{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T03:33:57Z","timestamp":1778556837824,"version":"3.51.4"},"reference-count":80,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T00:00:00Z","timestamp":1734566400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T00:00:00Z","timestamp":1734566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-024-00085-2","type":"journal-article","created":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T11:38:19Z","timestamp":1734608299000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Uncertainty propagation in the internet of things"],"prefix":"10.1007","volume":"4","author":[{"given":"Shantanu","family":"Pal","sequence":"first","affiliation":[]},{"given":"Sara","family":"Khalifa","sequence":"additional","affiliation":[]},{"given":"Dimity","family":"Miller","sequence":"additional","affiliation":[]},{"given":"Volkan","family":"Dedeoglu","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Dorri","sequence":"additional","affiliation":[]},{"given":"Gowri","family":"Ramachandran","sequence":"additional","affiliation":[]},{"given":"Peyman","family":"Moghadam","sequence":"additional","affiliation":[]},{"given":"Brano","family":"Kusy","sequence":"additional","affiliation":[]},{"given":"Raja","family":"Jurdak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,19]]},"reference":[{"key":"85_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-2354-7_32","volume-title":"\u201cSurvey of security issues in cyber-physical systems","author":"A Tandon","year":"2022","unstructured":"Tandon A. \u201cSurvey of security issues in cyber-physical systems. Cham: Springer; 2022."},{"key":"85_CR2","doi-asserted-by":"crossref","unstructured":"M.\u00a0Heydari, A.\u00a0Mylonas, V.\u00a0Katos, E.\u00a0Balaguer-Ballester, V.\u00a0H.\u00a0F. Tafreshi, and E.\u00a0Benkhelifa, \u201cUncertainty-aware authentication model for fog computing in iot,\u201d in 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC). IEEE, 2019, pp. 52\u201359.","DOI":"10.1109\/FMEC.2019.8795332"},{"issue":"23","key":"85_CR3","doi-asserted-by":"publisher","first-page":"6956","DOI":"10.3390\/s20236956","volume":"20","author":"P Cofta","year":"2020","unstructured":"Cofta P, Or\u0142owski C, Lebied\u017a J. Trust-based model for the assessment of the uncertainty of measurements in hybrid iot networks. Sensors. 2020;20(23):6956.","journal-title":"Sensors"},{"issue":"75","key":"85_CR4","doi-asserted-by":"publisher","first-page":"422","DOI":"10.19101\/IJATEE.2020.762115","volume":"8","author":"NLM Azemi","year":"2021","unstructured":"Azemi NLM, Wahid N. Uncertainty in internet of things: a review. Int J Adv Technol Eng Exploration. 2021;8(75):422.","journal-title":"Int J Adv Technol Eng Exploration"},{"issue":"3","key":"85_CR5","doi-asserted-by":"publisher","first-page":"27","DOI":"10.3390\/computers10030027","volume":"10","author":"S Ismail","year":"2021","unstructured":"Ismail S, Shah K, Reza H, Marsh R, Grant E. Toward management of uncertainty in self-adaptive software systems: Iot case study. Computers. 2021;10(3):27.","journal-title":"Computers"},{"issue":"5","key":"85_CR6","doi-asserted-by":"publisher","first-page":"1827","DOI":"10.3390\/s21051827","volume":"21","author":"P Cofta","year":"2021","unstructured":"Cofta P, Karatzas K, Or\u0142owski C. A conceptual model of measurement uncertainty in iot sensor networks. Sensors. 2021;21(5):1827.","journal-title":"Sensors"},{"issue":"2","key":"85_CR7","doi-asserted-by":"publisher","first-page":"275","DOI":"10.3846\/bme.2016.332","volume":"14","author":"A Magruk","year":"2016","unstructured":"Magruk A, et al. Uncertainty in the sphere of the industry 4.0-potential areas to research. Busi Manage Educ. 2016;14(2):275\u201391.","journal-title":"Busi Manage Educ"},{"key":"85_CR8","doi-asserted-by":"crossref","unstructured":"N.