-
Repeat-Authenticate Scheme for Multicasting of Blockchain Information in IoT Systems
Authors:
Pietro Danzi,
Anders E. Kalør,
Čedomir Stefanović,
Petar Popovski
Abstract:
We study the problem of efficiently disseminating authenticated blockchain information from blockchain nodes (servers) to Internet of Things (IoT) devices, through a wireless base station (BS). In existing blockchain protocols, upon generation of a new block, each IoT device receives a copy of the block header, authenticated via digital signature by one or more trusted servers. Since it relies on…
▽ More
We study the problem of efficiently disseminating authenticated blockchain information from blockchain nodes (servers) to Internet of Things (IoT) devices, through a wireless base station (BS). In existing blockchain protocols, upon generation of a new block, each IoT device receives a copy of the block header, authenticated via digital signature by one or more trusted servers. Since it relies on unicast transmissions, the required communication resources grow linearly with the number of IoT devices. We propose a more efficient scheme, in which a single copy of each block header is multicasted, together with the signatures of servers. In addition, if IoT devices tolerate a delay, we exploit the blockchain structure to amortize the authentication in time, by transmitting only a subset of signature in each block period. Finally, the BS sends redundant information, via a repetition code, to deal with the unreliable wireless channel, with the aim of decreasing the amount of feedback required from IoT devices. Our analysis shows the trade-off between timely authentication of blocks and reliability of the communication, depending on the packet loss rate offered by the channel. The numerical results show that the performance benefits of the proposed scheme makes it a viable starting point for designing new lightweight protocols for blockchains.
△ Less
Submitted 10 December, 2019; v1 submitted 15 April, 2019;
originally announced April 2019.
-
Communication Aspects of the Integration of Wireless IoT Devices with Distributed Ledger Technology
Authors:
Pietro Danzi,
Anders E. Kalør,
René B. Sørensen,
Alexander K. Hagelskjær,
Lam D. Nguyen,
Čedomir Stefanović,
Petar Popovski
Abstract:
The pervasive need to safely share and store information between devices calls for the replacement of centralized trust architectures with the decentralized ones. Distributed Ledger Technologies (DLTs) are seen as the most promising enabler of decentralized trust, but they still lack technological maturity and their successful adoption depends on the understanding of the fundamental design trade-o…
▽ More
The pervasive need to safely share and store information between devices calls for the replacement of centralized trust architectures with the decentralized ones. Distributed Ledger Technologies (DLTs) are seen as the most promising enabler of decentralized trust, but they still lack technological maturity and their successful adoption depends on the understanding of the fundamental design trade-offs and their reflection in the actual technical design. This work focuses on the challenges and potential solutions for an effective integration of DLTs in the context of Internet-of-Things (IoT). We first introduce the landscape of IoT applications and discuss the limitations and opportunities offered by DLTs. Then, we review the technical challenges encountered in the integration of resource-constrained devices with distributed trust networks. We describe the common traits of lightweight synchronization protocols, and propose a novel classification, rooted in the IoT perspective. We identify the need of receiving ledger information at the endpoint devices, implying a two-way data exchange that contrasts with the conventional uplink-oriented communication technologies intended for IoT systems.
△ Less
Submitted 5 March, 2019;
originally announced March 2019.
-
Delay and Communication Tradeoffs for Blockchain Systems with Lightweight IoT Clients
Authors:
Pietro Danzi,
Anders E. Kalør,
Čedomir Stefanović,
Petar Popovski
Abstract:
The emerging blockchain protocols provide a decentralized architecture that is suitable of supporting Internet of Things (IoT) interactions. However, kee** a local copy of the blockchain ledger is infeasible for low-power and memory-constrained devices. For this reason, they are equipped with lightweight software implementations that only download the useful data structures, e.g. state of accoun…
▽ More
The emerging blockchain protocols provide a decentralized architecture that is suitable of supporting Internet of Things (IoT) interactions. However, kee** a local copy of the blockchain ledger is infeasible for low-power and memory-constrained devices. For this reason, they are equipped with lightweight software implementations that only download the useful data structures, e.g. state of accounts, from the blockchain network, when they are updated. In this paper, we consider and analyze a novel scheme, implemented by the nodes of the blockchain network, which aggregates the blockchain data in periodic updates and further reduces the communication cost of the connected IoT devices. We show that the aggregation period should be selected based on the channel quality, the offered rate, and the statistics of updates of the useful data structures. The results, obtained for the Ethereum protocol, illustrate the benefits of the aggregation scheme in terms of a reduced duty cycle of the device, particularly for low signal-to-noise ratios, and the overall reduction of the amount of information transmitted in downlink (e.g., from the wireless base station to the IoT device). A potential application of the proposed scheme is to let the IoT device request more information than actually needed, hence increasing its privacy, while kee** the communication cost constant. In conclusion, our work is the first to provide rigorous guidelines for the design of lightweight blockchain protocols with wireless connectivity.
△ Less
Submitted 17 October, 2018; v1 submitted 19 July, 2018;
originally announced July 2018.
