Next Article in Journal
Enhanced Fault Type Detection in Covered Conductors Using a Stacked Ensemble and Novel Algorithm Combination
Next Article in Special Issue
Searchable Blockchain-Based Healthcare Information Exchange System to Enhance Privacy Preserving and Data Usability
Previous Article in Journal
Optimized Dropkey-Based Grad-CAM: Toward Accurate Image Feature Localization
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secure and Robust Demand Response Using Stackelberg Game Model and Energy Blockchain

1
School of Electrical Engineering and Computer Science, University of Ottawa, Ottawa, ON K1N 6N5, Canada
2
School of Computer Science and Engineering, University of New South Wales, Sydney, NSW 2052, Australia
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(20), 8352; https://doi.org/10.3390/s23208352
Submission received: 27 July 2023 / Revised: 27 September 2023 / Accepted: 29 September 2023 / Published: 10 October 2023

Abstract

:
Demand response (DR) has been studied widely in the smart grid literature, however, there is still a significant gap in approaches that address security, privacy, and robustness of settlement processes simultaneously. The need for security and robustness emerges as a vital property, as Internet of Things (IoT) devices become part of the smart grid; in the form of smart meters, home energy management systems (HEMSs), intelligent transformers, and so on. In this paper, we use energy blockchain to secure energy transactions among customers and the utility. In addition, we formulate a mixed-strategy stochastic game model to address uncertainties in DR contributions of agents and achieve optimal demand response decisions. This model utilizes the processing hardware of customers for block mining, stores customer DR agreements as distributed ledgers, and offers a smart contract and consensus algorithm for energy transaction validation. We use a real dataset of residential demand profiles and photovoltaic (PV) generation to validate the performance of the proposed scheme. The results show the impact of electric vehicle (EV) discharging and customer demand reduction on increasing the probability of successful block mining and improving customer profits. Moreover, the results demonstrate the security and robustness of our consensus algorithm for detecting malicious activities.

1. Introduction

Energy within the smart grid context is an increasingly sophisticated problem that includes cyber security concerns, user privacy issues, and settlement processes. A useful framework to address this sophistication is provided by the energy IoT, where a consistent hierarchical architecture that connects sensing and actuating nodes can be implemented for the supervision of both loads and energy resources [1,2]. In modern grids, supervisory systems maintain the balance between generation and consumption using increasingly sophisticated mechanisms to incorporate greater economic flexibility and resource availability. Mechanisms such as demand response, household energy management [3,4,5], incentive-based DR offers [6], distributed energy resources (DERs) regulation [7], and energy trading markets [8] have been proposed and implemented. However, cyber security concerns, user privacy issues, potential node failures, uncertainties in the responses to demand control, and high processing times must be considered at the architectural level to ensure resilience and reliability within electricity and data exchange networks.
It is appealing to consider the role an energy blockchain can play in this regard. By operating an energy management system within a blockchain framework, this energy approach can diversify the potential responses of stakeholders into disparate domains while accommodating enhanced functionality. It allows energy to be monetized according to the activity undertaken within a collective response to its management. It recognizes that individual customers may have distinct energy consumption roles and responses to financial incentives that are not deterministically apparent to utilities seeking an aggregate demand reduction in their service area. We implement blockchain at the top of our incentive-based energy management system. Our proposed management system controls a utility company’s energy generation and cost using the distributed electricity generation and computational resources of the individual customers. The utility company via control agents asks customers, in a day-ahead system, to reduce their demand—which may include block mining—providing financial rewards as compensation for compliance. The blockchain is a distributed ledger to enable smart contracts in response to customer engagement with DR requests [9]. Customers, therefore, have two important roles, they can reduce their energy consumption to lower peak consumption, and they can collaborate in the block mining process using their computational and distributed energy resources.
With the increasing diversity of distributed energy resources (which include evolving load categories such as EV charging [10,11]), the high cost of supporting peak electricity consumption through centralized generation can be overcome at the distribution level if bottleneck issues associated with consumer participation in energy management can be addressed in the context of the likelihood of individual responses to distributed requests. The weakness of most DR approaches is an architectural one, a failure to accommodate the likelihood of the scope of individual responses to DR requests through a privacy-by-design probabilistic framework that is both fair and transparent, and that simultaneously expands and monetizes the energy informatics’ role of the individual consumer using a robust and secure energy blockchain whose consensus algorithm addresses reputation, DR availability, and compliance.
We propose a collaborative DR scheme and game theoretic approach to exploit the implicit stochastic nature of customer participation within a DER management context that is empowered by blockchain technology. This incentive-based DR scheme is expressed within a transactive model that negotiates with customers to find an optimal settlement point for customer energy reduction and reward price. Our model is based on control agents (CA) that act under the auspices of a distribution system operator (DSO). DR settlement is conducted via a private blockchain (PB), where the CA is a leader and customers are followers, for next-day demand reduction. This yields a distributed and stable data storage system that provides high cyber security, user privacy, and data accuracy while permitting customer use of the blockchain to monetize surplus energy generation as a reward for block mining.
Our approach distinguishes itself in two ways: (1) the use of a mixed-strategy Stackelberg game model that inherently accommodates the scope of potential customer response in a probabilistic fashion to achieve the best contributions that maximize customer reward; and (2) the use of a private blockchain to secure such contributions in a scalable fashion. Moreover, these two features are coupled. The mixed-strategy Stackelberg game is a stochastic model that considers all possible DR contributions (strategies) from players (customers and the CA) via their likelihood (probability values), where the tradeoff between DR response and the investment of surplus energy (i.e., excess DER generation) into block mining is explicitly considered. Specifically, this is a novel stochastic game model for customer energy consumption where the probability of being selected as a block miner depends on a customer’s history of energy consumption. This model provides customers with their best strategies to collectively monetize both DR and block mining. Furthermore, we study the robustness of this energy blockchain system against different security attacks by introducing a smart contract and consensus algorithm for transaction validity and authenticity.
The main contributions of this study can be summarized as follows:
  • An incentive-based leader–follower stochastic DR model is proposed using blockchain to determine the random energy consumption of customers during peak hours, and effectively control the block mining. This model is a mixed-strategy Stackelberg game designed between the CA and customers, where customers are blockchain nodes and cooperate in block mining.
  • For the mixed-strategy Stackelberg game, we prove the existence of the equilibrium point of the game based on the optimal solutions of customers and CA. The optimal solution is achieved by dividing the main Stackelberg game into multiple mixed-strategy subgames and finding a mixed equilibrium in each.
  • The blockchain architecture in this work enables a secure, robust, and reliable distributed energy management system, while the processing and computational cost of the crypto algorithm is distributed across the network.
  • We propose a novel consensus algorithm based on the proof of energy saving (PoES), where it selects a block miner considering the historical reputation, adequate energy resources (Availability), and DR contribution (Compliance ratio) among participants.
  • The simulation results show that the proposed architecture is secure and robust against different cyber security attacks, and it is immune against 51% attack. We illustrate that the malicious nodes can be detected and penalized even in a small network with 10 active nodes.
The remainder of this paper is organized into seven sections. Section 2 presents a study on different existing energy blockchain architectures, Section 3 defines our proposed scheme, and Section 4 discusses the consensus model and smart contract algorithm. Section 5 presents the utility functions, strategies, and constraints for the CA and customers in addition to equilibrium analysis. Section 6 determines the data consistency and security of our proposed model. In Section 7, the simulation results are presented, and finally, Section 8 concludes the paper with a summary of our findings.

