Blockchain Technologies
Blockchain Technologies
©ISTOCKPHOTO.COM/NICO EL NINO
I
ogy solutions are computing- and mercial, and domestic a pplications
n this article, we discuss the resource-intensive and, hence, are presents several new challenges and
integration of the blockchain not entirely suitable for smart en- o pportunities [1], [2]. Smart inf ra -
into smart energ y systems. ergy applications. We consider the re- structure (SI), re newable e ne rg y
We present various blockchain quirements of smart energy systems sources (RESs), and electric vehicles
technology solutions, review and accordingly identify appropri- (EVs) are becoming widespread [3],
important blockchain platforms, ate blockchain technology solutions [4]; energy and carbon trading pos-
and describe several block- for smart energy applications. Our sibilities are increasing [5]–[7]; and
analysis can help in the development energy management (EM) through de-
Digital Object Identifier 10.1109/MIE.2019.2940335 of flexible blockchain platforms for mand-response management (DRM)
Date of current version: 23 December 2019 smart energy systems. programs is becoming more common
bidder is selected.
4) Successful
contract to the blockchain network.
tial for the successful creation and im-
1) Energy seller sends smart
TABLE 1 – THE BLOCKCHAIN TECHNOLOGY SOLUTIONS IN DIFFERENT CATEGORIES WITH THEIR ADVANTAGES AND DISADVANTAGES.
CATEGORY SOLUTIONS DESCRIPTION ADVANTAGES DISADVANTAGES
Blockchain network Public (N1) Any node can join or leave the Complete decentralization with Vulnerable to Sybil attacks, high latency,
management network. no single point of failure and less scalable
Consortium (N2) The network is controlled by a More suitable for regulated Network management issues when
group of organizations. industries organizations leave or join
Private (N3) The network is controlled by a More scalable, more private, and Permission management could
single organization. less expensive to maintain become a single point of failure, more
centralized
Data management On-chain (D1) All of the validated transactions Greater transparency, auditability, Huge storage burden, less scalable, not
are stored on the blockchain. and data availability suitable for resource-constrained nodes
Off-chain (D2) Only the hashes of important Smaller storage requirements, Conventional databases required to
data are stored on the blockchain. suitable for resource-constrained host off-chain data
nodes
Consensus management PoW (C1) Nodes compete to solve an Suitable for public networks Wastes tremendous amount of
appropriate hashing puzzle. (prevents Sybil attacks) resources, high latency, less scalable
PoS (C2) Nodes are picked according to Suitable for public networks Prone to nothing-at-stake attack, less
their economic stake. (prevents Sybil attacks), relatively democratic
more scalable
Voting based (C3) Voting schemes are based on the More suitable for consortium and Networking and scalability issues
BFT algorithm and its variants. private blockchain networks, low (cannot scale beyond a few hundred
latency nodes)
Authority based (C4) Trusted nodes create a new block Highly scalable, eliminates Requires trusted nodes in the network
in a round-robin fashion. message exchange, more energy
efficient
Identity management Self-sovereign Each node owns and controls Guarantees more privacy Requires a pool of identity providers
identity (S1) its identity without disclosure of
personal data.
Decentralized Central server and personal data Establishes more trust in the More centralized and less private
trusted identity (S2) disclosures are required. network
Automation Deterministic smart Information from any external Provides greater automation and Execution necessitates sequential
management contracts (T1) party is not required. eliminates human intervention processing
Nondeterministic This solution depends on Provides more flexibility and Nondeterministic nature, requires
smart contracts (T2) information from an external functionality external party availability
party.
BFT: Byzantine fault tolerant; PoS: proof of stake; PoW: proof of work.
N1 N2 N3 D1 D2 C1 C2 C3 C4 S1 S2 T1 T2
Ethereum ✓ ✓ ✓ ✓ × ✓ ✓ × × ✓ ✓ ✓ ✓ Bankymoon
TheSunExchange
Brooklyn Microgrid
NRGCoin
HyperLedger × ✓ ✓ ✓ × × × ✓ × ✓ ✓ ✓ × Car eWallet
Tennet & Sonnen
SunChain
Tendermint ✓ ✓ ✓ ✓ × × × ✓ x ✓ ✓ ✓ × GridChain
EnerChain
Brooklyn Microgrid
EWF × ✓ ✓ ✓ × × × × ✓ ✓ ✓ ✓ ✓ Slock.it
GridSingularity
Share&Charge
Proprietary — — — — — — — — — — — — — Nasdaq Linq
Solar Bankers
PROSUME
Here, ✓ is used if the platform supports a certain technology solution, × indicates that it does not support the solution, and — means that information is
unavailable or diverse.
