Blockchain-Based Malicious Behaviour Management Scheme for Smart Grids
Abstract
:1. Introduction
- Authenticity: Hyperledger Fabric has a built-in public key infrastructure (Fabric CA [17]) and support for external PKI, supporting authentication and protecting data integrity. Each user and entity has a unique digital certificate and corresponding private key that verifies that the identity is legitimate, trustworthy, and has not been forged.
- Tamper-proof: Once a user’s personal account information (identification and malicious behaviour) has been identified and published to the blockchain, it is permanently recorded and cannot be tampered with.
- Traceability: All penalties imposed on malicious users in the network and any information updated into the ledger can be traced.
- We propose a consortium blockchain-based network management solution for malicious behaviour penalty that intends to limit the frequency of malicious behaviour by penalising attackers and reducing their propensity to attack. We detail the design process of the scheme, including the system design architecture, system actions, operation logic, data flow, and the relevant algorithms to implement the penalties.
- We provide criteria and methods for the quantitative evaluation of various malicious behaviours based on BWM, as well as countermeasures to penalise attackers.
2. Related Work
3. Scheme Design
3.1. Design Overview
- Blocking any unauthorised user from accessing the smart grid to avoid anonymous attackers,
- Promptly addressing and penalising attackers,
- Cutting off their access to reduce grid losses, and
- Ensuring that each phase is done correctly and alleviating the concerns of honest users.
3.2. System Architecture and Components
3.2.1. Network Entities
- i
- Users :is the various groups of clients who wish to participate in , including consumers and suppliers directly involved in the transaction and the staff who maintain the . interacts with the UMN (c) via the Software Development Kit (SDK) to send registration proposal containing real identity information I, receive penalty decisions, verify penalty results, and interacts with (g) to send entry requests.
- ii
- Admins :exists in each organisation to provide registration services for . Using a CA client, registers certificates (i) for who have passed verification. By communicating with the UMN, can initialize account information into the ledger (d). are not allowed to access to participate in transactions directly and cannot interfere with the UMN system, but they can take on the role of observers, observing behaviour and feeding back to .
- iii
- Monitoring Nodes :is a cluster of various physical hardware devices such as Advanced Metering Infrastructure (AMI) deployed and set up to automatically perform monitoring on and have analysis and reporting capabilities. Among these features of , the process of automatically monitoring and collecting information about malicious behaviours is complex and out of the scope of our research, so we set the following assumptions based on the support of existing research and focus on how to analyse and pre-process malicious behaviours and how to report them into UMN (f). can detect the set M of all malicious behaviours imposed by a specific attacker in the smart grid (h) refer Table 1. For the collected set of malicious behaviours M, the will first analyse it to generate the malicious behaviour list as shown in the Table 2, where the table includes the product of losses for each malicious behaviour in the best weight (defined in Section 4.2.1) of different criteria and the number of times the behaviour recurs t. After generating , will analyse and pre-process it using the steps in Section 4.2.2, and then output the user’s malicious behaviour report including malicious points and malicious set M. The specific workflow is shown in Figure 2. The generated report will be reported to the UMN network so that the penalty mechanism can be applied.
- iv
- Smart Grid :is a separate, complete electricity service network for accessing and trading electricity. processes user requests for access to the Smart Grid Network (g) by interacting with the UMN and checking the user’s access rights attributes in the UMN world state (e). Meanwhile, is also responsible for collecting the penalty (defined in Section 4.4) and returning receipts.
3.2.2. Network Components
- i
- Certificate Authority (CA):The Hyperledger Fabric contains the abstract concept of a Member Service Provider (MSP). It is based on a Public Key Infrastructure (PKI) that protects network entities, peers and orderers and maintains the network’s privacy and confidentiality. In the UMN, there are two types of CAs: the TLS CA, which protects the communication between organisations, nodes and processes. The other is the CA of each organisation, which issues certificates to the orderer nodes, peer nodes and network entities in their respective organisations so that they can verify each other’s identity. The CA structure of each organisation includes a CA server and CA client. The server is responsible for listening to permission requests from clients and performing operations such as registration, activation, renewal, and revocation. The client communicates with the server through the command line interface (CLI) to register identities and enrol the nodes to obtain certificate files.