2. Literature Review

In this section, we review the dominant and recent literature on DR approaches with energy blockchain to place our work in context, and then differentiate it. We first begin with a brief overview of blockchain in this context. Blockchain can be simply defined as a ledger, which is securely distributed among the network nodes while its content cannot be altered [9]. Distributing computational cost in the blockchain is a unique feature suitable for many smart grid applications [12]. Initially, energy management has benefited from blockchain technology in data administration [7,13]. Later, blockchain became the point of interest in energy trading [14], energy storage [15], and security assurance [16]. Using the distributed ledger, smart contract, and consensus algorithm features of the blockchain can guarantee the performance of DR transactions in the smart grid. Distributed ledger architecture can work for DR agreements [17] between customers and utility companies, while the smart contract checks the transaction validity and user identity.
Blockchain is recommended for energy management systems because of its distributed architecture and secure functionality. This is illustrated in [18], where a data trust model and node reputation technique were represented in a private blockchain, with node trustworthiness calculated via reputation, confidence value, and observation. In Ref. [19], the functionality of private and public keys, and coin deposit for node registration and authentication, was noted. For a security enhancement solution, a two-stage security model with reputation-based voting and block miner selection dependent on the node history was developed [20]. In another work, a trust model was developed with reputation, endorsement, and confidence factors to evaluate transactions [21].
Smart contracts in the blockchain are mainly used to verify the validity of transactions and the sender’s identity [22]. A consensus algorithm specifies the rules of block miner selection and block generation for a blockchain network. For example, a proof of energy (PoE) consensus algorithm for energy trading between customers was presented in [14]. Virtual power plants (VPPs) control interactions and the VPP, with the minimum variation between consumption and production selected as a block miner. In a similar study, an energy trading model was given by a double auction between the customers and DERs [23]. Here, VPPs handle the tradings, and the one with the maximum-traded energy selects as a block miner based on the proof of energy market (PoEM) algorithm. Two consensus algorithms, proof of energy generation (PoEG), and proof of energy consumption (PoEC) have been described [24]. The former increases the energy production of prosumers, and the latter incentivizes prosumers to reduce consumption at peak times. To employ customers in the mining procedure, the authors in [25] presented a DR model where smart meters with adequate energy and processing hardware were selected as block miners.
Game-theoretic models have been used in blockchain to detect security attacks and to discover honest and selfish miners [26,27]. According to [28,29], game theory and advanced blockchain integration can guarantee profit maximization and secure transactions in microgrids. For instance, in [30], an extensive form game was presented to detect data collisions. Cheating actions among prosumers have also been determined using game models [16,31]. A game model can also be used for block miner selection. In Ref. [32], a non-cooperative game among agents to select a block miner based on its mining reward and computational resources was given.
Over the past few years, integrating demand response (DR) approaches with energy blockchain has been widely studied. The solutions have focused on interactive energy management systems [33]. Among the game theoretic approaches to DR management, Stackelberg games have become popular [34,35]. This is due to the hierarchical equivalence between game and management. In such games, one player (the leader) proposes its strategy, and then other players (followers) reply accordingly with their strategies [36]. This process repeats until all players reach their optimal outputs. For instance, a price-based DR model was presented in [37], where a Stackelberg game and blockchain were used to build a trading market between the prosumers. The model in [3] used blockchain with a distributed energy management system to optimize the energy consumption of household appliances to maximize the reward in response to DR signals. Article [38] has presented a blockchain-based collaborative power trading solution for 5G-enabled vehicular networks to enhance social welfare and reduce grid load. In a similar work, [39], authors have minimized electric vehicle charging costs and ensured the balance of power supply and demand while utilizing blockchain technology for transaction efficiency and privacy security. In Ref. [6], a DR model was implemented to determine the load shed availability of customers at peak times, in addition to using blockchain for transparent communication and a secure platform. Authors in [40] presented a blockchain-enabled peer-to-peer energy trading model that uses smart contracts and distributed ledger features to secure communications among prosumers and deal with cyberattacks. In a similar approach, a privacy and confidentiality guarantees model for prosumers during peer-to-peer energy trading is presented that utilizes public blockchain (Ethereum) and smart contracts [41].
Blockchain-based approaches can accommodate risk and demand uncertainty [42], but such functionality is not inherent to all game theoretic approaches, such as those that dominate DER management, as described above. Among such, there are no stochastic incentive-based demand reduction systems that use customers’ energy and potential resources for blockchain management to increase the stability and security of demand response data management. Unlike such energy blockchain approaches, our scheme implements a mixed-strategy Stackelberg game to probabilistically accommodate the breadth of customer energy consumption scenarios and to effectively control block mining. This is distinct from our prior deterministic approach [43]. In addition, we use smart contract and authentication schemes, such as a digital signature algorithm and public–private keys, for energy transactions’ authentication and validation to reduce cyber security attacks. Specifically, we develop a new consensus algorithm—proof of energy saving (PoES)—for the block mining process, where customer demand reduction affects its value directly, and the consensus value affects the customer’s utility function.

3. System Model

3.1. Network Model

As shown in Figure 1, the electricity grid can be divided into private blockchains comprised of multiple customers. To efficiently handle a large-scale demand response network, we divided the network into smaller networks as PBs to increase scalability. PB groups can be assigned considering geographical and regional situations or power flow constraints of the grid where customers perform as blockchain nodes. Note that while all parties to the local DR request overseen by the CA must be part of the PB, trust is explicitly not presumed. On the contrary, we consider that some nodes may act maliciously, and we employ the PB to detect such activity so as to ensure the security and robustness of our approach. The DSO monitors the energy transactions of the customers through multiple CAs. Each CA in its PB has a copy of blocks and regularly sends them to the DSO for data storage and monitoring purposes. In terms of technology, CA is similar to HEMS, but it is certified and trusted by the DSO. CAs are under the authority of DSO, and both are trusted parties in the network. According to Figure 1, data synchronization (DS) and PB networks are connected through wireless communication access points. At the DS, the CAs pass a copy of their local blocks to the DSO, and no CA knows the blocks belonging to their neighbors. The CAs are part of the DSO; they could be physical units installed in a local area or software as a service (SaaS) on the cloud. CA failure may happen due to a software or hardware disruption that could be resolved by repairing the unit or debugging the software and returning the CA to a fully functional service. In the interim, another CA (a CA from the neighborhood) takes action and controls the local area. Hence, the DSO selects the replaced CA and shares a copy of the blocks with the new CA. A publisher/subscriber model between the CA and IoT devices, such as HEMSs, enables HEMSs (subscribers) to receive the CA’s (publisher) latest updates on DR events [44]. HEMS controls household energy resources such as PV panels, EV, and appliance usage.
Blockchain transactions may introduce latency into the system. This delay may not be suitable for real-time demand response scenarios that require rapid decision-making and execution. To mitigate this issue, our system detects the peak load periods (PLPs) and collects the customers’ decisions ahead to reduce the likelihood of time delays. In this proposed architecture, we focus on two events, (1) PLPs events and (2) network supervision events (Sups). The former happens when the demand of the network is more than the DSO threshold, which results in a high cost of supply for the network. Then, at PLP, the DSO sends DR signals for demand reduction to the customers to control the network demand. The latter (Sup) is a supervision event that happens regularly for network demand control, and customers submit their consumption to the CA. The block mining process is required to store the DR transactional data and supervision information on the blockchain. Both τ P L P and τ S u p are sets of PLP and network supervision time slots for the next 24 h and we define h τ P L P or h τ S u p , where h H and H = { 1 , 2 , , H } with H the number of time slots. The value N C u is the number of customers in a PB and N C u = { 1 , 2 , , N C u } is the set of customers, where i denotes the customer index and i N C u .
Note that we use blockchain as a distributed ledger within a smart contract context (see Section 4.2) to validate and authenticate DR transactions, as given by the PoES consensus mechanism (see Section 4.1). The transactions themselves are predicated upon the results of the Stackelberg game, which determines the Nash equilibrium solution regarding customer energy availability and allocated for block mining via financialization by a utility function (see Section 5.1). The utility function employs the consensus value (PoES) as a coefficient when considering the likelihood of winning at block mining.

