{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T20:29:17Z","timestamp":1769977757152,"version":"3.49.0"},"reference-count":73,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,6,21]],"date-time":"2022-06-21T00:00:00Z","timestamp":1655769600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,6,21]],"date-time":"2022-06-21T00:00:00Z","timestamp":1655769600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/S031863\/1"],"award-info":[{"award-number":["EP\/S031863\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/S031863\/1"],"award-info":[{"award-number":["EP\/S031863\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Energy Inform"],"published-print":{"date-parts":[[2022,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Smart local energy system (SLES) can support tailored regional solutions through the orchestration of cyber physical architectures, coordinating distributed technologies, with operational and forecasting models across all energy actors. Unprecedented access to new information, data streams and remotely accessible control can substantially benefit the multi-objective optimisation of multiple performance metrics. Given the expansion of this internet of things (IoT) and cyber-physical system (CPS), it is important to not only design effective detection and management of potential cybersecurity issues, but also to address the challenges in having affective and adaptive governance\u2014built on standards to ensure the security of the IoT to minimise risks and harms to all users. This study conducts an extensive and critical investigation into the existing standards and identifies areas to focus on as to support the expansive adoption of cyber physical networks. Although existing standards and protocols are highly fragmented, our findings suggest that many of them can meet the requirements of the applications and infrastructures of SLES. Additionally, many standards have been introduced to protect information security and personal privacy due to their increasing importance. The research also suggests that the industry needs to produce more affordable and cyber-secured devices and services. For the government and regulators, relevant guidelines on the minimum function and security requirements for applications should be provided. Additionally, compliance testing and certifications should be in place and carried out by an independent third party to ensure the components of SLES ecosystem with a satisfied security level by design.<\/jats:p>","DOI":"10.1186\/s42162-022-00195-7","type":"journal-article","created":{"date-parts":[[2022,6,21]],"date-time":"2022-06-21T09:04:09Z","timestamp":1655802249000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Cybersecurity in smart local energy systems: requirements, challenges, and standards"],"prefix":"10.1186","volume":"5","author":[{"given":"Siyuan","family":"Dong","sequence":"first","affiliation":[]},{"given":"Jun","family":"Cao","sequence":"additional","affiliation":[]},{"given":"David","family":"Flynn","sequence":"additional","affiliation":[]},{"given":"Zhong","family":"Fan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,21]]},"reference":[{"key":"195_CR1","doi-asserted-by":"publisher","first-page":"27518","DOI":"10.1109\/ACCESS.2018.2835527","volume":"6","author":"S Ahmed","year":"2018","unstructured":"Ahmed S, Lee Y, Hyun SH, Koo I (2018) Feature selection-based detection of covert cyber deception assaults in smart grid communications networks using machine learning. IEEE Access 6:27518\u201327529. https:\/\/doi.org\/10.1109\/ACCESS.2018.2835527","journal-title":"IEEE Access"},{"key":"195_CR2","doi-asserted-by":"publisher","unstructured":"Akhtar