{"id":"https://openalex.org/W4413765241","doi":"https://doi.org/10.32604/cmc.2025.067615","title":"Fortifying Industry 4.0 Solar Power Systems: A Blockchain-Driven Cybersecurity Framework with Immutable LightGBM","display_name":"Fortifying Industry 4.0 Solar Power Systems: A Blockchain-Driven Cybersecurity Framework with Immutable LightGBM","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4413765241","doi":"https://doi.org/10.32604/cmc.2025.067615"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.067615","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067615","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.067615","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080612842","display_name":"Asrar Mahboob","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Asrar Mahboob","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052520056","display_name":"Muhammad Rashad","orcid":"https://orcid.org/0000-0002-7892-5201"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Muhammad Rashad","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108859469","display_name":"Ghulam Abbas","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ghulam Abbas","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064499805","display_name":"Zohaib Mushtaq","orcid":"https://orcid.org/0000-0002-5587-7614"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zohaib Mushtaq","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002543406","display_name":"Tehseen Mazhar","orcid":"https://orcid.org/0000-0002-4649-2376"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tehseen Mazhar","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5009015888","display_name":"Ateeq Ur Rehman","orcid":"https://orcid.org/0000-0001-5721-0867"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ateeq Ur Rehman","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5080612842"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":6.9916,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.96974228,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"85","issue":"2","first_page":"3805","last_page":"3823"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9670000076293945,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.953000009059906,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.9449840784072876},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6649833917617798},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4974255859851837},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.4224916100502014},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.1869623064994812}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.9449840784072876},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6649833917617798},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4974255859851837},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.4224916100502014},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.1869623064994812}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.067615","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067615","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.067615","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067615","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2977226755","https://openalex.org/W3117804742","https://openalex.org/W3133933448","https://openalex.org/W4205864460","https://openalex.org/W4285207834","https://openalex.org/W4297088059","https://openalex.org/W4381785391","https://openalex.org/W4387299784","https://openalex.org/W4389665970","https://openalex.org/W4402915120","https://openalex.org/W4407157884","https://openalex.org/W4408951637"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W3048554917","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047"],"abstract_inverted_index":{"This":[0,143],"paper":[1],"presents":[2],"a":[3,104,166],"novel":[4],"blockchain-embedded":[5],"cybersecurity":[6],"framework":[7,162],"for":[8,36,59,135,173],"industrial":[9],"solar":[10,37,176],"power":[11],"systems,":[12,131],"integrating":[13],"immutable":[14],"machine":[15],"learning":[16],"(ML)":[17],"with":[18,48,68,79,110,185],"distributed":[19],"ledger":[20],"technology.":[21],"Our":[22],"contribution":[23],"focused":[24],"on":[25],"three":[26],"factors,":[27],"Quantum-resistant":[28],"feature":[29,73],"engineering":[30],"using":[31],"the":[32],"UNSW-NB15":[33],"dataset":[34],"adapted":[35],"infrastructure":[38,178],"anomalies.":[39],"An":[40],"enhanced":[41],"Light":[42],"Gradient":[43],"Boosting":[44],"Machine":[45],"(LightGBM)":[46],"classifier":[47],"blockchain-validated":[49],"decision":[50],"thresholds,":[51],"and":[52,71,86,148,155,188],"A":[53],"cryptographic":[54,72],"proof-of-threat":[55],"(PoT)":[56],"consensus":[57],"mechanism":[58],"cyber":[60,195],"attack":[61,125],"verification.":[62],"The":[63,100,160],"proposed":[64,161],"Immutable":[65],"LightGBM":[66],"model":[67],"majority":[69],"voting":[70],"encoding":[74],"achieves":[75],"96.9%":[76],"detection":[77,91,138],"accuracy":[78],"0.97":[80],"weighted":[81],"average":[82,106],"of":[83,192],"precision,":[84],"recall":[85],"F1-score,":[87],"outperforming":[88],"conventional":[89],"intrusion":[90],"systems":[92],"(IDSs)":[93],"by":[94],"12.7%":[95],"in":[96,118,124,139],"false":[97],"positive":[98],"reduction.":[99],"blockchain":[101],"layer":[102],"demonstrates":[103],"2.4-s":[105],"block":[107],"confirmation":[108],"time":[109],"256-bit":[111],"SHA-3":[112],"hashing,":[113],"enabling":[114],"real-time":[115],"threat":[116,169],"logging":[117],"photovoltaic":[119],"networks.":[120],"Experimental":[121],"results":[122],"improve":[123],"traceability":[126],"compared":[127,146],"to":[128,194],"centralized":[129],"security":[130],"establishing":[132],"new":[133],"benchmarks":[134],"trustworthy":[136],"anomaly":[137],"smart":[140],"grid":[141],"infrastructures.":[142],"study":[144],"also":[145,180],"traditional":[147],"hybrid":[149],"ML":[150],"based":[151],"blockchian":[152],"driven":[153],"IDSs":[154],"attained":[156],"better":[157],"classification":[158],"results.":[159],"not":[163],"only":[164],"delivers":[165],"resilient,":[167],"adaptable":[168],"mitigation":[170],"system":[171],"(TMS)":[172],"Industry":[174],"4.0":[175],"powered":[177],"but":[179],"attains":[181],"high":[182],"explainability,":[183],"scalability":[184],"tamper-proof":[186],"logs,":[187],"remarkably":[189],"exceptional":[190],"ability":[191],"endurance":[193],"attacks.":[196]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-05T23:21:25.405358","created_date":"2025-10-10T00:00:00"}
