Next Article in Journal
FEDRak: Federated Learning-Based Symmetric Code Statement Ranking Model for Software Fault Forecasting
Next Article in Special Issue
Data-Tracking in Blockchain Utilizing Hash Chain: A Study of Structured and Adaptive Process
Previous Article in Journal
An Iterative Wiener Filter Based on a Fourth-Order Tensor Decomposition
Previous Article in Special Issue
Enhancing Security and Efficiency in Underwater Wireless Sensor Networks: A Lightweight Key Management Framework
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Privacy-Preserving Consensus Mechanism for ADMM-Based Peer-to-Peer Energy Trading

1
Department of Metrology, China Electric Power Research Institute, Beijing 100192, China
2
Marketing Service Center (Metrology Center), State Grid Shandong Electric Power Company, Jinan 250001, China
*
Author to whom correspondence should be addressed.
Symmetry 2023, 15(8), 1561; https://doi.org/10.3390/sym15081561
Submission received: 14 June 2023 / Revised: 4 July 2023 / Accepted: 11 July 2023 / Published: 10 August 2023

Abstract

:
In the electricity market, prosumers are becoming more and more prevalent due to the fast development of distributed energy resources and demand response management, which also promote the appearance of peer-to-peer (P2P) trading mechanisms for energy. Optimization-based methods are efficient tools to design the P2P energy trading negotiation mechanism. However, the main drawback for market mechanisms based on optimization methods is that the incentive compatibility cannot be satisfied, which means participants can obtain more profit by providing untruthful biddings. To overcome this challenge, a novel consensus mechanism based on Proof of Solution (PoSo) is proposed for P2P energy trading. The optimization results will be verified by neighboring agents according to the KKT conditions in a fully decentralized and symmetric manner, which means agents will check each other’s solutions. However, the verification process may leak the private information of agents, and a privacy-preserving consensus mechanism is designed using Shamir’s secret sharing method. After that, we explore a method to realize that trusted agents can recover the right information even under the misbehavior of malicious agents by inheriting the philosophy of Practical Byzantine Fault Tolerance (PBFT). The numerical results demonstrate the effectiveness and efficiency of our proposed consensus mechanisms. In more detail, (1) when the message delivery success rate is not lower than 0.7, the consensus mechanisms almost guarantee success; (2) if the proportion of untrusted agents satisfies 4 f + 1 N ω n , the proposed method guarantees the correctness of the consensus verification results; (3) the communication times among agents can be highly reduced by more than 60% by only verifying the optimality of the received results for the first three and last few iterations.

1. Introduction

The ever-increasing distributed energy resources (DERs) and energy system management (ESM) [1] are changing the approach of power system operation and turning traditional producers and consumers into prosumers. The increase in prosumers means the need for a full decentralized energy trading mechanism that permits prosumers to negotiate and trade with each other freely without a central organization or institute. Thus, the network architecture is also changing to decentralized. The peer-to-peer (P2P) network is defined to be a fully decentralized and symmetric architecture as in [2], in which participants share their resources with each other without the intervention of an intermediary entity [3]. It is in this context, as a new generation of energy management framework, P2P trading mechanism [4] encourages prosumers to participate in the energy market actively.
A traditional distributed energy system mainly adopts centralized optimization, which can directly obtain the optimal energy trading scheduling. However, with the rapid development of renewable energy, a large amount of accessed distributed energy generation equipment makes the centralized optimization method consume a lot of time and computing resources. As a result, the energy trading mechanism is moving towards a more open and decentralized direction. Compared with centralized optimization, distributed optimization can realize parallel computation while maintaining the optimality of trading results, which is a better method to implement and design a new energy trading mechanism. Ref. [5] used the generalized fast dual ascent method to propose a P2P energy trading mechanism that considers the safety constraints of distribution network; Ref. [6] proposed a primal dual gradient algorithm to clear the energy market in a P2P manner; Ref. [7] improved the method to a primal dual sub-gradient algorithm for P2P trading; Ref. [8] proposed relaxed consensus + innovation (RCI) that aims to solve multilateral and bilateral energy economic dispatch in a completely decentralized manner. All the above researches are based on deriving the first-order function of a Lagrange equation of individual optimization problems, and then updating the variables by using different types of gradient descent methods. The advantage is that the calculation speed of single iteration is fast, but the disadvantage is that convergence requires many iterations and the communication cost is high. Compared with other methods, the Alternating Direction Method of Multipliers (ADMM) [9] is widely used because of its completely distributed architecture, less iterations for convergence and better potential for parallel computing performance. Standard ADMM [10,11] is an efficient tool for the design of P2P energy trading negotiation mechanism, but usually a coordinator is required to help with the convergence; to overcome this drawback to construct a completely decentralized market, Ref. [12,13,14,15,16] improved the standard ADMM to consensus ADMM (CADMM), which has a fully decentralized scheme without a central coordinator.
However, the main challenge of optimization-based methods is encouraging prosumers to cooperate in such an untrusted environment. Most of the optimization-based methods use a locational marginal pricing (LMP) mechanism, which cannot satisfy “incentive compatibility” (Each player can maximize his goal according to his true preferences.) and “market efficiency” (Market efficiency can be maximized when outcomes maximize social welfare.) Market participants can exercise “market power” by offering untruthful prices and quantities. When profit maximizing producers adopt strategies to manipulate prices, LMP may cause a large loss in economic efficiency. To address this challenge, the existing P2P energy trading mechanisms mainly adopt the VCG mechanism [17,18,19] to satisfy incentive compatibility. The VCG mechanism induces truth-telling behavior in a dominant strategy equilibrium, that is, it is profit-maximizing for each player to reveal his true marginal cost, no matter what action the other players take. However, the main problem is that it still cannot satisfy the property of revenue adequacy, which refers to a condition in which the market operator never incurs a financial deficit. Thus, we are trying to find another method to build an incentive-compatible P2P electricity market.
Fortunately, we find that consensus mechanisms in the blockchain are efficient tools to ensure the correctness and authenticity of submitted results. It defines how parties can agree on the state and behavior in a system. The best known and most widely used consensus mechanism is Proof of Work (PoW) [20], which is mostly used in Bitcoin and Ethereum. However, PoW is also known for wasting a lot of time and effort to solve a difficult but meaningless mathematical puzzle. The criticism of PoW has led to other consensus mechanisms such as Proof of Stake (PoS) [21], Practical Byzantine Fault Tolerance (PBFT) [22] and Delegated Byzantine Fault Tolerance (DBFT) [23]. These consensus mechanisms enable various applications in finance, supply chain management and energy [24,25,26].
However, existing consensus mechanisms are not able to support optimization methods and problems, and it is challenging to design a suitable and efficient consensus mechanism for an optimization-based P2P energy trading mechanism. In this work, a novel consensus mechanism on the basis of Proof of Solution (PoSo) is proposed [27], which simulates PoW by replacing meaningless mathematical puzzles with meaningful optimization problems. Additionally, we further improve the consensus mechanism by reducing the number of verification and implement privacy protection. Compared with previous works, the main contributions are listed below.
  • First of all, a negotiation mechanism using consensus ADMM is designed for P2P energy trading. Social welfare can be maximized in a fully decentralized manner. After that, a PoSo-inspired consensus mechanism is developed for this P2P energy trading mechanism. After solving individual local optimization problems to obtain an optimal solution, agents will broadcast the equivalent accumulated Karush–Kuhn–Tucker (KKT) conditions to neighbor agents for optimality validation. It is worth noting that, similar to PoW, checking whether a given solution satisfies the KKT condition for optimality is much easier than obtaining the solution. Compared to the original work, the biggest contribution of the proposed P2P energy trading consensus mechanism is that no central delegate is required, and agents do not need to share their private information with a central leader. In addition, agents who fail in validation are subject to a significant penalty attached to the objective function. The novel consensus mechanism can overcome the deficiency of the LMP mechanism, and create an incentive compatible P2P energy market.
  • However, our proposed consensus mechanism requires a mass of communication time due to many iterations to converge, and the private information cannot be protected. To solve these two problems, first we propose to reduce the number of consensus verification by only verifying the solutions in a few iterations at the beginning and the end. Second, we proposed a privacy-preserving consensus mechanism that is resistant to a proportion of untrusted agents. The private information is divided into encrypted pieces by using Shamir’s secret sharing scheme, which will be distributed to corresponding neighboring agents. Then, a PBFT-based method is designed to realize that trusted agents can recover the right results even under the misbehavior of malicious agents who may manipulate the encrypted pieces to cause incorrect results.
The rest of the paper is organized as follows: Section 2 presents related works, Section 3 presents the formulation of P2P energy trading and the negotiation mechanism for the P2P energy market, followed by the consensus mechanism and improvements for it in Section 4. Numerical results are presented in Section 5. Finally, in Section 6 and Section 7, discussions, conclusions, and future perspectives are drawn.

