Figure 4 - uploaded by Aron Laszka
Content may be subject to copyright.
Visualization of untraceability in ring signatures in smart meter-based energy trading and the potential deductions of origin of the transaction by a single household in the chain of signatures. 

Visualization of untraceability in ring signatures in smart meter-based energy trading and the potential deductions of origin of the transaction by a single household in the chain of signatures. 

Source publication
Conference Paper
Full-text available
Transactive microgrids are emerging as a transformative solution for the problems faced by distribution system operators due to an increase in the use of distributed energy resources and a rapid acceleration in renewable energy generation, such as wind and solar power. Distributed ledgers have recently found widespread interest in this domain due t...

Context in source publication

Context 1
... sender should gen- erate ephemeral keys for each transfer, enabling only the receiver to recover the corresponding private key. As an example, in Figure 4, a diagram shows households A, B and C signing a transaction since they are part of the same ring. A group would, in reality, be many more households, not necessarily of the same microgrid. ...

Similar publications

Preprint
Full-text available
Transactive microgrids have emerged as a transformative solution for the problems faced by distribution system operators due to an increase in the use of distributed energy resources and rapid growth in renewable energy generation. Transactive microgrids are tightly coupled cyber and physical systems, which require resilient and robust financial ma...

Citations

... A comparison of related schemes by relevant features can be found in Table 1. [13] S y n n n y n n n y y n y n y y Li et al. [14] S y y y n y n y n n n n y n n y Li et al. [15] S y n y y y n y n y n n y n n n Eisele et al. [10] P y n y n n n n y n y y n n y y Baza et al. [16] S y n y n y y n y y y n y y n y Baza et al. [17] S y n y n y y n y y y y y n n n Bergquist et al. [18] S y n y n y n n y y y y n y n n Laszka et al. [19] S y n y n y n n y n y n n y n y Khorasany et al. [20] P y n y n y y n y y y y n n n y Mollah et al. [21] R y y -n -y y y y y y n -n -Ziu et al. [22] P n y n n n n y y n y y n n n y Kang et al. [23] P n n n n n n n y n y y n n n y Honari et al. [24] R n y -n -y y n n y y y -y -ILPTS S y y y y y y n y y y y n y y n ...
... ILPTS could be used to improve TRANSAX's transparency and equity while retaining its grid safety offerings and other benefits. This sort of proposal is found in the literature; Baza et al. [16] introduce a privacy-preserving vehicle-to-vehicle trading scheme that extends their previous work, a privacy-preserving charging station-to-vehicle trading scheme [17], and Bergquist et al. [18] propose a solution meant to extend the existing PETra protocol proposed by Laszka et al. [19] with additional communication security measures and transactional anonymity. Schemes may also work synergistically in a larger platform. ...
Article
Full-text available
The transactive energy market (TEM) is a recent development in energy management that enables prosumers to trade directly, promising many environmental and economic benefits. Prosumer trading necessitates sharing information to facilitate transactions. Additionally, many TEMs propose using blockchains to manage auctions and store transactions. These facts introduce privacy concerns: consumption data, trading history, and other identifying information pose risks to users if leaked. Anonymity by trading under a pseudonym is commonly presented as a solution; however, this creates risks for market participants: scammed users will not have recourse, and users with innocent malfunctions may be banned from trading. We propose the Individually Linkable Pseudonymous Trading Scheme (ILPTS), which enables users to trade under a pseudonym, protecting their identity, while a smart contract monitors reputations and can temporarily deanonymize a user, ensuring market integrity. ILPTS was developed in stages. Examination of existing TEM literature was performed to identify desirable features. Analysis of cryptography literature was performed to identify techniques that may confer certain features. It was found through formal analysis that ILPTS adheres to identified design goals, improves upon existing solutions, and resists common attacks against TEMs. Future work includes software simulation and on-device implementation to further verify security and feasibility.
... Existing challenges and shortcomings in the blockchain framework, i.e., Privacy and anonymity, are the main motivations behind this research work. Most studies focus on either privacy [27,28] or anonymity [29,30]. ...
