{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T19:05:57Z","timestamp":1771614357522,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T00:00:00Z","timestamp":1756080000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T00:00:00Z","timestamp":1756080000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"The  authors would  like  to  acknowledge  the  Deanship  of  Graduate  Studies  and Scientific  Research,  Taif  University  for  funding  this  work."}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-025-04906-3","type":"journal-article","created":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T05:36:54Z","timestamp":1756100214000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An efficient and resilient IoT architecture for smart grids via quantum key distribution and multi-homocryption encryption"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-5311-1104","authenticated-orcid":false,"given":"Jiangang","family":"Feng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0161-7147","authenticated-orcid":false,"given":"Faeiz M.","family":"Alserhani","sequence":"additional","affiliation":[]},{"given":"Asmaa A.","family":"Hamad","sequence":"additional","affiliation":[]},{"given":"Hassan","family":"Alsberi","sequence":"additional","affiliation":[]},{"given":"Najah Kalifah","family":"Almazmomi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1136-6123","authenticated-orcid":false,"given":"Arshad","family":"Hashmi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,25]]},"reference":[{"key":"4906_CR1","doi-asserted-by":"crossref","unstructured":"Al-Shetwi, A.Q., Hannan, M.A., Al-Masri, H.M.K., Sujod, M.Z.: Latest advancements in smart grid technologies and their transformative role in shaping the power systems of tomorrow: An overview. Prog. Energy (2024)","DOI":"10.1088\/2516-1083\/ada198"},{"key":"4906_CR2","doi-asserted-by":"publisher","first-page":"50961","DOI":"10.1109\/ACCESS.2021.3067331","volume":"9","author":"SM Abir","year":"2021","unstructured":"Abir, S.M., Adnan, A., Anwar, A., Choi, J., Kayes, A.S.M.: Iot-enabled smart energy grid: Applications and challenges. IEEE Access 9, 50961\u201350981 (2021)","journal-title":"IEEE Access"},{"key":"4906_CR3","unstructured":"Nawaz, H., Sethi, M.S., Nazir, S.S., Jamil, U.: Enhancing national cybersecurity and operational efficiency through legacy IT modernization and cloud migration: A US perspective. J. Comput. Biomed. Inform. 7(02) (2024)"},{"issue":"1","key":"4906_CR4","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-023-00200-w","volume":"7","author":"B Achaal","year":"2024","unstructured":"Achaal, B., Adda, M., Berger, M., Ibrahim, H., Awde, A.: Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges. Cybersecurity 7(1), 10 (2024)","journal-title":"Cybersecurity"},{"key":"4906_CR5","unstructured":"Sutradhar, S., Mondal, S., Bose, R., Dey, R.K., Golder, S.S.: Securing the future with cyber intelligence innovations. Authors Click Publishing (2025)"},{"issue":"11","key":"4906_CR6","first-page":"18","volume":"9","author":"N Fazrina","year":"2024","unstructured":"Fazrina, N.: Securing distributed sensor systems through adaptive encryption algorithms in 5G-based smart energy networks. Open J. Robot. Autonom. Decis. Mak. Hum. Mach. Interact. 9(11), 18\u201327 (2024)","journal-title":"Open J. Robot. Autonom. Decis. Mak. Hum. Mach. Interact."},{"issue":"2","key":"4906_CR7","first-page":"106","volume":"15","author":"M Tahmasebi","year":"2024","unstructured":"Tahmasebi, M.: Beyond defense: Proactive approaches to disaster recovery and threat intelligence in modern enterprises. J. Inf. Secur. 15(2), 106\u2013133 (2024)","journal-title":"J. Inf. Secur."},{"key":"4906_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.uncres.2025.100197","author":"CK Rao","year":"2025","unstructured":"Rao, C.K., Sahoo, S.K., Yanine, F.F.: A comprehensive review of smart energy management systems for photovoltaic power generation utilizing the internet of things. Unconvent. Resour. (2025). https:\/\/doi.org\/10.1016\/j.uncres.2025.100197","journal-title":"Unconvent. Resour."