
PDF Publication Title:
Text from PDF Page: 013
Inventions 2020, 5, 58 13 of 14 Substantial technical discussions in the context of the existing power systems are highlighted in this paper. The transaction performed is used to address the above-mentioned issue. One way the proposed system is protecting the data from energy market from manipulation or fraud is utilizing the immutability characteristic of the blockchain framework. The proposed system uses ledgers to store the data and each block of the data is stored using a unique hash value. This feature ensures that the data stored cannot be manipulated by an external entity. Moreover, the proposed framework is decentralized, which makes it impossible for an external entity to compromise the market data using cyberattack such as DDoS. Author Contributions: Conceptualization, analysis, methodology, and experiments, A.U.,; manuscript preparation, A.U., S.M.S.S., and M.A.H.; data curation, A.U., writing—review and editing, A.U., S.M.S.S., M.A.H., and S.K.R. All authors have read and agreed to the published version of the manuscript. Funding: The research received no external funding. Conflicts of Interest: The authors declare no conflict of interest. References 1. IEA. World Energy Outlook 2019—Analysis. Available online: https://www.iea.org/reports/world-energy- outlook-2019 (accessed on 20 August 2020). 2. Kim, S.K.; Huh, J.H. A study on the improvement of smart grid security performance and blockchain smart grid perspective. Energies 2018, 11, 1973. [CrossRef] 3. Mylrea, M.; Gourisetti, S.N.G. Blockchain for smart grid resilience: Exchangingdistributed energy at speed, scale, and security. In Proceedings of the 2017 Resilience Week (RWS), Wilmington, DE, USA, 18–22 September 2017; pp. 18–23. 4. Luo, F.; Zhao, J.; Dong, Z.Y.; Chen, Y.; Xu, Y.; Zhang, X.; Wong, K.P. Cloud-based information infrastructure for next-generation power grid: Conception, architecture, and applications. IEEE Trans. Smart Grid 2015, 7, 1896–1912. [CrossRef] 5. Liang, G.; Weller, S.R.; Zhao, J.; Luo, F.; Dong, Z.Y. The 2015 ukraine blackout: Implications for false data injection attacks. IEEE Trans. Power Syst. 2016, 32, 3317–3318. [CrossRef] 6. Kosut, O.; Jia, L.; Thomas, R.J.; Tong, L. Malicious data attacks on the smart grid. IEEE Trans. Smart Grid 2011, 2, 645–658. [CrossRef] 7. Liang, G.; Zhao, J.; Luo, F.; Weller, S.R.; Dong, Z.Y. A review of false data injection attacks against modern power systems. IEEE Trans. Smart Grid 2016, 8, 1630–1638. [CrossRef] 8. Liang, G.; Weller, S.R.; Zhao, J.; Luo, F.; Dong, Z.Y. A framework for cyber-topology attacks: Line-switching and new attack scenarios. IEEE Trans. Smart Grid 2019, 10, 1704–1712. [CrossRef] 9. Xie, L.; Mo, Y.; Sinopoli, B. Integrity data attacks in power market operations. IEEE Trans. Smart Grid 2011, 2, 659–666. [CrossRef] 10. Liu, X.; Li, Z.; Li, Z. Optimal protection strategy against false data injection at-tacks in power systems. IEEE Trans. Smart Grid 2016, 8, 1802–1810. [CrossRef] 11. Kong, W.; Dong, Z.Y.; Hill, D.J.; Luo, F.; Xu, Y. Improving nonintrusive load monitoring efficiency via a hybrid programming method. IEEE Trans. Ind. Inform. 2016, 12, 2148–2157. [CrossRef] 12. Dorri, A.; Kanhere, S.S.; Jurdak, R.; Gauravaram, P. Blockchain for IoT security and privacy: The case study of a smart home. In Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Big Island, HI, USA, 13–17 March 2017; pp. 618–623. 13. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. Tech. Rep.; 2019. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 20 August 2020). 14. Ferrer, E.C. The blockchain: A new framework for robotic swarm systems. In Proceedings of the Future Technologies Conference, Vancouver, BC, Canada, 15–16 November 2018; Springer: New York, NY, USA, 2018; pp. 1037–1058. 15. Bao, J.; He, D.; Luo, M.; Choo, K.-K.R. A Survey of Blockchain Applications in the Energy Sector. IEEE Syst. J. 2020, 1–12. [CrossRef] 16. Liang, G.; Weller, S.R.; Luo, F.; Zhao, J.; Dong, Z.Y. Distributed blockchain-based data protection framework for modern power systems against cyber attacks. IEEE Trans. Smart Grid 2019, 10, 3162–3173. [CrossRef]PDF Image | Ethereum Blockchain-Based Prototype for Data Security
PDF Search Title:
Ethereum Blockchain-Based Prototype for Data SecurityOriginal File Name Searched:
inventions-05-00058.pdfDIY PDF Search: Google It | Yahoo | Bing
NFT (Non Fungible Token): Buy our tech, design, development or system NFT and become part of our tech NFT network... More Info
IT XR Project Redstone NFT Available for Sale: NFT for high tech turbine design with one part 3D printed counter-rotating energy turbine. Be part of the future with this NFT. Can be bought and sold but only one design NFT exists. Royalties go to the developer (Infinity) to keep enhancing design and applications... More Info
Infinity Turbine IT XR Project Redstone Design: NFT for sale... NFT for high tech turbine design with one part 3D printed counter-rotating energy turbine. Includes all rights to this turbine design, including license for Fluid Handling Block I and II for the turbine assembly and housing. The NFT includes the blueprints (cad/cam), revenue streams, and all future development of the IT XR Project Redstone... More Info
Infinity Turbine ROT Radial Outflow Turbine 24 Design and Worldwide Rights: NFT for sale... NFT for the ROT 24 energy turbine. Be part of the future with this NFT. This design can be bought and sold but only one design NFT exists. You may manufacture the unit, or get the revenues from its sale from Infinity Turbine. Royalties go to the developer (Infinity) to keep enhancing design and applications... More Info
Infinity Supercritical CO2 10 Liter Extractor Design and Worldwide Rights: The Infinity Supercritical 10L CO2 extractor is for botanical oil extraction, which is rich in terpenes and can produce shelf ready full spectrum oil. With over 5 years of development, this industry leader mature extractor machine has been sold since 2015 and is part of many profitable businesses. The process can also be used for electrowinning, e-waste recycling, and lithium battery recycling, gold mining electronic wastes, precious metals. CO2 can also be used in a reverse fuel cell with nafion to make a gas-to-liquids fuel, such as methanol, ethanol and butanol or ethylene. Supercritical CO2 has also been used for treating nafion to make it more effective catalyst. This NFT is for the purchase of worldwide rights which includes the design. More Info
NFT (Non Fungible Token): Buy our tech, design, development or system NFT and become part of our tech NFT network... More Info
Infinity Turbine Products: Special for this month, any plans are $10,000 for complete Cad/Cam blueprints. License is for one build. Try before you buy a production license. May pay by Bitcoin or other Crypto. Products Page... More Info
| CONTACT TEL: 608-238-6001 Email: greg@infinityturbine.com | RSS | AMP |