3.2. Authentication Technique

We assume that the DSO and CAs are trusted parties and registered as authenticated nodes in the network. HEMSs require an initial registration to prevent malicious activities and fraudulent information submission on the blockchain. A digital signature algorithm (DSA) can be used for node authentication and for preventing transactional data tampering [45]. In other words, it provides message integrity and node authentication while guaranteeing message security. Consequently, a new customer in the network is obligated to submit initial information such as identity (ID) number, EV total capacity, and PV maximum capacity. In return, the CA generates a public verification key (PK) and a secret/private signing key (SK) for each HEMS using k e y g e n ( 1 λ ) ( P K , S K ) , and λ is a security parameter. Thus, every HEMS has a unique public key and secret/private key pair. A HEMS uses S K to sign a message m e s s a g e while sending it to the network using the algorithm, s i g n ( m e s s a g e ,   S K ) σ . σ is the HEMS signature. The nodes in the network can verify the transaction using the HEMS public key as v e r i f y ( m e s s a g e ,   σ , P K ) ( 0 ,   1 ) , where 1 if the verification is successful and zero otherwise. To reduce the rate of malicious activities, a new HEMS has to provide a security deposit to the CA as a sign of good faith [18,20]. The digital signature authentication technique has been used in our designed smart contract, and it is explained in Section 4.2.

4. Blockchain Design

To reveal more details on how the designed energy blockchain works with agents, we summarize our design in four steps. First, a HEMS sends a transaction (including consumption information and digital signature) into the network. Next, the smart contract executes to validate and authenticate the transaction. Then, for the block validation, the consensus algorithm initiates to select a block miner. Finally, the selected miner inserts the validated block into the chain. In summary, we present a new consensus algorithm and a new smart contract design, and use the DSA to guarantee network security and data integrity. Note that in this section, we first explain the consensus algorithm in detail and then talk about the smart contract because customers’ transactions include a consensus parameter that needs to be validated by the smart contract.

4.1. Consensus Algorithm—Proof of Energy Saving (PoES)

The required processing hardware for block mining can be satisfied using customer computing hardware for transaction validation and block generation. To implement this, one customer needs to be selected as a block miner. As shown in Figure 1, in a PB, only one HEMS would be a block miner in each round of block generation. This allows the DSO to minimize the consensus energy usage by selecting one miner, unlike the proof of work (PoW) and proof of stake (PoS), and save money on the block generation process. Additionally, the DSO allocates a portion of mining monetary resources to the customers to incentivize them to compete on block mining selection. To this end, our proposed consensus algorithm PoES is presented to efficiently use the energy and hardware resources of customers for block mining.
The mempool in the blockchain is a storing architecture that accumulates the transactions temporarily. After the mempool reaches full capacity, it is time to generate a block and save the data on the blockchain. Our proposed consensus algorithm, PoES, selects one customer with the highest average value of availability, reputation, and compliance ratio as a block miner. The reasons for choosing these factors are threefold: first, to pick a customer with adequate energy (DER resources) to complete the block mining process (availability); second, to select the trusted block miner and prevent malicious activities (reputation); third, to incentivize customers to increase their DR contribution and maximize the chance to win block mining (compliance ratio).
(1) Availability ( a h i [ 0 , 1 ] ) presents the ratio of allocated energy for block mining by customer i over the required mining energy ( χ h ) at time slot h, where we have a i = ( a 1 i , , a H i ) . A customer can supply the block mining energy from its household PV generation, demand (portion of customer desired consumption), and discharge of EV at time slot h. The availability is calculated by a h i = x h i + w h i + α h i e h i b h i χ h , where x h i is the customer’s consumption from the grid with vector x i = ( x 1 i , , x H i ) , w h i is the PV generation, e h i is the EV discharging energy from customer i at time slot h, and b h i is the customer minimum-required demand at time slot h. In addition, α h i is a binary value that indicates the EV status, where α h i = 1 means that the EV of customer i is parked at home (can be discharged) for time slot h, otherwise α h i = 0 . Note that x h i + w h i + α h i e h i would be the customer’s total energy usage at time slot h.
(2) Reputation ( r h i [ 0 , 1 ] ) customers can rank their experience of interacting with others as trusted, untrusted, or uncertain according to [46]. Then, r h i = ( r h 1 , ,   r h i 1 ,   r h i + 1 , ,   r h N C u ) is the reputation vector customer i submits for other customers in the area for time slot h before the game starts. The reputation increases and decreases by the number of successful and unsuccessful minings.
(3) Compliance Ratio ( c h i [ 0 , 1 ] ) is the ratio of the total electricity reduction of a customer over its total load shed availability (LSA) in a time window, where we have c i = ( c 1 i , ,   c H i ) . We define the compliance ratio of customer i for time slot h as c h i = δ i + ( p h i x h i ) Σ l i . The value δ i presents the summation of demand reduction, and  Σ l i is the summation of the load shed availability of customer i in a time window. Finally, p h i is the predicted demand of customer i at time slot h. Customers can reduce their demand using household PV generation, decrease their actual demand (by reducing or shifting the demand), and discharge EV capacity to handle the request. Hence, a customer with a considerable history of demand reduction (DR contribution) has more chance to be selected as a block miner.
By averaging these three coefficients a r c h i = a h i + r h i + c h i 3 , ( a r c h i arc i ) , the consensus value of customer i is a r c h i [ 0 , 1 ] . Finally, the algorithm selects a HEMS with max i N C u { a r c h i } as a block miner for time slot h. All the nodes/HEMSs in a private blockchain are aware of each other’s consensus value, and they can easily find the client with the highest consensus value as the block miner of a block mining round. The respective client knows its leader and publishes the block. All other nodes know that this is a valid leader, as they know that the node has the highest consensus value.

4.2. Smart Contract

Smart contract is a multistep transaction validation program on blockchain that can prevent disruptive and fake data insertion in a distributed network [47]. After a transaction is submitted, its validity and authenticity need to be verified using the smart contract before being added to the mempool. Every agent located in a PB can execute the smart contract to check the validity of a transaction. However, in this model, only a proportion of HEMSs, who have a reputation value r h i more than the trust threshold r ¯ , are allowed to validate the transaction. Note that the CA decides on the trust threshold r ¯ and shares the value with all customers. In addition, the trust threshold changes over time based on the local average reputation value. These HEMSs are called active nodes (ANs), and the idea is to reveal the transaction data only with the trusted nodes (active nodes) in the network to keep the privacy of transactions and reduce the overload.
Algorithm 1 shows the steps of our designed smart contract that are executed by active nodes. A transaction contains a h i ,   r h i ,   c h i , and  x h i that are signed by HEMS’s private key. First, the transaction authenticity is determined using the HEMS public key to validate the message integrity and authentication. Next, the reputation value is checked ( r h i ) to be in a standard range and be equal to the HEMS historical reputation value r e p h i . Note that the historical reputation value is a copy of the customer i’s reputation that is transparent to all HEMSs. The availability value a h i has to be equal to one, otherwise, the corresponding HEMS cannot satisfy the mining energy χ h . In addition, the compliance ratio c h i has to be between 0 and 1, and energy consumption x h i has to be more than zero. Note that the transaction information is only transparent to active nodes. To this end, if a transaction successfully passes these steps (smart contract), it will be added to the mempool.
Algorithm 1 Smart Contract.
1:
Inputs: m e s s a g e = ( a h i ,   r h i ,   c h i ,   x h i ) , P K and σ
2:
if  v e r i f y ( m e s s a g e ,   σ ,   P K ) 1  then
3:
     if  a h i = = 1 and r h i = = r e p h i and 0 < c h i < 1 and x h i 0  then
4:
         The transaction is accepted and added to the mempool.
5:
   end if
6:
end if
It is possible that malicious customers try to deny their submitted energy consumption ( x h i ) . In this case, our model penalizes customers by seizing their security deposit and reducing their reputation value. Now, we must discover the optimal energy consumption ( x h i ) for every customer ( i N C u ) . Our mixed-strategy Stackelberg game is used to achieve realistic outcomes, as explained in the following section.

