The development of power networks is a trend of the future. These networks allow the two-way flow of power resources between users and power systems. As the key node for connecting users and energy systems, smart meters contain a large volume of user's power transaction data and identity information, which leaves the potential for a breach of private user data. To protect the privacy of the user, an identity authentication scheme for smart meters, based on blockchain technology, is proposed. The smart meter's identity information is processed using the Merkle-tree principle and stored in the blockchain; with this, the authentication of the smart meter's identity is realized and the identity information cannot be modified. Additionally, it breaks the connection between the user's identity and their power data, preventing internal and external hackers from obtaining private user data. The integrity and validity of the transaction data are guaranteed by using the characteristics of blockchain technology.
TIAN Fu-liang
,
TIAN Xiu-xia
,
CHEN Xi
. Blockchain-based smart meter authentication scheme[J]. Journal of East China Normal University(Natural Science), 2018
, 2018(5)
: 135
-143,171
.
DOI: 10.3969/j.issn.1000-5641.2018.05.011
[1] SIOSHANSI F. Smart Grid:Integrating Renewable, Distributed And Efficient Energy[M]. New York:Academic Press, 2012.
[2] 钱卫宁, 邵奇峰, 朱燕超, 等. 区块链与可信数据管理:问题与方法[J]. 软件学报, 2018, 29(1):150-159.
[3] NAKAMOTO S. Bitcoin:A peer-to-peer electronic cash system[R]. 2008.
[4] CHEUNG J C L, CHIM T W, YIU S M, et al. Credential-based privacy-preserving power request scheme for smart grid network[C]//Global Tele-communications Conference. IEEE, 2011:1-5.
[5] AFRIN S, MISHRA S. An anonymized authentication framework for smart metering data privacy[C]//Innovative Smart Grid Technologies Conference. IEEE, 2016:1-5.
[6] YU C M, CHEN C Y, KUOS Y, et al. Privacy preserving power request in smart grid nerworks[J]. IEEE Systems Journal, 2014, 8(2):441-449.
[7] LEE S, BONG J, SHIN S, et al. A security mechanism of Smart Grid AMI network through smart device mutual authentication[C]//International Conference on Information Networking. IEEE, 2014:592-595.
[8] FAN C I, HUANG S Y, LAI Y L. Privacy-enhanced data aggregation scheme against internal attackers in smart grid[J]. IEEE Transactions on Indus-trial Informatics, 2013, 10(1):666-675.
[9] LI F, LUO B, LIU P. Secure information aggregation for smart grids using homomorphic encryption[C]//First IEEE International Conference on Smart Grid Communications. IEEE, 2010:327-332.
[10] 张少敏, 赵乙桥, 王保义. 智能电网下保护用户隐私的无证书环签密方案[J]. 电力系统自动化,, 2018(3):118-123.
[11] LI H, LU R, ZHOU L, et al. An efficient merkle-tree-based authentication scheme for smart grid[J]. IEEE Systems Journal, 2014, 8(2):655-663.
[12] LIU Y, CHENG C, GU T, et al. A light weight authenticated communication scheme for smart grid[J]. IEEE Sensors Journal, 2016, 16(3):836-842.
[13] ABBASINEZHAD-MOOD D, NIKOOGHADAM M. An ultra-lightweight and secure scheme for communications of smart meters and neighborhood gateways by utilization of an ARM Cortex-M microcontroller[J]. IEEE Transactions on Smart Grid, 2017(99):1-11.
[14] SAXENA N, CHOI B J. Integrated distributed authentication protocol for smart grid communications[J]. IEEE Systems Journal, 2016(99):1-12.
[15] MIHAYLOV M, JURADO S, AVELLANA N, et al. NRGcoin:Virtual currency for trading of re-newable energy in smart grids[C]//201411th International Conference on the European Energy Market (EEM). IEEE, 2014:1-6.
[16] 张宁, 王毅, 康重庆, 等. 能源互联网中的区块链技术:研究框架与典型应用初探[J]. 中国电机工程学报, 2016, 36(15):4011-4022.
[17] 曹寅. 能源区块链与能源互联网[J]. 风能, 2016(5):14-15.
[18] 李彬, 张洁, 祁兵, 等. 区块链:需求侧资源参与电网互动的支撑技术[J]. 电力建设, 2017, 38(3):1-8.
[19] LINDA. 区块链能源应用后续:美国布鲁克林微电网如何运作与交易[EB/OL]. (2017-04-21)[2018-05-20]. https://www.jinse.com/news/blockchain/17041.html.
[20] PRISCO C. An energy blockchain for European prosumers[EB/OL]. (2016-05-02)[2018-05-20]. https://bitcoinmagazine.com/articles/an-energy-blockchain-for-european-prosumers-1462218142/.
[21] MERKLE R C. A digital signature based on a conventional encryption function[C]//Conference on the Theory and Application of Cryptographic Techniques. Berlin:Springer, 1987:369-378.
[22] GARAY J, KIAYIAS A, LEONARDOS N. The bitcoin backbone protocol:Analysis and applications[C]//Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2015:281-310.