{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T04:31:36Z","timestamp":1772166696071,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T00:00:00Z","timestamp":1768521600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T00:00:00Z","timestamp":1770681600000},"content-version":"vor","delay-in-days":25,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/100006234","name":"Sandia National Laboratories","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006234","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Energy Inform"],"DOI":"10.1186\/s42162-026-00617-w","type":"journal-article","created":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T12:57:24Z","timestamp":1768568244000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design principles and experimental analysis of secure data exchange approaches for distributed cyber-physical sensors in electric grid systems"],"prefix":"10.1186","volume":"9","author":[{"given":"Patricia","family":"Cordeiro","sequence":"first","affiliation":[]},{"given":"Shamina","family":"Hossain-McKenzie","sequence":"additional","affiliation":[]},{"given":"Adam","family":"Summers","sequence":"additional","affiliation":[]},{"given":"Adrian","family":"Chavez","sequence":"additional","affiliation":[]},{"given":"Georgios","family":"Fragkos","sequence":"additional","affiliation":[]},{"given":"Khandaker Akramul","family":"Haque","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Massoudi","sequence":"additional","affiliation":[]},{"given":"Alex","family":"Reyna","sequence":"additional","affiliation":[]},{"given":"Taylor","family":"Collins","sequence":"additional","affiliation":[]},{"given":"Katherine","family":"Davis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,16]]},"reference":[{"key":"617_CR1","unstructured":"AWS (2025) What\u2019s the difference between rpc and rest? [[Online; accessed 31-July-2025]]. https:\/\/aws.amazon.com\/compare\/the-difference-between-rpc-and-rest\/"},{"key":"617_CR2","doi-asserted-by":"publisher","DOI":"10.3390\/fi16030098","author":"M Bin Saif","year":"2024","unstructured":"Bin Saif M, Migliorini S, Spoto F (2024) Efficient and secure distributed data storage and retrieval using interplanetary file system and blockchain. Future Internet. https:\/\/doi.org\/10.3390\/fi16030098","journal-title":"Future Internet"},{"key":"617_CR3","unstructured":"Camacho-Lopez TR (2016) Sceptre. https:\/\/www.osti.gov\/biblio\/1376989"},{"key":"617_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/CyberPELS.2019.8925064","volume":"2019","author":"A Chavez","year":"2019","unstructured":"Chavez A, Lai C, Jacobs N, Hossain-McKenzie S, Jones CB, Johnson J, Summers A (2019) Hybrid intrusion detection system design for distributed energy resource systems. IEEE CyberPELS (CyberPELS) 2019:1\u20136. https:\/\/doi.org\/10.1109\/CyberPELS.2019.8925064","journal-title":"IEEE CyberPELS (CyberPELS)"},{"key":"617_CR5","unstructured":"Configure nat and port forwarding (2024) https:\/\/docs.ipfs.tech\/how-to\/nat-configuration\/"},{"key":"617_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/PECI57361.2023.10197678","volume":"2023","author":"P Cordeiro","year":"2023","unstructured":"Cordeiro P, Chavez A, Hossain-McKenzie S, Stenger A, Bayless S, Clark R, Behrendt S, Hawkins J, Davis K (2023) Considerations for secure data exchange to achieve cyber-physical situational awareness in the electric grid. IEEE Power and Energy Conference at Illinois (PECI) 2023:1\u20137. https:\/\/doi.org\/10.1109\/PECI57361.2023.10197678","journal-title":"IEEE Power and Energy Conference at Illinois (PECI)"},{"key":"617_CR7","doi-asserted-by":"crossref","unstructured":"Davis KR, Serpedin E (2024) Graph autoencoder-based detection of unseen false data injection attacks in smart grids. Intelligent Systems and Applications: Proceedings of the 2023 Intelligent Systems Conference (IntelliSys) Volume 1, 822, 234","DOI":"10.1007\/978-3-031-47721-8_16"},{"issue":"5","key":"617_CR8","doi-asserted-by":"publisher","first-page":"801","DOI":"10.1016\/j.joule.2018.04.016","volume":"2","author":"A De Vries","year":"2018","unstructured":"De Vries A (2018) Bitcoin\u2019s growing energy problem. Joule 2(5):801\u2013805","journal-title":"Joule"},{"key":"617_CR9","doi-asserted-by":"crossref","unstructured":"Dinh T-N, Pattengale N, Elliott S (2024) The synchronic web. https : \/ \/ arxiv. org\/ abs \/2301.10733","DOI":"10.2172\/2432158"},{"issue":"1","key":"617_CR10","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1109\/COMST.2022.3218527","volume":"25","author":"S Duan","year":"2023","unstructured":"Duan S, Wang D, Ren J, Lyu F, Zhang Y, Wu H, Shen X (2023) Distributed artificial intelligence empowered by end-edge-cloud computing: a survey. IEEE Commun Surv Tutor 25(1):591\u2013624. https:\/\/doi.org\/10.1109\/COMST.2022.3218527","journal-title":"IEEE