scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

A Blockchain Construct for Energy Trading against Sybil Attacks

01 Jul 2019-pp 422-427
TL;DR: This paper focuses on a Sybil attack mitigation method based on blockchain and it's Proof of Work (PoW) consensus and a framework of automated privacy-preserving selection of charging stations (CS) based on pricing and the distance to the electric vehicle (EV).
Abstract: In recent years, vehicular networks have been drawing special attention because of its significant potential role in the future smart city. Safety is a crucial status in vehicular networks, especially in energy trading where security of transactional data and safety against critical attacks is of most concern. The Sybil attack is one where an adversary can create multiple fake identities, become a part of the P2P network and try to manipulate the decision of the entire network in accordance to his own will. Thus in view to enhance the security of system, this paper focuses on a Sybil attack mitigation method based on blockchain and it's Proof of Work (PoW) consensus. Also a framework of automated privacy-preserving selection of charging stations (CS) based on pricing and the distance to the electric vehicle (EV) is presented. A blockchain based approach increases the transparency between EV and CS while preserving the privacy of the EV owners.
Citations
More filters
Journal ArticleDOI
TL;DR: Numerical results based on various operating scenarios for the standard IEEE 33 bus system are in agreement with the Byzantine consensus problem indicating improvement in system security.
Abstract: To mitigate the problems of demand-supply mismatch in the future grid the solution of renewable energy source (RES) integration results in a bidirectional flow of information and transactions, which are prone to different kinds of cyber attacks, especially in energy trading where the security of financial transactions is of most concern. Electric vehicle (EV) having the advantage of mobility can play a significant role in maintaining demand-supply balance at any location unlike their peers (conventional compensator). For deciding entire system security, securing EVs charging-discharging transactions at all charging stations or connecting points is most important. The system can be made more secure against cyber-attacks with the introduction of the blockchain framework. Hence, in view of secured transactions, the paper focuses on the energy trading process between EVs and distribution network (DN) in a Byzantine based blockchain consensus framework. During peak load period DN initiates the energy trading process by demanding additional power from the EVs. This process of energy trading results in energy and information exchange which needs to be secured through blockchain from vulnerable attacks and threats. Possible scenarios of various cyber-attacks on different nodes of the system are visualized in the form of false data. To highlight the application of blockchain, the Byzantine general problem framework is used which states that for successful attack 33% of information is to be manipulated, in other words, decreasing the probability of attack confirms the system security. Numerical results based on various operating scenarios for the standard IEEE 33 bus system are in agreement with the Byzantine consensus problem indicating improvement in system security.

53 citations


Cites background from "A Blockchain Construct for Energy T..."

  • ...Further, this work was extended in [28], where the authors considered the energy trading process in presence of Sybil attack and highlighted the effectiveness of blockchain framework defense mechanism against Sybil attack....

    [...]

Journal ArticleDOI
01 Jan 2021
TL;DR: The proposed permissionless proof‐of‐reputation‐X (PL‐PoRX) replaces the trusted identity database in PoRX with a new admission process to make the algorithm suitable for permissionless blockchains, while maintaining PoRZ's reputation mechanism.
Abstract: Over the past years, blockchain technology has become more and more interesting since its ability to carry out transactions without any mediator. To ensure the transactions' reliability, c...

21 citations

Journal ArticleDOI
TL;DR: In this article, the authors conducted a comprehensive literature survey on the security issues of the blockchain itself and systematically reviewed and analyzed attacks against blockchains based on the basic framework of blockchain and conduct a state-of-the-art investigation of the corresponding countermeasures against those attacks.

21 citations

Proceedings ArticleDOI
15 Jun 2020
TL;DR: In this paper, a comprehensive review of the existing blockchain-based cybersecurity mechanisms is presented with the corresponding performance analysis to provide a guideline for the further study in the application of blockchain in the vehicular network security area.
Abstract: The development of vehicular networks has greatly improved the efficiency and safety of intelligent traffic systems. However, it also introduces additional security threats into the system. The special characteristics of vehicular networks, such as dynamic topology, huge network scale and so on, make it difficult to adopt the traditional security solutions directly into this scenario. In addition, the single point failure problem of the centralized security mechanisms is also a big challenge. Recently, blockchain technology, which is a distributed database, is a potential approach to address these security issues. In this paper, a comprehensive review of the existing blockchain-based cybersecurity mechanisms is presented with the corresponding performance analysis. The purpose of this work is to provide a guideline for the further study in the application of blockchain in the vehicular network security area.

18 citations


Cites background or methods from "A Blockchain Construct for Energy T..."

  • ...[15] focused on the security of transactional data and safety against critical attacks....

    [...]

  • ...[15] Blockchain technology to resist sybil attack Proof-of-Work (PoW) consensus mechanism Secure communication scheme; Privacy preserving Secure communication scheme; Privacy preserving Sybil attack mitigation method...

    [...]