- ii
- Peer:Peer nodes have two roles in the UMN network. The first is to offer interaction for external entities to query the ledger (a-1) and execute the chaincode (smart contract). External entities can send chaincode invocation requests to the node, and the node can invoke the chaincode for pre-processing, endorsement and verification after receiving the requests. Peer is also responsible for operating the chaincode (a-2) as a carrier of the chaincode to offer a platform for the chaincode’s interaction with the network. The second role is to act as a commit and anchor node in the network to receive data blocks from the network and forward them to other nodes to synchronise, update and maintain all ledgers in the network (a-3).Each peer node in the UMN network contains two elements, a separate copy of the ledger and a copy of the chaincode. The ledger consists of a world state and a blockchain. The world state is a database that stores the current state of the ledger, which records immutably any information changes made by smart contracts, intending to make the current value of the database state easily accessible. In contrast, the blockchain is a log of system information updates that records all changes to the world’s present state. The data structure of the blockchain is immutable and cannot be modified once written. We define the following data structure Table 3 of accounts that appear in the world state database and the blockchain.In Table 3, where ID and UserName are proof to determine the user’s identity, AccessPermission is the basis used by the smart grid to determine if the user has access to the grid, MaliciousBehaviour is the malicious behaviour imposed by the user on the smart grid, MaliciousPoints is the criterion to determine if the user receives a penalty, FinesDeadlineAndFinesmap use the date as the keyword for a map to hold the amount of the penalty, for example [“01/02/2022 11:31:31”] = “$100”, TimePenalty end date is the date the advanced penalty (Defined in Section 4.1) ends, and TimeStamp is the time the ledger adds this data.The chaincode is a component that manages and packages smart contracts. To implement the functionality of the UMN system, we have designed five smart contracts: User Registration Contract (URC), Malicious Behaviour Contract (MBC), Account Maintenance Contract (AMC), User Payment Contract (UPC) and account reset contract (ARC). Among them:
- User Registration Contract (URC): URC will be initiated and deployed between to register new . The function is created and executed to initialise the user account , and its function will only accept proposals from . The contract will record additional information such as username, user id, access permission, timestamp and other relevant information.
- Malicious Behaviour Contract (MBC): The MBC is designed to handle malicious behaviour reports submitted by . Based on the penalty rules in Section 4.1, the MBC will generate the penalty decision and update it to .
- Account Maintenance Contract (AMC): The AMC is set up to monitor whether the user has completed the corresponding penalty. Once the penalty parameter in is non-empty, AMC will automatically deploy. It confirms whether further penalties are to be imposed on the by determining if the has paid the penalty on time during the primary penalty phase described in Section 4.1.
- User Payment Contract (UPC): The role of the UPC is to verify that the has successfully paid the to . After the has paid the , he/she must submit an application to the UPC to verify the result. The UPC verifies the signatures of and in submitted by the . For that passes the verification, the penalty information recorded in it will be removed from the user’s in the world state database.
- Reset Account Contract (ARC): ARC restores the legal status of user in the world state at the end of each level of penalty. Every change in the ledger will trigger the ARC, and it decides whether to update by examining the information in the ledger.
- iii
- Orderer:The Hyperledger Fabric structure works in a way that defines the important role of the orderer in the network. To ensure that the proposals recorded in the ledger are correct and there are no forks, the orderer is required to order and distribute the proposals. The orderer uses a consensus algorithm to order the transactions for the endorsed proposals and packages them into blocks, and packaged blocks are then distributed to the submitting nodes in the network for validation against the endorsement policy [46]. The orderer is also responsible for maintaining the channel and implementing basic access control. The channel is the bridge for communication and exchange between organisations and is used to protect the privacy of credit value changes, while the orderer restricts who can read and write data and who can configure them.
