{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:09:27Z","timestamp":1742918967072,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":55,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789812872500"},{"type":"electronic","value":"9789812872517"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-287-251-7_48","type":"book-chapter","created":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T13:03:18Z","timestamp":1659963798000},"page":"787-835","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["CyreumE: A Real-Time Situational Awareness and Decision-Making Blockchain-Based Architecture for the Energy Internet"],"prefix":"10.1007","author":[{"given":"Abubakar Sadiq","family":"Sani","sequence":"first","affiliation":[]},{"given":"Dong","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Stephen","family":"Ogaji","sequence":"additional","affiliation":[]},{"given":"Zhao Yang","family":"Dong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,9]]},"reference":[{"key":"48_CR1","unstructured":"Advanticsys, IoT Hardware Platforms, 2018. https:\/\/www.advanticsys.com\/shop\/iot-hardware-platforms-c-7.html?lang=en. Accessed 12 Dec 2018"},{"issue":"05","key":"48_CR2","doi-asserted-by":"publisher","first-page":"229","DOI":"10.4236\/jcc.2015.35029","volume":"3","author":"A Al-Ali","year":"2015","unstructured":"A. Al-Ali, R. Aburukba, Role of internet of things in the smart grid technology. J Comput Commun 3(05), 229 (2015)","journal-title":"J Comput Commun"},{"key":"48_CR3","doi-asserted-by":"crossref","unstructured":"M. Andrychowicz, S. Dziembowski, D. Malinowski, L. Mazurek 2014 IEEE symposium on, secure multiparty computations on bitcoin, in Security and Privacy (SP) (IEEE, 2014), pp. 443\u2013458","DOI":"10.1109\/SP.2014.35"},{"key":"48_CR4","unstructured":"AVISPA, Automation Validation of Internet Security Protocols and Applications, 2003. http:\/\/www.avispa-project.org\/. Accessed 14 Jan 2017"},{"issue":"1","key":"48_CR5","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MCOM.2013.6400437","volume":"51","author":"E Bou-Harb","year":"2013","unstructured":"E. Bou-Harb, C. Fachkha, M. Pourzandi, M. Debbabi, C. Assi, Communication security for smart grid distribution networks. IEEE Commun. Mag. 51(1), 42\u201349 (2013)","journal-title":"IEEE Commun. Mag."},{"issue":"3","key":"48_CR6","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/0165-0114(85)90090-9","volume":"17","author":"JJ Buckley","year":"1985","unstructured":"J.J. Buckley, Fuzzy hierarchical analysis. Fuzzy Sets Syst. 17(3), 233\u2013247 (1985)","journal-title":"Fuzzy Sets Syst."},{"key":"#cr-split#-48_CR7.1","doi-asserted-by":"crossref","unstructured":"J. Cao, M. Yang, Energy internet - towards smart grid 2.0, in 2013 Fourth International Conference on Networking and Distributed Computing, Hong Kong, 2013","DOI":"10.1109\/ICNDC.2013.10"},{"key":"#cr-split#-48_CR7.2","doi-asserted-by":"crossref","unstructured":"2014 (IEEE, 2013), pp. 105-110. https:\/\/doi.org\/10.1109\/ICNDC.2013.10","DOI":"10.1109\/ICNDC.2013.10"},{"key":"48_CR8","doi-asserted-by":"crossref","unstructured":"D.-Y. Chang, Applications of the extent analysis method on fuzzy AHP. Eur. J. Oper. Res. 95(3) (1996)","DOI":"10.1016\/0377-2217(95)00300-2"},{"issue":"3","key":"48_CR9","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1109\/TPWRD.2008.2005683","volume":"24","author":"D Choi","year":"2009","unstructured":"D. Choi, H. Kim, D. Won, S. Kim, Advanced key-management architecture for secure SCADA communications. IEEE Tran Power Deliv 24(3), 1154\u20131163 (2009). https:\/\/doi.org\/10.1109\/TPWRD.2008.2005683","journal-title":"IEEE Tran Power Deliv"},{"issue":"1","key":"48_CR10","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.dss.2008.06.003","volume":"46","author":"SW Chou","year":"2008","unstructured":"S.W. Chou, Y.C. Chang, The implementation factors that influence the ERP (enterprise resource planning) benefits. Decis. Support. Syst. 46(1), 149\u2013157 (2008). https:\/\/doi.org\/10.1016\/j.dss.2008.06.003","journal-title":"Decis. Support. Syst."