Performance Evaluation and Cyberattack Mitigation in a Blockchain-Enabled Peer-to-Peer Energy Trading Framework
With the electric power grid experiencing a rapid shift to the smart grid paradigm over a deregulated energy market, Internet of Things (IoT)-based solutions are gaining prominence, and innovative peer-to-peer (P2P) energy trading at a micro level is being deployed. Such advancement, however, leaves...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-01-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/23/2/670 |
_version_ | 1797437286269321216 |
---|---|
author | Nihar Ranjan Pradhan Akhilendra Pratap Singh S. V. Sudha K Hemanth Kumar Reddy Diptendu Sinha Roy |
author_facet | Nihar Ranjan Pradhan Akhilendra Pratap Singh S. V. Sudha K Hemanth Kumar Reddy Diptendu Sinha Roy |
author_sort | Nihar Ranjan Pradhan |
collection | DOAJ |
description | With the electric power grid experiencing a rapid shift to the smart grid paradigm over a deregulated energy market, Internet of Things (IoT)-based solutions are gaining prominence, and innovative peer-to-peer (P2P) energy trading at a micro level is being deployed. Such advancement, however, leaves traditional security models vulnerable and paves the path for blockchain, a distributed ledger technology (DLT), with its decentralized, open, and transparency characteristics as a viable alternative. However, due to deregulation in energy trading markets, most of the prototype resilience regarding cybersecurity attack, performance and scalability of transaction broadcasting, and its direct impact on overall performances and attacks are required to be supported, which becomes a performance bottleneck with existing blockchain solutions such as Hyperledger, Ethereum, and so on. In this paper, we design a novel permissioned Corda framework for P2P energy trading peers that not only mitigates a new class of cyberattacks, i.e., delay trading (or discard), but also disseminates the transactions in a optimized propagation time, resulting in a fair transaction distribution. Sharing transactions in a permissioned R3 Corda blockchain framework is handled by the Advanced Message Queuing Protocol (AMQP) and transport layer security (TLS). The unique contribution of this paper lies in the use of an optimized CPU and JVM heap memory scenario analysis with P2P metric in addition to a far more realistic multihosted testbed for the performance analysis. The average latencies measured are 22 ms and 51 ms for sending and receiving messages. We compare the throughput by varying different types of flow such as energy request, request + pay, transfer, multiple notary, sender, receiver, and single notary. In the proposed framework, request is an energy asset that is based on payment state and contract in the P2P energy trading module, so in request flow, only one node with no notary appears on the vault of the node.Energy request + pay flow interaction deals with two nodes, such as producer and consumer, to deal with request and transfer of asset ownership with the help of a notary. Request + repeated pay flow request, on node A and repeatedly transfers a fraction of energy asset state to another node, B, through a notary. |
first_indexed | 2024-03-09T11:17:58Z |
format | Article |
id | doaj.art-2ed79150e9b14421a0989ddf42819a10 |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-03-09T11:17:58Z |
publishDate | 2023-01-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-2ed79150e9b14421a0989ddf42819a102023-12-01T00:25:34ZengMDPI AGSensors1424-82202023-01-0123267010.3390/s23020670Performance Evaluation and Cyberattack Mitigation in a Blockchain-Enabled Peer-to-Peer Energy Trading FrameworkNihar Ranjan Pradhan0Akhilendra Pratap Singh1S. V. Sudha2K Hemanth Kumar Reddy3Diptendu Sinha Roy4School of Computer Science and Engineering, VIT-AP University, Amaravati 522237, IndiaDepartment of Computer Science and Engineering, National Institute of Technology Meghalaya, Shillong 793003, IndiaSchool of Computer Science and Engineering, VIT-AP University, Amaravati 522237, IndiaSchool of Computer Science and Engineering, VIT-AP University, Amaravati 522237, IndiaDepartment of Computer Science and Engineering, National Institute of Technology Meghalaya, Shillong 793003, IndiaWith the electric power grid