4. Penalty Mechanism
4.1. Penalty Strategies
4.2. Malicious Behaviour Point Algorithm
4.2.1. Deployment Phase
4.2.2. Real-Time Calculation Phase
4.3. Definition of Penalty Thresholds
4.4. Penalty Algorithms
5. How UMN Works
- User registration, enrolment and login phase;
- Monitoring and malicious behaviour handling phase;
- Enforcing penalties, maintaining and resetting phase.
5.1. User Registration, Enrolment and Login Phase
5.2. Monitoring and Malicious Behaviour Handling Phase
- Steps 1.1 and 1.2 are off-chain actions among and , aiming to monitor and collect the set of malicious behaviours M in the . We use the contents of M as input to step 1.3 to drive the analysis module in the .
- Step 1.3 Match each malicious behaviour in M with the predefined malicious behaviour database in Section 4.2.1. The successfully matched are generated and input into step 1.4, while the unsuccessful matched is analysed and updated to the database by the expert group. Step 1.4 then performs further operations on the generated to generate .
- Steps 2.1–2.4 are on-chain processes carried out by the MBC in a similar flow as Figure 4, where the input is compared with and to generate and .
- Steps 3.1 to 3.3 are taken by the . For a , whose is not empty, the removes its permission to continue accessing the grid and isolates so that it loses the necessary conditions to commit malicious behaviour.
Algorithm 1 Handling malicious behaviour reports. |
Input:
Output:
User’s account current total malicious points: if
then return else if
then return else return end if |
5.3. Enforcing Penalties, Maintaining and Resetting Phase
Algorithm 2 User payment algorithm. |
Input: (ID, Rcpt{pid, Map[DDL]Fp}) UserPayment: if is the same as the proposal submission ID then Get from world state if and match then Calculate malicious points () that fines represent: Delete the matching item from the user account, and update as (old ) to the user account Return else Error message: No corresponding fines found. end if end if |
6. Security Evaluation
6.1. Assumptions Made
6.2. Confidentiality
- If uses I to try to obtain through the registration process after has successfully registered and eventually obtained , will reject it during the verification process.
- If tries to register using I before the first registration of , it still will not be able to pass the verification and obtain during because it cannot answer the correctly.
6.3. Integrity
6.4. Security Analysis
7. Performance Evaluation
7.1. Experimental Setup
- i
- Prerequisites:The results of this experiment are influenced by several factors, so for accurate evaluation and analysis, we place the following restrictions on the experimental variables.First, we consider the block size, which indicates the number of proposals contained in each block. Research has shown that an increase in block size leads to an increase in throughput [50], and for this reason, in our experiments we fix the size of each submitted block. Simultaneously, we consider that during the whole proposal submission process, the peer processes one block at a time. Each proposal has the same complexity and is independent of each other. Secondly, the number of channels has an impact on system performance and scalability, as each channel handles different proposals independently. This experiment only discusses the case of a single channel.
- ii
- Definitions of Key Metrics:The two key metrics used to evaluate performance for the experiments, throughput and latency, are defined in the Hyperledger Blockchain Performance Metrics white paper [51].The transaction throughput is a measure of the rate at which a Hyperledger Fabric-based network environment commits valid transactions in a given period of time. A formal mathematical description can be expressed asIn description (8), is the total number of submitted proposals, is the time of the initial proposal submission, and is the time of the last proposal submission.Since the system needs time to validate transactions sent to the network, this validation time is expressed in terms of transaction latency. Specifically, the transaction latency is the time taken between the submission of a proposal and the end of validation. A formal mathematical description can be expressed as
- iii
- Environment and Parameters: We list the tools used during the experiments as well as the configuration and parameters of the system in Table 4.
7.2. Experimental Evaluation
Results
- The throughput results from the caliper are shown in Figure 12. Throughout the experiment, the throughput increases linearly with increasing the transaction sending rates. After increasing the sending rate to 100 tps, the throughput peaked (70 tps) and levelled off. The above result shows that the maximum usable rate of the system is 70 tps. Meanwhile, there is a slight drop in throughput after the peak is reached, which is caused by a drop in the system performance when the load exceeds the peak.
