0% found this document useful (0 votes)
58 views17 pages

Blockchain For Cybersecurity in Smart Grid A Comprehensive Survey

Uploaded by

matrubhoomi.info
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views17 pages

Blockchain For Cybersecurity in Smart Grid A Comprehensive Survey

Uploaded by

matrubhoomi.info
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 17, NO.

1, JANUARY 2021 3

Blockchain for Cybersecurity in Smart


Grid: A Comprehensive Survey
Peng Zhuang , Student Member, IEEE, Talha Zamir , and Hao Liang , Member, IEEE

Abstract—Blockchain is an immutable type of distributed in Utah, which resulted in the loss of observability for part
ledger that is capable of storing data without relying on a of the electric grid [6]. Although this cyberattack has not led
third party. Blockchain technology has attracted significant to any blackouts in the Utah electric grid, it has shown that
interest in research areas, including its application in the
smart grid for cybersecurity. Although significant efforts the adversaries can launch severe cyberattacks against critical
have been devoted to utilizing blockchain in the smart grid infrastructures in the smart grid.
for cybersecurity, there is a lack of comprehensive survey With the development of the smart grid, the advanced mon-
on blockchain in the smart grid for cybersecurity in both itoring and control technologies are being deployed on the
application and technological perspectives. To fill this gap, customer side. Nowadays, most homes are equipped with smart
we conducted a comprehensive survey on blockchain for
smart gird cybersecurity. This conducted survey presents devices, such as smart robots and smart security systems. Since
the latest insights of ideas, architectures, and techniques of these devices can be remotely monitored and controlled through
implementation that are relevant to blockchain’s application a central controller, the cybersecurity becomes important for
in the smart grid for cybersecurity. This article aims at pro- customers [7]. Also, with the cutting-edge technologies, the
viding helpful guidance and reference for future research smart grid is emerging with water/gas supply, transportation,
efforts specific to blockchain for cybersecurity in the smart
grid. and other services to form the smart city [8], [9]. With the high
degree of interdisciplinary among different sectors in a smart
Index Terms—Blockchain, cybersecurity, resiliency,
smart contract, smart grid. city, the vulnerability of the smart grid to cyberattacks may cause
severe disasters to the society, which is no longer limited to the
I. INTRODUCTION electric systems. So, there is an urgent need to investigate the
cybersecurity of the smart grid.
HE ELECTRIC grid is undergoing massive revolutions
T toward the smart grid to better adopt the generation with
different sizes and technologies, encourage the participation of
In the smart grid, different information and communication
technologies (ICT) have been widely adopted over power gen-
eration, transmission, distribution, and utilization sectors to
customers for active system operation, and improve the system collect and transfer data for smart grid optimization control. For
reliability, stability, sustainability, and security [1]. The reliable the power generation, transmission, and distribution, the data
and efficient smart grid operation relies heavily on the two- are collected using remote terminal units (RTUs) of SCADA
way communication networks for data transfers [2]. However, systems, phasor measurement units (PMUs) of the wide area
the current communications over transmission control protocol measurement system (WAMS), sensors of intelligent electronic
(TCP)/internet protocol (IP) and ethernet-based technologies devices (IEDs), and geographic information system (GIS). For
expose the smart grid to public data networks [3], which makes power utilization, the smart meters embedded in the advanced
it vulnerable to severe cyberattacks [4]. metering infrastructures (AMIs) are typically used to collect the
In December 2015, the cyberattack targeted on three electric customers’ power usage data. The collected data are transferred
distribution companies in Ukraine successfully seized the su- through communication networks to SCADA systems and used
pervisory control and data acquisition (SCADA) systems using for advanced management and control, such as automatic gen-
spear-phishing emails, and remotely switched substations OFF, eration control (AGC), electric system state estimation (SE),
which resulted in a power outage of 230 000 customers [5]. distribution automation control (DAC), and demand side man-
In March 2019, a denial of service (DoS) attack was launched agement (DSM).
against part of the SCADA infrastructures of electric utilities For the efficient and reliable communications among dis-
tributed and heterogeneous components within the smart grid,
Manuscript received October 20, 2019; revised January 20, 2020 layered communication networks consisting of home area net-
and April 14, 2020; accepted May 23, 2020. Date of publication May
29, 2020; date of current version October 23, 2020. This work was work (HAN), neighborhood area network (NAN), sensor net-
supported by the Natural Science and Engineering Research Council. work (SN), wide area network (WAN), and core network are
Paper no. TII-19-4678. (Corresponding author: Peng Zhuang.) developed. The HAN and NAN are established by networking
The authors are with the Department of Electrical and Computer Engi-
neering, University of Alberta, Edmonton, AB T6G 1H9, Canada (e-mail: AMIs within a local area through ZigBee/Z-wave protocols
[email protected]; [email protected]; [email protected]). and IEEE 802.11/802.15.4/802.16 standards [10]. Within the
Color versions of one or more of the figures in this article are available WAN, the RTUs, WAMS, IEDs, and GIS first group through
online at https://ieeexplore.ieee.org.
Digital Object Identifier 10.1109/TII.2020.2998479 SN, then communicate with the SCADA systems and data

1551-3203 © 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.

Authorized licensed use limited to: K K Wagh Inst of Engg Education and Research. Downloaded on January 29,2024 at 06:01:59 UTC from IEEE Xplore. Restrictions apply.
4 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 17, NO. 1, JANUARY 2021

centers based on distributed networking protocol 3.0 (DNP3), grid is featured by distributed generation and control; however,
Modicon communication bus (ModBus), and/or cognitive radio the communication networks in the smart grid still behave in
with IEEE 802.22 standard [11]. Then, the data are transferred to a centralized manner, which makes the smart grid extremely
the core network and used by different control authorities. In the vulnerable to a single point of failure [17]. To address the above-
core network, the common communication methods are TCP/IP mentioned cybersecurity issues in the smart grid, blockchain
network, WiMAX, and GPRS. For the ease of implementation technology has been seen as a promising solution [18]–[20].
in the smart grid, these protocols are designed to communicate Blockchain is a variant of distributed ledger technology
raw data with no restrictions of encryption and authentication, (DLT), which distributively stores and transfers data across
and there is no excessive overhead for data availability [12]. So, multiple devices within a system. By leveraging blockchain
the smart grid can be easily exploited by cyberattacks. technology, the field measurement data and local transaction
The vulnerabilities of different communication protocols in data can be transferred in a peer-to-peer (P2P) manner within
the smart grid are investigated in [13], and the most concerning the smart grid [21]. These data are replicated and stored dis-
cybersecurity issues can be summarized in four aspects: tributively on multiple devices, instead of a single data center.
1) integrity; The P2P data transfer and distributed replication of data storage
2) confidentiality; on multiple devices prevent the smart grid from suffering from
3) availability; and a single point of failure and guarantee high availability [22].
4) accountability/nonrepudiation. Also, due to the distributed data verification, validation, and
The integrity attack is based on unauthorized and stealthy storage features of blockchain, the data in the blockchain-based
modification, alteration, or destruction of field measurement data smart grid are nearly immutable, which can protect the data
in the smart grid. The false data injection (FDI) attack is a typical integrity, confidentiality, and availability of the smart grid. Once
integrity attack against SE. The FDI attack can compromise the data are added to a blockchain, it can never be manipulated by
field measurement data stealthily, which will alternate the SE attacks unless the adversaries own more than 51% of the devices
results and mislead the control center decisions. This can cause in the whole system. This property maintains high auditability
cascade electric grid failures [14]. in the blockchain-based smart grid and makes the accountabil-
The confidentiality attack targets on accessing or disclosing ity/nonrepudiation attacks nearly impossible. The asymmetric
privacy and proprietary information by unauthorized entities cryptography in the blockchain can increase the authentication
or individuals. In the smart grid, the AMIs are major sources and authorization levels of blockchain-based AMIs [23], which
of the confidential breach. The adversaries can gain access to can protect the customers’ privacy and integrity of electricity
AMI through root password recovery or exploitation of system data [24]. Furthermore, by leveraging the smart contract and de-
vulnerabilities [15], and obtain the customers’ electricity usage centralized applications (DAPPS) services, the blockchain can
information to invade customers’ privacy. In the smart grid, both provide cybersecured computation environment for advanced
authentications of information and authorization of accessing are smart grid applications.
required to maintain the integrity and confidentiality. In the literature, there are several papers that have conducted
The availability that ensures timely and reliable access to surveys on the application of the blockchain in the smart grid
information is essential for efficient and stable operation of the covering various topics. A systematic review of the blockchain in
smart grid. By interrupting the data transfers, the cyberattacks the energy sector is conducted in [25], in which an overview of a
against availability can delay, block, or even corrupt the control variety of energy applications of the blockchain is presented with
signal, and cause severe impacts on stability, efficiency, and detailed discussion on benefits and limitations of blockchain
security of the smart grid operation [16]. technologies in the energy sector. Also, the review and classifi-
For the accountability/nonrepudiation in the smart grid, the cation of around 140 most recent commercial and research ini-
actions made by systems or customers cannot be denied later. tiatives of energy blockchain are performed. With more focuses
With the integration of distributed generators (DGs), local on the blockchain-based smart grid, the authors in [26] review a
power trading is an important concept in the smart grid. The variety of prospects and approaches for blockchain applications
local power trading involves valuable resources and infor- in the smart grid. The advantages and technical challenges of
mation, which makes the cyberattacks against accountabil- implementing the blockchain in the smart grid are discussed,
ity/nonrepudiation now a major issue [13]. To maintain the and the frameworks for the key blockchain-based smart grid
accountability/nonrepudiation, it is required that the smart grid applications are presented. In [27], a comprehensive survey is
communication networks have high auditability so that the com- presented for the blockchain-based P2P energy transaction in
plete information history can be reconstructed from historical the smart grid with main focuses on the P2P energy trading
records in a trust manner [16]. architecture, demand response (DR) optimization models, and
For enterprise communication networks, different cybersecu- power routing mechanisms. Furthermore, the authors in [28]
rity technologies, such as firewalls with an intrusion detection present a comprehensive survey for the blockchain-based P2P
system (IDS) for network security, encryption and authentica- energy transaction from the perspective of the designing of
tion for data security, and host IDS for device security [10]. How- local energy markets, in which the current research activities
ever, due to the real-time performance requirement and contin- on local energy market mechanisms, customer preferences, DR
uous operation feature of smart grid communication networks, strategies, and impacts of energy storage are reviewed and as-
these techniques can hardly fit in the smart grid [16]. The smart sessed. Although the existing survey papers have mentioned the

Authorized licensed use limited to: K K Wagh Inst of Engg Education and Research. Downloaded on January 29,2024 at 06:01:59 UTC from IEEE Xplore. Restrictions apply.
ZHUANG et al.: BLOCKCHAIN FOR CYBERSECURITY IN SMART GRID: A COMPREHENSIVE SURVEY 5

TABLE I
COMPARISON AMONG PUBLIC, CONSORTIUM, AND PRIVATE BLOCKCHAINS [2], [4], [21]

The blockchain is a distributed database based on the P2P


network, with security enabled using multiple cryptographic
technologies. Different types of the blockchain have been pro-
posed to meet different requirements for practical applications
based on the consensus mechanism and network openness. As
shown in Fig. 1, the most studied blockchain variants are public,
consortium, and private blockchains. A comparison of these
three types of blockchains is summarized in Table I. The major
difference between public and consortium/private blockchains
Fig. 1. Classification of DLT and blockchain technologies. is the classes of nodes, i.e., the devices responsible for data
verification, validation, transfer, and storage. For the public
blockchain, the nodes are trustless and anonymous, which results
advantages of blockchain in improving smart grid cybersecurity. in large power consumption and long transaction approval time.
A comprehensive survey that emphasizes both application and The nodes in consortium and private blockchains are trusted,
technical perspectives of the blockchain in the smart grid for and the consensus mechanisms based on trusted nodes have low
cybersecurity has not been conducted so far. To fill this gap in power consumption and fast transaction approval rate. However,
research, this article presents a comprehensive survey to provide the access for consortium and private blockchain networks is
helpful guidance and reference for the research in improving permissioned, there still requires an authority to approve the
cybersecurity of the smart grid by using blockchain technology. permission for the node. Due to a large number of nodes in
The remainder of this article is organized as follows. In the public blockchain, it is nearly impossible to tamper the
Section II, an overview of blockchain technology is presented. In public blockchain [32]. Theoretically, the consortium and private
Section III, the architecture and development platforms of the blockchains require less effort for tampering, in practical, they
blockchain-based smart grid for cybersecurity are introduced. still have good performance in cybersecurity, since the nodes
In Section IV, the integration of blockchain technology for the in consortium and private blockchain are authorized and can be
cybersecured smart grid will be discussed in both application and well protected [33]. So, the selections among different types of
technical perspectives. Finally, Section V concludes this article. blockchain for different applications in the smart grid should
consider the classes of nodes, the requirement for anonymity,
computational complexity (efficiency), and restriction on
II. OVERVIEW OF BLOCKCHAIN TECHNOLOGY
access [34].
FOR CYBERSECURITY OF SMART GRID
Based on the features of the blockchain, some potential ben-
DLT is defined as a database that consensually replicates, efits for the smart grid are summarized as below [10]–[12]:
shares, and synchronizes data across geographically distributed 1) reduction on the cost of power transactions;
multiple devices [29]. In DLT, the data are stored in a chrono- 2) facilitating the adoption of DGs in the smart grid;
logical order, which forms a digital ledger chain. Once a block 3) improved automation control and system monitoring;
containing a set of data is added in the chain, it can never be 4) development of advanced control applications for the
modified by any unauthorized entities or individuals, so it is smart grid on the blockchain DAPPS layer; and
inherently tamper-proof [30]. As shown in Fig. 1, according to 5) improved cybersecurity of the smart grid.
how the data are validated and stored, the DLT can be mainly In this article, the main focus is on the cybersecurity feature
classified into three types, i.e., blockchain, directed graph data of the blockchain for the smart grid. For the rest of this section,
(DAG), and tempol ledger (Tempo). Among these three types the blockchain technology will be discussed mainly related
of DLT, the blockchain is the most well studied one with a to the smart grid cybersecurity. Although the private, consor-
high degree of penetration in practical applications [29]. The tium, and public blockchains differ in many aspects, they share
blockchain is divided into blockchain 1.0 for simple crypto- some essential components in the architecture: Merkel tree,
graphic currency, 2.0 with smart contract functionality, and 3.0 timestamp, hash function, encryption and decryption, consensus
for distributed application [31]. mechanism, and nonce [35]. The Merkel tree is a data structure

