{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:18:58Z","timestamp":1775837938687,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T00:00:00Z","timestamp":1750118400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T00:00:00Z","timestamp":1750118400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s40747-025-01979-6","type":"journal-article","created":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T04:54:53Z","timestamp":1750136093000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["EEFDA: enabling efficient and fault-tolerant data aggregation scheme without TA in smart grid"],"prefix":"10.1007","volume":"11","author":[{"given":"Yuanyuan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Liqiang","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yiliang","family":"Han","sequence":"additional","affiliation":[]},{"given":"Xuguang","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Ruifeng","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,17]]},"reference":[{"key":"1979_CR1","doi-asserted-by":"publisher","unstructured":"Bajaj K, Sharma B, Singh R (2022) Implementation analysis of iot-based offloading frameworks on cloud\/edge computing for sensor generated big data. Complex Intelligent Systems 8, 3641\u20133658 https:\/\/doi.org\/10.1007\/s40747-021-00434-6","DOI":"10.1007\/s40747-021-00434-6"},{"issue":"2","key":"1979_CR2","doi-asserted-by":"publisher","DOI":"10.1088\/1361-6501\/ad0f6d","volume":"35","author":"H Tao","year":"2024","unstructured":"Tao H, Shi H, Qiu J, Jin G, Stojanovic V (2024) Planetary gearbox fault diagnosis based on fdknn-dgat with few labeled data. Measure Sci Technol 35(2):025036. https:\/\/doi.org\/10.1088\/1361-6501\/ad0f6d","journal-title":"Measure Sci Technol"},{"key":"1979_CR3","doi-asserted-by":"publisher","unstructured":"Song X, Wu C, Song S, Stojanovic V, Tejado I (2024) Fuzzy wavelet neural adaptive finite-time self-triggered fault-tolerant control for a quadrotor unmanned aerial vehicle with scheduled performance. Engineering Applications of Artificial Intelligence 131, 1\u201315 https:\/\/doi.org\/10.1016\/j.engappai.2024.01.001","DOI":"10.1016\/j.engappai.2024.01.001"},{"issue":"2","key":"1979_CR4","doi-asserted-by":"publisher","first-page":"2508","DOI":"10.1109\/TII.2023.3292532","volume":"20","author":"L Wu","year":"2024","unstructured":"Wu L, Fu S, Luo Y, Xu M (2024) Sectcn: privacy-preserving short-term residential electrical load forecasting. IEEE Trans Ind Inform 20(2):2508\u20132518. https:\/\/doi.org\/10.1109\/TII.2023.3292532","journal-title":"IEEE Trans Ind Inform"},{"key":"1979_CR5","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1370731","author":"E Quinn","year":"2009","unstructured":"Quinn E (2009) Privacy and the new energy infrastructure. SSRN Electron J. https:\/\/doi.org\/10.2139\/ssrn.1370731","journal-title":"SSRN Electron J"},{"issue":"2","key":"1979_CR6","doi-asserted-by":"publisher","first-page":"2549","DOI":"10.3233\/JIFS-182778","volume":"37","author":"JS Khan","year":"2019","unstructured":"Khan JS, Ahmad J, Ahmed SS, Siddiqa HA, Abbasi SF, Kayhan SK (2019) Dna key-based visual chaotic image encryption. J Intell Fuzzy Syst 37(2):2549\u20132561. https:\/\/doi.org\/10.3233\/JIFS-182778","journal-title":"J Intell Fuzzy Syst"},{"key":"1979_CR7","doi-asserted-by":"publisher","unstructured":"Abbasi SF, Ahmad J, Khan JS, Khan MA, Sheikh SA (2019) Visual meaningful encryption scheme using intertwinning