{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T20:24:48Z","timestamp":1769977488964,"version":"3.49.0"},"reference-count":159,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100010683","name":"European Unions Horizon 2020 Research and Innovation Programme","doi-asserted-by":"publisher","award":["833955"],"award-info":[{"award-number":["833955"]}],"id":[{"id":"10.13039\/100010683","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/ojcoms.2020.3037517","type":"journal-article","created":{"date-parts":[[2020,11,11]],"date-time":"2020-11-11T21:22:12Z","timestamp":1605129732000},"page":"1934-1960","source":"Crossref","is-referenced-by-count":28,"title":["The Challenges of Privacy and Access Control as Key Perspectives for the Future Electric Smart Grid"],"prefix":"10.1109","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4019-6610","authenticated-orcid":false,"given":"Anna","family":"Triantafyllou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9846-0421","authenticated-orcid":false,"given":"Jose Antonio Perez","family":"Jimenez","sequence":"additional","affiliation":[]},{"given":"Alejandro Del Real","family":"Torres","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0749-9794","authenticated-orcid":false,"given":"Thomas","family":"Lagkas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2453-3904","authenticated-orcid":false,"given":"Konstantinos","family":"Rantos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6042-0355","authenticated-orcid":false,"given":"Panagiotis","family":"Sarigiannidis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Consumer data privacy in a networked world&#x2014;A framework for protecting privacy and promoting innovation in the global digital economy","year":"2012"},{"key":"ref38","article-title":"NIST special publication (SP) 800-53 revision 4&#x2014;Security and privacy controls for federal information systems and organizations&#x2014;Appendix J&#x2014;Privacy control catalog","year":"2013"},{"key":"ref33","article-title":"Information technology&#x2014;Security techniques&#x2014;Privacy framework","year":"2011"},{"key":"ref32","article-title":"Information security controls for the energy utility industry","year":"2017"},{"key":"ref31","article-title":"Security techniques&#x2014;Extension to ISO\/IEC 27001 and ISO\/IEC 27002 for privacy information management&#x2014;Requirements and guidelines","year":"2019"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2017.09.005"},{"key":"ref37","article-title":"FTC issues final commission report on protecting consumer privacy&#x2014;Agency calls on companies to adopt best privacy practices","year":"2012"},{"key":"ref36","article-title":"Apec privacy framework","year":"2005"},{"key":"ref35","article-title":"Data protection&#x2014;Rules for the protection of personal data inside and outside the eu","year":"1995"},{"key":"ref34","article-title":"Information technology&#x2014;Business operational view&#x2014;Part 8: Identification of privacy protection requirements as external constraints on business transactions","year":"2012"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.04.015"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.041513.00174"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2014.7007758"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2017.07.018"},{"key":"ref22","article-title":"Guidelines for smart grid cybersecurity","year":"2014"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2809005"},{"key":"ref24","article-title":"Smart. grid task force 2012-14, data protection impact assessment template for smart grid and smart metering systems","year":"2018"},{"key":"ref23","article-title":"Guidelines for smart grid cyber security: Volume 2, privacy and the smart grid","year":"2010"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2017.05.021"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2593453"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2585963"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2469094"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/230140"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/ACCESS.2013.2260815","article-title":"A distortion-based approach to privacy-preserving metering in smart grids","volume":"1","author":"he","year":"2013","journal-title":"IEEE Access"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2936278"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2019.106024"},{"key":"ref156","author":"saad","year":"2019","journal-title":"Exploring the attack surface of blockchain A systematic overview"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2998479"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2945367"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2907650"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2018.2888775"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2977383"},{"key":"ref147","article-title":"A federated capability-based access control mechanism for Internet of Things (IoTs)","author":"xu","year":"2018","journal-title":"Proc Sens Syst Space Appl"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2942190"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2987958"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/MEPCON.2017.8301249"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2440658"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.447"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1057"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2260942"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1564"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1155\/2011\/372020"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2387848"},{"key":"ref40","article-title":"ANSI c12.20","year":"2002"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-2820-9"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.5772\/63631","article-title":"Advanced metering infrastructure based on smart meters in smart grid","author":"le","year":"2016","journal-title":"Smart Metering Technology and Services&#x2014;Inspirations for Energy Utilities"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2894819"},{"key":"ref5","article-title":"Annex II&#x2014;Security aspects of the smart grid","year":"2012"},{"key":"ref159","year":"2020","journal-title":"The SDN-microSENSE Project"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2720195"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2751323.2751325"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2425958"},{"key":"ref157","doi-asserted-by":"crossref","first-page":"6142","DOI":"10.3390\/en7096142","article-title":"Business models in the smart grid: Challenges, opportunities and proposals for prosumer profitability","volume":"7","author":"rodr\u00edguez-molina","year":"2014","journal-title":"Energies"},{"key":"ref158","year":"2020","journal-title":"The SPEAR Project"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.06.006"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130716"},{"key":"ref45","article-title":"ANSI\/ISA-62443-4-2-2018, security for industrial automation and control systems, part 4-2: Technical security requirements for iacs components","year":"2018"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622050"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6574667"},{"key":"ref42","year":"2016"},{"key":"ref41","article-title":"IEEE 1686-2013&#x2014;Standard for substation intelligent electronic devices (IEDS) cyber security capabilities","year":"2014"},{"key":"ref44","year":"0","journal-title":"Whitepaper Industrial Security based on IEC 62443"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/ICS2015.2"},{"key":"ref127","first-page":"1","article-title":"Distributed management of permission for access control model","volume":"38","author":"cai","year":"2019","journal-title":"J Intell Fuzzy Syst"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2706760"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/PowerAfrica.2016.7556606"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883390"},{"key":"ref73","first-page":"405","article-title":"Clustering-based k-anonymity","author":"he","year":"2012","journal-title":"Advances in Knowledge Discovery and Data Mining"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"ref129","author":"nakamoto","year":"2009","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2019.e01321"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.06.025"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.08.025"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref130","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1007\/978-3-319-59665-5_15","article-title":"Blockchain based access control","author":"di francesco maesa","year":"2017","journal-title":"Distributed Applications and Interoperable Systems"},{"key":"ref77","first-page":"486","article-title":"Our data, ourselves: Privacy via distributed noise generation","author":"dwork","year":"2006","journal-title":"Advances in Cryptology (EUROCRYPT)"},{"key":"ref74","first-page":"1","article-title":"Differential privacy","author":"dwork","year":"2006","journal-title":"Automata Languages and Programming"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0042"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.05.005"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.03.016"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1748"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-014-0292-0"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.5220\/0006855601680176"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/SmartWorld.2018.00160"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2019.05.127"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/NaNA.2019.00070"},{"key":"ref138","doi-asserted-by":"crossref","first-page":"928","DOI":"10.3390\/s20030928","article-title":"Hy-bridge: A hybrid blockchain for privacy-preserving and trustful energy transactions in Internet-of-Things platforms","volume":"20","author":"firoozjaei","year":"2020","journal-title":"Sensors (Basel Switzerland)"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-00930-5"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CITS.2014.6878971"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2904303"},{"key":"ref62","article-title":"EPDAS: Efficient privacy-preserving data analysis scheme for smart grid network","author":"kamil","year":"0","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"ref61","first-page":"414","article-title":"A lightweight authentication protocol for smart grid","volume":"234","author":"ghosh","year":"2018","journal-title":"Int J Netw Security"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860482"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.3390\/en11112972"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9020285"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2803782"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2993921"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/JERA.35.108"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148937"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2705218"},{"key":"ref143","author":"kone?n\u00fd","year":"2015","journal-title":"Federated optimization Distributed optimization beyond the datacenter"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03712-3_6"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2020.2993259"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-805343-0.00018-8"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/9637578"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2973651"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5349894"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.069"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622047"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.3390\/app10051758"},{"key":"ref94","author":"fioretto","year":"2019","journal-title":"Differential privacy for power grid obfuscation"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2922697"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2011.6102313"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1700859"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.04.031"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.12.042"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2662940"},{"key":"ref104","first-page":"1","article-title":"Towards key management challenges in the smart grid","author":"renner","year":"2019","journal-title":"Proc ARCS Workshop 32nd Int Conf Archit Comput Syst"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849309"},{"key":"ref103","doi-asserted-by":"crossref","first-page":"11883","DOI":"10.3390\/en81011883","article-title":"State of the art authentication, access control, and secure integration in smart grid","volume":"8","author":"saxena","year":"2015","journal-title":"Energies"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2512525"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.3390\/s20061581"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2996093"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.4236\/epe.2020.124B006"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847974"},{"key":"ref99","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1007\/978-3-642-54568-9_13","article-title":"Differentially private smart metering with battery recharging","author":"backes","year":"2014","journal-title":"Data Privacy Management and Autonomous Spontaneous Security"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046720"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382242"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2017.12.041"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2018.12.001"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.03.014"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2899354"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2944748"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8829523"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1294-6"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100312"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.egypro.2016.06.066"},{"key":"ref117","first-page":"262","article-title":"PBES: A policy based encryption system with application to data sharing in the power grid","author":"bobba","year":"2009","journal-title":"Proc 4th Int Symp Inf Comput Commun Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102807"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.170"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102808"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2712258"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/181760"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2307\/1229286"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.2991\/icimm-16.2016.138"},{"key":"ref114","year":"2008","journal-title":"AMI system security requirements"},{"key":"ref113","first-page":"505","author":"xu","year":"2020","journal-title":"Decentralized Access Control for IoT Based on Blockchain and Smart Contract"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1002\/9781118653722"},{"key":"ref80","first-page":"329","article-title":"Finding a needle in a haystack or identifying anonymous census records","volume":"2","author":"dalenius","year":"1986","journal-title":"J Official Stat"},{"key":"ref115","first-page":"281","article-title":"Access control for a smart grid SOA","author":"jung","year":"2012","journal-title":"Proc Internet Technol Secured Trans Conf"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2017.8288161"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701080"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.03.008"},{"key":"ref122","first-page":"194","article-title":"Access control mechanism supporting scalability, interoperability and flexibility of multi-domain smart grid system","author":"kim","year":"2012","journal-title":"Proc Int Conf Inf Sci Ind Appl (ISI)"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2224389"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2017.7943505"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/3291533.3291559"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M2716"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8782661\/8816718\/09256305.pdf?arnumber=9256305","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T22:30:58Z","timestamp":1643149858000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9256305\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":159,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2020.3037517","relation":{},"ISSN":["2644-125X"],"issn-type":[{"value":"2644-125X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}