Authorized licensed use limited to: K K Wagh Inst of Engg Education and Research. Downloaded on January 29,2024 at 06:01:59 UTC from IEEE Xplore. Restrictions apply.
6 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 17, NO. 1, JANUARY 2021

blockchain [44]. However, most of these applications are still


limited to electronic currency, such as the Initial Coin Offerings
(ICO’s) on Ethereum platform, which provides services for
fundraising [45].
One of the major issues that have impeded the broad ap-
Fig. 2. Asymmetric cryptography in blockchain [82]. plications of blockchain-based DAPPS is the scalability. Many
researchers have devoted great efforts in addressing this issue.
In [46], a technology named IOTA that combines the blockchain
technology and architecture of the Internet of Things (IoT)
used for efficiently summarizing and verifying the large sets is investigated to improve the scalability of the blockchain.
of data in a block. Each block has a Unix time timestamp, Compared with conventional linear single chain architecture, the
which creates a source of variation for block hash and makes IOTA introduces a meshed network architecture. Improvement
it more difficult for the adversaries to tamper a blockchain. The in the scalability is also achieved in [47] by using techniques
hash function is used to convert variable-length inputs into a such as segwit, blocksize increment, sharding, and proof of
fixed-length encoded output. The hash function should have stake algorithm. Among these techniques, the sharding, which
characteristics like puzzle-friendly and collision-free to achieve reduces the data size of a block, has been tested to be the most
a high level of security. The secure hash algorithm (SHA) is efficient one to improve the scalability. Also, some discussions
widely used in cryptographic hash functions, e.g., SHA-256 in have been made about changing the block size by alternating
Bitcoin. In the blockchain, the hash function is used in the Merkel the blockchain structure. In [48], a new blockchain protocol,
tree, timestamp, and encryption [36]. Bitcoin-NG, is proposed. In Bitcoin-NG, the concept of micro
The encryption and decryption method in the blockchain is block is introduced to accelerate the block procession and re-
based on asymmetric cryptography, as shown in Fig. 2. Different duce the block production time from 10 min to 10 s; however,
from symmetric cryptography, every node in the blockchain has this comes with the scarification of security. The cascaded
a public key and a private key. The public key is analog to account structure of the blockchain with the decreased block size is
public name, and the private key is like a password that is confi- introduced in [49], which improves the overall performance of
dential [37], [38]. In the blockchain, the sender encrypts the data the blockchain. Similarly, a scalable blockchain framework is
using the public key of the receiver, and the data encrypted can be proposed in [50] to improve the scalability of the blockchain for
viewed, validated, and verified by all the nodes in the blockchain large-scale IoT systems. In which, the IoT devices are required to
using the receiver’s public key, which protects the data integrity connect to the global blockchain as nodes directly. Instead, mul-
and accountability/nonrepudiation. Then, the encrypted data can tiple IoT devices form a group through a fully trusted certificate
be decrypted by the receiver using the corresponding private authority, and the formed group of IoT devices is represented by
key. In this process, the public and private key pair provide a single peer, which participate in the global blockchian. Such
additional authentication and authorization to the smart grid, architecture can be beneficial for the smart grid, as it proves to be
and the privacy of nodes can be protected since only public keys reliable and protective against 51% attack with reduced forking.
can be observed [39]. For the successful integration of the blockchain in the smart
The consensus mechanism is used to allow data transfers grid, the interaction between blockchain and smart grid applica-
with credibility and assurity that it has not been tampered with. tions should be carefully addressed to maintain the stability of
This develops trust among nodes without the involvement of a a blockchain. In [51]–[53], the stability problem caused by the
third party. The main idea in the blockchain is to time stamp interaction between blockchain and applications is investigated.
all the published blocks, then running it through a SHA256 The incentives mismatch within a blockchain, when considering
hash algorithm to maintain the data integrity. Every block also the interaction between the blockchain and applications, is the
refers to the value of the previous block using the hash value. main issue for potential instability, since the nodes are economi-
In this way, everyone can see which blocks are interconnected cally motivated to confirm transactions securely in a blockchain,
and what data have been transferred in the past and in what and they have no direct incentive to support applications. The
order [40], which can provide better protection on the account- incentive mismatch between secure confirmation of transactions
ability/nonrepudiation in the smart grid. in the blockchain and supporting applications may lead to the
A simple application of the blockchain in the smart grid is collapse of the blockchain. To avoid the incentive mismatch in
providing cybersecured trading platform for P2P power trans- a blockchain, it is crucial to designing a blockchain with high
action based on the distributed ledger of Bitcoin [41]. Further- portability to provide common incentives for blockchains and
more, with a completely new programming language named their applications [51].
by Solidity, Ethereum has brought computational capabilities For the blockchain with applications, there are mainly four
into cybersecured environment based on the blockchain [42]. layers, i.e., application layer, execution engines, data storage,
Also, with the emerged smart contract functionality, many and consensus mechanism. Most of the research works focus
blockchain-based applications have been investigated for the on the application layer, especially for DAPPS, since it can
DAPPS services [43]. These DAPPS services allow for the bring more functionalities to the blockchain on top of smart
integration of more variants of advanced applications for the contracts [54]. Some DAPPS use past data to develop trust
smart grid operation into the cybersecured system built by the for different nodes, and Airbnb is a good example of such an

Authorized licensed use limited to: K K Wagh Inst of Engg Education and Research. Downloaded on January 29,2024 at 06:01:59 UTC from IEEE Xplore. Restrictions apply.
ZHUANG et al.: BLOCKCHAIN FOR CYBERSECURITY IN SMART GRID: A COMPREHENSIVE SURVEY 7

application. The same methodology can be used for demand


forecasting in the smart grid by using blockchain-based big data
analysis, which can ensure the integrity, availability, and ac-
countability/nonrepudiation of historical data [55]. Also, in [36],
the standard for emerging blockchain with various applications
is proposed. This standard divides blockchain usage into four
layers, i.e., the infrastructure layer that provides basic hardware
and network support, the platform service layer that allows users
to run the cybersecured blockchain environment on different
operating systems, such as Windows and BerkeleyDB. While
the node management, programming, and run-time management
come under the third layer, this layer uses SDK interfaces,
such as JSON RPC, Solidity, and Node.js. The last layer is
the user-level application layer, which is referred to as DAPPS
commonly.
The implementation of well-designed blockchain in the smart
grid allows improving the overall smart grid system’s cyber-
security. It introduces cybersecured environment for variants
of advanced applications in the smart grid, such as electric
grid monitoring, electricity data transfers, automation power
control, and local power trading [30]. In the following section,
an overview of system architecture and development platforms Fig. 3. System architecture of blockchain-based smart grid.
for cybersecurity of the smart grid using blockchain technology
will be presented in detail.
energy bidding in the wholesale electricity market and real-time
III. SYSTEM ARCHITECTURE AND DEVELOPMENT PLATFORM monitoring in the energy management system. The WAN layer is
OF BLOCKCHAIN IN SMART GRID FOR CYBERSECURITY an intermediate layer connecting the NAN with the core network.
WAN in this system may be deployed on the cloud as a virtual
The blockchains are implemented in the smart grid cyberlayer
machine, where different blockchains can be implemented for
to improve cybersecurity by protecting data integrity, confi-
WAN applications, such as field measurement aggregation and
dentiality, availability, and accountability/nonrepudiation. The
storage. In NAN and HAN, the local producers and consumers
implementation of blockchain in the smart grid for cyberse-
are directly connected, and the blockchains can be used to
curity can be mainly classified into four sectors that are field
provide various applications, such as electric vehicle charging
measurement and control, data aggregation, data management,
and local energy trading.
and system operation [56]–[59]. In this section, the system
Also, as discussed in the recent research works [60], [62],
architecture of blockchain-based smart grid for cybersecurity
based on the two-way communication links in the smart grid,
will be discussed. Also, the development platforms for the
the trustless local producers and consumers connecting to HAN
blockchain-based smart grid will be presented.
can be selected as nodes to provide mining power for pub-
lic blockchains in the smart grid. Initially, the mining power
A. System Architecture for Smart Grid Cybersecurity could be provided by standard home computers; however, with
By incorporating the blockchain in the cyberayer of the smart the introduction of the application-specific integrated circuit
grid, blockchain technologies can be leveraged to support the (ASIC) miners, the home computers are no longer capable of
operation and development of the smart grid. Considering the mining [25]. To address this issue, different mining algorithms
layered communication networks in the smart grid with two-way have been proposed and examined. For example, the Ethash al-
communication links, the system architecture of the blockchain gorithm of Ethereum [63] and Equihash algorithm of Zcash [64]
in the smart grid for cybersecurity is illustrated in Fig. 3, are ASIC-resistant PoW algorithms, which allow for the home
which is based on the communication system model in [60]. computer-based mining through CPUs and GPUs. Moreover,
This structure is divided into four networks, i.e., core network, some smart-grid-specific mining strategies are also proposed.
WAN, NAN, and SN/HAN. This architecture is embedded with For example, based on CyClean in [65] and SolarCoin [66], the
blockchains in different communication networks for different coins are mined in advance and are rewarded to local producers
smart grid applications. The core network is related to control- and consumers based on the generation and consumption of
ling authorities, such as power utility companies, system oper- renewable energy, and the mining powers are distributed among
ators, meter operators, and maintenance companies, which are nodes based on the holding rewards. For the consortium and
above the SCADA systems [61]. Users in the core network have private blockchains in the smart grid, the trusted nodes that
full access to monitor, make modifications, and pass instructions are typically selected from smart grid controlling authorities
(e.g., smart contracts) to the SN and HAN. Different blockchains and distributed generation owners with large capacities will
can be used in the core network for different applications, such as participate in the consensus process.