5. Stochastic Stackelberg Game

5.1. Game Model

The DSO regularly monitors the grid and forecasts day-ahead peak load periods by analyzing customer load profiles using the support vector regression (SVR) prediction model. Here, p h i is the customer i’s predicted demand for the time slot h, and p i = ( p 1 i , , p H i ) is the vector of customer i predicted demand in the next 24 h. As mentioned before, a block generation process is required for both PLP and network supervision events. In the case of network supervision, the DSO asks the CAs to regularly collect customer consumption data from the grid ( x h i ,   i N C u ) . Then, (based on the size of the mempool) the supervision data needs to be stored on the blockchain.
As shown in Figure 1, the DSO passes τ P L P (in case of DR signal) and τ S u p (in case of supervision signal) to the CA; then, the CA passes them to the HEMS in its local area. In the case of a DR signal, HEMSs reply to the demand reduction signal with their load shed availability vector l i = ( l 1 i , , l H i ) , where l h i l i , and then the CA passes them to the DSO. Load shed availability is the desired amount of customer demand reduction for the PLP event. Since the DSO now has a local area demand reduction estimate, it offers the demand reduction reward vector d = ( d 1 , , d H ) for τ P L P and mining reward vector q = ( q 1 , , q H ) to the CA. Hence, before the game starts, the customers submit the reputation vector r h i to the network. At this level, the CA starts the mixed-strategy Stackelberg game and sends the vector of prices k and q to the HEMSs. Note that k = ( k 1 , , k H ) is the reward price vector that the CA allocates to customers for demand reduction and we have d h > k h , where the difference is considered as the CA profit.
d h , k h 0 if h τ P L P d h , k h = 0 otherwise
At the customer level (followers), the customers will receive k (for the PLP event) and q from the CA and maximize their utility function
U C u i = h T i m e q h a r c h i + k h β h i
subject to;
x h i + w h i + α h i e h i b h i
β h i = 1 if x h i ( p h i l h i ) ( p h i x h i ) l h i otherwise
to increase the monetization of demand reduction in the case of PLP and energy resource allocation for block mining. In (2), x i = ( x 1 i , , x H i ) is customer i’s strategy vector. The customer shares x i , a i , and c i with the CA for every DR and supervision transaction. Note that (2) can be used for both PLP and supervision events according to T i m e = { τ P L P o r τ S u p } .
In (2), the first part calculates the customer reward of block mining and the second part presents the demand reduction profit. The first constraint keeps the summation of consumption from the grid ( x h i ) , PV energy production ( w h i ) , and EV energy discharging ( e h i ) more than the customer i’s minimum-required energy b h i . In addition, α h i indicates the EV status as defined in Section 4.1. Note that the EV can discharge when its capacity at time slot h is above a certain threshold T h . β h i = 1 when the customer keeps the energy consumption from the grid less than the difference of the predicted demand and LSA ( x h i p h i l h i ) ; otherwise, if the customer increases the usage ( x h i > p h i l h i ) , then β h i = p h i x h i l h i . Note that if the customer increases their consumption more than the predicted demand ( x h i > p h i ) , they will be penalized with the same utility value ( β h i = p h i x h i l h i ) .
At this point, the CA starts the negotiation (the leader–follower game) with customers in the case of demand reduction and tries to keep a proportion of demand reduction rewards ( d h ) for itself. Therefore, it offers k for a PLP event and q for the mining reward to the customers. According to these values, the CA can maximize the utility function
U C A = h τ P L P ( d h ( 1 i = 1 N C u x h i i = 1 N C u p h i ) i = 1 N C u k h β h i )
subject to;
k h m i n k h k h m a x
where k = ( k 1 , , k H ) is the strategy vector.
Unlike (2), (3) is only used for the PLP event ( h τ P L P ) since d h , k h = 0 for network supervision. Therefore, the game is only played for PLP event; for the supervision event, an optimization is conducted using (2). According to (3), the first part calculates the profit value of the CA which is proportional to the total power consumption of customers ( i = 1 N C u x h i ) over their predicted demand ( i = 1 N C u p h i ) , and the second part presents the monetary reward that the CA allocates to customers’ demand reduction. The constraint keeps the offered DR reduction price between a lower bound k h m i n and upper bound k h m a x . The negotiation between CA and HEMSs repeats until both sides reach an equilibrium, where no one has any incentive to change their strategies.

5.2. Mixed-Strategy Stackelberg Game and Equilibrium Analysis

The mixed-strategy game model is a stochastic approach that employs a probability distribution model to allocate random values to the strategies of players in different situations [48]. Based on this definition, the mixed-strategy Stackelberg game is used to model the interaction between the CA and customers. Our finite n-player game is defined as follows:
Γ = ( N ,   { S n } n N ,   { U n } n N )
where N ( N = N C A N C u ) is a finite set of players and N is the total number of players while we have N C u = N 1 customers and N C A = 1 with the sets of N C u and N C A , respectively. In addition, S n is the space of pure strategies, and U n is the utility function for player n N . Γ is a finite game where we have a finite number of pure strategies for players. Therefore, for each customer i N C u , m h i is the number of pure strategies at time slot h H , and we have x h i S h i = { s 1 i , s 2 i , , s m h i i } . For the CA, we also have m h 1 number of pure strategies at time slot h H and strategy space, k h S h 1 = { s 1 1 ,   s 2 1 , ,   s m h 1 1 } .
According to [49], a mixed-strategy equilibrium exists when the players choose their strategies probabilistically. Thus, a mixed-strategy of player n at time h is presented by a probability distribution vector σ h n = ( ρ 1 n , ρ 2 n , , ρ m h n n ) over S h n . The summation of the probabilities of player n’s different strategies at time slot h is
d = 1 m h n ρ d n = 1 .
For a mixed-strategy game, the probability distribution over the joint pure strategies s = ( s d 1 1 ,   s d 2 2 , ,   s d N N ) ( s S ) ,   n N and d n { 1 , ,   m h n } , is σ ( s ) = ( ρ d 1 1   , ρ d 2 2 , ,   ρ d N N ) . Therefore, player n’s mixed-strategy payoff value is found as;
U n ( σ ) = s S U n ( s ) σ ( s )
σ ( s ) = n N ρ d n n
where U n ( s ) is the utility function of player n for joint strategies s S and σ ( s ) = n N ρ d n n is its probability distribution. We apply the Monte Carlo model to allocate probabilities to the pure strategies of players based on (5). After calculating (6) for player n, the highest payoff value would be selected as the best result, and its related strategy would be the best response.
Several works have proven the existence of a mixed-strategy Stackelberg equilibrium (SE) [50,51,52]. Following these studies, to prove the existence of Stackelberg equilibrium, we first divide the game into mixed-strategy sub-games (a game between HEMSs and CA in PB is considered as a subgame) [53,54], and then based on the Kakutani fixed-point theory [55], the mixed-strategy Nash equilibrium (NE) can be proven for each subgame. Moreover, by using the Simplex algorithm [56], we can prune the searching area and find the optimal points in a short time. A complete step-by-step equilibrium proof is presented in our prior work [57].
To find SE based on (6), the following assumption has to be satisfied for the CA when customers select their best responses:
d = 1 m h 1 U C A ( s d 1 , s 1 * ) ρ d 1
subject to:
d = 1 m h 1 i = 1 N C u U C u i ( s d 1 , s d i i * ) U C u i ( s d 1 , s d i i ) ρ d 1 0
d = 1 m h 1 ρ d 1 = 1
s d 1 S h 1
where s d 1 is the pure strategy of the CA while s d 1 S h 1 . s 1 * is a joint variable of customers’ best response strategy when the CA selects strategy s d 1 . The value ρ d 1 is the probability of the CA, and s d i i * is the pure best strategy of customer i where s d i i * S h i . Equation (7) represents that, for s 1 * , we calculate a mixed-strategy for the CA via linear programming (LP) and under the constraints, ( ρ 1 1 * , , ρ m h 1 1 * ) would be the optimal mixed-strategy that maximizes the CA utility function.
The equilibrium is found using backward induction that first calculates the best response of customers i ( s d i i * ) using
s d i i * = argmax A d i = 1 m h i U C u i ( s d 1 , s d i i ) ρ d i i , s d 1 S h 1
subject to A (which represents the constraints in (2)) for all customers, based on the initial price of the CA as s d 1 strategy.
Then, customers pass their best strategies ( s d i i * , i N C u ) to the CA subgame, and the CA can find its best response s d 1 * using (7). This process repeats between the CA and customers, where customers calculate (8) with the best response of CA in the next rounds.
Theorem 1.
There is a Stackelberg equilibrium in our presented mixed-strategy Stackelberg game based on the optimal solutions of the customers and CA.
Proof. 
According to Kakutani fixed-point theory [55], the existence of mixed-strategy NE has to be proven in each subgame (since we divided the Stackelberg game into subgames) to prove the SE for the whole game. Utility function U C u i is non-empty, non-negative, and continuous, and it is defined on a compact subset of Euclidean space [58]. Furthermore, U C A i is concave, and we can find its maximum point. Moreover, (7) is a linear optimization on the CA’s probability distribution while it is convex and is defined on a compact subset of Euclidean space. Thus, we can assert that there is an optimal point in (7) which is a mixed-strategy Stackelberg equilibrium. □