\u00a0A. Mej\u00eda, G.\u00a0S. Boada, and J.\u00a0R. de\u00a0Almeida\u00a0Amazonas, \u201cDecision making under uncertainty for the deployment of future networks in iot scenarios. Springer: Cham. 2020.","DOI":"10.1007\/978-3-030-68737-3_12"},{"key":"85_CR9","doi-asserted-by":"crossref","unstructured":"A.\u00a0Tissaoui and M.\u00a0Saidi Uncertainty in iot for smart healthcare: Challenges, and opportunities. Springer: Cham. 2020,","DOI":"10.1007\/978-3-030-51517-1_19"},{"key":"85_CR10","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1016\/j.proeng.2015.10.028","volume":"122","author":"A Magruk","year":"2015","unstructured":"Magruk A. The most important aspects of uncertainty in the internet of things field-context of smart buildings. Procedia Eng. 2015;122:220\u20137.","journal-title":"Procedia Eng"},{"key":"85_CR11","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A. Security, privacy and trust in internet of things: the road ahead. Comput networks. 2015;76:146\u201364.","journal-title":"Comput networks"},{"key":"85_CR12","doi-asserted-by":"crossref","unstructured":"Y.\u00a0Wang and Z.\u00a0Wu, \u201cBlockchain-based multidimensional trust management in edge computing,\u201d IEEE Access, 2023.","DOI":"10.1109\/ACCESS.2023.3329126"},{"key":"85_CR13","doi-asserted-by":"publisher","first-page":"8","DOI":"10.3390\/s19081929","volume":"19","author":"F Azzedin","year":"2019","unstructured":"Azzedin F, Ghaleb M. Internet-of-things and information fusion: trust perspective survey. Sensors. 2019;19:8.","journal-title":"Sensors"},{"key":"85_CR14","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1016\/j.proeng.2015.10.028","volume":"122","author":"A Magruk","year":"2015","unstructured":"Magruk A. The most important aspects of uncertainty in the internet of things field - context of smart buildings. Procedia Eng. 2015;122:220\u20137.","journal-title":"Procedia Eng"},{"key":"85_CR15","unstructured":"M.\u00a0Spiliopoulou, M.\u00a0van Keulen, H.-J. Lenz, J.\u00a0Wijsen, M.\u00a0Renz, R.\u00a0Kruse, and M.\u00a0Stern, \u201c08421 working group: Imprecision, diversity and uncertainty: Disentangling threads in uncertainty management,\u201d in Uncertainty Management in Information Systems, ser. Dagstuhl Seminar Proceedings, C.\u00a0Koch, B.\u00a0K\u00f6nig-Ries, V.\u00a0Markl, and M.\u00a0van Keulen, Eds., no. 08421. Dagstuhl, Germany: Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany, 2009. [Online]. Available: http:\/\/drops.dagstuhl.de\/opus\/volltexte\/2009\/1937"},{"issue":"2","key":"85_CR16","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.strusafe.2008.06.020","volume":"31","author":"A Der Kiureghian","year":"2009","unstructured":"Der Kiureghian A, Ditlevsen O. Aleatory or epistemic? Does it matter? Structural Safety. 2009;31(2):105\u201312.","journal-title":"Structural Safety"},{"key":"85_CR17","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.jcp.2019.05.027","volume":"394","author":"Y Yang","year":"2019","unstructured":"Yang Y, Perdikaris P. Adversarial uncertainty quantification in physics-informed neural networks. J Comput Phys. 2019;394:136\u201352.","journal-title":"J Comput Phys"},{"key":"85_CR18","unstructured":"L.\u00a0Smith and Y.\u00a0Gal, \u201cUnderstanding measures of uncertainty for adversarial example detection,\u201d arXiv preprint arXiv:1803.08533, 2018."},{"key":"85_CR19","unstructured":"M.\u00a0Spiliopoulou, M.