2. Related Work

2.1. Consensus ADMM

ADMM is an efficient tool to design distributed and parallel algorithms for machine learning problems at a large scale [9]. It can be applied to convex optimization problems with special equality constraints as follows:
minimize f ( x ) + g ( z ) subject   to A x + B z = c .
ADMM solves the above problem based on the augmented Lagrangian function, which is formulated as below:
L ρ ( x , y , z ) = f ( x ) + g ( z ) + y T ( A x + B z c ) + ρ 2 A x + B z c 2 .
Here, y is a dual variable or Lagrangian multiplier for the equality constraint ( A x + B z = c ), and ρ is a positive penalty parameter. ADMM obtains optimal solutions by updating the variables in an alternating way as below:
x t + 1 = arg min x L ρ ( x , z t , y t )
z t + 1 = arg min z L ρ ( x t + 1 , z , y t )
y t + 1 = y t + ρ ( A x t + 1 + B z t + 1 c ) ,
With the development of high performance computing, ADMM is an important choice to solve the above constraint problems. At this point, the global consistency optimization strategy comes into play. The objective function is decomposed into N sub-objective functions or subsystems. Each one tries to compute a local solution x i that is constrained to be equal to the global variable z. The global consensus optimization problem can be formulated as follows:
min i = 1 N f i ( x i ) s . t .   x i = z .
Here, x i is the local solution for the i-th subsystem, and f i is the loss function of the i-th subsystem. All local x i solutions construct the global variable z, and z links and connects the data of the various subsystems. The augmented Lagrangian function of problem (4) is formulated as:
L ρ ( x 1 , , x N , z , y ) = i = 1 N ( f i ( x i ) + y T ( x i z ) + ( ρ / 2 ) x i z 2 ) .
ADMM addresses it by updating variables as below:
( x i ) t + 1 = arg min x i ( f i ( x i ) + ( y i ) t T ( x i z t ) + ( ρ / 2 ) x i z t 2 )
z t + 1 = 1 N i = 1 N ( ( x i ) t + 1 + ( 1 / ρ ) ( y i ) t )
( y i ) t + 1 = ( y i ) t + ρ ( ( x i ) t + 1 z t + 1 )
The above equations reveals that the iterative steps of ADMM can be executed in parallel. This algorithm can be further simplified by computing the averages of x and y. The z-update and y-update can be written as
z t + 1 = x ¯ t + 1 + ( 1 / ρ ) y ¯ t
y ¯ t + 1 = y ¯ t + ρ ( x ¯ t + 1 z t + 1 )
Substituting (7a) into (7b) can obtain that y ¯ t + 1 = 0 and z t + 1 = x ¯ t + 1 . Finally, we derive the consensus ADMM, and it can be simply formulated as
( x i ) t + 1 = arg min x i f i ( x i ) + ( y i ) t T ( x i x ¯ t ) + ( ρ / 2 ) x i x ¯ t 2
( y i ) t + 1 = ( y i ) t + ρ ( x i ) t + 1 x ¯ t + 1

2.2. Consensus Mechanisms for P2P Energy Trading

For traditional blockchain, there are several mature consensus mechanisms. When combined with energy trading, it is also likely to adopt a more traditional mechanism or slightly modified one to meet the requirements of the system. Several common consensus mechanisms, e.g., Proof-of-Work (PoW), Proof-of-Stake (PoS), and Practical Byzantine Fault Tolerance (PBFT) [28], are introduced as follows.
A comparison table, Figure 1, shows the merits and demerits of different consensus mechanisms used in P2P energy trading.

2.2.1. Proof-of-Work

In the PoW mechanism, consensus proof is achieved by solving a difficult problem, which is to find a nonce to form a hash value that satisfies the condition. Since solving this problem requires a large amount of computing resources, but it can be easily verified by other nodes, the double-spending can be avoided to some extent. However, PoW is also known for wasting a lot of time and effort to solve a difficult but meaningless mathematical puzzle [29]. Since PoW was originally used in Bitcoin, the most common consensus mechanism for blockchain-based energy transactions is PoW. A blockchain-based edge-as-a-service framework is proposed in [30] for secure energy trading between electric vehicles (EVs), and PoW is used to help EVs reach consensus. In [31], the blockchain is designed to accommodate the decentralized nature of P2P markets and is developed using the PoW consensus mechanism.

2.2.2. Proof-of-Stake

The criticism of PoW has led to other consensus mechanisms. In PoS systems, instead of competing, miners maintain a set of verifiers that participate in the block creation process. Each node verifies that it has an interest in the grid, and this interest is used to determine the likelihood that the node will add the next transaction block to the blockchain. The system requires participants to prove ownership of the currency. However, this mechanism tends to make the rich richer and the poor poorer. Compared with the PoW mechanism, the PoS mechanism does not need to search for a suitable nonce to solve a difficult puzzle, which saves energy and improves efficiency. In [32], the demand response program is verified based on the PoS consensus mechanism. Each distributed energy producer in the grid can either act as a verifier of energy transactions or become the next valid block miner, and each verifier holds a certain stake. The authors of [33] proposed that by using PoS in P2P energy trading, miners sacrifice part of their stake to compensate for power losses and narrow the price gap in traditional prosumer-to-grid trading. In addition, the proposed model also improves the income of producers and saves the cost of consumers through the designed pricing mechanism, which is helpful to increase the social welfare.

