2018/7/28 GridMonitoring: Secured Sovereign Blockchain based Monitoring on Smart Grid Authors: Jian-Bin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah,

Slides:



Advertisements
Similar presentations
OmniRAN Smart Grid use case Document Number: Omniran Date Submitted: Source: Max Riegel Nokia.
Advertisements

3 rd SG13 Regional Workshop for Africa on “ITU-T Standardization Challenges for Developing Countries Working for a Connected Africa” (Livingstone, Zambia,
A Double-Efficient Integrity Verification Scheme to Cloud Storage Data Deng Hongyao, Song Xiuli, Tao jingsong 2014 TELKOMNIKA Indonesian Journal of Electrical.
A Survey of Home Energy Management Systems in Future Smart Grid Communications By Muhammad Ishfaq Khan.
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
Omniran ZigBee SEP2 Smart Grid Use Case Analysis Date: Authors: NameAffiliationPhone Max RiegelNSN
Omniran ZigBee SEP2 Smart Grid Use Case Analysis Date: Authors: NameAffiliationPhone Max RiegelNSN
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid Haiyong Bao Nanyang Technological University June.
IEEE PSES Chapter May 18,  A smart grid delivers electricity from suppliers to consumers using two-way digital technology to control appliances.
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR GUIDED BY PROJECT MEMBERS: Ms. V.JAYANTHI M.E Assistant Professor V.KARTHIKEYAN.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Yaxin Hu 2.8 SUMMARY. Outline Summary of different sections of chapter 2 Recent research papers Future works/predictions.
SecureMR: A Service Integrity Assurance Framework for MapReduce Author: Wei Wei, Juan Du, Ting Yu, Xiaohui Gu Source: Annual Computer Security Applications.
PR SM A Secure Code Deployment Scheme for Active Networks Amdjed Mokhtari Leïla Kloul 22 November 2005.
Charging Electric Vehicles in a Liberalized Electricity Market Danny Geldtmeijer MSc Netbeheer Nederland / Enexis.
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
Copyright © 2003 Jorgen Thelin / Cape Clear Software 1 A Web Services Security Framework Jorgen Thelin Chief Scientist Cape Clear Software Inc.
Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,
Author : Peng Han, Jinkuan Wang, Yinghua Han, and Qiang Zhao Source : 2012 IEEE International Conference on Information Science and Technology Wuhan, Hubei,
Block Chain 101 May 2017.
When BPM meets Blockchain
The Revolutionary Benefits Of Blockchain
Training for developers of X-Road interfaces
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLOUD COMPUTING
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy Source: Computer & Security,
Outlines Overview (what is smart grid) Smart City (Test bed)
Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data Source : IEEE INFOCOM IEEE International Conference on Computer Communications,
Towards an optimized BlockChain for IoT
Efficient Time-Bound Hierarchical Key Assignment Scheme
Blockchain initiatives
Blockchain beyond cryptocurrencies
BY GAWARE S.R. DEPT.OF COMP.SCI
Chair Professor Chin-Chen Chang Feng Chia University
Digital Signature.
Authors: Wei-Chi KU, Hao-Chuan TSAI, Maw-Jinn TSAUR
Privacy Preserving Ranked Multi-Keyword
Blockchain Adrian Zaragoza.
{ BLOCKCHAIN Technology. BSEtecBSEtec is a digital solution provider company which offers the best service with the implement of the latest technologies.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Smart Grid Market to reach $70bn by 2024: Global Market Insights Inc.
BLOCKCHAIN AND THE FUTURE OF DAM
The World’s first Public Chain
BLOCKCHAIN BASICS & LEGAL ISSUES
XinFin Blockchain for global Trade and Finance
A Secure and Efficient Cloud Resource Allocation Scheme with Trust
A Secure and Efficient Cloud Resource Allocation Scheme with Trust
Distributed Ledger Technology (DLT) and Blockchain
Speaker: Jin-Wei Lin Advisor: Dr. Ho-Ting Wu
Source : IEEE Access, Vol. 6, pp , Jan. 2018
2018/7/28 GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid Authors: Jianbin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah,
A Novel Latin Square-based Secret Sharing for M2M Communications
Blockchain Concepts RISK FORUM 2017 Hash function (e.g. SHA-256)
Resilient Information Architecture Platform for Smart Grid
RBAC-SC: Role-Based Access Control Using Smart Contract
Decentralized Energy Demand Regulation in Smart Homes
Controllable and Trustworthy Blockchain-based Cloud Data Management
Source: IEEE Access, Vol. 5, pp –14767, July 2017.
Source: Energies, Vol. 10, No. 12, November 2017
Smart Meter Data Privacy: A Survey
Scalable and Privacy-preserving Design of On/Off-chain Smart Contracts
Renovating Blockchain with Distributed Database: An Open Source System
Privacy Protection for E-Health Systems by
ELEC-E Smart Grid Smart Meters and Security Issues
Blockchain Tech Big Picture
Blockchain Tech Big Picture
A lightweight authentication scheme with privacy protection for smart grid communications Source: Future Generation Computer Systems Volume 100, November.
Presentation transcript:

2018/7/28 GridMonitoring: Secured Sovereign Blockchain based Monitoring on Smart Grid Authors: Jian-Bin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah, Abla Smahi, Qi Xia, Hu Xia, Xiao-Song Zhang, and Gui-Shan Dong Source: IEEE Access, Vol. 6, pp. 9917-9925, 27 Feb. 2018 Speaker: Kai-Fan Chien Date: 2018/9/20

