How does the hottest power system defender use blo

  • Detail

Defender of power system: how to use blockchain technology to strengthen the network security of electricity

the recent blackmail software incident strongly illustrates how vulnerable information and data are to network attacks in the face of the gradual increase in the requirements of the EU market for goods packaging. However, it is not only our information that faces security risks. The threat has extended to the physical power network world. In fact, today's electricity is very vulnerable to network attacks. For example, in 2015, the Ukrainian electricity network was attacked and a large-scale power outage occurred, affecting 230000 people. In addition, smart meters used around the world are inherently unsafe in design. With billions of energy devices expected to be connected to electricity in the next decade, electricity will become more vulnerable to network attacks

fortunately, blockchain technology has natural network threat defense capabilities. Many energy companies are currently studying how to use blockchain technology to improve the security level of electricity systems. This is due to the following characteristics of blockchain Technology:

tamper proof data: if blockchain technology is used, the entered data is difficult to be tampered with. This can avoid many risks, including man in the middle attack, that is, the possible tampering of data transmission by hackers. After the blockchain technology is properly applied, all calculations will be performed in the form of hash, and the data will be tamper proof when generated, thus avoiding the risk of being tampered with in transmission

non Intermediation: under blockchain technology, there is often no need for intermediaries (such as third-party custody enterprises), which greatly reduces transaction costs

complete data availability: blockchain technology can store data in a decentralized manner through multiple nodes. In this architecture, even if some nodes or servers are invaded, users can still obtain a complete data set

redundancy: there is no central failure point in the operation of blockchain, so this architecture has great reliability through redundancy

privacy and control: blockchain users can choose which data to make permanently transparent and which data to keep encrypted, so only the designated recipient can view the data content

outsourced Computing: encrypted data can be sent to a third party for processing, and the data content will not be displayed throughout the process

vulnerability repair

with the improvement of the level of data and decentralization of energy systems, our demand for reliable defense against network attacks has increased significantly. If properly applied, blockchain technology can repair the loopholes of Lianhe data communication, improve data confidentiality and privacy, and effectively defend against various internal and external threats

"IOT" vulnerability repair

as mentioned above, the combined energy device has a lot of room for improvement in network security. Research shows that from January to April this year, more than two million IOT devices were attacked by hackers and could not be used (bricked). This attack can be seen as a protest against the unsatisfactory network security policy set by the manufacturer for the device. This network security policy is mainly shown in grisea Tongguan Electronic Materials Co., Ltd., which belongs to Tongling Nonferrous Metals Group. Now, thousands of devices are used by the manufacturer by default with the simplest login name and authentication password (such as user name and password). In this case, hackers could have done something far more terrible than bricking the equipment, but they just want to express their view that IOT devices without security are unsafe and should not be used in the real world, putting people's lives and property at risk

blockchain technology and those technologies aimed at popularizing it more widely are paving the way for the realization of a new user authentication mode. The current user name/password combination system has been out of date for many years. Public key private key pair (also known as public secret key encryption) is a more secure authentication mode, and it is also the default authentication mode for systems such as bitcoin and Ethereum. With the improvement of user friendliness of these blockchain technology applications, we will see that all login systems will naturally complete the transformation to this more modern and secure mode

with the application of a reasonable comprehensive key login system set on the application based on blockchain technology, IOT device users can significantly reduce the risks of power failure, data theft and privacy disclosure

data communication vulnerability repair

integrating the pricing and settlement functions of the power wholesale market into a secure blockchain system can significantly reduce the risk of false data injection and price manipulation to a great extent. This is largely due to the fact that blockchain technology has the characteristics of preventing data tampering, which can ensure the immutability of specified data sets or communication series between trading parties

improve data confidentiality and privacy

the leakage of confidential information from LinkedIn, Yahoo, target and other large organizations shows that as more and more data are collected and disseminated through the Internet, the risk of data theft and leakage can be taken first. 1 high voltage differential probe (100x/500x) is also increasing. Blockchain technology can encrypt the private data transmitted, ensuring that only the designated receiver can read these data

brings new risks: improper management of keys

blockchain technology can reduce a variety of network security risks, but it also brings a new risk that is often ignored - improper management of keys. Key management refers to the secure storage of digital keys by avoiding unauthorized access to data - sometimes this is extremely important for distributed energy, most of which will be combined and verified by asymmetric encryption (the encryption method used in all blockchain technology transactions and authentication). Many early adopters of blockchain technology without it technology background have lost their private keys, resulting in the inability of their blockchain assets or devices to be accessed and used

however, key management is receiving more attention, and innovators are also warming up experiments to complete. New ways are being developed to safely save and recover private keys. An innovative way to solve this problem is to integrate key pairs into physical hardware devices (which can be compared to car remote keys), and use them to activate the device. This method can reduce or even completely eliminate the risk of hackers obtaining private keys and completing the authentication of the signing subject in some applications. The key stored in the personal device can enhance the security of login on energy connected devices (such as electric vehicles). For malicious attackers, if all login methods must be completed through a hardware device, hackers must remotely execute device commands rather than simply read data in order to enter the system. This will obviously greatly increase the difficulty of hacker intrusion, thereby improving the security level of the system

as digital distributed systems become the norm in the energy field, and billions of energy consuming devices are integrated into the power system, malicious attackers will see more opportunities to invade these systems and try to destroy them. Therefore, we must abandon the mode of "developing programs before launching patches" and turn to developing systems with comprehensive security measures. Fortunately, many of these security measures can be achieved through the rational application of blockchain technology

Copyright © 2011 JIN SHI