Commun Surv Tutor"},{"key":"617_CR11","doi-asserted-by":"publisher","unstructured":"Fernando E, Meyliana S (2019) Blockchain technology implementation in raspberry pi for private network. International Conference on Sustainable Information Engineering and Technology (SIET) 2019:154\u2013158. https:\/\/doi.org\/10.1109\/SIET48054.2019.8986053","DOI":"10.1109\/SIET48054.2019.8986053"},{"key":"617_CR12","unstructured":"Five reasons why enterprise blockchain deployments failed [[Online; accessed 07-July-2025]]. (n.d.). https:\/\/dltledgers.com\/blog\/why-enterprise-blockchain-deployments-failed\/"},{"key":"617_CR13","doi-asserted-by":"crossref","unstructured":"Gervais A, Karame GO, W\u00fcst K, Glykantzis V, Ritzdorf H, Capkun S (2016) On the security and performance of proof of work blockchains. Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, 3\u201316","DOI":"10.1145\/2976749.2978341"},{"key":"617_CR14","unstructured":"Gleason M (2025) New sandia labs director: Nation needs to embrace ai. Albuquerque Journal, D1"},{"key":"617_CR15","unstructured":"Greenspan G (2018) Scaling blockchains with off-chain data [[Accessed: Feb. 7, 2024]]"},{"key":"617_CR16","unstructured":"Group TC (2024) Trusted Platform Module (TPM) Summary [[Online; accessed 14-Dec-2023]]"},{"key":"617_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ISGT59692.2024.10454149","volume":"2024","author":"KA Haque","year":"2024","unstructured":"Haque KA, Davis K, Blakely L, Hossain-McKenzie S, Fragkos G, Goes C (2024) Multimodal learning in cyber-physical system: A deep dive with wscc 9-bus system. IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT) 2024:1\u20135. https:\/\/doi.org\/10.1109\/ISGT59692.2024.10454149","journal-title":"IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)"},{"key":"617_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/RWS52686.2021.9611801","volume":"2021","author":"S Hossain-McKenzie","year":"2021","unstructured":"Hossain-McKenzie S, Calzada D, Jacobs N, Goes C, Summers A, Davis K, Li H, Mao Z, Overbye T, Shetye K (2021) Adaptive, cyber-physical special protection schemes to defend the electric grid against predictable and unpredictable disturbances. Resilience Week (RWS) 2021:1\u20139. https:\/\/doi.org\/10.1109\/RWS52686.2021.9611801","journal-title":"Resilience Week (RWS)"},{"key":"617_CR19","unstructured":"icoadmin (2024) What is IPFS The hard drive for Blockchain. [[Accessed: Feb 7, 2024]]"},{"key":"617_CR20","unstructured":"Intel (2024) What Is a Trusted Platform Module (TPM) Intel [[Online; accessed 14-Dec-2023]]"},{"key":"617_CR21","unstructured":"Ipfs documentation [[Online: Accessed on May 19, 2024]]. (2024). https:\/\/www.ipfs.tech\/"},{"key":"617_CR22","doi-asserted-by":"crossref","unstructured":"Ismailisufi A, Popovi\u0107 T, Gligori\u0107 N, Radonjic S, \u0160andi S (2020) A private blockchain implementation using multichain open source platform. 2020 24th international conference on information technology (IT), 1\u20134","DOI":"10.1109\/IT48810.2020.9070689"},{"key":"617_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TPEC48276.2020.9042494","volume":"2020","author":"N Jacobs","year":"2020","unstructured":"Jacobs N, Hossain-McKenzie S, Summers A, Jones CB, Wright B, Chavez A (2020) Cyber-physical observability for the electric grid. IEEE Texas Power and Energy Conference (TPEC) 2020:1\u20136. https:\/\/doi.org\/10.1109\/TPEC48276.2020.9042494","journal-title":"IEEE Texas Power and Energy Conference (TPEC)"},{"key":"617_CR24","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/s00450-017-0360-9","volume":"33","author":"E Mengelkamp","year":"2018","unstructured":"Mengelkamp E, Notheisen B, Beer C, Dauer D, Weinhardt C (2018) A blockchain-based smart grid: towards sustainable local energy markets. Comput Sci Res Dev 33:207\u2013214","journal-title":"Comput Sci Res Dev"},{"key":"617_CR25","unstructured":"Microsoft (2025) What is zero trust? [[Online; accessed 31-July-2025]]. https:\/\/learn.microsoft.com\/en-us\/security\/zero-trust\/zero-trust-overview"},{"issue":"1","key":"617_CR26","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/JIOT.2020.2993601","volume":"8","author":"MB Mollah","year":"2020","unstructured":"Mollah MB, Zhao J, Niyato D, Lam K-Y, Zhang X, Ghias AM, Koh LH, Yang L (2020) Blockchain for future smart grid: a comprehensive survey. IEEE Internet Things J 8(1):18\u201343","journal-title":"IEEE Internet Things J"},{"key":"617_CR27","doi-asserted-by":"publisher","unstructured":"Psaras Y, Dias D (2020) The interplanetary file system and the filecoin network. 