Outline Introduction Preliminaries Design Formulation Design Approach 2018/7/28 Outline Introduction Preliminaries Design Formulation Design Approach Smart Contracts and Sovereign Blockchain Design Discussion Conclusions

2018/7/28 Introduction(1/2) Smart grid & Smart home 52147

!!! +$ Introduction(2/2) ??? The data can be compromised. 2018/7/28 Introduction(2/2) The data can be compromised. Billing(usually month) Details of billing are not revealed to consumers. They don’t know which electrical appliances consume more power. !!! +$ ??? 52147

Preliminaries(1/2) Sovereign Blockchain Network 2018/7/28 Preliminaries(1/2) Sovereign Blockchain Network Processing and Consensus Nodes Node Verification Blockchain Node Meter ID House number Area code Consumer information Block

+ A B C Preliminaries(2/2) 10 $ 20 $ 30 $ Smart contract .sol Compile Local Bytecode Deploy Contract Ethereum

Design Formulation(1/5) 2018/7/28 Design Formulation(1/5) User Layer The User Layer comprises all the entities who access electricity from the utility company.

Design Formulation(2/5) 2018/7/28 Design Formulation(2/5) Data Processing and Monitoring Layer Help in processing all the data sent to the smart grid network.

Design Formulation(3/5) 2018/7/28 Design Formulation(3/5) Registration and Authentication Layer Comprises of the registrar and the authenticator. Unique ID is generated for the user. Authenticated by the authenticator using this unique ID.

Design Formulation(4/5) 2018/7/28 Design Formulation(4/5) Smart Contract Identify malicious usage of electrical power and electrical data. Smart Contracts Database This is a report violation storage and action center on the sovereign blockchain network.

Design Formulation(5/5) 2018/7/28 Design Formulation(5/5) Energy Center The power is later distributed to clients on the network based on tariffs paid per month. Data Center Research purposes.

Design Approach(1/2) Registration and Authentication Layer 2018/7/28 Design Approach(1/2) Registration and Authentication Layer User’s meter ID is generated and the data is shared with the authenticator. Area code of where the user resides is added and then linked to a smart meter. The user is given access to electricity. 1. Requests 2. Meter ID 4. Meter ID 5. Electricity 3. Area code 2. Meter ID Processing and Consensus Nodes

Design Approach(2/2) Smart Meter Processing and Consensus Nodes Node 2018/7/28 Design Approach(2/2) Smart Meter Processing and Consensus Nodes Node Verification 52147 Meter readings Node Blockchain

Smart Contracts and Sovereign Blockchain Design(1/3) 2018/7/28 Smart Contracts and Sovereign Blockchain Design(1/3) Smart Contracts Design Report the state of data on the smart meter. Violations on consumer data that happens on the smart grid network. Send reports to the smart grid network. Also leave alert messages on the screen of the smart meter for the consumer.

Smart Contracts and Sovereign Blockchain Design(2/3) 2018/7/28 Smart Contracts and Sovereign Blockchain Design(2/3) Parent Block Structure The block header is hashed with SHA-256 as done in the Bitcoin headers. Time to purchase power (TTP) Time to process the transaction (TPT) Time power starts reading (TPR) Time power reaches threshold value (TPRT) Time power gets finished (TPF) Meter ID (MID) House number (HN) Amount of power purchased (APP) Processing node ID (NID) Signature of processing node (Nsig)

Smart Contracts and Sovereign Blockchain Design(3/3) 2018/7/28 Smart Contracts and Sovereign Blockchain Design(3/3) Side Block Structure A side block is made of a format and this format is derived by appending a section of the main blocks ID to an ID generated by consensus nodes to the side block. Timestamp of violation (TSV) Timestamp of state of smart meter (TSM) Meter ID (MID) House number (HN) Type of violation (TVLN) Processing node ID (NID) Processing node signature (Nsig)

Discussion(1/3) Information sharing Efficient data manageability 2018/7/28 Discussion(1/3) Information sharing Efficient data manageability Data immutability Data immutability refers to the data being unalterable. Blockchain Customer control This metric refers to customers being able to control their power usage.

Discussion(2/3) Data integrity Data provenance and auditing 2018/7/28 Discussion(2/3) Data integrity By blockchain. Data provenance and auditing Smart contracts.

2018/7/28 Discussion(3/3) [19] S. Rusitschka, K. Eger, C. Gerdes, "Smart grid data cloud: A model for utilizing cloud computing in the smart grid domain",  Proc. 1st IEEE Int. Conf. Smart Grid Commun., pp. 483-488, Oct. 2010. [20] A. R. Metke, R. L. Ekl, "Security technology for smart grid networks", IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 99-107, Jun. 2010. [21] M. Mylrea, S. N. G. Gourisetti, "Blockchain for smart grid resilience: Exchanging distributed energy at speed scale and security",  Proc. Resilience Week, pp. 18-23, 2017. [22] F. Ye, Y. Qian, R. Q. Hu, "An identity-based security scheme for a big data driven cloud computing framework in smart grid",  Proc. IEEE Global Commun. Conf. (GLOBECOM), pp. 1-6, Dec. 2014.

Conclusions Sovereign blockchain-based system and smart contracts. 2018/7/28 Conclusions Sovereign blockchain-based system and smart contracts. This model enhances the transparency.