{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:27:17Z","timestamp":1771702037984,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,4,20]],"date-time":"2024-04-20T00:00:00Z","timestamp":1713571200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,20]],"date-time":"2024-04-20T00:00:00Z","timestamp":1713571200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s12083-024-01703-0","type":"journal-article","created":{"date-parts":[[2024,4,21]],"date-time":"2024-04-21T02:38:00Z","timestamp":1713667080000},"page":"2167-2184","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Smart grid security based on blockchain and smart contract"],"prefix":"10.1007","volume":"17","author":[{"given":"Ming","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yutong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Qian","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Huiyong","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,20]]},"reference":[{"issue":"3","key":"1703_CR1","doi-asserted-by":"publisher","first-page":"2637","DOI":"10.1109\/COMST.2019.2908266","volume":"21","author":"MH Rehmani","year":"2019","unstructured":"Rehmani MH, Davy A, Jennings B et al (2019) Software defined networks-based smart grid communication: A comprehensive Survey. IEEE Commun Surv Tutor 21(3):2637\u20132670","journal-title":"IEEE Commun Surv Tutor"},{"key":"1703_CR2","volume":"45","author":"NO Saidani","year":"2021","unstructured":"Saidani NO, Sengan S, Thangavelu KD et al (2021) Migrating from traditional grid to smart grid in smart cities promoted in developing country. Sustain Energy Technol Assess 45:101125","journal-title":"Sustain Energy Technol Assess"},{"key":"1703_CR3","first-page":"136","volume":"9","author":"Y Li","year":"2022","unstructured":"Li Y, Yu YC, Zhang LW et al (2022) Intrusion detection in smart grid based on unsupervised learning. Comput Syst Appl 9:136","journal-title":"Comput Syst Appl"},{"key":"1703_CR4","doi-asserted-by":"publisher","first-page":"3107","DOI":"10.1109\/TIFS.2022.3201386","volume":"17","author":"D Chen","year":"2022","unstructured":"Chen D, Jiang S, Zhang N et al (2022) On message authentication channel capacity over a wiretap channel. IEEE Trans Inf Forensics Secur 17:3107\u20133122","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"18","key":"1703_CR5","doi-asserted-by":"publisher","first-page":"17265","DOI":"10.1109\/JIOT.2022.3155355","volume":"9","author":"D Chen","year":"2022","unstructured":"Chen D, Wang H, Zhang N et al (2022) Privacy-preserving encrypted traffic inspection with symmetric cryptographic techniques in IoT. IEEE Internet Things J 9(18):17265\u201317279","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"1703_CR6","first-page":"289","volume":"12","author":"A Maseleno","year":"2019","unstructured":"Maseleno A, Othman M, Deepalakshmi P et al (2019) Hash function based optimal block chain. Model Internet Things 12(1):289\u2013295","journal-title":"Model Internet Things"},{"issue":"15","key":"1703_CR7","doi-asserted-by":"publisher","first-page":"13837","DOI":"10.1109\/JIOT.2022.3143539","volume":"9","author":"J Huang","year":"2022","unstructured":"Huang J, Wang M, Wu Y et al (2022) Distributed offloading in overlapping areas of mobile-edge computing for Internet of Things. IEEE Internet Things J 9(15):13837\u201313847","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"1703_CR8","doi-asserted-by":"publisher","first-page":"1834","DOI":"10.1007\/s12083-022-01326-3","volume":"15","author":"D Liao","year":"2022","unstructured":"Liao D, Wang W, Xiao K et al (2022) Towards an architecture and algorithm for the satellite IoT based on a CCN. Peer Peer Netw Appl 15(4):1834\u20131848","journal-title":"Peer Peer Netw Appl"},{"issue":"2","key":"1703_CR9","doi-asserted-by":"publisher","first-page":"788","DOI":"10.3390\/s23020788","volume":"23","author":"HD Zubaydi","year":"2023","unstructured":"Zubaydi HD, Varga P, Moln\u00e1r S (2023) Leveraging blockchain technology for ensuring security and privacy aspects in internet of things: A systematic literature review. Sensors 23(2):788","journal-title":"Sensors"},{"key":"1703_CR10","doi-asserted-by":"publisher","first-page":"2694","DOI":"10.1007\/s12083-020-01042-w","volume":"14","author":"D Liao","year":"2021","unstructured":"Liao D, Li H, Wang W et al (2021) Achieving IoT data security based blockchain. Peer Peer Netw Appl 14:2694\u20132707","journal-title":"Peer Peer Netw Appl"},{"issue":"6","key":"1703_CR11","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MNET.005.2100336","volume":"36","author":"D Chen","year":"2022","unstructured":"Chen D, Zhang N, Wu H et al (2022) Audio-based security techniques for secure device-to-device (D2D) communications. IEEE Network 36(6):54\u201359","journal-title":"IEEE Network"},{"key":"1703_CR12","first-page":"2070","volume":"56","author":"S Ahamad","year":"2022","unstructured":"Ahamad S, Gupta P, Acharjee PB et al (2022) The role of block chain technology and Internet of Things (IoT) to protect financial transactions in crypto currency market. Mater Today: Proc 56:2070\u20132074","journal-title":"Mater Today: Proc"},{"issue":"8","key":"1703_CR13","doi-asserted-by":"publisher","first-page":"1973","DOI":"10.3390\/en11081973","volume":"11","author":"SK Kim","year":"2018","unstructured":"Kim SK, Huh JH (2018) A study on the improvement of smart grid security performance and blockchain smart grid perspective. Energies (Basel) 11(8):1973","journal-title":"Energies (Basel)"},{"issue":"6","key":"1703_CR14","doi-asserted-by":"publisher","first-page":"3548","DOI":"10.1109\/TII.2019.2893433","volume":"15","author":"K Gai","year":"2019","unstructured":"Gai K, Wu Y, Zhu L et al (2019) Privacy-preserving energy trading using consortium blockchain in smart grid. IEEE Trans Industr Inf 15(6):3548\u20133558","journal-title":"IEEE Trans Industr Inf"},{"issue":"1","key":"1703_CR15","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/TII.2020.2998479","volume":"17","author":"P Zhuang","year":"2021","unstructured":"Zhuang P, Zamir T, Liang H (2021) Blockchain for cybersecurity in smart grid: A comprehensive survey. IEEE Trans Industr Inf 17(1):3\u201319","journal-title":"IEEE Trans Industr Inf"},{"key":"1703_CR16","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1016\/j.egyr.2022.05.277","volume":"8","author":"D Li","year":"2022","unstructured":"Li D, Gong Y (2022) The design of power grid data management system based on blockchain technology and construction of system security evaluation model. Energy Rep 8:466\u2013479","journal-title":"Energy Rep"},{"issue":"14","key":"1703_CR17","doi-asserted-by":"publisher","first-page":"12449","DOI":"10.1109\/JIOT.2023.3247487","volume":"10","author":"P Wang","year":"2023","unstructured":"Wang P, Li K, Shi R et al (2023) VC-DCPS: Verifiable cross-domain data collection and privacy-persevering sharing scheme based on lattice in blockchain-enhanced smart grids. IEEE Internet Things J 10(14):12449\u201312461","journal-title":"IEEE Internet Things J"},{"issue":"5","key":"1703_CR18","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1109\/TDSC.2018.2846258","volume":"17","author":"D Chen","year":"2020","unstructured":"Chen D, Zhang N, Cheng N et al (2020) Physical layer based message authentication with secure channel codes. IEEE Trans Dependable Secure Comput 17(5):1079\u20131093","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"3","key":"1703_CR19","doi-asserted-by":"publisher","first-page":"1353","DOI":"10.3390\/app13031353","volume":"13","author":"D Mourtzis","year":"2023","unstructured":"Mourtzis D, Angelopoulos J, Panopoulos N (2023) Blockchain integration in the era of industrial metaverse. Appl Sci 13(3):1353","journal-title":"Appl Sci"},{"issue":"11","key":"1703_CR20","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1109\/TSMC.2019.2895123","volume":"49","author":"S Wang","year":"2019","unstructured":"Wang S, Ouyang L, Yuan Y et al (2019) Blockchain-enabled smart contracts: Architecture, applications, and future trends. IEEE Trans Syst Man Cybernet: Syst 49(11):2266\u20132277","journal-title":"IEEE Trans Syst Man Cybernet: Syst"},{"key":"1703_CR21","doi-asserted-by":"publisher","first-page":"106762","DOI":"10.1016\/j.infsof.2021.106762","volume":"144","author":"M Hamdaqa","year":"2022","unstructured":"Hamdaqa M, Met LAP, Qasse I (2022) iContractML 2.0: A domain-specific language for modeling and deploying smart contracts onto multiple blockchain platforms. Inf Softw Technol 144:106762","journal-title":"Inf Softw Technol"},{"key":"1703_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2021.112013","volume":"158","author":"D Kirli","year":"2022","unstructured":"Kirli D, Couraud B, Robu V et al (2022) Smart contracts in energy systems: A systematic review of fundamental approaches and implementations. Renew Sustain Energy Rev 158:112013","journal-title":"Renew Sustain Energy Rev"},{"issue":"11","key":"1703_CR23","doi-asserted-by":"publisher","first-page":"7688","DOI":"10.1109\/TII.2020.3040171","volume":"17","author":"Y Wang","year":"2021","unstructured":"Wang Y, Su Z, Zhang N et al (2021) SPDS: A secure and auditable private data sharing scheme for smart grid based on blockchain. IEEE Trans Industr Inf 17(11):7688\u20137699","journal-title":"IEEE Trans Industr Inf"},{"issue":"5","key":"1703_CR24","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1109\/MNET.001.1900660","volume":"34","author":"A Kumari","year":"2020","unstructured":"Kumari A, Gupta R, Tanwar S et al (2020) When blockchain meets smart grid: Secure energy trading in demand response management. IEEE Network 34(5):299\u2013305","journal-title":"IEEE Network"},{"issue":"6","key":"1703_CR25","doi-asserted-by":"publisher","first-page":"1321","DOI":"10.3390\/en13061321","volume":"13","author":"YB Son","year":"2020","unstructured":"Son YB, Im JH, Kwon HY et al (2020) Privacy-preserving peer-to-peer energy trading in blockchain-enabled smart grids using functional encryption. Energies (Basel) 13(6):1321","journal-title":"Energies (Basel)"},{"key":"1703_CR26","doi-asserted-by":"publisher","first-page":"120666","DOI":"10.1109\/ACCESS.2023.3326946","volume":"11","author":"P Loreti","year":"2023","unstructured":"Loreti P, Bracciale L, Raso E et al (2023) Privacy and transparency in blockchain-based smart grid operations. IEEE Access 11:120666\u2013120679","journal-title":"IEEE Access"},{"issue":"2","key":"1703_CR27","doi-asserted-by":"publisher","first-page":"947","DOI":"10.3390\/s23020947","volume":"23","author":"AK Tyagi","year":"2023","unstructured":"Tyagi AK, Dananjayan S, Agarwal D et al (2023) Blockchain\u2014Internet of Things applications: Opportunities and challenges for industry 4.0 and society 5.0. Sensors 23(2):947","journal-title":"Sensors"},{"issue":"10","key":"1703_CR28","doi-asserted-by":"publisher","first-page":"2065","DOI":"10.1002\/spe.2745","volume":"51","author":"N Lu","year":"2021","unstructured":"Lu N, Wang B, Zhang Y et al (2021) NeuCheck: A more practical Ethereum smart contract security analysis tool. Softw Pract Exp 51(10):2065\u20132084","journal-title":"Softw Pract Exp"},{"issue":"3","key":"1703_CR29","doi-asserted-by":"publisher","first-page":"5753","DOI":"10.1109\/JIOT.2019.2905275","volume":"6","author":"J An","year":"2019","unstructured":"An J, Le Gall F, Kim J et al (2019) Toward global IoT-enabled smart cities interworking using adaptive semantic adapter. IEEE Internet Things J 6(3):5753\u20135765","journal-title":"IEEE Internet Things J"},{"key":"1703_CR30","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.future.2023.03.014","volume":"145","author":"S Ji","year":"2023","unstructured":"Ji S, Zhang J, Zhang Y et al (2023) LAFED: A lightweight authentication mechanism for blockchain-enabled federated learning system. Futur Gener Comput Syst 145:56\u201367","journal-title":"Futur Gener Comput Syst"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01703-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01703-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01703-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T08:27:39Z","timestamp":1718699259000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01703-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,20]]},"references-count":30,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["1703"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01703-0","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,20]]},"assertion":[{"value":"25 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 March 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 April 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"We agrees to publication in the journal Peer-to-Peer Networking and Applications.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"The authors declare no competing interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}]}}