... In [29], the authors propose a design of communication and transaction anonymity in blockchainbased transactive microgrids. They proposed Privacy-preserving Energy Transactions (PETra) solution that preserves prosumers' (Producers and consumers) privacy. ...
... Anonymity means that the original sender remains innominate. Privacy, on the other hand, refers to the transaction mostly and the content of the message which brings upon the challenge of adversaries making the system hacked [29]. ...
Article
Full-text available
With the increase in IoT (Internet of Things) devices comes an inherent challenge of security. In the world today, privacy is the prime concern of every individual. Preserving one’s privacy and keeping anonymity throughout the system is a desired functionality that does not come without inevitable trade-offs like scalability and increased complexity and is always exceedingly difficult to manage. The challenge is keeping confidentiality and continuing to make the person innominate throughout the system. To address this, we present our proposed architecture where we manage IoT devices using blockchain technology. Our proposed architecture works on and off blockchain integrated with the closed-circuit television (CCTV) security camera fixed at the rental property. In this framework, the CCTV security camera feed is redirected towards the owner and renter based on the smart contract conditions. One entity (owner or renter) can see the CCTV security camera feed at one time. There is no third-party dependence except for the CCTV security camera deployment phase. Our contributions include the proposition of framework architecture, a novel smart contract algorithm, and the modification to the ring signatures leveraging an existing cryptographic technique. Analyses are made based on different systems’ security and key management areas. In an empirical study, our proposed algorithm performed better in key generation, proof generation, and verification times. By comparing similar existing schemes, we have shown the proposed architectures’ advantages. Until now, we have developed this system for a specific area in the real world. However, this system is scalable and applicable to other areas like healthcare monitoring systems, which is part of our future work.
... • Privacy Preserving and Security (reviewed papers: [297][298][299][300][301][302][303][304][305][306][307][308][309][310][311][312] • General Reviews (reviewed papers: ): Containing scientific articles and publications that provide a general overview of blockchain and DLT with an emphasis on energy use cases. ...
Thesis
Describing the originality of the PhD work: *Main contribution and achievement of the thesis: The primary contribution of this thesis is the design of a novel NoSQL distributed database replication architecture. In this PhD thesis, I designed and proposed a novel fault-tolerant, self-configurable, scalable, secure, decentralized, and high-performance distributed database replication architecture, named “Parallel Committees”. I utilized an innovative sharding technique to enable the use of BFT consensus mechanisms in very large-scale networks. With this innovative full sharding approach supporting both processing sharding and storage sharding, as more processors and replicas join the network, the system computing power and storage capacity increase unlimitedly, while a classic BFT consensus is utilized. My approach also allows an unlimited number of clients to join the system simultaneously without reducing system performance and transactional throughput. I introduced several innovative techniques: for distributing nodes between shards, processing transactions across shards, improving security and scalability of the system, proactively circulating committee members, and forming new committees automatically. I introduced a novel approach of distributing nodes between shards, using a public key generation process, called “KeyChallenge”, that simultaneously mitigates Sybil attacks and serves as a proof-of-work mechanism. The “KeyChallenge” idea is published in the peer-reviewed conference proceedings of ACM ICCTA 2024, Vienna, Austria. In this regard, I proved that it is not straightforward for an attacker to generate a public key so that all characters of the key match the ranges set by the system. I detailed how to automatically form new committees based on the rate of candidate processor nodes. The purpose of this technique is to optimally use all network capacity, so that inactive surplus processors in the queue of a committee that were not active are employed in the new committee and play an effective role in increasing the throughput and the efficiency of the system. This technique leads to maximum utilization of processor nodes and the capacity of computation and storage of the network to increase both processing sharding and storage sharding as much as possible. In the proposed architecture, members of each committee are proactively and alternately replaced with backup processors. In the “Parallel Committees” architecture, committee capacity refers to the maximum number of members (processors) allowed in each committee at any given time. The predetermined number of ‘seats’ for each committee is set during system configuration, with the flexibility to dynamically adjust parameters as needed. This adaptability accommodates changing requirements, considering factors such as variations in transaction rates per time unit and overall system throughput. Each seat is occupied by a processor node, so that once a committee capacity is completed, none of the backup processor nodes in the committee queue can join the committee until a seat gets vacated. As soon as a seat in a committee gets vacated due to exhausting the TTL (Time-To-Live) of a processor, one of the backup nodes waiting in the committee queue occupies the free seat. I defined Omega (Ω), as the expected delay for completing a consensus round, initialized based on the average delay in specific consensus mechanisms like PBFT, Paxos, Raft, etc. If a consensus round exceeds the Omega period of time, indicating