Authorized licensed use limited to: K K Wagh Inst of Engg Education and Research. Downloaded on January 29,2024 at 06:01:59 UTC from IEEE Xplore. Restrictions apply.
8 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 17, NO. 1, JANUARY 2021

The data flow through these networks is published on corre- B. Development Platforms for Smart Grid Cybersecurity
sponding blockchains, and that published data (verified by the
Special applications and programs specific to the smart grid
nodes) are used and communicated among networks with added
can be developed on IBM and Microsoft Azure development
security, transparency, automation, and privacy protection func-
environments, which ensure cybersecurity of the blockchain.
tionalities [67]. However, the existing research mainly focused
Furthermore, the Ethereum platform can also be used to de-
on developing independent blockchains for specific applications
ploy smart contracts that are publicly available and verifiable.
in each communication network. Significant research efforts
Ethereum development can be done on the Microsoft Visual
are still required to investigate different blockchains’ interoper-
basic platform or online using Solidity remix. The Ethereum
ability, especially for the synchronization of data flow through
platform is open-source, easy to implement, and has more se-
different blockchains.
curity features; however, the usage of Ethereum for large-scale
In the smart grid, the smart generation, smart transmission
smart grid applications is inefficient, due to the gas limits and
and distribution, and smart homes/buildings are monitored and
gas costs [75]. Like Ethereum, other platforms also support
directly controlled by field IoT-enabled ICT devices, such as
smart contract functionality, such as Quorum, Wan chain, Ater-
RTUs, IEDs, and WAMS for system operation, and AMIs for
nity, Zen, Counter party, Root Stock, Rchain, and Qtum. All
smart homes/building management [68]. By incorporating the
these blockchains are different variants of Ethereum with some
field measurement and control blockchain with smart contracts
modifications. For example, Quorum has a major advantage of
to these IoT-enabled ICT devices in WAN, NAN, and SN/HAN,
no gas usage for its transaction [76], which is more suitable
the field measurement data can be securely and automatically
in large-scale smart grid applications. Quorum platform comes
collected [69]. Furthermore, with the DAPPS services, the
with functionality that Solidity can be embedded [22]. Quorum
blockchain-enabled AMIs can perform decentralized DR, local
is capable of executing private transactions between selected
power management, and local power trading within cyberse-
parties using constellation.
cured environment [70].
Some North American start-up companies have developed
The field measurement data will be aggregated by selected
their blockchain platforms, which are specifically for the smart
data aggregators while utilizing data aggregation blockchain
grid. BTL is a Canadian company that is working on cross-
in WAN and NAN. The purpose of using blockchain for data
border, large-scale, and cybersecured power trading platform
aggregation is mainly for additional data confidentiality protec-
backed by the Interbit private blockchain. Similarly, Drift is
tion in the smart grid [71]. After received by multiple receivers
an American company working on efficient and secure grid
of meter operators or SCADA systems and data centers, the
transactions with multiauthentication and privacy protection on
aggregated data will be automatically processed and stored
its blockchain. A German company is using IBM-Hyperledger
by the data management blockchain with smart contracts and
fabric blockchain for P2P power transactions with integrity and
DAPPS services [72], where the blockchain can protect the
confidentiality protection. Companies like Engro, XiWatt, and
integrity and auditability of stored data. For system operation
Consensys are using public blockchains for P2P power transac-
blockchain within WAN, by utilizing the smart contracts and
tions. A Spain company, named Pylon Networks, uses the Lite-
DAPPS services, the system operation decisions can be made
coin public type blockchain for AMIs, aiming to provide high
automatically with less human interface, which can reduce the
auditability for power tracing. The Omega grid has developed a
risk of cybersecurities caused by human mistakes [73]. Also, the
smart grid management platform for cybersecured system opera-
storage of historical records of decisions in the blockchain can
tion, which is based on a privately running blockchain [77]–[80].
provide better audibility in the smart grid.
A start-up blockchain company named by Tenup proposes an
The data flow within and among these four networks is verified
architecture with high power efficiency for remote areas and
and stored by the blockchains with a high degree of cybersecu-
works on a mixed consensus mechanism, in which the maximum
rity, and the replications of data storage across multiple devices
transaction time is 60 s, which makes it useful for large-scale
can effectively protect the data availability from a single point of
smart grid implementation [81].
failure [74]. With the advancement in the blockchain technology,
power transaction functionality can be integrated using specially
designed blockchain built over the DAPPS layer. For system op-
IV. APPLICATIONS OF BLOCKCHAIN IN
eration, the blockchain is able to increase the cybersecurity and SMART GRID FOR CYBERSECURITY
efficiency of the wholesale electricity market [25]. Some start-up
companies, such as Power Ledger, Grid+, and Greeneum, have In the literature, the research on the blockchain for the smart
started to use the blockchain for local power transactions [59]. In grid cybersecurity can be mainly categorized into three levels,
this method, the authentication and authorization can be involved i.e., field measurement and communications, power generation
in power transactions at low risk of confidential breach, and and transmission, and power distribution and utilization. In this
the integrity, availability, and accountability/nonrepudiation of section, the details of blockchain applications at different levels
transaction data can be well protected. In some works, the appli- will be presented. The application of the blockchain for the smart
cations of the blockchain for data management in EV charging grid cybersecurity against data integrity attack will be discussed
stations are also investigated, which mainly aim at providing in detail to better illustrate the cybersecurity mechanism of the
confidentiality protection and data availability. blockchain-based smart grid.

Authorized licensed use limited to: K K Wagh Inst of Engg Education and Research. Downloaded on January 29,2024 at 06:01:59 UTC from IEEE Xplore. Restrictions apply.
ZHUANG et al.: BLOCKCHAIN FOR CYBERSECURITY IN SMART GRID: A COMPREHENSIVE SURVEY 9

TABLE II
SUMMARY OF REVIEWED RESEARCH WORKS FOR THE APPLICATIONS
OF BLOCKCHAIN IN FIELD MEASUREMENT AND COMMUNICATIONS

Fig. 4. Operational procedure of blockchain-based smart meter [22].

and [112] for using the blockchain to provide guaranteed im-


mutability of stored data, and mitigation of cyberattacks against
data collection and transfer. In [22], the blockchain-based smart
meter is proposed to protect the integrity and confidentiality of
A. Blockchain for Field Measurement and
customers’ electricity usage data. As shown in Fig. 4, the smart
Communications meter, and utility company have their public and private key
Blockchain technology can have wide applications in the pairs. The electricity usage data measured by smart meter are
smart grid for field measurement and communications, where first encrypted by the private key of smart meter, i.e., private
a summary of such research works is presented in Table II. key A. Then, the smart contract in the blockchain will decrypt
IoT-enabled ICT devices connected to the nodes in a blockchain the encrypted data by using the public key of smart meter, i.e.,
network to establish P2P communications in the smart grid for public key A, and check the validity. For the validity check,
field measurement data uploading, fetching, and transferring. if public key A can successfully decrypt the encrypted data,
For the stability and reliability of the blockchain-based smart then the encrypted data have not been compromised since the
grid for cybersecured field data measurement and transfer, all private key of the smart meter cannot be obtained by adversaries,
these ICT devices connected to this system should be perfectly which protects the data integrity. Furthermore, the data will be
synchronized with the deployed blockchain. In [44] and [82], encrypted by using the public key of the utility company, i.e.,
different types of architectures and synchronizing protocols have public key B, and only the utility company with the correspond-
been explained and discussed. Selected IoT-enabled ICT devices ing private key, i.e., private key B, can access the data. This can
are used to create a connection with the blockchain network and protect the confidentiality of customers’ data.
to store the copies of blockchain and smart contracts locally [83]. Also, blockchain provides tamper-proof and traceable fea-
Specific commands can be sent to the blockchain using these tures for data flows, which are required in the smart grid for data
ICT devices to initiate or call the smart contracts. For the case integrity and accountability/nonrepudiation protections. In [55],
of AMIs in the smart grid, they can be wirelessly connected to [93], and [94], the blockchain is enabled for big data analysis
the blockchain and, thus, create a way to operate such devices with secured data flow and storage. If old data presented is faulty
on the smart grid through the blockchain [23], [84]. The power and is not trustable, all the future estimations and predictions will
trading and security enhancement (ETSE) module, designated be inaccurate. For example, the wrong estimation of wind speed
in [23], can be implemented to allow for the cybersecured or solar intensity for a specific period can cause substantial eco-
P2P communications among different AMIs within the same nomic loss and even destabilize the smart grid. A decentralized
blockchain network. If the smart contracts are deployed on a blockchain architecture with bad data detection mechanism is
particular part of the smart grid, automated commands can be introduced in [95] for secured and trustful big data analysis;
provided by the blockchain to the smart grid. however, the synchronization of the blockchain and data fetch
Among different cyberattacks, the data integrity attack is a and upload delays have not been accounted for. These factors
major threat in the smart grid [85]–[87]. FDI attack is a type of will affect the simulation timings and decrease the efficiency of
cyberattack against data integrity, which stealthily manipulates big data analysis. To address this issue, the Hyperledger fabric
the measurements [88]–[91]. Possible attacks include tampering blockchain is used in [96] to work with crowdsourced power
with consumption data for fraudulent purposes, maliciously al- markets, which is fast because of the usage of PBFT consensus
tering power trading transactions to destabilize the grid, invading and is more secure.
customer’s privacy by collecting and analyzing consumer data, In [72], [97], and [98], surveys are conducted for blockchain
and remotely controlling critical IEDs to switch them OFF [90]. usage for cybersecurity of the IoT system, and blockchain-based
Many papers have introduced firewall-based methods to defend marketplace for business models with blockchain-IoT combi-
against such attacks. However, due to the low computational nation is introduced. Comparisons among different blockchain
power of IoT-enabled ICT devices, such as AMIs, firewall architectures and their connection with IoT devices are explained
techniques are sluggish and are vulnerable to cyberattacks [91]. in [57] and [99]. Methods of using smart contracts with IoT de-
The blockchain has been proved to be a better and more vices are further elaborated, and some new robust techniques are
efficient alternative to protect the smart grid against FDI at- introduced in [57]. Big data analysis for renewable power gener-
tacks [92]. Some solutions are introduced in [42], [22], [92], ation forecasting can be performed locally with less computing

Authorized licensed use limited to: K K Wagh Inst of Engg Education and Research. Downloaded on January 29,2024 at 06:01:59 UTC from IEEE Xplore. Restrictions apply.
10 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 17, NO. 1, JANUARY 2021

TABLE III are controlled by microgrid operators to operate in either the


SUMMARY OF REVIEWED RESEARCH WORKS FOR THE APPLICATIONS
OF BLOCKCHAIN IN POWER GENERATION AND TRANSMISSION
isolated or grid-connected mode. Then, the power generation
and transmission for the smart grid with integrated DGs at a
high penetration level can be effectively controlled by leveraging
the microgrids using a decentralized multiagent-based control
system (DMACS) [44], [74], [105].
Based on the structure of DMACS for power generation
and transmission systems, researchers have introduced the
blockchain-based smart contracts to securely exchange power
between consumers and prosumers within and among micro-
grids in the local electricity market [59], [84], [106]–[111]. The
main idea behind the blockchain-based smart contract function-
ality for local power transactions is to allow the consumers to
buy power from local prosumers through P2P power transactions
while encouraging the local prosumers to help utility in meet-
ing local demands [84], [106]. By using the blockchain-based
resources usage, and data can be published on the blockchain smart contracts, the power generation by local DGs and power
in a tamper-proof manner, smart contracts will be executed transmission through P2P power transactions can be verified
based on the published forecasted data, automatically. Special and securely recorded in a blockchain without a third party’s
blockchain developed in [94] is specific for big data analysis need. The transparency of the blockchain can prevent fraud
with proven high scalability and security; mechanisms of this attempts in power trading processes [110]. The asymmetric
can also be utilized to develop blockchain for more cybersecured cryptography and tamper-proof feature of the blockchain can
applications in the smart grid. provide authentication and authorization to protect the integrity
In [100], a new cloud-based architecture for the blockchain- and accountability/nonrepudiation of power transactions. Also,
based IoT system is proposed to improve the performances the public–private key pair in asymmetric cryptography can
in real-time data storage and transfer with low latency. Dis- better protect the confidentiality of data [111].
tributed cloud-based architecture with controller fog nodes has Moreover, independence on a third party significantly reduces
been proven to be a good alternative, as they provide low- the power transaction costs, which further facilitates the usage
cost, secured, and on-demand access to the users [101]. The of DGs [109]. Due to the cybersecurity and potential economic
fog node is based on software-defined networking (SDN) and benefits that the blockchain can bring to the power generation
blockchain [100]. A significant reduction of end-to-end delay be- and transmission, some start-up companies have developed their
tween IoT devices can be achieved in this architecture. In [102], a local electricity market platforms for the implementation of
comparison among the speeds of some typical blockchains, e.g., power transactions and power bidding backed by the blockchain,
Hyperledger fabric (i.e., PBFT consensus algorithm), Parity, including Piclo in the UK, Vandebron in the Netherlands, and
Ethereum, and H-Store blockchains, has been conducted. H- Brooklyn Microgrid in the US. The details about these start-up
Store can achieve the best throughput, while the throughput rate companies and the practical application cases of the blockchain
of Hyperledger fabric ranks second. Also, the P2P file system for in power generation and transmission are introduced in [108].
data transfer based on the blockchain is discussed in [103]. The The optimization techniques, such as economic dispatch and
InterPlanetary File System (IPFS) can be used in combination dynamic load redistribution in transmission systems, can also be
with the blockchain to achieve improved throughput, especially integrated with the blockchain by leveraging smart contracts and
for big data analysis. DAPPS services [77], [112]. With the blockchain, the economic
dispatch function can automatically request the biddings from
participating generators, clear the electricity wholesale market
B. Blockchain for Power Generation and Transmission based on biddings, and make the requested power values and set-
In this section, the applications of the blockchain for power tled procurement electricity prices publicly available. In [112], a
generation and transmission will be discussed, where a summary blockchain-assisted economic dispatch mechanism is proposed
of such research works is presented in Table III. Along with for power distribution system operation. As shown in Fig. 5,
the development of the smart grid, the conventional nonre- within the blockchain, the peers are responsible for executing
newable and centralized power generation is being replaced transactions and smart contracts, and maintaining the world
by renewable power-based DGs. The utilities usually face high state and transaction data as distributed ledgers. The clients and
costs for cybersecured and efficient communications and control system operators join the blockchain by communicating with
infrastructures to control these DGs in conventional centralized a peer through fabric certification (F-CA) mechanisms. After
structure [104]. Also, the centralized control structure exposes joining the blockchain, the clients will update their electricity
the generation control of DGs to a single point of failure. To usage/generation preferences, e.g., marginal costs for electric-
effectively and securely control the DGs, the idea of the micro- ity generation and marginal utilities for electricity usage, and
grid has emerged under the smart grid topic. In a microgrid, the the updated preferences will be stored as world state in the
local DGs, energy storage systems, and local power demands blockchain. The system operators can read the preference data

