{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T21:12:59Z","timestamp":1777065179030,"version":"3.51.4"},"reference-count":30,"publisher":"Frontiers Media SA","license":[{"start":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T00:00:00Z","timestamp":1745971200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["frontiersin.org"],"crossmark-restriction":true},"short-container-title":["Front. Commun. Netw."],"abstract":"<jats:p>Smart grids have revolutionized electricity management and distribution, but they also generate and transmit vast amounts of consumer data, raising privacy concerns. In this paper, we propose a blockchain-based solution to preserve user\u2019s privacy in smart grids and to mitigates data forgery, profiling, and man-in-the-middle attacks. Moreover, our solution provides security services such as authentication and non-repudiation to prevent unauthorized access to sensitive data and ensure accountability and traceability. We validate our approach through testing and show that it is a simple, scalable, cost-effective solution with minimal computational processing overhead.<\/jats:p>","DOI":"10.3389\/frcmn.2025.1584152","type":"journal-article","created":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T05:38:20Z","timestamp":1745991500000},"update-policy":"https:\/\/doi.org\/10.3389\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["An efficient blockchain-based privacy preservation scheme for smart grids"],"prefix":"10.3389","volume":"6","author":[{"given":"Mohamad","family":"Badra","sequence":"first","affiliation":[]},{"given":"Rouba","family":"Borghol","sequence":"additional","affiliation":[]}],"member":"1965","published-online":{"date-parts":[[2025,4,30]]},"reference":[{"key":"B1","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1109\/tdsc.2016.2616861","article-title":"Security and privacy in decentralized energy trading through multi-signatures blockchain and anonymous messaging streams","volume":"15","author":"Aitzhan","year":"2018","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"B2","doi-asserted-by":"publisher","first-page":"3370","DOI":"10.1109\/jsyst.2020.2998791","article-title":"A survey of blockchain applications in the energy sector","volume":"15","author":"Bao","year":"2021","journal-title":"IEEE Syst."},{"key":"B3","doi-asserted-by":"publisher","first-page":"5744","DOI":"10.1109\/jiot.2020.3030308","article-title":"Designing blockchain-based access control protocol in IoT-enabled smart-grid system","volume":"7","author":"Bera","year":"2021","journal-title":"IEEE Internet Things"},{"key":"B4","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/BLORIN54731.2022.10028590","article-title":"Privacy in blockchain-based smart grids","volume-title":"Proceedings of the workshop on blockchain renewables integration (BLORIN)","author":"Bracciale","year":"2022"},{"key":"B5","first-page":"223","volume-title":"Correctness of an authentication scheme for managing demand response in smart grid.","author":"Chaudhry","year":"2020"},{"key":"B6","doi-asserted-by":"publisher","first-page":"5263","DOI":"10.1007\/s11276-023-03235-6","article-title":"Data anonymization evaluation against re-identification attacks in edge storage","volume":"30","author":"Chen","year":"2023","journal-title":"Wirel. Netw."},{"key":"B7","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.eng.2020.06.018","article-title":"Double-blockchain assisted secure and anonymous data aggregation for fog-enabled smart grid","volume":"8","author":"Chen","year":"2022","journal-title":"Engineering"},{"key":"B8","doi-asserted-by":"publisher","first-page":"2066","DOI":"10.1109\/jsyst.2019.2954080","article-title":"An elliptic curve-based scalable data aggregation scheme for smart grid","volume":"14","author":"Chen","year":"2019","journal-title":"IEEE Syst. J."},{"key":"B9","doi-asserted-by":"publisher","first-page":"100022","DOI":"10.1016\/j.bcra.2021.100022","article-title":"A privacy-preserving statistics marketplace using local differential privacy and blockchain: an application to smart-grid measurements sharing","volume":"2","author":"Fotiou","year":"2021","journal-title":"Blockchain Res. Ap-plications"},{"key":"B10","first-page":"73","article-title":"An efficient data aggregation scheme with local differential privacy in smart grid","volume-title":"Proceedings of 16th international conference on mobility, sensing and networking (MSN)","author":"Gai","year":"2020"},{"key":"B11","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.jnca.2022.103540","article-title":"Review on cyber-physical and cyber-security system in smart grid: standards, protocols, constraints, and recommendations","author":"Hasan","year":"2022","journal-title":"Netw. Comput. Appl."},{"key":"B12","first-page":"263","article-title":"DEAL: differentially private auction for blockchain-based microgrids energy trading","volume":"13","author":"Hassan","year":"2020","journal-title":"EEE Trans. Serv. Comput."},{"key":"B13","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.ijepes.2020.106610","article-title":"Lightweight blockchain Framework for location-aware peer-to-peer energy trading","author":"Khorasany","year":"2022","journal-title":"Int. J. Electr. Power and Energy Syst."