6. Security and Privacy Analysis

This section analyzes the data consistency and security of our proposed model against different attacks. A Sybil attack happens when the attacker defines itself with multiple identities, but this attack easily fails due to the identical public keys [59], where in our model the CA represents public keys for the HEMSs. An appending attack occurs when a registered node in the network tries to submit a fraudulent transaction to the blockchain [19]. To neutralize this attack, our defined smart contract never approves a node with invalid availability, reputation, compliance ratio, and consumption data. Sometimes, a malicious node attempts to alter submitted transaction data or block information; this behavior is referred to as data forgery. [44,47]. In our case, block information cannot be forged due to the hash pointer feature, and the attack could be easily detected with the digital signature. The data spoofing attack changes the identity of HEMSs [44], but in our scheme, the identity of HEMS is known due to its initial registration within the CA. In case of repudiation [44] in our designed model, malicious nodes may try to refuse their submitted energy consumption values. In this situation, our model punishes the customer by seizing their security deposit and reducing their reputation value. An authentication attack occurs when one node tries to forge another node’s identity [44]. Based on our architecture, the private key of HEMS is unique and confidential, which no one knows, thus a malicious HEMS cannot fake another HEMS’s identity. For a man-in-the-middle attack, a destructive node could attempt to change transactions during transmission [60]. However, within the digital signature and smart contract, no faulty or forged data may be added to the block. A denial of service attack happens when a node starts to send multiple transactions [61] to the CA and keeps it busy to take it out of service. In our architecture, only registered nodes are allowed to submit one transaction in response to the CA’s signal. Therefore, additional transactions are ignored. Last but not least is the 51% attack that happens when 51% of customers become attackers and generate fake data for storage on the blockchain [19]. According to [17], the proof of stake (PoS) consensus algorithm confronts the 51% attack within its voting process. Our proposed CA can recognize the fraud settlements at the execution time, and in return seizes the malicious nodes’ security deposit, reduces their reputation, and moves them to a blacklist, where they will not be selected as a miner or active node for a while. To this end, our consensus algorithm (PoES) can prevent the 51% attack with the help of the active nodes on the transaction validation (voting system). The CA decides on the trust threshold r ¯ and shares the value with all customers. The HEMSs with certain trust thresholds are called active nodes (ANs). Other nodes in the network can reveal the transaction data only with the trusted nodes (active nodes) in the network to keep the privacy of transactions and reduce the overload. Then, in the first step, the malicious nodes can be easily detected by ANs and be penalized.

7. Simulation Results

The required energy for the block mining process depends on the number of transactions and the hash function difficulty level of the miner. There are various articles [62,63,64,65] addressing mining energy, where in [65], the authors have found that for a small private blockchain network, a miner with specific hardware (2 core CPU and 8 GB RAM) requires 1 Watt to process one transaction. Consequently, in our proposed architecture with the same hardware features, we need almost χ = 3.2 kW (the size of mempool is 3200 transactions). For N C u = 100 customers, the CA launches the DR game model by sending 100 initial transactions, and the Stackelberg game repeats for 15 iterations (30 bidirectional transactions) to settle. In the case of network supervision, customers share their consumption with the CA every 15 min. Then, they transmit almost 400 monitoring signals (transactions) in one hour, and according to the mempool size, three block minings are needed to save the 24-h monitoring data on the blockchain.
A dataset of annual consumption for 100 households, provided by Hydro Ottawa Limited, in Ottawa, and a PV energy generation data, provided by the University of Ottawa SUNLAB [66], was selected to evaluate our model. Our analysis focuses on the month of July. To forecast customers’ load profiles for the subsequent 24 h, we employed a SVR model. The proposed architecture was implemented in Python and MATLAB, and we assumed that each household had a PV system (capacity of 4kW), an EV (battery capacity of 40 kWh, maximum discharging power 5 kW), and a HEMS (with 2 cores CPU and 8 GB RAM) for mining and monitoring scheme. To establish a consistent baseline, we set the initial reputation value for all households to 0.1 ( r h i = 0.1 , i N c ). We had d h = 0.3 $ / kWh (based on dispatching price) and q h = 3 $ / kWh as the block mining reward.

7.1. Effect of EV on Customer Decision

We made the assumption that every customer has an EV that could be fully charged in 8 h with a maximum discharging power of 5 kW. According to the dataset, the average customer demand would be 1.5 kWh at peak hours. We examined the connection between the probability of winning the block mining and the state of charge (SoC) of the EV battery, while the percentage of demand reduction is fixed. This result is shown in Figure 2. An EV does not discharge its capacity when its SoC falls below T h = 20 % (8 kWh). We observed the probability distribution that from zero percent SoC to 35% (14 kWh), the probability mounts with a uniform slope because of the increase in demand reduction, and 35% is an optimal point to start the discharge EV with the maximum power. Thus, for the SoC more than 35%, the probability of winning the block mining raises more than 0.5 for different percentages of demand reduction, which means a higher likelihood of winning the block mining. we found that when demand reduction exceeds 50% of the customer’s baseline load, the probability of winning a block mining increases even further.
Next, we examined the impact of various percentages of SoC on the probability of winning the block mining as the demand reduction increased. Figure 3 shows that the average probability increases significantly for low demand reduction, up to about 0.3 kWh, and largely plateauing thereafter, except for the highest SoC, where the probability climbs with increasing DR. That is, not only does the highest SoC win out for a given DR, its likelihood increases for the higher DR at the higher SoC.
The dependence of the average customer profit, which includes profits from both mining and DR, and the on demand reduction, is presented in Figure 4, with a focus on varying levels of SoC. The customer’s profit is insensitive to SoC at higher values (beyond 50%), increasing strongly for low DR and plateauing at about $ 1.5 /day for higher DR. In contrast, the behavior is far more linear, and quite reduced, for lower SoC, implying that a high SoC is needed to win out at mining.
To determine the effect of EV discharging on customers’ average reputation value, Figure 5 displays the reputation changes for three types of customers: inactive (does not discharge EV), moderate (discharge at 50% of discharging rate), and maximum (discharge at the maximum rate) over 15 continuous block mining events. Note that, in this experiment, the demand reduction remained fixed (0.4 kWh) for all customers. The reputation of the maximum customer increases more and it wins more block mining events in comparison. Therefore, we conclude that EVs have significant effects on elevating the chance of customers winning the block mining in addition to increasing their profit by converting their DERs into monetary assets.