\u00a0Van\u00a0Keulen, H.-J. Lenz, J.\u00a0Wijsen, M.\u00a0Renz, R.\u00a0Kruse, and M.\u00a0Stern, \u201cImprecision, diversity and uncertainty: Disentangling threads in uncertainty management,\u201d Proceedings of Dagstuhl Seminar 08421 on Uncertainty Management in Information Systems, 2009."},{"key":"85_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cola.2019.01.001","volume":"53","author":"W Zhao","year":"2019","unstructured":"Zhao W, Jiang H, Tang K, Pei W, Wu Y, Qayoom A. Knotted-line: a visual explorer for uncertainty in transportation system. J Comput Lang. 2019;53:1\u20138.","journal-title":"J Comput Lang"},{"issue":"1","key":"85_CR21","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1109\/TVCG.2015.2467591","volume":"22","author":"D Sacha","year":"2015","unstructured":"Sacha D, Senaratne H, Kwon BC, Ellis G, Keim DA. The role of uncertainty, awareness, and trust in visual analytics. IEEE Trans Visualiz Comput Graph. 2015;22(1):240\u20139.","journal-title":"IEEE Trans Visualiz Comput Graph"},{"key":"85_CR22","unstructured":"M.\u00a0Ravi, Y.\u00a0Demazeau, and F.\u00a0Ramparany, \u201cManaging trust and uncertainty for distributed ai systems,\u201d in Rencontres des Jeunes Chercheurs en Intelligence Artificielle, RJCIA\u20192014, 2014."},{"key":"85_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/11780991_16","volume-title":"\u201cA taxonomy and representation of sources of uncertainty in active systems","author":"S Wasserkrug","year":"2006","unstructured":"Wasserkrug S, Gal A, Etzion O. \u201cA taxonomy and representation of sources of uncertainty in active systems. Cham: Springer; 2006."},{"issue":"4","key":"85_CR24","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1177\/0272989X11409240","volume":"31","author":"J Bilcke","year":"2011","unstructured":"Bilcke J, Beutels P, Brisson M, Jit M. Accounting for methodological, structural, and parameter uncertainty in decision-analytic models: a practical guide. Med Dec Making. 2011;31(4):675\u201392.","journal-title":"Med Dec Making"},{"key":"85_CR25","unstructured":"A.\u00a0Kendall and Y.\u00a0Gal, \u201cWhat uncertainties do we need in bayesian deep learning for computer vision?\u201d in Proceedings of the International Conference on Neural Information Processing Systems, 2017, pp. 5580\u20135590."},{"issue":"3","key":"85_CR26","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/s10994-021-05946-3","volume":"110","author":"E H\u00fcllermeier","year":"2021","unstructured":"H\u00fcllermeier E, Waegeman W. Aleatoric and epistemic uncertainty in machine learning: An introduction to concepts and methods. Mac Learn. 2021;110(3):457\u2013506.","journal-title":"Mac Learn"},{"key":"85_CR27","unstructured":"Y.-C.-T. Hu, B.-H. Kung, D.\u00a0S. Tan, J.-C. Chen, K.-L. Hua, and W.-H. Cheng, \u201cNaturalistic physical adversarial patch for object detectors,\u201d in Proceedings of the IEEE\/CVF International Conference on Computer Vision, 2021, pp. 7848\u20137857."},{"key":"85_CR28","unstructured":"C.\u00a0Szegedy, W.\u00a0Zaremba, I.\u00a0Sutskever, J.\u00a0Bruna, D.\u00a0Erhan, I.\u00a0Goodfellow, and R.\u00a0Fergus, \u201cIntriguing properties of neural networks,\u201d in Proceedings of the International Conference on Learning Representations, 2014."},{"key":"85_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-1395-1_16","volume-title":"\u201cAn effective deep learning-based variational autoencoder for zero-day attack detection model","author":"S Priya","year":"2021","unstructured":"Priya S, Uthra RA. \u201cAn effective deep learning-based variational autoencoder for zero-day attack detection model. Cham: Springer; 2021."