Authorized licensed use limited to: K K Wagh Inst of Engg Education and Research. Downloaded on January 29,2024 at 06:01:59 UTC from IEEE Xplore. Restrictions apply.
ZHUANG et al.: BLOCKCHAIN FOR CYBERSECURITY IN SMART GRID: A COMPREHENSIVE SURVEY 11

TABLE IV
SUMMARY OF REVIEWED RESEARCH WORKS FOR THE APPLICATIONS OF
BLOCKCHAIN IN POWER DISTRIBUTION AND UTILIZATION

Fig. 5. Blockchain-assisted economic dispatch mechanism [112].

from the world state and perform the economic dispatch to get the
locational marginal electricity price, which will be used to form
smart contracts. The smart contracts will be used by the peers distributed blockchain ledgers, which can prevent the loss of
to commit the power transactions among their corresponding control signals. Voltage control transformers at a transmission
clients automatically. This mechanism can significantly im- level can be monitored by a smart contract to provide automated
prove the efficiency and security of power system economic functionality. Besides protecting data integrity and accountabil-
dispatches. This method offers data protection and resiliency ity/nonrepudiation, the blockchain has a strong advantage in
against cyberattacks in the electricity wholesale market, such guaranteeing the data availability for distributed power transmis-
as DoS attack on economic dispatch [113]. Furthermore, the sion system operation [77]. Moreover, some parts of the com-
blockchain-enabled AMIs can also be implemented for renew- putation power of the blockchain can be potentially utilized to
able power certification [114]. calculate demand forecasting and ac power flow in a distributed
The integrity and accountability/nonrepudiation of distributed manner.
electric power system SE results are crucial for dynamic load
redistribution in transmission systems. However, the current SE
is vulnerable to FDI attacks. By utilizing the blockchain-enabled C. Blockchain for Power Distribution and Utilization
ICT devices in the smart grid, the blockchain-based distributed For power distribution and customer-side power utilization,
SE function can reduce the risk of data tampering by providing the blockchain also provides a variant of cybersecurity function-
integrity protection and help detect manipulations of data in alities [28], [30], [44], [79], [82], [122]–[127], [129], [130]. A
addition to traditional bad data detection mechanisms [58]. summary of such research works is described in Table IV. The
Other severe data integrity attacks against SE, such as distributed conventional power distribution system is typically designated
DoS (DDoS), data framing, and cybertopology attacks, can also with enough reserve of capacity to provide electrical power for
be defended using the blockchain technology [115], [116]. For the customers stably and is left with a low degree of monitoring
example, during the DDoS attack, the AMIs communications is and control. However, with the integration of DGs with bidi-
not functional, but DAPPS layer of blockchain can still provide rectional power flow and at a high penetration level, the tradi-
actual data of power consumption [117]. Instead of protecting tional load and power flow patterns have changed significantly.
the measurement data from AMIs communication failure caused To address this issue, the power distribution system is being
by the DDoS attack, the blockchain-based IoT system can also redeveloped to integrate a large amount of IoT-enabled ICT
support the smart grid for DDoS detection by using counter and devices, to improve the system observability and controllability.
comparator components implemented in the smart contract [118] This redeveloped power distribution system is defined as an
and for DDoS prevention by implementing distributively static active cyberphysical distribution system (A-CPDS) [131]. The
resource allocation mechanism on the blockchian-based IoT P2P data transfer, cybersecurity, confidentiality protection, and
system [119]. Moreover, the utility can easily and securely detect transparency features of the blockchain technology have made
and redirect power to the affected area in case of an emergency, the blockchain a promising solution to improve the cybersecurity
as SCADA and PLC control is available through smart contracts and efficiency of A-CPDS [130].
in the blockchain network [117]. This enhances the performance Under the context of A-CPDS, the smart homes equipped
of dynamic load redistribution in the transmission system [120]. with a variant of IoT-enabled ICT devices, such as AMIs and
With the blockchain-based distributed SE function and em- power management systems, have created great interconnec-
bedded IoT system in the smart grid, the blockchain can provide tivity between the individual customer and electric grid. This
variant functionalities for secured and reliable distributed power improves the performance of power utilization on the customer
transmission system operation [121]. For example, the static side. However, the concerns about privacy leakage and smart
var compensator can be continuously and securely monitored grid data integrity attack caused by bad data intrusion from
and controlled using smart contract. Protection relays like long- the customer side have greatly impeded the development of
distance and differential voltage relays can be controlled by smart homes [68]. The blockchain has been seen as a suitable

Authorized licensed use limited to: K K Wagh Inst of Engg Education and Research. Downloaded on January 29,2024 at 06:01:59 UTC from IEEE Xplore. Restrictions apply.
12 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 17, NO. 1, JANUARY 2021

method to facilitate the development of smart homes by provid-


ing integrity, confidentiality, and accountability/nonreputation
protections and improve the authentication/authorization levels
for customer-side ICT devices [132].
In [132] and [133], the private blockchain is established, based
on the HAN, to allow for secured electrical appliances usage data
uploading to the cloud server of the power management system.
The usage of the private blockchain is to provide better privacy
protection for customers. Based on the uploaded usage data, the
policy for home power management can be implemented into Fig. 6. Blockchain-based G2V and V2G/V2V bidding platform [44].
the smart contract for automation control. Since the policy is
replicated and stored distributively, any abnormal power usage
action can be easily detected and analyzed [132]. Also, based blockchain. By using smart contract, the EV users can request
on the blockchain cloud server for smart homes, the remote several bids from different charging stations to minimize the
electricity bill payment function with high level of cybersecurity charging costs while satisfying the charging demand. Different
against theft of electricity is added in [44] and [124]. With from the G2V mode, which considers only unidirectional power
the blockchain-enabled smart meter, the electricity bill can be flow from the grid to EV, the vehicle-to-grid (V2G) and vehicle-
automatically generated and uploaded to the blockchain cloud to-vehicle (V2V) modes can be used to balance the supply and
server, which is tamper-proof. With the proper private key, the demand, reduce load fluctuation, and support voltage stability in
user can easily access the bill information and make payment the power distribution system [123]. The techniques proposed
remotely. in [44], [82], [125], [137]–[140] introduce methodologies where
In addition to providing cybersecurity for integrity, confiden- connected EVs can request charging/discharging from the smart
tiality, and accountability/nonreputation of electricity usage bill, grid with blockchain-enabled trading platform, and they are
the blockchain-based remote electricity bill payment function given incentives if they support the grid, through V2G or V2V,
can also significantly reduce the bill payment cost and settlement in return. For example, power can be exchanged among EVs
time [124]. In A-CPDS, the blockchain with smart contract and grid using AdBEV through the smart bidding algorithm
functionality can also be used for secured and trusted DR of implemented in the smart contract [44]. As shown in Fig. 6,
smart homes [74], [130], [134]. By using blockchain technology, the electricity prices for purchasing power from the grid, other
the latency of real-time electricity price publications can be EVs, and DGs can be published through the blockchain for
reduced, which can guarantee the fairness and effectiveness of publicly reviewing, in which the integrity and confidentiality
DR. Also, the smart contract can be used to ensure that the of the data can be well protected. The least expensive pricing
requested DR power is provided by the customers, which can algorithm implemented in the smart contract can be used to
prevent fraud activities. Moreover, by leveraging the DAPPS select the preferred power suppliers, and the smart contracts
services of the blockchain for AMIs, the distributed DR can are issued between the users and selected power suppliers. After
be implemented. The blockchain can protect the availability of the mutual authentication of smart contracts, the power flow and
critical data, such as electricity pricing signal, ancillary service payments can be automatically executed by the smart contracts
signal, and regional system states, for distributed DR. Also, without any delays. Due to the auditability of the blockchain,
the auditability of the blockchain can ensure that the abnormal the transaction and EV charging/discharging data can be easily
DR actions can be regulated and/or punished in a trust and traced, which can help the system analyze and identify any
fairway [74]. susceptible adversary behaviors.
Furthermore, the blockchain-enabled automated and cyber- IBM predicts that autonomous vehicles and self-driving cars
secured machine-to-machine transactions, which includes auc- will be in demand abundantly by 2020 [126]. In [127], cyberse-
tions, bidding, and payment, can be utilized for the smart charg- curity for these vehicles is provided by the blockchain-based IoT
ing of EVs [135]. In [136] and [137], the blockchain-based system. Data collected from sensors flow through the blockchain
billing system for EV charging is investigated, where this billing with smart contracts and DAPPS services with predefined logic.
system is designated for the electricity transaction between For example, if a sensor detects any issue with EV, based on
EV and charging station in the grid-to-vehicle (G2V) mode. smart contract, it will automatically schedule a booking with
By using the blockchain-based billing system, the EV users the manufacturer and will go there on a specified time. More
can have a real-time charging price and immediately make the blockchain-based processes such as fueling, charging, electronic
payment after charging services. Also, the mutual authentication parking, and repairs are introduced in [126]. These processes
for payment settlement in the blockchain can guarantee that the need a high level of security and can only be handled by a trusted
payment is cleared only when the user and charging station system, which is, in fact, the main feature of the blockchain. The
provider agrees on the realized charging amount [136]. The same process can be implemented on the smart grid for automatic
cyberresiliency nature of the blockchain can protect the billing maintenance. Such add-ons in the smart grid operation will pro-
system from adversary data manipulation. vide customer satisfaction and increased levels of serviceability,
An extension of the blockchain-based billing system is pro- reliability, and security.
posed in [135], which also considers the autonomous EV charg- Smart contract functionality backed by the proof of power
ing optimization by using smart contract functionality in the algorithm is introduced in [28], which was adopted to reduce
Authorized licensed use limited to: K K Wagh Inst of Engg Education and Research. Downloaded on January 29,2024 at 06:01:59 UTC from IEEE Xplore. Restrictions apply.
ZHUANG et al.: BLOCKCHAIN FOR CYBERSECURITY IN SMART GRID: A COMPREHENSIVE SURVEY 13

the consensus delay. This algorithm proves to be better for the Currently, the lack of scalability is still a great challenge
case of P2P power transaction and can be beneficial for G2V and impeding the practical applications of the blockchain in the
V2G/V2V. A comparison of this technique with Hyperledger- smart grid for cybersecurity [147]. To address the scalability
PBFT consensus can be done to obtain further insights into issue, consortium blockchain is used for cybersecured micro-
this consensus. Furthermore, proof of probability algorithm also grid operation in [147] and [148] and data regulation mech-
shows good performance [128], which can also be adapted in anism in [71] for data aggregation in the smart grid. The
the grid space to achieve fewer transaction delays. Anonymous consortium blockchain introduced proves to be much faster
power trading between EVs is discussed in [129], with perfor- and secure. Computational complexity in the blockchain has
mance analysis and proof of practicality of the blockchain for been reduced significantly. The permissioned blockchain is used
cybersecured V2G/V2V applications. in [149] to perform a comparison between gas consumption
with a focus on privacy in the smart grid. The usage of such
V. POTENTIAL FUTURE RESEARCH DIRECTIONS modified blockchains gives a better computational performance
with a sacrifice on confidentiality protection. A fast and public
A comprehensive review for the blockchain in the smart
blockchain is the best choice for blockchain operation in the
grid for cybersecurity is presented above. In which, the sys-
smart grid. Yet, modifications are required to provide better
tem architectures, implementation platforms, and applications
privacy protection.
for field measurement and communications, power generation
Numerous research works have tried to improve privacy
and transmission, and power distribution and utilization of the
protection by adopting an anonymous external system. For
blockchain for smart grid cybersecurity have been discussed.
example, in [150], a blockchain-based anonymous reputation
However, as an emerging technology, the usage of the blockchain
system (BARS) is established to provide a privacy-preserving
in the smart grid still faces great challenges. In the rest of this
trust model for public blockchains. By leveraging BARS, the
section, some major issues that have not been fully considered
certificate and revocation transparency can be effectively im-
in the research work for cybersecurity of the blockchain-based
plemented in a public blockchain by leveraging the proofs of
smart grid mentioned above and recent advances in blockchain
presence/absence for public keys. The usage of the 5G technique
technologies for these challenges will be discussed. In the end,
is discussed in [151] for smart grid application to decrease the
potential future research directions in power transmission and
delay in communication time. However, high infrastructure costs
distribution systems will be highlighted.
will be a great challenge when it starts rolling out. Hyperledger
fabric technology that gives owner authority to control the
A. Major Issues and Recent Advances accesses of nodes has been proven to be a potential solution
For the wide applications of the blockchain for cybersecurity for cybersecurity of the large-scale smart grid [152].
in the smart grid, the size of distributed ledger will increase, and However, since Hyperledger fabric involves a small number
storage requirements will be enormous. This will slow down the of nodes and focuses mainly on the validation of data being
blockchain network for data processing and affect the efficiency added to a block, it still suffers from low cybersecurity lev-
and reliability of smart grid operation. In [141], an efficient ar- els [153]. In [153], a lightweight proof of block and trade
chitecture based on network coding (NC) and distributed storage (PoBT) consensus algorithm is proposed to improve the cyber-
(DS) for blockchain storage is proposed to reduce the storage security of private blockchains, which allows for both data and
room and improve the efficiency of the blockchain for large- block validations. More importantly, with a varying number of
scale applications. However, the framework proposed in this participated nodes, the PoBT can achieve a better throughput
article is vulnerable to pollution attacks. Advancement in this rate and a lower communication bandwidth requirement than
framework is being investigated to make it more robust against Hyperledger fabric. However, the PoBT proposed in [153] is
cyberattacks. Furthermore, a fast, low storage, and a nonlinear explicitly designated for business applications, where a trusted
fashioned blockchain is developed in [142], which utilizes a certified authority is required to guarantee the security and
lightweight node to connect to the blockchain network. These efficiency of PoBT. In the smart grid, there is a large number
lightweight nodes only carry the headers and are designated for of authorities, e.g., transmission/distribution system operator
verification without carrying much data. Such a blockchain was (T/DSO), microgrid operator (MGO), and EV aggregator, and
proven to be resilient to DDoS attacks and can provide better they represent different parties. There is no discussion in [153]
performances in robustness and efficiency compared with the on selecting a trusted certified authority out of a group of
NC- and DS-based architecture [143]. The study in [144] casts authorities representing different parties for the entire smart
light on types of blockchains that can be used for industrial grid system, which causes great challenges for applying PoBT
and other generic applications, and the work in [144] illustrates in the smart grid. One possible solution to address this is-
its applicability. Furthermore, researchers have discussed the sue is considering the extension of PoBT consensus algorithm
impact of using different consensus algorithms on the perfor- in [153] to consortium blockchains, with an added layer for
mance of blockchain-based IoT systems. A more comprehensive trusted certified authority/authorities selection in a way similar
analysis about these impacts can be found in [145], where the to the voting process of PBFT consensus algorithm. Another
usage of PBFT consensus is studied in depth. Furthermore, the possible solution is to leverage the cross-chain framework in the
comparison between PBFT and PoW in [146] proves that PBFT smart grid. Multiple sidechains are established in the cross-chain
is more suitable for blockchain-based IoT systems. framework for different application scenarios, e.g., distribution

