{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T03:11:55Z","timestamp":1772766715694,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00125-5","type":"journal-article","created":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T13:23:08Z","timestamp":1747660988000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Green tech, safe networks: the role of cybersecurity in combating climate change"],"prefix":"10.1007","volume":"5","author":[{"given":"Idris Olanrewaju","family":"Ibraheem","sequence":"first","affiliation":[]},{"given":"Lateefat","family":"Bello-Ahmed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,19]]},"reference":[{"key":"125_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2024.e37980","volume":"10","author":"B Paul","year":"2024","unstructured":"Paul B, et al. Potential smart grid vulnerabilities to cyber attacks: current threats and existing mitigation strategies. Heliyon. 2024;10: e37980. https:\/\/doi.org\/10.1016\/j.heliyon.2024.e37980.","journal-title":"Heliyon"},{"key":"125_CR2","unstructured":"International Energy Agency (IEA), 2023. https:\/\/www.iea.org\/spotlights\/global-investment-in-clean-energy-is-on-course-to-reach-usd-1-8-trillion-in-2023."},{"key":"125_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2022.108975","volume":"215","author":"M Ghiasi","year":"2023","unstructured":"Ghiasi M, et al. A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: past, present and future. Electric Power Syst Res. 2023;215: 108975. https:\/\/doi.org\/10.1016\/j.epsr.2022.108975.","journal-title":"Electric Power Syst Res"},{"key":"125_CR4","doi-asserted-by":"publisher","unstructured":"Mohamed N. Renewable Energy in the Age of AI: Cybersecurity Challenges and Opportunities. in 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT), Kamand, India, 2024, pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICCCNT61001.2024.10724383.","DOI":"10.1109\/ICCCNT61001.2024.10724383"},{"issue":"3","key":"125_CR5","doi-asserted-by":"publisher","first-page":"4106","DOI":"10.1109\/JSYST.2021.3136683","volume":"16","author":"A Takiddin","year":"2022","unstructured":"Takiddin A, et al. Deep autoencoder-based anomaly detection of electricity theft cyberattacks in smart grids. IEEE Syst J. 2022;16(3):4106\u201317. https:\/\/doi.org\/10.1109\/JSYST.2021.3136683.","journal-title":"IEEE Syst J"},{"issue":"1","key":"125_CR6","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s10207-023-00732-9","volume":"23","author":"A Rekeraho","year":"2024","unstructured":"Rekeraho A, et al. Cybersecurity challenges in IoT-based smart renewable energy. Int J Inf Secur. 2024;23(1):101\u201317. https:\/\/doi.org\/10.1007\/s10207-023-00732-9.","journal-title":"Int J Inf Secur"},{"issue":"3","key":"125_CR7","doi-asserted-by":"publisher","first-page":"1242","DOI":"10.1002\/ese3.1697","volume":"12","author":"M Parhamfar","year":"2024","unstructured":"Parhamfar M, Sadeghkhani I, Adeli AM. Towards the net zero carbon future: a review of blockchain-enabled peer-to-peer carbon trading. Energy Sci Eng. 2024;12(3):1242\u201364. https:\/\/doi.org\/10.1002\/ese3.1697.","journal-title":"Energy Sci Eng"},{"issue":"23","key":"125_CR8","doi-asserted-by":"publisher","first-page":"3854","DOI":"10.3390\/electronics11233854","volume":"11","author":"U Inayat","year":"2022","unstructured":"Inayat U, et al. Cybersecurity enhancement of smart grid: attacks, methods, and prospects. Electronics. 