},{"issue":"1","key":"4906_CR9","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1038\/s41598-024-84427-8","volume":"15","author":"J Xiong","year":"2025","unstructured":"Xiong, J., Shen, Lu., Liu, Y., Fang, X.: Enhancing IoT security in smart grids with quantum-resistant hybrid encryption. Sci. Rep. 15(1), 3 (2025)","journal-title":"Sci. Rep."},{"key":"4906_CR10","doi-asserted-by":"crossref","unstructured":"Rani, P., Singh, A.K., Parashar, A., Saxena, D.: Quantum-secure data transmission in smart grid. In: 2024 IEEE 17th International Symposium on Embedded Multicore\/Many-core Systems-on-Chip (MCSoC), pp. 475\u2013481. IEEE (2024)","DOI":"10.1109\/MCSoC64144.2024.00084"},{"key":"4906_CR11","doi-asserted-by":"crossref","unstructured":"Ngouen, M., Ashiqur Rahman, M., Prabakar, N., Uluagac, S., Njilla, L.: Q-SECURE: a quantum resistant security for resource constrained IoT device encryption.\" In: 2023 10th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), pp. 141\u2013148. IEEE, (2023)","DOI":"10.1109\/IOTSMS59855.2023.10325770"},{"key":"4906_CR12","doi-asserted-by":"crossref","unstructured":"Li, B.: Optimizing smart grids with a hybrid classical-quantum architecture: efficiency, scalability, and real-time resilience. In: 2024 4th International Conference on New Energy and Power Engineering (ICNEPE), pp. 945\u2013953. IEEE (2024)","DOI":"10.1109\/ICNEPE64067.2024.10860318"},{"key":"4906_CR13","doi-asserted-by":"publisher","DOI":"10.34133\/icomputing.0006","volume":"2","author":"S Zhu","year":"2023","unstructured":"Zhu, S., Yu, T., Xu, T., Chen, H., Dustdar, S., Gigan, S., Gunduz, D., et al.: Intelligent computing: the latest advances, challenges, and future. Intell. Comput. 2, 0006 (2023)","journal-title":"Intell. Comput."},{"issue":"5","key":"4906_CR14","doi-asserted-by":"publisher","first-page":"5149","DOI":"10.1109\/TNSM.2024.3357103","volume":"21","author":"K Prateek","year":"2024","unstructured":"Prateek, K., Das, M., Surve, S., Maity, S., Amin, R.: Q-secure-P2-SMA: quantum-secure privacy-preserving smart meter authentication for unbreakable security in smart grid. IEEE Trans. Netw. Serv. Manag. 21(5), 5149\u20135163 (2024)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"no. 1","key":"4906_CR15","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/IOTM.001.2400059","volume":"8","author":"B Bera","year":"2024","unstructured":"Bera, B., Das, A.K., Sikdar, B.: Securing next-generation quantum IoT applications using quantum key distribution. IEEE Internet Things Mag. 8(1), 50\u201356 (2024)","journal-title":"IEEE Internet Things Mag."},{"key":"4906_CR16","doi-asserted-by":"crossref","unstructured":"Dai, H., Sun, X., Lv, B., Wang, H., Tong, L.: Multi-scenario quantum key distribution mechanism for power grid terminals. In:\u00a02024 12th International Conference on Information Systems and Computing Technology (ISCTech), pp. 1\u20135. IEEE (2024)","DOI":"10.1109\/ISCTech63666.2024.10845578"},{"key":"4906_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107209","volume":"93","author":"P Singh","year":"2021","unstructured":"Singh, P., Masud, M., Hossain, M.S., Kaur, A.: Blockchain and homomorphic encryption-based privacy-preserving data aggregation model in smart grid. Comput. Electr. Eng. 93, 107209 (2021)","journal-title":"Comput. Electr. Eng."},{"issue":"12","key":"4906_CR18","doi-asserted-by":"publisher","first-page":"3530","DOI":"10.1109\/JLT.2022.3153992","volume":"40","author":"X Yu","year":"2022","unstructured":"Yu, X., Liu, Y., Zou, X., Cao, Y., Zhao, Y., Nag, A., Zhang, J.: Secret-key provisioning with collaborative routing in partially-trusted-relay-based quantum-key-distribution-secured optical networks. J. Lightw. Technol. 40(12), 3530\u20133545 (2022)","journal-title":"J. Lightw. Technol."