logistic map, 764\u2013773 https:\/\/doi.org\/10.1007\/978-3-030-01177-2_56","DOI":"10.1007\/978-3-030-01177-2_56"},{"issue":"10","key":"1979_CR8","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1002\/acs.3456","volume":"38","author":"Z Peng","year":"2024","unstructured":"Peng Z, Song X, Song S, Stojanovic V (2024) Spatiotemporal fault estimation for switched nonlinear reaction-diffusion systems via adaptive iterative learning. Int J Adaptive Control Signal Process 38(10):11\u201322. https:\/\/doi.org\/10.1002\/acs.3456","journal-title":"Int J Adaptive Control Signal Process"},{"issue":"7","key":"1979_CR9","doi-asserted-by":"publisher","first-page":"5254","DOI":"10.1109\/JIOT.2021.3119517","volume":"9","author":"L Wu","year":"2022","unstructured":"Wu L, Xu M, Fu S, Luo Y, Wei Y (2022) Fpda: Fault-tolerant and privacy-enhanced data aggregation scheme in fog-assisted smart grid. IEEE Internet Things J 9(7):5254\u20135265. https:\/\/doi.org\/10.1109\/JIOT.2021.3119517","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"1979_CR10","doi-asserted-by":"publisher","first-page":"2886","DOI":"10.1109\/COMST.2019.2916688","volume":"21","author":"P Kumar","year":"2019","unstructured":"Kumar P, Lin Y, Bai G, Paverd A, Dong JS, Martin A (2019) Smart grid metering networks: a survey on security, privacy and open research issues. IEEE Commun Surveys Tutorials 21(3):2886\u20132927. https:\/\/doi.org\/10.1109\/COMST.2019.2916688","journal-title":"IEEE Commun Surveys Tutorials"},{"issue":"1","key":"1979_CR11","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1109\/TDSC.2023.3252593","volume":"21","author":"L Wu","year":"2024","unstructured":"Wu L, Fu S, Luo Y, Yan H, Shi H, Xu M (2024) A robust and lightweight privacy-preserving data aggregation scheme for smart grid. IEEE Trans Dependable Secure Comput 21(1):270\u2013283. https:\/\/doi.org\/10.1109\/TDSC.2023.3252593","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1979_CR12","doi-asserted-by":"publisher","unstructured":"Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) Advances in Cryptology - EUROCRYPT \u201999 vol. 1592, pp. 223\u2013238 . https:\/\/doi.org\/10.1007\/3-540-48910-X_16","DOI":"10.1007\/3-540-48910-X_16"},{"key":"1979_CR13","doi-asserted-by":"publisher","unstructured":"Boneh D, Goh EJ, Nissim K (2005) Evaluating 2-dnf formulas on ciphertexts. In: Kilian, J. (ed.) Theory of Cryptography vol. 3378, pp. 325\u2013341 . https:\/\/doi.org\/10.1007\/b106715","DOI":"10.1007\/b106715"},{"issue":"7","key":"1979_CR14","doi-asserted-by":"publisher","first-page":"6132","DOI":"10.1109\/JIOT.2019.2957314","volume":"7","author":"A Saleem","year":"2020","unstructured":"Saleem A (2020) Fesda: fog-enabled secure data aggregation in smart grid iot network. IEEE Internet Things J 7(7):6132\u20136142","journal-title":"IEEE Internet Things J"},{"key":"1979_CR15","doi-asserted-by":"publisher","unstructured":"Khan HM, Khan A, Jabeen F, Rahman AU (2021) Privacy preserving data aggregation with fault tolerance in fog-enabled smart grids. Sustainable Cities and Society 64, 102522 https:\/\/doi.org\/10.1016\/j.scs.2020.102522","DOI":"10.1016\/j.scs.2020.102522"},{"issue":"2","key":"1979_CR16","doi-asserted-by":"publisher","first-page":"3524","DOI":"10.1109\/JIOT.2023.3297734","volume":"11","author":"D Chen","year":"2024","unstructured":"Chen D, Zhou T, Liu W, Li R, Wu L, Yang X (2024) Mda-flh: multidimensional data aggregation scheme with fine-grained