T, Gupta BB, Yamaguchi S (2018) Malware propagation effects on SCADA system and smart power grid. 2018 IEEE Int Conf Consum Electron ICCE 2018 2018;2018-Janua:1\u20136. https:\/\/doi.org\/10.1109\/ICCE.2018.8326281","DOI":"10.1109\/ICCE.2018.8326281"},{"key":"195_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2004.11.004","author":"K Alanne","year":"2006","unstructured":"Alanne K, Saari A (2006) Distributed energy generation and sustainable development. Renew Sustain Energy Rev. https:\/\/doi.org\/10.1016\/j.rser.2004.11.004","journal-title":"Renew Sustain Energy Rev"},{"key":"195_CR4","doi-asserted-by":"publisher","first-page":"6269","DOI":"10.3390\/en13236269","volume":"13","author":"I Alotaibi","year":"2020","unstructured":"Alotaibi I, Abido MA, Khalid M, Savkin AV (2020) A comprehensive review of recent advances in smart grids: a sustainable future with renewable energy resources. Energies 13:6269. https:\/\/doi.org\/10.3390\/en13236269","journal-title":"Energies"},{"key":"195_CR5","unstructured":"AMI-SECTF (2008) AMI system security requirements. OpenSG;1:111"},{"key":"195_CR6","doi-asserted-by":"publisher","first-page":"37752","DOI":"10.1109\/ACCESS.2021.3062981","volume":"9","author":"M Andoni","year":"2021","unstructured":"Andoni M, Robu V, Couraud B, Fr\u00fch WG, Norbu S, Flynn D (2021) Analysis of strategic renewable energy, grid and storage capacity investments via Stackelberg-cournot modelling. IEEE Access 9:37752\u201337771. https:\/\/doi.org\/10.1109\/ACCESS.2021.3062981","journal-title":"IEEE Access"},{"key":"195_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/J.EGYAI.2021.100071","volume":"4","author":"I Antonopoulos","year":"2021","unstructured":"Antonopoulos I, Robu V, Couraud B, Flynn D (2021) Data-driven modelling of energy demand response behaviour based on a large-scale residential trial. Energy AI 4:100071. https:\/\/doi.org\/10.1016\/J.EGYAI.2021.100071","journal-title":"Energy AI"},{"key":"195_CR8","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1109\/JIOT.2015.2412552","volume":"2","author":"H Bao","year":"2015","unstructured":"Bao H, Lu R (2015) A new differentially private data aggregation with fault tolerance for smart grid communications. IEEE Internet Things J 2:248\u2013258. https:\/\/doi.org\/10.1109\/JIOT.2015.2412552","journal-title":"IEEE Internet Things J"},{"key":"195_CR9","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1016\/B978-0-08-096912-1.00027-7","volume-title":"Transmission and distribution electrical engineering","author":"CR Bayliss","year":"2012","unstructured":"Bayliss CR, Hardy BJ (2012) Smart grids. Transmission and distribution electrical engineering. Elsevier, Amsterdam, pp 1059\u20131074. https:\/\/doi.org\/10.1016\/B978-0-08-096912-1.00027-7"},{"key":"195_CR10","doi-asserted-by":"publisher","unstructured":"Berthier R, Sanders WH, Khurana H (2010) Intrusion detection for advanced metering infrastructures: requirements and architectural directions. In: 2010 First IEEE international conference on smart grid communications, pp 350\u2013355. https:\/\/doi.org\/10.1109\/SMARTGRID.2010.5622068","DOI":"10.1109\/SMARTGRID.2010.5622068"},{"key":"195_CR11","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1016\/j.technovation.2014.02.001","volume":"34","author":"S Boyson","year":"2014","unstructured":"Boyson S (2014) Cyber supply chain risk management: revolutionizing the strategic control of critical IT systems. Technovation 34:342\u2013353. https:\/\/doi.org\/10.1016\/j.technovation.2014.02.001","journal-title":"Technovation"},{"key":"195_CR12","unstructured":"British Standards Institute. Information Technology\u2014Security Techniques\u2014Information