2.2.3. Practical Byzantine Fault Tolerance

The PBFT algorithm is a replication algorithm that can tolerate Byzantine faults. The algorithm is feasible in an asynchronous environment. PBFT is suitable for small networks because the consensus process requires three rounds of voting, and each round of voting is broadcast. Because it does not have the same mining process as PoW, it saves a lot of computing resources. When the proportion of malicious nodes is less than 1/3, the correct consensus can be reached. In [34], relying on blockchain smart contract technology, a distributed reputation system RBT is designed to realize distributed and automated reputation management. It is used to implement a PBFT-based delegated consensus and reputation-based auction in a P2P energy trading system. Considering that most user nodes are trusted, a fast PBFT algorithm is proposed in [35] to achieve efficient consensus for P2P energy trading. The consensus algorithm is executed to store transactions, support data traceability, and improve transaction efficiency.

2.2.4. Proof of Solution

In PoW-based blockchains, participants are competing to solve a difficult but meaningless mathematical puzzle in order to become the interim leader. The winner will become the leader and announces the block containing the latest state of the network. Other participants will accept a block if and only if it passes validation. A block is deemed to be valid if the puzzle was correctly solved and the latest state of the network was generated by following strict rules. It is worth noting that the math problems are difficult to solve but easy to verify, so other participants will not expend a lot of effort to verify them.
The novel consensus mechanism PoSo is inspired by PoW. The difference is that PoSo replaces meaningless mathematical puzzles with useful and meaningful optimization problems. Like the solutions of mathematical puzzles in PoW, the solutions of optimization problems in PoSo are difficult to find, but easy to verify. Specifically, if the optimization problem is convex, then x * is an optimal solution if and only if x * satisfies the KKT conditions. Obviously, it is much easier to verify whether a given x * satisfies the optimality condition than to find it. However, unlike PoW, PoSo does not spend huge amounts of computing resources on nonsensical problems. These advantages expand the use of blockchain in various applications that require optimization, but do not have a central trusted authority to run it.
As shown in Figure 2, in a PoSo scenario, all participants select a delegation of participants interested in managing the collaborative network. An interim leader, elected by the delegates, is charged with coming up with the best solution. The other delegates are followers who validate and exchange the solutions they receive. If followers agree on a solution, they broadcast the solution to every participant. Participants trust a solution if it is approved by a majority of delegates. Any leader who is deemed incompetent or dishonest will be removed from the delegation and replaced by another representative.

3. Negotiation Mechanism for P2P Energy Trading

3.1. Problem Formulation

An illustration of P2P energy markets is shown in Figure 3 [36]. Prosumers will negotiate the simultaneous price and energy for multi-lateral transactions based on predefined trading rules. It can be seen that the P2P energy market is much more decentralized compared to the existing centralized market, where all participants must provide and share all private information (such as cost or utility functions, power boundaries, and generation uncertainty) to a central coordinator, who centrally determines energy dispatches. In a P2P market, all agents are free to negotiate prices and quantities for multilateral transactions without leaking any private information.
There are a few agents in the P2P energy market who act as sellers if they have surplus renewable energy generation, such as wind generators or solar panel; or as buyers to meet their energy demand, such as EV charging. In this section, we first model the P2P energy trading process, and the social welfare maximization problem is built.
First of all, before the negotiation process, each prosumer will first determine the role (seller or buyer) according to the power generation and consumption. The power E n of each agent n Ω is split into the number of bilateral transactions with a set of neighboring agents m ω n as
E n = m ω n E n m , n Ω .
A positive E n indicates residual energy, a negative value indicates energy demand; thus, a positive E n m indicates sale or production, and a negative one means purchase or consumption. For simplicity, E n = { E n 1 , , E n m , m ω n } is used to represent all transactions of agent n between neighboring agents. The power of agent n shall be bounded as follows:
E n ̲ E n E n ¯ , n Ω
For renewable resources producer, the lower bound E n ̲ is set to zero, and the upper bound E n ¯ is set to the forecast power generation.
Each agent is restricted to be either a producer or a consumer, that is E n ̲ E n ¯ 0 . Thus, the variable is constrained to be positive ( E n m 0 ) if it is a producer, and negative ( E n m 0 ) if it is a consumer, as follows:
E n m 0 , ( n , m ) ( Ω p , ω n ) E n m 0 , ( n , m ) ( Ω c , ω n )
where Ω p and Ω c denote the set of producers and consumers, respectively. Finally, a set of equilibrium constraints is used to represent the market equilibrium among agents:
E n m + E m n = 0 , ( n , m ) ( Ω , ω n ) .
To simplify the presentation of the process, quadratic functions are commonly used to model the producer generation cost and consumer utility as follows:
C n ( E n ) = a n E n 2 + b n E n ,
where a n and b n are predetermined positive constants according to the equipment and consumers’ preference.
Finally, the objective of a P2P energy market is to maximize the social welfare of all agents while satisfying these constraints. The problem can be equivalently formulated as a cost minimization problem as below:
min n Ω C n ( E n )
s . t . E n ̲ E n E n ¯ n Ω
E n m 0 ( n , m ) ( Ω p , ω n )
E n m 0 ( n , m ) ( Ω c , ω n )
E n m + E m n = 0 ( n , m ) ( Ω , ω n )
The above problem is a convex optimization problem, which has a unique optimal solution and can be obtained by centralized methods such as interior point methods. However, the centralized approach needs to leak the private information of all agents, which is unacceptable in practical applications. It is necessary to design a decentralized negotiation mechanism to achieve the optimal scheduling of the above optimization problem (14) without leaking any individual information.
Remark 1. 
If the product differentiation or preference is considered, the bilateral trading costs are calculated as linear functions of the quality traded with each neighboring agents C ˜ n ( E n ) = m ω n c n m E n m . The bilateral trading coefficients c n m are affected by emissions, transport distance, size of prosumers, etc. The different preference or value c n m will influence the prices between agents. For example, the long distance between agent n and m will generate a high transmission fee, and cause a price between n and m, which will be λ n m + c n m , where λ n m represents the traded price provided from agent n to m for amount E n m . Since we focus on the consensus mechanism in this paper, the product differentiation is not considered, but the proposed method is still workable when including it.

3.2. Negotiation Mechanism

In this section, a decentralized negotiation mechanism based on consensus ADMM is proposed for P2P energy trading, which is shown in Figure 4. Agents will solve individual optimization problems to determine the optimal biddings, and then communicate and share the updated energy quantities and prices to neighbor trading agents. The negotiation process will run iteratively until convergence, which is decided by the Market Operator (MO). The MO collects updated transaction information and sends a termination signal after the balance between each pair of agents is met. The proposed negotiation mechanism focuses on a deterministic clearing algorithm for a single time period of the previous day, and it can be easily extended to multiple time periods [15,16].
Local Update for Each Agent: At the beginning, each agent randomly calculates and broadcasts the initial energy price and quantity in parallel. Each agent will then iteratively update the energy amounts and prices of its neighbors until equilibrium.
Then, at a given iteration k, each agent n Ω will update its amount of energy traded with neighbor agents by solving an optimization problem as follows.
min E n k + 1 C n ( E n ) + m ω n λ n m k F n m k E n m + ρ 2 F n m k E n m 2 s . t . E n = m ω n E n m E n ̲ E n E n ¯ E n m 0 , ( n , m ) ( Ω p , ω n ) E n m 0 , ( n , m ) ( Ω c , ω n )
where λ n m is the traded price for amount E n m , and it is also the dual variable for the balance constraints (12); F n m = E n m E m n 2 represents the median value of the energy amount between n and m. After obtaining the updated energy amount, each agent will update the energy prices λ n m k + 1 as follows:
λ n m k + 1 = λ n m k ρ 2 E n m k + 1 + E m n k + 1 + ,
where [ . ] + denotes the max ( . , 0 ) .
Local Update for Market Operator: Since C n ( E n ) is strictly convex, it suffices to guarantee that our algorithm converges to the global optimum point [37]. The algorithm converges when the total primary residuals (the squared difference between each pair of traded amount) and total dual residuals (the squared difference between the amount of two successive iterations) is smaller than the global stopping criterion as follows:
R k + 1 n Ω m ω n ( E n m k + 1 + E m n k + 1 ) 2 χ r ,
T k + 1 n Ω m ω n ( E n m k + 1 E n m k ) 2 χ t ,
where χ r and χ t are predetermined positive and very small constants. The MO must be trusted, and can be the community manager or the authorized representative of all agents. The MO will collect the energy of all transactions to check whether the algorithm converges by (17), and broadcast a termination signal to all agents if the convergence conditions are met.