7.2. Blockchain Performance

To test the performance of the blockchain in detecting malicious activity, we selected 10, 20, 50, and 70 customers out of a total of 100 customers, as ANs responsible for validating smart contract transactions. The results are shown in Figure 6. We found that with the increase in malicious nodes and the number of ANs in the network, the average probability of detecting the malicious activity is 100% as long as the number of AN is somewhat greater than the number of malicious nodes. Beyond this point, the detection probability decreases linearly with the increasing number of malicious nodes. For example, if half of the customers are malicious and only 10 customers function as active nodes, our model can detect malicious activity with a probability of more than 0.5 and thus defeat a 51% attack. Note that an active node could be a true or malicious node based on a probability distribution model.
To determine the minimum number of active nodes needed for secure transaction validation, Figure 7 shows the dependence of the minimum number of ANs needed on the average reputation. We observe that there is a near one-to-one drop in the minimum with increasing reputation, and the minimum needed remains unchanged. We found that, despite variations in the average reputation, the minimum number of active nodes remains constant. It indicates that our proposed blockchain-based mechanisms deliver robustness against malicious activity. Furthermore, the minimum number of active nodes required for secure validation remains relatively stable.
In addition, in Table 1, we performed a comprehensive evaluation of computational costs, communication costs, and storage associated with our proposed mixed-strategy stochastic game, energy transaction validation through smart contracts, and consensus algorithm. The table provides a detailed breakdown of the computational, communication, and storage demands, offering insights into the resource requirements necessary to implement our system. This analysis is required for assessing the feasibility and scalability of our proposed model in real-world settings.

8. Conclusions

In this article, we presented a secure and robust DR model that uses the mixed-strategy Stackelberg game integrated with an energy blockchain. The advantages of the proposed solution are: involving customers in a probabilistic game model to control their demand at peak periods, maximizing DR profit for customers, increasing the winning probability for block mining, investing the surplus DERs into monetary resources, and using the distributed processing hardware of the customers for the block mining. We defined the PoES as a consensus algorithm to select the block miner considering the reputation, availability, and compliance ratio. We proved the existence of Stackelberg equilibrium point using Kakutani fixed-point theory. The results presented the relation between the average probability value of block mining and DR contribution and showed that this probability increases by increasing demand reduction and EV’s SoC. We illustrated the average probability of detecting malicious nodes with different ANs, where the proposed energy blockchain model with only 10 active nodes can defeat a 51% attack. We studied the probability of winning the block mining and showed with more than 20% demand reduction and 35% SoC, the probability of block mining goes beyond 0.5. The outcomes showed that the model can provide a secure and robust demand response method by defeating malicious activities and security attacks.

Author Contributions

The authors contributed equally to the conceptualization and methodology. Software, validation, and writing—original draft preparation, M.S. Validation, S.R. Writing—review and editing and supervision, M.E.-K. and H.S. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by NSERC CREATE grants program no. 497981. Erol-Kantarci’s research is supported by NSERC Canada Research Chairs program.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

We would like to thank Hydro Ottawa, Canada, for providing the residential power consumption dataset.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
APAccess point
ANActive node
CAControl agent
DSData synchronization
DRDemand response
DSADigital signature algorithm
DERDistributed energy resource
DSODistribution system operator
EVElectric vehicle
HEMSHome energy management systems
IDIdentity
IoTInternet of Things
LPLinear programming
LSALoad shed availability
NENash equilibrium
PLPPeak load period
PVPhotovoltaic
PBPrivate blockchain
PoEProof of energy
PoECProof of energy consumption
PoEGProof of energy generation
PoEMProof of energy market
PoESProof of energy saving
PoSProof of stake
PoWProof of work
PKPublic verification key
SKSecret/private signing key
SaaSSoftware as a service
SEStackelberg equilibrium
SoCStates of charge
SupSupervision event
SVRSupport vector regression
VPPVirtual power plant

