Professional Documents
Culture Documents
Exploration of Block Chain Technology in Electric Power Transaction
Exploration of Block Chain Technology in Electric Power Transaction
Exploration of Block Chain Technology in Electric Power Transaction
Power transaction block chain system does not In order to illustrate the relationship between the
rely on third party intermediaries or trust institutions. attackerundefineds success rate and the block gap Z,
All the participating nodes in the system are equal the attack node gets the relationship between the
and all nodes make decisions together to verify the probability of the next block billing right of the
legitimacy of the transaction. Even if some nodes in attacker, and the experimental results of the
the system are attacked and destroyed, the whole simulation using the Matlab are shown in Figure 1. It
block chain system will not be damaged. At the same can be seen that the attackerundefineds tampering
time, block chain guarantees the traceability and
success rate decreases exponentially with the
irrevocability of information through encryption
increase of the block gap Z, and can be found in the
mechanism, digital signature and other techniques.
block gap phase. At the same time, the success rate
of block forgery increases sharply with the increase
Even so, the block chain still faces many security
threats. Taking the PoW mechanism adopted by of the attackerundefineds forgery ability (computing
Bitcoin as an example, the attack model is used to power). When the attacker grasps the power of more
analyze the potential risk of attack in the block chain. than 50% of the whole network, it can realize double
The evolution between the honest chain and the payment by recalculation of the confirmed block or
attack chain can be described by a binary tree control new area block, and prevent the confirmation
random walk process. The probability of attackers and prevent other nodes from producing new block.
successfully eliminating the gap between z blocks is
similar to that of gamblers. The probability of this
attacker successfully catching up with the chain of
honesty is calculated as follows:
1, p d q
° 2
qz ®§ q ·
°¨ p ¸ , p ! q
¯© ¹ ˄1-1˅ Fig. 1. success rate of tampering
Authorized licensed use limited to: INTERNATIONAL ISLAMIC UNIVERSITY. Downloaded on July 29,2020 at 09:40:15 UTC from IEEE Xplore. Restrictions apply.
the attacker using the user equipment off line after to maintain safe passage.
obtaining the user undefineds
equipment.Dictionaries attack, so block chains are In order to illustrate the computational overhead
faced with the risk of stealing private keys. In of the above mechanism, the class function provided
general, there is still a lack of trusted environment by Miracle library is used to simulate based on C
for private key authentication, and the distributed environment. Table 1 shows the request time for a
storage structure of block chains is not conducive to different (tn) combination of digital signatures.
the reissue management of private keys. As shown in
Figure 2 private key sharing and reconfiguration TABLE I
diagrams,
ȋȌ
End
start Request time t 3 t n 1 2
Authorized licensed use limited to: INTERNATIONAL ISLAMIC UNIVERSITY. Downloaded on July 29,2020 at 09:40:15 UTC from IEEE Xplore. Restrictions apply.
does not meet regulatory requirements, especially block block block block block
since sensitive data need to balance privacy
protection with compliance. On the one hand, it is
New protocol
necessary to protect the privacy of all the block
60%computational powe
participants in the energy Internet in the block chain,
on the other hand, to prevent the illegal participants (a) hard branches
from using them to carry out illegal transactions.
block block block block block
In order to strengthen the privacy protection of the
participants, the following countermeasures can be
adopted: first, the certification agency acts as the Old protocol
block
40%computational powe
agent to deal with the participants, thus avoiding the
privacy of the participants and the leakage of
˄b˅ soft bifurcation
important information. The other is to limit the
broadcast range of transaction data and limit the Fig3 diagram
transmission of transaction data between some key
nodes. The third is to set up the corresponding access Therefore, on the one hand, we should combine
control mechanism to control the reading and writing consensus mechanism with practical supervision,
of data information. Fourth, the use of ring signature, such as joint control by means of asset mortgage,
homomorphic encryption, zero knowledge proof and legal supervision and so on, so as to strictly check
other technologies to avoid privacy exposure. the access of all participants in the energy Internet.
On the other hand, when updating the consensus
3˅A protocol attack. No matter what kind of mechanism of block chain, hard bifurcation should
consensus mechanism is used in block chain, it is be avoided and soft bifurcation should be used as far
faced with the problem of protocol attack to some as possible.
extent. Energy industry has a strong monopoly, some
interest groups may have more than some consensus III. CONCLUSION
mechanism fault-tolerant ability, so that the power
transaction block chain is facing a severe security The research of block chain technology in energy
threat. In addition, when the protocol of the block Internet is in the ascendant. Combining the
chain needs to be updated, some nodes can not get transaction link of energy Internet with block chain
the new version or can not get the new version in
technology can effectively solve the transaction
time, which leads to the inconsistent version of the
friction, maintain the order of the market and
protocol running by different nodes, which leads to
the problem of hard bifurcation and soft bifurcation. guarantee the legitimacy of the transaction.
Hard bifurcation means that the node running the
new protocol is determined to be a valid block,
which will be ruled invalid by the node running the ACKNOWLEDGMENT
old protocol, resulting in a permanent split; the soft
bifurcation means that the existing verification rules This work was supported by the technical project
of the instruction are more stringent. The old node of state grid corporation of ChinaĀResearch on the
that has not updated the protocol version produces Framework and key supporting Technology of
some invalid blocks or transactions, and the node Electric Power transaction Cloud platformā.
running the new version of the protocol can also
verify the passed block by the old node to accept, so REFERENCES
that the old node to actively update the protocol, In
this case, at most, some temporary small forks are [1] Gong Gangjun,Wang Huijuan and so on. Research on spot
produced. electricity Market based on Block chain [J]. Proceedings of
the CSEE,2018,38˄04˅˖1026~1034.
[2]ZhangNing,WangYi and so on. Research Framework of Block
Figure 3 shows a comparison between the hard chain Technology in Energy Internet: a preliminary study
bifurcation and the soft bifurcation when the on typical applications [J]. Proceedings of the
protocol version is updated by the node with 60% CSEE,2016,36˄15˅˖4011~4022.
computational power ratio based on the PoW
mechanism. [3] TaiXue,SunHongbing,GuoQing. Power transaction and
congestion Management based on Block chain in Energy
Internet [J]. Power System Technology,2016,40˄12˅˖
3630~3638.
Authorized licensed use limited to: INTERNATIONAL ISLAMIC UNIVERSITY. Downloaded on July 29,2020 at 09:40:15 UTC from IEEE Xplore. Restrictions apply.
Author’s brief introduction and contact information:
Name: XiPeiyu
Setting: Beijing Kedong Electric Power Control System Co.,
Ltd
Tel: 010-58687743
Email: xlc_2011@126.com
Address: No. 8, Shangdi West Road, Beijing
Authorized licensed use limited to: INTERNATIONAL ISLAMIC UNIVERSITY. Downloaded on July 29,2020 at 09:40:15 UTC from IEEE Xplore. Restrictions apply.