Authorized licensed use limited to: K K Wagh Inst of Engg Education and Research. Downloaded on January 29,2024 at 06:01:59 UTC from IEEE Xplore. Restrictions apply.
14 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 17, NO. 1, JANUARY 2021

system management, microgrid operation, and EV charging However, there still lacks proper and widely accepted stan-
management, with the main blockchain as the backbone. In this dards for seamless interoperability among different blockchains
way, the trusted certified authority for each sidechain can be with unique technologies. Therefore, there is an urgent need
easily selected based on their application scenarios. In [154], to achieve blockchain standardization in the smart grid under
the cross-chain framework for IoT data management has been no centralized authority that allows for seamless, cyberresilient,
studied. However, there are still many challenges that need to be and efficient exchange of data among different blockchains with
addressed for the application of a cross-chain framework in the distinctive technologies and objectives. Blockchain technology
smart grid, e.g., the side chain interoperability [155]. is an excellent alternative to many, but it still needs more refine-
The public blockchain provides better cybersecurity by devot- ment, especially for the smart grid.
ing the great computational power of mining nodes. However,
the increasing computational power attributes great impacts on
the energy efficiency of the blockchain-based smart grid. For B. Potential Future Research Directions
example, the widely used PoW consensus mechanism in public To better address the issues mentioned above, some research
blockchain requires large energy consumption for the consensus topics can be further studied. The development of a blockchain-
process and has a significant carbon footprint and electronic based smart grid framework with an IDS and DAPPS specifically
waste. The existing consensus mechanism is not in support of for smart grid applications can be studied further with different
the sustainable development of the smart grid. The design of architectures. Testing framework for the blockchain-enabled
proper incentive and penalty mechanisms that encourage the smart grid can be investigated and developed, considering DDoS
reduction of energy consumption and usage of renewable energy attacks, Sybil attacks, routing attacks, and man-in-the-middle
generation for consensus mechanisms is a crucial future research attacks. In this article, we will highlight the potential future
direction for the particular application of the blockchain in the research directions in power transmission and distribution sys-
smart grid. tems.
Since the blockchain still suffers from several cybersecurity 1) Distributed Power Transmission System Monitoring: The
vulnerabilities [156], the integration of the blockchain may blockchain with smart contract functionalities may be imple-
expose the smart grid to new types of cybersecurity issues. In the mented in a distributed manner, in which the blockchain network
past few years, cryptanalysis of the hash function has been an of the whole transmission system can be established by incor-
active research area, and various types of cyberattacks against porating multiple distributed blockchain networks. This enables
the hash function in the blockchain have been proposed [157]. the distributively and cybersecured monitoring and control of the
With the successful alternating hash function, the transaction transmission system, which can potentially address the increased
malleability attack can mislead the energy consumers in P2P en- penetration level of DGs and prevent the power transmission
ergy transactions to pay twice. A routing attack that partitions the system operation from a single point of failure. For example,
blockchain network that prevents nodes from communicating a power transmission system may be divided into different
with each other is able to tamper data in the smart grid through regions, which are monitored by different sets of IoT-enabled
delay attack. Targeting on the whole blockchain network, the ICT devices with smart contracts that contain controlling logic
DDoS cyberattack can disconnect multiple nodes from the net- and algorithms. One region may be selected as the command
work. As an important component of the blockchain-based smart center, and a mechanism can be developed to invoke contracts
grid, smart contracts’ vulnerabilities have severe impacts on the between divided regions while considering the synchronization
stability and reliability of the smart grid operation. As discussed of measurements and control signals. Also, the distributed con-
in [158], the smart contracts can be easily tampered through trol algorithm is required to allow for each divided region having
an alternating source code, penetrating virtual machines, and its subcontracts for controlling generation and utilization within
modifying runtime environment. Moreover, usability is also a its region.
big challenge as some users may lose their private keys, which 2) Power Distribution System Automation System: The
lead to their accounts get locked forever. Some of these issues blockchain-based smart contracts may also be developed with
are already corrected by new blockchains, but that leads to complex algorithms for cybersecured RTUs and IEDs control in
decreased privacy of the users. Currently, such tradeoffs still the smart grid. For example, in the power distribution system,
require great attention. Cyberattacks on the blockchain like blockchain-based smart contracts can be used to control tap
DAO, which occurred in 2016 on Ethereum, only strengthened changers for voltage regulation. A potential control procedure
and helped evolve this technology to be more cyberresilient and for blockchain-based voltage regulation is shown in Fig. 7.
robust [159]. Attacks like these will expose more loopholes in The smart contracts can be deployed in PMUs to measure
the coming future. voltage levels. The measurements can be published on a public
Several blockchain technologies that differ from each other blockchain and used by the smart contracts deployed in tap
in protocols, mechanisms, and techniques are being investigated changers to stabilize the voltage levels. The smart contracts may
and developed for blockchain-based smart grids. Also, due to also be deployed in DG controllers and used to command the
the geographical and operational complexities of the smart grid, DG outputs to respond to voltage regulation requirements. Fur-
multiple blockchains may be required to achieve effective oper- thermore, a performance scoring mechanism can be developed
ation of the smart grid, among which different entities may be to find the DGs that violate voltage regulation requirements and
responsible for different blockchains with distinctive objectives. credit the supporting DGs by using smart contracts. Moreover,

Authorized licensed use limited to: K K Wagh Inst of Engg Education and Research. Downloaded on January 29,2024 at 06:01:59 UTC from IEEE Xplore. Restrictions apply.
ZHUANG et al.: BLOCKCHAIN FOR CYBERSECURITY IN SMART GRID: A COMPREHENSIVE SURVEY 15

smart grid. Blockchain is a promising solution for the smart


grid cybersecurity improvement. However, there were still great
challenges from both the perspective of the vulnerabilities of
blockchian technologies and the implementation of blockchain
in the smart grid. In this article, the potential future research
directions were discussed in detail to provide some guidance for
the research on the blockchain-based smart grid.

Fig. 7. Voltage profile stabilization using smart contracts. REFERENCES


[1] C. Greer, D. A. Wollman, D. E. Prochaska, and P. A. Boynton, “NIST
framework and roadmap for smart grid interoperability,” 2010. [Online].
Available: https://www.nist.gov. Accessed on: Aug. 11, 2019.
[2] R. Liu, C. Vellaithurai, S. S. Biswas, T. T. Gamage, and A. K. Srivas-
tava,“Analyzing the cyber-physical impact of cyber events on the power
grid,” IEEE Trans. Smart Grid, vol. 6, no. 5, pp. 2444–2453, Sep. 2015.
[3] H. Farhangi, “The path of the smart grid,” IEEE Power Energy Mag.,
vol. 8, no. 1, pp. 18–28, Jul. 2010.
[4] A. Stefanov and C. Liu, “Cyber-power system security in a smart
grid environment,” in Proc. IEEE PES Innovative Smart Grid Technol.,
Jan. 2012, pp. 1–3.
[5] Electricity Information Sharing and Analysis Center, “Analysis of the
cyber attack on the Ukrainian power grid,” 2016. [Online]. Available:
https://ics.sans.org/media/E-ISAC. Accessed on: Aug. 11, 2019.
[6] “The highly dangerous ‘triton’ hackers have probed the us grid,” 2019.
Fig. 8. Interface of testing system for smart contract in smart grid. [Online]. Available: https://www.wired.com/story/triton-hackers-scan-
us-power-grid. Accessed on: Aug. 11, 2019.
[7] Y. Yu, Y. Li, J. Tian, and J. Liu, “Blockchain based solutions to security
and privacy issues in the internet of things,” IEEE Wireless Commun.,
a testing system based on a common blockchain platform can vol. 25, no. 6, pp. 12–18, Dec. 2018.
be developed to test the blockchain-based smart grid control [8] M. Curiale, “From smart grids to smart city,” in Proc. IEEE Saudi Arabia
Smart Grid Conf., Dec. 2014, pp. 1–9.
system. The Ethereum blockchain with a flexible smart contract [9] J. Xie et al., “A survey of blockchain technology applied to smart cities:
design feature may be used as the blockchain network for the Research issues and challenges,” IEEE Commun. Surveys Tuts., vol. 21,
testing system. A potential interface of the Ethereum-based no. 3, pp. 2791–2830, Jul.–Sep. 2019.
[10] Z. E. Mrabet, N. Kaabouch, H. E. Ghazi, and H. ElGhazi, “Cybersecurity
testing system is shown in Fig. 8. In the testing system, some in smart grid: Survey and challenges,” Comput. Elect. Eng., vol. 67, no. 1,
common coding languages, e.g., JavaScript and Python, can be pp. 469–482, Apr. 2018.
used to encode the smart contracts. Also, smart contracts need [11] M. A. Faisal, Z. Aung, J. R. Williams, and A. Sanchez, “Data-stream
based intrusion detection system for advanced metering infrastructure in
to be able to interact with the Ethereum blockchain network. A smart grid: A feasibility study,” IEEE Syst. J., vol. 9, no. 1, pp. 31–44,
potential method is to embed smart contracts in Solidicity in the Mar. 2015.
local server, then interact with Ethereum blockchain through the [12] E. D. Knapp and R. Samani, Applied Cyber Security and the Smart Grid:
Implementing Security Controls Into the Modern Power Infrastructure.
Ganache virtual server. Waltham, MA, USA: Syngress, 2013.
[13] S. Shapsough, F. Qatan, R. Aburukba, F. Aloul, and A. R. Al Ali, “Smart
grid cyber security: Challenges and solutions,” in Proc. IEEE Int. Conf.
VI. CONCLUSION Smart Grid Clean Energy Technol., Oct. 2015, pp. 170–175.
[14] R. Deng, P. Zhuang, and H. Liang, “False data injection attacks against
With the development of the smart grid, new challenges arise state estimation in power distribution systems,” IEEE Trans. Smart Grid,
to improve the cybersecurity of the smart grid. Many methods vol. 10, no. 3, pp. 2871–2881, May 2019.
have been proposed to make the smart grid more resilient against [15] M. R. Asghar, G. Dan, D. Miorandi, and I. Chlamtac, “Smart meter
data privacy: A survey,” IEEE Commun. Surveys Tuts., vol. 19, no. 4,
cyberattacks. Among these methods, the blockchain is a promis- pp. 2820–2835, Sep. 2017.
ing solution for protecting smart grid cybersecurity. In this [16] Y. Yan, Y. Qian, H. Sharif, and D. Tipper, “A survey on cyber security
article, a comprehensive review of blockchain-based protection for smart grid communications,” IEEE Commun. Surveys Tuts., vol. 14,
no. 4, pp. 998–1010, Sep. 2012.
mechanism for cybersecurity of the smart grid was conducted. [17] A. Bani-Ahmed, M. Rashidi, A. Nasiri, and H. Hosseini, “Reliability
Data protection was enabled by storing data in blockchain net- analysis of a decentralized microgrid control architecture,” IEEE Trans.
work and was validated by peers within the same network. The Smart Grid, vol. 10, no. 4, pp. 3910–3918, Jul. 2019.
[18] Q. Yu, “Design, implementation, evaluation of a blockchain-enabled
verified data could then be used for advanced smart grid oper- multi-energy transaction system for district energy systems,” M.S Thesis,
ations, such as load forecasting, local redistribution, and DR. ETH Zurich Research Collection, Zurich, Switzerland, Apr. 2018.
Blockchain-based platforms, applications, and services suitable [19] K. Christidis and M. Devetsikiotis, “Blockchains and smart contracts for
the Internet of Things,” IEEE Access, vol. 4, pp. 2292–2303, 2016.
for the smart grid with an emphasis on cybersecurity were [20] M. Marchesi, “Why blockchain is important for software developers, and
studied in-depth in this article. Many types of applications can be why software engineering is important for blockchain software,” in Proc.
structured on blockchain DAPPS layer, which helped establish IEEE Int. Workshop Blockchain Oriented Softw. Eng., Mar. 2018, pp. 1–1.
[21] P. Danzi, M. Angjelichinoski, C. Stefanovic, and P. Popovski, “Dis-
control of the smart grid with security over cloud and autonomy. tributed proportional-fairness control in microgrids via blockchain smart
Therefore, blockchain could improve the cybersecurity for data contracts,” in Proc. IEEE Int. Conf. Smart Grid Commun., Oct. 2017,
collection, storage, transfers, as well as control execution in the pp. 45–51.