2022;11(23):3854. https:\/\/doi.org\/10.3390\/electronics11233854.","journal-title":"Electronics"},{"issue":"1","key":"125_CR9","doi-asserted-by":"publisher","first-page":"2978","DOI":"10.30574\/ijsra.2024.12.1.1186","volume":"12","author":"AB Ige","year":"2024","unstructured":"Ige AB, Kupa E, Ilori O. Analyzing defense strategies against cyber risks in the energy sector: enhancing the security of renewable energy sources. Int J Sci Res Arch. 2024;12(1):2978\u201395. https:\/\/doi.org\/10.30574\/ijsra.2024.12.1.1186.","journal-title":"Int J Sci Res Arch"},{"issue":"5","key":"125_CR10","doi-asserted-by":"publisher","first-page":"1048","DOI":"10.51594\/csitrj.v5i5.1115","volume":"5","author":"EG Chukwurah","year":"2024","unstructured":"Chukwurah EG, Okeke CD, Ekechi CC. Innovation green technology in the age of cybersecurity: balancing sustainability goals with security concerns. Comput Sci IT Res J. 2024;5(5):1048\u201375.","journal-title":"Comput Sci IT Res J"},{"key":"125_CR11","doi-asserted-by":"crossref","unstructured":"Nazare T, Nardo L, Arias-Garcia J, Nepomuceno E. Ensuring resilience in ocean energy power plants: a survey of cybersecurity measures. in Proceedings of the European Wave and Tidal Energy Conference, vol. 15, 2023.","DOI":"10.36688\/ewtec-2023-452"},{"issue":"6","key":"125_CR12","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.51594\/csitrj.v5i6.1197","volume":"5","author":"DE Ekechukwu","year":"2024","unstructured":"Ekechukwu DE, Simpa P. The future of Cybersecurity in renewable energy systems: a review, identifying challenges and proposing strategic solutions. Comput Sci IT Res J. 2024;5(6):1265\u201399. https:\/\/doi.org\/10.51594\/csitrj.v5i6.1197.","journal-title":"Comput Sci IT Res J"},{"key":"125_CR13","doi-asserted-by":"crossref","unstructured":"Salam A. Internet of things for sustainability: perspectives in privacy, cybersecurity, and future trends. in Internet of Things for Sustainable Community Development: Wireless Communications, Sensing, and Systems, Cham: Springer International Publishing, 2024, pp. 299\u2013326.","DOI":"10.1007\/978-3-031-62162-8_10"},{"issue":"3","key":"125_CR14","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1504\/IJES.2022.124854","volume":"15","author":"I Voronenko","year":"2022","unstructured":"Voronenko I, Nehrey M, Laptieva A, Babenko V, Rohoza K. National cybersecurity: assessment, risks and trends. Int J Embedded Syst. 2022;15(3):226\u201338.","journal-title":"Int J Embedded Syst"},{"issue":"2","key":"125_CR15","first-page":"645","volume":"14","author":"M Karpiuk","year":"2023","unstructured":"Karpiuk M, Piz\u0142o W, Kaczmarek K. Cybersecurity management-current state and directions of change. Int J Legal Stud (IJOLS). 2023;14(2):645\u201363.","journal-title":"Int J Legal Stud (IJOLS)"},{"key":"125_CR16","doi-asserted-by":"publisher","unstructured":"Falowo OI, Kropczynski J, Li C. Protecting critical infrastructure: strategies for managing cybersecurity risks in nuclear fusion facilities. in 2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom), Wuhan, China, 2023, pp. 1050\u20131061. https:\/\/doi.org\/10.1109\/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00170.","DOI":"10.1109\/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00170"},{"key":"125_CR17","doi-asserted-by":"publisher","unstructured":"Dede G, et al. Cybersecurity as a contributor to United Nations SDGs towards enhancing the ESG Reporting. in 2024 5th International Conference in Electronic Engineering, Information Technology & Education (EEITE), Chania, Greece, 2024, pp. 1\u20136. https:\/\/doi.org\/10.1109\/EEITE61750.2024.10654435.","DOI":"10.1109\/EEITE61750.2024.10654435"},{"key":"125_CR18","doi-asserted-by":"publisher","unstructured":"Yaacoub JP, et al. Cybersecurity in smart renewable energy systems. in 2024 International Wireless Communications and Mobile