- The latency test results are shown in Figure 13. This chart depicts the latency of communication and the rate of the write transactions, where latency is measured in seconds. The latency in the chart stays very low at the beginning (0.298 s) at a send rate of 50 tps. As the transaction rate increases, the latency increases rapidly and continues to increase slowly after reaching full system capacity (100 tps). However, the latency remains under 1.6 s throughout the test range.
8. Discussion
9. Future Work
10. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Appendix A
Notation | Explanation |
---|---|
Users interested in participating in the smart grid. | |
Administrators responsible for authentication. | |
Monitoring Nodes. | |
Smart Grid. | |
User accounts recorded in the ledger. | |
I | User’s identity verification information. |
User permissions for accessing the smart grid. | |
Monitoring list generated by monitoring activities. | |
Malicious behaviour reports. | |
Malicious points. | |
M | Set of malicious behaviours. |
Identifier and password pair for obtaining . | |
User certificate file. | |
Map of fines deadlines and fines. | |
Fines. | |
Challenge information for dual validation. | |
Product of each malicious act for criteria weight . | |
Criteria weight as defined in Section 4.2.1. | |
t | Number of repetitions of malicious behaviour. |
Set of quantified malicious behaviour unit conditions, where b is the quantified value of a specific condition. | |
Set of damages caused by malicious behaviour, where l represents the cumulative damage. | |
Set of penalties for repeated malicious behavior, where r is the number of occurrences. | |
Threshold. | |
Time penalties. | |
Perpetrators of malicious behaviour. | |
User Registration Contract. | |
Malicious Behaviour Contract. | |
Account Maintenance Contract. | |
User Payment Contract. | |
Account Reset Contract. |
References
- Farhangi, H. The path of the smart grid. IEEE Power Energy Mag. 2009, 8, 18–28. [Google Scholar] [CrossRef]
- Lo, C.H.; Ansari, N. Decentralized controls and communications for autonomous distribution networks in smart grid. IEEE Trans. Smart Grid 2012, 4, 66–77. [Google Scholar] [CrossRef]
- Kim, Y.J.; Thottan, M.; Kolesnikov, V.; Lee, W. A secure decentralized data-centric information infrastructure for smart grid. IEEE Commun. Mag. 2010, 48, 58–65. [Google Scholar] [CrossRef]
- Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system. Decentralized Bus. Rev. 2008. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 15 September 2023).
- Xu, Z.; Salehi Shahraki, A.; Rudolph, C. Blockchain Applications in Smart Grid. In Australasian Computer Science Week 2022; ACM: New York, NY, USA, 2022; pp. 37–45. [Google Scholar]
- Agung, A.A.G.; Handayani, R. Blockchain for smart grid. J. King Saud-Univ.-Comput. Inf. Sci. 2022, 34, 666–675. [Google Scholar] [CrossRef]
- Khattak, H.A.; Tehreem, K.; Almogren, A.; Ameer, Z.; Din, I.U.; Adnan, M. Dynamic pricing in industrial internet of things: Blockchain application for energy management in smart cities. J. Inf. Secur. Appl. 2020, 55, 102615. [Google Scholar] [CrossRef]
- Guan, Z.; Si, G.; Zhang, X.; Wu, L.; Guizani, N.; Du, X.; Ma, Y. Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities. IEEE Commun. Mag. 2018, 56, 82–88. [Google Scholar] [CrossRef]
- Sicari, S.; Rizzardi, A.; Grieco, L.A.; Coen-Porisini, A. Security, privacy and trust in Internet of Things: The road ahead. Comput. Netw. 2015, 76, 146–164. [Google Scholar] [CrossRef]
