0% found this document useful (0 votes)
25 views

Block Chain Enabled Data Security Using Blowfish Algorithm in Smart Grid Network

Smart Grid provides a reliable and efficient end-toend delivery system. Data on each user's unique electricity consumption is given in real time. It also enables utilities to control and monitor the electrical system in real-time, helping them to reduce power outages. Users' privacy is a significant issue in addition to the usual security issues. Data about power usage may be used to infer private information about users by entities with access to the data. To solve these problems, a Block-Chain

Uploaded by

editor.ijdsai
Copyright
© Public Domain
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views

Block Chain Enabled Data Security Using Blowfish Algorithm in Smart Grid Network

Smart Grid provides a reliable and efficient end-toend delivery system. Data on each user's unique electricity consumption is given in real time. It also enables utilities to control and monitor the electrical system in real-time, helping them to reduce power outages. Users' privacy is a significant issue in addition to the usual security issues. Data about power usage may be used to infer private information about users by entities with access to the data. To solve these problems, a Block-Chain

Uploaded by

editor.ijdsai
Copyright
© Public Domain
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

International Journal of Data Science and Artificial Intelligence (IJDSAI)

Volume 02, Issue 03, May – June (2024)


RESEARCH ARTICLE

BLOCK CHAIN ENABLED DATA SECURITY


USING BLOWFISH ALGORITHM IN SMART
GRID NETWORK
R.C. Ilambirai 1, *, S. Lourdu Jame 2 and P.U. Poornima 3
1
Department of Electrical and Electronics Engineering, SRMIST, Kattankulathur, Chennai, Tamil Nadu, 603203 India.
2
Department of Electrical and Electronics Engineering, SRMIST, Kattankulathur, Chennai, Tamil Nadu, 603203 India.
3
Department of Electrical and Electronics Engineering, SRMIST, Kattankulathur, Chennai, Tamil Nadu, 603203 India.
*Corresponding e-mail: [email protected]

Abstract – Smart Grid provides a reliable and efficient end-to- In order to guarantee sufficient confidentiality, integrity,
end delivery system. Data on each user's unique electricity and availability, researchers are encouraged to look into
consumption is given in real time. It also enables utilities to viable methods while using such a large-scale network.
control and monitor the electrical system in real-time, helping Users' privacy is a significant issue in addition to the usual
them to reduce power outages. Users' privacy is a significant
issue in addition to the usual security issues. Data about power
security issues [8]. Data about power usage may be used to
usage may be used to infer private information about users by infer private information about users by entities with access
entities with access to the data. To solve these problems, a to the data. Detecting household gadgets and people [9],
Block-Chain-based Secure Smart Grid Network (BCS-SGN) profiling electric vehicles (EVs), and human location and
has been created, utilizing group signatures and covert channel activity patterns [10] are a few examples of this information.
permission to guarantee user validity. Initially, the data from
the smart grid network will be collected and encrypted using Differential privacy is a notable and commonly used
blowfish techniques. After encryption, the encrypted data will concept for formalizing data privacy [11]. It ensures that the
be stored in the block chain network, which also stores the presence or absence of an individual has no effect on the
transmission logs. In order to utilize the security controller, result by adding controlled randomness to the data.
smart contracts are analyzed using smart grid devices. DES, Moreover, "local" differential privacy is widely employed
AES, and BCS-SGN are widely used. Symmetric key algorithms since it doesn't need a trustworthy data curator. Since
are properly compared in this study. Additionally, the metrics blockchain doesn't save information on the identities of ENs
of encryption/decryption time, computational time, and
or group signatures, the model protects privacy from the
throughput are also compared. The percentage of the proposed
method, BCS-SGN, is 20%, AES is 15%, and DES is 12%.
standpoint of the signature.
These outcomes demonstrate that the proposed BCS-SGN These methods have significantly advanced the
outperforms other techniques. protection of the privacy of power usage data [12]. Other
Keywords – Smart grid, Smart contract, Blowfish Algorithm, Block techniques, such as homomorphic encryption and
chain. blockchain-based systems, have been utilized to protect the
anonymity of energy usage [13]. This work makes an effort
1. INTRODUCTION
to offer a comprehensive system that secures and maintains
The recent blooming expansion of the network, in both user privacy in smart grids without relying on a centralized
wired and wireless environments, has been the primary or reliable authority. The following list of contributions
driver of the smart grid as an emerging technology. As a might be used to summarize this work.
result of the interconnection-based environment, there are
• Initially the data from the smart grid network will
many different types of edge infrastructure or devices
available for energy service offers [1–3]. All electrical be collected and encrypted using blowfish
technique.
devices, smart meters, and other embedded systems with an
energy-related focus are connected on the Smart Grid • After Encryption the encrypted data will be stored
Network (SGN) platform [4]. A basic SGN can be set to have in the block chain network, which also stores the
network nodes that are multiple electric sources and different transmission logs. Smart contracts provide the most
user kinds [5–7]. As a result, network characteristics and secure approach because they operate on the
service model usage might result in governance and blockchain.
optimization. • This paper focused on privacy concerns related to
smart grids and offered an alternative that would