Computing (IWCMC), Ayia Napa, Cyprus, 2024, pp. 1534\u20131540. https:\/\/doi.org\/10.1109\/IWCMC61514.2024.10592561.","DOI":"10.1109\/IWCMC61514.2024.10592561"},{"key":"125_CR19","doi-asserted-by":"publisher","unstructured":"Bagley I, et al. A photovoltaic MPPT charge controller real-time testbed for cybersecurity applications. in 2023 Workshop on Communication Networks and Power Systems (WCNPS), Brasilia, Brazil, 2023, pp. 1\u20136. https:\/\/doi.org\/10.1109\/WCNPS60622.2023.10345118.","DOI":"10.1109\/WCNPS60622.2023.10345118"},{"key":"125_CR20","doi-asserted-by":"publisher","unstructured":"Brudni S, et al. Green security: a framework for measurement and optimization of energy consumption of cybersecurity solutions. in 2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P), Vienna, Austria, 2024, pp. 676\u2013696. https:\/\/doi.org\/10.1109\/EuroSP60621.2024.00043.","DOI":"10.1109\/EuroSP60621.2024.00043"},{"key":"125_CR21","doi-asserted-by":"crossref","unstructured":"Rehan H. The future of electric vehicles: navigating the intersection of AI, Cloud Technology, and Cybersecurity. Valley International Journal Digital Library, pp. 1127\u20131143, 2024.","DOI":"10.18535\/ijsrm\/v12i04.ec04"},{"key":"125_CR22","doi-asserted-by":"publisher","unstructured":"Vaddi HR, et al. Smart crop advisor\u2014intelligent crop and fertilizer recommendations with crop yield prediction using ML algorithms. in 2024 International Conference on Intelligent Systems for Cybersecurity (ISCS), Gurugram, India, 2024, pp. 1\u20136. https:\/\/doi.org\/10.1109\/ISCS61804.2024.10581346.","DOI":"10.1109\/ISCS61804.2024.10581346"},{"key":"125_CR23","doi-asserted-by":"publisher","unstructured":"Chandrakala D, et al. Enhancing data security in cloud-based soil carbon sequestration monitoring systems using random forest regression. in 2024 International Conference on Intelligent Systems for Cybersecurity (ISCS), Gurugram, India, 2024, pp. 1\u20136. https:\/\/doi.org\/10.1109\/ISCS61804.2024.10581090.","DOI":"10.1109\/ISCS61804.2024.10581090"},{"issue":"6","key":"125_CR24","doi-asserted-by":"publisher","first-page":"13895","DOI":"10.1007\/s10668-023-04289-4","volume":"26","author":"F Han","year":"2024","unstructured":"Han F, Ibrahim RL, Al-Mulali U, Al-Faryan MAS. Tracking the roadmaps to sustainability: what do the symmetric effects of eco-digitalization, green technology, green finance, and renewable energy portend for China? Environ Dev Sustain. 2024;26(6):13895\u2013919. https:\/\/doi.org\/10.1007\/s10668-023-04289-4.","journal-title":"Environ Dev Sustain"},{"issue":"7","key":"125_CR25","doi-asserted-by":"publisher","first-page":"10032","DOI":"10.1007\/s11356-022-23192-5","volume":"31","author":"J Zhang","year":"2024","unstructured":"Zhang J, Yang G, Ding X, Qin J. Can green bonds empower green technology innovation of enterprises. Environ Sci Pollut Res. 2024;31(7):10032\u201344. https:\/\/doi.org\/10.1007\/s11356-022-23192-5.","journal-title":"Environ Sci Pollut Res"},{"key":"125_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.eneco.2023.106557","volume":"119","author":"Y Liu","year":"2023","unstructured":"Liu Y, Dong K, Jiang Q. Assessing energy vulnerability and its impact on carbon emissions: a global case. Energy Econ. 2023;119: 106557. https:\/\/doi.org\/10.1016\/j.eneco.2023.106557.","journal-title":"Energy Econ"},{"issue":"1","key":"125_CR27","first-page":"138","volume":"1","author":"VDR Kalli","year":"2023","unstructured":"Kalli VDR. Integrating renewable energy into healthcare IT: a cyber-secure approach. Int J Adv Eng Technol Innov. 2023;1(1):138\u201356.","journal-title":"Int J Adv Eng Technol Innov"},{"issue":"12","key":"125_CR28","doi-asserted-by":"publisher","first-page":"1861","DOI":"10.3390\/electronics11121861","volume":"11","author":"H Palahalli","year":"2022","unstructured":"Palahalli H, Hemmati M, Gruosso G. Analysis and design of a smart controller for managing penetration of renewable energy including cybersecurity issues. Electronics. 2022;11(12):1861. https:\/\/doi.org\/10.3390\/electronics11121861.","journal-title":"Electronics"},{"key":"125_CR29","doi-asserted-by":"publisher","unstructured":"Rahardja U, et al. Cybersecurity for FinTech on Renewable Energy from ACD Countries. in 2022 10th International Conference on Cyber and IT Service Management (CITSM), Yogyakarta, Indonesia, 2022, pp. 1\u20136. https:\/\/doi.org\/10.1109\/CITSM56380.2022.9935855.","DOI":"10.1109\/CITSM56380.2022.9935855"},{"key":"125_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2023.138866","volume":"425","author":"M Bakeer","year":"2023","unstructured":"Bakeer M, et al. A new cyber-security approach for load frequency control of hybrid interconnected renewable power systems. J Clean Prod. 2023;425: 138866. https:\/\/doi.org\/10.1016\/j.jclepro.2023.138866.","journal-title":"J Clean Prod"},{"issue":"3","key":"125_CR31","doi-asserted-by":"publisher","first-page":"2709","DOI":"10.1002\/sd.2811","volume":"32","author":"L Sethi","year":"2024","unstructured":"Sethi L, Behera B, Sethi N. Do green finance, green technology innovation, and institutional quality help achieve environmental sustainability? Evidence from the developing economies. Sustain Dev. 2024;32(3):2709\u201323. https:\/\/doi.org\/10.1002\/sd.2811.","journal-title":"Sustain Dev"},{"key":"125_CR32","doi-asserted-by":"publisher","first-page":"35846","DOI":"10.1109\/ACCESS.2022.3163551","volume":"10","author":"ND Tuyen","year":"2022","unstructured":"Tuyen ND, et al. A comprehensive review of cybersecurity in inverter-based smart power system amid the boom of renewable energy. IEEE Access. 2022;10:35846\u201375. https:\/\/doi.org\/10.1109\/ACCESS.2022.3163551.","journal-title":"IEEE Access"},{"key":"125_CR33","doi-asserted-by":"publisher","first-page":"9662","DOI":"10.1016\/j.egyr.2022.07.145","volume":"8","author":"M Bharathidasan","year":"2022","unstructured":"Bharathidasan M, et al. A review on electric vehicle: technologies, energy trading, and cyber security. Energy Rep. 2022;8:9662\u201385. https:\/\/doi.org\/10.1016\/j.egyr.2022.07.145.","journal-title":"Energy Rep"},{"key":"125_CR34","doi-asserted-by":"publisher","unstructured":"Wilkerson C, Hariri ME. IEC 61850-Based Renewable Energy Systems: A Survey on Cybersecurity Aspects. in 2022 IEEE International Conference on Environment and Electrical Engineering and 2022 IEEE Industrial and Commercial Power Systems Europe (EEEIC \/ I&CPS Europe), Prague, Czech Republic, 2022, pp. 1\u20136. https:\/\/doi.org\/10.1109\/EEEIC\/ICPSEurope54979.2022.9854539.","DOI":"10.1109\/EEEIC\/ICPSEurope54979.2022.9854539"},{"issue":"4","key":"125_CR35","doi-asserted-by":"publisher","first-page":"6695","DOI":"10.1109\/JSYST.2023.3305757","volume":"17","author":"I Zografopoulos","year":"2023","unstructured":"Zografopoulos I, Hatziargyriou ND, Konstantinou C. Distributed energy resources cybersecurity outlook: vulnerabilities, attacks, impacts, and mitigations. IEEE Syst J. 2023;17(4):6695\u2013709. https:\/\/doi.org\/10.1109\/JSYST.2023.3305757.","journal-title":"IEEE Syst J"},{"key":"125_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2022.108610","volume":"145","author":"A Rahiminejad","year":"2023","unstructured":"Rahiminejad A, et al. A resilience-based recovery scheme for smart grid restoration following cyberattacks to substations. Int J Electr Power Energy Syst. 2023;145: 108610. https:\/\/doi.org\/10.1016\/j.ijepes.2022.108610.","journal-title":"Int J Electr Power Energy Syst"},{"key":"125_CR37","doi-asserted-by":"publisher","unstructured":"Khoei TT, Slimane HO, Kaabouch N. A comprehensive survey on the cyber-security of smart grids: cyber-attacks, detection, countermeasure techniques, and future directions. arXiv preprint arXiv:2207.07738, 2022. https:\/\/doi.org\/10.48550\/arXiv.2207.07738.","DOI":"10.48550\/arXiv.2207.07738"},{"issue":"4","key":"125_CR38","doi-asserted-by":"publisher","first-page":"662","DOI":"10.3390\/jcp3040031","volume":"3","author":"AA Bouramdane","year":"2023","unstructured":"Bouramdane AA. Cyberattacks in smart grids: challenges and solving the multi-criteria decision-making for cybersecurity options, including ones that incorporate artificial intelligence, using an analytical hierarchy process. J Cybersecur Priv. 2023;3(4):662\u2013705. https:\/\/doi.org\/10.3390\/jcp3040031.","journal-title":"J Cybersecur Priv"},{"key":"125_CR39","doi-asserted-by":"publisher","unstructured":"Mavale S, et al. Review of cyber-attacks on smart grid system. in Proceedings of Third International Conference on Communication, Computing and Electronics Systems: ICCCES 2021, Singapore: Springer Singapore, 2022, pp. 639\u2013653. https:\/\/doi.org\/10.1007\/978-981-16-8862-1_42.","DOI":"10.1007\/978-981-16-8862-1_42"},{"issue":"2","key":"125_CR40","doi-asserted-by":"publisher","first-page":"2364","DOI":"10.1109\/TPEL.2022.3206239","volume":"38","author":"Y Li","year":"2023","unstructured":"Li Y, Yan J. Cybersecurity of smart inverters in the smart grid: a survey. IEEE Trans Power Electron. 2023;38(2):2364\u201383. https:\/\/doi.org\/10.1109\/TPEL.2022.3206239.","journal-title":"IEEE Trans Power Electron"},{"key":"125_CR41","doi-asserted-by":"publisher","first-page":"13182","DOI":"10.1109\/ACCESS.2022.3145015","volume":"10","author":"J Chen","year":"2022","unstructured":"Chen J, et al. Cyber-attack detection and countermeasure for distributed electric springs for smart grid applications. IEEE Access. 2022;10:13182\u201392. https:\/\/doi.org\/10.1109\/ACCESS.2022.3145015.","journal-title":"IEEE Access"},{"key":"125_CR42","doi-asserted-by":"publisher","unstructured":"Sachdeva S, Khanom S, Saadawi T. A blockchain-enabled auction and peer-to-peer energy trading system in a local energy market. in 2023 9th IEEE India International Conference on Power Electronics (IICPE), 2023, pp. 1\u20136. https:\/\/doi.org\/10.1109\/IICPE60303.2023.10474634.","DOI":"10.1109\/IICPE60303.2023.10474634"},{"key":"125_CR43","unstructured":"PRISMA Flow Diagram Systematic Review Maker. https:\/\/www.prisma-statement.org\/prisma-2020-flow-diagram. 2023."},{"key":"125_CR44","unstructured":"Ibraheem I. CRGT Novel Green Technology Security Framework. 2025."}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00125-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00125-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00125-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T13:23:12Z","timestamp":1747660992000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00125-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,19]]},"references-count":44,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["125"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00125-5","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,19]]},"assertion":[{"value":"5 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"All the authors consent to publishing this research.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"58"}}