{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T04:24:42Z","timestamp":1768537482550,"version":"3.49.0"},"reference-count":26,"publisher":"MDPI AG","issue":"16","license":[{"start":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:00:00Z","timestamp":1629158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["SPET\u2013PTDC\/EEI-EEE\/029165\/2017"],"award-info":[{"award-number":["SPET\u2013PTDC\/EEI-EEE\/029165\/2017"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["UIDB\/00760\/2020"],"award-info":[{"award-number":["UIDB\/00760\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electronics"],"abstract":"<jats:p>This paper explores the concept of the local energy markets and, in particular, the need for trust and security in the negotiations necessary for this type of market. A multi-agent system is implemented to simulate the local energy market, and a trust model is proposed to evaluate the proposals sent by the participants, based on forecasting mechanisms that try to predict their expected behavior. A cyber-attack detection model is also implemented using several supervised classification techniques. Two case studies were carried out, one to evaluate the performance of the various classification methods using the IoT-23 cyber-attack dataset; and another one to evaluate the performance of the developed trust mode.<\/jats:p>","DOI":"10.3390\/electronics10161975","type":"journal-article","created":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T03:43:04Z","timestamp":1629171784000},"page":"1975","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Extending a Trust model for Energy Trading with Cyber-Attack Detection"],"prefix":"10.3390","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2356-3706","authenticated-orcid":false,"given":"Rui","family":"Andrade","sequence":"first","affiliation":[{"name":"GECAD\u2014Knowledge Engineering and Decision Support Research Centre, School of Engineering, Polytechnic of Porto (ISEP\/IPP), 4050-535 Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9711-4850","authenticated-orcid":false,"given":"Sinan","family":"Wannous","sequence":"additional","affiliation":[{"name":"GECAD\u2014Knowledge Engineering and Decision Support Research Centre, School of Engineering, Polytechnic of Porto (ISEP\/IPP), 4050-535 Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8248-080X","authenticated-orcid":false,"given":"Tiago","family":"Pinto","sequence":"additional","affiliation":[{"name":"GECAD\u2014Knowledge Engineering and Decision Support Research Centre, School of Engineering, Polytechnic of Porto (ISEP\/IPP), 4050-535 Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2519-9859","authenticated-orcid":false,"given":"Isabel","family":"Pra\u00e7a","sequence":"additional","affiliation":[{"name":"GECAD\u2014Knowledge Engineering and Decision Support Research Centre, School of Engineering, Polytechnic of Porto (ISEP\/IPP), 4050-535 Porto, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2021,8,17]]},"reference":[{"key":"ref_1","unstructured":"Abidin, A., Aly, A., Cleemput, S., and Mustafa, M.A. (2021, August 06). Towards a Local Electricity Trading Market Based on Secure Multiparty Computation. Available online: https:\/\/www.esat.kuleuven.be\/cosic\/publications\/article-2664.pdf."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Bremdal, B.A., Olivella, P., and Rajasekharan, J. (2017, January 18\u201322). EMPOWER: A network market approach for local energy trade. Proceedings of the 2017 IEEE Manchester PowerTech, Manchester, UK.","DOI":"10.1109\/PTC.2017.7981108"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Ampatzis, M., Nguyen, P.H., and Kling, W. (2014, January 12\u201315). Local electricity market design for the coordination of distributed energy resources at district level. Proceedings of the 2014 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe), Istanbul, Turkey.","DOI":"10.1109\/ISGTEurope.2014.7028888"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Teotia, F., and Bhakar, R. (2016, January 19\u201321). Local energy markets: Concept, design and operation. Proceedings of the 2016 National Power Systems Conference (NPSC), Bhubaneswar, India.","DOI":"10.1109\/NPSC.2016.7858975"},{"key":"ref_5","unstructured":"Mendes, G., Nylund, J., Annala, S., Honkapuro, S., Kilkki, O., and Segerstam, J. (2021, August 06). Local Energy Markets: Opportunities, Benefits, and Barriers. Available online: https:\/\/www.cired-repository.org\/handle\/20.500.12455\/1265."},{"key":"ref_6","unstructured":"Rahimi, H., and Bekkali, H.E. (2017). State of the art of Trust and Reputation Systems in E-Commerce Context. arXiv."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Sabater, J., and Sierra, C. (2001, January 4). Regret: A reputation model for gregarious societies. Proceedings of the Fourth Workshop on Deception Fraud and Trust in Agent Societies, Barcelon, Spain.","DOI":"10.1145\/375735.376110"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1111\/j.1530-9134.2006.00103.x","article-title":"Reputation in auctions: Theory, and evidence from eBay","volume":"15","author":"Houser","year":"2006","journal-title":"J. Econ. Manag. Strategy"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Sabater, J., and Sierra, C. (2002). Reputation and Social Network Analysis in Multi-agent Systems. Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems: Part 1, ACM.","DOI":"10.1145\/544852.544854"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10462-011-9277-z","article-title":"Computational trust and reputation models for open multi-agent systems: A review","volume":"40","author":"Pinyol","year":"2013","journal-title":"Artif. Intell. Rev."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"998","DOI":"10.1109\/SURV.2012.010912.00035","article-title":"A Survey on Cyber Security for Smart Grid Communications","volume":"14","author":"Yan","year":"2012","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Ghirardello, K., Maple, C., Ng, D., and Kearney, P. (2018, January 28\u201329). Cyber security of smart homes: Development of a reference architecture for attack surface analysis. Proceedings of the Living in the Internet of Things: Cybersecurity of the IoT, London, UK.","DOI":"10.1049\/cp.2018.0045"},{"key":"ref_13","unstructured":"Hall, F., Maglaras, L., Aivaliotis, T., Xagoraris, L., and Kantzavelou, I. (2020). Smart Homes: Security Challenges and Privacy Concerns. arXiv."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1109\/TSG.2020.3010230","article-title":"Intrusion Detection for Cybersecurity of Smart Meters","volume":"12","author":"Sun","year":"2020","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Niu, X., Li, J., Sun, J., and Tomsovic, K. (2019, January 18\u201321). Dynamic detection of false data injection attack in smart grid using deep learning. Proceedings of the 2019 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA.","DOI":"10.1109\/ISGT.2019.8791598"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Wang, C., Tindemans, S., Pan, K., and Palensky, P. (2020, January 18\u201321). Detection of false data injection attacks using the autoencoder approach. Proceedings of the 2020 International Conference on Probabilistic Methods Applied to Power Systems (PMAPS), Liege, Belgium.","DOI":"10.1109\/PMAPS47429.2020.9183526"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Fatemifar, S., Awais, M., Arashloo, S.R., and Kittler, J. (2019, January 4\u20137). Combining multiple one-class classifiers for anomaly based face spoofing attack detection. Proceedings of the 2019 International Conference on Biometrics (ICB), Crete, Greece.","DOI":"10.1109\/ICB45273.2019.8987326"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Oliveira, N., Pra\u00e7a, I., Maia, E., and Sousa, O. (2021). Intelligent cyber attack detection and classification for network-based intrusion detection systems. Appl. Sci., 11.","DOI":"10.3390\/app11041674"},{"key":"ref_19","unstructured":"Ring, M., Wunderlich, S., Gr\u00fcdl, D., Landes, D., and Hotho, A. (2017, January 29\u201330). Flow-based benchmark data sets for intrusion detection. Proceedings of the 16th European Conference on Cyber Warfare and Security, Dublin, Ireland."},{"key":"ref_20","first-page":"41","article-title":"Creation of flow-based data sets for intrusion detection","volume":"16","author":"Ring","year":"2017","journal-title":"J. Inf. Warf."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"4477","DOI":"10.1007\/s12652-019-01417-9","article-title":"Performance evaluation of unsupervised techniques in cyber-attack anomaly detection","volume":"11","author":"Meira","year":"2020","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., and Ghorbani, A.A. (2009, January 8\u201310). A detailed analysis of the KDD CUP 99 data set. Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, ON, Canada.","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.cose.2011.12.012","article-title":"Toward developing a systematic approach to generate benchmark datasets for intrusion detection","volume":"31","author":"Shiravi","year":"2012","journal-title":"Comput. Secur."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Andrade, R., Pinto, T., and Pra\u00e7a, I. (2020). Trust Model for a Multi-agent Based Simulation of Local Energy Markets. International Conference on Practical Applications of Agents and Multi-Agent Systems, Springer.","DOI":"10.1007\/978-3-030-51999-5_15"},{"key":"ref_25","unstructured":"(2012, May 08). Open Data Sets IEEE PES Intelligent Systems Subcommittee. Available online: https:\/\/site.ieee.org\/pes-iss\/data-sets\/."},{"key":"ref_26","unstructured":"Garcia, S., Parmisano, A., and Erquiaga, M.J. (2021, August 06). IoT-23: A Labeled Dataset with Malicious and Benign IoT Network Traffic (Version 1.0.0). Available online: https:\/\/zenodo.org\/record\/4743746#.YRscFt8RVPY."}],"container-title":["Electronics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2079-9292\/10\/16\/1975\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T06:45:23Z","timestamp":1760165123000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2079-9292\/10\/16\/1975"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,17]]},"references-count":26,"journal-issue":{"issue":"16","published-online":{"date-parts":[[2021,8]]}},"alternative-id":["electronics10161975"],"URL":"https:\/\/doi.org\/10.3390\/electronics10161975","relation":{},"ISSN":["2079-9292"],"issn-type":[{"value":"2079-9292","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,17]]}}}