*1.2. Paper Structure*

The remainder of the article is presented as follows: Section 2 defines the principles of blockchain and false data injection attacks. Problem theory, along with the formulation and the network under study and the system parameters, are presented in Section 3. The simulation results are analyzed under different normal scenarios and false data attacks and blockchain techniques to secure the messages and data in Section 4. Finally, the final conclusion is given in Section 5.

#### **2. Basic Concept**

#### *2.1. The Data-Sharing Structure According to Blockchain Technology*
