  Blockchain Platform for Industrial Internet of Things , 2016 .

[8]  Victor C. M. Leung,et al.  A blockchain-based reputation system for data credibility assessment in vehicular networks , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[9]  Henrik Sandberg,et al.  Challenges in Power System Information Security , 2012, IEEE Security & Privacy.

[10]  Jinghan He,et al.  Development and research on integrated protection system based on redundant information analysis , 2016 .

[11]  Teodor Sommestad,et al.  A quantitative evaluation of vulnerability scanning , 2011, Inf. Manag. Comput. Secur..

[12]  Carles Padró,et al.  Ideal Hierarchical Secret Sharing Schemes , 2010, IEEE Transactions on Information Theory.

[13]  Xuesong Zhou,et al.  An overview on energy internet , 2016, 2015 IEEE International Conference on Mechatronics and Automation (ICMA).

[14]  Wadim Strielkowski,et al.  Internet of Energy (IoE) and High-Renewables Electricity System Market Design , 2019, Energies.

[15]  Lijun Wu,et al.  Democratic Centralism: A Hybrid Blockchain Architecture and Its Applications in Energy Internet , 2017, 2017 IEEE International Conference on Energy Internet (ICEI).

[16]  Haris M. Khalid,et al.  A Bayesian Algorithm to Enhance the Resilience of WAMS Applications Against Cyber Attacks , 2016, IEEE Transactions on Smart Grid.

[17]  Joel J. P. C. Rodrigues,et al.  Low voltage smart meter for monitoring of power quality disturbances applied in smart grid , 2019 .

[18]  Yi Tan,et al.  Autonomous energy community based on energy contract , 2020, IET Generation, Transmission & Distribution.

[19]  Frede Blaabjerg,et al.  A Review of Internet of Energy Based Building Energy Management Systems: Issues and Recommendations , 2018, IEEE Access.

[20]  Ehab Al-Shaer,et al.  Modeling and Management of Firewall Policies , 2004, IEEE Transactions on Network and Service Management.

[21]  Tao Yu,et al.  Energy Internet Access Equipment Integrating Cyber-Physical Systems: Concepts, Key Technologies, System Development, and Application Prospects , 2019, IEEE Access.

[22]  Nicolas Herbaut,et al.  A Model for Collaborative Blockchain-Based Video Delivery Relying on Advanced Network Services Chains , 2017, IEEE Communications Magazine.

[23]  Adrian V. Gheorghe,et al.  Impact assessment of cyber attacks: A quantification study on power generation systems , 2016, 2016 11th System of Systems Engineering Conference (SoSE).

[24]  Sushil Jajodia,et al.  Flexible support for multiple access control policies , 2001, TODS.

[25]  Juan M. Corchado,et al.  Blockchain-Based Architecture: A MAS Proposal for Efficient Agri-Food Supply Chains , 2019, ISAmI.

[26]  Meng Kun,et al.  Information Technology for Energy Internet: A Survey , 2014 .

[27]  Juan M. Corchado,et al.  Legal Aspects and Emerging Risks in the Use of Smart Contracts Based on Blockchain , 2019, KMO.

[28]  Peter Maynard,et al.  Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid , 2016, ICS-CSR.

[29]  Chunxiao Jiang,et al.  Information Security in Big Data: Privacy and Data Mining , 2014, IEEE Access.

[30]  Biplab Sikdar,et al.  Consumer IoT: Security Vulnerability Case Studies and Solutions , 2020, IEEE Consumer Electronics Magazine.

[31]  Peter Xiaoping Liu,et al.  Denial-of-Service (dos) attacks on load frequency control in smart grids , 2013, 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT).

[32]  Changlu Lin,et al.  A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction , 2018, IEEE Access.

[33]  Kai Strunz,et al.  Wind and Solar Power Integration in Electricity Markets and Distribution Networks Through Service-centric Virtual Power Plants , 2018, 2018 IEEE Power & Energy Society General Meeting (PESGM).

[34]  Bamidele Adebisi,et al.  State-of-the-art and prospects for peer-to-peer transaction-based energy system , 2017 .

