Journal of Machine and Computing


Mitigating Data Tampering in Smart Grids Through Community Blockchain Driven Traceability Frameworks



Journal of Machine and Computing

Received On : 18 February 2025

Revised On : 26 May 2025

Accepted On : 16 June 2025

Published On : 05 July 2025

Volume 05, Issue 03

Pages : 1745-1762


Abstract


Data integrity in Smart Grids (SG) systems can be vulnerable with the implementation of the novel Community Blockchain-Driven Traceability Framework (CBDTF). It enhances Detection Rates (DR), maintains low End-to-End Delay (EED), and uses less energy by using distributed ledger technology and community-based validation. This model deployed a Delegated Proof of Stake (DPoS) consensus mechanism and community-driven testing, resulting in an average Detection Rate (DR) of 98.7% for Data Tampering attacks and a False Positive Rate (FPR) of 1.78%. It outperforms conventional Blockchain (BC) solutions with an EED of 120.8 ms and an average CPU utilization of 1,113 tx/kWh. When compared with conventional Proof-of-Work (PoW), CBDTF requires 60% less energy while proving 96.2% consensus resilience against distinct attacks. Applying real-world SG data collected by a distributed network of 100 nodes, the accuracy of this model was tested. The present study makes a valuable contribution to the field by signifying how BC platforms driven by the public can address SG's data security issues while maintaining the accuracy of real-time operations.


Keywords


Smart Grids, Data Tampering, Blockchain, Data Integrity, Attacks, Security.


  1. S. Abdelkader et al., “Securing modern power systems: Implementing comprehensive strategies to enhance resilience and reliability against cyber-attacks,” Results in Engineering, vol. 23, p. 102647, Sep. 2024, doi: 10.1016/j.rineng.2024.102647.
  2. S. Y. Diaba, M. Shafie-khah, and M. Elmusrati, “Cyber-physical attack and the future energy systems: A review,” Energy Reports, vol. 12, pp. 2914–2932, Dec. 2024, doi: 10.1016/j.egyr.2024.08.060.
  3. V. S. Rajkumar, A. Ştefanov, A. P. Presekal, Palensky, & J. L. R. Torres, “Cyber-attacks on power grids: Causes and propagation of cascading failures,” IEEE Access, (2023).
  4. A. P. Zhao et al., “Cyber Vulnerabilities of Energy Systems,” IEEE Journal of Emerging and Selected Topics in Industrial Electronics, vol. 5, no. 4, pp. 1455–1469, Oct. 2024, doi: 10.1109/jestie.2024.3434350.
  5. S. S. Ali and B. J. Choi, “State-of-the-Art Artificial Intelligence Techniques for Distributed Smart Grids: A Review,” Electronics, vol. 9, no. 6, p. 1030, Jun. 2020, doi: 10.3390/electronics9061030.
  6. E. Kabalci and Y. Kabalci, “Power line communication technologies in smart grids,” From Smart Grid to Internet of Energy, pp. 119–171, 2019, doi: 10.1016/b978-0-12-819710-3.00004-1.
  7. M. Liu et al., “Enhancing Cyber-Resiliency of DER-Based Smart Grid: A Survey,” IEEE Transactions on Smart Grid, vol. 15, no. 5, pp. 4998– 5030, Sep. 2024, doi: 10.1109/tsg.2024.3373008.
  8. M. Ghiasi, T. Niknam, Z. Wang, M. Mehrandezh, M. Dehghani, and N. Ghadimi, “A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future,” Electric Power Systems Research, vol. 215, p. 108975, Feb. 2023, doi: 10.1016/j.epsr.2022.108975.
  9. P. Kumar, Y. Lin, G. Bai, A. Paverd, J. S. Dong, and A. Martin, “Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues,” IEEE Communications Surveys & Tutorials, vol. 21, no. 3, pp. 2886–2927, 2019, doi: 10.1109/comst.2019.2899354.
  10. M. Baba, N. Nor, A. Sheikh, G. Nowakowski, F. Masood, M. Rehman,.. & B. Momin, “A review of the importance of synchrophasor technology, smart grid, and applications,” Bulletin of the Polish Academy of Sciences Technical Sciences, e143826-e143826, (2022).
  11. Y. Chen, E. K. Kumara, & V. Sivakumar, “Invesitigation of finance industry on risk awareness model and digital economic growth,” Annals of Operations Research, 1-22, (2021).
  12. L. H. Nguyen, V. L. Nguyen, R. H. Hwang, J. J. Kuo, Y. W. Chen, C. C. Huang, & P. I. Pan, “Towards Secured Smart Grid 2.0: Exploring Security Threats, Protection Models, and Challenges,” IEEE Communications Surveys & Tutorials, (2024).
  13. Y. Methkal Abd Algani, V. Sreenivasa Rao, and R. Saravanakumar, “AI-Powered Secure Decentralized Energy Transactions in Smart Grids: Enhancing Security and Efficiency,” 2024 IEEE 3rd International Conference on Electrical Power and Energy Systems (ICEPES), pp. 1–5, Jun. 2024, doi: 10.1109/icepes60647.2024.10653598.
  14. M. Zhang, Y. Liu, Q. Cheng, H. Li, D. Liao, and H. Li, “Smart grid security based on blockchain and smart contract,” Peer-to-Peer Networking and Applications, vol. 17, no. 4, pp. 2167–2184, Apr. 2024, doi: 10.1007/s12083-024-01703-0.
  15. https://smartgrid.ieee.org/bulletins/july-2018/is-the-blockchain-a-good-solution-for-cybersecurity-in-the-smart-grid.
  16. S. Almasabi, A. Shaf, T. Ali, M. Zafar, M. Irfan, and T. Alsuwian, “Securing Smart Grid Data With Blockchain and Wireless Sensor Networks: A Collaborative Approach,” IEEE Access, vol. 12, pp. 19181–19198, 2024, doi: 10.1109/access.2024.3361752.
  17. A. K, “Optimizing Edge Intelligence in Satellite IoT Networks via Computational Offloading and AI Inference,” Journal of Computer and Communication Networks, pp. 1–12, Jan. 2025, doi: 10.64026/jccn/2025001.
  18. D. Reijsbergen, A. Maw, T. T. A. Dinh, W. T. Li, & C. Yuen, “Securing smart grids through an incentive mechanism for blockchain-based data sharing,” In Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy (pp. 191-202), (2022, April).
  19. Y. Guo, Z. Wan, and X. Cheng, “When blockchain meets smart grids: A comprehensive survey,” High-Confidence Computing, vol. 2, no. 2, p. 100059, Jun. 2022, doi: 10.1016/j.hcc.2022.100059.

