Initialization sequence diagram.

Initialization sequence diagram.

Source publication
Article
Full-text available
In view of the problems of low security, poor reliability, inability to backup automatically, and overreliance on the third party in traditional microgrid data disaster backup schemes based on cloud backup, the edge computing is used to preprocess power big data, and a microgrid data disaster backup scheme based on blockchain in edge computing envi...

Similar publications

Article
Full-text available
Aiming at the problems of high delay and vulnerable to network attack in the traditional microgrid centralized architecture, a collaborative microgrid security defense method in the edge-computing environment is proposed. First, we build the edge-computing framework for microgrid, deploy the edge-computing server near the equipment terminal to impr...

Citations

... In terms of blockchain and smart contract incentive aspect. Zhang et al. [21] combined the distributed architecture and decentralization of the blockchain, and designed a microgrid data security sharing scheme using points to replace the tokens in the traditional blockchain consensus mechanism to circulate. This scheme stores the data packets in the database under the chain after the nodes reach a consensus, and returns its storage address to the chain for storage. ...
Article
Full-text available
With the increasing popularization and application of the smart grid, the harm of the data silo issue in the smart grid is more and more prominent. Therefore, it is especially critical to promote data interoperability and sharing in the smart grid. Existing data-sharing schemes generally lack effective incentive mechanisms, and data holders are reluctant to share data due to privacy and security issues. Because of the above issues, a dynamic incentive mechanism for smart grid data sharing based on evolutionary game theory is proposed. Firstly, several basic assumptions about the evolutionary game model are given, and the evolutionary game payoff matrix is established. Then, we analyze the stabilization strategy of the evolutionary game based on the payoff matrix, and propose a dynamic incentive mechanism for smart grid data sharing based on evolutionary game theory according to the analysis results, aiming to encourage user participation in data sharing. We further write the above evolutionary game model into a smart contract that can be invoked by the two parties involved in data sharing. Finally, several factors affecting the sharing of data between two users are simulated, and the impact of different factors on the evolutionary stabilization strategy is discussed. The simulation results verify the positive or negative incentives of these parameters in the data-sharing game process, and several factors influencing the users’ data sharing are specifically analyzed. This dynamic incentive mechanism scheme for smart grid data sharing based on evolutionary game theory provides new insights into effective incentives for current smart grid data sharing.
... The presented simulation results promoted this solution since it conveniently enables longrange MEC service. Then, authors in [154] proposed a data backup scheme to combine edge computing and blockchain technologies for disaster scenarios: while the former processes big data coming from the microgrid, blockchain provides security to the equipment needed to perform edge computing. However, the main challenge here is to deal with the tradeoff between energy efficiency and security. ...
... Blockchain [154] authors in [156] studied resource allocation to enable latencyintolerant tasks due to emergencies in oil fields. In particular, they devised a stochastic model that captures end-to-end uncertainties within the proposed federated edge environment to estimate the risk associated with each task and showed a performance improvement of almost 30 percent compared to state-of-the-art solutions. ...
Preprint
Full-text available
The number of disasters has increased over the past decade where these calamities significantly affect the functionality of communication networks. In the context of 6G, airborne and spaceborne networks offer hope in disaster recovery to serve the underserved and to be resilient in calamities. Therefore, this paper surveys the state-of-the-art literature on post-disaster wireless communication networks and provides insights for the future establishment of such networks. In particular, we first give an overview of the works investigating the general procedures and strategies for counteracting any large-scale disasters. Then, we present the possible technological solutions for post-disaster communications, such as the recovery of the terrestrial infrastructure, installing aerial networks, and using spaceborne networks. Afterward, we shed light on the technological aspects of post-disaster networks, primarily the physical and networking issues. We present the literature on channel modeling, coverage and capacity, radio resource management, localization, and energy efficiency in the physical layer and discuss the integrated space-air-ground architectures, routing, delay-tolerant/software-defined networks, and edge computing in the networking layer. This paper also presents interesting simulation results which can provide practical guidelines about the deployment of ad hoc network architectures in emergency scenarios. Finally, we present several promising research directions, namely backhauling, placement optimization of aerial base stations, and the mobility-related aspects that come into play when deploying aerial networks, such as planning their trajectories and the consequent handovers.<br