a potential fault tolerance breach, the “force majeure TTL reduction” reduces the highest-identifier processor’s TTL by one unit. This triggers automatic removal of faulty nodes from the committee, replaced by backup nodes. This technique of proactively circulating committee members has three main results: • Preventing a committee from being occupied by a group of processor nodes for a long time period, in particular, Byzantine and faulty processors, • Preventing committees from growing too much, which could lead to scalability issues and latency in processing the clients’ requests, • Due to the proactive circulation of committee members, over a given timeframe, there exists a probability that several faulty nodes are excluded from the committee and placed in the committee queue. Consequently, during this time-frame, the faulty nodes in the committee queue do not impact the consensus process. This procedure can improve and enhance the fault tolerance threshold of the consensus mechanism. I also elucidated strategies to thwart the malicious action of “Key-Withholding”, where previously generated public keys are prevented from future shard access. The approach involves periodically altering the acceptable ranges for each character of the public key. The proposed architecture effectively reduces the number of undesirable cross-shard transactions that are more complex and costly to process than intra-shard transactions. The thesis addresses the challenges faced by distributed systems and databases, particularly focusing on scalability and security. While classic consensus mechanisms such as Paxos, Raft, or PBFT provide strong and strict consistency in distributed databases, their low scalability limits their common usage. Instead, methods such as eventual consistency are employed, which, while not providing strong consistency, offer much higher performance compared to classic consensus mechanisms. The primary reason for the low scalability of classic consensus mechanisms lies in their high time complexity and message complexity. In terms of the consistency model, the “Parallel Committees” architecture leverages classic fault-tolerant consensus mechanisms, ensuring strong consistency even in large-scale networks. Additionally, I provided an explanation for the decision not to employ a blockchain structure in the proposed architecture. To perform the necessary tests of the “Parallel Committees” architecture, in addition to the presented theoretical analysis, we implemented the protocol as a simulator software. Through the use of this simulator, we illustrated that in a distributed database employing the PBFT consensus mechanism to process client requests, the proposed architecture significantly enhances the number of processed requests per second as the network scales in terms of the number of nodes. In contrast, without the proposed architecture, the transactional throughput of the same PBFT algorithm experiences a substantial decrease with an increasing number of nodes. I conducted a comparison between the proposed architecture and various distributed databases and data replication systems, including Apache Cassandra, Amazon DynamoDB, Google Bigtable, Google Spanner, and ScyllaDB, to enhance clarity and comprehension. These distinctions are detailed in Section 4.7 of the dissertation. Another key distinguishing feature of the proposed architecture is its support for pluggable consensus mechanisms, allowing for effective customization to suit specific use cases. This architecture provides a modular and replaceable classic consensus mechanism, enabling users to tailor the consensus protocol to their needs. The proposed idea has been published in the Cluster Computing journal (Springer). Overall, the proposed architecture opens the door to a new world for further research in this field and is a significant step forward to improve the distributed databases and data replication systems. *Other contributions of the thesis: • A detailed introduction to the architectural philosophy of Bitcoin and permissionless networks was provided. • The challenges that data replication systems must address were thoroughly examined. • The challenges of sharded data replication systems were also discussed in-depth. • An in-depth bibliographic study on issues in current blockchain-based solutions, particularly for the energy market, was conducted. • The conditions under which a blockchain-based solution can be effective were detailed. *Implementation and experimental results: Through simulation, the proposed architecture significantly improves transactional throughput compared to existing solutions. We developed a Java simulator to demonstrate how the architecture enhances the efficiency of consensus mechanisms like PBFT, maximizing the network's computing and storage capacity and improving fault tolerance in each shard. To validate the practical efficiency of the proposed architecture, we conducted necessary tests using this simulator. *Potential applications and use cases: The “Parallel Committees” distributed database architecture, known for its scalability, fault tolerance, and innovative sharding techniques, is suitable for a variety of applications: • Financial Services: Ensures reliability, security, and efficiency in managing financial transactions and data integrity. • E-commerce Platforms: Facilitates seamless transaction processing, inventory, and customer data management. • IoT (Internet of Things): Efficiently handles large-scale, dynamic IoT data streams, ensuring reliability and security. • Real-time Analytics: Meets the demands of real-time data processing and analysis, aiding in actionable insights. • Healthcare Systems: Enhances reliability, security, and efficiency in managing healthcare data and transactions. • Gaming Industry: Supports effective handling of player engagements, transactions, and data within online gaming platforms. • Social Media Platforms: Manages user-generated content, interactions, and real-time updates efficiently. • Supply Chain Management (SCM): Addresses the challenges of complex and dynamic supply chain networks efficiently.
... Effectively reduce the difficulty of maintenance and management of a large amount of power dispatching data. In addition to that, Blockchain technology are also widely used in Power flow [47]- [49], Emission Reduction [50]- [52], Energy Markets [53]- [75], Batteries [76], [77], Demand Response [78]- [84], Electric Vehicles [85]- [94], Security and Privacy [95]- [106], and Other [107]- [114]. ...
Preprint
Blockchain, as the basis for cryptocurrencies, has received extensive attentions recently. Blockchain serves as an immutable distributed ledger technology which allows transactions to be carried out credibly in a decentralized environment. Blockchain-based applications are springing up, covering numerous fields including financial services, reputation system and Internet of Things (IoT), and so on. However, there are still many challenges of blockchain technology such as scalability, security and other issues waiting to be overcome. This article provides a comprehensive overview of blockchain technology and its applications. We begin with a summary of the development of blockchain, and then give an overview of the blockchain architecture and a systematic review of the research and application of blockchain technology in different fields from the perspective of academic research and industry technology. Furthermore, technical challenges and recent developments are also briefly listed. We also looked at the possible future trends of blockchain.
... (iii) Since the interaction of users with the blockchain network is established via a generated address, no identities exposure occurs within the network. Also, there is no specific party for holding users' identity which leads to the establishment of a high level of privacy within the network [34]. ...
Article
Full-text available
Technology is mainly characterized by being changed rapidly. In other words, it is recognized as the ever-changing playing field. Those who aim to stay in the technology field need to quickly get adapted to such constant changes in this field. Due to the high pace of information technology advances, it is required to identify and implement appropriate technologies by which the organizations can effectively stay and compete in the business through the accurate and real-time efficiency delivered by such technologies as cloud computing, internet of things (IoT), artificial intelligence, blockchain, big data analytics, virtual and augmented reality, 5g network, and, etc. These trends are critically important because turning and adapting to the latest trends in information technology and systems are largely contributing to meeting the consumers' technology-enabled demands. In this paper, the most widely used trends in information systems and technology will be discussed.
... J. Potts and E. Rennie introduced blockchain technology and outlined its significance in cultural and creative industries applications [18]. J. Bergquist et al. developed a transaction workflow called PETra for problems arising in the operation of electrical distribution systems [19]. Yinqiu Liu planned the appliance of blockchain technology in enterprise offer chain management and therefore the answer of common issues. ...
Article
Full-text available
As the digital economy promotes economic growth, the Internet of Things can solve the problem of productivity, and the blockchain can solve the problem of production relations, which realizes the industrial transformation of blockchain smart contract technology and becomes a new driving force for the industry. It is becoming more and more difficult for companies to control their own raw material supply, production, and sales by relying only on their own strength, and this is the key to influencing a company to become bigger and stronger. This problem will be efficiently solved by the implementation of “Internet of Things + Blockchain” technology. As a result, research into a new sort of smart supply chain management based on “Internet of Things + Blockchain” is required. From the perspective of building a smart supply chain, this paper makes full use of literature data methods, theoretical analysis methods, case analysis methods, logic analysis methods, and other methods. To study the effectiveness of IoT and blockchain technology through case study of changes in the order quantity in the procurement link of the supply chain. By understanding the current status of related research at home and abroad, as well as the Internet of Things technology and blockchain technology, this paper analyzes China. The main problems existing in the supply chain management of enterprises are the combination of the Internet of Things technology and the blockchain with the enterprise supply chain to create a smart supply chain platform, and the feasibility and functional efficiency of the smart supply chain platform. The related check was found, its deficiencies were found, and remedial measures were taken. The research results show that this intelligent supply chain management platform based on the Internet of Things (IoT) and blockchain can make the operation of the entire supply chain clearly visible. Information and data sharing can be achieved among the various departments of the supply chain to achieve scientific management and precision of the enterprise prediction. And this model can also be used in other industries to achieve industrial upgrading.
... The framework enables secure and verifiable trading of energy futures, preserves prosumers' privacy, and allows distribution system operators to regulate trading and enforce security rules. The proposed framework was later extended by [90] to illustrate communication and transaction anonymity. The authors in [91] presented a scheme for efficient data aggregation and privacy protection based on blockchain. ...
Article
Full-text available
Power generation, distribution, transmission, and consumption face ongoing challenges such as smart grid management, control, and operation, resulting from high energy demand, the diversity of energy sources, and environmental or regulatory issues. This paper provides a comprehensive overview of blockchain-based solutions for smart grid management, control, and operations. We systematically summarize existing work on the use and implementation of blockchain technology in various smart grid domains. The paper compares related reviews and highlights the challenges in the management, control, and operation for a blockchain-based smart grid as well as future research directions in the five categories: collaboration among stakeholders; data analysis and data management; control of grid imbalances; decentralization of grid management and operations; and security and privacy. All these aspects have not been covered in previous reviews.
... It can be proven that a bid or an ask has been responded to and that a transaction has taken place. 70 The routing scheme introduced in Reference 72 is a chessboard-clustering scheme for heterogeneous sensor networks. The routing consists of intra-cluster routing, between sensors and the cluster head, and inter-cluster routing, between cluster head sensors. ...
Preprint
Full-text available
Blockchain‐based applications provide many promising opportunities to overcome the challenges associated with the Internet of Things (IoT) ecosystems (eg, centralized architecture, data integrity, and reliability). In particular, blockchain technology offers many desirable features for IoT infrastructures, such as decentralization, trustworthiness, trackability, and immutability. However, while logging all transactions in a distributed blockchain ledger provides transparency, it also makes it possible to compromise user's privacy, thus posing a grand challenge to IoT architects and implementers. Over the past years, a set of solutions have been proposed for various scenarios, to address these privacy issues. In this paper, we survey these solutions, classify, and analyze their advantages and disadvantages. We also introduce an evaluation framework to evaluate the quality of the privacy‐preserving based on an adjustable weighting scheme. Finally, we rate the analyzed solutions based on their privacy ranks, and hope our evaluation can shed light on the future design of privacy‐preserving solutions applicable for blockchain‐based IoT platforms.
... A gateway either forwards messages between the prosumers and the distributed energy market or acts as miner, whuch execute the blockchain consensus protocol. To protect the prosumers' privacy, the communication between prosumers and gateways may be encrypted and anonymized, as described in [27]. Gateways can be operated by the company that implements the TES or by a third party. ...
Conference Paper
Full-text available
Power grids are undergoing major changes due to the rapid adoption of intermittent renewable energy resources and the increased availability of energy storage devices. These trends drive smart-grid operators to envision a future where peer-to-peer energy trading occurs within microgrids, leading to the development of Transactive Energy Systems. Blockchains have garnered significant interest from both academia and industry for their potential application in decentralized TES, in large part due to their high level of resilience. In this paper, we introduce a novel class of attacks against blockchain based TES, which target the gateways that connect market participants to the system. We introduce a general model of blockchain based TES and study multiple threat models and attack strategies. We also demonstrate the impact of these attacks using a testbed based on GridLAB-D and a private Ethereum network. Finally, we study how to mitigate these attack.
... There are a number of ways to achieve anonymity, such as using multi-signatures for transactional privacy [11], and authors having multiple pseudonyms [12] so they can send their data without linking attacks. In [13], the authors suggest that garlic routing and ring signatures are potential solutions for maintaining anonymity and avoiding linking attacks. ...