4. Privacy-Preserving P2P Energy Trading Consensus Mechanism

4.1. PoSo-Based Consensus Mechanism

In last section, we propose a negotiation mechanism for P2P energy trading, which is based on the marginal price. However, under the LMP mechanism, the agents who dominate the prices can earn more profit by taking some dishonest strategies. To solve this problem, in this section, a new consensus mechanism is proposed for P2P energy trading based on PoSo, which is an effective way to prevent agents from dishonest behavior.
Reviewing the PoSo flow chart again, a delegate is first selected from participants, and a temporary leader is further elected from the delegate. The leader will solve the social welfare maximization problem to propose an optimal solution, while the followers in the delegate verify the optimality to decide whether to accept it or not. Although this mechanism has good computational efficiency, it is not suitable for P2P energy trading due to the unwillingness of prosumers to share private information with the central leader.
Therefore, to solve this problem, an improved and revised version of the PoSo mechanism is designed to fit our proposed CADMM-based P2P energy trading negotiation mechanism [38], which can well protect the private information. Each agent solves individual optimization problems (15) to obtain an optimal solution, and neighbor agents verify the equivalent KKT conditions to prove its optimality. Then, in turn, the agent will also check the solution of neighbor agent. Thus, the consensus mechanism is running in a symmetric manner.
The main advantage is that no authorization is required and the agent does not need to convey private information to the central leader. All agents can solve the local optimization problem in parallel and broadcast the results to neighboring agents for optimality verification.
In more detail, the KKT conditions for local updates (15) are listed as in (18).
C n ( m ω n E n m ) λ n m k + ρ ( E n m F n m k ) μ ̲ n + μ ¯ n δ n m = 0 , ( n , m ) ( Ω p , ω n ) C n ( m ω n E n m ) λ n m k + ρ ( E n m F n m k ) μ ̲ n + μ ¯ n + δ n m = 0 , ( n , m ) ( Ω c , ω n ) E n ̲ m ω n E n m E n ¯ E n m 0 , m ω n , if n Ω p E n m 0 , m ω n , if n Ω c μ ̲ n m ω n E n m = 0 , μ ¯ n m ω n E n m = 0 δ n m E n m = 0 , m ω n
The above equations construct a nonlinear problem with primal variables E n and dual variables { μ ̲ n , μ ¯ n , δ n m } . { μ ̲ n , μ ¯ n } are for constraints E n ̲ E n E n ¯ , and δ n m is for 0 E n m ( 0 E n m ).
However, if we choose to check all of these equations, it will cause a very large computational and communication burden. Alternatively, we choose to verify the cumulative KKT condition as below:
N ω n 2 a n m ω n E n m + b n = m ω n λ n m k ρ ( m ω n E n m m ω n F n m k ) + N ω n Δ μ n + m ω n δ n m , n Ω p N ω n 2 a n m ω n E n m + b n = m ω n λ n m k ρ ( m ω n E n m m ω n F n m k ) + N ω n Δ μ n m ω n δ n m , n Ω c
After each update, agent n will send a information set I n k to neighboring agents for verification. The set contains information as below:
I n k = a n , b n , E n k + 1 = m ω n E n m k + 1 , m ω n λ n m k , F n k = m ω n F n m k , Δ μ n , m ω n δ n m
If the cumulative KKT conditions (19) are met, the optimality of the solution is also successfully verified, and results are exchanged among other neighbor agents until the majority of them are approved. An incentive and punishment mechanism is also designed. In detail, if the verification fails, the dishonest agent n will be subject to a heavy fine, which is expressed as adding a penalty indicator function Δ p ( v ) in the objective function. If the result is optimal, Δ p ( v ) = Δ p ( 0 ) = 0 ; on the contrary, Δ p ( v ) = Δ p ( 1 ) = P . Here, P is a predefined penalty that will be distributed equally among all verifiers who participate in the consensus process. This new consensus mechanism can motivate agents to participate honestly in the energy market and achieve an incentive compatible market. An illustrative example is shown in the Figure 5, and the consensus mechanism is summarized in Algorithm 1.
Algorithm 1: The improved PoSo-based consensus mechanism for P2P energy trading.
Symmetry 15 01561 i001
Similar to other blockchain consensus mechanisms, the proposed consensus mechanism is only effective if the number of honest neighbor agents exceeds the number of dishonest agents. An effective consensus mechanism indicates that all participants take actions based on the correct and identical optimal solution. As long as there are honest neighbor agents in the verifiers list, all honest agents will eventually see the optimal solution, so the consensus verification succeeds. In other words, as long as there are a majority of honest neighbor agents, the optimality of the received solution can be successfully verified. When more than 50% of the neighbor agents obtain the same verification result, anyone can trust the result because a non-optimal solution is impossible to be accepted by more than half of the neighbor agents. However, if dishonest agents dominate the verifiers set, they may also control the verification outcome.

4.2. Protect the Private Information and Resist Malicious Agents

In the consensus verification process, agents have to send private information a n , b n to neighboring agents. However, there may be dishonest nodes who will collect individual privacy to take strategy and earn more profit. Additionally, they may not complete the verification work or deliberately disapprove the optimality of the received solutions. Thus, the proposed method should resist untrusted agents who have this misbehavior. In this section, we propose a privacy-preserving consensus mechanism that is resistance to untrusted agents, who may collect individual privacy or destroy the consensus verification process. Here, we assume that there are always no more than f of N agents are untrusted and malicious in the neighboring agents set.