Security Management Guidelines Based on ISO\/IEC 27002 for Process Control Systems Specific to the Energy Utility Industry"},{"key":"195_CR13","doi-asserted-by":"publisher","unstructured":"Brooks S, Garcia M, Lefkovitz N, Lightman S, Nadeau E (20117) An introduction to privacy engineering and risk management in federal systems. Gaithersburg, MD. https:\/\/doi.org\/10.6028\/NIST.IR.8062","DOI":"10.6028\/NIST.IR.8062"},{"key":"195_CR14","unstructured":"BSI (2013) PAS 555:2013 Cyber security risk\u2014governance and management"},{"key":"195_CR15","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.rser.2017.04.014","volume":"77","author":"S Burger","year":"2017","unstructured":"Burger S, Chaves-\u00c1vila JP, Batlle C, P\u00e9rez-Arriaga IJ (2017) A review of the value of aggregators in electricity systems. Renew Sustain Energy Rev 77:395\u2013405. https:\/\/doi.org\/10.1016\/j.rser.2017.04.014","journal-title":"Renew Sustain Energy Rev"},{"key":"195_CR16","doi-asserted-by":"publisher","unstructured":"Cerotti D, Codetta-Raiteri D, Egidi L, Franceschinis G, Portinale L, Dondossola G, et al (2019) Analysis and detection of cyber attack processes targeting smart grids. Proc 2019 IEEE PES Innov Smart Grid Technol Eur ISGT-Europe 201. https:\/\/doi.org\/10.1109\/ISGTEUROPE.2019.8905716","DOI":"10.1109\/ISGTEUROPE.2019.8905716"},{"key":"195_CR17","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3119685","author":"SA Chaudhry","year":"2021","unstructured":"Chaudhry SA, Nebhen J, Yahya K, Al-Turjman F (2021) A privacy enhanced authentication scheme for securing smart grid infrastructure. IEEE Trans Ind Inf. https:\/\/doi.org\/10.1109\/TII.2021.3119685","journal-title":"IEEE Trans Ind Inf"},{"key":"195_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/PES.2008.4596535","volume":"2008","author":"FM Cleveland","year":"2008","unstructured":"Cleveland FM (2008) Cyber security issues for advanced metering infrastructure (AMI). IEEE Power Energy Soc. 2008 Gen. Meet. Convers. Deliv. Electr. Energy 21st Century, PES. IEEE 2008:1\u20135. https:\/\/doi.org\/10.1109\/PES.2008.4596535","journal-title":"IEEE"},{"key":"195_CR19","unstructured":"Committee of the IEEE Computer Society M (2009) IEEE Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices. IEEE Std 13631-2008 2009:1\u201381"},{"key":"195_CR20","unstructured":"Committee of the IEEE Engineering in Medicine S, Society B (2021) IEEE Std 11073\u201340101TM-2020, Health informatics\u2014Device interoperability\u2014Part 40101: Foundational\u2014Cybersecurity\u2014Processes for vulnerability assessment"},{"key":"195_CR21","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1109\/TSTE.2021.3121444","volume":"13","author":"B Couraud","year":"2022","unstructured":"Couraud B, Robu V, Flynn D, Andoni M, Norbu S, Quinard H (2022) Real-time control of distributed batteries with blockchain-enabled market export commitments. IEEE Trans Sustain Energy 13:579\u2013591. https:\/\/doi.org\/10.1109\/TSTE.2021.3121444","journal-title":"IEEE Trans Sustain Energy"},{"key":"195_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/J.JNCA.2020.102808","volume":"170","author":"L Cui","year":"2020","unstructured":"Cui L, Qu Y, Gao L, Xie G, Yu S (2020) Detecting false data attacks using machine learning techniques in smart grid: a survey. J Netw Comput Appl 170:102808. https:\/\/doi.org\/10.1016\/J.JNCA.2020.102808","journal-title":"J Netw Comput Appl"},{"key":"195_CR23","unstructured":"Department of Business Energy and Industry Strategy, Office of Gas and Electricity Markets. Upgrading Our Energy System. 2017."},{"key":"195_CR24","unstructured":"Department of Homeland Security (2009) Cyber Security Procurement Language for Control Systems."},{"key":"195_CR25","doi-asserted-by":"publisher","unstructured":"Ding Y, Decker C, Vassileva I, Wallin F, Beigl M (2011) A smart energy system: distributed resource management, control and optimization. IEEE PES Innov. Smart Grid Technol. Conf. Eur. https:\/\/doi.org\/10.1109\/ISGTEurope.2011.6162720.","DOI":"10.1109\/ISGTEurope.2011.6162720"},{"key":"195_CR26","unstructured":"Electronics Projects Focus (2020) Smart Grid Technology Working Operation and Applications 2020. https:\/\/www.elprocus.com\/overview-smart-grid-technology-operation-application-existing-power-system\/. Accessed 30 Jun 2021"},{"key":"195_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04765-8","volume-title":"Renewable energy in the UK: past, present and future","author":"D Elliott","year":"2019","unstructured":"Elliott D (2019) Renewable energy in the UK: past, present and future. Springer International Publishing, Cham. https:\/\/doi.org\/10.1007\/978-3-030-04765-8"},{"key":"195_CR28","unstructured":"Energy digitalisation taskforce (2022) Delivering a digitalised energy system. London"},{"key":"195_CR29","doi-asserted-by":"publisher","first-page":"1644","DOI":"10.1109\/JSYST.2014.2341597","volume":"11","author":"M Esmalifalak","year":"2017","unstructured":"Esmalifalak M, Liu L, Nguyen N, Zheng R, Han Z (2017) Detecting stealthy false data injection using machine learning in smart grid. IEEE Syst J 11:1644\u20131652. https:\/\/doi.org\/10.1109\/JSYST.2014.2341597","journal-title":"IEEE Syst J"},{"key":"195_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2021.120612","volume":"166","author":"R Ford","year":"2021","unstructured":"Ford R, Maidment C, Vigurs C, Fell MJ, Morris M (2021) Smart local energy systems (SLES): a framework for exploring transition, context, and impacts. Technol Forecast Soc Change 166:120612. https:\/\/doi.org\/10.1016\/j.techfore.2021.120612","journal-title":"Technol Forecast Soc Change"},{"key":"195_CR31","doi-asserted-by":"publisher","unstructured":"Grochocki D, Huh JH, Berthier R, Bobba R, Sanders WH, Cardenas AA, et al (2012) AMI threats, intrusion detection requirements and deployment recommendations. 2012 IEEE 3rd Int Conf Smart Grid Commun SmartGridComm 2012:395\u2013400. https:\/\/doi.org\/10.1109\/SMARTGRIDCOMM.2012.6486016","DOI":"10.1109\/SMARTGRIDCOMM.2012.6486016"},{"key":"195_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/J.COMNET.2019.107094","volume":"169","author":"MZ Gunduz","year":"2020","unstructured":"Gunduz MZ, Das R (2020) Cyber-security on smart grid: threats and potential solutions. Comput Networks 169:107094. https:\/\/doi.org\/10.1016\/J.COMNET.2019.107094","journal-title":"Comput Networks"},{"key":"195_CR33","doi-asserted-by":"publisher","unstructured":"Hong J, Liu CC, Govindarasu M (2014) Detection of cyber intrusions using network-based multicast messages for substation automation. 2014 IEEE PES Innov Smart Grid Technol Conf ISGT 2014. https:\/\/doi.org\/10.1109\/ISGT.2014.6816375","DOI":"10.1109\/ISGT.2014.6816375"},{"key":"195_CR34","unstructured":"HP (2015) HP study finds alarming vulnerabilities with Internet of Things (IoT) home security systems. Strateg Focus Software, Corp News Financ Prod Serv 2015. https:\/\/www.hp.com\/us-en\/hp-news\/press-release.html?id=1909050#.YMd94TZKhgE. Accessed June 14, 2021"},{"key":"195_CR35","doi-asserted-by":"publisher","first-page":"177447","DOI":"10.1109\/ACCESS.2020.3026923","volume":"8","author":"A Huseinovi\u0107","year":"2020","unstructured":"Huseinovi\u0107 A, Mrdovi\u0107 S, Bicakci K, Uludag S (2020) A survey of denial-of-service attacks and solutions in the smart grid. IEEE Access 8:177447\u2013177470. https:\/\/doi.org\/10.1109\/ACCESS.2020.3026923","journal-title":"IEEE Access"},{"key":"195_CR36","unstructured":"IEEE (2013) IEEE Std 1686\u20132013 Standard for Intelligent Electronic Devices Cyber Security Capabilities. IEEE 2013"},{"key":"195_CR37","unstructured":"IEEE (2014) C37.240-2014\u2014IEEE Standard cybersecurity requirements for substation automation, protection, and control systems | IEEE Standard | IEEE Xplore 2014. https:\/\/ieeexplore.ieee.org\/document\/7024885. Accessed June 15, 2021"},{"key":"195_CR38","unstructured":"IEEE (2020a) 2144.1-2020\u2014IEEE Standard for Framework of Blockchain-based Internet of Things (IoT ) Data management. https:\/\/ieeexplore.ieee.org\/document\/9329260 . Accessed June 15, 2021"},{"key":"195_CR39","unstructured":"IEEE (2020b) P1912\u2014Standard for privacy and security framework for consumer wireless devices"},{"key":"195_CR40","unstructured":"International Electrotechnical Commission (2018) IEC 62443-4-1:2018 Security for industrial automation and control systems 2018. https:\/\/webstore.iec.ch\/publication\/33615. Accessed June 15, 2021"},{"key":"195_CR41","doi-asserted-by":"publisher","first-page":"6522","DOI":"10.1109\/TII.2019.2931436","volume":"15","author":"SN Islam","year":"2019","unstructured":"Islam SN, Baig Z, Zeadally S (2019) Physical layer security for the smart grid: vulnerabilities, threats, and countermeasures. IEEE Trans Ind Inf 15:6522\u20136530. https:\/\/doi.org\/10.1109\/TII.2019.2931436","journal-title":"IEEE Trans Ind Inf"},{"key":"195_CR42","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/s42979-020-00201-3","volume":"1","author":"A Jurcut","year":"2020","unstructured":"Jurcut A, Niculcea T, Ranaweera P, Le-Khac N-A (2020) Security considerations for internet of things: a survey. SN Comput Sci 1:193. https:\/\/doi.org\/10.1007\/s42979-020-00201-3","journal-title":"SN Comput Sci"},{"key":"195_CR43","doi-asserted-by":"publisher","unstructured":"Karampour A, Ashouri-Talouki M, Ladani BT (2019) An efficient privacy-preserving data aggregation scheme in smart grid. ICEE 2019\u201427th Iran Conf Electr Eng. 1967\u201371. https:\/\/doi.org\/10.1109\/IRANIANCEE.2019.8786482","DOI":"10.1109\/IRANIANCEE.2019.8786482"},{"key":"195_CR44","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/TII.2018.2839059","volume":"15","author":"C Keerthisinghe","year":"2019","unstructured":"Keerthisinghe C, Chapman AC, Verbi\u010d G (2019) Energy management of PV-storage systems: policy approximations using machine learning. IEEE Trans Ind Inf 15:257\u2013265. https:\/\/doi.org\/10.1109\/TII.2018.2839059","journal-title":"IEEE Trans Ind Inf"},{"key":"195_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/J.RSER.2021.112013","volume":"158","author":"D Kirli","year":"2022","unstructured":"Kirli D, Couraud B, Robu V, Salgado-Bravo M, Norbu S, Andoni M et al (2022) Smart contracts in energy systems: a systematic review of fundamental approaches and implementations. Renew Sustain Energy Rev 158:112013. https:\/\/doi.org\/10.1016\/J.RSER.2021.112013","journal-title":"Renew Sustain Energy Rev"},{"issue":"11","key":"195_CR46","doi-asserted-by":"publisher","first-page":"1160","DOI":"10.3390\/app7111160","volume":"7","author":"D Koolen","year":"2017","unstructured":"Koolen D, Sadat-Razavi N, Ketter W (2017) Machine learning for identifying demand patterns of home energy management systems with dynamic electricity pricing. Appl Sci 7(11):1160. https:\/\/doi.org\/10.3390\/app7111160","journal-title":"Appl Sci"},{"key":"195_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/CSCN.2019.8931393","volume":"2019","author":"NS Labib","year":"2019","unstructured":"Labib