},{"key":"48_CR11","unstructured":"N. Consortium, The network simulator 3 (2015). https:\/\/www.nsnam.org\/. Accessed 3 May 2018"},{"key":"48_CR12","first-page":"6","volume":"2","author":"M Crosby","year":"2016","unstructured":"M. Crosby, P. Pattanayak, S. Verma, V. Kalyanaraman, Blockchain technology: Beyond bitcoin. Appl Innov 2, 6\u201310 (2016)","journal-title":"Appl Innov"},{"key":"48_CR13","unstructured":"Dalal G, Gilboa E, Mannor S Hierarchical decision making in electricity grid management, in International Conference on Machine Learning, 2016, pp. 2197\u20132206"},{"key":"48_CR14","unstructured":"A. Daneels, W. Salter, What is SCADA? (1999)"},{"issue":"2","key":"48_CR15","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"D. Dolev, A. Yao, On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198\u2013208 (1983). https:\/\/doi.org\/10.1109\/TIT.1983.1056650","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"48_CR16","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/2641638.2641652","volume":"49","author":"D Gay","year":"2014","unstructured":"D. Gay, P. Levis, R. Von Behren, M. Welsh, E. Brewer, D. Culler, The nesC language: A holistic approach to networked embedded systems. ACM SIGPLAN Not. 49(4), 41\u201351 (2014)","journal-title":"ACM SIGPLAN Not."},{"key":"48_CR17","doi-asserted-by":"crossref","unstructured":"G. Gelston, A. Dalton, L. Tate, Multi-organizational distributed decision making in the power grid industry, in: 2012 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA) (IEEE, 2012), pp. 158\u2013161","DOI":"10.1109\/CogSIMA.2012.6188370"},{"key":"48_CR18","doi-asserted-by":"publisher","first-page":"3557","DOI":"10.1109\/ACCESS.2016.2581838","volume":"4","author":"X He","year":"2016","unstructured":"X. He, R.C. Qiu, Q. Ai, L. Chu, X. Xu, Z. Ling, Designing for situation awareness of future power grids: An indicator system based on linear eigenvalue statistics of large random matrices. IEEE Access 4, 3557\u20133568 (2016)","journal-title":"IEEE Access"},{"issue":"4","key":"48_CR19","doi-asserted-by":"publisher","first-page":"2171","DOI":"10.1109\/TPWRD.2011.2162752","volume":"26","author":"J-H Heo","year":"2011","unstructured":"J.-H. Heo, M.-K. Kim, G.-P. Park, Y.T. Yoon, J.K. Park, S.-S. Lee, D.-H. Kim, A reliability-centered approach to an optimal maintenance strategy in transmission systems using a genetic algorithm. IEEE Trans Power Deliv 26(4), 2171\u20132179 (2011)","journal-title":"IEEE Trans Power Deliv"},{"issue":"1","key":"48_CR20","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/JPROC.2010.2081330","volume":"99","author":"AQ Huang","year":"2011","unstructured":"A.Q. Huang, M.L. Crow, G.T. Heydt, J.P. Zheng, S.J. Dale, The future renewable electric energy delivery and management (FREEDM) system: The energy internet. Proc. IEEE 99(1), 133\u2013148 (2011). https:\/\/doi.org\/10.1109\/JPROC.2010.2081330","journal-title":"Proc. IEEE"},{"key":"48_CR21","unstructured":"Hyperledger, Hyperledger fabric, 2019. https:\/\/www.hyperledger.org\/projects\/fabric. Accessed 23 Aug 2019"},{"key":"48_CR22","unstructured":"A. Jabbarzadeh, B. Fahimnia, S. Rastegar, Green and resilient design of electricity supply chain networks: A multiobjective robust optimization approach. IEEE Trans. Eng. Manag (2017)"},{"issue":"3","key":"48_CR23","doi-asserted-by":"publisher","first-page":"1344","DOI":"10.1109\/TSG.2012.2197229","volume":"3","author":"P Kansal","year":"2012","unstructured":"P. Kansal, A. Bose, Bandwidth and latency requirements for smart transmission grid applications. IEEE Trans Smart Grid 3(3), 1344\u20131352 (2012)","journal-title":"IEEE Trans Smart Grid"},{"key":"48_CR24","doi-asserted-by":"crossref","unstructured":"T. Khan, J. Reneke, R. Grotheer, T. Strauss, Decision making using a multi-criteria approach in a wholesale electrical power market, in Power Systems Conference (PSC), 2015 Clemson University, (Piscataway, IEEE, 2015), pp. 1\u20135","DOI":"10.1109\/PSC.2015.7101680"},{"issue":"1","key":"48_CR25","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/S0020-7373(86)80040-2","volume":"24","author":"B Kosko","year":"1986","unstructured":"B. Kosko, Fuzzy cognitive maps. Int. J. Man Mach. Stud. 24(1), 65\u201375 (1986). https:\/\/doi.org\/10.1016\/S0020-7373(86)80040-2","journal-title":"Int. J. Man Mach. Stud."},{"key":"48_CR26","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.comnet.2014.03.029","volume":"67","author":"M Kuzlu","year":"2014","unstructured":"M. Kuzlu, M. Pipattanasomporn, S. Rahman, Communication network requirements for major smart grid applications in HAN, NAN and WAN. Comput. Netw. 67, 74\u201388 (2014)","journal-title":"Comput. Netw."},{"issue":"12","key":"48_CR27","doi-asserted-by":"publisher","first-page":"3785","DOI":"10.1016\/j.asoc.2012.01.024","volume":"12","author":"G Kyriakarakos","year":"2012","unstructured":"G. Kyriakarakos, A.I. Dounis, K.G. Arvanitis, G. Papadakis, A fuzzy cognitive maps\u2013petri nets energy management system for autonomous polygeneration microgrids. Appl. Soft Comput. 12(12), 3785\u20133797 (2012)","journal-title":"Appl. Soft Comput."},{"key":"48_CR28","doi-asserted-by":"crossref","unstructured":"A. Melodi, J. Momoh, A. Oyinlola, Transmission system reliability modeling and assessment for Nigerian electric grid, in PowerAfrica, 2017 IEEE PES (IEEE, 2017), pp. 40\u201345","DOI":"10.1109\/PowerAfrica.2017.7991197"},{"issue":"2","key":"48_CR29","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1109\/TSG.2013.2283260","volume":"5","author":"S Mohagheghi","year":"2014","unstructured":"S. Mohagheghi, Integrity assessment scheme for situational awareness in utility automation systems. IEEE Trans. Smart Grid 5(2), 592\u2013601 (2014). https:\/\/doi.org\/10.1109\/TSG.2013.2283260","journal-title":"IEEE Trans. Smart Grid"},{"issue":"2","key":"48_CR30","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/JSYST.2013.2260942","volume":"8","author":"H Nicanfar","year":"2014","unstructured":"H. Nicanfar, P. Jokar, K. Beznosov, V.C.M. Leung, Efficient authentication and key management mechanisms for smart grid communications. IEEE Syst. J. 8(2), 629\u2013640 (2014). https:\/\/doi.org\/10.1109\/JSYST.2013.2260942","journal-title":"IEEE Syst. J."},{"issue":"1","key":"48_CR31","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1142\/S0129065789000475","volume":"1","author":"E Oja","year":"1989","unstructured":"E. Oja, Neural networks, principal components, and subspaces. Int. J. Neural Syst. 1(1), 61\u201368 (1989)","journal-title":"Int. J. Neural Syst."},{"key":"48_CR32","doi-asserted-by":"crossref","unstructured":"E.I. Papageorgiou, K. Pocz\u0119ta, Application of fuzzy cognitive maps to electricity consumption prediction, in Fuzzy Information Processing Society (NAFIPS) Held Jointly with 2015 5th World Conference on Soft Computing (WConSC), 2015 Annual Conference of the North American (IEEE, 2015), pp. 1\u20136","DOI":"10.1109\/NAFIPS-WConSC.2015.7284139"},{"issue":"1","key":"48_CR33","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/TFUZZ.2012.2201727","volume":"21","author":"EI Papageorgiou","year":"2013","unstructured":"E.I. Papageorgiou, J.L. Salmeron, A review of fuzzy cognitive maps research during the last decade. IEEE Trans. Fuzzy Syst. 21(1), 66\u201379 (2013)","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"48_CR34","unstructured":"Powering Nigeria for the Future, 2016. https:\/\/www.pwc.com\/gx\/en\/growth-markets-centre\/assets\/pdf\/powering-nigeria-future.pdf. Accessed 1 May 2018"},{"issue":"7","key":"48_CR35","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1049\/et:20080718","volume":"3","author":"J Rifkin","year":"2008","unstructured":"J. Rifkin, The third industrial revolution. Eng. Technol. 3(7), 26\u201327 (2008). https:\/\/doi.org\/10.1049\/et:20080718","journal-title":"Eng. Technol."},{"key":"48_CR36","unstructured":"C.P. Robert, Monte Carlo Methods. Wiley Online Library (2004)"},{"key":"48_CR37","doi-asserted-by":"crossref","unstructured":"A.S. Sani, D. Yuan, W. Bao, Z.Y. Dong, Towards secure energy internet communication scheme: An identity-based key bootstrapping protocol supporting unicast and multicast, in 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA) (IEEE, 2017), pp. 1\u20135","DOI":"10.1109\/NCA.2017.8171328"},{"key":"48_CR38","doi-asserted-by":"crossref","unstructured":"A.S. Sani, D. Yuan, J. Jin, L. Gao, S. Yu, Z.Y. Dong, Cyber security framework for internet of things-based energy internet. Futur. Gener. Comput. Syst. 93, 849\u2013859 (2018)","DOI":"10.1016\/j.future.2018.01.029"},{"issue":"8","key":"48_CR39","doi-asserted-by":"publisher","first-page":"2113","DOI":"10.1109\/TIFS.2019.2892005","volume":"14","author":"AS Sani","year":"2019","unstructured":"A.S. Sani, D. Yuan, W. Bao, Z.Y. Dong, B. Vucetic, E. Bertino, Universally Composable key bootstrapping and secure communication protocols for the energy internet. IEEE Trans Inf Forensics Sec 14(8), 2113\u20132127 (2019). https:\/\/doi.org\/10.1109\/TIFS.2019.2892005","journal-title":"IEEE Trans Inf Forensics Sec"},{"key":"48_CR40","doi-asserted-by":"crossref","unstructured":"A. Siraj, S.M. Bridges, R.B. Vaughn, Fuzzy cognitive maps for decision support in an intelligent intrusion detection system, in IFSA World Congress and 20th NAFIPS International Conference, 2001. Joint 9th, 2001 (IEEE, 2001), pp. 2165\u20132170","DOI":"10.1109\/NAFIPS.2001.944405"},{"issue":"1","key":"48_CR41","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1109\/TSMCA.2003.818878","volume":"34","author":"CD Stylios","year":"2004","unstructured":"C.D. Stylios, P.P. Groumpos, Modeling complex systems using fuzzy cognitive maps. IEEE Trans. Syst. Man. Cybern. Part A Syst. Hum. 34(1), 155\u2013162 (2004)","journal-title":"IEEE Trans. Syst. Man. Cybern. Part A Syst. Hum."},{"issue":"3","key":"48_CR42","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.1016\/j.asoc.2007.02.022","volume":"8","author":"CD Stylios","year":"2008","unstructured":"C.D. Stylios, V.C. Georgopoulos, G.A. Malandraki, S. Chouliara, Fuzzy cognitive map architectures for medical decision support systems. Appl. Soft Comput. 8(3), 1243\u20131251 (2008)","journal-title":"Appl. Soft Comput."},{"key":"48_CR43","unstructured":"Tendermint, Tendermint: Blockchain Consensus, 2019. https:\/\/tendermint.com\/. Accessed 23 Aug 2019"},{"key":"48_CR44","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1016\/j.rser.2017.03.001","volume":"74","author":"PA Trotter","year":"2017","unstructured":"P.A. Trotter, M.C. McManus, R. Maconachie, Electricity planning and implementation in sub-Saharan Africa: A systematic review. Renew. Sust. Energ. Rev. 74, 1189\u20131209 (2017)","journal-title":"Renew. Sust. Energ. Rev."},{"key":"48_CR45","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1016\/j.enpol.2015.09.004","volume":"87","author":"ZG Usman","year":"2015","unstructured":"Z.G. Usman, S. Abbasoglu, N.T. Ersoy, M. Fahrioglu, Transforming the Nigerian power sector for sustainable development. Energy Policy 87, 429\u2013437 (2015)","journal-title":"Energy Policy"},{"key":"48_CR46","unstructured":"A. Vaccaro, R. Baseil, H. Hagras, M. Ho, P. Krein, R. Larsen, G. McKnight, V. Modi, A. Pascual, K. Passino, Reliable electric power for developing countries. Hum. Technol. Challenge. 1 (2011)"},{"issue":"7","key":"48_CR47","doi-asserted-by":"publisher","first-page":"1199","DOI":"10.1109\/JPROC.2017.2702998","volume":"105","author":"J Wang","year":"2017","unstructured":"J. Wang, H. Gharavi, Power grid resilience [scanning the issue]. Proc. IEEE 105(7), 1199\u20131201 (2017). https:\/\/doi.org\/10.1109\/JPROC.2017.2702998","journal-title":"Proc. IEEE"},{"issue":"3","key":"48_CR48","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1109\/TSUSC.2017.2707122","volume":"2","author":"K Wang","year":"2017","unstructured":"K. Wang, X. Hu, H. Li, P. Li, D. Zeng, S. Guo, A survey on energy internet communications for sustainability. IEEE Trans. Sustain. Comput. 2(3), 231\u2013254 (2017)","journal-title":"IEEE Trans. Sustain. Comput."},{"key":"48_CR49","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"G. Wood, Ethereum: A secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 151, 1\u201332 (2014)","journal-title":"Ethereum Proj. Yellow Pap."},{"key":"48_CR50","doi-asserted-by":"crossref","unstructured":"R.J. Wood, M.A. Gennert, A neural network that uses a Hebbian\/backpropagation hybrid learning rule, in International Joint Conference on Neural Networks, 1992. IJCNN (IEEE, 1992). pp. 863\u2013868","DOI":"10.1109\/IJCNN.1992.227091"},{"key":"48_CR51","unstructured":"I. Xplore, IEEE Std 802.15.4f-2012 (Amendment to IEEE Std 802.15.4\u20132011): IEEE Standard for Local and metropolitan area networks \u2013 Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) Amendment 2: Active Radio Frequency Identification (RFID) System Physical. vol Book, Whole (IEEE, 2012)"},{"key":"48_CR52","doi-asserted-by":"crossref","unstructured":"F. Yang, A.S. Meliopoulos, G.J. Cokkinides, G.K. Stefopoulos, A comprehensive approach for bulk power system reliability assessment (IEEE Lausanne Power Tech, 2007). pp. 1587\u20131592","DOI":"10.1109\/PCT.2007.4538552"},{"key":"48_CR53","unstructured":"R.E. Zapolin, Remote Terminal Industrial Control Communication System. Google Patents (1992)"},{"issue":"4","key":"48_CR54","doi-asserted-by":"publisher","first-page":"983","DOI":"10.1007\/s12083-016-0456-1","volume":"10","author":"Y Zhang","year":"2017","unstructured":"Y. Zhang, J. Wen, The IoT electric business model: Using blockchain technology for the internet of things. Peer Peer Netw Appl 10(4), 983\u2013994 (2017)","journal-title":"Peer Peer Netw Appl"}],"container-title":["Handbook of Real-Time Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-287-251-7_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T23:28:58Z","timestamp":1727738938000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-287-251-7_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789812872500","9789812872517"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-981-287-251-7_48","relation":{},"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"9 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}