- Hasan, M.K.; Alkhalifah, A.; Islam, S.; Babiker, N.; Habib, A.; Aman, A.H.M.; Hossain, M.A. Blockchain technology on smart grid, energy trading, and big data: Security issues, challenges, and recommendations. Wirel. Commun. Mob. Comput. 2022, 2022, 9065768. [Google Scholar] [CrossRef]
- Gao, J.; Asamoah, K.O.; Sifah, E.B.; Smahi, A.; Xia, Q.; Xia, H.; Zhang, X.; Dong, G. GridMonitoring: Secured sovereign blockchain based monitoring on smart grid. IEEE Access 2018, 6, 9917–9925. [Google Scholar] [CrossRef]
- HS, J. Reputation management in vehicular network using blockchain. Peer-to-Peer Netw. Appl. 2022, 15, 901–920. [Google Scholar]
- Alnasser, A.; Sun, H. A fuzzy logic trust model for secure routing in smart grid networks. IEEE Access 2017, 5, 17896–17903. [Google Scholar] [CrossRef]
- Kumari, A.; Patel, M.M.; Shukla, A.; Tanwar, S.; Kumar, N.; Rodrigues, J.J. ArMor: A data analytics scheme to identify malicious behaviors on blockchain-based smart grid system. In Proceedings of the GLOBECOM 2020—2020 IEEE Global Communications Conference, Taipei, Taiwan, 7–11 December 2020; pp. 1–6. [Google Scholar]
- Rezaei, J. Best-worst multi-criteria decision-making method. Omega 2015, 53, 49–57. [Google Scholar] [CrossRef]
- Androulaki, E.; Barger, A.; Bortnikov, V.; Cachin, C.; Christidis, K.; De Caro, A.; Enyeart, D.; Ferris, C.; Laventman, G.; Manevich, Y.; et al. Hyperledger fabric: A distributed operating system for permissioned blockchains. In Proceedings of the 13th EuroSys Conference, Porto, Portugal, 23–26 April 2018; pp. 1–15. [Google Scholar]
- Hyperledger Fabric CA Docs. Hyperledger Fabric CA User’s Guide; Hyperledger Foundation: San Francisco, CA, USA, 2017. Available online: https://hyperledger-fabric-ca.readthedocs.io/en/latest/users-guide.html (accessed on 2 October 2023).
- Mollah, M.B.; Zhao, J.; Niyato, D.; Lam, K.Y.; Zhang, X.; Ghias, A.M.; Koh, L.H.; Yang, L. Blockchain for future smart grid: A comprehensive survey. IEEE Internet Things J. 2020, 8, 18–43. [Google Scholar] [CrossRef]
- Goel, S.; Hong, Y. Security challenges in smart grid implementation. In Smart Grid Security; Springer: Berlin/Heidelberg, Germany, 2015; pp. 1–39. [Google Scholar]
- Rahiminejad, A.; Plotnek, J.; Atallah, R.; Dubois, M.A.; Malatrait, D.; Ghafouri, M.; Mohammadi, A.; Debbabi, M. A resilience-based recovery scheme for smart grid restoration following cyberattacks to substations. Int. J. Electr. Power Energy Syst. 2023, 145, 108610. [Google Scholar] [CrossRef]
- Kabalci, Y. A survey on smart metering and smart grid communication. Renew. Sustain. Energy Rev. 2016, 57, 302–318. [Google Scholar] [CrossRef]
- Aoufi, S.; Derhab, A.; Guerroumi, M. Survey of false data injection in smart power grid: Attacks, countermeasures and challenges. J. Inf. Secur. Appl. 2020, 54, 102518. [Google Scholar] [CrossRef]
- Gunduz, M.Z.; Das, R. Cyber-security on smart grid: Threats and potential solutions. Comput. Netw. 2020, 169, 107094. [Google Scholar] [CrossRef]
- Yang, Y.; Littler, T.; Sezer, S.; McLaughlin, K.; Wang, H. Impact of cyber-security issues on smart grid. In Proceedings of the 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies, Manchester, UK, 5–7 December 2011; pp. 1–7. [Google Scholar]
- El Mrabet, Z.; Kaabouch, N.; El Ghazi, H.; El Ghazi, H. Cyber-security in smart grid: Survey and challenges. Comput. Electr. Eng. 2018, 67, 469–482. [Google Scholar] [CrossRef]
- Liu, J.; Xiao, Y.; Gao, J. Achieving accountability in smart grid. IEEE Syst. J. 2013, 8, 493–508. [Google Scholar] [CrossRef]
- Melo, W. Blockchains and legal metrology: Applications and possibilities. OIML Bull. 2021, 62, 10–20. [Google Scholar]
