Security Analysis on the Decentralized Energy Trading System Using Blockchain Technology
DOI:
https://doi.org/10.15575/join.v3i1.207Keywords:
Blockchain, energy trading, microgrid, peer-to-peer networkAbstract
References
N.Z. Aitzhan and D. Svetinovic, "Security and Privacy in Decentralized Energy Trading through Multi-Signature, Blockchain and Anonymous Messaging Streams", IEEE Transactions on Dependable and Secure Computing, 2016.
PwC Global Power, "Blockchain-an Opportunity for Energy Producers and Consumers?" PwC Global Power and Utilities, 2016.
G. Karame, E. Androulaki, "Bitcoin and Blockchain Security", Information Security and Privacy Series, United States of America, Artech House, 2016.
P. Danzi, A. Marko, C. Stefanovic, and P. Popovski, “Distributed Proportional-Fairness Control in Microgrids via Blockchain Smart Contractsâ€, arXiv: 1705.01453v2 [cs.MA], 2017.
F. Imbault, M. Swiatek, R.de Beaufort and R. Plana, "The Green Blockchain Managing Decentralized Energy Production and Consumption", IEEE International Conference on Environment and Electrical Engineering (EEEIC/ I&CPS Europe), 2017.
S. Nakamoto, “Bitcoin: A Peer-to-peer Electronic Cash Systemâ€, 2008.
P. Narayan, “Building Blockchain Projects: Develop real-time DApps using Ethereum and JavaScriptâ€, Birmingham-Mumbai, Packt Publishing Ltd. 2017.
C. Troncoso, M. Isaakidis, G. Danezis and H. Halpin, Systematizing Decentralization and Privacy: Lesson from 15 Years of Research and Deployments, Proceeding on Privacy Enhancing Technologies: 307-329, 2017.
K.S. Ramesh, M. Kasbekar, W. Lichtenstein, J. Manish, “Overlay Network: An Akamai Perspectiveâ€, University of Massachusetts, Amherst, Akamai Technologies Inc*
Chord (peer-to-peer): https://en.wikipedia.org/wiki/Chord
S. Ion, R. Morris, D. Karger, M. Frans Kaashoek, H. Balakrishnan, “Chord: A Scalable Peer-to-peer Lookup Service for Internet Applicationsâ€, SIGCOMM’01, San Diego, California, USA, 2001.
Brooklyn Microgrid, Available online at: https://www.brooklyn.energy/
Average Confirmation Time in Bitcoin: https://blockchain.info/charts/avg-confirmation-time
I. Eyal, and E.G. Sirer, “Majority is not Enough: Bitcoin Mining is Vulnerableâ€, Financial Cryptography and Data Security, Berlin, 2014.
Downloads
Published
Issue
Section
Citation Check
License
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
-
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
-
NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material.
-
No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
- You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation.
- No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License