ISSN: 2584-1041 ©KITS PRESS Publications


R.C. Ilambirai et al. / IJDSAI, 02(03), 88-92, 2024

enhance data security while maintaining smart grid particular appliance, the study first determine the potential
performance. number of appliances used by a single user.
• Additionally, the metrics of encryption/decryption
In 2021 Xiao, L., et.al [16] suggested a simple identity
time, computational time, and throughput are
authentication technique, which uses elliptic curve
compared in order to evaluate the proposed method.
encryption (ECC) technology, suitable for smart grid
The remaining sections of the paper are arranged as environments. In the suggested protocol, the identity and key
follows. Section 2 offers a review of related work. The model information are encrypted using ECC, and the session's
design and the main suggested algorithms are then presented validity is checked using the timestamp. The cost analysis
in Sections 3 and 4, respectively. Additionally, Section 5 concludes by demonstrating that the suggested protocol is
provides analysis and evaluation outcomes. The profession is appropriate for implementation in large-scale intelligent
concluded in Section 6 lastly. smart grid setups since it has lower communication and
calculation costs than other relevant protocols.
2. LITERATURE SURVEY
In 2021 Zainab et al [17] suggested big data
The literature on privacy-preserving smart grid systems management, in which order to handle the data in the grid. In
has been reviewed. To deal with this problem, scholars have order to comprehend the sources and types of data in the grid,
employed a variety of methods and resources. data management tools and procedures have been used. The
In 2022 S., Jha, et.al [14] proposed a secure technique, report highlights the shortcomings of the current approaches
in which the availability of energy, financial and geared toward using large amounts of data from the smart
environmental security has been interconnected that also grid.
affects the development of people. The electric power 3. BLOCK CHAIN-BASED SECURE SMART GRID
industry should place a strong emphasis on comprehensive NETWORK
energy security, which is based on the security of power
grids. As a result, the conversion of energy for both essential In this study a novel Block Chain based Secure Smart
and end uses is intricately interwoven, necessitating a large- Grid Network (BCS-SGN) has been proposed. Initially the
scale energy plan. data from the smart grid network will be collected and
encrypted using blowfish techniques. After Encryption the
In 2022 Subhash, P., et.al [15] proposed a big data encrypted data will be stored in the block chain network,
framework, in the area of energy usage which has been which also stores the transmission logs. The proposed BCS-
influenced by the smart grid. The end-to-end, two-way SGN protects and upholds user privacy without depending
delivery method offered by Smart Grid is effective and on a centralized authority. The overall planned workflow is
dependable. Real-time data on a user's individual electricity shown in Figure 1.
usage is provided. In order to get the star rating for each

Figure 1. BCS-SGN framework


3.1 Blowfish Encrypted Algorithm into blocks of a predetermined length for encryption and
decoding. Data encryption and protection are made possible
Using the same secret key for both encryption and
with the help of the symmetric block cipher known as the
decryption, Blowfish is a symmetric encryption method.
Blowfish.
Another block cipher is Blowfish, which separates a message

89
R.C. Ilambirai et al. / IJDSAI, 02(03), 88-92, 2024

3.1.1 Data Encrypted Algorithm mimic procedures and perform MatLab algorithms on
historical blockchain data. one gigabyte of RAM at minimum
The procedure repeats fifteen times, exchanging the two
and sixty gigabytes of disk space at most for each worker.
32-bit segments (L and R) as the XOR operation is
The assessment of the suggested methods performance is
completed. The ciphertext is generated by performing an
provided in this part. DES is a well-known algorithm, and the
XOR calculation with the remaining P array and computing
performance of AES was compared to the previously
the cipher function following the fifteenth iteration. This
recommended methods, BCS-SGN.
algorithm, which uses S-boxes, is thought to have its most
complicated component in the computation of the cipher
function. The following algorithms are shown Table 1.
Table 1. Data Encrypted Algorithm
Algorithm 1: Data Encryption
Divide 64 bits in to two 32bit
Halves:1to 16
For i=1 to 16
XL=XL XOR Pi
XR=F(XL)XOR XR
Swap XL and XR
Swap XL and XR
XR=XR XOR P17
XL=XL XOR P18 Figure 2. Encryption time
Concatenate XL and XR A graph comparing the encryption times the encryption
part's graphical comparison is shown in Figure. 2. A nearly
proposed approach from the Blowfish algorithm.
3.2 Block chain Smart Contract
The blockchain server where smart contracts are
deployed is called the smart contract. Our model takes into
account the practicality of applying blockchain technology
so that a smart contract will determine the best course of
action for energy allocations. We create dynamic
programming in order to generate the best possible solution
for the distribution of energy resources while taking into
account three factors: communication security, latency time,
and energy consumption. The smart contract is used to
broadcast the operations, allowing each edge node to inform
the node operator about how well it predicts it will handle the
next request.
3.3 Block chain Figure 3. Decryption time
A blockchain system that uses a layer of authorization to Figure 3 displays a graphical comparison of the
establish the scope of users or voters and grant access to the decryption section. The suggested method outperforms the
system to that target group is known as a permissioned Blowfish algorithm.
blockchain. The platform for data storage that our model
chooses is a permissioned blockchain for two main reasons.
A key factor in the development of our approach is the
potential of blockchain to protect privacy. According to our
observations, a permissionless blockchain is not ideal
considering that the user groups in the smart grid energy
trading scenario are mostly internal entities connected via
SGNs with a very constant identification state.
4. RESULT AND DISCUSSION
The performance of the Novel BlockChain-based Secure
Smart Grid Network (BCS-SGN) has been discussed in this
section. Matlab is one program that can be used to simulate
the blockchain process. This can be used to spread the
blockchain and mine blocks with incorrect hashes for testing, Figure 4. Computational time comparison
as multiple nodes can carry out the activity in the simulation.
With Matlab, one gigabyte of RAM at minimum and sixty
gigabytes of disk space at most are available for each worker.

90
R.C. Ilambirai et al. / IJDSAI, 02(03), 88-92, 2024

In Figure. 4, the bit number of the relevant characteristic, REFERENCES


l, is directly correlated with the computational overheads of
[1] Y. Dai, D. Xu, S. Maharjan, Z. Chen, Q. He, and Y. Zhang,
Extension. “Blockchain and deep reinforcement learning empowered
intelligent 5g beyond”, IEEE Network, pp. 99, no. 1, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[2] S. Wang, X. Zhang, Y. Zhang, L. Wang, J. Yang, and W.
Wang, “A survey on mobile edge networks: Convergence of
computing, caching and communications”, IEEE Access, vol.
5, pp. 6757–6779, 2017. [CrossRef] [Google Scholar]
[Publisher Link]
[3] S. Maharjan, Q. Zhu, Y. Zhang, S. Gjessing, and T. Basar,
“Dependable demand response management in the smart grid:
A stackelberg game approach,” IEEE Transactions on Smart
Grid, vol. 4, no. 1, pp. 120–132, 2013. [CrossRef] [Google
Scholar] [Publisher Link]
[4] N. Nikmehr and S. Ravadanegh, “Optimal power dispatch of
multimicrogrids at future smart distribution grids”, IEEE
Transactions on Smart Grid, vol. 6, no. 4, pp. 1648–1657,
Figure 5. Throughput 2015. [CrossRef] [Google Scholar] [Publisher Link]
[5] Y. Zhang, R. Yu, M. Nekovee, Y. Liu, S. Xie, and S. Gjessing,
In Figure. 5, the quantity of data or information moving “Cognitive machine-to-machine communications: visions and
from one location to another is known as throughput. By potentials for the smart grid”, IEEE Network, vol. 26, no. 3,
combining the total number of plaintexts in megabytes by the 2012. [CrossRef] [Google Scholar] [Publisher Link]
entire amount of time needed to complete each encryption [6] K. Wang, Y. Wang, X. Hu, Y. Sun, D. Deng, A. Vinel, and Y.
step, the throughput of an encryption system can be Zhang, “Wireless big data computing in smart grid”, IEEE
computed. Wireless Communications, vol. 24, no. 2, pp. 58–64, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
5. CONCLUSION [7] Y. Zhang, R. Yu, S. Xie, W. Yao, Y. Xiao, and M. Guizani,
“Home M2M networks: architectures, standards, and QoS
In this paper, a novel blockchain-based smart grid improvement”, IEEE Communications Magazine, vol. 49, no.
network (BCS-SGN) has been created, utilizing group 4, pp. 44–52, 2011. [CrossRef] [Google Scholar] [Publisher
signatures and covert channel permission to guarantee user Link]
validity. Initially, the data from the smart grid network will [8] Y. Cai, Y. Cao, Y. Li, T. Huang, and B. Zhou, “Cascading
be collected and encrypted using blowfish techniques. After failure analysis considering interaction between power grids
encryption, the encrypted data will be stored in the block and communication networks”, IEEE Transactions on Smart
chain network, which also stores the transmission logs. In Grid, vol. 7, no. 1, pp. 530– 538, 2016. [CrossRef] [Google
order to utilize the security controller, smart contracts are Scholar] [Publisher Link]
[9] K. Gai, M. Qiu, Z. Ming, H. Zhao, and L. Qiu. Spoofing-
analyzed using smart grid devices. DES, AES, BCS-SGN, jamming attack strategy using optimal power distributions in
and the other four widely used symmetric key algorithms are wireless smart grid networks. IEEE Transactions on Smart
properly compared in this study. Additionally, the metrics of Grid, vol. 8, no. 5, pp. 2431– 2439, 2017. [CrossRef] [Google
encryption/decryption time, computational time, and Scholar] [Publisher Link]
throughput are also compared. The percentage of the [10] G. Liang, J. Zhao, F. Luo, S. Weller, and Z. Dong, “A review
proposed method, BCS-SGN, is 20%, AES is 15%, and DES of false data injection attacks against modern power systems”,
is 12%. These outcomes demonstrate that the proposed BCS- IEEE Transactions on Smart Grid, vol. 8, no. 4, pp. 1630–
SGN outperforms other techniques. This study concludes 1638, 2017. [CrossRef] [Google Scholar] [Publisher Link]
with a number of recommendations for additional research. [11] K. Gai, M. Qiu, Z. Ming, H. Zhao, and L. Qiu, “Spoofing-
jamming attack strategy using optimal power distributions in
The suggested algorithm needs to be improved upon or wireless smart grid networks”, IEEE Transactions on Smart
supported by additional research. Grid, vol. 8, no. 5, pp. 2431– 2439, 2017. [CrossRef] [Google
CONFLICTS OF INTEREST Scholar] [Publisher Link]
[12] P. McDaniel and S. McLaughlin, “Security and privacy
The authors declare that they have no known competing challenges in the smart grid”, IEEE Security & Privacy, vol. 3,
financial interests or personal relationships that could have no. 75–77, 2009. [CrossRef] [Google Scholar] [Publisher
appeared to influence the work reported in this paper. Link]
[13] M. Khan and K. Salah, “Iot security: Review, blockchain
FUNDING STATEMENT solutions, and open challenges”, Future Generation Computer
Systems, vol. 82, pp. 395– 411, 2018. [CrossRef] [Google
Not applicable. Scholar] [Publisher Link]
ACKNOWLEDGEMENTS [14] S. Jha, H.A. Abdeljaber, M.K. Imam Rahmani, M.M. Waris,
A. Singh, and M. Yaseen, “An Integration of IoT, IoC, and IoE
The author would like to express his heartfelt gratitude towards building a green society”, Scientific Programming,
to the supervisor for his guidance and unwavering support 2022 [CrossRef] [Google Scholar] [Publisher Link]
during this research for his guidance and support. [15] P. Subhash, K.S. Surya, and A.B. Reddy, “Analysis of Smart
Grid Data for Appliance Prediction and Efficient Power
Consumption”, In 2022 International Conference on Recent
Trends in Microelectronics, Automation, Computing and