},{"key":"85_CR30","doi-asserted-by":"crossref","unstructured":"I.\u00a0Manousakis, \u00cd.\u00a0Goiri, R.\u00a0Bianchini, S.\u00a0Rigo, and T.\u00a0D. Nguyen, \u201cUncertainty propagation in data processing systems,\u201d in Proceedings of the ACM Symposium on Cloud Computing, 2018, pp. 95\u2013106.","DOI":"10.1145\/3267809.3267833"},{"key":"85_CR31","doi-asserted-by":"crossref","unstructured":"Palani K, Holt E, Smith S, \u201cInvisible and forgotten: Zero-day blooms in the iot\u201d, in,. IEEE international conference on pervasive computing and communication workshops (PerCom Workshops). IEEE. 2016;2016:1\u20136.","DOI":"10.1109\/PERCOMW.2016.7457163"},{"issue":"5\u20136","key":"85_CR32","first-page":"338","volume":"52","author":"M Aydos","year":"2019","unstructured":"Aydos M, Vural Y, Tekerek A. Assessing risks and threats with layered approach to internet of things security. Measur Contl. 2019;52(5\u20136):338\u201353.","journal-title":"Measur Contl"},{"key":"85_CR33","doi-asserted-by":"publisher","first-page":"2589","DOI":"10.1016\/j.renene.2019.08.092","volume":"146","author":"G Dileep","year":"2020","unstructured":"Dileep G. A survey on smart grid technologies and applications. Renew Energy. 2020;146:2589\u2013625.","journal-title":"Renew Energy"},{"key":"85_CR34","doi-asserted-by":"crossref","unstructured":"F.\u00a0Khan, M.\u00a0A.\u00a0B. Siddiqui, A.\u00a0U. Rehman, J.\u00a0Khan, M.\u00a0T. S.\u00a0A. Asad, and A.\u00a0Asad, \u201cIot based power monitoring system for smart grid applications,\u201d in 2020 International Conference on Engineering and Emerging Technologies (ICEET). IEEE, 2020, pp. 1\u20135.","DOI":"10.1109\/ICEET48479.2020.9048229"},{"key":"85_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2021.111358","volume":"150","author":"EA Bhuiyan","year":"2021","unstructured":"Bhuiyan EA, Hossain MZ, Muyeen S, Fahim SR, Sarker SK, Das SK. Towards next generation virtual power plant: Technology review and frameworks. Renew Sustain Energy Rev. 2021;150: 111358.","journal-title":"Renew Sustain Energy Rev"},{"key":"85_CR36","doi-asserted-by":"crossref","unstructured":"Z.\u00a0Alavikia and M.\u00a0Shabro, \u201cA comprehensive layered approach for implementing internet of things-enabled smart grid: A survey,\u201d Digital Communications and Networks, 2022.","DOI":"10.1016\/j.dcan.2022.01.002"},{"issue":"20","key":"85_CR37","doi-asserted-by":"publisher","first-page":"5897","DOI":"10.3390\/s20205897","volume":"20","author":"S Pal","year":"2020","unstructured":"Pal S, Hitchens M, Rabehaja T, Mukhopadhyay S. Security requirements for the internet of things: a systematic approach. Sensors. 2020;20(20):5897.","journal-title":"Sensors"},{"key":"85_CR38","doi-asserted-by":"crossref","unstructured":"N.\u00a0Robinson, L.\u00a0Valeri, J.\u00a0Cave, T.\u00a0Starkey, H.\u00a0Graux, S.\u00a0Creese, and P.\u00a0P. Hopkins, \u201cThe cloud: understanding the security, privacy and trust challenges,\u201d Privacy and Trust Challenges (November 30, 2010), 2010.","DOI":"10.2139\/ssrn.2141970"},{"key":"85_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.107094","volume":"169","author":"MZ Gunduz","year":"2020","unstructured":"Gunduz MZ, Das R. Cyber-security on smart grid: threats and potential solutions. Comput Networks. 2020;169: 107094.","journal-title":"Comput Networks"},{"key":"85_CR40","doi-asserted-by":"crossref","unstructured":"O.\u00a0Aouedi, T.-H. Vu, A.\u00a0Sacco, D.\u00a0C. Nguyen, K.\u00a0Piamrat, G.\u00a0Marchetto, and Q.