{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:29:05Z","timestamp":1774538945092,"version":"3.50.1"},"reference-count":156,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["ALLRP-566258-21"],"award-info":[{"award-number":["ALLRP-566258-21"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3202914","type":"journal-article","created":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T21:08:51Z","timestamp":1661807331000},"page":"92390-92409","source":"Crossref","is-referenced-by-count":29,"title":["Cyber-Security of Industrial Internet of Things in Electric Power Systems"],"prefix":"10.1109","volume":"10","author":[{"given":"Hamed","family":"Sarjan","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Lakehead University, Thunder Bay, P7B 5E1, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8499-5241","authenticated-orcid":false,"given":"Amir","family":"Ameli","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Lakehead University, Thunder Bay, P7B 5E1, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2184-5734","authenticated-orcid":false,"given":"Mohsen","family":"Ghafouri","sequence":"additional","affiliation":[{"name":"Concordia Institute for Information Systems Engineering (CIISE), Concordia University, Montreal, Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2300753"},{"key":"ref3","volume-title":"IoT Connections Outlook","year":"2022"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0761-7"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2874978"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834095"},{"key":"ref7","article-title":"Recommendations for implementing the strategic initiative industrie 4.0","author":"Henning","year":"2013"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2684807"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3603739"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2549047"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-5549-0_2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102481"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.1900536"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2016.2618724"},{"issue":"1","key":"ref15","article-title":"Application of the IIOT to equipment maintenance","volume":"61","author":"Yonezawa","year":"2018"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17775\/CSEEJPES.2019.01810"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2017.8016234"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2802704"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/PowerEng.2013.6635759"},{"key":"ref20","first-page":"12","article-title":"Cybersecurity in the power sector","volume":"22","author":"Bayar","year":"2014","journal-title":"Power Eng. Int."},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/er.5216"},{"key":"ref22","article-title":"Powering the future: Leading the digital transformation of the power industry","author":"Annunziata","year":"2016"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/i-PACT44901.2019.8960194"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICECDS.2017.8389601"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.enpol.2007.03.009"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-83301-5"},{"key":"ref27","article-title":"A decentralized framework for real-time energy trading in distribution networks with load and generation uncertainty","author":"Bahrami","year":"2017","journal-title":"arXiv:1705.02575"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/s21041233"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10668-021-01267-6"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.seta.2021.101430"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2016.7439953"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2011.0763"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2019.2940668"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSE.2012.6295205"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2015.09.098"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/en13020494"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/EnergyTech.2012.6304636"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s40436-017-0197-2"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2012.77"},{"key":"ref40","first-page":"13","article-title":"Applications of Internet of Things on smart grid in China","volume-title":"Proc. 13th Int. Conf. Adv. Commun. Technol. (ICACT)","author":"Liu"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MUSIC.2012.24"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2012.2311"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968402"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06405-y"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.04.003"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0384-6"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1321"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.05.453"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700871"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2388550"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2013.02.006"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44230-3"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2910750"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3079916"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2016.2606384"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1201\/9780429119347-20"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2997651"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2920763"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.414"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.8"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.62"},{"key":"ref64","article-title":"IoT network security: Requirements, threats, and countermeasures","author":"Hamza","year":"2020","journal-title":"arXiv:2008.09339"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.5120\/19787-1571"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2016.7820657"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.887306"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.4018\/jisp.2010040103"},{"key":"ref69","first-page":"388","article-title":"Side-channel attacks: Ten years after its publication and the impacts on cryptographic module security testing","volume":"2005","author":"Zhou","year":"2005","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref70","article-title":"Security analysis of phasor measurement units in smart grid communication infrastructures","author":"Esfahani","year":"2014"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2019.2911511"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.24"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/CINTI.2015.7382906"},{"key":"ref75","article-title":"Hacking IoT: A case study on baby monitor exposures and vulnerabilities","author":"Stanislav","year":"2015"},{"key":"ref76","article-title":"Review on the security threats of Internet of Things","author":"Podder","year":"2021","journal-title":"arXiv:2101.05614"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101790"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022842"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2015.12.005"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/3333165.3333169"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.10.125"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00247-3_11"},{"issue":"13","key":"ref83","first-page":"1","article-title":"An enhanced technique to detect sinkhole attack in Internet of Things","volume":"5","author":"Stephen","year":"2018","journal-title":"Int. J. Eng. Res. Technol."},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2935189"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3141408"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2869847"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2014.2354293"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/2000502.2000503"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/JISIC.2014.43"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/3013520"},{"key":"ref92","first-page":"61","article-title":"Industrial practices in security vulnerability management for IoT systems\u2014An interview study","volume-title":"Proc. Int. Conf. Softw. Eng. Res. Pract. (SERP)","author":"H\u00f6st"},{"key":"ref93","first-page":"82","article-title":"Guide to industrial control systems (ICS) security, NIST spec","volume":"800","author":"Stouffer","year":"2011","journal-title":"Publ"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3023507"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2947339"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2018.8502660"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2863244"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2015.7392493"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.17"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/MoWNet.2016.7496625"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/3229565.3229566"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2016.7496525"},{"key":"ref103","article-title":"Soft MUD: Implementing manufacturer usage descriptions on OpenFlow SDN switches","author":"Ranganathan","year":"2019"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/CSAE.2011.5952541"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2737630"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2794991"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2894108"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2836144"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3108668"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2703922"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2857811"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2864168"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.03.021"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.02.013"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-8566-7_46"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.06.008"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/METROI4.2018.8428344"},{"key":"ref118","article-title":"Cyber security awareness campaigns: Why do they fail to change behaviour?","author":"Bada","year":"2019","journal-title":"arXiv:1901.02672"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/CySWater.2016.7469060"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1145\/3140241.3140253"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2018.04.015"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2415763"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2018.8638027"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-31"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2018.8554702"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1080\/21642583.2017.1331768"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/SOLI.2018.8476769"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2021.0120506"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3067667"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3077005"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.3390\/s20164372"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3118642"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.9734\/ajrcos\/2021\/v9i230218"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9071177"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1016\/0893-6080(91)90009-T"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/72.554195"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2010-343"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2867564"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.3390\/jsan10030058"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2016.2633228"},{"key":"ref142","article-title":"Machine learning with feature selection using principal component analysis for malware detection: A case study","author":"Zhang","year":"2019","journal-title":"arXiv:1902.03639"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102630"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.09.009"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.3390\/app11188383"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1145\/3290480.3290494"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.26636\/jtit.2021.151221"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2974281"},{"issue":"8","key":"ref149","doi-asserted-by":"crossref","first-page":"2661","DOI":"10.1016\/j.adhoc.2013.04.014","article-title":"IoT-enabled smart energy grid: Applications and challenges","volume":"11","author":"Raza","year":"2013","journal-title":"Ad-Hoc Netw."},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2018.10.014"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.3390\/en11081973"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700401"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2786307"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2019.05.127"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2709784"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2496-1"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09869831.pdf?arnumber=9869831","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T06:07:18Z","timestamp":1709359638000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9869831\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":156,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3202914","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}