4.2.1. Algorithm

The proposed privacy-preserving consensus mechanism is illustrated in Figure 6. The agent m 5 is malicious, who will not forward any messages.
Briefly speaking, an agent generates N ω n pieces of encrypted data and separately submits encrypted aggregated information to each corresponding neighboring agent. Then, we use a PBFT-based method [39] to realize that the trusted agents can recover the right result even under the misbehavior of malicious agents.
In detail, first of all, in the secret generation phase, before the negotiations begin, agent n would generate pieces of the encrypted a n and b n using Shamir’s Secret Sharing scheme [40]. It constructs polynomials
f a n ( ξ ) = a n + d a n , 1 ξ + d a n , 2 ξ 2 + + d a n , f ξ f ,
f b n ( ξ ) = b n + d b n , 1 ξ + d b n , 2 ξ 2 + + d b n , f ξ f ,
where d a n , d b n are randomly generated. Then, for each neighboring agent m ω n , agent n generates encrypted information { f a n ( m ) , f b n ( m ) } , m = 1 , 2 , , N ω n . Here, we use { [ a n ] m , [ b n ] m } to denote { f a n ( m ) , f b n ( m ) } for simplicity.
The encryption algorithm has two important properties as follows:
(i) The algorithm is a ( f + 1 , N ω n ) threshold scheme. The actual information { a n , b n } of agent n can be decrypted using (22) only if at least f + 1 encrypted messages are collected.
a n = m = 1 f + 1 [ a n ] m l = 1 , l m f + 1 l l m ,
b n = m = 1 f + 1 [ b n ] m l = 1 , l m f + 1 l l m .
(ii) It is additively homomorphic. That is to say, only when the sum of at least f + 1 agent n encrypted information is collected, can (23) be used to decrypt the sum of agent n information.
a n + b n = m = 1 f + 1 [ a n ] m + [ b n ] m l = 1 , l m f + 1 l l m .
As far as we know, Shamir’s secret sharing is the simplest scheme that satisfy the above properties in the domain of real numbers. Our approach remains valid for other schemes with the same properties, such as the Brickell scheme [41].
We then try to explore a way to realize that trusted agents can always recover correct information even under the misbehavior of malicious agents. This algorithm inherits the idea of PBFT. Specifically, in the Pre-prepare phase, agent n obtains the updated solution m ω n E n m k + 1 after iteration k, agent n calculates aggregated piece information S n m k as follows:
S n m k = N ω n 2 [ a n ] m m ω n E n m k + 1 + [ b n ] m + ρ m ω n E n m k + 1 , m ω n ,
and sends them to corresponding neighboring agents; then, in the Prepare phase, each agent m will broadcast S n m k to all agents in ω n ; after that, in the Commit phase, when receiving S n m k from no less than 3 f agents, each agent send a Commit message to others; finally, in the Reply phase, when receiving Commit messages from no less than 3 f + 1 agents (including itself), agent m derives the correct aggregated result S n k = N ω n ( 2 a n m ω n E n m k + 1 + b n ) + ρ m ω n E n m k + 1 by executing Algorithm 3. In short, the agent enumerates all possible decryption results, and most of these possible results are considered correct.
After the result reconstruction process, each neighboring agent validates the optimality of the received solutions E n k by (19) according to the correct results. Algorithms 2 and 3 introduce the procedure of the privacy-preserving consensus mechanism for agent n and correct result decryption method.

4.2.2. Security Analysis

Theorem 1: If the proportion of untrusting neighboring agents is less than 1/4, i.e., 4 f + 1 N ω n , the proposed method guarantees the correctness of the consensus verification result.
Proof 1: The Reply phase ensures the correctness of the aggregation result S n k . In detail, when an agent receives no less than 3 f + 1 Commit messages, at least 2 f + 1 Commit messages were sent by trusted agents. Therefore, a trusted agent can obtain at least C 2 f + 1 f + 1 correct results in Algorithm 3. Untrusted agents may tamper with pieces of their encrypted messages to cause trusted agents to decrypt incorrect results. However, even if the untrusted agents send f of 3 f + 1 Commit messages, the trusted agent exports incorrectly aggregated data up to C 2 f f + 1 times [42]. Therefore, the trusted agent always outputs the correct result S n k in Algorithm 3.
Algorithm 2: Privacy-preserving consensus mechanism for agent n.
Symmetry 15 01561 i002
Algorithm 3: Correct aggregated result decryption method.
Symmetry 15 01561 i003

4.3. Improve the Efficiency of the Consensus Mechanism

In a distributed optimization method-based P2P energy trading mechanism, it usually takes many iterations to converge, which will cause a mass of communication time for the consensus mechanism. Additionally, since agents have to exchange information with each other to reach a consensus, the communication complexity is O ( k × N 3 ) , where k is the iterations for convergence, and N is the numbers of agents in the market. It is undeniable that our algorithm is inefficient when dealing with a large number or prosumers, but there are two ways to improve efficiency.
First, it can be discovered that the verification equation contains the previous results { m ω n λ n m k , m ω n F n m k } . It means that if a dishonest agent constructs an incorrect solution at a certain iteration to pass the verification, it probably will not pass in the next iteration unless it proceeds to solve the local problems using the sub-optimal solutions, but it may result in economic loss. Therefore, the optimal solutions are linked to each other to form a “chain”, and it is sufficient to verify the optimality of only the first and last few iterations. To be specific, for each agent n, we only verify the solutions of the first three iterations and last few iterations according to the residuals (17). When the maximal value of R k + 1 and T k + 1 is less than α χ , the consensus verification process is activated. The smaller α means less consensus verification. The α is chosen to be 10 in this work. By using this low-frequency consensus mechanism, the computational burden can be highly reduced.
Second, in the energy community, prosumers usually have frequent or fixed trading partners. Thus, it is better to divide the network into different shards according the transaction history, and prosumers only need to communicate with others in the same shard. In this way, the communication complexity can be highly reduced, and more shards, lower complexity. How to reasonably allocate prosumers to different shards is the focus of our future work.

5. Results

This section provides numerical results for the performance evaluation of the proposed P2P energy trading privacy-preserving consensus mechanism through different case studies. A 13-node meshed distributed network with five sellers and seven buyers is considered as in [6] for illustration and discussion. The parameters { a n , b n , E n ̲ , E n ¯ } of agents are listed in the Table 1 and are chosen randomly for simulation. In the network, sellers have renewable energy generation, such as solar power or wind generator. The power output lower bounds of sellers or producers are all set to 0, and the power output upper bounds E n ¯ are the forecast renewable power generation in the real time. Buyers are houses equipped with controllable appliances, and the upper bounds are all set to −1, which means the minimal energy demand is 1 kW. As shown in Figure 7, each agent is connected to a bus. Bus 1 is the reference bus. Sellers are located on buses 2, 5, 8, 10 and 11, while buyers are on buses 3, 4, 6, 7, 9, 12 and 13. All agents can communicate with each other through a connected virtual communication network, and solid lines constitute a physical electrical network. The stopping conditions χ r and χ t are both set to 10 5 in the simulation.

5.1. Convergence Performance of the Negotiation Mechanism

For the convergence performance of the negotiation mechanism, we use the value of total primary and dual residuals to measure it. The convergence process of the negotiation algorithm is shown in Figure 8, from which it can be seen that the total local primary and dual residuals keep decreasing with oscillation, and all transactions between sellers and buyers converge after 36 iterations. Compared with other distributed optimization algorithms, such as consensus + innovation [8] and gradient-based methods [6], the ADMM-based algorithm has a very good convergence speed.
Table 2 shows the final power transaction quantities among agents of the case study. Since there is no line constraint, the power transactions prices among agents will converge to the same value, which is 4.29 $/kW. We also use the Power Transfer Distribution Factors (PTDF) model to calculate the flows on each line. Figure 9 shows the line flows of the test system.