(EM-4)
EV
as self-sovereign (S1) and decentral- use in the article. For example, SI-1 no-
ized trusted (S2) identity-management tation is used for an automated meter-
techniques. It supports various Turing- ing infrastructure (AMI) application.
complete programming languages that The scenario in Figure 1 represents an
Distributed
(EM-3)
currently allow the writing of determin- ET-2 application, whereas that in Fig-
EM istic smart contracts (T1). ure 2 represents an EM-3 application.
Due to space limitations, we discuss
EM
ported by more than 70 companies, projects can be found in [17], [20], [29],
DRM
and its aim is to integrate and acceler- [30], and the references therein.
ate blockchain technology in smart en-
ergy systems [26]. The EWF platform Blockchain Projects in the SI Domain
(Contract)
agement (D1), the PoAu (C4) consen- lar intervals for billing automation
sus algorithm, and self-sovereign (S1) and reduction of electricity theft
as well as decentralized trusted (S2) incidents [31], [32]. However, in the
identity-management techniques. De- Bankymoon project, blockchain-en-
GI
terministic (T1) and nondeterministic abled smart meters are being devel-
Smart Energy Systems
Certificates
FIGURE 3 – The smart energy system domains and applications. AMI: automated metering infrastructure.
on their Skychain blockchain [27]. The grid. However, this issue may be
idea is based on developing a trusted resolved by creating shared assets
consortium of nodes that generate and in smart energy systems, such as
validate data blocks. Similarly, PRO- by purchasing solar photovoltaics
Monitoring
(SI-2)
ergy projects in the four smart energy application, which is related to dis-
domains: SI, ET, GI, and EM. These do- tributed EM.
mains are broad and cover several in- ■■ GridChain (PONTON): This venture
teresting and useful applications. The addresses power grid monitoring
CATEGORY REQUIREMENT N1 N2 N3 D1 D2 C1 C2 C3 C4 S1 S2 T1 T2
Decentralization Decentralization (R1) ✓ ✓ ✓ — — ✓ ✓ ✓ ✓ ✓ × — —
and trust
Conflict resolution mechanism (R2) × ✓ ✓ — — ✓ ✓ ✓ ✓ × ✓ ✓ ✓
Intermediaries (R3) — — — — — — — — — — — ✓ ✓
Nonrepudiability (R4) — — — ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓
Authorization (R10) × ✓ ✓ — — — — — ✓ ✓ ✓ ✓ ✓
Auditability (R12) — — — ✓ ✓ — — — — ✓ ✓ ✓ ✓
Latency (R14) — — — ✓ × × ✓ × ✓ — — — —
Cost (R16) × ✓ ✓ × ✓ × ✓ ✓ ✓ ✓ × ✓ ✓
Here, ✓ is used if blockchain technology is suitable, × indicates that it is not suitable, and — means that it is unconcerned.
SI AMI (SI-1) (N2, N3), (D2), (C2, C4), (S2), (T1) Blockchain integration is more suitable in new smart meter
rollout programs.
Asset management (SI-2) (N2, N3), (D2), (C2, C4), (S1, S2), (T1) Blockchain integration is more suitable to track-shared or
crowd-funded RES assets.
Grid monitoring (SI-3) (N2, N3), (D2), (C4), (S2), (T1) Latency requirements are a few milliseconds; even PoAu (C4)
might not be able to fulfill these.
ET Wholesale (ET-1) (N1, N2), (D2), (C1, C2, C3, C4), (S1, S2), (T1, T2) Blockchain integration can eliminate existing brokers, but initial
implementation costs could be high.
P2P (ET-2) (N2), (D2), (C2,C3), (S1, S2), (T1, T2) The high potential for blockchain integration is due to the localized
nature and lack of P2P trading platforms.
GI Certificates (GI-1) (N1, N2), (D2), (C1, C2, C3, C4), (S1, S2), (T1) Blockchain integration can eliminate existing brokers, but initial
implementation costs could be high.
Incentives (GI-2) (N2, N3), (D2), (C3, C4), (S2), (T1) N3 can be established if all users belong to the same
utility company.
EM DRM (contract) (EM-1) (N2, N3), (D2), (C2, C4), (S2), (T1) C2 is to be avoided if the stake of a node is low, and S2
is listed due to KYC requirements.
DRM (real time) (EM-2) (N2, N3), (D2), (C4), (S2), (T1) Latency requirements are a few milliseconds; even PoAu (C4)
might not be able to fulfill these.
Distributed EM (EM-3) (N2), (D2), (C2,C4), (S1, S2), (T1, T2) T2 can be used if external weather information is needed.
EV (EM-4) (N2), (D2), (C2, C3, C4), (S1, S2), (T1, T2) C2 or C3 can be used if they reduce costs. There is a high
potential for blockchain integration.