Authorized licensed use limited to: K K Wagh Inst of Engg Education and Research. Downloaded on January 29,2024 at 06:01:59 UTC from IEEE Xplore. Restrictions apply.
16 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 17, NO. 1, JANUARY 2021

[22] T. M. G. L. Winter, “The advantages and challenges of the blockchain [47] D. Mechkaroska, V. Dimitrova, and A. Popovska-Mitrovikj, “Analysis
for smart grids,” M.S thesis, TU Delft University of Technology, Delft, of the possibilities for improvement of blockchain technology,” in Proc.
Netherlands, May 2018. IEEE 26th Telecommun. Forum, Nov. 2018, pp. 1–4.
[23] F. Lombard, L. Aniello, S. D. Angelis, A. Margheri, and V. Sassone, “A [48] I. Eyal, A. E. Gencer, E. G. Sirer, and R. van Renesse, “Bitcoin-NG:
blockchain based infrastructure for reliable and cost-effective IoT-aided A scalable blockchain protocol,” in Proc. 13th Usenix Conf. Netw. Syst.
smart grids,” in Proc. IEEE iThings, Mar. 2018, pp. 1–6. Des. Implementation, Mar. 2016, pp. 45–59.
[24] G. C. Lazaroiu, “Blockchain and smart metering towards sustainable [49] Z. Qi, Y. Zhang, Y. Wang, J. Wang, and Y. Wu, “A cascade structure
prosumers,” in Proc. IEEE Int. Symp. Power Electron., Elect. Drives, for blockchain,” in Proc. IEEE 1st Int. Conf. Hot Inf.-Centric Netw.,
Automat. Motion, Jun. 2018, pp. 550–555. Aug. 2018, pp. 252–253.
[25] M. Andoni et al., “Blockchain technology in the energy sector: A sys- [50] S. Biswas, K. Sharif, F. Li, B. Nour, and Y. Wang, “A scalable blockchain
tematic review of challenges and opportunities,” Renew. Sustain. Energy framework for secure transactions in IoT,” IEEE Internet Things, vol. 6,
Rev., vol. 100, pp. 143–174, Feb. 2019. no. 3, pp. 4650–4659, Jun. 2019.
[26] A. S. Musleh, G. Yao, and S. M. Muyeen, “Blockchain applications in [51] K. Shudo, R. Kanda, and K. Saito, “Towards application portability on
smart grid–review and frameworks,” IEEE Access, vol. 7, pp. 86746– blockchains,” in Proc. 1st Int. Conf. Hot Inf.-Centric Netw., Aug. 2018,
86757, 2019. pp. 51–55.
[27] J. Abdella and K. Shuaib, “Peer to peer distributed energy trading in smart [52] R. Abe, K. Nakamura, K. Teramoto, and M. Takahashi, “Attack incentive
grids: A survey,” Energies, vol. 11, no. 6, pp. 1560–1573, May 2018. and security of exchanging tokens on proof-of-work blockchain,” in Proc.
[28] P. Siano, G. De Marco, A. Rolan, and V. Loia, “A survey and evaluation of Asian Internet Eng. Conf., Nov. 2018, pp. 32–37.
the potentials of distributed ledger technology for peer-to-peer transactive [53] M. Westerkamp, “Verifiable smart contract portability,” in Proc. IEEE
energy exchanges in local energy markets,” IEEE Syst. J., vol. 13, no. 3, Int. Conf. Blockchain Cryptocurrency, May 2019, pp. 1–9.
pp. 3454–3466, Sep. 2019. [54] T. T. A. Dinh, J. Wang, G. Chen, R. Liu, B. C. Ooi, and K. L. Tan,
[29] R. Kuhn, D. Yaga, and J. Voas, “Rethinking distributed ledger technol- “Untangling blockchain: A data processing view of Blockchain sys-
ogy,” Computer, vol. 52, no. 2, pp. 68–72, Feb. 2019. tems,” IEEE Trans. Knowl. Data Eng., vol. 30, no. 7, pp. 1366–1385,
[30] M. Mylrea and S. N. G. Gourisetti, “Blockchain: A path to grid modern- Jul. 2018.
ization and cyber resiliency,” in Proc. IEEE North Amer. Power Symp., [55] H. Hassani, X. Huang, and E. Silva, “Big-crypto: Big data, blockchain
Sep. 2017, pp. 1–5. and cryptocurrency,” Big Data Cogn. Comput., vol. 2, no. 4, pp. 34–50,
[31] S. Li, “Application of blockchain technology in smart city infrastructure,” Jun. 2018.
in Proc. IEEE Int. Conf. Smart Internet Things, Aug. 2018, pp. 276–2766. [56] S. Aggarwal, R. Chaudhary, G. S. Aujla, A. Jindal, A. Dua, and N.
[32] W. Wang et al., “A survey on consensus mechanisms and mining strategy Kumar, “EnergyChain: Enabling energy trading for smart homes using
management in blockchain networks,” IEEE Access, vol. 7, pp. 22328– blockchains in smart grid ecosystem,” in Proc. 1st ACM MobiHoc Work-
22370, 2019. shop Netw. Cybersecur. Smart Cities, Jun. 2018, Art. no. 1.
[33] E. B. Hamida, K. L. Brousmiche, H. Levard, and E. Thea, “Blockchain [57] R. Henry, A. Herzberg, and A. Kate, “Blockchain access privacy: Chal-
for enterprise: Overview, opportunities and challenges,” in Proc. ICWMC, lenges and directions,” IEEE Security Privacy, vol. 16, no. 4, pp. 38–45,
Jul. 2017, pp. 83–88. Aug. 2018.
[34] J. Kang, R. Yu, X. Huang, S. Maharjan, Y. Zhang, and E. Hossain, [58] M. Mylrea and S. N. G. Gourisetti, “Blockchain for smart grid resilience:
“Enabling localized peer-to-peer electricity trading among plug-in hy- Exchanging distributed energy at speed, scale and security,” in Proc.
brid electric vehicles using consortium blockchains,” IEEE Trans. Ind. IEEE Resilience Week, Sep. 2017, pp. 18–23.
Informat., vol. 13, no. 6, pp. 3154–3164, May 2017. [59] E. R. Sanseverino, M. L. D. Silvestre, P. Gallo, G. Zizzo, and M. Ippolito,
[35] M. S. Ali, M. Vecchio, M. Pincheira, K. Dolui, F. Antonelli, and M. “The blockchain in microgrids for transacting energy and attributing
H. Rehmani, “Applications of blockchains in the Internet of Things: A losses,” in Proc. IEEE GreenCom, Jun. 2017, pp. 925–930.
comprehensive survey,” in Proc. IEEE Commun. Surveys Tut., vol. 21, [60] Z. Guan et al., “Privacy-preserving and efficient aggregation based on
no. 2, pp. 1676–1717, Apr.–Jun. 2019. blockchain for power grid communications in smart communities,” IEEE
[36] Z. Ma, W. Huang, and H. Gao, “Secure DRM scheme based on blockchain Commun. Mag., vol. 56, no. 7, pp. 82–88, Jul. 2018.
with high credibility,” Chin. J. Electron., vol. 27, no. 5, pp. 1025–1036, [61] I. Ullah and Q. H. Mahmoud, “An intrusion detection framework for
Sep. 2018. the smart grid,” in Proc. IEEE 30th Can. Conf. Elect. Comput. Eng.,
[37] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” [Online]. Apr. 2017, pp. 1–5.
Available: https://bitcoin.org/bitcoin.pdf. Accessed on: Mar. 22, 2018. [62] T. Alladi, V. Chamola, J. J. Rodrigues, and S. A. Kozlov, “Blockchain in
[38] X. Wu, B. Duan, Y. Yan, and Y. Zhong, “M2M blockchain: The case of smart grids: A review on different use cases,” Sensors, vol. 19, no. 22,
demand side management of smart grid,” in Proc. IEEE 23rd Int. Conf. Nov. 2019, Art. no. 4862.
Parallel Distrib. Syst., Dec. 2017, pp. 810–813. [63] V. Buterin, “The ethereum project,” 2019. [Online]. Available: https://
[39] M. T. Devine and P. Cuffe, “Blockchain electricity trading under demur- www.Ethereum.org. Accessed on: Nov. 12, 2019.
rage,” IEEE Trans. Smart Grid, vol. 10, no. 2, pp. 2323–2325, Mar. 2019. [64] Zcash, “Privacy-protecting digital currency,” 2019. [Online]. Available:
[40] D. Fakhri and K. Mutijarsa, “Secure IoT communication using https://z.cash/, Accessed on: Nov. 12, 2019.
blockchain technology,” in Proc. IEEE Int. Symp. Electron. Smart De- [65] M. B. Mollah et al., “Blockchain for future smart grid: A comprehensive
vices, Oct. 2018, pp. 1–6. survey,” 2019. [Online]. Available: https://arxiv.org/pdf/1911.03298.pdf,
[41] M. M. Esfahani and O. A. Mohammed, “Secure blockchain-based energy Accessed on: Sep. 15, 2019.
transaction framework in smart power systems,” in Proc. IEEE 44th Annu. [66] SolarCoin, “One megawatt hour one SolarCoin,” 2018. [Online].
Conf. IEEE Ind. Electron. Soc., Oct. 2018, pp. 260–264. Available: https://solarcoin.org/wp-content/uploads/SolarCoinPresent
[42] S. Wang, L. Ouyang, Y. Yuan, X. Ni, X. Han, and F. Wang, “Blockchain- ation.pdf, Accessed on : Sep. 15, 2019.
enabled smart contracts: Architecture, applications, and future trends,” [67] J. Fiaidhi, S. Mohammed, and S. Mohammed, “EDI with blockchain as
IEEE Trans. Syst., Man, Cybern. Syst., vol. 49, no. 11, pp. 2266–2277, an enabler for extreme automation,” IT Skilled, vol. 20, no. 4, pp. 66–72,
Nov. 2019. Aug. 2018.
[43] Bitcoin Project Group, “The Bitcoin project. [Online]. Available: [68] B. L. R. Stojkoska and K. V. Trivodaliev, “A review of Internet of Things
https://Bitcoin.org, 2018–3-16. Accessed on: Mar. 22, 2018. for smart home: Challenges and solutions,” J. Clean Prod., vol. 140, n0.
[44] C. Liu, K. K. Chai, X. Zhang, E. T. Lau, and Y. Chen, “Adaptive 3, pp. 1454–1464, Jan. 2017.
blockchain based electric vehicle participation scheme in smart grid [69] A. Pieroni, N. Scarpato, L. D. Nunzio, F. Fallucchi, and M. Raso, “Smarter
platform,” IEEE Access, vol. 6, pp. 25657–25665, 2018. city: Smart energy grid based on blockchain technology,” Int. J. Adv. Sci.,
[45] W. Cai, Z. Wang, J. B. Ernst, Z. Hong, C. Feng, and V. C. M. Leung, “De- Eng. Inf. Technol., vol. 8, no. 1, pp. 298–307, Sep. 2018.
centralized applications: The blockchain empowered software system,” [70] S. Noor, W. Yang, M. Guo, K. H. van Dam, and X. Wang, “Energy demand
IEEE Access, vol. 6, pp. 53019–53033, 2018. side management within micro-grid networks enhanced by blockchain,”
[46] C. Ehmke, F. Wessling, and C. M. Friedrich, “Proof-of-property—A Appl. Energy, vol. 228, no. 15, pp. 1385–1398, Oct. 2018.
lightweight and scalable blockchain protocol,” in Proc. IEEE/ACM 1st [71] M. Fan and X. Zhang, “Consortium blockchain based data aggrega-
Int. Workshop Emerg. Trends Softw. Eng. Blockchain, May–Jun. 2018, tion and regulation mechanism for smart grid,” IEEE Access, vol. 7,
pp. 48–51. pp. 35929–35940, 2019.