CRediT Author Statement


The authors confirm contribution to the paper as follows:

Conceptualization: Gayathri Ananthakrishnan, Sudhakar Sengan, Mohanraj E, Thirumoorthy Palanisamy, Veeramallu B and Srinivasarao B; Methodology: Gayathri Ananthakrishnan, Sudhakar Sengan and Mohanraj E; Writing- Original Draft Preparation: Gayathri Ananthakrishnan, Sudhakar Sengan, Mohanraj E, Thirumoorthy Palanisamy, Veeramallu B and Srinivasarao B; Visualization: Thirumoorthy Palanisamy, Veeramallu B and Srinivasarao B; Investigation: Gayathri Ananthakrishnan, Sudhakar Sengan and Mohanraj E; Supervision: Thirumoorthy Palanisamy, Veeramallu B and Srinivasarao B; Validation: Gayathri Ananthakrishnan, Sudhakar Sengan and Mohanraj E; Writing- Reviewing and Editing: Gayathri Ananthakrishnan, Sudhakar Sengan, Mohanraj E, Thirumoorthy Palanisamy, Veeramallu B and Srinivasarao B; All authors reviewed the results and approved the final version of the manuscript.


Acknowledgements


The authors would like to thank to the reviewers for nice comments on the manuscript.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


Data sharing is not applicable to this article as no new data were created or analysed in this study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Gayathri Ananthakrishnan, Sudhakar Sengan, Mohanraj E, Thirumoorthy Palanisamy, Veeramallu B and Srinivasarao B, “Mitigating Data Tampering in Smart Grids Through Community Blockchain Driven Traceability Frameworks”, Journal of Machine and Computing, vol.5, no.3, pp. 1745-1762, July 2025, doi: 10.53759/7669/jmc202505138.


Copyright


© 2025 Gayathri Ananthakrishnan, Sudhakar Sengan, Mohanraj E, Thirumoorthy Palanisamy, Veeramallu B and Srinivasarao B. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.