NS, Brust MR, Danoy G, Bouvry P (2019) Trustworthiness in IoT\u2014a standards gap analysis on security, data protection and privacy. IEEE Conf Stand Commun Network, CSCN 2019:1\u20137. https:\/\/doi.org\/10.1109\/CSCN.2019.8931393","journal-title":"IEEE Conf Stand Commun Network, CSCN"},{"key":"195_CR48","doi-asserted-by":"publisher","unstructured":"Li D, Peng W, Deng W, Gai F (2018) A blockchain-based authentication and security mechanism for IoT. Proc. - Int. Conf. Comput. Commun. Networks, ICCCN, vol. 2018, July. https:\/\/doi.org\/10.1109\/ICCCN.2018.8487449","DOI":"10.1109\/ICCCN.2018.8487449"},{"key":"195_CR49","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1109\/TPDS.2015.2388479","volume":"27","author":"J Lin","year":"2016","unstructured":"Lin J, Yu W, Yang X (2016) Towards multistep electricity prices in smart grid electricity markets. IEEE Trans Parallel Distrib Syst 27:286\u2013302. https:\/\/doi.org\/10.1109\/TPDS.2015.2388479","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"195_CR50","doi-asserted-by":"publisher","unstructured":"Liu S, Liu XP, Saddik A El (2013) Denial-of-Service (dos) attacks on load frequency control in smart grids. 2013 IEEE PES Innov Smart Grid Technol Conf ISGT 2013. https:\/\/doi.org\/10.1109\/ISGT.2013.6497846","DOI":"10.1109\/ISGT.2013.6497846"},{"key":"195_CR51","doi-asserted-by":"publisher","first-page":"1066","DOI":"10.1109\/SocialCom.2013.172","volume":"2013","author":"T Lu","year":"2013","unstructured":"Lu T, Guo X, Xu B, Zhao L, Peng Y, Yang H (2013) Next big thing in big data: the security of the ICT supply chain. Proc Soc 2013:1066\u20131073. https:\/\/doi.org\/10.1109\/SocialCom.2013.172","journal-title":"Proc Soc"},{"key":"195_CR52","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/B978-0-12-814891-4.00005-9","volume-title":"Operation of distributed energy resources in smart distribution networks","author":"M Manbachi","year":"2018","unstructured":"Manbachi M (2018) Impact of distributed energy resource penetrations on smart grid adaptive energy conservation and optimization solutions. Operation of distributed energy resources in smart distribution networks. Elsevier, Amsterdam, pp 101\u2013138. https:\/\/doi.org\/10.1016\/B978-0-12-814891-4.00005-9"},{"key":"195_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42162-018-0017-3","volume":"1","author":"E Mengelkamp","year":"2018","unstructured":"Mengelkamp E, Bose S, Kremers E, Eberbach J, Hoffmann B, Weinhardt C (2018) Increasing the efficiency of local energy markets through residential demand response. Energy Inform 1:1\u201318. https:\/\/doi.org\/10.1186\/s42162-018-0017-3","journal-title":"Energy Inform"},{"key":"195_CR54","doi-asserted-by":"publisher","unstructured":"Menniti D, Pinnarelli A, Sorrentino N, Vizza P, Burgio A, Brusco G, et al (2018) A real-life application of an efficient energy management method for a local energy system in presence of energy storage systems. Proceedings of 2018 IEEE International Conference Environment and Electrical Engineering. 2018 IEEE Ind. Commer. Power Syst. Eur. EEEIC\/I CPS Eur. 2018. https:\/\/doi.org\/10.1109\/EEEIC.2018.8494629","DOI":"10.1109\/EEEIC.2018.8494629"},{"key":"195_CR55","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.iot.2018.08.009","volume":"1\u20132","author":"D Mocrii","year":"2018","unstructured":"Mocrii D, Chen Y, Musilek P (2018) IoT-based smart homes: a review of system architecture, software, communications, privacy and security. Internet of Things 1\u20132:81\u201398. https:\/\/doi.org\/10.1016\/j.iot.2018.08.009","journal-title":"Internet of Things"},{"key":"195_CR56","doi-asserted-by":"publisher","DOI":"10.1016\/J.IJEPES.2020.105947","volume":"119","author":"M