80
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Tie-Line Power Transferred: Data Security Using Block Chain Technology

, &

References

  • R. Khan, K. McLaughlin, D. Laverty, and S. Sezer. “Analysis of IEEE C37. 118 and IEC 61850-90-5 synchrophasor communication frameworks,” in IEEE Power and Energy Society General Meeting (PESGM), pp. 1–5. IEEE, 2016.
  • P. Juneja, R. Garg, and P. Kumar. “Reliability of PMU Using Fuzzy-Markov Dynamic Method,” in International Conferences on Signals, Machines and Automation (SIGMA-2018) NSUT University, Delhi (India) 2018.
  • P. Juneja, R. Garg, and P. Kumar, “Fuzzy Petri Net Model of Phase Measurement Unit,” in IEEE, 2020 7th International Conference on Signal Processing and Integrated Networks (SPIN), Noida, India. DOI: 10.1109/SPIN48934.2020.9070847
  • Y. Wang, W. Li, P. Zhang, B. Wang, and J. Lu, “Reliability analysis of phasor measurement unit considering data uncertainty,” IEEE Trans. Power Syst., Vol. 27, no. 3, pp. 1503–10, 2012. DOI: 10.1109/TPWRS.2012.2183901
  • Y. Yan, Y. Qian, H. Sharif, and D. Tipper, “A survey on cyber security for smart grid communications,” IEEE Commun. Surv. Tutorials, Vol. 14, no. 4, pp. 998–1010, 2012. DOI: 10.1109/SURV.2012.010912.00035
  • L. Ismail and H. Materwala. “A review of block chain architecture and consensus protocols: Use cases, challenges and solutions,” Symmetry, MDPI, pp. 1–48, 2019.
  • S. Iyer, S. Thakur, M. Dixit, A. Agrawal, R. Katkam and F. Kazi, “Blockchain based distributed consensus for Byzantine fault tolerance in PMU network,” in 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), 2019, pp. 1–7. DOI: 10.1109/ICCCNT45670.2019.8944881
  • A. Bhattacharjee, S. Badsha, A. R. B. Shahid, H. Livani, and S. Sengupta. “Block-phasor: A decentralized blockchain framework to enhance security of synchrophasor,” 2020, IEEE.
  • A. A. G. Agung and R. Handayani, “Blockchain for smart grid,” J. King Saud Univ.– Comput. Inf. Sci., Jan. 2020. DOI: 10.1016/j.jksuci.2020.01.002
  • Google blog, “What is blockchain-based timestamping and who needs it?,” Database, Oct. 13, 2022. Available: https://originstamp.com%3Eblog%3Eblockchain.
  • R. Qin, D. L. Lihua Zhao, K. Yang, J. Xuan, and H. Wang. “Research on design and application of power dispatch based on Block Chain,” in ICBT ‘21: 2021 The third International Conference on Block chain Technology, March 2021, pp. 155–62. DOI: 10.1145/3460537.3460564
  • R. Plamanescu, M. Albu, S. Gheorghe, S. Bugnar, and M. Coroiu. “PMU cloud-based applications for power systems insight,” in 2019 54th International Universities Power Engineering Conference (UPEC), 2019, pp. 1–5. DOI: 10.1109/UPEC.2019.8893631
  • D. Sivaganesan, “Smart contract based industrial data preservation on block chain,” J. Ubiquitous Comput. Commun. Technol., Vol. 2, no. 01, pp. 39–47, 2020. DOI: 10.36548/jucct.2020.1.005
  • S. Shakya, “Efficient security and privacy mechanism for block chain application,” J. Inf. Technol., Vol. 1, no. 02, pp. 58–67, 2019.
  • Google blog, “Blockchain vs cloud-computing,” Nov. 25, 2020. Available: https://www.upgrad.com/blog/blockchain-vs-cloud-computing/.
  • K. C. Okafor, G. C. Ononiwu, S. Goundar, V. C. Chijindu, C. C. Udeze, and , “Towards complex dynamic fog network orchestration using embedded neural switch,” Int. J Comput. Appl. (IJCA), Vol. 43, no. 2, 91-108, 2021.
  • K. C. Okafor, I. E. Achumba, G. A. Chukwudebe, and G. C. Ononiwu, “Leveraging fog computing for scalable IOT datacenter using spine-leaf network topology,” J. Electr. Comput. Eng., pp. 1–11. 2017. DOI: 10.1155/2017/2363240
  • K. C. Okafor, “Dynamic reliability modelling of cyber-physical edge computing network,” Int. J. Comput. Appl., Vol. 43, no. 7, pp. 612–22, 2021. DOI: 10.1080/1206212X.2019.1600830
  • Google blog, “Advantages and disadvantages of cloud computing,” Jul. 2022. Available: https://intellipaat.com/blog/tutorial/amazon-web-services-aws-tutorial.
