{"id":"https://openalex.org/W4414602100","doi":"https://doi.org/10.1186/s13638-025-02516-2","title":"DBIA-DA: dual-blockchain and ISCP-assisted data aggregation for fog-enabled smart grid","display_name":"DBIA-DA: dual-blockchain and ISCP-assisted data aggregation for fog-enabled smart grid","publication_year":2025,"publication_date":"2025-09-29","ids":{"openalex":"https://openalex.org/W4414602100","doi":"https://doi.org/10.1186/s13638-025-02516-2"},"language":"en","primary_location":{"id":"doi:10.1186/s13638-025-02516-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13638-025-02516-2","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/counter/pdf/10.1186/s13638-025-02516-2","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://jwcn-eurasipjournals.springeropen.com/counter/pdf/10.1186/s13638-025-02516-2","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100414902","display_name":"Lihua Zhang","orcid":"https://orcid.org/0000-0002-5353-6875"},"institutions":[{"id":"https://openalex.org/I13985625","display_name":"East China Jiaotong University","ror":"https://ror.org/05x2f1m38","country_code":"CN","type":"education","lineage":["https://openalex.org/I13985625"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lihua Zhang","raw_affiliation_strings":["School of Information and Software Engineering, East China Jiaotong University, Nanchang, 330013, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, East China Jiaotong University, Nanchang, 330013, China","institution_ids":["https://openalex.org/I13985625"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083131489","display_name":"Yi Yang","orcid":"https://orcid.org/0000-0003-0009-7132"},"institutions":[{"id":"https://openalex.org/I13985625","display_name":"East China Jiaotong University","ror":"https://ror.org/05x2f1m38","country_code":"CN","type":"education","lineage":["https://openalex.org/I13985625"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Yang","raw_affiliation_strings":["School of Information and Software Engineering, East China Jiaotong University, Nanchang, 330013, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, East China Jiaotong University, Nanchang, 330013, China","institution_ids":["https://openalex.org/I13985625"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073465794","display_name":"Jiali Luo","orcid":"https://orcid.org/0000-0001-5872-8940"},"institutions":[{"id":"https://openalex.org/I13985625","display_name":"East China Jiaotong University","ror":"https://ror.org/05x2f1m38","country_code":"CN","type":"education","lineage":["https://openalex.org/I13985625"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiali Luo","raw_affiliation_strings":["School of Information and Software Engineering, East China Jiaotong University, Nanchang, 330013, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, East China Jiaotong University, Nanchang, 330013, China","institution_ids":["https://openalex.org/I13985625"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035285684","display_name":"Wenbiao Wang","orcid":"https://orcid.org/0000-0003-4944-764X"},"institutions":[{"id":"https://openalex.org/I13985625","display_name":"East China Jiaotong University","ror":"https://ror.org/05x2f1m38","country_code":"CN","type":"education","lineage":["https://openalex.org/I13985625"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenbiao Wang","raw_affiliation_strings":["School of Information and Software Engineering, East China Jiaotong University, Nanchang, 330013, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, East China Jiaotong University, Nanchang, 330013, China","institution_ids":["https://openalex.org/I13985625"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007757643","display_name":"Jinguang Gu","orcid":"https://orcid.org/0000-0002-8823-8480"},"institutions":[{"id":"https://openalex.org/I43922553","display_name":"Wuhan University of Science and Technology","ror":"https://ror.org/00e4hrk88","country_code":"CN","type":"education","lineage":["https://openalex.org/I43922553"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinguang Gu","raw_affiliation_strings":["College of Computer Science and Technology, Wuhan University of Science and Technology, Wuhan, 430065, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Wuhan University of Science and Technology, Wuhan, 430065, China","institution_ids":["https://openalex.org/I43922553"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100414902"],"corresponding_institution_ids":["https://openalex.org/I13985625"],"apc_list":{"value":1140,"currency":"GBP","value_usd":1398},"apc_paid":{"value":1140,"currency":"GBP","value_usd":1398},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.38120125,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2025","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10603","display_name":"Smart Grid Energy Management","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.8137000203132629},{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.5881999731063843},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5213000178337097},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.5087000131607056},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.47360000014305115},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4478999972343445},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.42800000309944153},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4117000102996826}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9146999716758728},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.8137000203132629},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.5881999731063843},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5213000178337097},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.5087000131607056},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.47360000014305115},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.44830000400543213},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4478999972343445},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.42800000309944153},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41530001163482666},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