<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462023000300851</article-id>
<article-id pub-id-type="doi">10.13053/cys-27-3-4071</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Un sistema transactivo de energía ciberseguro usando cadenas de bloques de múltiples niveles]]></article-title>
<article-title xml:lang="en"><![CDATA[A Cybersecurity Transaction Energy System Using Multi-Tier Blockchain]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Olivares-Rojas]]></surname>
<given-names><![CDATA[Juan C.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Reyes-Archundia]]></surname>
<given-names><![CDATA[Enrique]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Gutiérrez-Gnecchi]]></surname>
<given-names><![CDATA[José A.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Instituto Tecnológico de Morelia División de Estudios de Posgrado e Investigación ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>09</month>
<year>2023</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>09</month>
<year>2023</year>
</pub-date>
<volume>27</volume>
<numero>3</numero>
<fpage>851</fpage>
<lpage>867</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462023000300851&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462023000300851&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462023000300851&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen: Los incidentes de ciberseguridad son cada vez más frecuentes debido al alto grado de penetración que tienen las tecnologías de la información y las comunicaciones en nuestra vida diaria. Una de las infraestructuras críticas que más se ha beneficiado en los últimos años de la amplia integración de tecnologías ha sido la red inteligente. Los sistemas de medición inteligentes permiten, entre otras cosas, monitorear el consumo de energía y las lecturas de producción que se traducen en transacciones monetarias. La alteración y manipulación de las lecturas de los medidores inteligentes se reflejan en pérdidas económicas para las empresas de servicios públicos y pérdida de confianza en los usuarios finales. Este trabajo presenta una arquitectura de ciberseguridad basada en una cadena de bloques multicapa capaz de adaptarse a la arquitectura de los sistemas de medición inteligente a través de un esquema de computación distribuida borde-niebla-nube. La arquitectura propuesta es altamente escalable a los distintos componentes de los sistemas de medición inteligente y mejora el rendimiento de las cadenas de bloques en aspectos como el almacenamiento y el procesamiento. Esta cadena de bloques utiliza su propio algoritmo de consenso de prueba de eficiencia, que permite beneficiar a los usuarios finales mediante un uso más eficiente de su consumo de energía considerando la calidad de la energía, el pronóstico de la demanda y el apoyo para la detección de robo y fraude energético. El algoritmo de consenso utiliza la misma arquitectura propuesta para determinar las recompensas de los usuarios mediante análisis de datos y técnicas de aprendizaje automático. Todo esto sienta las bases para un sistema de medición más inteligente, más transaccional y ciberseguro. La arquitectura desarrollada fue probada para garantizar la ciberseguridad de las transacciones realizadas en los sistemas de medición inteligente. Los resultados obtenidos sugieren que el uso de una arquitectura de cadenas de bloque permite mejorar la ciberseguridad de los sistemas de medición inteligente y brindar a los usuarios finales una mayor confianza en sus transacciones energéticas, pudiendo recibir mejores incentivos económicos al hacer un uso más eficiente de su consumo energético.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: Cybersecurity incidents are becoming more frequent due to the high degree of penetration that information and communication technologies have in our daily lives. One of the critical infrastructures that has benefited the most in recent years from the broad integration of technologies has been the smart grid. Smart metering systems allow, among other things, the monitoring of energy consumption and production readings that are translated into monetary transactions. The tampering and manipulation of the smart meter readings are reflected in economic losses for the utilities and loss of confidence in the end-users. This work presents a cybersecurity architecture based on a multitier blockchain capable of adapting to smart metering systems' architecture through an edge-fog-cloud distributed computing scheme. The proposed architecture is highly scalable to the various components of smart metering systems and improves the performance of blockchains in aspects such as storage and processing. This blockchain uses its own consensus algorithm proof-of-efficiency, which allows benefiting end-users through more efficient use of their energy consumption considering the power quality, the forecast of the demand, and the support for detecting theft and energy fraud. The consensus algorithm uses the same architecture proposed to determine users' rewards through data analytics and machine learning techniques. All of this lays the foundation for a more intelligent, more transactional, and cybersecure metering system. The architecture developed was tested to guarantee the cybersecurity of the transactions carried out in the smart metering systems. The results obtained suggest that using a blockchain architecture allows improving the cybersecurity of smart metering systems and giving end-users greater confidence in their energy transactions, being able to receive better economic incentives by making more efficient use of their energy consumption.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Cadenas de bloque]]></kwd>
<kwd lng="es"><![CDATA[ciberseguridad]]></kwd>
<kwd lng="es"><![CDATA[sistemas transactivos de energía]]></kwd>
<kwd lng="en"><![CDATA[Blockchain]]></kwd>
<kwd lng="en"><![CDATA[cybersecurity]]></kwd>
<kwd lng="en"><![CDATA[transactive energy systems]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dilep]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A survey on smart grid technologies and applications]]></article-title>
<source><![CDATA[Renewable Energy]]></source>
<year>2020</year>
<volume>146</volume>
<page-range>2589-625</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rokan]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Kotb]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[Towards a real IoT-based smart meter system]]></source>
<year>2020</year>
<volume>1045</volume>
<page-range>139-54</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Amara]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Tamani]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Ghamri-Doudane]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Islem]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Anomaly-based framework for detecting power overloading cyberattacks in smart grid AMI]]></article-title>
<source><![CDATA[Computers and Security]]></source>
<year>2020</year>
<volume>96</volume>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="">
<collab>Secretaría de Energía</collab>
<source><![CDATA[Programa de redes eléctricas inteligentes (PRODEREI)]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Meng]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Wolfgang]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Q]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Han]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[When intrusion detection meets blockchain technology: A review]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2018</year>
<volume>6</volume>
<page-range>10179-88</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hasankhani]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Mehdi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Bisheh-Niasar]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Shafie-Khah]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Asadolahi]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Blockchain technology in the future smart grids: A comprehensive review and frameworks]]></article-title>
<source><![CDATA[International Journal of Electrical Power &amp; Energy Systems]]></source>
<year>2021</year>
<volume>129</volume>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Agung]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Handayani]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Blockchain for smart grid]]></article-title>
<source><![CDATA[Journal of King Saud University - Computer and Information Sciences]]></source>
<year>2020</year>
<volume>34</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>666-75</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Agarkar]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Agrawal]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A review and vision on authentication and privacy preservation schemes in smart grid network]]></article-title>
