{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T20:57:21Z","timestamp":1764449841180,"version":"3.46.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T00:00:00Z","timestamp":1764374400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T00:00:00Z","timestamp":1764374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Computing"],"DOI":"10.1007\/s10791-025-09827-4","type":"journal-article","created":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T20:53:04Z","timestamp":1764449584000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Tamper-proof strategy of dynamic hash chain for smart grid cloud storage based on reinforcement learning key update mechanism"],"prefix":"10.1007","volume":"28","author":[{"given":"Bo","family":"Feng","sequence":"first","affiliation":[]},{"given":"Yangrui","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Bingyu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiaoyu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Shaokang","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,29]]},"reference":[{"key":"9827_CR1","doi-asserted-by":"publisher","unstructured":"Pillai AG, Deshmukh SM. Efficient Service Centric Block Chain Data Security for SmartGrid Systems[J].E3S Web of Conferences, 2024, 540(000):9.https:\/\/doi.org\/10.1051\/e3sconf\/202454010035","DOI":"10.1051\/e3sconf\/202454010035"},{"key":"9827_CR2","doi-asserted-by":"publisher","unstructured":"Johncy G, Shaji RS, Sharean, T M A. M, enhancing smart grid security using BLS privacy blockchain with Siamese Bi-LSTM for electricity theft Detection[J].Transactions on emerging telecommunications technologies, 2025(1):36.https:\/\/doi.org\/10.1002\/ett.70033","DOI":"10.1002\/ett.70033"},{"issue":"5","key":"9827_CR3","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/TCST.2024.3378988","volume":"32","author":"Y Hanna","year":"2024","unstructured":"Hanna Y, Cebe M, Leon J, et al. Efficient group key management for resilient operation of LoRaWAN-Based smart grid Applications[J]. IEEE Trans Control Syst Technol. 2024;32(5):12. https:\/\/doi.org\/10.1109\/TCST.2024.3378988.","journal-title":"IEEE Trans Control Syst Technol"},{"key":"9827_CR4","unstructured":"Alimoglu A, Erdayandi K, Mustafa MA et al. EDGChain-E: A Decentralized Git-Based Framework for Versioning Encrypted Energy Data[J]. 2025."},{"key":"9827_CR5","doi-asserted-by":"publisher","unstructured":"Du J, Dai C, Mao P et al. An efficient lightweight authentication scheme for smart Meter[J].Mathematics (2227\u20137390), 2024, 12(8).https:\/\/doi.org\/10.3390\/math12081264","DOI":"10.3390\/math12081264"},{"key":"9827_CR6","doi-asserted-by":"publisher","DOI":"10.1142\/s0129156425403973","author":"Y Pan","year":"2025","unstructured":"Pan Y, Deng X, Yang YY, et al. Research on data anomaly detection method based on Software-Defined network for power Grid[J]. Int J High Speed Electron Syst. 2025. https:\/\/doi.org\/10.1142\/s0129156425403973.","journal-title":"Int J High Speed Electron Syst"},{"key":"9827_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-025-05466-y","author":"N Kumar","year":"2025","unstructured":"Kumar N, Kumar S, Sharma RK, et al. Cluster Comput. 2025;28(8). https:\/\/doi.org\/10.1007\/s10586-025-05466-y. A decentralized blockchain based privacy preservation scheme for healthcare data security enhancement in cloud[J]."},{"key":"9827_CR8","doi-asserted-by":"publisher","unstructured":"Joshi A, Sengar HS, Harshavardhan S et al. A Novel Ultra-Lightweight Authentication Scheme for Two-Way Communication in Smart Grids[J].2024 3rd International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT), 2024:394\u2013399.https:\/\/doi.org\/10.1109\/ccpqt64497.2024.00082","DOI":"10.1109\/ccpqt64497.2024.00082"},{"key":"9827_CR9","doi-asserted-by":"publisher","unstructured":"Kumar MP, Nalini N. An efficient chaotic MHT-PUF-based IoT device authentication with QPBFT for smart grid infrastructure[J]. Electr Eng. 2025;107(1). https:\/\/doi.org\/10.1007\/s00202-024-02563-w.","DOI":"10.1007\/s00202-024-02563-w"},{"key":"9827_CR10","doi-asserted-by":"publisher","unstructured":"Kook