Authorized licensed use limited to: K K Wagh Inst of Engg Education and Research. Downloaded on January 29,2024 at 06:01:59 UTC from IEEE Xplore. Restrictions apply.
ZHUANG et al.: BLOCKCHAIN FOR CYBERSECURITY IN SMART GRID: A COMPREHENSIVE SURVEY 17

[72] T. H. Kim and J. Lampkins, “BRICS: Blockchain based resilient infor- [97] P. K. Sharma, M. Y. Chen, and J. H. Park, “A software defined fog node
mation control system,” in Proc. IEEE Int. Conf. Big Data, Dec. 2018, based distributed blockchain cloud architecture for IoT,” IEEE Access,
pp. 5363–5365. vol. 6, pp. 115–124, 2018.
[73] L. Thomas, Y. Zhou, C. Long, J. Wu, and N. Jenkins, “A general form [98] T. M. Fernndez-Carams and P. Fraga-Lamas, “A review on the use of
of smart contract for decentralized energy systems management,” Nature blockchain for the Internet of Things,” IEEE Access, vol. 6, pp. 32979–
Energy, vol. 4, no. 1, pp. 140–149, Jan. 2019. 33001, 2018.
[74] C. Pop, T. Cioara, M. Antal, I. Anghel, I. Salomie, and M. Bertoncini, [99] M. A. Rahman, M. M. Rashid, M. S. Hossain, E. Hassanain, M. F.
“Blockchain based decentralized management of demand response pro- Alhamid, and M. Guizani, “Blockchain and IoT based cognitive edge
grams in smart energy grids,” SENSORS, vol. 18, no. 1, p. 162, Jan. 2018. framework for sharing economy services in a smart city,” IEEE Access,
[75] M. Baza, M. Nabil, M. Ismail, M. Mahmoud, E. Serpedin, and vol. 7, pp. 18611–18621, 2019.
M. Rahman, “Blockchain-based privacy-preserving charging coordina- [100] T. T. A. Dinh, R. Liu, M. Zhang, G. Chen, B. C. Ooi, and J. Wang,
tion mechanism for energy storage units,” 2018. [Online]. Available: “Untangling blockchain: A data processing view of blockchain systems,”
https://arxiv.org/abs/1811.02001, Accessed on: Mar. 22, 2018. IEEE Trans. Knowl. Data Eng., vol. 30, no. 7, pp. 1366–1385, Jul. 2018.
[76] J. P. Morgan, “Quorum, advancing blockchain technology,” [Online]. [101] S. Prianga, R. Sagana, and E. Sharon, “Evolutionary survey on data
Available: https://www.jpmorgan.com/global/Quorum, Accessed on: security in cloud computing using blockchain,” in Proc. IEEE Int. Conf.
Mar 23, 2018. Syst., Comput., Automat. Netw., Jul. 2018, pp. 1–6.
[77] D. Livingston, V. Sivaram, and M. Freeman, “Applying blockchain [102] Y. Chen, H. Li, K. Li, and J. Zhang, “An improved P2P file system
technology to electric power systems,” [Online]. Available: https://cfrd8- scheme based on IPFS and Blockchain,” in Proc. IEEE Int. Conf. Big
files.cfr.org. Accessed on: Mar. 22, 2018. Data, Dec. 2017, pp. 2652–2657.
[78] G. Zizzo, E. R. Sanseverino, M. G. Ippolito, M. L. D. Silvestre, and P. [103] M. L. Di Silvestre, P. Gallo, M. G. Ippolito, E. R. Sanseverino, and G.
Gallo, “A technical approach to P2P energy transactions in microgrids,” Zizzo, “A technical approach to the energy blockchain in microgrids,”
IEEE Trans. Ind. Informat., vol. 14, no. 11, pp. 4792–4803, Nov. 2018. IEEE Trans. Ind. Informat., vol. 14, no. 11, pp. 4792–4803, Nov. 2018.
[79] J. A. F. Castellanos, D. Coll-Mayor, and J. A. Notholt, “Cryptocurrency [104] S. Mhanna, A. C. Chapman, and G. Verbic, “A fast distributed algorithm
as guarantees of origin: Simulating a green certificate market with the for large-scale demand response aggregation,” IEEE Trans. Smart Grid,
Ethereum blockchain,” in Proc. IEEE Int. Conf. Smart Energy Grid Eng., vol. 7, no. 4, pp. 2094–2107, Jul. 2016.
Aug. 2017, pp. 367–372. [105] K. Dehghanpour, C. Colson, and H. Nehrir, “A survey on smart agent-
[80] H. N. Vaibhav Saini, “An encyclopedia of 40+ smart contract plat- based microgrids for resilient/self-healing grids,” Energies, vol. 10, no. 5,
forms,” [Online]. Available: https://hackernoon.com/contractpedia-an- pp. 620–645, May 2017.
encyclopedia-of-40-smart-contract-platforms-4867f66da1e5, Accessed [106] A. Goranovic, M. Meisel, L. Fotiadis, S. Wilker, A. Treytl, and T. Sauter,
on: Jan. 19, 2019. “Blockchain applications in microgrids an overview of current projects
[81] Tenup Team, “Tenup white paper,” [Online]. Available on: and concepts,” in Proc. IEEE Ind. Electron. Soc., Oct. 2017, pp. 6153–
https://tenup.io/Content/TenUp-Whitepaper.pdf, Accessed on: Mar. 6158.
22, 2018. [107] M. Faschang, T. G. Deutsch, and G. Kienesberger, “Transition roadmap—
[82] P. Danzi, A. E. Kalr, Stefanovi, and P. Popovski, “Analysis of the From centralized to massively decentralized grid control systems,” Wis-
communication traffic for blockchain synchronization of IoT devices,” senschaftlicher Bericht fur die FFG Eigenverlag der Energy IT Group,
in Proc. IEEE Int. Conf. Commun., May 2018, pp. 1–7. pp. 75–154, 2015.
[83] S. Yu, K. Lv, Z. Shao, Y. Guo, J. Zou, and B. Zhang, “A high performance [108] A. Paudel, K. Chaudhari, C. Long, and H. B. Gooi, “Peer-to-peer energy
blockchain platform for intelligent devices,” in Proc. IEEE 1st Int. Conf. trading in a prosumer based community microgrid: A game-theoretic
Hot Inf.-Centric Netw., Aug. 2018, pp. 260–261. model,” IEEE Trans. Ind. Electron., vol. 66, no. 8, pp. 6087–6097,
[84] C. Plaza, J. Gil, F. D. Chezelles, and K. A. Strang, “Distributed solar self Aug. 2019.
consumption and blockchain solar energy exchanges on the public grid [109] E. Munsing, J. Mather, and S. Moura, “Blockchains for decentralized
within an energy community,” in Proc. IEEE EEEIC, Jun. 2018, pp. 1–4. optimization of energy resources in microgrid networks,” in Proc. IEEE
[85] G. Liang, S. R. Weller, J. Zhao, F. Luo, and Z. Y. Dong, “The 2015 Conf. Control Technol. Appl., Aug. 2017, pp. 2164–2171.
Ukraine blackout: Implications for false data injection attacks,” IEEE [110] A. Alam, M. T. Islam, and A. Ferdous, “Towards blockchain-based
Trans. Power Syst., vol. 32, no. 4, pp. 3317–3318, Jul. 2017. electricity trading system and cyber resilient microgrids,” in Proc. Int.
[86] R. M. Lee, M. J. Assante, and T. Conway, “Analysis of the cyber attack on Conf. Elect., Comput. Commun. Eng., Feb. 2019, pp. 1–5.
the Ukrainian power grid,” ICS E-ISAC, vol. 1, no. 1, pp. 1–29, Mar. 2016. [111] S. J. Pee, E. S. Kang, J. G. Song, and J. W. Jang, “Blockchain based
[87] G. Liang, J. Zhao, F. Luo, S. R. Weller, and Z. Y. Dong, “A review of smart energy trading platform using smart contract,” in Proc. 3rd Int.
false data injection attacks against modern power systems,” IEEE Trans. Conf. Comput. Commun. Syst., Feb. 2019, pp. 472–476.
Smart Grid, vol. 8, no. 4, pp. 1630–1638, Jul. 2017. [112] S. Wang, A. F. Taha, and J. Wang, “Blockchain assisted crowdsourced
[88] A. Rahman and H. Mohsenian-rad, “False data injection attacks against energy systems,” in Proc. IEEE Power Energy Soc. General Meeting,
nonlinear state estimation in smart power grids,” in Proc. IEEE Power Aug. 2018, pp. 167–172.
Energy Soc. General Meeting, Nov. 2013, pp. 1–5. [113] J. Kim, L. Tong, and R. J. Thomas, “Dynamic attacks on power systems
[89] J. Zhu and X. Wei, “Defending false data injection attacks against power economic dispatch,” in Proc. IEEE 48th Asilomar Conf. Signals, Syst.
system state estimation: A stealthiness corruption oriented method,” in Comput., Nov. 2014, pp. 345–349.
Proc. IEEE Int. Conf. Power Syst. Technol., Sep. 2016, pp. 1–5. [114] D. Canto and D. Enel, “Blockchain: Which use cases in the energy
[90] J. Hao, R. J. Piechocki, D. Kaleshi, W. H. Chin, and Z. Fan, “Sparse mali- industry,” in Proc. IET CIRED, Jun. 2017, pp. 1–7.
cious false data injection attacks and defense mechanisms in smart grids,” [115] K. Singh and S. C. Choube, “Using blockchain against cyber attacks on
IEEE Trans. Ind. Informat., vol. 11, no. 5, pp. 1198–1209, Oct. 2015. smart grids,” in Proc. IEEE Int. Students’ Conf. Elect., Electron. Comput.
[91] S. Tan, W. Song, S. Member, M. Stewart, J. Yang, and L. Tong, “Online Sci., Feb. 2018, pp. 1–4.
data integrity attacks against real-time electrical market in smart grid,” [116] H. Sedjelmaci and S. M. Senouci, “Smart grid security: A new approach
IEEE Trans. Smart Grid, vol. 9, no. 1, pp. 313–322, Jan. 2018. to detect intruders in a smart grid neighborhood area network,” in Proc.
[92] M. N. Kurtm, Y. Yilmaz, and X. Wang, “Secure distributed dynamic state IEEE Int. Conf. Wireless Netw. Mobile Commun., Oct. 2016, pp. 6–11.
estimation in wide-area smart grids,” CoRR, vol. 1, no. 1, pp. 1902–1918, [117] J. Gao et al., “Grid monitoring: Secured sovereign blockchain based
Jul. 2019. monitoring on smart grid,” IEEE Access, vol. 6, pp. 9917–9925, 2018.
[93] L. Yue, H. Junqin, Q. Shengzhi, and W. Ruijin, “Big data model of security [118] Z. A. Khan, N. Afaqui, and O. Humayun, “Detection and prevention of
sharing based on blockchain,” in Proc. IEEE 3rd Int. Conf. Big Data DDoS attacks on software defined networks controllers for smart grid,”
Comput. Commun., Aug. 2017, pp. 117–121. Int. J. Comput. Appl., vol. 181, no. 45, pp. 16–21, Mar. 2019.
[94] E. Bandara et al.“Mystiko blockchain meets big data,” in Proc. IEEE Int. [119] U. Javaid, A. K. Siang, M. N. Aman, and B. Sikdar, “Mitigating loT
Conf. Big Data, Dec. 2018, pp. 1896–1912. device based DDoS attacks using blockchain,” in Proc. 1st Workshop
[95] L.Yue, H.Junqin, Q.Shengzhi, and W.Ruijin, “Big data model of security Cryptocurrencies Blockchains for Distrib. Syst., Jun. 2018, pp. 71–76.
sharing based on blockchain,” in Proc. IEEE BDCC, Aug. 2017. [120] G. Liang, S. R. Weller, F. Luo, J. Zhao, and Z. Y. Dong, “Distributed
[96] F. Luo et al., “Cloud based information infrastructure for next generation blockchain based data protection framework for modern power systems
power grid: Conception, architecture, and applications,” IEEE Trans. against cyber attacks,” IEEE Trans. Smart Grid, vol. 3, no. 4, pp. 1–12,
Smart Grid, vol. 7, no. 4, pp. 1896–1912, Jul. 2016. Mar. 2018.