- Miličević, K.; Tolić, I.; Vinko, D.; Horvat, G. Blockchain-Based Concept for Digital Transformation of Traceability Pyramid for Electrical Energy Measurement. Sensors 2022, 22, 9292. [Google Scholar] [CrossRef]
- Ibrahem, M.I.; Nabil, M.; Fouda, M.M.; Mahmoud, M.M.; Alasmary, W.; Alsolami, F. Efficient privacy-preserving electricity theft detection with dynamic billing and load monitoring for AMI networks. IEEE Internet Things J. 2020, 8, 1243–1258. [Google Scholar] [CrossRef]
- Ashfaq, T.; Khalid, R.; Yahaya, A.S.; Aslam, S.; Azar, A.T.; Alsafari, S.; Hameed, I.A. A machine learning and blockchain based efficient fraud detection mechanism. Sensors 2022, 22, 7162. [Google Scholar] [CrossRef]
- Jeffin, M.; Madhu, G.; Rao, A.; Singh, G.; Vyjayanthi, C. Internet of things enabled power theft detection and smart meter monitoring system. In Proceedings of the 2020 International Conference on Communication and Signal Processing (ICCSP), Chennai, India, 28–30 July 2020; pp. 0262–0267. [Google Scholar]
- Aman, M.N.; Javed, K.; Sikdar, B.; Chua, K.C. Detecting data tampering attacks in synchrophasor networks using time hopping. In Proceedings of the 2016 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe), Ljubljana, Slovenia, 9–12 October 2016; pp. 1–6. [Google Scholar]
- Ali, S.; Li, Y. Learning multilevel auto-encoders for DDoS attack detection in smart grid network. IEEE Access 2019, 7, 108647–108659. [Google Scholar] [CrossRef]
- Chatfield, B.; Haddad, R.J.; Chen, L. Low-computational complexity intrusion detection system for jamming attacks in smart grids. In Proceedings of the 2018 International Conference on Computing, Networking and Communications (ICNC), Maui, HI, USA, 5–8 March 2018; pp. 367–371. [Google Scholar]
- Xue, A.; Xu, F.; Chow, J.H.; Leng, S.; Kong, H.; Xu, J.; Bi, T. Data-driven detection for GPS spoofing attack using phasor measurements in smart grid. Int. J. Electr. Power Energy Syst. 2021, 129, 106883. [Google Scholar] [CrossRef]
- He, Y.; Mendis, G.J.; Wei, J. Real-time detection of false data injection attacks in smart grid: A deep learning-based intelligent mechanism. IEEE Trans. Smart Grid 2017, 8, 2505–2516. [Google Scholar] [CrossRef]
- Weerapanpisit, P.; Trilles, S.; Huerta, J.; Painho, M. A decentralized location-based reputation management system in the IoT using blockchain. IEEE Internet Things J. 2022, 9, 15100–15115. [Google Scholar] [CrossRef]
- Melo, W.; Carmo, L.F.; Bessani, A.; Neves, N.; Santin, A. How blockchains can improve measuring instruments regulation and control. In Proceedings of the 2018 IEEE International Instrumentation and Measurement Technology Conference (I2MTC), Houston, TX, USA, 14–17 May 2018; pp. 1–6. [Google Scholar]
- Liang, X.; Zhao, Q.; Zhang, Y.; Liu, H.; Zhang, Q. EduChain: A highly available education consortium blockchain platform based on Hyperledger Fabric. Concurr. Comput. Pract. Exp. 2021, 35, e6330. [Google Scholar] [CrossRef]
- Alhajri, M.; Rudolph, C.; Shahraki, A.S. A Blockchain-Based Consent Mechanism for Access to Fitness Data in the Healthcare Context. IEEE Access 2022, 10, 22960–22979. [Google Scholar] [CrossRef]
- Shahraki, A.S.; Rudolph, C.; Grobler, M. Attribute-based data access control for multi-authority system. In Proceedings of the 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China, 29 December 2020–1 January 2021; pp. 1834–1841. [Google Scholar]
- Salehi, A.; Han, R.; Rudolph, C.; Grobler, M. DACP: Enforcing a dynamic access control policy in cross-domain environments. Comput. Networks 2023, 237, 110049. [Google Scholar] [CrossRef]