2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S), 80\u201380. https:\/\/doi.org\/10.1109\/DSN-S50200.2020.00043","DOI":"10.1109\/DSN-S50200.2020.00043"},{"issue":"8","key":"617_CR28","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1109\/MCOM.003.2400277","volume":"63","author":"S Reddi","year":"2025","unstructured":"Reddi S, Rao PM, Saraswathi P, Bera B, Das AK, Sikdar B (2025) Homomorphic encryption for privacy-preserving data sharing with iota and ipfs in iot-based medical cyber-physical systems. IEEE Commun Mag 63(8):123\u2013130","journal-title":"IEEE Commun Mag"},{"key":"617_CR29","doi-asserted-by":"crossref","unstructured":"Reyna A, Collins T, Hossain-McKenzie S, Blakely L, Goes C, Anderson R, Hubbell C (n.d.). Toward the design of grid cyber-physical integrated security operations center visualizations. 2024 IEEE Kansas Power and Energy Conference (KPEC)","DOI":"10.2172\/2563847"},{"key":"617_CR30","unstructured":"Stream Confidentiality [[Accessed: Feb. 7, 2024]]. (2024)"},{"key":"617_CR31","unstructured":"team OASP (2023) Owasp api security top 10 [[Online; accessed 31-July-2025]]. https:\/\/owasp.org\/API-Security\/editions\/2023\/en\/0x00-header\/"},{"key":"617_CR32","unstructured":"Traditional vs (2024) Cloud-Native Cybersecurity [[Online; accessed 29-May-2024]]"},{"key":"617_CR33","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1016\/j.erss.2018.06.009","volume":"44","author":"J Truby","year":"2018","unstructured":"Truby J (2018) Decarbonizing bitcoin: law and policy choices for reducing the energy consumption of blockchain technologies and digital currencies. Energy Res Soc Sci 44:399\u2013410","journal-title":"Energy Res Soc Sci"},{"key":"617_CR34","doi-asserted-by":"crossref","unstructured":"Upreti A, Cardell J, Thiebaut D (2019) Data privacy in the smart grid: A decentralized approach","DOI":"10.24251\/HICSS.2019.424"},{"key":"617_CR35","doi-asserted-by":"publisher","first-page":"13570","DOI":"10.1109\/ACCESS.2022.3145029","volume":"10","author":"A Villal\u00f3n-Huerta","year":"2022","unstructured":"Villal\u00f3n-Huerta A, Gisbert HM, Ripoll-Ripoll I (2022) Soc critical path: a defensive kill chain model. IEEE Access 10:13570\u201313581","journal-title":"IEEE Access"},{"issue":"3","key":"617_CR36","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/j.emj.2020.10.001","volume":"39","author":"C Walsh","year":"2021","unstructured":"Walsh C, O\u2019Reilly P, Gleasure R, McAvoy J, O\u2019Leary K (2021) Understanding manager resistance to blockchain systems [technologies 4.0: understanding the evolution of ICT and its role for business development]. Eur Manag J 39(3):353\u2013365. https:\/\/doi.org\/10.1016\/j.emj.2020.10.001","journal-title":"Eur Manag J"},{"key":"617_CR37","unstructured":"What Is Network Segmentation? (2024) [[Online; accessed 29-May-2024]]"},{"key":"617_CR38","unstructured":"Xilinx (2024) The Developer\u2019s Guide to Blockchain Developmment [[Online; accessed 09-May-2024]]"},{"key":"617_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2024.102302","volume":"151","author":"V Yepmo","year":"2024","unstructured":"Yepmo V, Smits G, Lesot M-J, Pivert O (2024) Leveraging an isolation forest to anomaly detection and data clustering. Data Knowl Eng 151:102302","journal-title":"Data Knowl Eng"},{"issue":"5","key":"617_CR40","doi-asserted-by":"publisher","first-page":"1058","DOI":"10.1109\/JPROC.2015.2503119","volume":"104","author":"X Yu","year":"2016","unstructured":"Yu X, Xue Y (2016) Smart grids: a cyber-physical systems perspective. Proc IEEE 104(5):1058\u20131070. https:\/\/doi.org\/10.1109\/JPROC.2015.2503119","journal-title":"Proc IEEE"},{"issue":"3","key":"617_CR41","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1017\/S1466046611000275","volume":"13","author":"Z Zhang","year":"2011","unstructured":"Zhang Z (2011) Environmental review & case study: Nerc\u2019s cybersecurity standards for the electric grid: fulfilling its reliability day job and moonlighting as a cybersecurity model. Environ Pract 13(3):250\u2013264. https:\/\/doi.org\/10.1017\/S1466046611000275","journal-title":"Environ Pract"}],"container-title":["Energy Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42162-026-00617-w","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42162-026-00617-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42162-026-00617-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T12:22:15Z","timestamp":1770726135000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s42162-026-00617-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,16]]},"references-count":41,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["617"],"URL":"https:\/\/doi.org\/10.1186\/s42162-026-00617-w","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-7485089\/v1","asserted-by":"object"}]},"ISSN":["2520-8942"],"issn-type":[{"value":"2520-8942","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,16]]},"assertion":[{"value":"29 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"17"}}