Secure and transparent energy management using blockchain and machine learning anomaly detection: A case study of the Ausgrid dataset

被引:0
|
作者
Moumni, Nourchen
Chaabane, Faten [2 ,4 ]
Drira, Fadoua [1 ,3 ]
Boutaleb, Youssef [3 ]
机构
[1] Univ Sfax, Res Grp Intelligent Machines, Sfax, Tunisia
[2] Univ Sfax, Data Engn & Semant Res Unit, Sfax, Tunisia
[3] Univ Sfax, Natl Engn Sch Sfax, BP 1173, Sfax 3038, Tunisia
[4] Higher Inst Comp Sci & Multimedia, BP 122, Gabes 6033, Tunisia
关键词
Blockchain; Security; Energy management; Time series; Machine learning; Anomaly detection; MECHANISM; PRIVACY;
D O I
10.1016/j.cie.2025.111040
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Effective energy management requires advanced strategies to optimize consumption, enhance reliability, and promote sustainability. This paper addresses secure and transparent energy management by integrating blockchain technology with machine learning for anomaly detection. We deploy a blockchain architecture to ensure tamper-proof, decentralized data sharing, allowing for anomaly alerts by postcode. This study evaluates four clustering algorithms K-Means, DBSCAN, MeanShift, and Isolation Forest-for detecting anomalies. Automated hyperparameter tuning was applied, and the methods were validated using the Ausgrid dataset, which contains detailed energy consumption records. To establish a robust anomaly detection framework, we employ well-known supervised classification algorithms - Decision Tree, KNN, Logistic Regression, Random Forest, and XGBoost - to evaluate the performance of each clustering method and conduct a comparative analysis to identify the most effective machine learning algorithm. A cross-validation process is undertaken to optimize hyperparameters for each classification method. To address the challenge of imbalanced datasets, we applied SMOTE (Synthetic Minority Over-sampling Technique), which generates synthetic samples for underrepresented classes. The performance of anomaly detection algorithms was compared with and without this technique. The proposed system's scalability, supported by energy-efficient consensus mechanisms such as Proof of Stake, ensures its applicability to large-scale energy management systems. These features demonstrate the framework's potential to enhance grid resilience and support dynamic, decentralized energy networks in real-world scenarios. Overall, our proposed architecture demonstrates significant results, confirming that the combination of blockchain technology and machine learning enhances the security, transparency, efficiency, and resilience of energy management systems.
引用
收藏
页数:28
相关论文
共 50 条
  • [31] IP Network Anomaly Detection using Machine Learning
    Nair, Roshan
    Kasula, Chaithanya Pramodh
    Vankayala, Sravanthi
    Chakraborty, Niloy
    2019 IEEE 5TH INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2019,
  • [32] Secure exchange and incentivised collaboration of machine learning models and datasets using blockchain
    D'souza, Jessica Judith
    Padmavathy, R.
    Dayal, Abhinav
    Gnanaveni, Harika
    Ponnada, Sreenu
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 19 (3-4) : 443 - 462
  • [33] Dataset Anonimyzation for Machine Learning: An ISP Case Study
    Campanile, Lelio
    Forgione, Fabio
    Marulli, Fiammetta
    Palmiero, Gianfranco
    Sanghez, Carlo
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, ICCSA 2021, PT II, 2021, 12950 : 589 - 597
  • [34] Secure water quality prediction system using machine learning and blockchain technologies
    Jenifel, M. Geetha
    JOURNAL OF ENVIRONMENTAL MANAGEMENT, 2024, 350
  • [35] RBDT: The cascading of machine learning classifiers for anomaly detection with case study of two datasets
    Jidiga, Goverdhan Reddy
    Sammulal, Porika
    Advances in Intelligent Systems and Computing, 2015, 320 : 309 - 324
  • [36] Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection
    Demontis, Ambra
    Melis, Marco
    Biggio, Battista
    Maiorca, Davide
    Arp, Daniel
    Rieck, Konrad
    Corona, Igino
    Giacinto, Giorgio
    Roli, Fabio
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (04) : 711 - 724
  • [37] Network Intrusion Detection Using Machine Learning Anomaly Detection Algorithms
    Hanifi, Khadija
    Bank, Hasan
    Karsligil, M. Elif
    Yavuz, A. Gokhan
    Guvensan, M. Amac
    2017 25TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2017,
  • [38] Enhanced Fault Detection in Bearings Using Machine Learning and Raw Accelerometer Data: A Case Study Using the Case Western Reserve University Dataset
    Raj, Krish Kumar
    Kumar, Shahil
    Kumar, Rahul Ranjeev
    Andriollo, Mauro
    INFORMATION, 2024, 15 (05)
  • [39] Classification of Intrusion Detection Dataset using machine learning Approaches
    Subramanyam, Doodipalli
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES, ELECTRONICS AND MECHANICAL SYSTEMS (CTEMS), 2018, : 280 - 283
  • [40] Android Spyware Detection Using Machine Learning: A Novel Dataset
    Qabalin, Majdi K.
    Naser, Muawya
    Alkasassbeh, Mouhammd
    SENSORS, 2022, 22 (15)