},{"issue":"12","key":"4906_CR19","doi-asserted-by":"publisher","first-page":"3430","DOI":"10.1109\/TPDS.2022.3153930","volume":"33","author":"Yu Zhan","year":"2022","unstructured":"Zhan, Yu., Zhou, L., Wang, B., Duan, Pu., Zhang, B.: Efficient function queryable and privacy preserving data aggregation scheme in smart grid. IEEE Trans. Parallel Distrib. Syst. 33(12), 3430\u20133441 (2022)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"4906_CR20","doi-asserted-by":"crossref","unstructured":"Sani, A.S., Yuan, D., Meng, K., Dong, Z.Y.: R-Chain: a universally composable relay resilience framework for smart grids.\" In:\u00a02021 IEEE Power & Energy Society General Meeting (PESGM), pp. 01\u201305. IEEE, (2021)","DOI":"10.1109\/PESGM46819.2021.9638015"},{"issue":"1","key":"4906_CR21","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-84427-8","volume":"15","author":"J Xiong","year":"2025","unstructured":"Xiong, J., Shen, Lu., Liu, Y., Fang, X.: Enhancing IoT security in smart grids with quantum-resistant hybrid encryption. Sci. Rep. 15(1), 3 (2025)","journal-title":"Sci. Rep."},{"key":"4906_CR22","doi-asserted-by":"crossref","unstructured":"Sharma, R., Patel, Z., Ganatra, M.: Quantum computing smart grids: a review on internet of things-enabled technologies in smart grids.\u00a0Appl. Principles Quantum Comput. 264\u2013288 (2024)","DOI":"10.4018\/979-8-3693-1168-4.ch013"},{"key":"4906_CR23","doi-asserted-by":"publisher","first-page":"2493","DOI":"10.1016\/j.egyr.2024.02.010","volume":"11","author":"M Aurangzeb","year":"2024","unstructured":"Aurangzeb, M., Wang, Y., Iqbal, S., Naveed, A., Ahmed, Z., Alenezi, M., Shouran, M.: Enhancing cybersecurity in smart grids: Deep black box adversarial attacks and quantum voting ensemble models for blockchain privacy-preserving storage. Energy Rep. 11, 2493\u20132515 (2024)","journal-title":"Energy Rep."},{"key":"4906_CR24","unstructured":"Alshowkan, M., Evans Michael Starke, P.G., Peters, N.A.: Authentication of smart grid communications using quantum key distribution. U.S. Patent Application 18\/478,376 filed April 4, 2024"},{"key":"4906_CR25","doi-asserted-by":"crossref","unstructured":"Gaabouri, I., Senhadji, M., Belkasmi, M., EL Bhiri, B.: A Twofold encryption scheme to secure IoT-based smart grid system. In:\u00a0International Conference on Advanced Technologies for Humanity, pp. 97\u2013104. Springer Nature Switzerland, Cham (2022)","DOI":"10.1007\/978-3-031-46849-0_11"},{"issue":"14","key":"4906_CR26","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.8080","volume":"36","author":"H Shekhawat","year":"2024","unstructured":"Shekhawat, H., Gupta, D.S.: A survey on lattice-based security and authentication schemes for smart-grid networks in the post-quantum era. Concurr. Comput. Pract. Exp. 36(14), e8080 (2024)","journal-title":"Concurr. Comput. Pract. Exp."},{"issue":"10","key":"4906_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3730575","volume":"57","author":"E Dervisevic","year":"2025","unstructured":"Dervisevic, E., Tankovic, A., Fazel, E., Kompella, R., Fazio, P., Voznak, M., Mehic, M.: Quantum key distribution networks-key management: a survey. ACM Comput. Surv. 57(10), 1\u201336 (2025)","journal-title":"ACM Comput. Surv."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-025-04906-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-025-04906-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-025-04906-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T17:42:01Z","timestamp":1760636521000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-025-04906-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,25]]},"references-count":27,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2025,9]]}},"alternative-id":["4906"],"URL":"https:\/\/doi.org\/10.1007\/s11128-025-04906-3","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,25]]},"assertion":[{"value":"2 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing commercial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"286"}}