| Smart grid is the trend of electric power industry in the future.Moreover,its power distribution system can communicate by many ways.The power distribution system based on wireless mesh mode is facing many security problems.At present,traditional encryption and decryption,intrusion detection and other methods are the main solutions to ensure the security of power telecommunication network,but these solutions are difficult to meet the huge data processing and expanding demand of smart grid.Block chain technology has great advantages in guaranteeing distributed network security.However,the current block chain technology consumes more resources in the production and storage of blocks,so it cannot be directly applied to the power communication network with a large number of resource-limited nodes.Firstly,this paper investigates the power distribution system based on ad-hoc network,and analyses the characteristics and limitations of the network.Secondly,we studied the blockchain technology,and it has great advantages in ensuring the security of distributed network communication.However,to apply the blockchain technology to the power distribution system with resource-limited nodes,it is necessary to overcome the problems of producing,verifying and storing blocks,which consume many CPU power and storage resources.Based on the above problems,the main work of this paper is as follows:(1)Aiming at the problem that the current block chain technology requires more resources to produce and verify blocks,this paper proposes a DPOS algorithm based on network message accumulation.This algorithm produces blocks by election and shuffling,and observes the network status through network message accumulation,so that resource-limited nodes can efficiently,produce blocks and better realize the network.Load balancing.(2)Aiming at the problem that storing blocks needs lots of storge space,which is unachievable for resource-limited nodes.This paper proposes a historical chain compression technology,which solves the problem of storing blocks in the data collector nodes by continuously compressing historical chain through the growth mode of Merkle tree.(3)Aiming at the problem that the vulnerabilities in the underlying P2P network of ethereum may cause eclipse attacks.This paper proposes four strategies to limit the number of generated IDs of nodes to one;map to table by ID+timestamp;establish connections with nodes in the database after restarting nodes;and do not process Ping messages of unknown nodes after restarting nodes.Through these four strategies,the P2P network can better resist eclpise attacks,which guarantees the security of the upper layer of block chain from the underlying. |