-
Software-Defined Microgrid Control for Resilience Against Cyber Attacks
Authors:
Pietro Danzi,
Marko Angjelichinoski,
Čedomir Stefanović,
Tomislav Dragičević,
Petar Popovski
Abstract:
Microgrids (MGs) rely on networked control supported by off-the-shelf wireless communications. This makes them vulnerable to cyber-attacks, such as denial-of-service (DoS). In this paper, we mitigate those attacks by applying the concepts of (i) separation of data plane from network control plane, inspired by the software defined networking (SDN) paradigm, and (ii) agile reconfiguration of the dat…
▽ More
Microgrids (MGs) rely on networked control supported by off-the-shelf wireless communications. This makes them vulnerable to cyber-attacks, such as denial-of-service (DoS). In this paper, we mitigate those attacks by applying the concepts of (i) separation of data plane from network control plane, inspired by the software defined networking (SDN) paradigm, and (ii) agile reconfiguration of the data plane connections. In our architecture, all generators operate as either voltage regulators (active agents), or current sources (passive agents), with their operating mode being locally determined, according the global information on the MG state. The software-defined MG control utilizes the fact that, besides the data exchange on the wireless channel, the power-grid bus can be used to create side communication channels that carry control plane information about the state of the MG. For this purpose, we adopt power talk, a modem-less, low-rate, power-line communication designed for direct current (DC) MGs. The results show that the proposed software-defined MG offers superior performance compared to the static MG, as well as resilience against cyber attacks.
△ Less
Submitted 8 February, 2018;
originally announced February 2018.
-
Analysis of the Communication Traffic for Blockchain Synchronization of IoT Devices
Authors:
Pietro Danzi,
Anders Ellersgaard Kalør,
Čedomir Stefanović,
Petar Popovski
Abstract:
Blockchain is a technology uniquely suited to support massive number of transactions and smart contracts within the Internet of Things (IoT) ecosystem, thanks to the decentralized accounting mechanism. In a blockchain network, the states of the accounts are stored and updated by the validator nodes, interconnected in a peer-to-peer fashion. IoT devices are characterized by relatively low computing…
▽ More
Blockchain is a technology uniquely suited to support massive number of transactions and smart contracts within the Internet of Things (IoT) ecosystem, thanks to the decentralized accounting mechanism. In a blockchain network, the states of the accounts are stored and updated by the validator nodes, interconnected in a peer-to-peer fashion. IoT devices are characterized by relatively low computing capabilities and low power consumption, as well as sporadic and low-bandwidth wireless connectivity. An IoT device connects to one or more validator nodes to observe or modify the state of the accounts. In order to interact with the most recent state of accounts, a device needs to be synchronized with the blockchain copy stored by the validator nodes. In this work, we describe general architectures and synchronization protocols that enable synchronization of the IoT endpoints to the blockchain, with different communication costs and security levels. We model and analytically characterize the traffic generated by the synchronization protocols, and also investigate the power consumption and synchronization trade-off via numerical simulations. To the best of our knowledge, this is the first study that rigorously models the role of wireless connectivity in blockchain-powered IoT systems.
△ Less
Submitted 12 February, 2018; v1 submitted 1 November, 2017;
originally announced November 2017.
-
Distributed Proportional-Fairness Control in MicroGrids via Blockchain Smart Contracts
Authors:
Pietro Danzi,
Marko Angjelichinoski,
Čedomir Stefanović,
Petar Popovski
Abstract:
Residential microgrids (MGs) may host a large number of Distributed Energy Resources (DERs). The strategy that maximizes the revenue for each individual DER is the one in which the DER operates at capacity, injecting all available power into the grid. However, when the DER penetration is high and the consumption low, this strategy may lead to power surplus that causes voltage increase over recomme…
▽ More
Residential microgrids (MGs) may host a large number of Distributed Energy Resources (DERs). The strategy that maximizes the revenue for each individual DER is the one in which the DER operates at capacity, injecting all available power into the grid. However, when the DER penetration is high and the consumption low, this strategy may lead to power surplus that causes voltage increase over recommended limits. In order to create incentives for the DER to operate below capacity, we propose a proportional-fairness control strategy in which (i) a subset of DERs decrease their own power output, sacrificing the individual revenue, and (ii) the DERs in the subset are dynamically selected based on the record of their control history. The trustworthy implementation of the scheme is carried out through a custom-designed blockchain mechanism that maintains a distributed database trusted by all DERs. In particular, the blockchain is used to stipulate and store a smart contract that enforces proportional fairness. The simulation results verify the potential of the proposed framework.
△ Less
Submitted 16 May, 2017; v1 submitted 3 May, 2017;
originally announced May 2017.