91
R.C. Ilambirai et al. / IJDSAI, 02(03), 88-92, 2024

Communications Systems (ICMACC) pp. 1-5, 2022. IEEE.


[CrossRef] [Google Scholar] [Publisher Link] S. Lourdu Jame is working as an Assistant
[16] L. Xiao, J. Cai, M. Qiu, and M. Liu, “A Secure Identity Professor in the Department of Electrical and
Electronics Engineering in SRM Institute of Science
Authentication Protocol for Edge Data in Smart Grid
and Technology. She completed her B.E Electrical
Environment”, In 2021 8th IEEE International Conference on and Electronics Engineering in the year 2010,
Cyber Security and Cloud Computing (CSCloud)/2021 7th M.Tech in the year 2012 and Ph.D in the year 2023.
IEEE International Conference on Edge Computing and The total professional experience is 11 years. Her
Scalable Cloud (EdgeCom), pp. 188-193, 2021. IEEE. areas of specialization are Thermoelectric Generator,
[CrossRef] [Google Scholar] [Publisher Link] Energy storage, Energy conservation. She has published 12 international
[17] A. Zainab, A. Ghrayeb, D. Syed, H. Abu-Rub, S.S. Refaat, and publications among which 2 are SCI indexed journals. She is a life member
O. Bouhali, “Big data management in smart grids: of IEEE.
Technologies and challenges”, IEEE Access, vol. 9, pp.73046-
73059, 2021. [CrossRef] [Google Scholar] [Publisher Link] P.U. Poornima obtained her B.Tech in the Electrical
and Electronics Engineering in 2003 under JNTU,
Hyderabad and M.Tech in Power Electronics in 2005
AUTHORS from VIT University, Vellore and Ph.d in 2022 from
SRMIST, Tamilnadu, India. She is working as an
Assistant Professor in Electrical &Electronics
R.C. Ilambirai completed her B.E degree in the Engineering, SRM Institute of Science and
Department of Electrical and Electronics Engineering Technology, Chennai. Her research areas of interests
in 2002, M.Tech in Power Electronics in 2004 and her are Integration of renewable energy sources, Inverters, Converters, Drives
research in 2022 all from Tamilnadu, India.She is applications etc. She has published 10 research papers in international
working as an Assistant Professor in the Department journals and presented four papers in International and National
of Electrical and Electronics Engineering, SRM conferences. She is a life member of IEI and member of IEEE.
Institute of Science and Technology, Chennai,
Tamilnadu, India.She has a good expertise in the field
of inverters, dc-dc power converters, integration of converters with
renewable energy sources, their applications etc. Overall, she has published Arrived: 05.05.2024
18 papers in International Journals and 8 Conference publications. She is a
life member of MISTE, MIEI and member of IEEE. Accepted: 17.06.2024

92

You might also like