Security Assumptions for Ubiquitous Secure Smart Grid Infrastructure using 2 Way Peg Blockchain and Fuzzy Specifications
Md. Shakilur Islam Sarker1, Ziaur Rahman2, SK. A. Shezan3, Md. Selim Hossain4, Md. Mahabub Hossain5

1Md. Shakilur Islam Sarker*, Mawlana Bhashani Science and Technology University, Tangail, Bangladesh.
2Ziaur Rahman, Mawlana Bhashani Science and Technology University, Tangail, Bangladesh.
3SK. A. Shezan, School of Engineering, RMIT University, Melbourne, Australia.
4Md. Selim Hossain, Lecturer in Department of Computer Science and Engineering at KhwajaYunus Ali University, Sirajganj, Bangladesh.
5Md. Mahabub Hossain, Department of Electronics and Communication Engineering, Hajee Mohammad Danesh Science and Technology University, Dinajpur, Bangladesh.
Manuscript received on January 18, 2020. | Revised Manuscript received on January 22, 2020. | Manuscript published on February 10, 2020. | PP: 748-755 | Volume-9 Issue-4, February 2020. | Retrieval Number: C8091019320/2020©BEIESP | DOI: 10.35940/ijitee.C8091.029420
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: The smart grid cyber-physical system and advanced metering infrastructure is an immensely growing term in industrial research based on the electrical power grid system and has uncovered an efficient paradigm for the power generation, transmission, and for the expenditure management as well. These systems allow home area networks and advanced metering infrastructure to communicate bi-directionally. False data injection is a new and climacteric security threat to the power grid to tamper such important data. However, these communication channels that the energy service interfaces provide two-way communication according to the central control unit. Thus, for the security and robustness of the grid, it is critical to separate the false or infected data. The existing protocol on this problem is based on state estimation which is less secure and computationally expensive. In this paper, we propose a 2-way peg blockchain security system by providing a digital signature scheme between home area network device (Smart Meter) and AMI server to get authorization, providing an infected data detection algorithm based on fuzzy rule specification and 2WP based blockchain protocol and finally infected performance reputation updating algorithm by computing the probability distribution of uncouth level to detect the infected or compromised the. We get more efficiency and security by performing a detailed analysis. 
Keywords:  2WP Blockchain, Infected data detection, Rules Specifications, Performance Reputation Updating.
Scope of the Article: Blockchain-enabled IoT Device and Data Security and Privacy