linear homomorphism for smart grid. IEEE Internet Things J 11(2):3524\u20133538. https:\/\/doi.org\/10.1109\/JIOT.2023.3297734","journal-title":"IEEE Internet Things J"},{"issue":"8","key":"1979_CR17","doi-asserted-by":"publisher","first-page":"3733","DOI":"10.1109\/TII.2018.2803782","volume":"14","author":"L Lyu","year":"2018","unstructured":"Lyu L, Nandakumar K, Rubinstein B, Jin J, Bedo J, Palaniswami M (2018) Ppfa: privacy preserving fog-enabled aggregation in smart grid. IEEE Trans Ind Inform 14(8):3733\u20133744. https:\/\/doi.org\/10.1109\/TII.2018.2803782","journal-title":"IEEE Trans Ind Inform"},{"issue":"9","key":"1979_CR18","doi-asserted-by":"publisher","first-page":"8077","DOI":"10.1109\/JIOT.2020.2997389","volume":"7","author":"Y Pu","year":"2020","unstructured":"Pu Y, Hu C, Deng S, Alrawais A (2020) R$$^{2}$$peds: a recoverable and revocable privacy-preserving edge data sharing scheme. IEEE Internet Things J 7(9):8077\u20138089. https:\/\/doi.org\/10.1109\/JIOT.2020.2997389","journal-title":"IEEE Internet Things J"},{"key":"1979_CR19","doi-asserted-by":"publisher","unstructured":"Bu L, Isakov M, Kinsy MA (2019) A secure and robust scheme for sharing confidential information in iot systems. Ad Hoc Networks 92, 101762 https:\/\/doi.org\/10.1016\/j.adhoc.2018.09.007 . Special Issue on Security of IoT-enabled Infrastructures in Smart Cities","DOI":"10.1016\/j.adhoc.2018.09.007"},{"issue":"2","key":"1979_CR20","doi-asserted-by":"publisher","first-page":"1990","DOI":"10.1109\/JIOT.2023.3303010","volume":"11","author":"Y Chang","year":"2024","unstructured":"Chang Y, Li J, Lu N, Shi W, Su Z, Meng W (2024) Practical privacy-preserving scheme with fault tolerance for smart grids. IEEE Internet Things J 11(2):1990\u20132005. https:\/\/doi.org\/10.1109\/JIOT.2023.3303010","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"1979_CR21","doi-asserted-by":"publisher","first-page":"4065","DOI":"10.1109\/TII.2020.3014401","volume":"17","author":"X Wang","year":"2021","unstructured":"Wang X, Liu Y, Choo K-KR (2021) Fault-tolerant multisubset aggregation scheme for smart grid. IEEE Trans Ind Inform 17(6):4065\u20134072. https:\/\/doi.org\/10.1109\/TII.2020.3014401","journal-title":"IEEE Trans Ind Inform"},{"key":"1979_CR22","doi-asserted-by":"publisher","unstructured":"Chen L, Lu R, Cao Z (2015) Muda: Multifunctional data aggregation in privacy-preserving smart grid communications. Peer-to-Peer Networking and Applications 8, 777\u2013792 https:\/\/doi.org\/10.1007\/s12083-014-0292-0","DOI":"10.1007\/s12083-014-0292-0"},{"issue":"3","key":"1979_CR23","doi-asserted-by":"publisher","first-page":"1949","DOI":"10.1109\/JIOT.2019.2961966","volume":"7","author":"K Xue","year":"2020","unstructured":"Xue K, Zhu B, Yang Q, Wei DSL, Guizani M (2020) An efficient and robust data aggregation scheme without a trusted authority for smart grid. IEEE Internet Things J 7(3):1949\u20131959. https:\/\/doi.org\/10.1109\/JIOT.2019.2961966","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"1979_CR24","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/TSG.2019.2920836","volume":"11","author":"J-N Liu","year":"2020","unstructured":"Liu J-N, Weng J, Yang A, Chen Y, Lin X (2020) Enabling efficient and privacy-preserving aggregation communication and function query for fog computing-based smart grid. IEEE Trans Smart Grid 11(1):247\u2013257. https:\/\/doi.org\/10.1109\/TSG.2019.2920836","journal-title":"IEEE Trans Smart Grid"},{"key":"1979_CR25","doi-asserted-by":"publisher","unstructured":"Pang B, Liang H-H, Zhang L-H, Teng Y-F, Chang Z-W, Liu Z-W, Hu C-Q, Mou W-H (2023) An improved federated learning-assisted data aggregation scheme for smart grids. APPLIED SCIENCES-BASEL 13(17) https:\/\/doi.org\/10.3390\/app13179813","DOI":"10.3390\/app13179813"},{"issue":"1","key":"1979_CR26","doi-asserted-by":"publisher","first-page":"1110","DOI":"10.1109\/JSYST.2022.3177418","volume":"17","author":"Z Zeng","year":"2023","unstructured":"Zeng Z, Liu Y, Chang L (2023) A robust and optional privacy data aggregation scheme for fog-enhanced iot network. IEEE Syst J 17(1):1110\u20131120. https:\/\/doi.org\/10.1109\/JSYST.2022.3177418","journal-title":"IEEE Syst J"},{"issue":"1","key":"1979_CR27","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1109\/TSG.2016.2553647","volume":"9","author":"A Abdallah","year":"2018","unstructured":"Abdallah A, Shen XS (2018) A lightweight lattice-based homomorphic privacy-preserving data aggregation scheme for smart grid. IEEE Trans Smart Grid 9(1):396\u2013405. https:\/\/doi.org\/10.1109\/TSG.2016.2553647","journal-title":"IEEE Trans Smart Grid"},{"issue":"2","key":"1979_CR28","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1016\/j.future.2017.02.032","volume":"78","author":"H Wang","year":"2018","unstructured":"Wang H, Wang Z, Domingo-Ferrer J (2018) Anonymous and secure aggregation scheme in fog-based public cloud computing. Fut Generat Comput Syst-Int J Escience 78(2):712\u2013719. https:\/\/doi.org\/10.1016\/j.future.2017.02.032","journal-title":"Fut Generat Comput Syst-Int J Escience"},{"key":"1979_CR29","doi-asserted-by":"publisher","unstructured":"Zhao S, Li F, Li H, Lu R, Ren S, Bao H, Lin J-H, Han S (2021) Smart and practical privacy-preserving data aggregation for fog-based smart grids. IEEE Transactions on Information Forensics and Security 16, 521\u2013536 https:\/\/doi.org\/10.1109\/TIFS.2020.3014487","DOI":"10.1109\/TIFS.2020.3014487"},{"issue":"3","key":"1979_CR30","doi-asserted-by":"publisher","first-page":"1949","DOI":"10.1109\/JIOT.2019.2961966","volume":"7","author":"K Xue","year":"2020","unstructured":"Xue K, Zhu B, Yang Q, Wei DSL, Guizani M (2020) An efficient and robust data aggregation scheme without a trusted authority for smart grid. IEEE Internet Things J 7(3):1949\u20131959. https:\/\/doi.org\/10.1109\/JIOT.2019.2961966","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"1979_CR31","doi-asserted-by":"publisher","first-page":"1732","DOI":"10.1109\/TSG.2015.2449278","volume":"7","author":"HJ Jo","year":"2016","unstructured":"Jo HJ, Kim IS, Lee DH (2016) Efficient and privacy-preserving metering protocols for smart grid systems. IEEE Trans Smart Grid 7(3):1732\u20131742. https:\/\/doi.org\/10.1109\/TSG.2015.2449278","journal-title":"IEEE Trans Smart Grid"},{"issue":"6","key":"1979_CR32","doi-asserted-by":"publisher","first-page":"2856","DOI":"10.1109\/TSG.2015.2443011","volume":"6","author":"Z Shi","year":"2015","unstructured":"Shi Z, Sun R, Lu R, Chen L, Chen J, Shen XS (2015) Diverse grouping-based aggregation protocol with error detection for smart grid communications. IEEE Trans Smart Grid 6(6):2856\u20132868. https:\/\/doi.org\/10.1109\/TSG.2015.2443011","journal-title":"IEEE Trans Smart Grid"},{"issue":"3","key":"1979_CR33","doi-asserted-by":"publisher","first-page":"4305","DOI":"10.1109\/TII.2023.3315375","volume":"20","author":"S Shang","year":"2024","unstructured":"Shang S, Li X, Gu K, Li L, Zhang X, Pandi V (2024) A robust privacy-preserving data aggregation scheme for edge-supported iiot. IEEE Trans Ind Inform 20(3):4305\u20134316. https:\/\/doi.org\/10.1109\/TII.2023.3315375","journal-title":"IEEE Trans Ind Inform"},{"key":"1979_CR34","doi-asserted-by":"publisher","unstructured":"\u0160imuni\u0107 S, Bernaca D, Lenac K (2021) Verifiable computing applications in blockchain. IEEE Access 9, 156729\u2013156745 https:\/\/doi.org\/10.1109\/ACCESS.2021.3129314","DOI":"10.1109\/ACCESS.2021.3129314"},{"issue":"3","key":"1979_CR35","doi-asserted-by":"publisher","first-page":"1767","DOI":"10.1109\/TII.2018.2809672","volume":"15","author":"Y Liu","year":"2019","unstructured":"Liu Y, Guo W, Fan C-I, Chang L, Cheng C (2019) A practical privacy-preserving data aggregation (3pda) scheme for smart grid. IEEE Trans Ind Inform 15(3):1767\u20131774. https:\/\/doi.org\/10.1109\/TII.2018.2809672","journal-title":"IEEE Trans Ind Inform"},{"key":"1979_CR36","doi-asserted-by":"publisher","unstructured":"Liu J, Wang H, Bao J, Sun R, Du X, Guizani M (2024) Rpmda: Robust and privacy-enhanced multidimensional data aggregation scheme for fog-assisted smart grids. IEEE Internet Things J 11(9):16021\u201316032. https:\/\/doi.org\/10.1109\/JIOT.2024.3352558","DOI":"10.1109\/JIOT.2024.3352558"},{"key":"1979_CR37","doi-asserted-by":"crossref","unstructured":"Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 223\u2013238 . Springer","DOI":"10.1007\/3-540-48910-X_16"},{"key":"1979_CR38","unstructured":"Menezes AJ, Oorschot PCV, Vanstone SA (1997) Handbook of applied cryptography. crc press"},{"issue":"7","key":"1979_CR39","doi-asserted-by":"publisher","first-page":"6132","DOI":"10.1109\/JIOT.2019.2957314","volume":"7","author":"A Saleem","year":"2020","unstructured":"Saleem A, Khan A, Malik SUR, Pervaiz H, Malik H, Alam MM, Jindal A (2020) Fesda: fog-enabled secure data aggregation in smart grid iot network. IEEE Internet Things J 7(7):6132\u20136142. https:\/\/doi.org\/10.1109\/JIOT.2019.2957314","journal-title":"IEEE Internet Things J"},{"key":"1979_CR40","doi-asserted-by":"publisher","unstructured":"Khan HM, Khan A, Jabeen F, Rahman AU (2021) Privacy preserving data aggregation with fault tolerance in fog-enabled smart grids. Sustainable Cities and Society 64 https:\/\/doi.org\/10.1016\/j.scs.2020.102522","DOI":"10.1016\/j.scs.2020.102522"},{"issue":"1","key":"1979_CR41","first-page":"6693296","volume":"2023","author":"Z Song","year":"2023","unstructured":"Song Z, Zhong W, Zhou T, Chen D, Ding Y, Yang X (2023) Semda: Secure and efficient multidimensional data aggregation in smart grid without a trusted third party. Secur Commun Netw 2023(1):6693296","journal-title":"Secur Commun Netw"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-01979-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-025-01979-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-01979-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T20:15:44Z","timestamp":1757189744000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-025-01979-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,17]]},"references-count":41,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["1979"],"URL":"https:\/\/doi.org\/10.1007\/s40747-025-01979-6","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,17]]},"assertion":[{"value":"5 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"346"}}