Mohammadpourfard","year":"2020","unstructured":"Mohammadpourfard M, Weng Y, Pechenizkiy M, Tajdinian M, Mohammadi-Ivatloo B (2020) Ensuring cybersecurity of smart grid against data integrity attacks under concept drift. Int J Electr Power Energy Syst 119:105947. https:\/\/doi.org\/10.1016\/J.IJEPES.2020.105947","journal-title":"Int J Electr Power Energy Syst"},{"key":"195_CR57","doi-asserted-by":"publisher","DOI":"10.1016\/J.EGYAI.2021.100103","volume":"6","author":"M Mokhtar","year":"2021","unstructured":"Mokhtar M, Robu V, Flynn D, Higgins C, Whyte J, Loughran C et al (2021) Prediction of voltage distribution using deep learning and identified key smart meter locations. Energy AI 6:100103. https:\/\/doi.org\/10.1016\/J.EGYAI.2021.100103","journal-title":"Energy AI"},{"key":"195_CR58","unstructured":"National Institute of Standards and Technology (2012) Nist framework and roadmap for smart grid interoperability standards, release 1.0. Smart Grid Cybersecurity Guidel. Interoperability Stand., vol. 0, p. 19\u2013133"},{"key":"195_CR59","doi-asserted-by":"publisher","unstructured":"National Institute of Standards and Technology (2014) Guidelines for smart grid cybersecurity. Gaithersburg, MD. https:\/\/doi.org\/10.6028\/NIST.IR.7628r1","DOI":"10.6028\/NIST.IR.7628r1"},{"key":"195_CR60","doi-asserted-by":"publisher","first-page":"112019","DOI":"10.1109\/ACCESS.2021.3103480","volume":"9","author":"S Norbu","year":"2021","unstructured":"Norbu S, Couraud B, Robu V, Andoni M, Flynn D (2021) Modeling economic sharing of joint assets in community energy projects under LV network constraints. IEEE Access 9:112019\u2013112042. https:\/\/doi.org\/10.1109\/ACCESS.2021.3103480","journal-title":"IEEE Access"},{"key":"195_CR61","unstructured":"North American Electric Reliability Corporation (2021) CIP Standards n.d. https:\/\/www.nerc.com\/pa\/Stand\/Pages\/CIPStandards.aspx . Accessed June 15, 2021"},{"key":"195_CR62","unstructured":"Ofgem (2017) Future supply market arrangements\u2014call for evidence. 1\u20139"},{"key":"195_CR63","doi-asserted-by":"publisher","unstructured":"Pishva D (2017) Internet of Things: security and privacy issues and possible solution. Int. Conf. Adv. Commun. Technol. ICACT, Institute of Electrical and Electronics Engineers Inc.; p. 797\u2013808. https:\/\/doi.org\/10.23919\/ICACT.2017.7890229","DOI":"10.23919\/ICACT.2017.7890229"},{"key":"195_CR64","doi-asserted-by":"publisher","unstructured":"Rajasekaran RG, Manikandaraj S, Kamaleshwar R (2017) Implementation of machine learning algorithm for predicting user behavior and smart energy management. 2017 Int Conf Data Manag Anal Innov ICDMAI 2017. 24\u201330. https:\/\/doi.org\/10.1109\/ICDMAI.2017.8073480","DOI":"10.1109\/ICDMAI.2017.8073480"},{"key":"195_CR65","doi-asserted-by":"publisher","first-page":"6142","DOI":"10.3390\/en7096142","volume":"7","author":"J Rodr\u00edguez-Molina","year":"2014","unstructured":"Rodr\u00edguez-Molina J, Mart\u00ednez-N\u00fa\u00f1ez M, Mart\u00ednez J-F, P\u00e9rez-Aguiar W (2014) Business models in the smart grid: challenges, opportunities and proposals for prosumer profitability. Energies 7:6142\u20136171. https:\/\/doi.org\/10.3390\/en7096142","journal-title":"Energies"},{"key":"195_CR66","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1016\/j.future.2018.01.059","volume":"83","author":"K Sha","year":"2018","unstructured":"Sha K, Wei W, Andrew Yang T, Wang Z, Shi W (2018) On security challenges and open issues in Internet of Things. Futur Gener Comput Syst 83:326\u2013337. https:\/\/doi.org\/10.1016\/j.future.2018.01.059","journal-title":"Futur Gener Comput