-V. Pham, \u201cA survey on intelligent internet of things: applications, security, privacy, and future directions,\u201d IEEE Communications Surveys & Tutorials, 2024.","DOI":"10.1109\/COMST.2024.3430368"},{"key":"85_CR41","volume-title":"Security, privacy, and trust issues in smart environments","author":"P Nixon","year":"2005","unstructured":"Nixon P, Wagealla W, English C, Terzis S. Security, privacy, and trust issues in smart environments. Smart Environments: Technologies, Protocols, and Applications; 2005."},{"key":"85_CR42","doi-asserted-by":"crossref","unstructured":"A.\u00a0Dorri, C.\u00a0Roulin, R.\u00a0Jurdak, and S.\u00a0S. Kanhere, \u201cOn the activity privacy of blockchain for iot,\u201d in 2019 IEEE 44th Conference on Local Computer Networks (LCN). IEEE, 2019, pp. 258\u2013261.","DOI":"10.1109\/LCN44214.2019.8990819"},{"key":"85_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2016.11.011","volume":"36","author":"A Tchernykh","year":"2019","unstructured":"Tchernykh A, Schwiegelsohn U, Talbi E-G, Babenko M. Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability. J Comput Sci. 2019;36: 100581.","journal-title":"J Comput Sci"},{"issue":"2","key":"85_CR44","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1109\/TETC.2013.2288275","volume":"1","author":"H Nicanfar","year":"2013","unstructured":"Nicanfar H, Talebifard P, Alasaad A, Leung VC. Enhanced network coding to maintain privacy in smart grid communication. IEEE Trans Emerg Topics Comput. 2013;1(2):286\u201396.","journal-title":"IEEE Trans Emerg Topics Comput"},{"key":"85_CR45","doi-asserted-by":"crossref","unstructured":"F.\u00a0Siddiqui, S.\u00a0Zeadally, C.\u00a0Alcaraz, and S.\u00a0Galvao, \u201cSmart grid privacy: Issues and solutions,\u201d in 2012 21st International Conference on Computer Communications and Networks (ICCCN). IEEE, 2012, pp. 1\u20135.","DOI":"10.1109\/ICCCN.2012.6289304"},{"issue":"1","key":"85_CR46","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s11277-009-9882-1","volume":"56","author":"P Dami\u00e1n-Reyes","year":"2011","unstructured":"Dami\u00e1n-Reyes P, Favela J, Contreras-Castillo J. Uncertainty management in context-aware applications: increasing usability and user trust. Wireless Personal Commun. 2011;56(1):37\u201353.","journal-title":"Wireless Personal Commun"},{"key":"85_CR47","doi-asserted-by":"crossref","unstructured":"S.\u00a0Pal, M.\u00a0Hitchens, and V.\u00a0Varadharajan, \u201cTowards the design of a trust management framework for the internet of things,\u201d in 2019 13th International Conference on Sensing Technology (ICST). IEEE, 2019, pp. 1\u20137.","DOI":"10.1109\/ICST46873.2019.9047734"},{"issue":"1","key":"85_CR48","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1080\/03906701.2014.894335","volume":"24","author":"M Frederiksen","year":"2014","unstructured":"Frederiksen M. Trust in the face of uncertainty: a qualitative study of intersubjective trust and risk. Int Rev Sociol. 2014;24(1):130\u201344.","journal-title":"Int Rev Sociol"},{"issue":"23","key":"85_CR49","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/s11042-018-6801-z","volume":"78","author":"N Alassaf","year":"2019","unstructured":"Alassaf N, Gutub A, Parah SA, Al Ghamdi M. Enhancing speed of simon: a light-weight-cryptographic algorithm for iot applications\u2019\u2019. Multim Tools Applic. 2019;78(23):32\u2013633.","journal-title":"Multim Tools Applic"},{"key":"85_CR50","volume-title":"\u201cA light weight cryptographic solution for 6lowpan protocol stack","author":"S Khairnar","year":"2018","unstructured":"Khairnar S, Bansod G, Dahiphale V. \u201cA light weight cryptographic solution for 6lowpan protocol stack. Cham: Springer; 2018."},{"issue":"33","key":"85_CR51","first-page":"33","volume":"10","author":"G Said","year":"2022","unstructured":"Said G, Ghani A, Ullah A, Azeem M, Bilal M, Kwak KS. Light-weight secure aggregated data sharing in iot-enabled wireless sensor networks. IEEE Access. 2022;10(33):33\u2013571.","journal-title":"IEEE Access"},{"key":"85_CR52","first-page":"140","volume":"125","author":"JC Pandey","year":"2022","unstructured":"Pandey JC, Kalra M. A review of security concerns in smart grid. Innov Data Commun Technol Applic. 2022;125:140.","journal-title":"Innov Data Commun Technol Applic"},{"key":"85_CR53","doi-asserted-by":"crossref","unstructured":"F.\u00a0Ramparany, R.\u00a0Mondi, and Y.\u00a0Demazeau, \u201cA semantic approach for managing trust and uncertainty in distributed systems environments,\u201d in 2016 21st International Conference on Engineering of Complex Computer Systems (ICECCS). IEEE, 2016, pp. 63\u201370.","DOI":"10.1109\/ICECCS.2016.017"},{"key":"85_CR54","doi-asserted-by":"crossref","unstructured":"L.\u00a0Yang, K.\u00a0Yu, S.\u00a0X. Yang, C.\u00a0Chakraborty, Y.\u00a0Lu, and T.\u00a0Guo, \u201cAn intelligent trust cloud management method for secure clustering in 5g enabled internet of medical things,\u201d IEEE Transactions on Industrial Informatics, 2021.","DOI":"10.1109\/TII.2021.3128954"},{"key":"85_CR55","doi-asserted-by":"crossref","unstructured":"M.\u00a0Sun, M.\u00a0Li, and R.\u00a0Gerdes, \u201cA data trust framework for vanets enabling false data detection and secure vehicle tracking,\u201d in 2017 IEEE Conference on Communications and Network Security (CNS). IEEE, 2017, pp. 1\u20139.","DOI":"10.1109\/CNS.2017.8228654"},{"key":"85_CR56","doi-asserted-by":"crossref","unstructured":"Jayasinghe U, Otebolaku A, Um T-W, Lee GM, Data centric trust evaluation and prediction framework for iot. In: ITU Kaleidoscope: Challenges for a Data-Driven Society (ITU K). IEEE. 2017;2017:1\u20137.","DOI":"10.23919\/ITU-WT.2017.8246999"},{"issue":"2","key":"85_CR57","doi-asserted-by":"publisher","first-page":"1267","DOI":"10.1007\/s11277-021-08948-5","volume":"122","author":"C Gopala Krishnan","year":"2022","unstructured":"Gopala Krishnan C, Nishan A, Gomathi S, Aravind Swaminathan G. Energy and trust management framework for manet using clustering algorithm\u2019\u2019. Wireless Personal Commun. 2022;122(2):1267\u201381.","journal-title":"Wireless Personal Commun"},{"key":"85_CR58","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/ACCESS.2019.2894819","volume":"7","author":"E Hossain","year":"2019","unstructured":"Hossain E, Khan I, Un-Noor F, Sikander SS, Sunny MSH. Application of big data and machine learning in smart grid, and associated security concerns: A review. Ieee Access. 2019;7:13\u2013960.","journal-title":"Ieee Access"},{"key":"85_CR59","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102808","volume":"170","author":"L Cui","year":"2020","unstructured":"Cui L, Qu Y, Gao L, Xie G, Yu S. Detecting false data attacks using machine learning techniques in smart grid: A survey. J Network Comput Applica. 2020;170: 102808.","journal-title":"J Network Comput Applica"},{"issue":"7","key":"85_CR60","doi-asserted-by":"publisher","first-page":"4703","DOI":"10.1109\/TII.2019.2942353","volume":"16","author":"Y Yang","year":"2019","unstructured":"Yang Y, Li W, Gulliver TA, Li S. Bayesian deep learning-based probabilistic load forecasting in smart grids. IEEE Transa Indust Inform. 2019;16(7):4703\u201313.","journal-title":"IEEE Transa Indust Inform"},{"issue":"1","key":"85_CR61","doi-asserted-by":"publisher","first-page":"247","DOI":"10.3390\/en14010247","volume":"14","author":"M Selim","year":"2021","unstructured":"Selim M, Zhou R, Feng W, Quinsey P. Estimating energy forecasting uncertainty for reliable ai autonomous smart grid design. Energies. 2021;14(1):247.","journal-title":"Energies"},{"key":"85_CR62","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/ACCESS.2019.2920326","volume":"7","author":"H Karimipour","year":"2019","unstructured":"Karimipour H, Dehghantanha A, Parizi RM, Choo K-KR, Leung H. A deep and scalable unsupervised machine learning system for cyber-attack detection in large-scale smart grids. IEEE Access. 2019;7:80\u2013778.","journal-title":"IEEE Access"},{"issue":"8","key":"85_CR63","doi-asserted-by":"publisher","first-page":"1773","DOI":"10.1109\/TNNLS.2015.2404803","volume":"27","author":"M Ozay","year":"2015","unstructured":"Ozay M, Esnaola I, Vural FTY, Kulkarni SR, Poor HV. Machine learning methods for attack detection in the smart grid. IEEE Transa Neural Networks Learn Syst. 2015;27(8):1773\u201386.","journal-title":"IEEE Transa Neural Networks Learn Syst"},{"key":"85_CR64","volume":"52","author":"AS Rajasekaran","year":"2022","unstructured":"Rajasekaran AS, Azees M, Al-Turjman F. A comprehensive survey on blockchain technology. Sustain Energy Technol Assess. 2022;52: 102039.","journal-title":"Sustain Energy Technol Assess"},{"issue":"1","key":"85_CR65","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/JIOT.2020.2993601","volume":"8","author":"MB Mollah","year":"2020","unstructured":"Mollah MB, Zhao J, Niyato D, Lam K-Y, Zhang X, Ghias AM, Koh LH, Yang L. Blockchain for future smart grid: a comprehensive survey. IEEE Inter Things J. 2020;8(1):18\u201343.","journal-title":"IEEE Inter Things J"},{"key":"85_CR66","unstructured":"\u201cBrooklyn. bmg. brooklyn energy,\u201d https:\/\/www.brooklyn.energy\/, [Online: accessed 24-March-2022]."},{"key":"85_CR67","unstructured":"\u201cElectron. electron. lounch and operate distributed energy markets.\u201d https:\/\/electron.net\/, [Online: accessed 24-March-2022]."},{"key":"85_CR68","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/ACCESS.2021.3071431","volume":"9","author":"R Khalid","year":"2021","unstructured":"Khalid R, Samuel O, Javaid N, Aldegheishem A, Shafiq M, Alrajeh N. A secure trust method for multi-agent system in smart grids using blockchain. IEEE Access. 2021;9:59\u2013848.","journal-title":"IEEE Access"},{"key":"85_CR69","doi-asserted-by":"crossref","unstructured":"O.\u00a0Samuel, N.\u00a0Javaid, A.\u00a0Khalid, M.\u00a0Imrarn, and N.\u00a0Nasser, \u201cA trust management system for multi-agent system in smart grids using blockchain technology,\u201d in GLOBECOM 2020-2020 IEEE Global Communications Conference. IEEE, 2020, pp. 1\u20136.","DOI":"10.1109\/GLOBECOM42002.2020.9348231"},{"key":"85_CR70","doi-asserted-by":"crossref","unstructured":"Kim H, Laskowski M, A perspective on blockchain smart contracts: Reducing uncertainty and complexity in value exchange. In: 26th International conference on computer communication and networks (ICCCN). IEEE. 2017;2017:1\u20136.","DOI":"10.1109\/ICCCN.2017.8038512"},{"issue":"3","key":"85_CR71","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/s11704-016-6148-4","volume":"12","author":"H Ahmad","year":"2018","unstructured":"Ahmad H, Wang L, Hong H, Li J, Dawood H, Ahmed M, Yang Y. Primitives towards verifiable computation: a survey. Front Comput Sci. 2018;12(3):451\u201378.","journal-title":"Front Comput Sci"},{"key":"85_CR72","first-page":"3","volume":"99","author":"F Monrose","year":"1999","unstructured":"Monrose F, Wyckoff P, Rubin AD. Distributed execution with remote audit\u2019\u2019. Ndss. 1999;99:3\u20135.","journal-title":"Ndss"},{"key":"85_CR73","doi-asserted-by":"crossref","unstructured":"Ramachandran G, Nemeth D, Neville D, Zhelezov D, Yal\u00e7in A, Fohrmann O, Krishnamachari B. Whistleblower: Towards a decentralized and open platform for spotting fake news. In: IEEE International Conference on Blockchain (Blockchain). 2020;2020:154\u201361.","DOI":"10.1109\/Blockchain50366.2020.00026"},{"key":"85_CR74","doi-asserted-by":"crossref","unstructured":"A.\u00a0Laszka, A.\u00a0Dubey, M.\u00a0Walker, and D.\u00a0Schmidt, \u201cProviding privacy, safety, and security in iot-based transactive energy systems using distributed ledgers,\u201d in Proceedings of the Seventh International Conference on the Internet of Things, 2017, pp. 1\u20138.","DOI":"10.1145\/3131542.3131562"},{"issue":"5","key":"85_CR75","doi-asserted-by":"publisher","first-page":"7992","DOI":"10.1109\/JIOT.2019.2904303","volume":"6","author":"K Gai","year":"2019","unstructured":"Gai K, Wu Y, Zhu L, Xu L, Zhang Y. Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet of Things Journal. 2019;6(5):7992\u20138004.","journal-title":"IEEE Internet of Things Journal"},{"issue":"7","key":"85_CR76","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MCOM.2018.1700401","volume":"56","author":"Z Guan","year":"2018","unstructured":"Guan Z, Si G, Zhang X, Wu L, Guizani N, Du X, Ma Y. Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities. IEEE Commun Magaz. 2018;56(7):82\u20138.","journal-title":"IEEE Commun Magaz"},{"key":"85_CR77","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/ACCESS.2019.2925787","volume":"7","author":"M Kamal","year":"2019","unstructured":"Kamal M, Tariq M. Light-weight security and blockchain based provenance for advanced metering infrastructure. IEEE Access. 2019;7:87\u2013345.","journal-title":"IEEE Access"},{"issue":"7","key":"85_CR78","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1109\/MCOM.2019.1800577","volume":"57","author":"A Dorri","year":"2019","unstructured":"Dorri A, Luo F, Kanhere SS, Jurdak R, Dong ZY. Spb: a secure private blockchain-based solution for distributed energy trading. IEEE Commun Mag. 2019;57(7):120\u20136.","journal-title":"IEEE Commun Mag"},{"key":"85_CR79","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2020.106610","volume":"127","author":"M Khorasany","year":"2021","unstructured":"Khorasany M, Dorri A, Razzaghi R, Jurdak R. Lightweight blockchain framework for location-aware peer-to-peer energy trading. Int J Elect Power Energy Syst. 2021;127: 106610.","journal-title":"Int J Elect Power Energy Syst"},{"key":"85_CR80","unstructured":"H.\u00a0D. Dixit, S.\u00a0Pendharkar, M.\u00a0Beadon, C.\u00a0Mason, T.\u00a0Chakravarthy, B.\u00a0Muthiah, and S.\u00a0Sankar, \u201cSilent data corruptions at scale,\u201d arXiv preprint arXiv:2102.11245, 2021."}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-024-00085-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-024-00085-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-024-00085-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T12:23:44Z","timestamp":1734611024000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-024-00085-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,19]]},"references-count":80,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["85"],"URL":"https:\/\/doi.org\/10.1007\/s43926-024-00085-2","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,19]]},"assertion":[{"value":"15 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 November 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"32"}}