2018/7/28 GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid Authors: Jianbin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah,

Slides:



Advertisements
Similar presentations
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Advertisements

Cryptography and Network Security
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Public Key Management and X.509 Certificates
Public Key Infrastructure Ben Sangster February 23, 2006.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
Chapter 8 Web Security.
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
Secure Electronic Transaction (SET)
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid Haiyong Bao Nanyang Technological University June.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Chapter 21 Distributed System Security Copyright © 2008.
Csci5233 computer security & integrity 1 Cryptography: an overview.
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
Copyright © 2003 Jorgen Thelin / Cape Clear Software 1 A Web Services Security Framework Jorgen Thelin Chief Scientist Cape Clear Software Inc.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Privacy Issues in Smart Grid R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
Network security Presentation AFZAAL AHMAD ABDUL RAZAQ AHMAD SHAKIR MUHAMMD ADNAN WEB SECURITY, THREADS & SSL.
Block Chain 101 May 2017.
When BPM meets Blockchain
Presented by Edith Ngai MPhil Term 3 Presentation
Non-PKI Methods for Public Key Distribution
The Revolutionary Benefits Of Blockchain
Cryptography: an overview
Cryptography: an overview
Raihana Ferdous, Vallipuram Muthukkumarasamy
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Cryptography and Network Security
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Computer Communication & Networks
Secure Sockets Layer (SSL)
Bitcoin - a distributed virtual currency system
Module 8: Securing Network Traffic by Using IPSec and Certificates
Towards an optimized BlockChain for IoT
Josep Domingo-Ferrer Universitat Rovira i Virgili
Blockchain beyond cryptocurrencies
BY GAWARE S.R. DEPT.OF COMP.SCI
Digital Signature.
Blockchain Adrian Zaragoza.
{ BLOCKCHAIN Technology. BSEtecBSEtec is a digital solution provider company which offers the best service with the implement of the latest technologies.
Cryptography and Network Security
Message Digest Cryptographic checksum One-way function Relevance
Pooja programmer,cse department
XinFin Blockchain for global Trade and Finance
Multi-party Authentication in Web Services
Distributed Ledger Technology (DLT) and Blockchain
2018/7/28 GridMonitoring: Secured Sovereign Blockchain based Monitoring on Smart Grid Authors: Jian-Bin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah,
Credential Transparency
The Secure Sockets Layer (SSL) Protocol
Cryptography: an overview
Blockchain Concepts RISK FORUM 2017 Hash function (e.g. SHA-256)
Module 8: Securing Network Traffic by Using IPSec and Certificates
Install AD Certificate Services
Controllable and Trustworthy Blockchain-based Cloud Data Management
Source: IEEE Access, Vol. 5, pp –14767, July 2017.
PKI (Public Key Infrastructure)
Electronic Payment Security Technologies
Smart Meter Data Privacy: A Survey
Cryptography and Network Security
Renovating Blockchain with Distributed Database: An Open Source System
Presentation transcript:

2018/7/28 GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid Authors: Jianbin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah, Abla Smahi, Qi Xia, Hu Xia, Xiaosong Zhang, Guishan Dong Source: IEEE Access ( Volume: 6 ), Page(s): 9917 – 9925, 27 February 2018 Speaker: Kai-Fan Chien Date: 2018/9/20

Outline Introduction Preliminaries Design Formulation Design Approach 2018/7/28 Outline Introduction Preliminaries Design Formulation Design Approach Smart Contracts and Sovereign Blockchain Design Discussion Conclusions

2018/7/28 Introduction(1/2) The data can be compromised when it falls into the hands of malicious actors. Billing(usually month) Details of billing are not revealed to consumers. They don’t know which electrical appliances consume more power.

2018/7/28 Introduction(2/2) Metke and Ekl proposed security technology for smart grid networks based on public key infrastructure (PKI). Use of digital certificates Mylrea and Gourisetti proposed blockchain for smart grid resilience. =================================================== Sovereign blockchain-based solution. Smart contract

Preliminaries(1/2) Sovereign Blockchain Network 2018/7/28 Preliminaries(1/2) Sovereign Blockchain Network Processing and Consensus Nodes Handle the data, requests and access from clients. Meter ID, house number and area code. Handed to other nodes for verification and acceptance. The only entities which have direct access to the sovereign blockchain network. Smart contract Side block

Preliminaries(2/2) Cryptographic Keys 2018/7/28 Preliminaries(2/2) Cryptographic Keys Secure transfer of data from the smart home into the smart grid. Consumer private key: Generated by the consumer. Consumer public key: Generated by the consumer and sent to the smart grid. Authenticator contract key: Key pair generated by the authenticator.