[35]  Krishnan Manickavasagam,et al.  Intelligent Energy Control Center for Distributed Generators Using Multi-Agent System , 2015, IEEE Transactions on Power Systems.

[36]  Husheng Li,et al.  Time Synchronization Attack in Smart Grid: Impact and Analysis , 2013, IEEE Transactions on Smart Grid.

[37]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[38]  Cong Wang,et al.  Towards trustworthy and private keyword search in encrypted decentralized storage , 2017, 2017 IEEE International Conference on Communications (ICC).

[39]  Yan-Wu Wang,et al.  Peer-to-Peer Energy Sharing Among Smart Energy Buildings by Distributed Transaction , 2019, IEEE Transactions on Smart Grid.

[40]  Shuai Wang,et al.  Blockchain-Enabled Smart Contracts: Architecture, Applications, and Future Trends , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[41]  Davor Svetinovic,et al.  Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams , 2018, IEEE Transactions on Dependable and Secure Computing.

[42]  Hongming Yang,et al.  Distributed Optimal Dispatch of Virtual Power Plant via Limited Communication , 2013, IEEE Transactions on Power Systems.

[43]  Joel J. P. C. Rodrigues,et al.  Energy meters evolution in smart grids: A review , 2019, Journal of Cleaner Production.

[44]  Zhili Sun,et al.  Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems , 2017, IEEE Internet of Things Journal.

[45]  Cong Wang,et al.  Hardening Distributed and Encrypted Keyword Search via Blockchain , 2017, 2017 IEEE Symposium on Privacy-Aware Computing (PAC).

[46]  João P. S. Catalão,et al.  A Decentralized Electricity Market Scheme Enabling Demand Response Deployment , 2018, IEEE Transactions on Power Systems.

[47]  Hui Li,et al.  Proof of Vote: A High-Performance Consensus Protocol Based on Vote Mechanism & Consortium Blockchain , 2017, 2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).

[48]  Mehul Motani,et al.  Detecting False Data Injection Attacks in AC State Estimation , 2015, IEEE Transactions on Smart Grid.

[49]  L.H. Tsoukalas,et al.  From smart grids to an energy internet: Assumptions, architectures and requirements , 2008, 2008 Third International Conference on Electric Utility Deregulation and Restructuring and Power Technologies.

[50]  Wutao Chen,et al.  Distributed sensing and cooperative estimation/detection of ubiquitous power internet of things , 2019 .

[51]  Gaoqi LIANG,et al.  Blockchain: a secure, decentralized, trusted cyber infrastructure solution for future energy systems , 2018, Journal of Modern Power Systems and Clean Energy.

[52]  Sleiman Mhanna,et al.  Adaptive ADMM for Distributed AC Optimal Power Flow , 2019, IEEE Transactions on Power Systems.

[53]  Song Guo,et al.  A Survey on Energy Internet: Architecture, Approach, and Emerging Technologies , 2018, IEEE Systems Journal.

[54]  Massimo Bartoletti,et al.  A Proof-of-Stake Protocol for Consensus on Bitcoin Subchains , 2017, Financial Cryptography Workshops.

[55]  Zhao Yang Dong,et al.  A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.

[56]  Wei Yu,et al.  On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.

[57]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[58]  Christian Rehtanz,et al.  Optimal energy management for the residential MES , 2019, IET Generation, Transmission & Distribution.

[59]  Ravi S. Sandhu,et al.  Peer-to-peer access control architecture using trusted computing technology , 2005, SACMAT '05.

[60]  Jing Zeng,et al.  Research on Cross-Chain Technology Based on Sidechain and Hash-Locking , 2018, EDGE.

[61]  Jong-Hyouk Lee,et al.  Blockchain-based secure firmware update for embedded devices in an Internet of Things environment , 2016, The Journal of Supercomputing.

[62]  Mohamed A. Ahmed,et al.  Design and Implementation of a Blockchain-Based Energy Trading Platform for Electric Vehicles in Smart Campus Parking Lots , 2019 .

[63]  Stamatis Karnouskos,et al.  Stuxnet worm impact on industrial cyber-physical system security , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.

[64]  Alex Pentland,et al.  Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.

[65]  Elaine Shi,et al.  Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).