... Authors in [171] proposed a data backup scheme to combine edge computing and blockchain technologies for disaster scenarios: while the former processes big data coming from the microgrid, blockchain provides security to the equipment needed to perform edge computing. ...
Preprint
Full-text available
The number of disasters has increased over the past decade where these calamities significantly affect the functionality of communication networks. In the context of 6G, airborne and spaceborne networks offer hope in disaster recovery to serve the underserved and to be resilient in calamities. Therefore, this paper surveys the state-of-the-art literature on post-disaster wireless communication networks and provides insights for the future establishment of such networks. In particular, we first give an overview of the works investigating the general procedures and strategies for counteracting any large-scale disasters. Then, we present the possible technological solutions for post-disaster communications, such as the recovery of the terrestrial infrastructure, installing aerial networks, and using spaceborne networks. Afterward, we shed light on the technological aspects of post-disaster networks, primarily the physical and networking issues. We present the literature on channel modeling, coverage and capacity, radio resource management, localization, and energy efficiency in the physical layer and discuss the integrated space-air-ground architectures, routing, delay-tolerant/software-defined networks, and edge computing in the networking layer. This paper also presents interesting simulation results which can provide practical guidelines about the deployment of ad hoc network architectures in emergency scenarios. Finally, we present several promising research directions, namely backhauling, placement optimization of aerial base stations, and the mobility-related aspects that come into play when deploying aerial networks, such as planning their trajectories and the consequent handovers.
... Authors in [171] proposed a data backup scheme to combine edge computing and blockchain technologies for disaster scenarios: while the former processes big data coming from the microgrid, blockchain provides security to the equipment needed to perform edge computing. However, the main challenge here is to deal with the trade-off between energy efficiency and security. ...
Article
Full-text available
The number of disasters has increased over the past decade where these calamities significantly affect the functionality of communication networks. In the context of 6G, airborne and spaceborne networks offer hope in disaster recovery to serve the underserved and to be resilient in calamities. Therefore, our paper reviews the state-of-the-art literature on post-disaster wireless communication networks and provides insights for the future establishment of such networks. In particular, we first give an overview of the works investigating the general procedures and strategies for facing any large-scale disaster. Then, we present technological solutions for post-disaster communications, such as the recovery of the terrestrial infrastructure, installing aerial networks, and using spaceborne networks. Afterwards, we shed light on the technological aspects of post-disaster networks, primarily the physical and networking issues. We present the literature on channel modeling, coverage and capacity, radio resource management, localization, and energy efficiency in the physical layer part, and discuss the integrated space-air-ground architectures, routing, delay-tolerant/software-defined networks, and edge computing in the networking layer part. This paper also includes interesting simulation results which can provide practical guidelines about the deployment of ad hoc network architectures in emergency scenarios. Finally, we present several promising research directions, namely backhauling, cache-enabled and intelligent reflective surface-enabled networks, placement optimization of aerial base stations (ABSs), and the mobility-related aspects that come into play when deploying aerial networks, such as planning their trajectories and the consequent handovers (HOs).
Article
Internet-of-Farming Things (IoFT)-enabled smart agriculture can collect data more reliably and frequently to track the crop’s status and other significant information. Considering that smart agriculture requires working with substantial amounts of sensitive data. In light of this, frequent data processing may threaten the confidentiality and integrity of data and IoFT device privacy. Although numerous privacy-preserving data aggregation methods have been implemented to address these issues, they also have certain security vulnerabilities, such as inadequate data confidentiality, collusion attacks, and malicious data mining attacks. Therefore, we introduce a three-tier architecture-assisted redactable blockchain-based secure data aggregation method with source authentication for the fog-enabled IoFT1. This work provides an efficient and secure two-level data aggregation model. The proposed model supports resistance to collusion and malicious data mining threats launched by internal or external attackers. It can also achieve perfect data confidentiality and integrity against a malicious aggregator and an inquisitive control center for an authorized IoFT device. Specifically, the detailed performance analysis and theoretical concrete security proofs demonstrate the practicability and efficiency of the proposed model.