Design Formulation(1/5) 2018/7/28 Design Formulation(1/5) User Layer The User Layer comprises all the entities who access electricity from the utility company.

Design Formulation(2/5) 2018/7/28 Design Formulation(2/5) Data Processing and Monitoring Layer Help in processing all the data sent to the smart grid network.

Design Formulation(3/5) 2018/7/28 Design Formulation(3/5) Registration and Authentication Layer Comprises of the registrar and the authenticator. Unique ID is generated for the user. Authenticated by the authenticator using this unique ID.

Design Formulation(4/5) 2018/7/28 Design Formulation(4/5) Smart Contract The main function of the smart contracts is to identify malicious usage of electrical power and electrical data and to report such actions into a database. Smart Contracts Database This is a report violation storage and action center on the sovereign blockchain network.

Design Formulation(5/5) 2018/7/28 Design Formulation(5/5) Energy Center This layer directly interfaces with the processing and monitoring layer. The power is later distributed to clients on the network based on tariffs paid per month. Data Center Research purposes.

Design Approach(1/2) Registration and Authentication Layer 2018/7/28 Design Approach(1/2) Registration and Authentication Layer User’s meter ID is generated and the data is shared with the authenticator. The area code of where the user resides is added and then linked to a smart meter. The meter ID of the user is sent to the smart grid network by the smart contract.

Design Approach(2/2) Smart Meter Processing and Consensus Nodes 2018/7/28 Design Approach(2/2) Smart Meter Send the data to energy supplier for more accurate energy bills. Send meter readings from the home of a consumer to the sovereign blockchain network. Added to the sovereign blockchain after they have been verified and accepted by majority of nodes. Create smart contracts protocol between the smart meter and the sovereign blockchain network. Processing and Consensus Nodes

Smart Contracts and Sovereign Blockchain Design(1/3) 2018/7/28 Smart Contracts and Sovereign Blockchain Design(1/3) Smart Contracts Design Report the state of data on the smart meter. Violations which happen on both the smart meter and on data on the smart grid. The rules when in force trigger the smart contracts to send reports to the smart grid network. Also leave alert messages on the screen of the smart meter for the consumer.

Smart Contracts and Sovereign Blockchain Design(2/3) 2018/7/28 Smart Contracts and Sovereign Blockchain Design(2/3) Parent Block Structure The block header is hashed with SHA-256 as done in the Bitcoin headers. Time to purchase power (TTP) Time to process the transaction (TPT) Time power starts reading (TPR) Time power reaches threshold value (TPRT) Time power gets finished (TPF) Meter ID (MID) House number (HN) Amount of power purchased (APP) Processing node ID (NID) Signature of processing node (Nsig)

Smart Contracts and Sovereign Blockchain Design(3/3) 2018/7/28 Smart Contracts and Sovereign Blockchain Design(3/3) Side Block Structure A side block is made of a format and this format is derived by appending a section of the main blocks ID to an ID generated by consensus nodes to the side block. Timestamp of violation (TSV) Timestamp of state of smart meter (TSM) Meter ID (MID) House number (HN) Type of violation (TVLN) Processing node ID (NID) Processing node signature (Nsig)

Discussion(1/3) Information sharing Efficient data manageability 2018/7/28 Discussion(1/3) Information sharing Efficient data manageability Data immutability Data immutability refers to the data being unalterable. Blockchain Customer control This metric refers to customers being able to control their power usage.

Discussion(2/3) Data integrity Data confidentiality 2018/7/28 Discussion(2/3) Data integrity By blockchain. Data confidentiality Tamper-proof structure prevents external attackers from having access to the data without permission. Data provenance and auditing Coupled with smart contracts.

2018/7/28 Discussion(3/3) [19] S. Rusitschka, K. Eger, C. Gerdes, "Smart grid data cloud: A model for utilizing cloud computing in the smart grid domain",  Proc. 1st IEEE Int. Conf. Smart Grid Commun., pp. 483-488, Oct. 2010. [20] A. R. Metke, R. L. Ekl, "Security technology for smart grid networks", IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 99-107, Jun. 2010. [21] M. Mylrea, S. N. G. Gourisetti, "Blockchain for smart grid resilience: Exchanging distributed energy at speed scale and security",  Proc. Resilience Week, pp. 18-23, 2017. [22] F. Ye, Y. Qian, R. Q. Hu, "An identity-based security scheme for a big data driven cloud computing framework in smart grid",  Proc. IEEE Global Commun. Conf. (GLOBECOM), pp. 1-6, Dec. 2014.

Conclusions Sovereign blockchain-based system and smart contracts. 2018/7/28 Conclusions Sovereign blockchain-based system and smart contracts. this model enhances the transparency.