Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Blockchain Technology for Secure Smart Grid Access Control

  • Conference paper
  • First Online:
Power Engineering and Intelligent Systems (PEIS 2023)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 1097))

  • 238 Accesses

Abstract

The use of smart grid technologies, in the energy sector has brought about upgrade, such as high efficiency, lower operating costs and better energy management. However, it has also established security aspects. Safeguarding the smart grid is of importance due to its role as essential infrastructure. The innovative potential of blockchain holds promise in enhancing the security of the grid. This paper aims to explore how blockchain technology can be utilized for protecting the grid. It delves into the security issues associated with grids and investigates how blockchain can address them. Additionally, it provides an analysis of studies on blockchain and its application, in grid protection while considering the pros and cons of utilizing blockchain based solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ahmad T, Zhang D, Huang C, Zhang H, Dai N, Song Y, Chen H (2021) Artificial intelligence in sustainable energy industry: status quo, challenges and opportunities. J Clean Prod 289:125834

    Article  Google Scholar 

  2. Ahmed M, Zheng Y, Amine A, Fathiannasab H, Chen Z (2021) The role of artificial intelligence in the mass adoption of electric vehicles. Joule 5(9):2296–2322

    Article  Google Scholar 

  3. Boneh D, Boyen X (2004) Efficient selective-id secure identity-based encryption without random oracles. In: 34th annual international conference on the theory and applications of cryptographic techniques (EUROCRYPT), Springer, Switzerland, pp 223–238

    Google Scholar 

  4. Bose BK (2017) Artificial intelligence techniques in smart grid and renewable energy systems-some example applications. Proc IEEE 105(11):2262–2273

    Article  Google Scholar 

  5. Chen C, Chen J, Lim HW, Zhang Z, Feng D, Ling S, Wang H (2013) Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures. In: CT-RSA, Lecture notes in computer science, vol 7779, pp 50–67

    Google Scholar 

  6. Cheung L, Newport CC (2007) Provably secure ciphertext policy abe. In: ACM conference on computer and communications security, pp 456–465

    Google Scholar 

  7. Delerablée C (2007) Identity-based broadcast encryption with constant size ciphertexts and private keys. Asiacrypt 4833:200–215

    MathSciNet  Google Scholar 

  8. Foster I, Kesselman C, Tuecke S (2001) The anatomy of the grid: enabling scalable virtual organizations. Int J Supercomput Appl 15(3):200–222

    Google Scholar 

  9. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Juels A, Wright RN, di Vimercati SDC (eds) ACM conference on computer and communication security. ACM, pp 89–98

    Google Scholar 

  10. Guo F, Mu Y, Susilo W, Wong DS, Varadharajan V (2014) CP-ABE with constant-size keys for lightweight devices. IEEE Trans Inf Forensics Secur 9(5):763–771

    Article  Google Scholar 

  11. Guo F, Mu Y, Chen Z (2007) Identity-based encryption: How to decrypt multiple ciphertexts using a single decryption key. In: Proceedings pairing, vol 4575, pp 392–406

    Google Scholar 

  12. Guo F, Mu Y, Chen Z, Xu L (2007) Multi-identity single-key decryption without random oracles. In: Proceedings Inscrypt, vol 4990, pp 384–398

    Google Scholar 

  13. Guo F, Mu Y, Susilo W (2012) Identity-based traitor tracing with short private key and short ciphertext. In: Proceedings ESORICS, vol 7459, pp 609–626

    Google Scholar 

  14. Guo H, Xu C, Li Z, Yao Y, Mu Y (2013) Efficient and dynamic key management for multiple identities in identity-based systems. Inf Sci 221:579–590

    Article  MathSciNet  Google Scholar 

  15. Khaleel M, Abulifa SA, Abulifa AA (2023) Artificial intelligent techniques for identifying the cause of disturbances in the power grid. Brill: Res Artif Intell 3(1):19–31

    Google Scholar 

  16. Khan F, Kothari R, Patel M (2022) Advancements in blockchain technology with the use of quantum blockchain and non-fungible tokens. In: Advancements in quantum blockchain with real-time applications. IGI Global, pp 199–225

    Google Scholar 

  17. Khan F, Kothari R, Patel M, Banoth N (2022) Enhancing non-fungible tokens for the evolution of blockchain technology. In: 2022 international conference on sustainable computing and data communication systems (Icscds). IEEE, pp 1148–1153

    Google Scholar 

  18. Kim SK, Huh JH (2018) A study on the improvement of smart grid security performance and blockchain smart grid perspective. Energies 11(8):1973

    Google Scholar 

  19. Kothari R, Choudhary N, Jain K (2021) CP-ABE scheme with decryption keys of constant size using ECC with expressive threshold access structure. In Emerging trends in data driven computing and communications: proceedings of DDCIoT 2021. Springer, Singapore, pp 15–36

    Google Scholar 

  20. Lewko AB, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert H (ed) Eurocrypt. Lecture notes in computer science, vol 6110, pp 62–91

    Google Scholar 

  21. Lo KL, Zakaria Z (2004) Electricity consumer classification using artificial intelligence. In: 39th International universities power engineering conference. UPEC, vol 1. IEEE, pp 443–447

    Google Scholar 

  22. Musleh AS, Yao G, Muyeen SM (2019) Blockchain applications in smart grid-review and frameworks. IEEE Access 7:86746–86757

    Article  Google Scholar 

  23. Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: Proceedings ACM conference on computer and communication security, pp 195–203

    Google Scholar 

  24. Pilkington M (2016) Blockchain technology: principles and applications. In: Research handbook on digital transformations. Edward Elgar Publishing, pp 225–253

    Google Scholar 

  25. Richter L, Lehna M, Marchand S, Scholz C, Dreher A, Klaiber S, Lenk S (2022) Artificial intelligence for electricity supply chain automation. Renew Sustain Energy Rev 163:112459

    Article  Google Scholar 

  26. Vyas K, Jain G, Maurya VK, Mehra A (2016) Comparative analysis of MCML compressor with and without concept of sleep transistor. In Proceedings of international conference on ICT for sustainable development: ICT4SD, Vol 1. Springer, Singapore, pp 251–260

    Google Scholar 

  27. Yapa C, de Alwis C, Liyanage M, Ekanayake J (2021) Survey on blockchain for future smart grids: technical aspects, applications, integration challenges and future research. Energy Rep 7:6530–6564

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rakshit Kothari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Maurya, V.K., Kothari, R., Sachdev, P., Rathore, N.S. (2024). Blockchain Technology for Secure Smart Grid Access Control. In: Shrivastava, V., Bansal, J.C., Panigrahi, B.K. (eds) Power Engineering and Intelligent Systems. PEIS 2023. Lecture Notes in Electrical Engineering, vol 1097. Springer, Singapore. https://doi.org/10.1007/978-981-99-7216-6_28

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-7216-6_28

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-7215-9

  • Online ISBN: 978-981-99-7216-6

  • eBook Packages: EnergyEnergy (R0)

Publish with us

Policies and ethics