5.2. Performance of the Consensus Mechanism

After each agent completes the verification for the optimality of received solutions, they need to share the consensus results to other neighboring agents. In this process, the message may be lost due to packet dropout, node crash, or malicious attack. Thus, we assume that the message delivery has a success rate, which is set to constant for all agents. In this section, we demonstrate the performance of the consensus mechanism under different message delivery success rates. The results are shown in Figure 10, from which we can find that the consensus success rate keeps increasing with the increase in the message delivery success rate, and when the message delivery success rate is not lower than 0.7, the consensus mechanisms almost guarantee success.

5.3. Performance of the Privacy-Preserving Consensus Mechanism

In this paper, we propose a privacy-preserving consensus mechanism to protect the private information of agents. Agent n first constructs the pieces of encrypted information { [ a n ] m , [ b n ] m } , and then calculates S n m k = N ω n ( 2 [ a n ] m m ω n E n m k + 1 + [ b n ] m ) + ρ m ω n E n m k + 1 , which will be sent to corresponding neighboring agents. By using the Shamir’s secret sharing method, the private information { a n , b n } and traded energy quantities m ω n E n m k + 1 can be well protected. Table 3 shows the plaintext S n k and ciphertext S n m k of a seller in a certain iteration. It can be seen that the ciphertext is totally different from the plaintext, and an attacker cannot obtain the true value.
Then, we assume that there are malicious agents who will manipulate the shared information S n m k to make the recovery value wrong. To be specific, the malicious agents will add a random value to the S n m k , and broadcast it to other neighboring agents during the consensus process. Table 4 shows the recovery results set s 1 , , s u of a trusted agent with and without malicious attack. It can be seen from the table that, under one malicious agent attack, the major result in s 1 , , s u is still the right result. However, if there are two malicious agents in the neighboring agents’ set, one trusted agent may receive two fake messages S n m k from the two malicious agents, then in the six ( C 4 2 ) recovery results, there will be five wrong results, and it is impossible to obtain the right result from the recovery set as shown in the third column in Table 4. Therefore, if the proportion of untrusted agents satisfy 4 f + 1 N ω n , the proposed method guarantees the correctness of the consensus verification results. Figure 11 shows the success rate of the consensus mechanism under different numbers of malicious agents. With the increase in malicious agents, the success rate decreases quite fast. When f = 3 , i.e., there are three malicious agents in the neighboring agents, the success rate is only about 20%.

5.4. Computational Efficiency Improvement for the Consensus Mechanism

The computational efficiency improvement for the consensus mechanism is shown in Figure 12. We use the communication times among agents to measure the performance. It can be seen that after taking the strategy, i.e., only verify the optimality of the received results for the first three and last few iterations, the communication times among agents can be highly reduced by more than 60%, from 15,120 to 5880 ( α = 100 ) and 3360 ( α = 10 ).

6. Discussion

The most valuable achievement of this paper is the privacy-preserving consensus mechanism, which provides a secure and efficient method to ensure the incentive compatibility of an optimization-based P2P energy trading mechanism. Using our method, all agents can spontaneously and collaboratively guarantee the optimality of the solutions, i.e., all agents will obey the negotiation mechanism to decide the energy biddings. However, our consensus mechanism has some limitations. First, it is only applicable to optimization problems where the objective function and constraints are continuously differentiable. It is not suitable for integer programming (IP) problems because the optimal solution cannot be verified using KKT conditions. Second, for privacy-preserving methods, the proportion of untrusted representatives is less than 1/4. While it can effectively protect privacy, it performs slightly worse on dishonesty tolerance. In our future work, we will focus on improving the consensus mechanism to handle more complex optimization problems, increase the tolerance of dishonesty, and apply it to blockchain-based systems to prove their effectiveness and performance.

7. Conclusions

For an optimization-based P2P energy trading mechanism, it is a challenge that to encourage agents to honestly cooperate in a trustless environment. In this work, an improved and revised PoSo-inspired consensus mechanism is proposed for P2P energy trading. The solutions solved by each agent will be verified by neighboring agents based on the KKT conditions, and a privacy-preserving method is designed to protect agents’ private information using Shamir’s Secret Sharing scheme. A PBFT-based method is designed to recover the correct result even under the malicious attacks from untrusted agents. In the simulation, we demonstrate the convergence of the negotiation mechanism, effectiveness of consensus mechanism, privacy protection performance and computational efficiency improvement for the consensus mechanism. The results prove that our proposed consensus mechanism can effectively verify the correctness of the solutions without a central authority and well-protect agents’ privacy under a proportion of malicious attackers.

Author Contributions

Conceptualization, Z.L. and B.Z.; methodology, Z.L. and H.G.; writing—original draft, Z.L. and B.Z.; writing—review and editing, H.G. and L.L.; validation, F.Z.; investigation, L.L.; software, F.Z.; project administration, Z.L.; funding acquisition, Z.L. and B.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the Research Program of STATE GRID Corporation of China under grant 5700-202255294A-2-0-QZ.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Nomenclature

C n ( · ) Production cost or utility function of agent n
n , m Indices for agents
E ̲ , E ¯ Boundaries of power
a n , b n Coefficients of the quadratic function of agent n
Ω Set of agents
Ω p Set of energy producers
Ω c Set of energy consumers
ω Set of neighboring agents
λ n m Energy prices provided by n to m
E n Power injection or total traded quantity of agent n
E n m Traded energy quantity from agent n to m
F n m Intermediate value of traded energy quantity between agent n to m
ρ Penalty factor
χ r , χ t Stopping criterion
RTotal local primary residuals
TTotal local dual residuals
{ μ ̲ n , μ ¯ n } Dual variables for constraints E n ̲ E n E n ¯
δ n m Dual variables for constraints 0 E n m ( 0 E n m )
Δ p ( · ) Indicator function for consensus fine
vConsensus verification result
fNumber of untrusted agents in the neighboring agents set
d a n , d b n Randomly generated coefficient for Shamir’s Secret Sharing functions
[ a n ] m , [ b n ] m Encrypted piece of information for agent m
S n m k Encrypted aggregated information from agent n to m
S n k Decrypted aggregated result
α Tuning parameter to control the number of consensus verification
D Set of agents who sent Commit messages
Γ Subset of D