References

  1. Kumar, P.; Nikolovski, S.; Dong, Z. Internet of Energy Handbook; CRC Press: Boca Raton, FL, USA, 2021. [Google Scholar]
  2. Zhou, H.; Aral, A.; Brandić, I.; Erol-Kantarci, M. Multiagent Bayesian deep reinforcement learning for microgrid energy management under communication failures. IEEE Internet Things J. 2021, 9, 11685–11698. [Google Scholar] [CrossRef]
  3. Yang, Q.; Wang, H. Privacy-preserving transactive energy management for IoT-aided smart homes via blockchain. IEEE Internet Things J. 2021, 8, 11463–11475. [Google Scholar] [CrossRef]
  4. Erol-Kantarci, M.; Mouftah, H. Wireless sensor networks for cost-efficient residential energy management in the smart grid. IEEE Trans. Smart Grid 2011, 2, 314–325. [Google Scholar] [CrossRef]
  5. Razghandi, M.; Zhou, H.; Erol-Kantarci, M.; Turgut, D. Smart Home Energy Management: VAE-GAN synthetic dataset generator and Q-learning. arXiv 2023, arXiv:2305.08885. [Google Scholar] [CrossRef]
  6. Di Silvestre, M.; Gallo, P.; Sanseverino, E.; Sciume, G.; Zizzo, G. Aggregation and remuneration in demand response with a blockchain-based framework. IEEE Trans. Ind. Appl. 2020, 56, 4248–4257. [Google Scholar] [CrossRef]
  7. Thukral, M. Emergence of blockchain-technology application in peer-to-peer electrical-energy trading: A review. Clean Energy 2021, 5, 104–123. [Google Scholar] [CrossRef]
  8. Saxena, S.; Farag, H.; Brookson, A.; Turesson, H.; Kim, H. A Permissioned Blockchain System to Reduce Peak Demand in Residential Communities via Energy Trading: A Real-World Case Study. IEEE Access 2020, 9, 5517–5530. [Google Scholar] [CrossRef]
  9. Johnson, E. Insight into the World of Blockchain by Cybrosys Technologies—Cryptocurrency—Bitcoin; Scribd: San Francisco, CA, USA, 2020. [Google Scholar]
  10. Samadi, M.; Fattahi, J. EVSE Effectiveness in Multi-Unit Residential Buildings using Composite Optimization and Heuristic Search. IEEE Trans. Power Syst. 2023, early access, 1–13. [Google Scholar] [CrossRef]
  11. Fattahi, J.; Samadi, M. Effective Self-Committed V2G for Residential Complexes. Sustain. Energy Grids Netw. 2023, 35, 101114. [Google Scholar] [CrossRef]
  12. Almunawar, M.; Anshari, M. Empowering customers in electronic health (e–health) through social customer relationship management. Int. J. Electron. Cust. Relatsh. Manag. 2014, 8, 87–100. [Google Scholar] [CrossRef]
  13. Jiang, T.; Fang, H.; Wang, H. Blockchain-based internet of vehicles: Distributed network architecture and performance analysis. IEEE Internet Things J. 2018, 6, 4640–4649. [Google Scholar] [CrossRef]
  14. Siano, P.; De Marco, G.; Rolán, A.; Loia, V. A survey and evaluation of the potentials of distributed ledger technology for peer-to-peer transactive energy exchanges in local energy markets. IEEE Syst. J. 2019, 13, 3454–3466. [Google Scholar] [CrossRef]
  15. Ghorbanian, M.; Dolatabadi, S.; Siano, P.; Kouveliotis-Lysikatos, I.; Hatziargyriou, N. Methods for flexible management of blockchain-based cryptocurrencies in electricity markets and smart grids. IEEE Trans. Smart Grid 2020, 11, 4227–4235. [Google Scholar] [CrossRef]
  16. Asgaonkar, A.; Krishnamachari, B. Solving the buyer and seller’s dilemma: A dual-deposit escrow smart contract for provably cheat-proof delivery and payment for a digital good without a trusted mediator. In Proceedings of the 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Seoul, Republic of Korea, 14–17 May 2019; pp. 262–267. [Google Scholar]
  17. Julie, E.; Nayahi, J.; Jhanjhi, N. Blockchain Technology: Fundamentals, Applications, and Case Studies; CRC Press: Boca Raton, FL, USA, 2020. [Google Scholar]
  18. Dedeoglu, V.; Jurdak, R.; Putra, G.D.; Dorri, A.; Kanhere, S. A trust architecture for blockchain in IoT. In Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Houston, TX, USA, 12–14 November 2019; pp. 190–199. [Google Scholar]
  19. Dorri, A.; Kanhere, S.; Jurdak, R.; Gauravaram, P. LSB: A Lightweight Scalable Blockchain for IoT security and anonymity. J. Parallel Distrib. Comput. 2019, 134, 180–197. [Google Scholar] [CrossRef]
  20. Kang, J.; Xiong, Z.; Niyato, D.; Ye, D.; Kim, D.; Zhao, J. Toward secure blockchain-enabled internet of vehicles: Optimizing consensus management using reputation and contract theory. IEEE Trans. Veh. Technol. 2019, 68, 2906–2920. [Google Scholar] [CrossRef]
  21. Rouhani, S.; Deters, R. Data Trust Framework Using Blockchain Technology and Adaptive Transaction Validation. IEEE Access 2021, 9, 90379–90391. [Google Scholar] [CrossRef]
  22. Liu, Z.; Luong, N.; Wang, W.; Niyato, D.; Wang, P.; Liang, Y.; Kim, D. A survey on blockchain: A game theoretical perspective. IEEE Access 2019, 7, 47615–47643. [Google Scholar] [CrossRef]
  23. Hassan, M.; Rehmani, M.; Chen, J. VPT: Privacy Preserving Energy Trading and Block Mining Mechanism for Blockchain based Virtual Power Plants. arXiv 2021, arXiv:2102.01480. [Google Scholar]
  24. Moniruzzaman, M.; Yassine, A.; Benlamri, R. Blockchain-based mechanisms for local energy trading in smart grids. In Proceedings of the 2019 IEEE 16th International Conference on Smart Cities: Improving Quality of Life Using ICT & IoT and AI (HONET-ICT), Charlotte, NC, USA, 6–9 October 2019 ; pp. 110–114. [Google Scholar]
  25. Jindal, A.; Aujla, G.; Kumar, N.; Villari, M. GUARDIAN: Blockchain-based secure demand response management in smart grid system. IEEE Trans. Serv. Comput. 2019, 13, 613–624. [Google Scholar] [CrossRef]
  26. Chatterjee, K.; Goharshady, A.; Ibsen-Jensen, R.; Velner, Y. Ergodic mean-payoff games for the analysis of attacks in crypto-currencies. arXiv 2018, arXiv:1806.03108. [Google Scholar]
  27. Sapirshtein, A.; Sompolinsky, Y.; Zohar, A. Optimal selfish mining strategies in bitcoin. In Proceedings of the International Conference on Financial Cryptography and Data Security, Christ Church, Barbados, 22–26 February 2016; Springer: Berlin/Heidelberg, Germany, 2016; pp. 515–532. [Google Scholar]
  28. Cheng, L.; Yu, T. Game-theoretic approaches applied to transactions in the open and ever-growing electricity markets from the perspective of power demand response: An overview. IEEE Access 2019, 7, 25727–25762. [Google Scholar] [CrossRef]
  29. Ben Abdelaziz, F.; Mrad, F. Multiagent systems for modeling the information game in a financial market. Int. Trans. Oper. Res. 2023, 30, 2210–2223. [Google Scholar] [CrossRef]
  30. Dong, C.; Wang, Y.; Aldweesh, A.; McCorry, P.; van Moorsel, A. Betrayal, distrust, and rationality: Smart counter-collusion contracts for verifiable cloud computing. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA, 30 October–3 November 2017; pp. 211–227. [Google Scholar]
  31. Bigi, G.; Bracciali, A.; Meacci, G.; Tuosto, E. Validation of decentralised smart contracts through game theory and formal methods. In Programming Languages with Applications to Biology and Security; Springer: Berlin/Heidelberg, Germany, 2015; pp. 142–161. [Google Scholar]
  32. Dimitri, N. Bitcoin mining as a contest. Ledger 2017, 2, 31–37. [Google Scholar] [CrossRef]
  33. Guo, Y.; Wan, Z.; Cheng, X. When blockchain meets smart grids: A comprehensive survey. High-Confid. Comput. 2022, 2, 100059. [Google Scholar] [CrossRef]
  34. Yu, M.; Hong, S. A real-time demand-response algorithm for smart grids: A stackelberg game approach. IEEE Trans. Smart Grid 2015, 7, 879–888. [Google Scholar] [CrossRef]
  35. Nekouei, E.; Alpcan, T.; Chattopadhyay, D. Game-theoretic frameworks for demand response in electricity markets. IEEE Trans. Smart Grid 2014, 6, 748–758. [Google Scholar] [CrossRef]
  36. Başar, T.; Jan Olsder, G. Chapter 3. Non-cooperative Finite Games: N-Person Nonzero-Sum. In Dynamic Non-Cooperative Game Theory, 2nd ed.; Society for Industrial and Applied Mathematics: Philadelphia, PA, USA, 1998; pp. 77–160. [Google Scholar]
  37. Jiang, Y.; Zhou, K.; Lu, X.; Yang, S. Electricity trading pricing among prosumers with game theory-based model in energy blockchain environment. Appl. Energy 2020, 271, 115239–115252. [Google Scholar] [CrossRef]
  38. Wang, H.; Feng, T.; Xiong, W. How can the dynamic game be integrated into blockchain-based distributed energy resources multi-agent transactions for decision-making? Energy 2022, 254, 124318. [Google Scholar] [CrossRef]
  39. Bai, F.; Zhang, C.; Zhang, X. Intelligent optimal demand response implemented by blockchain and cooperative game in microgrids. Int. Trans. Oper. Res. 2023. early view. [Google Scholar] [CrossRef]