-
Secure and Resilient Low-Rate Connectivity for Smart Energy Applications through Power Talk in DC Microgrids
Authors:
Cedomir Stefanovic,
Marko Angjelichinoski,
Pietro Danzi,
Petar Popovski
Abstract:
The future smart grid is envisioned as a network of interconnected microgrids (MGs) - small-scale local power networks comprising generators, storage capacities and loads. MGs bring unprecedented modularity, efficiency, sustainability, and resilience to the power grid as a whole. Due to the high share of renewable generation, MGs require innovative concepts for control and optimization, giving ris…
▽ More
The future smart grid is envisioned as a network of interconnected microgrids (MGs) - small-scale local power networks comprising generators, storage capacities and loads. MGs bring unprecedented modularity, efficiency, sustainability, and resilience to the power grid as a whole. Due to the high share of renewable generation, MGs require innovative concepts for control and optimization, giving rise to a novel class of smart energy applications, in which communications represent an integral part. In this paper, we review power talk, a communication technique specifically developed for direct current MGs, which exploits the communication potential residing within the MG power equipment. Depending on the smart energy application, power talk can be used either as a primary communication enabler, or an auxiliary communication system that provides resilient and secure operation. The key advantage of power talk is that it derives its availability, reliability, and security from the very MG elements, outmatching standard, off-the shelf communication solutions.
△ Less
Submitted 29 March, 2017;
originally announced March 2017.
-
Anti-Jamming Strategy for Distributed Microgrid Control based on Power Talk Communication
Authors:
Pietro Danzi,
Marko Angjelichinoski,
Čedomir Stefanović,
Petar Popovski
Abstract:
In standard implementations of distributed secondary control for DC MicroGrids (MGs), the exchange of local measurements among neighboring control agents is enabled via off-the-shelf wireless solutions, such as IEEE 802.11. However, Denial of Service (DoS) attacks on the wireless interface through jamming prevents the secondary control system from performing its main tasks, which might compromise…
▽ More
In standard implementations of distributed secondary control for DC MicroGrids (MGs), the exchange of local measurements among neighboring control agents is enabled via off-the-shelf wireless solutions, such as IEEE 802.11. However, Denial of Service (DoS) attacks on the wireless interface through jamming prevents the secondary control system from performing its main tasks, which might compromise the stability of the MG. In this paper, we propose novel, robust and secure secondary control reconfiguration strategy, tailored to counteract DoS attacks. Specifically, upon detecting the impairment of the wireless interface, the jammed secondary control agent notifies its peers via a secure, low-rate powerline channel based on Power Talk communication. This triggers reconfiguration of the wireless communication graph through primary control mode switching, where the jammed agents leave the secondary control by switching to current source mode, and are replaced by nonjammed current sources that switch to voltage source mode and join the secondary control. The strategy fits within the software-defined networking framework, where the network control is split from the data plane using reliable and secure side power talk communication channel, created via software modification of the MG primary control loops. The simulation results illustrate the feasibility of the solution and prove that the MG resilience and performance can be indeed improved via software-defined networking approaches.
△ Less
Submitted 22 December, 2016; v1 submitted 21 December, 2016;
originally announced December 2016.
-
Secure and Robust Authentication for DC MicroGrids based on Power Talk Communication
Authors:
Marko Angjelichinoski,
Pietro Danzi,
Čedomir Stefanović,
Petar Popovski
Abstract:
We propose a novel framework for secure and reliable authentication of Distributed Energy Resources to the centralized secondary/tertiary control system of a DC MicroGrid (MG), networked using the IEEE 802.11 wireless interface. The key idea is to perform the authentication using power talk, which is a powerline communication technique executed by the primary control loops of the power electronic…
▽ More
We propose a novel framework for secure and reliable authentication of Distributed Energy Resources to the centralized secondary/tertiary control system of a DC MicroGrid (MG), networked using the IEEE 802.11 wireless interface. The key idea is to perform the authentication using power talk, which is a powerline communication technique executed by the primary control loops of the power electronic converters, without the use of a dedicated hardware for its modem. In addition, the scheme also promotes direct and active participation of the control system in the authentication process, a feature not commonly encountered in current networked control systems for MicroGrids. The PLECS-based simulations verifies the viability of our scheme.
△ Less
Submitted 22 December, 2016; v1 submitted 21 December, 2016;
originally announced December 2016.
-
On the Impact of Wireless Jamming on the Distributed Secondary Microgrid Control
Authors:
Pietro Danzi,
Cedomir Stefanovic,
Lexuan Meng,
Josep M. Guerrero,
Petar Popovski
Abstract:
The secondary control in direct current microgrids (MGs) is used to restore the voltage deviations caused by the primary droop control, where the latter is implemented locally in each distributed generator and reacts to load variations. Numerous recent works propose to implement the secondary control in a distributed fashion, relying on a communication system to achieve consensus among MG units. T…
▽ More
The secondary control in direct current microgrids (MGs) is used to restore the voltage deviations caused by the primary droop control, where the latter is implemented locally in each distributed generator and reacts to load variations. Numerous recent works propose to implement the secondary control in a distributed fashion, relying on a communication system to achieve consensus among MG units. This paper shows that, if the system is not designed to cope with adversary communication impairments, then a malicious attacker can apply a simple jamming of a few units of the MG and thus compromise the secondary MG control. Compared to other denial-of-service attacks that are oriented against the tertiary control, such as economic dispatch, the attack on the secondary control presented here can be more severe, as it disrupts the basic functionality of the MG.
△ Less
Submitted 22 September, 2016;
originally announced September 2016.