Abstract

This paper proposes a smart grid distributed security architecture based on blockchain technology and SDN cluster structure, referred to as ClusterBlock model, which combines the advantages of two emerging technologies, blockchain and SDN. The blockchain technology allows for distributed peer-to-peer networks, where the network can ensure the trusted interaction of untrusted nodes in the network. At the same time, this article adopts the design of an SDN controller distributed cluster to avoid single point of failure and balance the load between equipment and the controller. A cluster head was selected in each SDN cluster, and it was used as a blockchain node to construct an SDN cluster head blockchain. By combining blockchain technology, the security and privacy of the SDN communication network can be enhanced. At the same time, this paper designs a distributed control strategy and network attack detection algorithm based on blockchain consensus and introduces the Jaccard similarity coefficient to detect the network attacks. Finally, this paper evaluates the ClusterBlock model and the existing model based on the OpenFlow protocol through simulation experiments and compares the security performance. The evaluation results show that the ClusterBlock model has more stable bandwidth and stronger security performance in the face of DDoS attacks of the same scale.

Highlights

  • Ao Xiong,1 Hongkang Tian,1 Wenchen He,1 Jie Zhang,2 Huiping Meng,3 Shaoyong Guo,1 Xinyan Wang,3 Xinyi Wu,4 and Michel Kadoch5

  • Academic Editor: Zhili Zhou is paper proposes a smart grid distributed security architecture based on blockchain technology and SDN cluster structure, referred to as ClusterBlock model, which combines the advantages of two emerging technologies, blockchain and SDN. e blockchain technology allows for distributed peer-to-peer networks, where the network can ensure the trusted interaction of untrusted nodes in the network

  • E SDN network is a network that operates based on flow rules. e information flow rules are issued to the switch through the control layer, and the switch forwards and processes data based on the flow table according to the Security and Communication Networks flow rules. e correctness and consistency of the flow rules are the key factors to ensure the network security

Read more

Summary

Introduction

Ao Xiong,1 Hongkang Tian ,1 Wenchen He,1 Jie Zhang,2 Huiping Meng,3 Shaoyong Guo,1 Xinyan Wang,3 Xinyi Wu,4 and Michel Kadoch5. E information flow rules are issued to the switch through the control layer, and the switch forwards and processes data based on the flow table according to the Security and Communication Networks flow rules.

Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.