  40. Pradhan, N.; Singh, A.; Sudha, S.; Reddy, K.; Roy, D. Performance Evaluation and Cyberattack Mitigation in a Blockchain-Enabled Peer-to-Peer Energy Trading Framework. Sensors 2023, 23, 670. [Google Scholar] [CrossRef]
  41. Mitrea, D.; Cioara, T.; Anghel, I. Privacy-Preserving Computation for Peer-to-Peer Energy Trading on a Public Blockchain. Sensors 2023, 23, 4640. [Google Scholar] [CrossRef] [PubMed]
  42. Tsao, Y.; Thanh, V. Toward blockchain-based renewable energy microgrid design considering default risk and demand uncertainty. Renew. Energy 2021, 163, 870–881. [Google Scholar] [CrossRef]
  43. Samadi, M.; Schriemer, H.; Ruj, S.; Erol-Kantarci, M. Energy Blockchain for Demand Response and Distributed Energy Resource Management. In Proceedings of the 2021 IEEE 12th International Conference on Communications, Control, and Computing Technologies for Smart Grids (IEEESmartGridComm), Aachen, Germany, 25–28 October 2021. [Google Scholar]
  44. Danish, S.; Zhang, K.; Jacobsen, H.; Ashraf, N.; Qureshi, H. Blockev: Efficient and secure charging station selection for electric vehicles. IEEE Trans. Intell. Transp. Syst. 2020, 22, 4194–4211. [Google Scholar] [CrossRef]
  45. Diffie, W.; Hellman, M. New directions in cryptography. IEEE Trans. Inf. Theory 1976, 22, 644–654. [Google Scholar] [CrossRef]
  46. Asheralieva, A.; Niyato, D. Reputation-Based Coalition Formation for Secure Self-Organized and Scalable Sharding in IoT Blockchains With Mobile-Edge Computing. IEEE Internet Things J. 2020, 7, 11830–11850. [Google Scholar] [CrossRef]
  47. Kang, J.; Yu, R.; Huang, X.; Wu, M.; Maharjan, S.; Xie, S.; Zhang, Y. Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet Things J. 2019, 6, 4660–4670. [Google Scholar] [CrossRef]
  48. Chatterjee, B. An optimization formulation to compute Nash equilibrium in finite games. In Proceedings of the 2009 Proceeding of International Conference on Methods and Models in Computer Science (ICM2CS), New Delhi, India, 14–15 December 2009; pp. 1–5. [Google Scholar]
  49. Cunningham, L.; Baldick, R.; Baughman, M. An empirical study of applied game theory: Transmission constrained Cournot behavior. IEEE Trans. Power Syst. 2002, 17, 166–172. [Google Scholar] [CrossRef]
  50. Korzhyk, D.; Conitzer, V.; Parr, R. Solving Stackelberg games with uncertain observability. In Proceedings of the International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS), Taipei, Taiwan, 2–6 May 2011; pp. 1013–1020. [Google Scholar]
  51. Marecki, J.; Tesauro, G.; Segal, R. Playing repeated stackelberg games with unknown opponents. In Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, Valencia, Spain, 4–8 June 2012; Volume 2, pp. 821–828. [Google Scholar]
  52. Conitzer, V. On Stackelberg mixed strategies. Synthese 2016, 193, 689–703. [Google Scholar] [CrossRef]
  53. Fattahi, J.; Wright, D.; Schriemer, H. An Energy Internet DERMS Platform using a Multi-level Stackelberg Game. Sustain. Cities Soc. 2020, 60, 102262–102288. [Google Scholar] [CrossRef]
  54. Watson, J. Chapter 15. Sequential Rationality and Subgame Perfection. In Strategy: An Introduction to Game Theory; Norton, W.W., Ed.; Numerade: Santa Monica, CA, USA, 2008; pp. 183–199. [Google Scholar]
  55. Kakutani, S. A generalization of Brouwer’s fixed point theorem. Duke Math. J. 1941, 8, 457–459. [Google Scholar] [CrossRef]
  56. Arora, R. Optimization: Algorithms and Applications; CRC Press: Boca Raton, FL, USA, 2015; pp. 93–133. [Google Scholar]
  57. Samadi, M.; Kebriaei, H.; Schriemer, H.; Erol-Kantarci, M. Stochastic Demand Response Management Using Mixed-Strategy Stackelberg Game. IEEE Syst. J. 2022, 16, 4708–4718. [Google Scholar] [CrossRef]
  58. Tadelis, S. Game Theory: An Introduction; Princeton University Press: Princeton, NJ, USA, 2013; pp. 101–123. [Google Scholar]
  59. Douceur, J. The sybil attack. In Proceedings of the International Workshop on Peer-To-Peer Systems, Cambridge, MA, USA, 7–8 March 2002; Springer: Berlin/Heidelberg, Germany, 2002; pp. 251–260. [Google Scholar]
  60. Conti, M.; Dragoni, N.; Lesyk, V. A survey of man in the middle attacks. IEEE Commun. Surv. Tutor. 2016, 18, 2027–2051. [Google Scholar] [CrossRef]
  61. Chaganti, R.; Boppana, R.; Ravi, V.; Munir, K.; Almutairi, M.; Rustam, F.; Lee, E.; Ashraf, I. A comprehensive review of denial of service attacks in blockchain ecosystem and open challenges. IEEE Access 2022, 10, 96538–96555. [Google Scholar] [CrossRef]
  62. De Maio, V.; Uriarte, R.; Brandic, I. Energy and profit-aware proof-of-stake offloading in blockchain-based vanets. In Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing, Auckland, New Zealand, 2–5 December 2019; pp. 177–186. [Google Scholar]
  63. O’Dwyer, K.; Malone, D. Bitcoin mining and its energy footprint. In Proceedings of the 25th IET Irish Signals & Systems Conference (ISSC’14), Limerick, Ireland, 26–27 June 2014; pp. 280–285. [Google Scholar]
  64. Yang, J.; Paudel, A.; Gooi, H. Compensation for power loss by a Proof-of-Stake consortium blockchain microgrid. IEEE Trans. Ind. Inform. 2020, 17, 3253–3262. [Google Scholar] [CrossRef]
  65. Sedlmeir, J.; Buhl, H.; Fridgen, G.; Keller, R. Recent Developments in Blockchain Technology and their Impact on Energy Consumption. arXiv 2021, arXiv:2102.07886. [Google Scholar]
  66. SUNLAB Group at University of Ottawa Photovoltaic Testing at Ottawa Region. 2018. Available online: http://sunlab.eecs.uottawa.ca/facilities/solar-test-sites/ (accessed on 26 July 2023).
Figure 1. Hierarchical architecture and exchange parameters between DSO, certified CAs, and HEMSs.
Figure 1. Hierarchical architecture and exchange parameters between DSO, certified CAs, and HEMSs.
Sensors 23 08352 g001
Figure 2. The average probability value of block mining with respect to state of charge (SoC) and different demand reduction percentages.
Figure 2. The average probability value of block mining with respect to state of charge (SoC) and different demand reduction percentages.
Sensors 23 08352 g002
Figure 3. The average probability value of block mining with respect to demand reduction and different state of charge (SoC) percentages.
Figure 3. The average probability value of block mining with respect to demand reduction and different state of charge (SoC) percentages.
Sensors 23 08352 g003
Figure 4. The average profit value of customers with respect to demand reduction and different state of charge (SoC) percentages.
Figure 4. The average profit value of customers with respect to demand reduction and different state of charge (SoC) percentages.
Sensors 23 08352 g004
Figure 5. The average reputation value of three different types of customers (inactive, moderate, and maximum) in 15 continuous mining events.
Figure 5. The average reputation value of three different types of customers (inactive, moderate, and maximum) in 15 continuous mining events.
Sensors 23 08352 g005
Figure 6. The average probability of detecting malicious nodes with different active nodes (ANs) while the numbers of malicious customers are increasing.
Figure 6. The average probability of detecting malicious nodes with different active nodes (ANs) while the numbers of malicious customers are increasing.
Sensors 23 08352 g006
Figure 7. The minimum required number of active nodes (ANs) with respect to the network’s average reputation value.
Figure 7. The minimum required number of active nodes (ANs) with respect to the network’s average reputation value.
Sensors 23 08352 g007
Table 1. Cost estimates of components.
Table 1. Cost estimates of components.
ComponentCommunicationComputationalStorage
Mixed-Strategy Stochastic Game10 μ s50 μ s0.011 MB
Smart Contract (per validation)5 μ s500 ns0.1 MB
Consensus (PoES) (per block validation)50 μ s0.5 ms1.5 MB
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Samadi, M.; Ruj, S.; Schriemer, H.; Erol-Kantarci, M. Secure and Robust Demand Response Using Stackelberg Game Model and Energy Blockchain. Sensors 2023, 23, 8352. https://doi.org/10.3390/s23208352

AMA Style

Samadi M, Ruj S, Schriemer H, Erol-Kantarci M. Secure and Robust Demand Response Using Stackelberg Game Model and Energy Blockchain. Sensors. 2023; 23(20):8352. https://doi.org/10.3390/s23208352

Chicago/Turabian Style

Samadi, Mikhak, Sushmita Ruj, Henry Schriemer, and Melike Erol-Kantarci. 2023. "Secure and Robust Demand Response Using Stackelberg Game Model and Energy Blockchain" Sensors 23, no. 20: 8352. https://doi.org/10.3390/s23208352

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop