Skip to main content

Table 13 Blockchain-based safe energy trading techniques

From: Data-driven next-generation smart grid towards sustainable energy evolution: techniques and technology review

Application

Used technical approaches

Description

Type

Advantages

Disadvantages

Transactive energy [230]

Smart Contract

Enabling DERs to trade energy quickly and securely via blockchain-based AMI

Public Blockchain

No intermediaries or brokers needed for agreement confirmation which eliminates third party interference

Difficult to change the error and chance of loopholes

Decentralized Demand Response Regulation Program [231]

Smart Contract, Proof of Stake (PoS), Ethereum platform

A distributed system with blockchain technology to store smart meter data and use it to balance supply and demand

Public Blockchain

High scalability with fast transactions

Privacy security is poor

Transparent and Traceable Energy [232]

Smart Contract Group signature, Edge computing, Covert Channel Authorization Technique, Pseudo names, Voting-based consensus

Using an authorized blockchain in a SG to assure privacy as well as energy security (traceable and transparent energy usage

Permissioned Blockchain

Better response time and less latency between all devices

Large storage capacity is needed which drives up cost

Information on Energy demand and supply [233]

Smart Contract, PoS consensus, Lagrange Relaxation algorithm

A privacy protecting efficient scheduling strategy is used for energy service providers

N/A

Removes different grid constraints

Requires multiple iterations for a good result

Peer-to-peer (P2P) energy trading [234]

E-wallet (Credit-based), Stackelberg Game Theory

Decentralized power trading between producers and consumers and consumers, support for renewable energy production

Consortium Blockchain

Provides strong security for data

Not suitable for large scale energy trading

DCT (Decentralized energy trading) and cost [235]

Proof of Work (PoW), Multi-signature, Anonymous Messaging Streams, Elliptic Curve Digital Signature Algorithm (ECDSA)

Implementation of secure energy exchanges enabled by blockchain and confidentiality strategies for energy price negotiation

N/A

Overcomes transaction limitations and ensures optimal pricing

Extreme scenarios are not tested

SG Energy Trading [236]

Smart Contract, PoS

A blockchain consortium with effective, adaptable, and protected energy trading

Consortium Blockchain

Ensures transaction security without relying on third party

Large scale data replication faces problems

Energy trading in Vehicle to Grid (V2G) configuration [237]

PBFT consensus mechanism, (Elliptic curve cryptography)

An EV incentive program with multilevel authentication scheme enabled by blockchain for energy transactions on V2G networks

Consortium Blockchain

No risk of centralization of data because of increased frequency of transaction

Security implementation for lengthy datasets faces difficulty

Power trading between Electric Vehicles [238]

Smart contracts, Energy Coins

Privacy protection and trading of surplus energy between for EVs

Consortium Blockchain

Faster processing time with reduced cost

The data are immutable throughout the whole process

P2P power trading [239]

Smart contract, Redundant Byzantine Fault Tolerance (RBFT)

An industrial control architecture based on blockchain to guarantee effective data, an ICS BlockOpS system consistency

Permissioned Blockchain

A robust system is used for ensuring increased security

Efficiency falls in the case of closed loop system

Commercial Cyber-Physica System [240]

Access Control Lists (ACL), PoW

Blockchain is used widely for access control list in cost per sale

Private Blockchain

High security with simple mechanism

Requires high energy usage

EV charging providers [241]

Contract theory, Reputation based DBFT consensus, Smart Contract

Blockchain is widely used in EV charging

Permissioned Blockchain

Decreased tolerance towards malicious users strengthens overall security

Multi-operator market is not tested

Safety and Privacy protecting technique [242]

Bloom Filter, Data Aggregation, authentication techniques

User data privacy and protection

Private Blockchain

Proper utilization of space removes false results

Cannot remove or delete input data

Power Production and Distribution [243]

Smart contract, dApps, control of distortion using power electronics devices

Ensure defense from cyber-attacks and abnormality control assessment

Consortium Blockchain

Better adaptability with extra privacy protection for users’ data

Difficulty arises in maintenance and scaling