{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T20:19:03Z","timestamp":1770495543786,"version":"3.49.0"},"reference-count":25,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.067615","type":"journal-article","created":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T07:47:36Z","timestamp":1756280856000},"page":"3805-3823","source":"Crossref","is-referenced-by-count":2,"title":["Fortifying Industry 4.0 Solar Power Systems: A Blockchain-Driven Cybersecurity Framework with Immutable LightGBM"],"prefix":"10.32604","volume":"85","author":[{"given":"Asrar","family":"Mahboob","sequence":"first","affiliation":[]},{"given":"Muhammad","family":"Rashad","sequence":"additional","affiliation":[]},{"given":"Ghulam","family":"Abbas","sequence":"additional","affiliation":[]},{"given":"Zohaib","family":"Mushtaq","sequence":"additional","affiliation":[]},{"given":"Tehseen","family":"Mazhar","sequence":"additional","affiliation":[]},{"given":"Ateeq Ur","family":"Rehman","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","series-title":"2024 IEEE 7th International Conference on Industrial Cyber-Physical Systems (ICPS)","first-page":"1","article-title":"Disruption of commercial solar inverter system by TLS proxy man-in-the-middle attack","author":"Ahn","year":"2024 May 12\u201315"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1582","DOI":"10.1109\/TSG.2021.3136559","article-title":"Data-driven cyber-attack detection for PV farms via time-frequency domain features","volume":"13","author":"Guo","year":"2022","journal-title":"IEEE Trans Smart Grid"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"40402","DOI":"10.1109\/ACCESS.2021.3064689","article-title":"Detection of cyber attacks on voltage regulation in distribution systems using machine learning","volume":"9","author":"Bhusal","year":"2021","journal-title":"IEEE Access"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1282","DOI":"10.1109\/JESTPE.2019.2943449","article-title":"Detection and identification of cyber and physical attacks on distribution power grids with PVs: an online high-dimensional data-driven approach","volume":"10","author":"Li","year":"2022","journal-title":"IEEE J Emerg Sel Top Power Electron"},{"key":"ref5","series-title":"2022 IEEE Green Technologies Conference (GreenTech)","first-page":"57","article-title":"Detection of cyber attacks in grid-tied PV systems using dynamic watermarking","author":"Ibrahim","year":"2022 Mar 30\u2013Apr 1"},{"key":"ref6","series-title":"2022 IEEE Applied Power Electronics Conference and Exposition (APEC); March 20\u201324, 2022","first-page":"1926","article-title":"Data-driven cyber-attack detection for photovoltaic systems: a transfer learning approach","author":"Li","year":"2022"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"2113","DOI":"10.1109\/TCYB.2023.3305240","article-title":"Active fault-tolerant and attack-resilient control for a renewable microgrid against power-loss faults and data integrity attacks","volume":"54","author":"Jadidi","year":"2024","journal-title":"IEEE Trans Cybern"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/TETCI.2020.3042812","article-title":"Resilient and sustainable Tie-line bias control for a power system in uncertain environments","volume":"6","author":"Jayawardene","year":"2022","journal-title":"IEEE Trans Emerg Top Comput Intell"},{"key":"ref9","series-title":"2017 North American Power Symposium (NAPS)","first-page":"1","article-title":"Statistical methods for detection and mitigation of the effect of different types of cyber-attacks and parameter inconsistencies in a real world distribution system","author":"Joshi","year":"2017 Sep 17\u201319"},{"key":"ref10","series-title":"2022 IEEE\/IAS 58th Industrial and Commercial Power Systems Technical Conference (I&CPS); 2022 May 2\u20135","first-page":"1","article-title":"Cyber-attack detection: modeling and roof-PV generation system protection","author":"Qiu","year":"2022"},{"key":"ref11","series-title":"2023 IEEE 3rd International Conference on Smart Technologies for Power, Energy and Control (STPEC)","first-page":"1","author":"Kumar","year":"2023 Dec 10\u201313"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"690","DOI":"10.1109\/TSG.2022.3190680","article-title":"Resilient load frequency control of islanded AC microgrids under concurrent false data injection and denial-of-service attacks","volume":"14","author":"Hu","year":"2023","journal-title":"IEEE Trans Smart Grid"},{"key":"ref13","series-title":"2020 IEEE Texas Power and Energy Conference (TPEC)","first-page":"1","article-title":"Hardware-in-the-loop CPS security architecture for DER monitoring and control applications","author":"Ravikumar","year":"2020 Feb 6\u20137"},{"key":"ref14","series-title":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","first-page":"142","article-title":"Day-ahead electricity market state-space model and its power production, demand and price forecasting algorithm using H-infinity filter","author":"Rana","year":"2020 Feb 16\u201319"},{"key":"ref15","series-title":"2024 IEEE Applied Power Electronics Conference and Exposition (APEC)","first-page":"1280","article-title":"Cyber-secure and safe operation of solar photovoltaic power distribution systems","author":"Kim","year":"2024 Feb 25\u201329"},{"key":"ref16","series-title":"2022 International Joint Conference on Neural Networks (IJCNN)","first-page":"1","article-title":"Deep reinforcement learning for penetration testing of cyber-physical attacks in the smart grid","author":"Li","year":"2022 Jul 18\u201323"},{"key":"ref17","series-title":"IECON 2021\u201347th Annual Conference of the IEEE Industrial Electronics Society","first-page":"1","article-title":"Hybrid fault-tolerant and cyber-resilient control for PV system at microgrid framework","author":"Jadidi","year":"2021 Oct 13\u201316"},{"key":"ref18","first-page":"1476","article-title":"Cyber attack detection and correction mechanisms in a distributed DC microgrid","volume":"37","author":"Madichetty","year":"2022","journal-title":"IEEE Trans Power Electron"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"5372","DOI":"10.1109\/TNET.2024.3462539","article-title":"Symbiotic blockchain consensus: cognitive backscatter communications-enabled wireless blockchain consensus","volume":"32","author":"Luo","year":"2024","journal-title":"IEEE\/ACM Trans Netw"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MWC.001.2400245","article-title":"Convergence of symbiotic communications and blockchain for sustainable and trustworthy 6G wireless networks","volume":"32","author":"Luo","year":"2025","journal-title":"IEEE Wirel Commun"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"1300","DOI":"10.1109\/TIT.2023.3340147","article-title":"Age-dependent differential privacy","volume":"70","author":"Zhang","year":"2024","journal-title":"IEEE Trans Inf Theory"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"2190","DOI":"10.1109\/TII.2023.3280337","article-title":"A multihead attention self-supervised representation model for industrial sensors anomaly detection","volume":"20","author":"Qiao","year":"2024","journal-title":"IEEE Trans Ind Inform"},{"key":"ref23","first-page":"8504512","article-title":"Tradeoff of code estimation error rate and terminal gain in SCER attack","volume":"73","author":"Li","year":"2024","journal-title":"IEEE Trans Instrum Meas"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1186\/s13638-025-02431-6","article-title":"Securing fog computing in healthcare with a zero-trust approach and blockchain","volume":"2025","author":"Kaur","year":"2025","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"103512","DOI":"10.1016\/j.jnca.2022.103512","article-title":"Decentralized authentication and access control protocol for blockchain-based e-health systems","volume":"207","author":"Xiang","year":"2022","journal-title":"J Netw Comput Appl"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-2\/TSP_CMC_67615\/TSP_CMC_67615.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T05:35:47Z","timestamp":1764826547000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n2\/63832"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":25,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.067615","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}