Blockchain Technology on Smart Grid, Energy Trading, and Big Data: Security Issues, Challenges, and Recommendations

被引:45
|
作者
Hasan, Mohammad Kamrul [1 ]
Alkhalifah, Ali [2 ]
Islam, Shayla [3 ]
Babiker, Nissrein B. M. [4 ]
Habib, A. K. M. Ahasan [1 ]
Aman, Azana Hafizah Mohd [1 ]
Hossain, Md. Arif [1 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Ctr Cyber Secur, UKM, Bangi 43600, Malaysia
[2] Qassim Univ, Dept Informat Technol, Coll Comp, Buraydah 51452, Saudi Arabia
[3] UCSI Univ, Inst Comp Sci & Digital Innovat, Kuala Lumpur 56000, Malaysia
[4] Univ Bisha, Coll Sci & Arts Tathleeth, Dept Informat Syst, POB 551, Bisha 61922, Saudi Arabia
关键词
CYBER-SECURITY; ELECTRIC VEHICLE; ACCESS-CONTROL; INTERNET; POWER; PRIVACY; IOT; CYBERSECURITY; STANDARDS; ATTACKS;
D O I
10.1155/2022/9065768
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The smart grid idea was implemented as a modern interpretation of the traditional power grid to find out the most efficient way to combine renewable energy and storage technologies. Throughout this way, big data and the Internet always provide a revolutionary solution for ensuring that electrical energy linked intelligent grid, also known as the energy Internet. The blockchain has some significant features, making it an applicable technology for smart grid standards to solve the security issues and trust challenges. This study will present a rigorous review of blockchain implementations with the cyber security perception and energy data protections in smart grids. As a result, we describe the major security issues of smart grid scenarios that big data and blockchain can solve. Then, we identify a variety of recent blockchain-based research works published in various literature and discuss security concerns on smart grid systems. We also discuss numerous similar practical designs, experiments, and items that have recently been developed. Finally, we go through some of the most important research problems and possible directions for using blockchain to address smart grid security concerns.
引用
收藏
页数:26
相关论文
共 50 条
  • [41] Smart Grid Security Technology
    Metke, Anthony R.
    Ekl, Randy L.
    [J]. 2010 INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2010,
  • [42] Incorporation of Blockchain Technology for Different Smart Grid Applications: Architecture, Prospects, and Challenges
    Waseem, Muhammad
    Adnan Khan, Muhammad
    Goudarzi, Arman
    Fahad, Shah
    Sajjad, Intisar Ali
    Siano, Pierluigi
    [J]. ENERGIES, 2023, 16 (02)
  • [43] Security and privacy issues of blockchain technology
    Oksiiuk, Oleksandr
    Dmyrieva, Iryna
    [J]. 15TH INTERNATIONAL CONFERENCE ON ADVANCED TRENDS IN RADIOELECTRONICS, TELECOMMUNICATIONS AND COMPUTER ENGINEERING (TCSET - 2020), 2020, : 531 - 535
  • [44] Residential energy trading with blockchain technology
    Guanxiang Yun
    Viacheslav Zhygulin
    Qipeng P. Zheng
    [J]. Energy Systems, 2021, 12 : 619 - 636
  • [45] Towards Big Data Security Framework by Leveraging Fragmentation and Blockchain Technology
    Alhazmi, Hanan E.
    Eassa, Fathy E.
    Sandokji, Suhelah M.
    [J]. IEEE ACCESS, 2022, 10 : 10768 - 10782
  • [46] Residential energy trading with blockchain technology
    Yun, Guanxiang
    Zhygulin, Viacheslav
    Zheng, Qipeng P.
    [J]. ENERGY SYSTEMS-OPTIMIZATION MODELING SIMULATION AND ECONOMIC ASPECTS, 2021, 12 (03): : 619 - 636
  • [47] A Study on the Improvement of Smart Grid Security Performance and Blockchain Smart Grid Perspective
    Kim, Seong-Kyu
    Huh, Jun-Ho
    [J]. ENERGIES, 2018, 11 (08):
  • [48] Blockchain for Smart Grid Resilience: Exchanging Distributed Energy at Speed, Scale and Security
    Mylrea, Michael
    Gourisetti, Sri Nikhil Gupta
    [J]. 2017 RESILIENCE WEEK (RWS), 2017, : 18 - 23
  • [49] Smart Grid Security Concepts and Issues
    Saed, Mustafa
    Daimi, Kevin
    Al-Holou, Nizar
    [J]. WORLD CONGRESS ON ENGINEERING - WCE 2013, VOL II, 2013, : 1258 - +
  • [50] Smart-Grid Security Issues
    Khurana, Himanshu
    Hadley, Mark
    Lu, Ning
    Frincke, Deborah A.
    [J]. IEEE SECURITY & PRIVACY, 2010, 8 (01) : 81 - 85