<source><![CDATA[Security and Privacy]]></source>
<year>2019</year>
<volume>2</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aitzhan]]></surname>
<given-names><![CDATA[N. Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Svetinovic]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous nessaging streams]]></article-title>
<source><![CDATA[IEEE Transactions on Dependable and Secure Computing]]></source>
<year>2018</year>
<volume>15</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>840-52</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mihaylov]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Jurado]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Avellana]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Van-Moffaert]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Magrans]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Nowé]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[NRGcoin: Virtual currency for trading of renewable energy in smart grids]]></source>
<year>2014</year>
<conf-name><![CDATA[ 11th International Conference on the European Energy Market]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="">
<collab>Helios</collab>
<source><![CDATA[Helios Protocol]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Shi]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A lightweight privacy-preserving and sharing scheme with dual-blockchain for intelligent pricing system of smart grid]]></article-title>
<source><![CDATA[Computers and Security]]></source>
<year>2021</year>
<volume>103</volume>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kamal]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Tariq]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Light-weight security and blockchain based provenance for advanced metering infrastructure]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2019</year>
<volume>7</volume>
<page-range>87345-56</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Oprea]]></surname>
<given-names><![CDATA[S. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Bara]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Andreescu]]></surname>
<given-names><![CDATA[A. I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Two novel blockchain-based market settlement mechanisms embedded into smart contracts for securely trading renewable energy]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2020</year>
<volume>8</volume>
<page-range>212548-56</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Varadarajan]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Double-blockchain assisted secure and anonymous data aggregation for fog-enabled smart grid]]></article-title>
<source><![CDATA[Engineering]]></source>
<year>2020</year>
<volume>8</volume>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gao]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Omono]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Bosteng]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Smahi]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Xia]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Xia]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Dong]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[GridMonitoring: Secured sovereign blockchain based monitoring on smart grid]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2018</year>
<volume>6</volume>
<page-range>9917-25</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sompolinsky]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Zohar]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[PHANTOM: A scalable BlockDAG protocol]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cebe]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Erdin]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Akkaya]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Aksu]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Uluagac]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Block4Forensic: An integrated lightweight blockchain framework for forensics applications of connected vehicles]]></article-title>
<source><![CDATA[IEEE Communications Magazine]]></source>
<year>2018</year>
<volume>56</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>50-7</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sharma]]></surname>
<given-names><![CDATA[P. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Park]]></surname>
<given-names><![CDATA[J. H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A software defined fog node based distributed blockchain cloud architecture for IoT]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2018</year>
<volume>6</volume>
<page-range>115-24</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Sun]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Du]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhuang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Consortium blockchain-based malware detection in mobile devices]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2018</year>
<volume>6</volume>
<page-range>12118-28</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fan]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Consortium blockchain based data aggregation and regulation mechanism for smart grid]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2019</year>
<volume>7</volume>
<page-range>35929-40</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Privacy-preserving transactive energy management for IoT-aided smart homes via blockchain]]></article-title>
<source><![CDATA[IEEE Internet of Things Journal]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Afzal]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Amin]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Umer]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Raza]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Naeem]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Blockchain enabled distributed demand side management in community energy system with smart homes]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2020</year>
<volume>8</volume>
<page-range>37428-39</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Rong]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A privacy protection scheme of smart meter for decentralized smart home environment based on consortium blockchain]]></article-title>
<source><![CDATA[International Journal of Electrical Power and Energy Systems]]></source>
<year>2020</year>
<volume>121</volume>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="">
<collab>GridPlus</collab>
<source><![CDATA[Grid+]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="">
<collab>PowerLedger</collab>
<source><![CDATA[Powerledger]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="">
<collab>Jiangsu Rongze Information Technology Co</collab>
<source><![CDATA[Power system electricity consumption usage data statistics management system based on block chain]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="">
<collab>North China Electric Power University</collab>
<source><![CDATA[Distributed generation energy management method based on block chain double-chain structure]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="">
<collab>China Southern Power Grid Co Ltd Institute of Information Engineering of CAS</collab>
<source><![CDATA[Block chain-based electricity consumption client credit management method and system]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="">
<collab>Chung Ang University Industry Academic Cooperation Foundation</collab>
<source><![CDATA[Blockchain-based secure smart grid management system]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Timothy]]></surname>
<given-names><![CDATA[MAYNE]]></given-names>
</name>
<name>
<surname><![CDATA[Serge]]></surname>
<given-names><![CDATA[UMANSKY]]></given-names>
</name>
</person-group>
<source><![CDATA[Method of matching renewable energy production to end-user consumption via blockchain systems]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="">
<collab>International Business Machines Corp</collab>
<source><![CDATA[Method or system for management of a device for energy consumption by applying blockchain protocol]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="">
<collab>Accenture Global Solutions Ltd</collab>
<source><![CDATA[Device, method and system for autonomous selection of a commodity supplier through a blockchain distributed database]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="">
<collab>nD-enerserve GmbH</collab>
<source><![CDATA[SmartPi]]></source>
<year>2022</year>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
