Abstract

To mitigate the problems of demand-supply mismatch in the future grid the solution of renewable energy source (RES) integration results in a bidirectional flow of information and transactions, which are prone to different kinds of cyber attacks, especially in energy trading where the security of financial transactions is of most concern. Electric vehicle (EV) having the advantage of mobility can play a significant role in maintaining demand-supply balance at any location unlike their peers (conventional compensator). For deciding entire system security, securing EVs charging-discharging transactions at all charging stations or connecting points is most important. The system can be made more secure against cyber-attacks with the introduction of the blockchain framework. Hence, in view of secured transactions, the paper focuses on the energy trading process between EVs and distribution network (DN) in a Byzantine based blockchain consensus framework. During peak load period DN initiates the energy trading process by demanding additional power from the EVs. This process of energy trading results in energy and information exchange which needs to be secured through blockchain from vulnerable attacks and threats. Possible scenarios of various cyber-attacks on different nodes of the system are visualized in the form of false data. To highlight the application of blockchain, the Byzantine general problem framework is used which states that for successful attack 33% of information is to be manipulated, in other words, decreasing the probability of attack confirms the system security. Numerical results based on various operating scenarios for the standard IEEE 33 bus system are in agreement with the Byzantine consensus problem indicating improvement in system security.

Highlights

  • For traditional power system operation security has become a pivotal factor which comprises of two main aspects, physical security, and cybersecurity [1]–[3]

  • The process operations and tasks related to its control are performed in the power system with the help of information and communications technology (ICT) [4], [5] which are still susceptible to exposure of threats even with the integration of the cyber-physical system and renewable energy sources (RES)

  • The resultant hash value is updated in the block if after verification consensus is achieved by more than 51% of nodes and only it is allowed to be cryptographically linked to the previous ledger

Read more

Summary

INTRODUCTION

For traditional power system operation security has become a pivotal factor which comprises of two main aspects, physical security, and cybersecurity [1]–[3]. A. Sheikh et al.: Secured Energy Trading Using Byzantine-Based Blockchain Consensus mode (G2V) and other in which vehicle discharges power to grid i.e vehicle-to-grid (V2G) mode [11]. The authors proposed an energy allocation mechanism for allocating limited energy available from renewables to EVs. the work majorly focused on the charging issues of EVs. A Byzantine fault tolerance (BFT) based real-time electricity pricing is proposed in [34], where the security of communication between the utility and smart meters is enhanced. (ii) For verification of blocks in the blockchain, a Byzantine based consensus algorithm for energy trading between EV and DN is proposed which states that for successful attack 33% of information is to be manipulated, in other words, decreasing the probability of attack confirms the system security. The resultant hash value is updated in the block if after verification consensus is achieved by more than 51% of nodes and only it is allowed to be cryptographically linked to the previous ledger

ROLE OF SMART CONTRACT IN BLOCKCHAIN
PROPOSED FRAMEWORK FOR ENERGY TRADING
MATHEMATICAL FORMULATION OF ENERGY
CASE 1
CASE 2
Findings
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.