4117000102996826},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.3840000033378601},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.35409998893737793},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3521000146865845},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.3325999975204468},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.30730000138282776},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.30469998717308044},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3010999858379364},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.29350000619888306},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.28690001368522644},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2754000127315521},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2750999927520752},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.2529999911785126}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13638-025-02516-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13638-025-02516-2","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/counter/pdf/10.1186/s13638-025-02516-2","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:2f1f8b84f743465fafecf6d95efb9f85","is_oa":true,"landing_page_url":"https://doaj.org/article/2f1f8b84f743465fafecf6d95efb9f85","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking, Vol 2025, Iss 1, Pp 1-34 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13638-025-02516-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13638-025-02516-2","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/counter/pdf/10.1186/s13638-025-02516-2","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2063151518","display_name":null,"funder_award_id":"62261023","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2980546052","display_name":null,"funder_award_id":"No.72262014","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5263341512","display_name":null,"funder_award_id":"No. 62261023","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5325634789","display_name":null,"funder_award_id":"72262014","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8877402947","display_name":null,"funder_award_id":"20232BAB2","funder_id":"https://openalex.org/F4320322665","funder_display_name":"Natural Science Foundation of Jiangxi Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322665","display_name":"Natural Science Foundation of Jiangxi Province","ror":null}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4414602100.pdf"},"referenced_works_count":48,"referenced_works":["https://openalex.org/W2786010450","https://openalex.org/W2794925686","https://openalex.org/W2898367412","https://openalex.org/W2904036856","https://openalex.org/W2914573678","https://openalex.org/W2921204284","https://openalex.org/W2964028585","https://openalex.org/W2964033485","https://openalex.org/W2969583644","https://openalex.org/W2972112224","https://openalex.org/W2986949576","https://openalex.org/W2993170066","https://openalex.org/W3034158833","https://openalex.org/W3036075578","https://openalex.org/W3045144404","https://openalex.org/W3048383079","https://openalex.org/W3085802396","https://openalex.org/W3090278254","https://openalex.org/W3105714802","https://openalex.org/W3107062591","https://openalex.org/W3108596449","https://openalex.org/W3120374063","https://openalex.org/W3120615846","https://openalex.org/W3121113880","https://openalex.org/W3165406240","https://openalex.org/W3175936016","https://openalex.org/W3205066909","https://openalex.org/W3210008616","https://openalex.org/W4210362383","https://openalex.org/W4220979404","https://openalex.org/W4226134538","https://openalex.org/W4285259038","https://openalex.org/W4294991509","https://openalex.org/W4301187814","https://openalex.org/W4313025032","https://openalex.org/W4315647104","https://openalex.org/W4319216108","https://openalex.org/W4321435313","https://openalex.org/W4323338399","https://openalex.org/W4361771271","https://openalex.org/W4380685854","https://openalex.org/W4385737807","https://openalex.org/W4386233465","https://openalex.org/W4388739386","https://openalex.org/W4389509728","https://openalex.org/W4401070572","https://openalex.org/W4408228195","https://openalex.org/W4409262001"],"related_works":[],"abstract_inverted_index":{"Traditional":[0],"smart":[1,33],"grids":[2],"face":[3],"challenges":[4],"such":[5],"as":[6],"low":[7],"aggregation":[8,36,63,79,149],"efficiency,":[9],"high":[10,84],"computation":[11],"and":[12,15,20,42,55,60,93,106,121,128,146],"communication":[13],"costs,":[14],"difficulties":[16],"in":[17],"maintaining":[18],"privacy":[19],"security":[21],"during":[22],"data":[23,35,62,69,85],"aggregation.":[24,70],"To":[25],"address":[26],"these":[27],"issues,":[28],"we":[29],"propose":[30],"a":[31,94],"fog-assisted":[32],"grid":[34],"scheme":[37,113,137],"based":[38,49],"on":[39,50,144],"dual":[40,58],"blockchain":[41,59],"improved":[43],"stellar":[44],"consensus":[45,90,97],"protocol":[46],"(ISCP).":[47],"Firstly,":[48],"the":[51,88,103,112,139],"combination":[52],"of":[53],"cloud":[54],"fog":[56],"architectures,":[57],"two-level":[61],"are":[64,74],"designed":[65],"to":[66,76,101],"attain":[67],"fine-grained":[68],"Secondly,":[71],"fuzzy":[72],"algorithms":[73],"used":[75],"achieve":[77],"efficient":[78],"by":[80,142],"grouping":[81],"nodes":[82],"with":[83,152],"similarity.":[86],"Finally,":[87],"ISCP":[89],"is":[91,99,114],"designed,":[92],"new":[95],"committee":[96],"algorithm":[98],"introduced":[100],"enhance":[102],"system\u2019s":[104],"performance":[105],"security.":[107],"Security":[108],"analysis":[109],"demonstrates":[110],"that":[111,135],"existential":[115],"unforgeability-chosen":[116],"message":[117],"attack":[118,127],"(EUF-CMA)":[119],"secure":[120],"can":[122],"resist":[123],"eavesdropping":[124],"attack,":[125],"active":[126],"collusion":[129],"attack.":[130],"Performance":[131],"evaluation":[132],"also":[133],"shows":[134],"our":[136],"decreases":[138],"computational":[140],"overhead":[141],"35%":[143],"average":[145],"has":[147],"better":[148],"accuracy":[150],"compared":[151],"similar":[153],"solutions.":[154]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