- Liu, H.; Han, D.; Li, D. Fabric-IoT: A blockchain-based access control system in IoT. IEEE Access 2020, 8, 18207–18218. [Google Scholar] [CrossRef]
- Ahmad, R.W.; Hasan, H.; Jayaraman, R.; Salah, K.; Omar, M. Blockchain applications and architectures for port operations and logistics management. Res. Transp. Bus. Manag. 2021, 41, 100620. [Google Scholar] [CrossRef]
- Ma, C.; Kong, X.; Lan, Q.; Zhou, Z. The privacy protection mechanism of Hyperledger Fabric and its application in supply chain finance. Cybersecurity 2019, 2, 5. [Google Scholar] [CrossRef]
- Valenta, M.; Sandner, P. Comparison of ethereum, hyperledger fabric and corda. Frankf. Sch. Blockchain Cent. 2017, 8, 1–8. [Google Scholar]
- Camenisch, J.; Mödersheim, S.; Sommer, D. A formal model of identity mixer. In Proceedings of the International Workshop on Formal Methods for Industrial Critical Systems, Antwerp, Belgium, 20–21 September 2010; pp. 198–214. [Google Scholar]
- Li, D.; Peng, W.; Deng, W.; Gai, F. A blockchain-based authentication and security mechanism for IoT. In Proceedings of the 2018 27th International Conference on Computer Communication and Networks (ICCCN), Hangzhou, China, 30 July–2 August 2018; pp. 1–6. [Google Scholar]
- Tam, K. TLS in Hyperledger Fabric. Available online: https://kctheservant.medium.com/tls-in-hyperledger-fabric-b38fccb8614c (accessed on 26 May 2022).
- Kuzlu, M.; Pipattanasomporn, M.; Gurses, L.; Rahman, S. Performance analysis of a hyperledger fabric blockchain framework: Throughput, latency and scalability. In Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain), Atlanta, GA, USA, 14–17 July 2019; pp. 536–540. [Google Scholar]
- Hyperledger Performance and Scale Working Group Hyperledger Blockchain Performance Metrics White Paper. Available online: https://www.hyperledger.org/learn/publications/blockchain-performance-metrics (accessed on 31 October 2018).
- Baliga, A.; Solanki, N.; Verekar, S.; Pednekar, A.; Kamat, P.; Chatterjee, S. Performance characterization of hyperledger fabric. In Proceedings of the 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), Zug, Switzerland, 20–22 June 2018; pp. 65–74. [Google Scholar]
- Thakkar, P.; Nathan, S.; Viswanathan, B. Performance benchmarking and optimizing hyperledger fabric blockchain platform. In Proceedings of the 2018 IEEE 26th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), Milwaukee, WI, USA, 25–28 September 2018; pp. 264–276. [Google Scholar]
- Nasir, Q.; Qasse, I.A.; Abu Talib, M.; Nassif, A.B. Performance analysis of hyperledger fabric platforms. Secur. Commun. Netw. 2018, 2018, 3976093. [Google Scholar] [CrossRef]
Malicious Behaviour Name and Definition | Literature Review |
---|---|
Electricity Theft: Malicious users lower their billing costs by reporting false readings. | Ref. [29] presents a model for fraud detection using machine learning. The model utilises the inner product operation on encrypted readings to evaluate the machine learning model for detecting electricity theft. |
Transaction Fraud: Trading with illegitimate accounts. | Ref. [30] proposes a security fraud detection model based on machine learning and blockchain technology. The model detects transaction fraud by predicting how incoming transactions behave through XGboost and Random Forest (RF) algorithms. |
Meter bypass, meter tampering and direct line hookups. | Ref. [31] uses linear regression methods to continuously monitor smart meter data to detect electricity theft. And they develop an application to monitor the consumer’s electricity usage. |
