logo

Ethereum Blockchain-Based Prototype for Data Security

PDF Publication Title:

Ethereum Blockchain-Based Prototype for Data Security ( ethereum-blockchain-based-prototype-data-security )

Previous Page View | Next Page View | Return to Search List

Text from PDF Page: 006

Inventions 2020, 5, 58 6 of 14 NZEM are publicly available just like other regulated market pricing and revenues. Re-tail companies in NZEM sell electricity to end-users. A list of energy retailers can be found in [20]. Retailers buy electricity at wholesale prices (contract and spot). The pricing and revenues for line companies in NZEM regulated market are fixed by the Commerce Commission. Residential users, industry buyers, and business clients all buy electricity from retail providers. As discussed in Section 2, in a regulated market like NZEM where the entrance, policies, and pricing are state controlled, the data security threats are mostly in generation and transmission zones. On the contrary, for a deregulated market where distribution companies have no limit of revenue, the data security threat are mostly on the distribution retailer consumer zone. NZEM is a regulated market run by government bodies that keeps a check on the generation of revenues of suppliers. In such a regulated market, the entrance and price charges are entirely controlled by the government. Hence, for a model like NZEM, there are less data security threats to the information exchanged and shared between the suppliers. In recent years, like multiple other countries, New Zealand also upgraded its power system by incorporating different digital devices into the grid, turning it into a smart grid. The purpose of the smart grid deployment is to enhance the operational efficiency of the entire power system, including generation, transmission, distribution, and retail. In the smart grid, the different components of the power system can communicate with each other, and this makes the grid more “intelligent” in its overall operation. However, smart grids are more vulnerable to potential cyberattacks. The use of Supervisory Control and Data Acquisition (SCADA) system to manage smart grids makes it further vulnerable to cybersecurity threats. This is basically due to the integration of intelligent electronic devices, data concentrators, and other communication equipment. In general, cyber threats in a regulated grid infrastructure can be classified into four categories [21]: (i) Key-based attacks, (ii) Data-based attacks, (iii) Impersonation-based attacks, and (iv) Physical-based attacks. Each of these cyberattacks focuses on exploiting the features or protocols of specific entities in the grid to take control of the system. The traditional blockchain-based transaction model for the deregulated market (explained in Figure 1) is not applicable to NZEM; rather a blockchain solution has more prospects if implemented for SCADA security as discussed in Section 4. 4. An Ethereum Blockchain Based End-to-End Security Prototype In this section, an Ethereum blockchain prototype is presented to provide end-to-end security for the SCADA based regulated energy market. Hence, this section discusses the basic elements of a SCADA system and provides details about blockchain construction. 4.1. Overview of SCADA System SCADA is a system of software and hardware elements used to monitor and control the NZEM. SCADA consists of different modules for monitoring, gathering, and analyzing real time system data. Functional modules of SCADA include hardware for process monitoring and process control, data acquisition module, user interface, communication modules, and software platform. The process control system of SCADA basically consists of remote terminal units (RTU’s) and programmable logic controllers (PLC) that connect a series of sensors for real time monitoring and data collection. Remote terminal unit or RTUs is a microprocessor controlled electronic device, which interfaces physical objects (such as circuit breakers) in the power grid to a SCADA system. Figure 2a illustrates the functional architecture of a SCADA system. In a high-level architecture, the functional components of SCADA can be described as below:

PDF Image | Ethereum Blockchain-Based Prototype for Data Security

ethereum-blockchain-based-prototype-data-security-006

PDF Search Title:

Ethereum Blockchain-Based Prototype for Data Security

Original File Name Searched:

inventions-05-00058.pdf

DIY PDF Search: Google It | Yahoo | Bing

NFT (Non Fungible Token): Buy our tech, design, development or system NFT and become part of our tech NFT network... More Info

IT XR Project Redstone NFT Available for Sale: NFT for high tech turbine design with one part 3D printed counter-rotating energy turbine. Be part of the future with this NFT. Can be bought and sold but only one design NFT exists. Royalties go to the developer (Infinity) to keep enhancing design and applications... More Info

Infinity Turbine IT XR Project Redstone Design: NFT for sale... NFT for high tech turbine design with one part 3D printed counter-rotating energy turbine. Includes all rights to this turbine design, including license for Fluid Handling Block I and II for the turbine assembly and housing. The NFT includes the blueprints (cad/cam), revenue streams, and all future development of the IT XR Project Redstone... More Info

Infinity Turbine ROT Radial Outflow Turbine 24 Design and Worldwide Rights: NFT for sale... NFT for the ROT 24 energy turbine. Be part of the future with this NFT. This design can be bought and sold but only one design NFT exists. You may manufacture the unit, or get the revenues from its sale from Infinity Turbine. Royalties go to the developer (Infinity) to keep enhancing design and applications... More Info

Infinity Supercritical CO2 10 Liter Extractor Design and Worldwide Rights: The Infinity Supercritical 10L CO2 extractor is for botanical oil extraction, which is rich in terpenes and can produce shelf ready full spectrum oil. With over 5 years of development, this industry leader mature extractor machine has been sold since 2015 and is part of many profitable businesses. The process can also be used for electrowinning, e-waste recycling, and lithium battery recycling, gold mining electronic wastes, precious metals. CO2 can also be used in a reverse fuel cell with nafion to make a gas-to-liquids fuel, such as methanol, ethanol and butanol or ethylene. Supercritical CO2 has also been used for treating nafion to make it more effective catalyst. This NFT is for the purchase of worldwide rights which includes the design. More Info

NFT (Non Fungible Token): Buy our tech, design, development or system NFT and become part of our tech NFT network... More Info

Infinity Turbine Products: Special for this month, any plans are $10,000 for complete Cad/Cam blueprints. License is for one build. Try before you buy a production license. May pay by Bitcoin or other Crypto. Products Page... More Info

CONTACT TEL: 608-238-6001 Email: greg@infinityturbine.com | RSS | AMP