Provably Secure Architecture for Industrial Internet of Things in Smart Grid Based on Blockchain Technology

Samir M. Umran,Songfeng Lu,Zaid Ameen Abduljabbar,Vincent Omollo Nyangaresi,Mustafa A. Al Sibahee,Haider A. Al-Obaidi,Jianxin Zhu,Junjun Wu,Mu Wang
DOI: https://doi.org/10.2139/ssrn.4102688
2022-01-01
Abstract:There are numerous internet-connected devices attached to the electric grid, which enable the sharing of sensitive data through a new technology called the smart grid. Most of the suggested security mechanisms are vulnerable to cybersecurity attacks, have high computation and communication costs due to their reliance on cloud-based services, external trusted authorities, and centralized architectures. In our work, we propose a decentralized, lightweight, trusted and secure private network based on blockchain technology, for industrial application as an electric overhead circuit breaker in the electrical power grid of the Al-Kufa/Iraq power plant. The proposed scheme offers a double layer of data encryption; provides efficient access control to the sensitive data generated by electric circuit breaker sensors as well as addresses data aggregation operations, which are considered to be challenging in electric power smart grids. To enhance the computational performance and improve the latency, we utilize a multi-chain proof of rapid authentication as a consensus mechanism. The ARM Cortex-M33 microprocessor is utilized for its efficiency in terms of cryptographic algorithms, and this provides data encryption at the perceptual layer. Our experimental results show that the proposed scheme achieves excellent performance, scalability, a high level of security, real-time data processing, low power consumption (70.880Â mW), and low memory utilization (2.03 \% RAM and 0.9 \% flash memory) and execution time (0.7424 sec) for the cryptographic algorithm. Our architecture enables real-time data processing, autonomous network reconfiguration on-demand, boosts power quality, reduces power loss and efficiently shares the sensitive data between network participants in a secure and trustworthy environment.
What problem does this paper attempt to address?