Authorized licensed use limited to: K K Wagh Inst of Engg Education and Research. Downloaded on January 29,2024 at 06:01:59 UTC from IEEE Xplore. Restrictions apply.
18 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 17, NO. 1, JANUARY 2021

[121] C. Burger, A. Kuhlmann, P. Richard, and J. Weinmann, “Blockchain in [144] H. Sukhwani, J. M. Martnez, X. Chang, K. S. Trivedi, and A. Rindos,
the energy transition: A survey among decision-makers in the German “Performance modeling of PBFT consensus process for permissioned
energy industry,” Deutsche Energie-Agentur GmbH (dena) - German blockchain network,” in Proc. IEEE 36th Symp. Reliable Distrib. Syst.,
Energy Agency, vol. 1, pp. 17–62, Nov. 2016. Sep. 2017, pp. 253–255.
[122] M. E. Elkhatib, R. E. Shatshat, and M. M. A. Salama, “Decentralized [145] M. Vukolic, “The quest for scalable blockchain fabric: Proof of work
reactive power control for advanced distribution automation systems,” vs BFT replication,” in Proc. Int. Workshop Open Probl. Netw. Secur.,
IEEE Trans. Smart Grid, vol. 3, no. 3, pp. 1482–1490, Sep. 2012. May 2015, pp. 112–125.
[123] W. Tang, S. Bi, and Y. J. A. Zhang, “Online coordinated charging decision [146] D. Miller, “Blockchain and the Internet of Things in the industrial sector,”
algorithm for electric vehicles without future information,” IEEE Trans. IT Professional, vol. 20, no. 3, pp. 15–18, May 2018.
Smart Grid, vol. 5, no. 6, pp. 2810–2824, Nov. 2014. [147] M. Dai, S. Zhang, H. Wang, and S. Jin, “A low storage room requirement
[124] L. DOriano et al., “Decentralized blockchain flexibility system for smart framework for distributed ledger in blockchain,” IEEE Access, vol. 6,
grids: Requirements engineering and use cases,” in Proc. Int. IEEE Conf. pp. 22970–22975, 2018.
Workshop Óbuda Elect. Power Eng., Nov. 2018, pp. 39–44. [148] J. Bergquist, A. Laszka, M. Sturm, and A. Dubey, “On the design of com-
[125] C. Liu, K. K. Chai, E. T. Lau, Y. Wang, and Y. Chen, “Optimised munication and transaction anonymity in blockchain based transactive
electric vehicles charging scheme with uncertain user-behaviours in smart microgrids,” in Proc. ACM 1st Workshop Scalable Resilient Infrastruc-
grids,” in Proc. IEEE 28th Annu. Int. Symp. Pers., Indoor, Mobile Radio tures Distrib. Ledgers, Dec. 2017, pp. 1–6.
Commun., Oct. 2017, pp. 1–5. [149] K. Gai, Y. Wu, L. Zhu, L. Xu, and Y. Zhang, “Permissioned blockchain
[126] B. A. Scriber, “A framework for determining blockchain applicability,” and edge computing empowered privacy preserving smart grid networks,”
IEEE Softw., vol. 35, no. 4, pp. 70–77, Jul. 2018. IEEE Internet Things J., vol. 6, no. 5, pp. 7992–8004, Oct. 2019.
[127] B. Yu, J. Wright, S. Nepal, L. Zhu, J. Liu, and R. Ranjan, “Trust [150] Z. Lu, W. Liu, Q. Wang, G. Qu, and Z. Liu, “A privacy-preserving
chain: Establishing trust in the IoT based applications ecosystem using trust model based on blockchain for VANETs,” IEEE Access, vol. 6,
blockchain,” IEEE Cloud Comput., vol. 5, no. 4, pp. 12–23, Aug. 2018. pp. 45655–45664, 2018.
[128] S. Kim and J. Kim, “Mining with proof of probability in blockchain,” in [151] K. Valtanen, J. Backman, and S. Yrjola, “Blockchain powered value
Proc. ACM ASIACCS, Jun. 2018, pp. 841–843. creation in the 5 G and smart grid use cases,” IEEE Access, vol. 7,
[129] H. Wang, Q. Wang, D. He, Q. Li, and Z. Liu, “BBARS: Blockchain based pp. 25690–25707, 2019.
anonymous rewarding scheme for V2G networks,” IEEE Internet Things [152] The Linux Foundation, “The hyperledger project: Aug. 12, 2015,” [On-
J., vol. 6, no. 2, pp. 3676–3687, Jan. 2019. line]. Available: https://www.hyperledger.org. Accessed on: Mar. 22,
[130] P. Danzi, S. Hambridge, Stefanovi, and P. Popovski, “Blockchain-based 2018.
and multi-layered electricity imbalance settlement architecture,” in Proc. [153] S. Biswas, K. Sharif, F. Li, S. Maharjan, S. P. Mohanty, and Y. Wang,
IEEE Int. Conf. Commun., Control, Comput. Technol. Smart Grids, “PoBT: A lightweight consensus algorithm for scalable IoT business
Oct. 2018, pp. 1–7. blockchain,” IEEE Internet Things J., vol. 7, no. 3, pp. 2343–2355,
[131] W. Liu, Q. Gong, H. Han, Z. Wang, and L. Wang, “Reliability modeling Mar. 2020.
and evaluation of active cyber physical distribution system,” IEEE Trans. [154] Y. Jiang, C. Wang, Y. Wang, and G. Lang, “A cross-chain solution
Power Syst., vol. 33, no. 6, pp. 7096–7108, Nov. 2018. to integrating multiple blockchains for IoT data management,” Sensor,
[132] Y. N. Aung and T. Tantidham, “Review of Ethereum: Smart home case vol. 19, no. 9, pp. 2042–2060, May 2019.
study,” in Proc. IEEE 2nd Int. Conf. Inf. Technol., Nov. 2017, pp. 1–4. [155] S. Johnson, P. Robinson, and J. Brainard, “Sidechains and inter-
[133] E. S. Kang, S. J. Pee, J. G. Song, and J. W. Jang, “A blockchain-based operability,” 2019. [Online]. Available: Available: https://arxiv.org/
energy trading platform for smart homes in a microgrid,” in Proc. IEEE pdf/1903.04077.pdf, Accessed on: Mar. 23, 2019.
3rd Int. Conf. Comput. Commun. Syst., Apr. 2018, pp. 472–476. [156] M. Saad et al., “Exploring the attack surface of blockchain: A systematic
[134] X. Luo, J. Wang, M. Dooner, and J. Clarke, “Overview of current overview,” CoRR, vol. 1, no. 1, pp. 1904–1938, Apr. 2019.
development in electrical energy storage technologies and the application [157] J. J. Hoch and A. Shamir, “On the strength of the concatenated hash
potential in power system operation,” Appl. Energy, vol. 137, no. C, combiner when all the hash functions are weak,” in Proc. Int. Colloq.
pp. 511–536, Jan. 2015. Automata, Lang, Program., Jan. 2008, pp 616–630.
[135] M. Pustiek, A. Kos, and U. Sedlar, “Blockchain based autonomous [158] M. Conti, E. S. Kumar, C. Lal, and S. Ruj, “A survey on security and
selection of electric vehicle charging station,” in Proc. IEEE Int. Conf. privacy issues of Bitcoin,” IEEE Commun. Surveys Tuts., vol. 20, no. 4,
Identification, Inf. Knowl. Internet Things, Oct. 2016, pp. 217–222. pp. 3416–3452, May 2018.
[136] S. Jeong, N. Dao, Y. Lee, C. Lee, and S. Cho, “Blockchain based billing [159] N. Atzei, M. Bartoletti, and T. Cimoli, “A survey of attacks on Ethereum
system for electric vehicle and charging station,” in Proc. IEEE 10th Int. smart contracts SoK,” in Proc. 6th Int. Conf. Principles Secur. Trust,
Conf. Ubiquitous Future Netw., Jul. 2018, pp. 308–310. Apr. 2017, pp. 164–186.
[137] N. H. Kim, S. M. Kang, and C. S. Hong, “Mobile charger billing system
using lightweight Blockchain,” in Proc. 19th Asia-Pacific Netw. Oper.
Manage. Symp., Sep. 2017, pp. 374–377.
[138] P. Fraga-Lamas and T. M. Fernndez-Carams, “A review on blockchain
technologies for an advanced and cyber-resilient automotive industry,”
IEEE Access, vol. 7, pp. 17578–17598, 2019.
[139] K. Xiang, B. Chen, H. Lin, Y. Shen, Y. Du, and T. Yan, “Auto-
matic demand response strategy of local pure electric vehicle with
battery energy storage system based on blockchain technology,” in Proc.
IEEE 2nd Conf. Energy Internet Energy Syst. Integration, Nov. 2018,
pp. 1–6. Peng Zhuang (Student Member, IEEE)
[140] F. Gao, L. Zhu, M. Shen, K. Sharif, Z. Wan, and K. Ren, “A blockchain- received the B.Sc. degree in electrical and
based privacy-preserving payment mechanism for vehicle-to-grid net- computer engineering from the University of
works,” IEEE Netw., vol. 32, no. 6, pp. 184–192, Nov. 2018. Alberta, Edmonton, AB, Canada, in 2015 where
[141] J. Hinckeldeyn and K. Jochen, “Developing a smart storage container he is currently working toward the Ph.D. degree
for a blockchain based supply chain application,” in Proc. IEEE Crypto in electrical and computer engineering with
Valley Conf. Blockchain Technol., Nov. 2018, pp. 97–100. the Department of Electrical and Computer
[142] Y. Xu, “Section-Blockchain: A storage reduced blockchain protocol, the Engineering.
foundation of an autotrophic decentralized storage architecture,” in Proc. His current research interests include
IEEE 23rd Int. Conf. Eng. Complex Comput. Syst., Dec. 2018, pp. 115– stochastic modeling and optimization in smart
125. grid, cyberphysical security of smart grid,
[143] M. Saad, M. T. Thai, and A. Mohaisen, “Deterring DDoS attacks microgrid planning, operation, control, and self-healing, distribution
on blockchain based cryptocurrencies through mempool optimiza- system operation with distributed generation and energy storage
tion,” in Proc. ACM Asia Conf. Comput. Commun. Secur., Jun. 2018, devices, computational intelligence and optimization, and big data
pp. 809–811. analytics.

Authorized licensed use limited to: K K Wagh Inst of Engg Education and Research. Downloaded on January 29,2024 at 06:01:59 UTC from IEEE Xplore. Restrictions apply.
ZHUANG et al.: BLOCKCHAIN FOR CYBERSECURITY IN SMART GRID: A COMPREHENSIVE SURVEY 19

Talha Zamir received the B.Sc. degree in elec- Hao Liang (Member, IEEE) received the Ph.D.
trical and computer engineer from the University degree in electrical and computer engineering
of Management and Technology, Lahore, Pak- from the Department of Electrical and Computer
istan, in 2013 and the master’s of Engineering Engineering, University of Waterloo, Waterloo,
degree from the University of Alberta, Edmon- ON, Canada, in 2013.
ton, AB, Canada, in 2019. He is an Assistant Professor and Canada
During the master’s, he started working as Research Chair with the Department of Elec-
a Researcher in the field of smart grids and trical and Computer Engineering, University of
came up with new ideas related to integration Alberta, Edmonton, AB, Canada. From 2013 to
of blockchain in grid communication space to 2014, he was a Postdoctoral Research Fellow
achieve robust cybersecurity. He specializes in with the Broadband Communications Research
the field of power system protection, coordination, instrumentation, and (BBCR) Lab and Electricity Market Simulation and Optimization Lab
renewable energy systems. He is currently with Dynawest Engineering (EMSOL), the University of Waterloo. His current research interests
Ltd., Edmonton, AB, Canada, as an Electrical EIT. His research interests include the areas of smart grid, cyberphysical systems, wireless com-
include smart grid, cybersecurity, power system protection, and power munications, and wireless networking.
quality. Dr. Liang is a corecipient of the IEEE Power & Energy Society (PES)
Prize Paper Award 2018, the Best Conference Papers on Electric Ve-
hicles, Energy Storage, Microgrids, and Demand Response from the
2016 IEEE Power & Energy Society General Meeting (PES GM’16),
Boston, MA, USA, and the Best Student Paper Award from the IEEE
72nd Vehicular Technology Conference (VTC Fall-2010), Ottawa, ON,
Canada. He serves/served as an Editor for IET Communications, a
Guest Editor for the IEEE TRANSACTIONS ON EMERGING TOPICS IN COM-
PUTING, and the Chair of Electric Vehicles, Vehicular Electronics, and
Intelligent Transportation Track for IEEE VTC Fall-2020. He was the
System Administrator of the IEEE TRANSACTIONS ON VEHICULAR TECH-
NOLOGY (2009–2013).

Authorized licensed use limited to: K K Wagh Inst of Engg Education and Research. Downloaded on January 29,2024 at 06:01:59 UTC from IEEE Xplore. Restrictions apply.

You might also like