Data tampering: An attacker tampers the data in a Phasor Measurement Unit (PMU) packet. | Ref. [32] proposed a randomised time-hopping sequence protocol. This random time-hopping sequence is generated from a secret seed shared by the Phasor Measurement Unit (PMU) and the Phase Data Concentrator (PDC). |
Distributed Denial of Service (DDoS): Nodes send a large number of false data packets or execution requests to target servers, which result in the denial of service to legal users. | Ref. [33] introduces multilevel auto-encoder-based feature learning. Features are generated by unsupervised learning of multilevel shallow and deep auto-encoders and combined with an efficient multi-kernel learning (MKL) algorithm to generate a detection model. |
Jamming: By transmitting high-powered radio signals of the same frequency to jam network operations. | Ref. [34] develops an intrusion detection system (IDS) to analyse the received signal strength indicator (RSSI) and packet loss rate (PLR) of 802.11 network traffic in smart grid communication systems to detect interference attacks. |
GPS spoofing: Forging GPS signals to provide wrong time signals to geographically dispersed Phasor Measurement Units (PMU). | Ref. [35] detects GPS spoofing attacks by monitoring the change of historical statistics and abrupt change index in Phasor Measurement Unit (PMU) data. |
False Data Injection: Injecting malicious measurements into a hacked meter. | Ref. [36] utilise deep learning methods to identify behavioural features associated with historical measurement data related to false data injection attacks and then employs these captured features for the real-time detection of such attacks. |
Malicious Behavior M | Quantitative Value P of the Criterion w | Times of Malicious Behavior Repeated | |||
---|---|---|---|---|---|
⋯ | |||||
⋯ | t | ||||
⋯ | ⋯ | ⋯ | ⋯ | ⋯ | ⋯ |
Variable Name | Data Types | Initial Data | Json |
---|---|---|---|
ID | string | User ID | json:”ID” |
UserName | string | User Name | json:”username” |
AccessPermission | bool | true | json:”accesspermission” |
MaliciousBehaviour | string | nil | json:”maliciousbehaviour” |
MaliciousPoints | int | 0 | json:”maliciouspoints” |
FinesDeadlineAndFinesmap | map[date]int | nil | json:”[finesdeadline]fines” |
TimePenalty | date | nil | json:”timepenalty” |
TimeStamp | date | System time at registration | json:”timestamp” |
Parameters | Values |
---|---|
Benchmarking Tool: | Hyperledger caliper v0.5.0. |
CPU: | 4 Core CPU (Intel i5-10210U CPU @ 1.60 GHz). |
Memory: | 4 GB. |
SSD: | 120 GB. |
Network: | 25 Mbps. |
Virtual Machines: | Oracle VM VirtualBox. |
System: | Ubuntu 18.04. |
Hyperledger Fabric Version: | Hyperledger Fabric release v1.4.7. |
Channels: | 1 Channel. |
World State Database: | CouchDB. |
Block Size: | 20. |
Consensus Mechanism: | Raft. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Xu, Z.; Salehi Shahraki, A.; Rudolph, C. Blockchain-Based Malicious Behaviour Management Scheme for Smart Grids. Smart Cities 2023, 6, 3005-3031. https://doi.org/10.3390/smartcities6050135
Xu Z, Salehi Shahraki A, Rudolph C. Blockchain-Based Malicious Behaviour Management Scheme for Smart Grids. Smart Cities. 2023; 6(5):3005-3031. https://doi.org/10.3390/smartcities6050135
Chicago/Turabian StyleXu, Ziqiang, Ahmad Salehi Shahraki, and Carsten Rudolph. 2023. "Blockchain-Based Malicious Behaviour Management Scheme for Smart Grids" Smart Cities 6, no. 5: 3005-3031. https://doi.org/10.3390/smartcities6050135
APA StyleXu, Z., Salehi Shahraki, A., & Rudolph, C. (2023). Blockchain-Based Malicious Behaviour Management Scheme for Smart Grids. Smart Cities, 6(5), 3005-3031. https://doi.org/10.3390/smartcities6050135