References

  1. Dorahaki, S.; Rashidinejad, M.; Ardestani, S.F.F.; Abdollahi, A.; Salehizadeh, M.R. An integrated model for citizen energy communities and renewable energy communities based on clean energy package: A two-stage risk-based approach. Energy 2023, 277, 127727. [Google Scholar] [CrossRef]
  2. Tushar, W.; Saha, T.K.; Yuen, C.; Morstyn, T.; McCulloch, M.D.; Poor, H.V.; Wood, K.L. A motivational game-theoretic approach for peer-to-peer energy trading in the smart grid. Appl. Energy 2019, 243, 10–20. [Google Scholar] [CrossRef]
  3. Schollmeier, R. A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications. In Proceedings of the First International Conference on Peer-to-Peer Computing, Linköping, Sweden, 27–29 August 2001; IEEE: Piscataway, NJ, USA, 2001; pp. 101–102. [Google Scholar]
  4. Dorahaki, S.; Rashidinejad, M.; Ardestani, S.F.F.; Abdollahi, A.; Salehizadeh, M.R. A Peer-to-Peer energy trading market model based on time-driven prospect theory in a smart and sustainable energy community. Sustain. Energy Grids Netw. 2021, 28, 100542. [Google Scholar] [CrossRef]
  5. Feng, C.; Liang, B.; Li, Z.; Liu, W.; Wen, F. Peer-to-peer energy trading under network constraints based on generalized fast dual ascent. IEEE Trans. Smart Grid 2022, 14, 1441–1453. [Google Scholar] [CrossRef]
  6. Khorasany, M.; Mishra, Y.; Ledwich, G. A decentralized bilateral energy trading system for peer-to-peer electricity markets. IEEE Trans. Ind. Electron. 2019, 67, 4646–4657. [Google Scholar] [CrossRef] [Green Version]
  7. Mehdinejad, M.; Shayanfar, H.; Mohammadi-Ivatloo, B. Peer-to-peer decentralized energy trading framework for retailers and prosumers. Appl. Energy 2022, 308, 118310. [Google Scholar] [CrossRef]
  8. Sorin, E.; Bobo, L.; Pinson, P. Consensus-based approach to peer-to-peer electricity markets with product differentiation. IEEE Trans. Power Syst. 2018, 34, 994–1004. [Google Scholar] [CrossRef] [Green Version]
  9. Boyd, S.; Parikh, N.; Chu, E. Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers; Now Publishers Inc.: Norwell, MA, USA, 2011. [Google Scholar]
  10. Moret, F.; Pinson, P. Energy collectives: A community and fairness based approach to future electricity markets. IEEE Trans. Power Syst. 2019, 34, 3994–4004. [Google Scholar] [CrossRef] [Green Version]
  11. Morstyn, T.; McCulloch, M.D. Multiclass energy management for peer-to-peer energy trading driven by prosumer preferences. IEEE Trans. Power Syst. 2018, 34, 4005–4014. [Google Scholar] [CrossRef]
  12. AlSkaif, T.; Crespo-Vazquez, J.L.; Sekuloski, M.; van Leeuwen, G.; Catalão, J.P. Blockchain-based fully peer-to-peer energy trading strategies for residential energy systems. IEEE Trans. Ind. Inform. 2021, 18, 231–241. [Google Scholar] [CrossRef]
  13. Baroche, T.; Pinson, P.; Latimier, R.L.G.; Ahmed, H.B. Exogenous cost allocation in peer-to-peer electricity markets. IEEE Trans. Power Syst. 2019, 34, 2553–2564. [Google Scholar] [CrossRef] [Green Version]
  14. Nguyen, D.H. Optimal solution analysis and decentralized mechanisms for peer-to-peer energy markets. IEEE Trans. Power Syst. 2020, 36, 1470–1481. [Google Scholar] [CrossRef]
  15. Guo, Z.; Pinson, P.; Chen, S.; Yang, Q.; Yang, Z. Chance-constrained peer-to-peer joint energy and reserve market considering renewable generation uncertainty. IEEE Trans. Smart Grid 2020, 12, 798–809. [Google Scholar] [CrossRef]
  16. Guo, Z.; Pinson, P.; Chen, S.; Yang, Q.; Yang, Z. Online optimization for real-time peer-to-peer electricity market mechanisms. IEEE Trans. Smart Grid 2021, 12, 4151–4163. [Google Scholar] [CrossRef]
  17. Xu, Y.; Low, S.H. An efficient and incentive compatible mechanism for wholesale electricity markets. IEEE Trans. Smart Grid 2015, 8, 128–138. [Google Scholar] [CrossRef]
  18. Jia, Y.; Wan, C.; Yu, P.; Song, Y.; Ju, P. Security Constrained P2P Energy Trading in Distribution Network: An Integrated Transaction and Operation Model. IEEE Trans. Smart Grid 2022, 13, 4773–4786. [Google Scholar] [CrossRef]
  19. Exizidis, L.; Kazempour, J.; Papakonstantinou, A.; Pinson, P.; De Greve, Z.; Vallée, F. Incentive-compatibility in a two-stage stochastic electricity market with high wind power penetration. IEEE Trans. Power Syst. 2019, 34, 2846–2858. [Google Scholar] [CrossRef]
  20. Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system. Decentralized Bus. Rev. 2008, 21260. [Google Scholar]
  21. Kiayias, A.; Russell, A.; David, B.; Oliynykov, R. Ouroboros: A provably secure proof-of-stake blockchain protocol. In Proceedings of the Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, 20–24 August 2017; Proceedings, Part I. Springer: Berlin/Heidelberg, Germany, 2017; pp. 357–388. [Google Scholar]
  22. Castro, M.; Liskov, B. Practical byzantine fault tolerance. In Proceedings of the OsDI, New Orleans, LA, USA, 22–25 February 1999; Volume 99, pp. 173–186. [Google Scholar]
  23. Su, Z.; Wang, Y.; Xu, Q.; Fei, M.; Tian, Y.C.; Zhang, N. A secure charging scheme for electric vehicles with smart communities in energy blockchain. IEEE Internet Things J. 2018, 6, 4601–4613. [Google Scholar] [CrossRef] [Green Version]
  24. Tushar, W.; Saha, T.K.; Yuen, C.; Smith, D.; Poor, H.V. Peer-to-peer trading in electricity networks: An overview. IEEE Trans. Smart Grid 2020, 11, 3185–3200. [Google Scholar] [CrossRef] [Green Version]
  25. Tushar, W.; Saha, T.K.; Yuen, C.; Smith, D.; Ashworth, P.; Poor, H.V.; Basnet, S. Challenges and prospects for negawatt trading in light of recent technological developments. Nat. Energy 2020, 5, 834–841. [Google Scholar] [CrossRef]
  26. Tushar, W.; Yuen, C.; Saha, T.K.; Morstyn, T.; Chapman, A.C.; Alam, M.J.E.; Hanif, S.; Poor, H.V. Peer-to-peer energy systems for connected communities: A review of recent advances and emerging challenges. Appl. Energy 2021, 282, 116131. [Google Scholar] [CrossRef]
  27. Chen, S.; Mi, H.; Ping, J.; Yan, Z.; Shen, Z.; Liu, X.; Zhang, N.; Xia, Q.; Kang, C. A blockchain consensus mechanism that uses Proof of Solution to optimize energy dispatch and trading. Nat. Energy 2022, 7, 495–502. [Google Scholar] [CrossRef]
  28. Wang, N.; Zhou, X.; Lu, X.; Guan, Z.; Wu, L.; Du, X.; Guizani, M. When energy trading meets blockchain in electrical power system: The state of the art. Appl. Sci. 2019, 9, 1561. [Google Scholar] [CrossRef]
  29. Blom, F. A Feasibility Study of Blockchain Technology as Local Energy Market Infrastructure. Master’s Thesis, NTNU, Trondheim, Norway, 2018. [Google Scholar]
