计算机科学 ›› 2024, Vol. 51 ›› Issue (11A): 231100178-8.doi: 10.11896/jsjkx.231100178
马军伟1, 潘秀魁2, 王玉琪2, 巫健1, 杜锋1
MA Junwei1, PAN Xiukui2, WANG Yuqi2, WU Jian1, DU Feng1
摘要: 智能物联网的高速发展使得电网中的电力信息资源能够实现高效聚合。区块链技术的不可篡改性、透明性、高可用性,使得共享信息变得更加安全和高效。随着能源电力市场的开放,负荷调控、优化配置等需求日益迫切。在信息收集阶段可以通过电网中的智能设备收集电力数据,但在电力数据调度阶段存在信息共享壁垒、虚假信息威胁等问题,严重影响调度效益。为此,设计一种基于区块链的可靠电力数据调度方案。该方案利用区块链实现调度信息共享,链下设计适用于电力调度场景的智能终端设备准入机制,将调度风险规避在链下;设计基于数据可靠性评估的电力数据发布方法及基于效益理论的多策略调度模型,保障上链数据的可靠性,实现数据调度风险的可控;设计基于动静态评价结合的信任更新计算方法,实现用户调度行为量化上链。通过对调度成功率、系统总收益等指标进行仿真实验,验证了该方案的有效性。
中图分类号:
[1]ZHANG Y,WANG A H,ZHANG H.Overview of smart grid development in China[J].Power System Protection and Control,2021,49(5):180-187. [2]CHEN J,LI X D,LU B.Point To Point Power Market Modeand Behavior Evolution from the Perspective of Cooperative Alliance[J].Power System Technology,2023,47(8):3227-3238. [3]ZHANG Y,WANG L Z,WU J,et al.Blockchain and Integrated Energy System:Appl- ication and Prospect[J].Fundamental Research Science Foundation in China,2020,34(1):31-37. [4]WANG H R,FU J,LIU J R.Encryption and sharing of power grid comprehensive operation and maintenance information under multi-level access security[J],Information Technology,2023(8):88-93. [5]LIANG Y L,LING J.Encrypted Data Sharing Scheme in Cloud Storage Based on Blockchain[J].Computer Engineering and Applications,2020,56(17):41-47. [6]GAO Z X,FAN Z Y.The application research of electrical engineering technology in the construction of smart grids[J].China Plant Engineering,2023(18):26-28. [7]ZHAOW,QI Q,ZHOU J,et al.Blockchain-Based Applications for Smart Grids:An Umbrella Review[J].Energies,2023,16(17). [8]YU X B,ZHENG D D.Application and exploration of blockchain technology in energy and electricity[J].Huadian Techno-logy,2020,42(8):17-23. [9]WEN Y D.Analysis on Distributed Energy Trading Mechanism in West Inner MongoliaPower Market Under Background of New Power System[J].Inner Mongolia Electric Power,2023,41(3):78-85. [10]LIU C,WANG S J,ZHAO Y L,et al.Review of the Application of Blockchain Technology in Virtual Power Plant Transactions[J].Electric Power Construction,2023,44(4):130-144. [11]ZHANGG Y,SUN R H,MA C G,et al.Survey of Sensor Networks Management and Authentication[J].Computer Science,2010,37(2):1-6,11. [12]LUO X,XUE K,XU J,et al.Blockchain Based Secure Data Aggregation and Distributed Power Dispatching for Microgrids[J].IEEE Transactions on Smart Grid,2021,PP(99):1-1. [13]XU Y,LIU Z,ZHANG C,et al.Blockchain-based trustworthyenergy dispatching approach for high renewable energy penetrated power systems[J].IEEE Internet of Things Journal,2022,9(12):10036-10047. [14]LI X,WU F,KUMARI S,et al.A Provably Secure and Anonymous Message Authentication Scheme for Smart Grids[J].Journal of Parallel and Distributed Computing,2019,132(OCT.):242-249. [15]LI X.A Provably Secure and Anonymous Message Authentication Scheme for Smart Grids[J].Journal of Parallel and Distri-buted Computing,2019,132(OCT.):242-249. [16]FIRDAUS A,AB RAZAK M F,FEIZOLLAH A,et al.The rise of “blockchain”:bibliometric analysis of blockchain study[J].Scientometrics,2019,120(3):1289-1331. [17]LIU C,WANG S J,ZHAO Y L,et al.Review of the Application of Blockchain Technology in Virtual Power Plant Transactions[J].Electric Power Construction,2023,44(4):130-144. [18]ZHAO T J,KAN T,HE B,et al.Smart Grid Security Analysis under Blockchain[J].Electronic Components and Information Technology,2023,7(2):6-9. [19]SHUAI W,YONG Y,WANG X,et al.An Overview of Smart Contract:Architecture,Applications,and Future Trends[C]// 2018 IEEE Intelligent Vehicles Symposium(IV).IEEE,2018. [20]ZHOU J,YE L P,NI Y Y,et al.Review of Intelligent Contract[J].China New Telecommunications,2021,23(3):37-39. [21]NEUMANN J V.Theory of games and economic behavior[M].Princeton University Press,1944. [22]JIANG M J,WANG W T.Risk quantification and security bene-fit assessment of clean energygrid connected to power system considering energy storage power stations [J].Power Demand Side Management,2021,23(2):52-57. [23]WU X.Trust management technology in cloud computing environments[M].Beijing:Beijing University of Posts and Telecommunications Press,2015:202. [24]GARBIS J,CHAPMAN J W.Zero Trust Security:An Enterprise Guide [M].Berkeley,USA:Apress,2021. [25]DU Z H.Research and Application of a Borderless Zero Trust Network under the “Internet Plus” Background[J].Modern Information Technology,2021,5(6):153-157. [26]KOU W Z,HE S Y.PKI technology-based network securityplatform design [J].Information Recording Materials,2022,23(9):102-105. [27]HAMMI B,MONTEUUIS J,PETIT J.PKIs in C-ITS:Security functions,architectures and projects:A survey[J].Vehicular Communications,2022,38. [28]WEN X B,ZHENG Y.Algorithm Simulation Applied to Cloud SecurityCredibility Detection of Internet of Things[J].Compu-ter Simulation,2022,39(5):225-228. [29]VERGNAUD D.Comment on efficient and secure outsourcing scheme for RSA decryption in internet of things[J].IEEE Internet of Things Journal,2020,7(11):11327-11329. [30]DESAIS S,NENE M J.Multihop trust evaluation using memory integrity in wireless sensor networks[J].IEEE Transactions on Information Forensics and Security,2021,16:4092-4100 [31]DESAIS S,NENE M J.Node-level trust evaluation in wireless sensor networks[J].IEEE Transactions on Information Forensics and Security,2019,14(8):2139-2152. |
|