Grid Monitoring Secured Sovereign Blockchain Based Monitoring on
Grid. Monitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid Authors: Jianbin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah, Abla Smahi, Qi Xia, Hu Xia, Xiaosong Zhang, Guishan Dong Source: IEEE Access ( Volume: 6 ), Page(s): 9917 – 9925, 27 February 2018 Speaker: Kai-Fan Chien Date: 2018/9/20
Outline • Introduction • Preliminaries • Design Formulation • Design Approach • Smart Contracts and Sovereign Blockchain Design • Discussion • Conclusions 2
Introduction(1/2) • The data can be compromised when it falls into the hands of malicious actors. ØBilling(usually month) • Details of billing are not revealed to consumers. ØThey don’t know which electrical appliances consume more power. 3
Introduction(2/2) • Metke and Ekl proposed security technology for smart grid networks based on public key infrastructure (PKI). ØUse of digital certificates • Mylrea and Gourisetti proposed blockchain for smart grid resilience. ========================== • Sovereign blockchain-based solution. • Smart contract 4
Preliminaries(1/2) A. Sovereign Blockchain Network • Processing and Consensus Nodes ØHandle the data, requests and access from clients. ØMeter ID, house number and area code. ØHanded to other nodes for verification and acceptance. ØThe only entities which have direct access to the sovereign blockchain network. • Smart contract ØSide block 5
Preliminaries(2/2) B. Cryptographic Keys • Secure transfer of data from the smart home into the smart grid. 1. Consumer private key: Generated by the consumer. 2. Consumer public key: Generated by the consumer and sent to the smart grid. 3. Authenticator contract key: Key pair generated by the authenticator. 6
Design Formulation(1/5) • User Layer ØThe User Layer comprises all the entities who access electricity from the utility company. 7
Design Formulation(2/5) • Data Processing and Monitoring Layer ØHelp in processing all the data sent to the smart grid network. 8
Design Formulation(3/5) 1. Registration and Authentication Layer ØComprises of the registrar and the authenticator. ØUnique ID is generated for the user. ØAuthenticated by the authenticator using this unique ID. 9
Design Formulation(4/5) 2. Smart Contract Ø The main function of the smart contracts is to identify malicious usage of electrical power and electrical data and to report such actions into a database. 3. Smart Contracts Database ØThis is a report violation storage and action center on the sovereign blockchain network. 10
Design Formulation(5/5) • Energy Center ØThis layer directly interfaces with the processing and monitoring layer. ØThe power is later distributed to clients on the network based on tariffs paid per month. • Data Center ØResearch purposes. 11
Design Approach(1/2) A. Registration and Authentication Layer ØUser’s meter ID is generated and the data is shared with the authenticator. ØThe area code of where the user resides is added and then linked to a smart meter. ØThe meter ID of the user is sent to the smart grid network by the smart contract. 12
Design Approach(2/2) B. Smart Meter ØSend the data to energy supplier for more accurate energy bills. ØSend meter readings from the home of a consumer to the sovereign blockchain network. ØAdded to the sovereign blockchain after they have been verified and accepted by majority of nodes. ØCreate smart contracts protocol between the smart meter and the sovereign blockchain network. C. Processing and Consensus Nodes 13
Smart Contracts and Sovereign Blockchain Design(1/3) A. Smart Contracts Design ØReport the state of data on the smart meter. ØViolations which happen on both the smart meter and on data on the smart grid. ØThe rules when in force trigger the smart contracts to send reports to the smart grid network. ØAlso leave alert messages on the screen of the smart meter for the consumer. 14
Smart Contracts and Sovereign Blockchain Design(2/3) B. Parent Block Structure ØThe block header is hashed with SHA-256 as done in the Bitcoin headers. Time to purchase power (TTP) Time to process the transaction (TPT) Time power starts reading (TPR) Time power reaches threshold value (TPRT) Time power gets finished (TPF) Meter ID (MID) House number (HN) Amount of power purchased (APP) Processing node ID (NID) Signature of processing node (Nsig) 15
Smart Contracts and Sovereign Blockchain Design(3/3) C. Side Block Structure ØA side block is made of a format and this format is derived by appending a section of the main blocks ID to an ID generated by consensus nodes to the side block. Timestamp of violation (TSV) Timestamp of state of smart meter (TSM) Meter ID (MID) House number (HN) Type of violation (TVLN) Processing node ID (NID) Processing node signature (Nsig) 16
Discussion(1/3) • Information sharing • Efficient data manageability • Data immutability ØData immutability refers to the data being unalterable. ØBlockchain • Customer control ØThis metric refers to customers being able to control their power usage. 17
Discussion(2/3) • Data integrity ØBy blockchain. • Data confidentiality ØTamper-proof structure prevents external attackers from having access to the data without permission. • Data provenance and auditing ØCoupled with smart contracts. 18
Discussion(3/3) [19] S. Rusitschka, K. Eger, C. Gerdes, "Smart grid data cloud: A model for utilizing cloud computing in the smart grid domain", Proc. 1 st IEEE Int. Conf. Smart Grid Commun. , pp. 483 -488, Oct. 2010. [20] A. R. Metke, R. L. Ekl, "Security technology for smart grid networks", IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 99 -107, Jun. 2010. [21] M. Mylrea, S. N. G. Gourisetti, "Blockchain for smart grid resilience: Exchanging distributed energy at speed scale and security", Proc. Resilience Week, pp. 18 -23, 2017. [22] F. Ye, Y. Qian, R. Q. Hu, "An identity-based security scheme for a big data driven cloud computing framework in smart grid", 19 Proc. IEEE Global Commun. Conf. (GLOBECOM), pp. 1 -6, Dec. 2014.
Conclusions • Sovereign blockchain-based system and smart contracts. • this model enhances the transparency. 20
- Slides: 20