Syst"},{"key":"195_CR67","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/IEEESTD.1993.119208","volume":"1993","author":"IEEE Standard","year":"1993","unstructured":"Standard IEEE (1993) IEEE 1264\u20132015\u2014IEEE guide for animal deterrents for electric power supply substations. IEEE Stand 1993:54\u201359. https:\/\/doi.org\/10.1109\/IEEESTD.1993.119208","journal-title":"IEEE Stand"},{"key":"195_CR68","doi-asserted-by":"publisher","unstructured":"Sunny MR, Kabir MA, Naheen IT, Ahad MT (2020) Residential energy management: a machine learning perspective. IEEE Green Technol Conf 2020;2020-April:229\u201334. https:\/\/doi.org\/10.1109\/GREENTECH46478.2020.9289737","DOI":"10.1109\/GREENTECH46478.2020.9289737"},{"key":"195_CR69","doi-asserted-by":"publisher","DOI":"10.1016\/J.SCS.2020.102049","volume":"55","author":"M Talaat","year":"2020","unstructured":"Talaat M, Alsayyari AS, Alblawi A, Hatata AY (2020) Hybrid-cloud-based data processing for power system monitoring in smart grids. Sustain Cities Soc 55:102049. https:\/\/doi.org\/10.1016\/J.SCS.2020.102049","journal-title":"Sustain Cities Soc"},{"key":"195_CR70","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1109\/TSG.2011.2161892","volume":"2","author":"L Xie","year":"2011","unstructured":"Xie L, Mo Y, Sinopoli B (2011) Integrity data attacks in power market operations. IEEE Trans Smart Grid 2:659\u2013666. https:\/\/doi.org\/10.1109\/TSG.2011.2161892","journal-title":"IEEE Trans Smart Grid"},{"key":"195_CR71","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1109\/TPDS.2013.92","volume":"25","author":"Q Yang","year":"2014","unstructured":"Yang Q, Yang J, Yu W, An D, Zhang N, Zhao W (2014) On false data-injection attacks against power system state estimation: modeling and countermeasures. IEEE Trans Parallel Distrib Syst 25:717\u2013729. https:\/\/doi.org\/10.1109\/TPDS.2013.92","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"195_CR72","doi-asserted-by":"publisher","first-page":"73423","DOI":"10.1109\/ACCESS.2018.2884504","volume":"6","author":"Z Zhang","year":"2018","unstructured":"Zhang Z, Wang Y, Xie L (2018) A novel data integrity attack detection algorithm based on improved grey relational analysis. IEEE Access 6:73423\u201373433. https:\/\/doi.org\/10.1109\/ACCESS.2018.2884504","journal-title":"IEEE Access"},{"issue":"2","key":"195_CR73","doi-asserted-by":"publisher","first-page":"1594","DOI":"10.1109\/JIOT.2018.2847705","volume":"6","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, Kasahara S, Shen Y, Jiang X, Wan J (2019) Smart contract-based access control for the internet of things. IEEE Internet Things J 6(2):1594\u20131605. https:\/\/doi.org\/10.1109\/JIOT.2018.2847705","journal-title":"IEEE Internet Things J"}],"container-title":["Energy Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42162-022-00195-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42162-022-00195-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42162-022-00195-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,21]],"date-time":"2022-06-21T09:04:44Z","timestamp":1655802284000},"score":1,"resource":{"primary":{"URL":"https:\/\/energyinformatics.springeropen.com\/articles\/10.1186\/s42162-022-00195-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,21]]},"references-count":73,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["195"],"URL":"https:\/\/doi.org\/10.1186\/s42162-022-00195-7","relation":{},"ISSN":["2520-8942"],"issn-type":[{"value":"2520-8942","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,21]]},"assertion":[{"value":"21 February 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 June 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"9"}}