S, Kim K, Ryu J et al. Lightweight Hash-Based authentication protocol for smart Grids[J].Sensors (14248220), 2024, 24(10).https:\/\/doi.org\/10.3390\/s24103085","DOI":"10.3390\/s24103085"},{"key":"9827_CR11","doi-asserted-by":"publisher","unstructured":"Lee J, Yang B. Enhancing smart City infrastructure with a Geospatial blockchain-based addressing system[J].Cities, 2025, 159(000).https:\/\/doi.org\/10.1016\/j.cities.2025.105757","DOI":"10.1016\/j.cities.2025.105757"},{"key":"9827_CR12","doi-asserted-by":"crossref","unstructured":"Hafeez MA, Shakib KH. Munir A. A Secure and Scalable Authentication and Communication Protocol for Smart Grids[J]. 2025.","DOI":"10.3390\/jcp5020011"},{"issue":"10s","key":"9827_CR13","doi-asserted-by":"publisher","first-page":"267","DOI":"10.52783\/jisem.v10i10s.1377","volume":"10","author":"M Garima Gurjar","year":"2025","unstructured":"Garima Gurjar M, D N.Decentralized Energy Trading Framework With Active Pricing Via Blockchain Smart Contracts[J]. J Inform Syst Eng Manage. 2025;10(10s):267\u201377. https:\/\/doi.org\/10.52783\/jisem.v10i10s.1377.","journal-title":"J Inform Syst Eng Manage"},{"key":"9827_CR14","doi-asserted-by":"crossref","unstructured":"Tandel P, Nasriwala J. Quantum-safe authentication mechanism for lot devices using hash-based post-quantum signature schemes: a short review[J]. Int J Grid Util Comput, 2025; 6(3):16.","DOI":"10.1504\/IJGUC.2025.146284"},{"key":"9827_CR15","doi-asserted-by":"crossref","unstructured":"Jebri S, Amor AB, Zidi S. Reliable low-cost data transmission in smart grid system[J].Computer communications. 2024, 214(Jan.):174\u201383.","DOI":"10.1016\/j.comcom.2023.12.006"},{"issue":"5","key":"9827_CR16","doi-asserted-by":"publisher","first-page":"5900","DOI":"10.1007\/s11227-023-05680-8","volume":"80","author":"S Muthulakshmi","year":"2024","unstructured":"Muthulakshmi S, Chitra R. Interplanetary file system and blockchain for secured smart grid networks[J]. J Supercomputing. 2024;80(5):5900\u201322. https:\/\/doi.org\/10.1007\/s11227-023-05680-8.","journal-title":"J Supercomputing"},{"key":"9827_CR17","doi-asserted-by":"publisher","unstructured":"Gupta K, Kumar V. .KMS\u2013AMI: an efficient and scalable key management scheme for secure two-way communications in advanced metering infrastructure of smart grid[J]. J Supercomputing. 2024;80(7). https:\/\/doi.org\/10.1007\/s11227-023-05756-5.","DOI":"10.1007\/s11227-023-05756-5"},{"key":"9827_CR18","doi-asserted-by":"publisher","unstructured":"Lin X, Chen J, Qin Y et al. A Verifiable Ciphertext Retrieval Scheme for Smart Grids[C]\/\/INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND APPLICATIONS.Springer, Singapore, 2025.https:\/\/doi.org\/10.1007\/978-981-96-2409-6_17","DOI":"10.1007\/978-981-96-2409-6_17"},{"key":"9827_CR19","doi-asserted-by":"publisher","unstructured":"Wang C, Wang M, Wang A et al. Multiagent deep reinforcement learning-based cooperative optimal operation with strong scalability for residential microgrid clusters[J].Energy, 2025(Jan.1):314DOI:https:\/\/doi.org\/10.1016\/j.energy.2024.134165","DOI":"10.1016\/j.energy.2024.134165"},{"key":"9827_CR20","doi-asserted-by":"publisher","unstructured":"Dong H, Vanage S, Cetin K. Sensitivity analysis of sensor placement in energy-efficient, grid-interactive ready small office buildings with dynamic shading and lighting control[J].HVAC&R research, 2024, 30(5):20.https:\/\/doi.org\/10.1080\/23744731.2023.2299175","DOI":"10.1080\/23744731.2023.2299175"},{"key":"9827_CR21","doi-asserted-by":"publisher","unstructured":"Jara C, Inga J, Inga E. Opportunistic allocation of resources for smart metering considering fixed and random wireless Channels[J].Sensors (14248220), 2025, 25(8).https:\/\/doi.org\/10.3390\/s25082570","DOI":"10.3390\/s25082570"},{"key":"9827_CR22","doi-asserted-by":"publisher","DOI":"10.13164\/re.2024.0704","author":"ZY Jiang","year":"2024","unstructured":"Jiang ZY, Zhang JW, Yang HJ, et al. Tree Approach[J] Radioengineering. 