experiencing a rapid shift to the smart grid paradigm over a deregulated energy market, Internet of Things (IoT)-based solutions are gaining prominence, and innovative peer-to-peer (P2P) energy trading at a micro level is being deployed. Such advancement, however, leaves traditional security models vulnerable and paves the path for blockchain, a distributed ledger technology (DLT), with its decentralized, open, and transparency characteristics as a viable alternative. However, due to deregulation in energy trading markets, most of the prototype resilience regarding cybersecurity attack, performance and scalability of transaction broadcasting, and its direct impact on overall performances and attacks are required to be supported, which becomes a performance bottleneck with existing blockchain solutions such as Hyperledger, Ethereum, and so on. In this paper, we design a novel permissioned Corda framework for P2P energy trading peers that not only mitigates a new class of cyberattacks, i.e., delay trading (or discard), but also disseminates the transactions in a optimized propagation time, resulting in a fair transaction distribution. Sharing transactions in a permissioned R3 Corda blockchain framework is handled by the Advanced Message Queuing Protocol (AMQP) and transport layer security (TLS). The unique contribution of this paper lies in the use of an optimized CPU and JVM heap memory scenario analysis with P2P metric in addition to a far more realistic multihosted testbed for the performance analysis. The average latencies measured are 22 ms and 51 ms for sending and receiving messages. We compare the throughput by varying different types of flow such as energy request, request + pay, transfer, multiple notary, sender, receiver, and single notary. In the proposed framework, request is an energy asset that is based on payment state and contract in the P2P energy trading module, so in request flow, only one node with no notary appears on the vault of the node.Energy request + pay flow interaction deals with two nodes, such as producer and consumer, to deal with request and transfer of asset ownership with the help of a notary. Request + repeated pay flow request, on node A and repeatedly transfers a fraction of energy asset state to another node, B, through a notary.https://www.mdpi.com/1424-8220/23/2/670blockchaindistributed ledger technology (DLT)peer-to-peer energy tradingcyberattack mitigation |
spellingShingle | Nihar Ranjan Pradhan Akhilendra Pratap Singh S. V. Sudha K Hemanth Kumar Reddy Diptendu Sinha Roy Performance Evaluation and Cyberattack Mitigation in a Blockchain-Enabled Peer-to-Peer Energy Trading Framework Sensors blockchain distributed ledger technology (DLT) peer-to-peer energy trading cyberattack mitigation |
title | Performance Evaluation and Cyberattack Mitigation in a Blockchain-Enabled Peer-to-Peer Energy Trading Framework |
title_full | Performance Evaluation and Cyberattack Mitigation in a Blockchain-Enabled Peer-to-Peer Energy Trading Framework |
title_fullStr | Performance Evaluation and Cyberattack Mitigation in a Blockchain-Enabled Peer-to-Peer Energy Trading Framework |
title_full_unstemmed | Performance Evaluation and Cyberattack Mitigation in a Blockchain-Enabled Peer-to-Peer Energy Trading Framework |
title_short | Performance Evaluation and Cyberattack Mitigation in a Blockchain-Enabled Peer-to-Peer Energy Trading Framework |
title_sort | performance evaluation and cyberattack mitigation in a blockchain enabled peer to peer energy trading framework |
topic | blockchain distributed ledger technology (DLT) peer-to-peer energy trading cyberattack mitigation |
url | https://www.mdpi.com/1424-8220/23/2/670 |
work_keys_str_mv | AT niharranjanpradhan performanceevaluationandcyberattackmitigationinablockchainenabledpeertopeerenergytradingframework AT akhilendrapratapsingh performanceevaluationandcyberattackmitigationinablockchainenabledpeertopeerenergytradingframework AT svsudha performanceevaluationandcyberattackmitigationinablockchainenabledpeertopeerenergytradingframework AT khemanthkumarreddy performanceevaluationandcyberattackmitigationinablockchainenabledpeertopeerenergytradingframework AT diptendusinharoy performanceevaluationandcyberattackmitigationinablockchainenabledpeertopeerenergytradingframework |