},{"key":"B14","doi-asserted-by":"publisher","first-page":"6572","DOI":"10.1109\/tii.2019.2922697","article-title":"ECCAuth: a secure authentication protocol for demand response management in a smart grid system","volume":"15","author":"Kumar","year":"2019","journal-title":"IEEE Trans. Industrial Inf."},{"key":"B15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/4352291","article-title":"A privacy-aware electricity consumption data collection model based on group blind signature","volume":"2022","author":"Li","year":"2022","journal-title":"Secur. Commun. Netw."},{"key":"B16","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.cose.2021.102189","article-title":"A lightweight privacy-preserving and sharing scheme with dual-blockchain for intelligent pricing system of smart grid","author":"Li","year":"2021","journal-title":"Comput. Secur."},{"key":"B17","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/tsg.2019.2920836","article-title":"Enabling efficient and privacy-preserving aggregation communication and function query for fog computing based smart grid","volume":"11","author":"Liu","year":"2020","journal-title":"IEEE Trans. Smart Grid"},{"key":"B18","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/tsg.2012.2225851","article-title":"Smart grid communication: its challenges and opportunities","volume":"4","author":"Ma","year":"2013","journal-title":"IEEE Trans. Smart Grid"},{"key":"B19","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4137","article-title":"An enhanced anonymous identity-based key agreement protocol for smart grid advanced metering infrastructure","volume":"32","author":"Mahmood","year":"2019","journal-title":"Int. J. Commun. Syst."},{"key":"B20","doi-asserted-by":"publisher","first-page":"5610","DOI":"10.1109\/tvt.2020.2982422","article-title":"P2B: privacy preserving identity-based broadcast proxy Re-encryption","volume":"69","author":"Maiti","year":"2020","journal-title":"IEEE Trans Veh. Technol."},{"key":"B21","doi-asserted-by":"publisher","first-page":"2834","DOI":"10.1109\/TSG.2016.2620939","article-title":"A novel identity-based key establishment method for advanced metering infrastructure in smart grid","volume":"9","author":"Mohammadali","year":"2018","journal-title":"IEEE Trans. Smart Grid"},{"key":"B22","doi-asserted-by":"crossref","first-page":"2792","DOI":"10.1109\/ISCAS.2014.6865753","article-title":"Practical homomorphic encryption: a survey","volume-title":"Proceedings of 2014 IEEE international symposium on circuits and systems (ISCAS)","author":"Moore","year":"2014"},{"key":"B23","year":"2012"},{"key":"B24","doi-asserted-by":"publisher","first-page":"1719","DOI":"10.1109\/tdsc.2022.3163138","article-title":"BPPS:Blockchain-Enabled privacy-preserving scheme for demand-response management in smart grid environments","volume":"20","author":"Park","year":"2023","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"B25","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1109\/jiot.2015.2510504","article-title":"Secure data obfuscation scheme to enable privacy-preserving state estimation in smart grid AMI networks","volume":"3","author":"Tonyali","year":"2015","journal-title":"IEEE Internet Things"},{"key":"B26","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1109\/tdsc.2023.3252593","article-title":"A robust and lightweight privacy-preserving data aggregation scheme for smart grid","volume":"21","author":"Wu","year":"2024","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"B27","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.sysarc.2023.102892","article-title":"A survey on privacy preservation techniques for blockchain interoperability","author":"Yin","year":"2023","journal-title":"Syst. Archit."},{"key":"B28","article-title":"Challenges in secure multi-party computation: a systematic review","author":"Yu","year":"2022","journal-title":"Cybersecurity Priv."},{"key":"B29","doi-asserted-by":"publisher","first-page":"4225","DOI":"10.1109\/tdsc.2021.3124546","article-title":"Enabling verifiable privacy-preserving multi-type data aggregation in smart grids","volume":"19","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"B30","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/JSYST.2020.2994363","article-title":"Privacy-preserving multidimensional data aggregation scheme without trusted authority in smart grid","volume":"15","author":"Zuo, X.","year":"2020","journal-title":"IEEE Syst. J."}],"container-title":["Frontiers in Communications and Networks"],"original-title":[],"link":[{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/frcmn.2025.1584152\/full","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T05:38:22Z","timestamp":1745991502000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/frcmn.2025.1584152\/full"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,30]]},"references-count":30,"alternative-id":["10.3389\/frcmn.2025.1584152"],"URL":"https:\/\/doi.org\/10.3389\/frcmn.2025.1584152","relation":{},"ISSN":["2673-530X"],"issn-type":[{"value":"2673-530X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,30]]},"article-number":"1584152"}}