Journal ArticleDOI
14 Aug 2021
TL;DR: A bibliometric and literature analysis of how Blockchain provides a security blanket to AI-based systems and improving their robustness is presented.
Abstract: Nowadays, open innovations such as intelligent automation and digitalization are being adopted by every industry with the help of powerful technology such as Artificial Intelligence (AI). This evolution drives systematic running processes, involves less overhead of managerial activities and increased production rate. However, it also gave birth to different kinds of attacks and security issues at the data storage level and process level. The real-life implementation of such AI-enabled intelligent systems is currently plagued by the lack of security and trust levels in system predictions. Blockchain is a prevailing technology that can help to alleviate the security risks of AI applications. These two technologies are complementing each other as Blockchain can mitigate vulnerabilities in AI, and AI can improve the performance of Blockchain. Many studies are currently being conducted on the applicability of Blockchains for securing intelligent applications in various crucial domains such as healthcare, finance, energy, government, and defense. However, this domain lacks a systematic study that can offer an overarching view of research activities currently going on in applying Blockchains for securing AI-based systems and improving their robustness. This paper presents a bibliometric and literature analysis of how Blockchain provides a security blanket to AI-based systems. Two well-known research databases (Scopus and Web of Science) have been examined for this analytical study and review. The research uncovered that idea proposals in conferences and some articles published in journals make a major contribution. However, there is still a lot of research work to be done to implement real and stable Blockchain-based AI systems.

18 citations

References
More filters
Book ChapterDOI
John R. Douceur1
07 Mar 2002
TL;DR: It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.
Abstract: Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these "Sybil attacks" is to have a trusted agency certify identities. This paper shows that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.

4,816 citations


"A Blockchain Construct for Energy T..." refers background in this paper

  • ...in Sybil identities and try to gain the control of the network by polluting the network with the fake identities [2], [3]....

    [...]

15 Jan 2020

4,407 citations


"A Blockchain Construct for Energy T..." refers background in this paper

  • ...The first blockchain was conceptualized by a person (or a group of people) known as Satoshi Nakamoto in 2008 to serve as the public transaction ledger of the cryptocurrency bitcoin [5]....

    [...]

Proceedings Article
29 Jul 2008
TL;DR: This paper proposes a new mathematical framework to analyze attacks against control systems and formulates specific research problems to detect attacks, and survive attacks.
Abstract: In this paper we attempt to answer two questions: (1) Why should we be interested in the security of control systems? And (2) What are the new and fundamentally different requirements and problems for the security of control systems? We also propose a new mathematical framework to analyze attacks against control systems. Within this framework we formulate specific research problems to (1) detect attacks, and (2) survive attacks.

613 citations


"A Blockchain Construct for Energy T..." refers background in this paper

  • ...If an attack is detected then it is possible to change the control commands to increase the resiliency of the system [8]....

    [...]

Journal ArticleDOI
TL;DR: A wide variety of motivations exists for launching an attack on CPSs, ranging from economic reasons, such as obtaining a financial gain, all the way to terrorism, for instance, threatening an entire population by manipulating life-critical resources.
Abstract: Cyberphysical systems (CPSs) refer to the embedding of widespread sensing, networking, computation, and control into physical spaces with the goal of making them safer, more efficient, and reliable. Driven by the miniaturization and integration of sensing, communication, and computation in cost-efficient devices, CPSs are bound to transform industries such as aerospace, transportation, built environments, energy, health care, and manufacturing, to name a few. This great opportunity, unfortunately, is matched by even greater challenges. Taming the complexity of design and analysis of these systems poses a fundamental problem as a new paradigm is needed to bridge various scientific domains, which, through the years, have developed significantly different formalisms and methodologies. In addition, while the use of dedicated communication networks has so far sheltered systems from the outside world, use of off-the-shelf networking and computing, combined with the unattended operation of a plethora of devices, provides several opportunities for malicious entities to inject attacks on CPSs. A wide variety of motivations exists for launching an attack on CPSs, ranging from economic reasons, such as obtaining a financial gain, all the way to terrorism, for instance, threatening an entire population by manipulating life-critical resources. Any attack on safety-critical CPSs may significantly hamper the economy and lead to the loss of human lives. While the threat of attacks on CPSs tends to be underplayed at times, the Stuxnet worm provided a clear example of the possible future to come. This malware, targeting a uranium enriching facility in Iran, managed to reach the supervisory control and data acquisition (SCADA) system controlling the centrifuges used in the enrichment process. Stuxnet modified the control system, increasing pressure in the centrifuges in a first version of the worm and spinning centrifuges in an erratic fashion in a second version. As a result, Stuxnet caused significant damage to the plant [1]. For details, see "The Stuxnet Attack."

416 citations


"A Blockchain Construct for Energy T..." refers background in this paper

  • ...This great opportunity, unfortunately, is matched by even greater challenges [1]....

    [...]

  • ...Any attack on safety-critical CPSs may significantly hamper the economy and cause infrastructure damage which may may lead to the loss of human lives [1]....

    [...]

Journal ArticleDOI
TL;DR: This paper presents a comprehensive discussion on how blockchain technology can be used to enhance the robustness and security of the power grid, by using meters as nodes in a distributed network which encapsulates meter measurements as blocks.
Abstract: The cyber security of modern power systems has drawn increasing attention in both academia and industry. Many detection and defense methods for cyber-attacks have therefore been proposed to enhance robustness of modern power systems. In this paper, we propose a new, distributed blockchain-based protection framework to enhance the self-defensive capability of modern power systems against cyber-attacks. We present a comprehensive discussion on how blockchain technology can be used to enhance the robustness and security of the power grid, by using meters as nodes in a distributed network which encapsulates meter measurements as blocks. Effectiveness of the proposed protection framework is demonstrated via simulation experiments on the IEEE-118 benchmark system.

305 citations


"A Blockchain Construct for Energy T..." refers background or methods in this paper

  • ...block number (b), data content (d), time instant (t) plus nonce (N) which is nothing but a random value and lastly previous nonce value (hp) [9]....

    [...]

  • ...The MD1 and MD2 is compared and if they are analogous then the information received is verified otherwise concluded to be false [9]....

    [...]

  • ...The MD encryption using a private key forms a digital signature which is decrypted using public key of the same node [9]....

    [...]