{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T12:57:12Z","timestamp":1751547432939,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T00:00:00Z","timestamp":1649894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Research Foundation, Singapore","award":["NSoE_DeST-SCI2019-0009"],"award-info":[{"award-number":["NSoE_DeST-SCI2019-0009"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,14]]},"DOI":"10.1145\/3508398.3511504","type":"proceedings-article","created":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T04:13:31Z","timestamp":1650082411000},"page":"191-202","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Securing Smart Grids Through an Incentive Mechanism for Blockchain-Based Data Sharing"],"prefix":"10.1145","author":[{"given":"Dani\u00ebl","family":"Reijsbergen","sequence":"first","affiliation":[{"name":"Singapore University of Technology and Design, Singapore, Singapore"}]},{"given":"Aung","family":"Maw","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore, Singapore"}]},{"given":"Tien Tuan Anh","family":"Dinh","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore, Singapore"}]},{"given":"Wen-Tai","family":"Li","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore, Singapore"}]},{"given":"Chau","family":"Yuen","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2022,4,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Hyperledger fabric. https:\/\/www.hyperledger.org\/use\/fabric.  Hyperledger fabric. https:\/\/www.hyperledger.org\/use\/fabric."},{"key":"e_1_3_2_1_2_1","unstructured":"IEEE test cases. http:\/\/amfarid.scripts.mit.edu\/Datasets\/SPG-Data\/index.php.  IEEE test cases. http:\/\/amfarid.scripts.mit.edu\/Datasets\/SPG-Data\/index.php."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1201\/9780203913673"},{"key":"e_1_3_2_1_4_1","volume-title":"Set-up and challenges of Germany's power grid","author":"Appunn K.","year":"2018","unstructured":"K. Appunn and R. Russell . Set-up and challenges of Germany's power grid , 2018 . [hrefhttps:\/\/www.cleanenergywire.org\/factsheets\/set-and-challenges-germanys-power-gridOnline; accessed 23--7--2020]. K. Appunn and R. Russell. Set-up and challenges of Germany's power grid, 2018. [hrefhttps:\/\/www.cleanenergywire.org\/factsheets\/set-and-challenges-germanys-power-gridOnline; accessed 23--7--2020]."},{"key":"e_1_3_2_1_5_1","volume-title":"Enabling blockchain innovations with pegged sidechains","author":"Back A.","year":"2014","unstructured":"A. Back , M. Corallo , L. Dashjr , M. Friedenbach , G. Maxwell , A. Miller , A. Poelstra , J. Tim\u00f3n , and P. Wuille . Enabling blockchain innovations with pegged sidechains , 2014 . [hrefhttps:\/\/blockstream.com\/sidechains.pdfOnline; accessed 14--10--2020]. A. Back, M. Corallo, L. Dashjr, M. Friedenbach, G. Maxwell, A. Miller, A. Poelstra, J. Tim\u00f3n, and P. Wuille. Enabling blockchain innovations with pegged sidechains, 2014. [hrefhttps:\/\/blockstream.com\/sidechains.pdfOnline; accessed 14--10--2020]."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2294966"},{"key":"e_1_3_2_1_7_1","volume-title":"Preprints of the First Workshop on Secure Control Systems","author":"Bobba R. B.","year":"2010","unstructured":"R. B. Bobba , K. M. Rogers , Q. Wang , H. Khurana , K. Nahrstedt , and T. J. Overbye . Detecting false data injection attacks on DC state estimation . In Preprints of the First Workshop on Secure Control Systems , 2010 . R. B. Bobba, K. M. Rogers, Q. Wang, H. Khurana, K. Nahrstedt, and T. J. Overbye. Detecting false data injection attacks on DC state estimation. In Preprints of the First Workshop on Secure Control Systems, 2010."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1972495"},{"key":"e_1_3_2_1_9_1","first-page":"173","volume-title":"OSDI","volume":"99","author":"Castro M.","year":"1999","unstructured":"M. Castro , B. Liskov , Practical Byzantine fault tolerance . In OSDI , volume 99 , pages 173 -- 186 , 1999 . M. Castro, B. Liskov, et al. Practical Byzantine fault tolerance. In OSDI, volume 99, pages 173--186, 1999."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2006.881149"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPST.2002.1047509"},{"key":"e_1_3_2_1_12_1","first-page":"1085","volume-title":"ACM SIGMOD","author":"Dinh T. T. A.","year":"2017","unstructured":"T. T. A. Dinh , J. Wang , G. Chen , R. Liu , B. C. Ooi , and K.-L. Tan . Blockbench : A framework for analyzing private blockchains . In ACM SIGMOD , pages 1085 -- 1100 , 2017 . T. T. A. Dinh, J. Wang, G. Chen, R. Liu, B. C. Ooi, and K.-L. Tan. Blockbench: A framework for analyzing private blockchains. In ACM SIGMOD, pages 1085--1100, 2017."},{"key":"e_1_3_2_1_13_1","volume-title":"Antitrust: Commission imposes binding obligations on TenneT to increase electricity trading capacity between Denmark and Germany","author":"European Commission","year":"2018","unstructured":"European Commission . Antitrust: Commission imposes binding obligations on TenneT to increase electricity trading capacity between Denmark and Germany , 2018 . [hrefhttps:\/\/ec.europa.eu\/commission\/presscorner\/detail\/en\/IP_18_6722Online; accessed 13--8--2020]. European Commission. Antitrust: Commission imposes binding obligations on TenneT to increase electricity trading capacity between Denmark and Germany, 2018. [hrefhttps:\/\/ec.europa.eu\/commission\/presscorner\/detail\/en\/IP_18_6722Online; accessed 13--8--2020]."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905298"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-09526-8_5"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2893433"},{"key":"e_1_3_2_1_17_1","volume-title":"Ca nizares. Electric energy systems: analysis and operation","author":"Gomez-Exposito A.","year":"2018","unstructured":"A. Gomez-Exposito , A. J. Conejo , and C. Ca nizares. Electric energy systems: analysis and operation . CRC press , 2018 . A. Gomez-Exposito, A. J. Conejo, and C. Ca nizares. Electric energy systems: analysis and operation. CRC press, 2018."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3033665"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2016.102"},{"key":"e_1_3_2_1_20_1","volume-title":"Data-driven false data injection attacks against power grid: A random matrix approach. arXiv preprint arXiv:2002.02519","author":"Lakshminarayana S.","year":"2020","unstructured":"S. Lakshminarayana , A. Kammoun , M. Debbah , and H. V. Poor . Data-driven false data injection attacks against power grid: A random matrix approach. arXiv preprint arXiv:2002.02519 , 2020 . S. Lakshminarayana, A. Kammoun, M. Debbah, and H. V. Poor. Data-driven false data injection attacks against power grid: A random matrix approach. arXiv preprint arXiv:2002.02519, 2020."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077839.3077852"},{"key":"e_1_3_2_1_22_1","volume-title":"Analysis of the cyber attack on the Ukrainian power grid","author":"Lee R. M.","year":"2016","unstructured":"R. M. Lee , M. J. Assante , and T. Conway . Analysis of the cyber attack on the Ukrainian power grid . Electricity Information Sharing and Analysis Center (E-ISAC) , 2016 . R. M. Lee, M. J. Assante, and T. Conway. Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC), 2016."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2015.2495214"},{"issue":"8","key":"e_1_3_2_1_24_1","first-page":"3690","article-title":"Consortium blockchain for secure energy trading in industrial Internet of Things","volume":"14","author":"Li Z.","year":"2017","unstructured":"Z. Li , J. Kang , R. Yu , D. Ye , Q. Deng , and Y. Zhang . Consortium blockchain for secure energy trading in industrial Internet of Things . IEEE Transactions on Industrial Informatics , 14 ( 8 ): 3690 -- 3700 , 2017 . Z. Li, J. Kang, R. Yu, D. Ye, Q. Deng, and Y. Zhang. Consortium blockchain for secure energy trading in industrial Internet of Things. IEEE Transactions on Industrial Informatics, 14(8):3690--3700, 2017.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2418280"},{"key":"e_1_3_2_1_26_1","volume-title":"False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security (TISSEC), 14(1):1--33","author":"Liu Y.","year":"2011","unstructured":"Y. Liu , P. Ning , and M. K. Reiter . False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security (TISSEC), 14(1):1--33 , 2011 . Y. Liu, P. Ning, and M. K. Reiter. False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security (TISSEC), 14(1):1--33, 2011."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2435370"},{"key":"e_1_3_2_1_28_1","first-page":"369","volume-title":"Conference on the theory and application of cryptographic techniques","author":"Merkle R. C.","year":"1987","unstructured":"R. C. Merkle . A digital signature based on a conventional encryption function . In Conference on the theory and application of cryptographic techniques , pages 369 -- 378 . Springer , 1987 . R. C. Merkle. A digital signature based on a conventional encryption function. In Conference on the theory and application of cryptographic techniques, pages 369--378. Springer, 1987."},{"key":"e_1_3_2_1_29_1","volume-title":"Blockchain for future smart grid: A comprehensive survey","author":"Mollah M. B.","year":"2020","unstructured":"M. B. Mollah , J. Zhao , D. Niyato , K.-Y. Lam , X. Zhang , A. M. Ghias , L. H. Koh , and L. Yang . Blockchain for future smart grid: A comprehensive survey . IEEE Internet of Things Journal , 2020 . M. B. Mollah, J. Zhao, D. Niyato, K.-Y. Lam, X. Zhang, A. M. Ghias, L. H. Koh, and L. Yang. Blockchain for future smart grid: A comprehensive survey. IEEE Internet of Things Journal, 2020."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4999-4"},{"key":"e_1_3_2_1_31_1","volume-title":"A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf","author":"Nakamoto S.","year":"2009","unstructured":"S. Nakamoto . Bitcoin : A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf , 2009 . S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf, 2009."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2006.881425"},{"key":"e_1_3_2_1_33_1","volume-title":"Securing smart grids through an incentive mechanism for blockchain-based data sharing. hrefhttps:\/\/arxiv.org\/pdf\/2202.04345.pdfarXiv:2202.04345","author":"Reijsbergen D.","year":"2022","unstructured":"D. Reijsbergen , A. Maw , T. T. A. Dinh , W.-T. Li , and C. Yuen . Securing smart grids through an incentive mechanism for blockchain-based data sharing. hrefhttps:\/\/arxiv.org\/pdf\/2202.04345.pdfarXiv:2202.04345 , 2022 . D. Reijsbergen, A. Maw, T. T. A. Dinh, W.-T. Li, and C. Yuen. Securing smart grids through an incentive mechanism for blockchain-based data sharing. hrefhttps:\/\/arxiv.org\/pdf\/2202.04345.pdfarXiv:2202.04345 , 2022."},{"key":"e_1_3_2_1_34_1","volume-title":"The electric power business in Japan","author":"TEPCO.","year":"2012","unstructured":"TEPCO. The electric power business in Japan , 2012 . [hrefhttps:\/\/www.tepco.co.jp\/en\/corpinfo\/ir\/kojin\/jigyou-e.htmlOnline; accessed 23--7--2020]. TEPCO. The electric power business in Japan, 2012. [hrefhttps:\/\/www.tepco.co.jp\/en\/corpinfo\/ir\/kojin\/jigyou-e.htmlOnline; accessed 23--7--2020]."},{"key":"e_1_3_2_1_35_1","volume-title":"Slalom: Fast, verifiable and private execution of neural networks in trusted hardware. arXiv preprint arXiv:1806.03287","author":"Tramer F.","year":"2018","unstructured":"F. Tramer and D. Boneh . Slalom: Fast, verifiable and private execution of neural networks in trusted hardware. arXiv preprint arXiv:1806.03287 , 2018 . F. Tramer and D. Boneh. Slalom: Fast, verifiable and private execution of neural networks in trusted hardware. arXiv preprint arXiv:1806.03287, 2018."},{"key":"e_1_3_2_1_36_1","volume-title":"Trusted platform module library part 1: Architecture","author":"Trusted Computing Group","year":"2019","unstructured":"Trusted Computing Group . Trusted platform module library part 1: Architecture , 2019 . [hrefhttps:\/\/trustedcomputinggroup.org\/wp-content\/uploads\/TCG_TPM2_r1p59_Part1_Architecture_pub.pdfOnline; accessed 24--9--2020]. Trusted Computing Group. Trusted platform module library part 1: Architecture, 2019. [hrefhttps:\/\/trustedcomputinggroup.org\/wp-content\/uploads\/TCG_TPM2_r1p59_Part1_Architecture_pub.pdfOnline; accessed 24--9--2020]."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2019.2940335"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2892423"},{"key":"e_1_3_2_1_39_1","volume-title":"Forbes, 2020","author":"Winder D.","year":"2020","unstructured":"D. Winder . Cyber attack on U.K. electricity market confirmed: National Grid investigates . Forbes, 2020 . [hrefhttps:\/\/www.forbes.com\/sites\/daveywinder\/ 2020 \/05\/15\/cyber-attack-on-uk-electricity-market-confirmed-national-grid-investigatesOnline; accessed 30--9--2020]. D. Winder. Cyber attack on U.K. electricity market confirmed: National Grid investigates. Forbes, 2020. [hrefhttps:\/\/www.forbes.com\/sites\/daveywinder\/2020\/05\/15\/cyber-attack-on-uk-electricity-market-confirmed-national-grid-investigatesOnline; accessed 30--9--2020]."},{"key":"e_1_3_2_1_40_1","volume-title":"Power generation, operation, and control","author":"Wood A. J.","year":"2013","unstructured":"A. J. Wood , B. F. Wollenberg , and G. B. Shebl\u00e9 . Power generation, operation, and control . John Wiley & Sons , 2013 . A. J. Wood, B. F. Wollenberg, and G. B. Shebl\u00e9. Power generation, operation, and control. John Wiley & Sons, 2013."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2686367"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2856807"}],"event":{"name":"CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Baltimore MD USA","acronym":"CODASPY '22"},"container-title":["Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511504","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508398.3511504","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:39Z","timestamp":1750188639000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511504"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,14]]},"references-count":42,"alternative-id":["10.1145\/3508398.3511504","10.1145\/3508398"],"URL":"https:\/\/doi.org\/10.1145\/3508398.3511504","relation":{},"subject":[],"published":{"date-parts":[[2022,4,14]]},"assertion":[{"value":"2022-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}