  • M. A. T. Abubakar, et al., “Comparative analysis of some efficient data security methods among cryptographic techniques for cloud data security,” Int. J. Basic Appl. Sci., Vol. 27, no. 1, pp. 81–8, Jun. 2019.
  • Z. Dong, F. Luo, and G. Liang, “Blockchain: A secure, decentralized, trusted cyber infrastructure solution for future energy systems,” J. Modern Power Syst. Clean Energy, Vol. 6, pp. 958–67, 2018. DOI: 10.1007/s40565-018-0418-0
  • S. Pletinckx, C. Trap, and C. Doerr, “Malware coordination using the blockchain: An analysis of the Cerber Ransomware,” in IEEE Conference on Communications and Network Security (CNS), 2018, pp. 1–9.
  • A. A. Gde and R. Handayani, “Block chain for smart grid,” J. Comput. Inf. Sci. King Saud Univ., Vol. 34, no. 3, pp. 666–75, Jan. 2020.
  • A. A. Hadi, G. Bere, T. Kim, J. J. Ochoa, J. Zeng, and G.-S. Seo. “Secure and cost-effective micro phasor measurement unit (PMU)-like metering for behind-the-Meter (BTM) solar systems using blockchain assisted smart inverters,” in Conference Paper NREL/CP-5D00-75447, March 2020.
  • C. Banks, et al. “Blockchain for Power Grids,” Proceedings of IEEE SoutheastCon 2019, Huntsville, AL, Apr. 2019.
  • C. M. Thasnimol and R. Rajathy, “The paradigm revolution in the distribution grid: The cutting-edge and enabling technologies,” Open Comput. Sci., Vol. 10, pp. 369–95, 2020. DOI: 10.2139/ssrn.3367740
  • S. Thakkar, A. Dalvi, I. Siddavatam, and F. Kazi. “Applicability of blockchain for synchrophasor network,” in 2nd International Conference on Advances in Science & Technology (ICAST-2019), K. J. Somaiya Institute of Engineering & Information Technology, University of Mumbai, India, 2019.
  • F. Casino, T. Dasaklis, and C. Patsakis, “A systematic literature review of Blockchain-based applications: Current status, classification and open issues,” Telemat. Inform., Vol. 36, pp. 55–81, 2019. DOI: 10.1016/j.tele.2018.11.006
  • Google blog. “The Blockchain trilemma: can it ever be solved? Jun. 27, 2022. Available: https://learn.bybit.com/deep-dive/blockchain-trilemma/
  • Google blog. “What are the six layers of blockchain technology?”, Z. Oualid, Feb. 3, 2022. Available: https://www.getsecuredworld.com%3Eblockchain-security
  • M. Mehedi, G. C. Das, M. Anisur Rahman, and A. Ghose, “A hashing technique using separate binary tree,” J. Data Sci., Vol. 5, pp. 148–61, Oct. 2006.
  • H. Guo and X. Yu, “A survey on Block chain technology and its security,” J. Blockchain Res. Appl., Vol. 3, no. 2, 107- 128, Jun. 2022.
  • R. Jayaraman, A. Srivastava, and M. Kumar, “Blockchain technology for protection of biomedical documents in healthcare society,” Int. J. Internet Technol. Secured Trans., Vol. 12, no. 6, pp. 566–82, 2022. DOI: 10.1504/IJITST.2022.126470
  • S. Singh, A. Kumar, and M. Kathuria, “Understanding the public, private and consortium consensus algorithms in blockchain technology,” Int. J. Blockchains Cryptocurrencies, Vol. 3, no. 3, pp. 269–88, 2022. DOI: 10.1504/IJBC.2022.126285
  • Google blog, “Amazon Web Services (AWS) Tutorial,” Jul. 2022. Available: https://intellipaat.com/blog/tutorial/%20amazon%20-%20web-services-aws-tutorial/.
  • M. Muzakki Hussain and M. M. Sufyan, “Fog computing for internet of things (IOT) – Aided smart grid architectures,” J. Big Data Cognitive Comput., Vol. 3, no. 8, pp. 1–29, Jan. 2019.
  • A. Kumar, P. Dadheech, V. Singh, R. C. Poonia, and L. Raja, “An improved quantum key distribution protocol for verification,” J. Discrete Math. Sci. Cryptogr., Vol. 22, no. 4, pp. 491–8, 2019. DOI: 10.1080/09720529.2019.1637153
  • J. James, R. Karthika, and R. Nandakumar, “Design and characterization of SHA 3 256 bit IP core,” Procedia Technol., Vol. 24, pp. 918–24, 2016. DOI: 10.1016/j.protcy.2016.05.184
  • M. K. Awan and A. Cortesi. “A Blockchain transaction analysis using dominant computer information,” Systems and Industrial Management (CISIM), 2017. Id: 201710244229239.
  • M. Swan. Blockchain: Blueprint for a New Economy. Sebastopol, CA: O’Reilly Media, Inc., 2015.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.