A Review of Cybersecurity Concerns for Transactive Energy Markets
Abstract
:1. Introduction
2. Background and Motivation
2.1. Prosumer
2.2. Transactive Energy
- Lower electrical transmission distances;
- Improved market conditions;
- More accurate, transparent, and fair billing;
- Increased stability;
- Greater efficiency (less loss of electricity, more efficient auctions).
2.3. Blockchain
2.4. Smart Contracts
3. Research Questions
- RQ1. What are the security concerns that exist in blockchain-based transactive energy systems?
- –
- This question will enable us to determine the (cyber-)security landscape in the transactive energy system marketplace.
- RQ2. What security solutions currently exist in this space and which of the concerns discovered do they address?
- –
- This will allow us to determine the current techniques that are currently being used to address security in this space. This, in turn, will enable us to find gaps in current security research which could potentially give rise to new techniques, as well as the efficacy of current techniques that may have room for improvement.
- RQ3. What are the remaining security concerns that require attention?
- –
- This question is particularly significant for researchers, as it can inform future research directions in the space of TEM security. By examining the threats found in RQ1 and the proposed solutions found in RQ2, we can identify threats for which solutions must be further investigated—either because no solutions have been proposed or because the ones that have been proposed expose significant limitations.
4. Methodology
4.1. Source Database
4.2. Search Query
TITLE-ABS-KEY (
( blockchain OR Ethereum OR Hyperledger OR “smart contract” )
AND
( security OR attack )
AND (“transactive energy” OR DER OR “distributed energy resource” )
AND ( LIMIT-TO ( LANGUAGE , “English” ) )
)
AND ( EXCLUDE ( DOCTYPE , “cr” ) )
4.3. Exclusion Criteria
4.4. Selected Papers
5. RQ1 Results: Threats
5.1. False Data Injection
5.2. Denial of Service
5.3. Energy Usage Data
- —this represents the transmission of energy usage data from a household to a central authority. Although many TE implementations have distributed elements, most still have some operations that must be performed in a centralized manner, necessitating this flow of information.
- —this represents data that go straight from the smart meter to the blockchain. This is in some sense the safest path for the data, as it is never owned by a single party who might exploit it; however, there is still the risk of a man-in-the-middle attack on .
- —some TE models aggregate energy usage data before disseminating them in order to mitigate malicious analysis. This is a good solution, but introduces the risk of a malicious aggregator.
- —sending aggregated data to the blockchain is extremely secure since even a man-in-the-middle attack would glean very little useful information. However, it suffers from the fact that the data have to be aggregated by a trusted party.
5.4. The 51% Attack
5.5. Privacy
5.5.1. Market Privacy
5.5.2. Data Privacy
5.6. Market Attacks
- The kind of data involved (i.e., energy usage);
- The possible outcomes of an attack (i.e., grid instability);
- How TE structures might affect an adversary’s approach (i.e., manipulating a smart meter to falsify consumption metrics).
- Falsely reporting consumption/production;
- Not following through on payment/energy production;
- Falsely claiming that energy/payment was not received;
- Posting fake bids/offers.
5.7. Single Point of Failure
5.8. Edge Nodes
5.9. Regulation and Standardization
5.9.1. Regulation
5.9.2. Software Standards
5.9.3. Hardware Standards
5.10. Smart Meter Firmware
5.11. Authenticating New Prosumers
5.12. Smart Contracts
5.13. Electric Vehicles
5.14. Communication
6. RQ2 Results: Solutions
6.1. False Data Injection
6.2. Denial of Service
6.3. Energy Usage Data
6.4. The 51% Attack
6.5. Privacy
6.6. Market Attacks
6.7. Single Point of Failure
6.8. Edge Nodes
6.9. Regulation and Standardization
6.10. Smart Meter Firmware
6.11. Authenticating New Prosumers
6.12. Smart Contracts
6.13. Electric Vehicles
6.14. Communication
7. RQ3 Results: Remaining Security Concerns
7.1. False Data Injection
7.2. Denial of Service
7.3. Energy Usage Data
7.4. The 51% Attack
7.5. Privacy
7.6. Market Attacks
7.7. Single Point of Failure
7.8. Edge Nodes
7.9. Regulation and Standardization
7.10. Smart Meter Firmware
7.11. Authenticating New Prosumers
7.12. Smart Contracts
7.13. Electric Vehicles
7.14. Communication
8. Limitations and Threats to Validity
- We only use one database and our query was limited to English papers and only a few synonyms per concept. This means that we likely missed relevant papers in our selection. This was partly mitigated by the wide coverage of that database (Scopus) and its constant updates. Further mitigation was provided by relying on a complementary search technique, namely backward snowballing.
- Another decision was to exclude non-peer-reviewed documents, including white papers and patents. This means that the selected papers, and our conclusions, are biased towards academic contributions, at the expense of purely industrial concerns and solutions that might have brought complementary views and information.
- As most of the paper selection and data extraction was performed by one person (the first author), the process might have been subject to various unconscious biases. This was partly mitigated by involving some of the other co-authors for borderline decisions. We also made the raw data extracted from the selected papers available online for documenting, reproducing, and extending our literature review.
- The relatively narrow subject of this review, namely cybersecurity concerns that affect TEMs that use blockchains, presents a limitation in terms of available research. TE and blockchains are both relatively new fields. Among papers that fall into this category, many include little to no security analysis. Often, security concerns that were discussed were those that were addressed by including a blockchain, i.e., concerns that were not relevant to our review.
- Perhaps just as impactful is the limited real-world deployment of TE systems. Most of the systems investigated for this review are in the proof-of-concept stage, meaning that they have not been tested in the wild, leading to a paucity of empirical data. It is difficult for researchers to predict which attacks will be most feasible or rewarding for hackers, but this is the analysis which we must rely on until TEMs are broadly implemented. As such, it is likely that some weaknesses have gone unnoticed, leaving gaps in security solutions.
9. Conclusions and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
AMI | Advanced Metering Infrastructure |
BBPS | Blockchain-Based Patch System |
BESS | Battery Energy Storage System |
DER | Distributed Energy Resource |
DoS | Denial of Service |
DSO | Distributed System Operator |
ETSE | Energy Trading and Security Enhancement |
EV | Electric Vehicle |
EVE | Electron Volt Exchange |
FDI | False Data Injection |
FDIA | False Data Injection Attack |
HE | Homomorphic Encryption |
HEM | Home Energy Management |
MC | Microgrid Controller |
P2P | Peer-to-Peer |
RES | Renewable Energy Sources |
SC | Smart Contract |
SEL | Security Enhancement Layer |
SG | Smart Grid |
SM | Smart Meter |
SPOF | Single Point of Failure |
TE | Transactive Energy |
TEM | Transactive Energy Market |
TTP | Trusted Third Party |
References
- Onumanyi, A.J.; Isaac, S.J.; Kruger, C.P.; Abu-Mahfouz, A.M. Transactive Energy: State-of-the-Art in Control Strategies, Architectures, and Simulators. IEEE Access 2021, 9, 131552–131573. [Google Scholar] [CrossRef]
- Cox, W.; Considine, T. Structured energy: Microgrids and autonomous transactive operation. In Proceedings of the 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 24–27 February 2013; pp. 1–6. [Google Scholar] [CrossRef]
- Li, Z.; Bahramirad, S.; Paaso, A.; Yan, M.; Shahidehpour, M. Blockchain for decentralized transactive energy management system in networked microgrids. Electr. J. 2019, 32, 58–72. [Google Scholar] [CrossRef]
- Saha, S.; Ravi, N.; Hreinsson, K.; Baek, J.; Scaglione, A.; Johnson, N.G. A secure distributed ledger for transactive energy: The Electron Volt Exchange (EVE) blockchain. Appl. Energy 2021, 282, 116208. [Google Scholar] [CrossRef]
- Münsing, E.; Mather, J.; Moura, S. Blockchains for decentralized optimization of energy resources in microgrid networks. In Proceedings of the 2017 IEEE Conference on Control Technology and Applications (CCTA), Maui, HI, USA, 27–30 August 2017; pp. 2164–2171. [Google Scholar] [CrossRef] [Green Version]
- Mylrea, M.; Gourisetti, S.N.G. Blockchain for smart grid resilience: Exchanging distributed energy at speed, scale and security. In Proceedings of the 2017 Resilience Week (RWS), Wilmington, DE, USA, 18–22 September 2017; pp. 18–23. [Google Scholar] [CrossRef]
- Kirli, D.; Couraud, B.; Robu, V.; Salgado-Bravo, M.; Norbu, S.; Andoni, M.; Antonopoulos, I.; Negrete-Pincetic, M.; Flynn, D.; Kiprakis, A. Smart contracts in energy systems: A systematic review of fundamental approaches and implementations. Renew. Sustain. Energy Rev. 2022, 158, 112013. [Google Scholar] [CrossRef]
- Jayachandran, M.; Rao, K.P.; Gatla, R.K.; Kalaivani, C.; Kalaiarasy, C.; Logasabarirajan, C. Operational concerns and solutions in smart electricity distribution systems. Util. Policy 2022, 74, 101329. [Google Scholar] [CrossRef]
- Mar, A.; Pereira, P.F.; Martins, J. A Survey on Power Grid Faults and Their Origins: A Contribution to Improving Power Grid Resilience. Energies 2019, 12, 4667. [Google Scholar] [CrossRef] [Green Version]
- Ardeshiri, A.; Lotfi, A.; Behkam, R.; Moradzadeh, A.; Barzkar, A. Introduction and Literature Review of Power System Challenges and Issues. In Application of Machine Learning and Deep Learning Methods to Power System Problems; Springer International Publishing: Cham, Switzerland, 2021; pp. 19–43. [Google Scholar] [CrossRef]
- Chandra, R.; Kaippilly Radhakrishnan, K.; Panda, S.K. Privacy protected product differentiation through smart contracts based on bilateral negotiations in peer-to-peer transactive energy markets. Sustain. Energy Grids Netw. 2023, 34, 100997. [Google Scholar] [CrossRef]
- Lombardi, F.; Aniello, L.; De Angelis, S.; Margheri, A.; Sassone, V. A Blockchain-based Infrastructure for Reliable and Cost-effective IoT-aided Smart Grids. In Proceedings of the Living in the Internet of Things: Cybersecurity of the IoT, London, UK, 28–29 March 2018. [Google Scholar] [CrossRef] [Green Version]
- Laszka, A.; Dubey, A.; Walker, M.; Schmidt, D. Providing Privacy, Safety, and Security in IoT-Based Transactive Energy Systems using Distributed Ledgers. In Proceedings of the Seventh International Conference on the Internet of Things, Linz, Austria, 22–25 October 2017. [Google Scholar] [CrossRef] [Green Version]
- Lauer, M.; Jaddivada, R.; Ilić, M. Secure Blockchain-Enabled DyMonDS Design. In Proceedings of the COINS’19: International Conference on Omni-Layer Intelligent Systems, Crete, Greece, 5–7 May 2019; ACM: New York, NY, USA, 2019; pp. 191–198. [Google Scholar] [CrossRef]
- Khorasany, M.; Mishra, Y.; Ledwich, G. A Decentralised Bilateral Energy Trading System for Peer-to-Peer Electricity Markets. IEEE Trans. Ind. Electron. 2019, 67, 4646–4657. [Google Scholar] [CrossRef] [Green Version]
- Shuaib, K.; Abdella, J.; Sallabi, F.; Abdel Hafez, M. Using Blockchains to Secure Distributed Energy Exchange. In Proceedings of the 2018 5th International Conference on Control, Decision and Information Technologies (CoDIT), Thessaloniki, Greece, 10–13 April 2018; pp. 622–627. [Google Scholar] [CrossRef]
- Khan, H.; Masood, T. Impact of Blockchain Technology on Smart Grids. Energies 2022, 15, 7189. [Google Scholar] [CrossRef]
- Mylrea, M.; Gourisetti, S.N.G. Blockchain: A path to grid modernization and cyber resiliency. In Proceedings of the 2017 North American Power Symposium (NAPS), Morgantown, WV, USA, 17–19 September 2017; pp. 1–5. [Google Scholar] [CrossRef]
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 12 June 2023).
- Szabo, N. Smart Contracts. 1994. Available online: https://bit.ly/3B0KLir (accessed on 12 June 2023).
- Bitcoin Wiki. Script. 2021. Available online: https://en.bitcoin.it/wiki/Script (accessed on 12 June 2023).
- Okoli, C. A guide to conducting a standalone systematic literature review. Commun. Assoc. Inf. Syst. 2015, 37, 879–910. [Google Scholar] [CrossRef] [Green Version]
- Mourão, E.; Pimentel, J.F.; Murta, L.; Kalinowski, M.; Mendes, E.; Wohlin, C. On the performance of hybrid search strategies for systematic literature reviews in software engineering. Inf. Softw. Technol. 2020, 123, 106294. [Google Scholar] [CrossRef]
- Mololoth, V.K.; Saguna, S.; Åhlund, C. Blockchain and Machine Learning for Future Smart Grids: A Review. Energies 2023, 16, 528. [Google Scholar] [CrossRef]
- Aklilu, Y.T.; Ding, J. Survey on Blockchain for Smart Grid Management, Control, and Operation. Energies 2022, 15, 193. [Google Scholar] [CrossRef]
- Nazari, M.; Khorsandi, S.; Babaki, J. Security and Privacy Smart Contract Architecture for Energy Trading based on Blockchains. In Proceedings of the 2021 29th Iranian Conference on Electrical Engineering (ICEE), Tehran, Iran, 18–20 May 2021; pp. 596–600. [Google Scholar] [CrossRef]
- Yang, W.; Guan, Z.; Wu, L.; Du, X.; Guizani, M. Secure Data Access Control With Fair Accountability in Smart Grid Data Sharing: An Edge Blockchain Approach. IEEE Internet Things J. 2021, 8, 8632–8643. [Google Scholar] [CrossRef]
- Zaman, I.; He, M. A Multilayered Semi-Permissioned Blockchain Based Platform for Peer to Peer Energy Trading. In Proceedings of the 2021 IEEE Green Technologies Conference (GreenTech), Denver, CO, USA, 7–9 April 2021; pp. 279–285. [Google Scholar] [CrossRef]
- Eisele, S.; Eghtesad, T.; Campanelli, K.; Agrawal, P.; Laszka, A.; Dubey, A. Safe and Private Forward-Trading Platform for Transactive Microgrids. ACM Trans. Cyber-Phys. Syst. 2021, 5, 1–29. [Google Scholar] [CrossRef]
- Mollah, M.B.; Zhao, J.; Niyato, D.; Lam, K.Y.; Zhang, X.; Ghias, A.M.Y.M.; Koh, L.H.; Yang, L. Blockchain for Future Smart Grid: A Comprehensive Survey. IEEE Internet Things J. 2021, 8, 18–43. [Google Scholar] [CrossRef]
- Dorokhova, M.; Vianin, J.; Alder, J.M.; Ballif, C.; Wyrsch, N.; Wannier, D. A Blockchain-Supported Framework for Charging Management of Electric Vehicles. Energies 2021, 14, 7144. [Google Scholar] [CrossRef]
- Barreto, C.; Eghtesad, T.; Eisele, S.; Laszka, A.; Dubey, A.; Koutsoukos, X. Cyber-Attacks and Mitigation in Blockchain Based Transactive Energy Systems. In Proceedings of the 2020 IEEE Conference on Industrial Cyberphysical Systems (ICPS), Denver, CO, USA, 7–9 April 2020; Volume 1, pp. 129–136. [Google Scholar] [CrossRef]
- Mbarek, B.; Chren, S.; Rossi, B.; Pitner, T. An Enhanced Blockchain-Based Data Management Scheme for Microgrids. In Web, Artificial Intelligence and Network Applications. WAINA 2020; Springer: Cham, Switerland, 2020; pp. 766–775. [Google Scholar] [CrossRef]
- Zhang, Y.; Eisele, S.; Dubey, A.; Laszka, A.; Srivastava, A.K. Cyber-physical simulation platform for security assessment of transactive energy systems. In Proceedings of the 2019 7th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES), Montreal, QC, Canada, 15 April 2019; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
- Song, W.; Li, Y.; Yang, D. Research on the Application of Blockchain in the Energy Power Industry in China. J. Phys. Conf. Ser. 2019, 1176, 042079. [Google Scholar] [CrossRef]
- Fadhel, N.; Lombardi, F.; Aniello, L.; Margheri, A.; Sassone, V. Towards a semantic modelling for threat analysis of IoT applications: A case study on transactive energy. In Proceedings of the Living in the Internet of Things (IoT 2019), London, UK, 1–2 May 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Wei, L.; Rondon, L.P.; Moghadasi, A.; Sarwat, A.I. Review of Cyber-Physical Attacks and Counter Defense Mechanisms for Advanced Metering Infrastructure in Smart Grid. In Proceedings of the 2018 IEEE/PES Transmission and Distribution Conference and Exposition (T&D), Denver, CO, USA, 16–19 April 2018; pp. 1–9. [Google Scholar] [CrossRef] [Green Version]
- Wang, D.; Guan, X.; Liu, T.; Gu, Y.; Shen, C.; Xu, Z. Extended Distributed State Estimation: A Detection Method against Tolerable False Data Injection Attacks in Smart Grids. Energies 2014, 7, 1517–1538. [Google Scholar] [CrossRef] [Green Version]
- He, Y.; Mendis, G.J.; Wei, J. Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism. IEEE Trans. Smart Grid 2017, 8, 2505–2516. [Google Scholar] [CrossRef]
- Channon, M.; Marson, J. THE liability for cybersecurity breaches of connected and autonomous vehicles. Comput. Law Secur. Rev. 2021, 43, 105628. [Google Scholar] [CrossRef]
- Mengelkamp, E.; Gärttner, J.; Rock, K.; Kessler, S.; Orsini, L.; Weinhardt, C. Designing microgrid energy markets: A case study: The Brooklyn Microgrid. Appl. Energy 2018, 210, 870–880. [Google Scholar] [CrossRef]
- Yin, H.L.; Fu, Y.; Li, C.L.; Weng, C.X.; Li, B.H.; Gu, J.; Lu, Y.S.; Huang, S.; Chen, Z.B. Experimental quantum secure network with digital signatures and encryption. Natl. Sci. Rev. 2022, 10, nwac228. [Google Scholar] [CrossRef] [PubMed]
- Liu, Y.; Ning, P.; Reiter, M.K. False Data Injection Attacks against State Estimation in Electric Power Grids. ACM Trans. Inf. Syst. Secur. 2011, 14, 1–33. [Google Scholar] [CrossRef]
- Vuković, O.; Dán, G. Security of Fully Distributed Power System State Estimation: Detection and Mitigation of Data Integrity Attacks. IEEE J. Sel. Areas Commun. 2014, 32, 1500–1508. [Google Scholar] [CrossRef] [Green Version]
- Yapa, C.; de Alwis, C.; Liyanage, M.; Ekanayake, J. Survey on blockchain for future smart grids: Technical aspects, applications, integration challenges and future research. Energy Rep. 2021, 7, 6530–6564. [Google Scholar] [CrossRef]
- Andrea, I.; Chrysostomou, C.; Hadjichristofi, G. Internet of Things: Security vulnerabilities and challenges. In Proceedings of the 2015 IEEE Symposium on Computers and Communication (ISCC), Larnaca, Cyprus, 6–9 July 2015; pp. 180–187. [Google Scholar] [CrossRef]
- Yi, P.; Zhu, T.; Zhang, Q.; Wu, Y.; Li, J. A denial of service attack in advanced metering infrastructure network. In Proceedings of the 2014 IEEE International Conference on Communications (ICC), Sydney, NSW, Australia, 10–14 June 2014; pp. 1029–1034. [Google Scholar] [CrossRef]
- Lisovich, M.A.; Mulligan, D.K.; Wicker, S.B. Inferring Personal Information from Demand-Response Systems. IEEE Secur. Priv. 2010, 8, 11–20. [Google Scholar] [CrossRef]
- McDaniel, P.; McLaughlin, S. Security and Privacy Challenges in the Smart Grid. IEEE Secur. Priv. 2009, 7, 75–77. [Google Scholar] [CrossRef]
- Andoni, M.; Robu, V.; Flynn, D.; Abram, S.; Geach, D.; Jenkins, D.; McCallum, P.; Peacock, A. Blockchain technology in the energy sector: A systematic review of challenges and opportunities. Renew. Sustain. Energy Rev. 2019, 100, 143–174. [Google Scholar] [CrossRef]
- Siddiqui, F.; Zeadally, S.; Alcaraz, C.; Galvao, S. Smart Grid Privacy: Issues and Solutions. In Proceedings of the 2012 21st International Conference on Computer Communications and Networks (ICCCN), Munich, Germany, 30 July–2 August 2012; pp. 1–5. [Google Scholar] [CrossRef]
- Son, Y.B.; Im, J.H.; Kwon, H.Y.; Jeon, S.Y.; Lee, M.K. Privacy-Preserving Peer-to-Peer Energy Trading in Blockchain-Enabled Smart Grids Using Functional Encryption. Energies 2020, 13, 1321. [Google Scholar] [CrossRef] [Green Version]
- Wang, S.; Taha, A.F.; Wang, J.; Kvaternik, K.; Hahn, A. Energy Crowdsourcing and Peer-to-Peer Energy Trading in Blockchain-Enabled Smart Grids. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 1612–1623. [Google Scholar] [CrossRef] [Green Version]
- Mihaylov, M.; Jurado, S.; Avellana, N.; Van Moffaert, K.; de Abril, I.M.; Nowé, A. NRGcoin: Virtual currency for trading of renewable energy in smart grids. In Proceedings of the 11th International Conference on the European Energy Market (EEM14), Krakow, Poland, 28–30 May 2014; pp. 1–6. [Google Scholar] [CrossRef]
- Nikolić, I.; Kolluri, A.; Sergey, I.; Saxena, P.; Hobor, A. Finding The Greedy, Prodigal, and Suicidal Contracts at Scale. In Proceedings of the ACSAC’18: 34th Annual Computer Security Applications Conference, San Juan, PR, USA, 3–7 December 2018; Association for Computing Machinery: New York, NY, USA, 2018; pp. 653–663. [Google Scholar] [CrossRef] [Green Version]
- Fernandes, E.; Jung, J.; Prakash, A. Security Analysis of Emerging Smart Home Applications. In Proceedings of the 2016 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 22–26 May 2016; pp. 636–654. [Google Scholar] [CrossRef]
- Wiseman, Y. Autonomous Vehicles. In Research Anthology on Cross-Disciplinary Designs and Applications of Automation; IGI Global: Hershey, PA, USA, 2022; pp. 878–889. [Google Scholar] [CrossRef]
- Cárdenas, A.A.; Amin, S.; Lin, Z.S.; Huang, Y.L.; Huang, C.Y.; Sastry, S. Attacks against Process Control Systems: Risk Assessment, Detection, and Response. In Proceedings of the ASIACCS’11: 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, China, 22–24 March 2011; Association for Computing Machinery: New York, NY, USA, 2011; pp. 355–366. [Google Scholar] [CrossRef]
- Cantillo-Luna, S.; Moreno-Chuquen, R.; Chamorro, H.R.; Sood, V.K.; Badsha, S.; Konstantinou, C. Blockchain for Distributed Energy Resources Management and Integration. IEEE Access 2022, 10, 68598–68617. [Google Scholar] [CrossRef]
- Saha, S.S.; Gorog, C.; Moser, A.; Scaglione, A.; Johnson, N.G. Integrating Hardware Security into a Blockchain-Based Transactive Energy Platform. In Proceedings of the 2020 52nd North American Power Symposium (NAPS), Tempe, AZ, USA, 11–13 April 2021; pp. 1–6. [Google Scholar] [CrossRef]
- Gu, J.; Cao, X.Y.; Fu, Y.; He, Z.W.; Yin, Z.J.; Yin, H.L.; Chen, Z.B. Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources. Sci. Bull. 2022, 67, 2167–2175. [Google Scholar] [CrossRef]
- Ruffing, T.; Moreno-Sanchez, P.; Kate, A. CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin. In Proceedings of the Computer Security—ESORICS 2014, Wroclaw, Poland, 7–11 September 2014; Kutyłowski, M., Vaidya, J., Eds.; Springer International Publishing: Cham, Switzerland, 2014; pp. 345–364. [Google Scholar] [CrossRef]
- Flores, N.; McBrien, H.; Do, V.; Kiang, M.; Schlegelmilch, J.; Casey, J. The 2021 Texas Power Crisis: Distribution, duration, and disparities. J. Expo. Sci. Environ. Epidemiol. 2022, 33, 21–31. [Google Scholar] [CrossRef] [PubMed]
- Zhou, X.; Jin, Y.; Zhang, H.; Li, S.; Huang, X. A Map of Threats to Validity of Systematic Literature Reviews in Software Engineering. In Proceedings of the 2016 23rd Asia-Pacific Software Engineering Conference (APSEC), Hamilton, New Zealand, 6–9 December 2016; pp. 153–160. [Google Scholar] [CrossRef]
Year | Title | Authors |
---|---|---|
2023 | Privacy protected product differentiation through smart contracts based on bilateral negotiations in peer-to-peer transactive energy markets | Chandra et al. [11] |
2023 | Blockchain and machine learning for future smart grids: a review | Mololoth et al. [24] |
2022 | Smart contracts in energy systems: A systematic review of fundamental approaches and implementations | Kirli et al. [7] |
2022 | Operational concerns and solutions in smart electricity distribution systems | Jayachandran et al. [8] |
2022 | Impact of blockchain technology on smart grids | Khan and Masood [17] |
2022 | Survey on blockchain for smart grid management, control, and operation | Aklilu and Ding [25] |
2021 | Security and privacy smart contract architecture for energy trading based on blockchains | Nazari et al. [26] |
2021 | Secure data access control with fair accountability in smart grid data sharing: An edge blockchain approach | Yang et al. [27] |
2021 | A multilayered semi-permissioned blockchain based platform for peer to peer energy trading | Zaman and He [28] |
2021 | A secure distributed ledger for transactive energy: The Electron Volt Exchange (EVE) blockchain | Saha et al. [4] |
2021 | Safe and private forward-trading platform for transactive microgrids | Eisele et al. [29] |
2021 | Blockchain for Future Smart Grid: A Comprehensive Survey | Mollah et al. [30] |
2021 | A blockchain-supported framework for charging management of electric vehicles | Dorokhova et al. [31] |
2020 | Cyber-attacks and mitigation in blockchain based transactive energy systems | Barreto et al. [32] |
2020 | An enhanced blockchain-based data management scheme for microgrids | Mbarek et al. [33] |
2019 | Blockchain for decentralized transactive energy management system in networked microgrids | Li et al. [3] |
2019 | Cyber-physical simulation platform for security assessment of transactive energy systems | Zhang et al. [34] |
2019 | Research on the application of blockchain in the energy power industry in China | Song et al. [35] |
2019 | Towards a semantic modelling for threat analysis of IoT applications: A case study on transactive energy | Fadhel et al. [36] |
2019 | A decentralised bilateral energy trading system for peer-to-peer electricity markets | Khorasany et al. [15] |
2019 | Secure blockchain-enabled DyMonDS design | Lauer et al. [14] |
2019 | Using blockchains to secure distributed energy exchange | Shuaib et al. [16] |
2018 | A blockchain-based infrastructure for reliable and cost-effective IoT-aided smart grids | Lombardi et al. [12] |
2018 | Review of cyber-physical attacks and counter defense mechanisms for advanced metering infrastructure in smart grid | Wei et al. [37] |
2017 | Blockchain: A path to grid modernization and cyber resiliency | Mylrea and Gourisetti [18] |
2017 | Blockchain for smart grid resilience: Exchanging distributed energy at speed, scale and security | Mylrea and Gourisetti [6] |
2017 | Providing privacy, safety, and security in IoT-based transactive energy systems using distributed ledgers | Laszka et al. [13] |
2017 | Blockchains for decentralized optimization of energy resources in microgrid networks | Münsing et al. [5] |
Name | Security Property | Found In |
---|---|---|
False data injection (FDI) | Validity | [1,4,8,32,33,38,39] |
Denial of service (DoS) | Availability | [3,7,24,28,32,34,37] |
Energy usage data | Confidentiality | [12,13,26,29,33] |
51% attack | Availability, Integrity | [7,16,24,28] |
Privacy | Confidentiality | [4,5,7,11,13,15,26,27,29] |
Market attacks | Integrity | [3,4,6,7,12,13,18,26,28,33,34,36] |
Single point of failure (SPOF) | Availability | [4,7,11,14,27,28,29,33] |
Edge nodes | Confidentiality, Integrity | [8,27,29,34] |
Regulation and Standardization | Integrity, Availability | [3,5,6,7,8,12,14,17,18,35,36] |
Smart meter firmware | Availability | [3,12,14,26,36] |
Authenticating new prosumers | Authentication | [3,8,28,29] |
Smart contracts | Integrity, Availability, Confidentiality | [7,16,17,31,35] |
Electric vehicles | Confidentiality, Authentication | [4,8,16,17,30,32,40] |
Communication | Confidentiality, Integrity | [13,29,33,41,42] |
Threat | Solutions | Found In |
---|---|---|
False data injection (FDI) | RSV, ETSE, various | [1,4,33,38,39] |
Denial of service (DoS) | Smart contracts, various | [3,28] |
Energy usage data | HE, aggregation, various | [4,11] |
51% attack | Various | [28] |
Privacy | Pseudonymity, anonymity, various | [4,13,15,16,26,28,29] |
Market attacks | Reputation, access blocking, various | [3,12,26,28,29,58] |
Single point of failure (SPOF) | Various | [4,27,28,29] |
Edge nodes | Incentives, distributed authority, BFT, various | [8,27,29] |
Regulation and standardization | ETSE | [12] |
Smart meter firmware | BBPS, various | [3,12,26,36] |
Authenticating new prosumers | Smart contracts, distributed verification, various | [3,28,29] |
Smart Contracts | Third-party verification, various | [7,16] |
Electric vehicles | Various | [4,17,59,60] |
Communication | Quantum-safe cryptography, quantum key distribution, PETra | [13,42,61] |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sousa-Dias, D.; Amyot, D.; Rahimi-Kian, A.; Mylopoulos, J. A Review of Cybersecurity Concerns for Transactive Energy Markets. Energies 2023, 16, 4838. https://doi.org/10.3390/en16134838
Sousa-Dias D, Amyot D, Rahimi-Kian A, Mylopoulos J. A Review of Cybersecurity Concerns for Transactive Energy Markets. Energies. 2023; 16(13):4838. https://doi.org/10.3390/en16134838
Chicago/Turabian StyleSousa-Dias, Daniel, Daniel Amyot, Ashkan Rahimi-Kian, and John Mylopoulos. 2023. "A Review of Cybersecurity Concerns for Transactive Energy Markets" Energies 16, no. 13: 4838. https://doi.org/10.3390/en16134838
APA StyleSousa-Dias, D., Amyot, D., Rahimi-Kian, A., & Mylopoulos, J. (2023). A Review of Cybersecurity Concerns for Transactive Energy Markets. Energies, 16(13), 4838. https://doi.org/10.3390/en16134838