2024;33(4). https:\/\/doi.org\/10.13164\/re.2024.0704. Secure Power Data Sharing with Fine-grained Control: A Multi-strategy Access."},{"key":"9827_CR23","doi-asserted-by":"publisher","unstructured":"Srivatsa A, Thammaiah A. M. V. L K, Secure data transmission in power systems using blockchain technology[J]. Int J Electr Comput Eng (2088\u20138708), 2024, 14(6).https:\/\/doi.org\/10.11591\/ijece.v14i6.pp6170-6181","DOI":"10.11591\/ijece.v14i6.pp6170-6181"},{"key":"9827_CR24","doi-asserted-by":"publisher","first-page":"116619","DOI":"10.1016\/j.enconman.2022.116619","volume":"277","author":"Y Wu","year":"2023","unstructured":"Wu Y, Huang Z, Zheng Y, et al. Spatial\u2013temporal data-driven full driving cycle prediction for optimal energy management of battery\/supercapacitor electric vehicles[J]. Energy Conv Manag. 2023;277:116619\u2013. https:\/\/doi.org\/10.1016\/j.enconman.2022.116619.","journal-title":"Energy Conv Manag"},{"key":"9827_CR25","doi-asserted-by":"publisher","unstructured":"Mohammadniaei M, Namdari F, Shakarami MR. .A probabilistic distributed digital twins approach for short-term stability and islanding of smart grid[J]. Appl Energy. 2024;374. https:\/\/doi.org\/10.1016\/j.apenergy.2024.123957.","DOI":"10.1016\/j.apenergy.2024.123957"},{"key":"9827_CR26","doi-asserted-by":"publisher","unstructured":"Gopalakrishnan K, Athisivan J, Selvaraj M, .DESIGN OF SECLUDED ENERGY METER FOR TAMPERING, AND UNAUTHORIZED ACCESS DETECTION IN SMART GRID[J]. Suranaree J Sci Technol. 2024;31(1). https:\/\/doi.org\/10.55766\/sujst-2024-01-e0160.","DOI":"10.55766\/sujst-2024-01-e0160"},{"key":"9827_CR27","doi-asserted-by":"publisher","unstructured":"Konda D, Patel U, Rathi R, et al. Improving protection of compensated transmission line using IoT enabled adaptive auto reclosing scheme[J]. Int J Emerg Electr Power Syst. 2024;25(5). https:\/\/doi.org\/10.1515\/ijeeps-2023-0074.","DOI":"10.1515\/ijeeps-2023-0074"},{"issue":"2","key":"9827_CR28","doi-asserted-by":"publisher","first-page":"1477","DOI":"10.1007\/s11760-023-02813-7","volume":"18","author":"AA Mhmood","year":"2024","unstructured":"Mhmood AA,Erg\u00fcl, Rahebi zg\u00fcr. Detection of cyber-attacks on smart grids using improved VGG19 deep neural network architecture and Aquila optimizer algorithm[J].Signal. Image Video Process. 2024;18(2):1477\u201391. https:\/\/doi.org\/10.1007\/s11760-023-02813-7.","journal-title":"Image Video Process"},{"key":"9827_CR29","doi-asserted-by":"publisher","unstructured":"Lazaropoulos AG, Leligou HC. Integration of LiFi, BPL, and Fiber Optic Technologies in Smart Grid Backbone Networks: A Proposal for Exploiting the LiFi LED Street Lighting Networks of Power Utilities and Smart Cities[J].Sustainability (2071\u2009\u2013\u20091050), 2024, 16(2).https:\/\/doi.org\/10.3390\/su16020686","DOI":"10.3390\/su16020686"},{"key":"9827_CR30","doi-asserted-by":"publisher","unstructured":"Overman TM, Sackman RW. .High assurance smart grid: smart grid control systems communications Architecture[J].IEEE, 2010.https:\/\/doi.org\/10.1109\/SMARTGRID.2010.5622007","DOI":"10.1109\/SMARTGRID.2010.5622007"}],"container-title":["Discover Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09827-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10791-025-09827-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09827-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T20:53:05Z","timestamp":1764449585000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10791-025-09827-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,29]]},"references-count":30,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["9827"],"URL":"https:\/\/doi.org\/10.1007\/s10791-025-09827-4","relation":{"references":[{"id-type":"doi","id":"10.1007\/s10586-025-05466-y","asserted-by":"subject"},{"id-type":"doi","id":"10.13164\/re.2024.0704","asserted-by":"subject"}]},"ISSN":["2948-2992"],"issn-type":[{"value":"2948-2992","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,29]]},"assertion":[{"value":"1 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"285"}}