{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:48:49Z","timestamp":1774540129265,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s11277-021-08406-2","type":"journal-article","created":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T03:28:01Z","timestamp":1617766081000},"page":"793-814","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["BBSSE: Blockchain-Based Safe Storage, Secure Sharing and Energy Scheme for Smart Grid Network"],"prefix":"10.1007","volume":"127","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2312-620X","authenticated-orcid":false,"given":"G.","family":"Vasukidevi","sequence":"first","affiliation":[]},{"given":"T.","family":"Sethukarasi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,7]]},"reference":[{"key":"8406_CR1","unstructured":"Mattila, J., Seppala, T., Naucler, C., Stahl, R., Tikkanen, M., Badenlid, A., et al. (2016). Industrial Blockchain platforms: an exercise in use case development in the energy industry. https:\/\/www.etla.fi\/julkaisut\/industrial-Blockchain-platforms-an-exercise-inuse-case-development-in-the-energy-industry\/. Accessed 5 Jun 2017."},{"issue":"7666","key":"8406_CR2","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1038\/548158b","volume":"548","author":"M Andoni","year":"2017","unstructured":"Andoni, M., Robu, V., & Flynn, D. (2017). Blockchains: crypto-control your own energy supply. Nature, 548(7666), 158.","journal-title":"Nature"},{"key":"8406_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08092-0","author":"R Thiagarajan","year":"2021","unstructured":"Thiagarajan, R., Ganesan, R., Anbarasu, V., Baskar, M., Arthi, K., & Ramkumar, J. (2021). Optimised with secure approach in detecting and isolation of malicious nodes in MANET. Wireless Personal Communication. https:\/\/doi.org\/10.1007\/s11277-021-08092-0.","journal-title":"Wireless Personal Communication"},{"key":"8406_CR4","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1016\/j.disc.2016.11.029","volume":"340","author":"S Yang","year":"2016","unstructured":"Yang, S., & Yao, Z. A. (2016). Complete weight enumerators of a class of linear codes. Discrete Mathematics, 340, 729\u2013739.","journal-title":"Discrete Mathematics"},{"issue":"8","key":"8406_CR5","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.ffa.2016.11.004","volume":"44","author":"S Yang","year":"2017","unstructured":"Yang, S., Yao, Z. A., & Zhao, C. A. (2017). The weight distributions of two classes of p-ary cyclic codes with few weights. Finite Fields Application, 44(8), 76\u201391.","journal-title":"Finite Fields Application"},{"key":"8406_CR6","unstructured":"Burger, C., Kuhlmann, A., Richard, P., & Weinmann, J. (2016). Blockchain in the energy transitiona survey among decision-makers in the German energy industry. https:\/\/ shop.dena.de\/fileadmin\/denashop\/media\/Downloads_Dateien\/esd\/9165_Blockchain_in_der_Energiewende_englisch.pdf. Accessed 15 May 2017."},{"key":"8406_CR7","unstructured":"Grewal-Carr, V., & Marshall, S. (2016). Blockchain enigma paradox opportunity. https:\/\/ www.deloitte.com\/content\/dam\/Deloitte\/uk\/Documents\/Innovation\/deloitteuk-Blockchain-full-report.pdf. Accessed 15 May 2017."},{"key":"8406_CR8","first-page":"90","volume":"149","author":"R Thiagarajan","year":"2019","unstructured":"Thiagarajan, R., & Moorthi, M. (2019). Energy consumption and network connectivity based on Novel-LEACH-POS protocol networks. Computer Communications, 149, 90\u201398.","journal-title":"Computer Communications"},{"key":"8406_CR9","unstructured":"PwC global power and utilities. (2016). Blockchain: an opportunity for energy producers and consumers? https:\/\/www.pwc.com\/gx\/en\/industries\/assets\/pwcBlockchain-opportunity-for-energy-producers-and-consumers.pdf. Accessed 22 Nov 2017."},{"key":"8406_CR10","unstructured":"Office of Gas and Electricity Markets (Ofgem). (2017). Consumer empowerment and protection. https:\/\/www.ofgem.gov.uk\/gas\/retail-market\/market-review-andreform\/smarter-markets-programme\/consumer-empowerment-and-protection. Accessed 6 Dec 2017."},{"key":"8406_CR11","unstructured":"US Department of Energy. (2009). Smart grid system report. https:\/\/www.smartgrid.gov\/files\/systems_report.pdf. Accessed 20 Nov 2017."},{"key":"8406_CR12","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.ffa.2017.08.001","volume":"48","author":"S Yang","year":"2017","unstructured":"Yang, S., Kong, X., & Tang, C. (2017). A construction of linear codes and their complete weight enumerators. Finite Fields Application, 48, 196\u2013226.","journal-title":"Finite Fields Application"},{"key":"8406_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-020-10407-4","author":"M Baskar","year":"2021","unstructured":"Baskar, M., Renuka Devi, R., Ramkumar, J., et al. (2021). Region centric minutiae propagation measure orient forgery detection with finger print analysis in health care systems. Neural Process Letter. https:\/\/doi.org\/10.1007\/s11063-020-10407-4.","journal-title":"Neural Process Letter"},{"key":"8406_CR14","unstructured":"Competition and Markets Authority. (2016). Energy market investigation summary of final report. https:\/\/assets.publishing.service.gov.uk\/media\/5773de34e5274a0da3000113\/final-report-energy-market-investigation.pdf. Accessed 15 May 2017."},{"key":"8406_CR15","unstructured":"European Commission. (2006). European SmartGrids technology platform: vision and strategy for Europe\u2019s electricity networks of the future. https:\/\/ec.europa.eu\/research\/energy\/pdf\/smartgrids_en.pdf. Accessed 20 Nov 2017"},{"key":"8406_CR16","unstructured":"HM Government. (2015). Cutting the cost of keeping warm: a fuel poverty strategy for England. https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/408644\/cutting_the_cost_of_keeping_warm.pdf. Accessed 20 Nov 2017."},{"key":"8406_CR17","doi-asserted-by":"crossref","unstructured":"Thiagarajan, R., & Moorthi, M. (2017). Efficient routing protocols for mobile ad hoc networks. International conference on AEEICB (978-1-5090-5434-3) IEEE SJR 1.2.","DOI":"10.1109\/AEEICB.2017.7972346"},{"key":"8406_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02744-y","author":"M Baskar","year":"2021","unstructured":"Baskar, M., Ramkumar, J., Karthikeyan, C., et al. (2021). Low rate DDoS mitigation using real-time multi threshold traffic monitoring system. Journal of the Ambient Intelligent and Human Computer. https:\/\/doi.org\/10.1007\/s12652-020-02744-y.","journal-title":"Journal of the Ambient Intelligent and Human Computer"},{"key":"8406_CR19","unstructured":"Business Electricity Prices. (2017). A guide to wholesale electricity pricing. https:\/\/www.businesselectricityprices.org.uk\/retail-versus-wholesale-prices\/. Accessed 30 Jun 2017."},{"key":"8406_CR20","unstructured":"Pinson, P., Baroche, T., Moret, F., Sousa, T., Sorin, E., & You, S. The emergence of consumercentric electricity markets. http:\/\/pierrepinson.com\/docs\/"},{"issue":"4","key":"8406_CR21","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., et al. (2010). A view of cloud computing. Communication ACM, 53(4), 50\u201358.","journal-title":"Communication ACM"},{"issue":"8","key":"8406_CR22","doi-asserted-by":"publisher","first-page":"3590","DOI":"10.1109\/TII.2017.2780885","volume":"14","author":"K Gai","year":"2018","unstructured":"Gai, K., & Qiu, M. (2018). Blend arithmetic operations on tensor based fully homomorphic encryption over real numbers. IEEE Transactions on Industrial Informatics, 14(8), 3590\u20133598.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"8406_CR23","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","volume":"82","author":"M Khan","year":"2018","unstructured":"Khan, M., & Salah, K. (2018). Iot security: review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395\u2013411.","journal-title":"Future Generation Computer Systems"},{"key":"8406_CR24","doi-asserted-by":"crossref","unstructured":"Jiao, Y., Wang, P., Niyato, D., & Xiong, Z. (2017). Social welfare maximization auction in edge computing resource allocation for mobile Blockchain.","DOI":"10.1109\/ICC.2018.8422632"},{"key":"8406_CR25","first-page":"1","volume":"99","author":"K Gai","year":"2019","unstructured":"Gai, K., Wu, Y., Zhu, L., Qiu, M., & Shen, M. (2019). Privacy-preserving energy trading using consortium Blockchain in smart grid. IEEE Transactions on Industrial Informatics, 99, 1\u201314.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"4","key":"8406_CR26","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1109\/TSG.2011.2140343","volume":"2","author":"Z Yang","year":"2011","unstructured":"Yang, Z., Yu, S., Lou, W., & Liu, C. (2011). P2: Privacypreserving communication and precise reward architecture for V2G networks in smart grid. IEEE Transactions on Smart Grid, 2(4), 697\u2013706.","journal-title":"IEEE Transactions on Smart Grid"},{"issue":"11","key":"8406_CR27","doi-asserted-by":"publisher","first-page":"2340","DOI":"10.1109\/TIFS.2015.2455513","volume":"10","author":"H Wang","year":"2015","unstructured":"Wang, H., Qin, B., Wu, Q., Xu, L., & Domingo-Ferrer, J. (2015). TPP: traceable privacy-preserving communication and precise reward for vehicle-to-grid networks in smart grids. IEEE Transactions on Information Forensics and Security, 10(11), 2340\u20132351.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"8406_CR28","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.comcom.2016.06.006","volume":"91","author":"W Han","year":"2016","unstructured":"Han, W., & Xiao, Y. (2016). Privacy preservation for V2G networks in smart grid: a survey. Computer Communications, 91, 17\u201328.","journal-title":"Computer Communications"},{"key":"8406_CR29","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1016\/j.cose.2016.07.004","volume":"62","author":"Z Wan","year":"2016","unstructured":"Wan, Z., Zhu, W. T., & Wang, G. (2016). PRAC: Efficient privacy protection for vehicle-to-grid communications in the smart grid. Computers and Security, 62, 246\u2013256.","journal-title":"Computers and Security"},{"key":"8406_CR30","doi-asserted-by":"publisher","first-page":"2039","DOI":"10.1142\/S1793042117501093","volume":"13","author":"X Li","year":"2017","unstructured":"Li, X., & Sha, M. (2017). Gauss factorials of polynomials over finite fields. International Journal of Number Theory, 13, 2039\u20132054.","journal-title":"International Journal of Number Theory"},{"key":"8406_CR31","unstructured":"Mattila, J. The Blockchain phenomenon-the disruptive potential of distributed consensus architectures."},{"key":"8406_CR32","unstructured":"Back, A., Corallo, M., Dashjr, L., Friedenbach, M., Maxwell, G., Miller, A., et al. Enabling blockchain innovations with pegged sidechains"},{"key":"8406_CR33","unstructured":"Nakamoto, S. (2008). Bitcoin: a peer-to-peer electronic cash system."},{"key":"8406_CR34","doi-asserted-by":"crossref","unstructured":"Alqassem, I., & Svetinovic, D. (2014). Towards reference architecture for cryptocurrencies: bitcoin architectural analysis. In: Internet of things (iThings), 2014 IEEE international conference on, and green computing and communications (GreenCom), IEEE and cyber, physical and social computing (CPSCom), IEEE, pp. 436\u2013443, IEEE.","DOI":"10.1109\/iThings.2014.78"},{"key":"8406_CR35","doi-asserted-by":"publisher","first-page":"3154","DOI":"10.1109\/TII.2017.2709784","volume":"13","author":"J Kang","year":"2017","unstructured":"Kang, J., Yu, R., Huang, X., Maharjan, S., Zhang, Y., & Hossain, E. (2017). Enabling localized peer-to-peer electricity trading among plug-in hybrid electric vehicles using consortium Blockchains. IEEE Transactions on Industrial Informatics, 13, 3154\u20133164.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"3","key":"8406_CR36","doi-asserted-by":"publisher","first-page":"4660","DOI":"10.1109\/JIOT.2018.2875542","volume":"6","author":"J Kang","year":"2019","unstructured":"Kang, J., et al. (2019). Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet of Things Journal, 6(3), 4660\u20134670. https:\/\/doi.org\/10.1109\/JIOT.2018.2875542.","journal-title":"IEEE Internet of Things Journal"},{"issue":"5","key":"8406_CR37","doi-asserted-by":"publisher","first-page":"7992","DOI":"10.1109\/JIOT.2019.2904303","volume":"6","author":"K Gai","year":"2019","unstructured":"Gai, K., Wu, Y., Zhu, L., Xu, L., & Zhang, Y. (2019). Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet of Things Journal, 6(5), 7992\u20138004. https:\/\/doi.org\/10.1109\/JIOT.2019.2904303.","journal-title":"IEEE Internet of Things Journal"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08406-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-08406-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08406-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T13:24:09Z","timestamp":1671024249000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-08406-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,7]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["8406"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08406-2","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,7]]},"assertion":[{"value":"15 March 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 April 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We authors not having any conflict of interest among ourselves to submit and publish our articles in Wireless Personal Communications journal.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}