  30. Jindal, A.; Aujla, G.S.; Kumar, N. SURVIVOR: A blockchain based edge-as-a-service framework for secure energy trading in SDN-enabled vehicle-to-grid environment. Comput. Netw. 2019, 153, 36–48. [Google Scholar] [CrossRef] [Green Version]
  31. Saini, V.K.; Purohit, C.S.; Kumar, R.; Al-Sumaiti, A.S. Proof of Work Consensus Based Peer to Peer Energy Trading in the Indian Residential Community. Energies 2023, 16, 1253. [Google Scholar] [CrossRef]
  32. Pop, C.; Cioara, T.; Antal, M.; Anghel, I.; Salomie, I.; Bertoncini, M. Blockchain based decentralized management of demand response programs in smart energy grids. Sensors 2018, 18, 162. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  33. Yang, J.; Paudel, A.; Gooi, H.B.; Nguyen, H.D. A Proof-of-Stake public blockchain based pricing scheme for peer-to-peer energy trading. Appl. Energy 2021, 298, 117154. [Google Scholar] [CrossRef]
  34. Wang, T.; Guo, J.; Ai, S.; Cao, J. RBT: A distributed reputation system for blockchain-based peer-to-peer energy trading with fairness consideration. Appl. Energy 2021, 295, 117056. [Google Scholar] [CrossRef]
  35. Dong, J.; Song, C.; Liu, S.; Yin, H.; Zheng, H.; Li, Y. Decentralized peer-to-peer energy trading strategy in energy blockchain environment: A game-theoretic approach. Appl. Energy 2022, 325, 119852. [Google Scholar] [CrossRef]
  36. Li, Z.; Xu, H.; Zhai, F.; Zhao, B.; Xu, M.; Guo, Z. A Privacy-Preserving, Two-Party, Secure Computation Mechanism for Consensus-Based Peer-to-Peer Energy Trading in the Smart Grid. Sensors 2022, 22, 9020. [Google Scholar] [CrossRef]
  37. Boyd, S.; Boyd, S.P.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2010. [Google Scholar]
  38. Guo, Z.; Qin, B.; Guan, Z.; Wang, Y.; Zheng, H.; Wu, Q. A High-Efficiency and Incentive-Compatible Peer-to-Peer Energy Trading Mechanism. IEEE Trans. Smart Grid 2023. [Google Scholar] [CrossRef]
  39. Ping, J.; Yan, Z.; Chen, S. A privacy-preserving blockchain-based method to optimize energy trading. IEEE Trans. Smart Grid 2022, 14, 1148–1157. [Google Scholar] [CrossRef]
  40. Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
  41. Brickell, E.F. Some ideal secret sharing schemes. J. Comb. Math. Comb. Comput. 1989, 6, 105–113. [Google Scholar]
  42. Harn, L.; Lin, C. Detection and identification of cheaters in (t, n) secret sharing scheme. Des. Codes Cryptogr. 2009, 52, 15–24. [Google Scholar] [CrossRef]
Figure 1. Comparison of different consensus mechanisms used in P2P energy trading.
Figure 1. Comparison of different consensus mechanisms used in P2P energy trading.
Symmetry 15 01561 g001
Figure 2. Flow chart of PoSo.
Figure 2. Flow chart of PoSo.
Symmetry 15 01561 g002
Figure 3. P2P energy trading market architecture.
Figure 3. P2P energy trading market architecture.
Symmetry 15 01561 g003
Figure 4. Schematic diagram of the P2P energy trading negotiation mechanism.
Figure 4. Schematic diagram of the P2P energy trading negotiation mechanism.
Symmetry 15 01561 g004
Figure 5. Diagram of the consensus mechanism for P2P energy trading.
Figure 5. Diagram of the consensus mechanism for P2P energy trading.
Symmetry 15 01561 g005
Figure 6. Flowchart of the privacy-preserving consensus mechanism.
Figure 6. Flowchart of the privacy-preserving consensus mechanism.
Symmetry 15 01561 g006
Figure 7. Schematic diagram of the test system.
Figure 7. Schematic diagram of the test system.
Symmetry 15 01561 g007
Figure 8. Convergence of the negotiation algorithm.
Figure 8. Convergence of the negotiation algorithm.
Symmetry 15 01561 g008
Figure 9. Flows on each line of the test system.
Figure 9. Flows on each line of the test system.
Symmetry 15 01561 g009
Figure 10. Success rate of the consensus mechanism under different success rate of message delivery.
Figure 10. Success rate of the consensus mechanism under different success rate of message delivery.
Symmetry 15 01561 g010
Figure 11. Success rate of privacy-preserving consensus mechanism under different number of malicious agents.
Figure 11. Success rate of privacy-preserving consensus mechanism under different number of malicious agents.
Symmetry 15 01561 g011
Figure 12. Communication times forthe consensus mechanism under different values of α .
Figure 12. Communication times forthe consensus mechanism under different values of α .
Symmetry 15 01561 g012
Table 1. Agents’ parameters of a simple case study.
Table 1. Agents’ parameters of a simple case study.
AgentBus a n b n E n ̲ [kW] E n ¯ [kW]
S120.042.107
S250.0462.504
S380.063.206
S4100.03408
S5110.043010
B130.0563−7−1
B240.0754−9−1
B390.0425−8−1
B430.0566−5−1
B540.0364.5−6−1
B690.0257−6.5−1
B790.045.5−7.5−1
Table 2. Final power transactions quantities among agents.
Table 2. Final power transactions quantities among agents.
S1S2S3S4S5
B10.19 kW0.19 kW0.19 kW0.23 kW0.19 kW
B20.15 kW0.19 kW0.19 kW0.34 kW0.13 kW
B32.09 kW1.27 kW1.45 kW0.82 kW2.38 kW
B40.62 kW0.43 kW1.05 kW1.21 kW1.69 kW
B50.59 kW0.01 kW0.53 kW0.43 kW1.32 kW
B61.46 kW0.80 kW1.23 kW0.98 kW2.04 kW
B71.91 kW1.11 kW1.36 kW0.87 kW2.26 kW
Table 3. The plaintext and ciphertext using Shamir’s Secret Sharing.
Table 3. The plaintext and ciphertext using Shamir’s Secret Sharing.
Neighboring AgentPlaintext S n Ciphertext S nm
B136.607,272,133.495513787
B236.6014,544,230.391027808
B336.6021,816,327.286541834
B436.6029,088,424.182055857
B536.6036,360,521.07756989
B636.6043,632,617.973083906
B736.6050,904,714.86859793
Table 4. The recovery results set s 1 , , s u with and without malicious agents.
Table 4. The recovery results set s 1 , , s u with and without malicious agents.
No Malicious Agent ( f = 0 )One Malicious Agent ( f = 1 )Two Malicious Agent ( f = 2 )
36.60−3644.287−8518.492
36.60−29,410.494−947.18
36.60−781.37536.6
36.6036.6052,052.002
36.6036.60−1674.418
36.6036.60−182.018
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, Z.; Zhao, B.; Guo, H.; Zhai, F.; Li, L. A Privacy-Preserving Consensus Mechanism for ADMM-Based Peer-to-Peer Energy Trading. Symmetry 2023, 15, 1561. https://doi.org/10.3390/sym15081561

AMA Style

Li Z, Zhao B, Guo H, Zhai F, Li L. A Privacy-Preserving Consensus Mechanism for ADMM-Based Peer-to-Peer Energy Trading. Symmetry. 2023; 15(8):1561. https://doi.org/10.3390/sym15081561

Chicago/Turabian Style

Li, Zhihu, Bing Zhao, Hongxia Guo, Feng Zhai, and Lin Li. 2023. "A Privacy-Preserving Consensus Mechanism for ADMM-Based Peer-to-Peer Energy Trading" Symmetry 15, no. 8: 1561. https://doi.org/10.3390/sym15081561

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop