Next Article in Journal
Employment Protection and Banking Power: Evidence from Adoption of Wrongful Discharge Laws
Next Article in Special Issue
Intelligent Access Control Design for Security Context Awareness in Smart Grid
Previous Article in Journal
Prediction Interval Estimation Methods for Artificial Neural Network (ANN)-Based Modeling of the Hydro-Climatic Processes, a Review
Previous Article in Special Issue
Discovering Social Desires and Conflicts from Subculture Narrative Multimedia
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Design of a Secure Energy Trading Model Based on a Blockchain

Instituto Superior de Engenharia do Porto (ISEP)/Polytechnic of Porto (IPP), R. Dr. Antonio Bernardino de Almeida, 431, 4249-015 Porto, Portugal
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Sustainability 2021, 13(4), 1634; https://doi.org/10.3390/su13041634
Submission received: 2 December 2020 / Revised: 17 January 2021 / Accepted: 2 February 2021 / Published: 3 February 2021
(This article belongs to the Special Issue Human-Centric Urban Services)

Abstract

:
This study proposes a Secure Energy Trading Model design based on a Blockchain is an attempt to overcome the weak security and instability of the current energy trading system. The focal point of the design lies in the user-security features of the model, such as user authentication and identification, and the blockchain that every transaction goes through. The user-security feature provides a safer system for peer-to-peer energy trade, and the blockchain technology ensures the reliability of the trading system. Furthermore, the Secure Energy Trading Model supports a decentralized data control mechanism as a future measure for handling vast amounts of data created by IoT.

1. Introduction

Along with consumption, consumers have begun to take part in the overall process of the development and distribution in various industries. Simultaneously, the frontiers between suppliers and consumers are becoming more blurred [1]. Prosumer, a portmanteau of the words producer and consumer, was introduced as a futuristic concept by Alvin Toffler in 1980, and it is no longer a distant concept. In recent years, the traditional energy market system has shifted as increasing numbers of households have installed devices [1,2], such as solar panels, to generate their own electricity from renewable sources [3]. Meanwhile, a peer-to-peer energy trading system is gaining more recognition as an alternative version to the conventional energy market for consumers and producers [4,5]. The system requires a secure transaction agent for the varied types of producers and consumers. The blockchain-based Secure Energy Trade Model (SETM) proposed in this paper includes a producer/consumer module and a blockchain module that satisfies this need. The SETM consists of a transaction agent, which is a multi-interaction management agent (MiM agent), and a blockchain that contains cost information and a request/reply message. This model is connected to the consumer and the producer through an energy network. Over the course of this paper, we lay out the design of the blockchain-based secure energy trade model (SETM). In Section 2, we go through the issue statement, which is proceeded by the definition of the proposed SETM in Section 3. Then, the implementation of the SETM and a discussion with regards to the model is given in Section 4 and Section 5, respectively. The paper is concluded in Section 6.

2. Background

2.1. Prosumer

Prosumer is a portmanteau of the words producer and consumer. In this case, an energy prosumer is a consumer that also generates their own energy [1]. Depending on the supply level, a prosumer can alternate between a consumer and a producer depending on a person’s energy consumption and production. Various countries have different platforms that support energy trading activities between prosumers. The UK’s web-based electricity trading platform “Piclo” connects electricity producers and consumers every 30 min to trade energy [2]. The Netherlands operates “Vandebron”, a web-based platform structured to accommodate interpersonal transactions. Germany operates an online platform that connects owners of solar power facilities who wish to sell their surplus energy to their neighbours [4].

2.2. Blockchain

A blockchain is a shared and distributed digital database structured by blocks chained in chronological order. Each block contains transaction data. Simply put, the structure is a ledger that includes digital transaction and data records [6]. It is a peer-to-peer distributed digital record of validated transactions. The technology is applied to establish reliability, accountability and transparency of transaction processes. It has the advantage of reducing the transaction processing cost and complexity [5]. In addition, it operates on a system based on the consensus of network users instead of a central authority that manages the system.

2.3. Problem Definition

Currently, energy is traded on an unreliable e-trade system that lacks security and stability. Despite its registration process, the system is prone to forgery and price tampering by its participants [7]. Without a user-security step, the blockchain can be accessed and opened for anyone to join a transaction. This means that the trade system is vulnerable to participants exploiting the system by trying to modify/block/interrupt transactions. In addition, the system’s centralized data handling process is inadequate to keep up with the vast amount of data created by the ever increasing IoT [8]. A secure energy trading platform that can also process big data must be devised [9]. In response to the issue, an energy trading model with the integration of blockchain technology is proposed as a secure and stable platform that conforms to modern standards in the field. In [10], the authors suggest a blockchain-based secure service mechanism for IoT with a blockchain. The service code is protected by unreliable servers that are implicated in the seamless on-board computer network and with a blockchain [11]. The efficiency of the system for resource constrained devices is evaluated by the results of the simulation. However, neither a service charging mechanism nor a security mechanism for secure communication is considered. In [10], in the commercial warranty system, systems that do not fix security issues are vulnerable to data hijacking. A transparent computing network for a deportation system with a centralized and distributed architecture would be used for cost-effective communication. The servers are distributed in order to provide a necessary service and to arrive at the location. However, efficient deployment of servers that can enable IoT caching techniques is not considered. The authors introduced a blockchain based on Vehicular Network, which allows for the development of a distributed network in large vehicles [12]. However, a trust management system is required to ensure dependable communication. Generally, in V2V, each ID is used for communication purposes. However, it is vulnerable to privacy leakage problems.

3. Secure Energy Trading Model (SETM)

In this section, Figure 1 shows the SETM which explains the model configuration, including consumers, producers, request time, price of the transaction and the definition of an authentication and identification method of user security.

3.1. SETM Structure

In Figure 1, SETM consists of a consumer, a  producer, a  blockchain module, a multi-interaction management agent (MiM agent) and a blockchain for reliable multilateral transactions. The producer and the consumer in the model are a representation of a user interconnected in multiple forms. A prosumer may alternate between these two roles depending on the need. Users are granted roles only after authentication through a trusted server, such as uA and uI. Users are linked to each other in a grid, and they share the energy they need or the energy they want to trade. Using the shared information, users request to buy the amount they need, and the seller receives these purchase requests. The energy transaction between these users with different roles is stored in a blockchain.

3.2. Energy Market Mechanism

The SETM is connected to a blockchain energy network (BEN). The customer and/or the producer such as smart factories, energy companies, home solar systems, wearable devices, smart IoT devices, smart vehicles and personal offices are also connected to the BEN together (Figure 2). There is also a multi-interaction manager agent (MiM agent), which consists of the Web, customer service, a blockchain I/F and operation system. The MiM agent functions as a manager of the energy trade in the SETM. Each customer and each producer consist of a controller, device I/F, user I/F, blockchain module and operation system. In Figure 2, the energy company only produces energy. The home solar system can be either a consumer or a producer. A personal office, a smart factory, wearable devices, smart IoT devices and smart vehicles are customers. Generally all participants contact an MiM agent to monitor the current information. If one of the customers wish to buy energy, the customer contacts the MiM agent by sending ’request message’. If a producer wants to sell energy, the producer sends ’share message’. The ‘share message’ contains [available energy and cost]. Consumers have the option of choosing from these offers.

3.3. Messages Flow in SETM

All messages are sent through the energy network (Figure 3). The flow begins with participants, who have to go through the user.security step, user.Authentication uA and uI. As part of the model, user’s security is a formal registration procedure a user must authenticate in order to participate in a transaction. The blockchain guarantees the safety/reliability of transactions, and the dependability of the decentralized database of each user is relatively weak. Each user is given a unique key that is stored on the server, and a mutual key is bestowed to users in a transaction (Figure 4). The mutual key verifies the reliability of the other party. Those that wish to sell on the SETM must enter their amount of energy and cost by sending a SHARE message to the model. Figure 3, depicts energy generators such as the solar system and the home solar system sending a SHARE message. Depending on supply levels, at times, the home solar system can sell surplus energy and vice versa. To buy the energy, buyers send a (request message) to acquire [available cost, amount available] from the SETM. With the (reply message) from the SETM, the buyer receives information, and the trade proceeds in the SETM. Figure 5 shows the process by which each transaction is linked to the blockchain. Each block contains information on the transaction. Information on the transaction includes information on energy shared by each vendor, information on buyers’ purchases and information on each cost. The transaction information (TI: 1,..., n) is defined as shown in Figure 5.

4. Implementation

4.1. Case Study

For this case study, we use data from a local energy market with seven stakeholders ranging from consumers (both domestic and industrial), industrialists and producers. Each party has a usage and generation profile. In Table 1, we can see each member’s min bid and max bid for energy.

4.2. SETM Sequence Diagram

Figure 6 represents the sequence diagram for the SETM. In the figure, there are five personal consumers, one industrial consumer and one generation. The first transaction is initialized with the generation’s SEND Energy(x kW) to personal customer 1. The SEND Energy(x kW) message contains g, ep, message(1 kW). As soon as the message is sent, the (Genesisblock Hash()) is created and treated as the first hashblock. Upon Personal Customer 1’s receipt, the process is ready for the next procedure, Initial.Tran(). Then, message.Energy(xx kW) is sent as a forgeryblockhash. Initial.Tran() now contains g1 and c1 data. Meanwhile, Customer 2 wants to partake in the transaction by processing the User Security Process. Generation 1 sends the same message Energy (xx kW) to Customer 2. Now, Personal Customer 2 can join the transaction by computing blockhash Figure 7. Industrial Customer 1 takes the same steps and the transaction is set at Tran(g1, c1, c2, ic1. In this model, we define energy.Producer(eP), energy.Consumer(eC), energy.Request Time(eRT), energy.Price(ePr), Agreement Time(AT), user.Authentication(uA), and user.Identification(uI) Algorithm 1 and in Algorithm 2. The TI 1 is considered the first blockchain of this block, followed by TI 2 as the next blockchain. put simply, TI n is the nth block chain value. Price (Pr) is expressed in equations when there are two producers (g1, g2). Consumers are provided with the option to select from the variety of supply created by producers nearby. The resulting outcome of this variety leaves consumers to acquire energy at a competition reduced rate.
Algorithm 1 user.SecurityAlgorithm
1:
procedure user.SecurityAlgorith( a , b )  
2:
    for E v e r y t i m e i n a b l o c k do  
3:
         a s k ( U ) u s e r . I d e n t i f i c a t i o n ( u I )  
4:
         r e q u e s t ( C O N F I R M ( U ) ) u s e r . A u t h e n t i c a t i o n ( u A )  
5:
         c o n f i r m ( U )                                                  ▹ for askU and for the blockchain member  
6:
        if ( then Δ h _ u s e r ( u I · u A ) )  
7:
            M e s s a g e ( T h i s i s w r o n g u s e r . )  
8:
            c a n c e l ( u s e r . S e c u r i t y A l g o r i t h m )  
9:
            r e t u r n E R R O R  
10:
       end if 
11:
    end for 
12:
     c o n f i r m ( U )                                                  ▹ for askU and for the blockchain member 
13:
end procedure

5. Discussion

5.1. Model Compare

Unlike previous models, blockchain technology is integrated into the suggested SETM to ensure more secure energy transactions and privacy protection. The privacy of the payment system in the traditional model relies on the trust confirmation of a third party. Problems may occur in the traditional privacy model by attempts made to break the flow of information in some places. [Figure 8]. In comparison, the blockchain of the blockchain-based privacy model [Figure 9] involves the transaction information and all participants’ information to do the payment.
The security of transactions is impossible compromise. Data Unforgeability is the decentralized nature of the consortium blockchain, which combined with digitally signed transactions, ensures that no adversary is able to pass as each node to corrupt the network. The digital signature of a node cannot be forged, nor can an adversary gain control over the majority of the network resources. The energy coin relies on digital signatures to prove ownership and public history of transactions to prevent double-spending. The transaction histories are going to be shared in the P2P network and will be conform to the proof-of-work methods. Digital Wallet Security, without corresponding keys and certificates, no adversary can open a prosumers (consumer and producer)’ wallet and steal energy coins from the wallet. As each node has a unique wallet corresponding to its energy coin account. We use multiple wallet addresses as pseudonyms of this wallet for privacy protection. Last, with the removal of the trusted intermediary, in our energy blockchain, each node trades energy in a P2P manner, which is unlike traditional centralized trading relying on a globally trusted intermediary. All nodes have the equal right to trade energy with the help of authorized prosumers. The energy blockchain is robust and scalable without the involvement of a globally trusted intermediary.

5.2. Security Analysis

Table 2 shows the comparison with existing research for security analysis. The security problem in [13] is that Unknown people can infer a user’s electricity usage habits based on the data. The suggested model integrates the private blockchain and smart meters as a main technology and uses the market auction mechanism. In [14], they used a blockchain, smart meters and smart contract with a market auction mechanism; however, if the cost of each auction can be retrieved in the blockchain, the subsequent auction may be affected. There are lots of main technologies in [15] such as a blockchain, multiple signatures, and anonymous encrypted information flow. However, the multiple signatures would be an unnecessary process because the hash process in the blockchain can replace the signature. In [16], they include private information in all transactions, which can potentially pose a security problem. our suggested SETM uses a blockchain and IoT, and as the pricing mechanism, we defined negotiable energy prices and a multi-agent usage. In the security analysis, because the SETM has the user.security step, such as user.authentication and user.identification, the SETM contains stronger privacy policy than existing studies Algorithm 2.
Algorithm 2 SETM.Transaction Algorithm
1:
procedure Transaction( a , b )  
2:
     c c o n s u m e r  
3:
     g g e n e r a t i o n  
4:
     i c i n d u s t r i a l c u s t o m e r  
5:
     i c g e n e r a t i o n  
6:
     e P e n e r g y . P r o d u c e r  
7:
     e c e n e r g y . C o n s u m e r  
8:
     e R T e n e r g y . R e q u e s t T i m e  
9:
     e P r e n e r g y . P r i c e  
10:
    A T A g r e e m e n t T i m e  
11:
    u A u s e r . A u t h e n t i c a t i o n  
12:
    u I u s e r . I d e n t i f i c a t i o n  
13:
    M a n a g e r E n e r g y . a m o u n t ( k W )                                                             ▹ Keep continue  
14:
   if R E Q U E S T c . A m o u n t ( k W ) then  
15:
         c M i M . A m o u n t ( k W )  
16:
         CASE 1 : I n i t i a l . T r a n s a c t i o n ( g i )  
17:
         C O M P U T E ( F o g e r y . B l o c k H a s h ( ) )  
18:
         G O T O p a y m e n t . T r a n s a c t i o n ( g i )  
19:
         CASE 2 : D e f i n e . T r a n s a c t i o n ( g i )  
20:
         D E F I N E ( g i , c i )  
21:
         C O M P U T E ( B l o c k H a s h ( ) )  
22:
         A D D c i t o D e f i n e . T r a n s a c t i o n ( g i )  
23:
         G O T O p a y m e n t . T r a n s a c t i o n ( g i , c i )  
24:
         CASE 3 : U p d a t e . T r a n s a c t i o n ( g i , c i )  
25:
         C O M P U T E ( B l o c k H a s h ( ) )  
26:
         A D D c i + 1 t o D e f i n e . T r a n s a c t i o n ( g i , c i )  
27:
         G O T O p a y m e n t . T r a n s a c t i o n ( g i , c i , c i + 1 )  
28:
    end if 
29:
     L a b e l : p a y m e n t . T r a n s a c t i o n  
30:
    while t = 0 ( e P i · P r i ) ( e P j · P r j ) do  
31:
         P i = ( t i · P r i ) 1 ( t i + 1 · P r i + 1 ) 1  
32:
         P i + 1 = ( t i + 1 · P r i + 1 ) i + 1 ( t i + 1 · P r i + 1 ) i + 1  
33:
         T r a d e i . S E T = N e g o t i a t i o n . P r ( C i , C i + 1 , . . . , C i + . . . )  
34:
         C i s e t = C o n s u m e r . S E T ( C i )  
35:
    end while 
36:
     h . S E T i = ( B l o c k 1 ( V e r s i o n | | h a s h m e r k l e . t r e e . h a s h | | n o n c e )  
37:
     b l o c k i = ( h . S E T i | | T r a d e i . S E T )  
38:
     e n d L a b e l : p a y m e n t . T r a n s a c t i o n  
39:
end procedure 
We defined the security problems of the existing model in the Section 2.3 problem definition. We define how the SETM overcomes the security problems in Table 3, which is a security strength of SETM. In Table 3, there are four security problem definitions and security of strength was also analysed for each security problem.

6. Conclusions

In this paper, we have thoroughly reviewed the structure, the system and, specifically, the safeguards of the SETM. The security features integrated in the model make it more reliable than the conventional market and any other models suggested from existing studies. The structure of the SETM consists of a multi-interaction management agent (MiM agent) and a blockchain which contains the cost data, request and reply messages. The model is connected to the consumer party and the producer party through an energy network. The system begins with the producer registering the available energy amount for sale along with the price to the model. Consumers can choose and buy from these sellers. However, the model needs further adjustments. Despite the security and stability of the model, the applications of this model are yet unfit for bi-directional trades. Interested stakeholders’ role in the model is confined to either as a consumer or a producer, and cannot be both, specifically a prosumer, for energy trade.

Author Contributions

H.K. leads this paper by suggesting the idea and has performed the implementation and I.P. managed the whole paper work. Both the authors have read and agreed to the published version of the manuscript.

Funding

This work has received funding from FEDER Funds through COMPETE program and from National Funds through FCT under the project SPET–PTDC/EEI-EEE/029165/2017.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
SETMSecure Energy Trade Model
IoTInternet of Things
5G5 Generation

References

  1. Kosnik, E. Production for consumption: Prosumer, citizen-consumer, and ethical consumption in a postgrowth context. Econ. Anthropol. 2018, 5, 123–134. [Google Scholar] [CrossRef]
  2. Zafar, R.; Mahmood, A.; Razzaq, S.; Ali, W.; Naeem, U.; Shehzad, K. Prosumer based energy management and sharing in smart grid. Renew. Sustain. Energy Rev. 2018, 82, 1675–1684. [Google Scholar] [CrossRef]
  3. Zhang, S.; Lee, J.H. A Group Signature and Authentication Scheme for Blockchain-Based Mobile-Edge Computing. IEEE Internet Things J. 2019, 7, 4557–4565. [Google Scholar] [CrossRef]
  4. Hwang, J.; Choi, M.i.; Lee, T.; Jeon, S.; Kim, S.; Park, S.; Park, S. Energy prosumer business model using blockchain system to ensure transparency and safety. Energy Procedia 2017, 141, 194–198. [Google Scholar] [CrossRef]
  5. Park, L.W.; Lee, S.; Chang, H. A sustainable home energy prosumer-chain methodology with energy tags over the blockchain. Sustainability 2018, 10, 658. [Google Scholar] [CrossRef] [Green Version]
  6. Andoni, M.; Robu, V.; Flynn, D.; Abram, S.; Geach, D.; Jenkins, D.; McCallum, P.; Peacock, A. Blockchain technology in the energy sector: A systematic review of challenges and opportunities. Renew. Sustain. Energy Rev. 2019, 10, 143–174. [Google Scholar] [CrossRef]
  7. Sultana, T.; Almogren, A.; Akbar, M.; Zuair, M.; Ullah, I.; Javaid, N. Data sharing system integrating access control mechanism using blockchain-based smart contracts for IoT devices. Appl. Sci. 2020, 10, 488. [Google Scholar] [CrossRef] [Green Version]
  8. Yan, Z.; Lee, J.H. The road to DNS privacy. Future Gener. Comput. Syst. 2020, 112, 604–611. [Google Scholar] [CrossRef]
  9. Guan, Z.; Lu, X.; Wang, N.; Wu, J.; Du, X.; Guizani, M. Towards secure and efficient energy trading in IIoT-enabled energy internet: A blockchain approach. Future Gener. Comput. Syst. 2020, 110, 686–695. [Google Scholar] [CrossRef]
  10. Madhav, B.V.; Balu, S.B.; Laxman, W.S. Time Efficient Secure Negotiation in E-Trading. IRE J. 2019, 2. [Google Scholar]
  11. Sharma, P.K.; Park, J.H. Blockchain based hybrid network architecture for the smart city. Future Gener. Comput. Syst. 2018, 86, 650–655. [Google Scholar] [CrossRef]
  12. Liu, D.; Lee, J.H. CNN based Malicious Website Detection by Invalidating Multiple Web Spams. IEEE Access 2020, 8, 97258–97266. [Google Scholar] [CrossRef]
  13. Mengelkamp, E.; Notheisen, B.; Beer, C.; Dauer, D.; Weinhardt, C. A blockchain-based smart grid: Towards sustainable local energy markets. Comput. Sci. Res. Dev. 2018, 33, 207–214. [Google Scholar] [CrossRef]
  14. Hahn, A.; Singh, R.; Liu, C.C.; Chen, S. Smart contract-based campus demonstration of decentralized transactive energy auctions. In Proceedings of the 2017 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 23–26 April 2017; pp. 1–5. [Google Scholar]
  15. Aitzhan, N.Z.; Svetinovic, D. Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams. IEEE Trans. Dependable Secur. Comput. 2016, 15, 840–852. [Google Scholar] [CrossRef]
  16. Cheng, S.; Zeng, B.; Huang, Y. Research on Application Model of Blockchain Technology in Distributed Electricity Market; IOP Conference Series: Earth and Environmental Science; IOP Publishing: Bristol, UK, 2017; Volume 93, p. 012065. [Google Scholar]
Figure 1. Secure Energy Trade Model (SETM) Structure.
Figure 1. Secure Energy Trade Model (SETM) Structure.
Sustainability 13 01634 g001
Figure 2. Blockchain energy market mechanism.
Figure 2. Blockchain energy market mechanism.
Sustainability 13 01634 g002
Figure 3. SETM flow in a blockchain energy network.
Figure 3. SETM flow in a blockchain energy network.
Sustainability 13 01634 g003
Figure 4. User Identification and user authentication.
Figure 4. User Identification and user authentication.
Sustainability 13 01634 g004
Figure 5. Blockchain structure of SETM.
Figure 5. Blockchain structure of SETM.
Sustainability 13 01634 g005
Figure 6. SETM sequence diagram.
Figure 6. SETM sequence diagram.
Sustainability 13 01634 g006
Figure 7. Result of blockhash value.
Figure 7. Result of blockhash value.
Sustainability 13 01634 g007
Figure 8. Traditional Privacy Model.
Figure 8. Traditional Privacy Model.
Sustainability 13 01634 g008
Figure 9. Blockchain-based privacy model.
Figure 9. Blockchain-based privacy model.
Sustainability 13 01634 g009
Table 1. Case study.
Table 1. Case study.
NameDays for Forecastingmin bid Euro/MWhmax bid Euro/MWh
personal consumer 193446
(Home solar system)
personal consumer 243446
(Wearable Devices)
personal consumer 393648
(Smart Devices)
personal consumer 4183648
(Smart Vehicles)
personal consumer 583848
(Personal Office)
industrial consumer 113933650
(Smart Factories)
generation 13424052
(Solar System)
Table 2. Security analysis.
Table 2. Security analysis.
Ref.Main TechnologiesPricing MechanismSecurity Analysis
 [13]private blockchain, smart metersmarket auction mechanismUnknown people can infer a user electricity usage habits based on the data.
 [14]blockchain, smart meters, smart contractmarket auction mechanismIn case, the cost of each auction can be retrieved in the blockchain, the subsequent auction may be affected.
 [15]blockchain, multiple signatures, anonymous encrypted information flownegotiate energy prices anonymouslyAchieved many security and privacy requirements.
 [5]blockchain, IoTadjust prices of electric energy according to the trading situationnothing
 [16]blockchaindistributed pricing mechanisminclude the private information in the transaction
SETMblockchain, IoTnegotiable energy prices, multi-agent useduse the user security (user authentication and user identification
Table 3. Security strength of SETM.
Table 3. Security strength of SETM.
Security ProblemSecurity Strength
Lack security and stabilitySETM applied user.security = [uA, uI] to all participants, so without user.security, no one can join the trade system. The user.security can keep the security in stability.
Vulnerable to forgery and price tamperingA blockchain in SETM prevents the forgery and the tampering in the transactions.
Vulnerable to participants exploiting the system by trying to modify/block/interrupt the transactionsIf someone who has joined the trade system, modified the transaction, then the rules of the blockchain are broken. If the rules are broken, the trade system will be blocked.
Centralization of the data handling process is inadequate to keep track of the vast amount of data.Basically, a blockchain is a peer-to-peer distributed digital record of validated transactions, not the centralized data handling.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Ko, H.; Praça, I. Design of a Secure Energy Trading Model Based on a Blockchain. Sustainability 2021, 13, 1634. https://doi.org/10.3390/su13041634

AMA Style

Ko H, Praça I. Design of a Secure Energy Trading Model Based on a Blockchain. Sustainability. 2021; 13(4):1634. https://doi.org/10.3390/su13041634

Chicago/Turabian Style

Ko, Hoon, and Isabel Praça. 2021. "Design of a Secure Energy Trading Model Based on a Blockchain" Sustainability 13, no. 4: 1634. https://doi.org/10.3390/su13041634

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop