“…Their purpose varies from detecting malicious information or attacks to the grid, connection between smart devices, efficient energy management, secure data transmission, overall performance of electrical and smart grid, better periods for sale and buy energy, architecture design, security, and integration of grids. The works of Alonso et al [70] and Cavalieri [89] using the IEC61850 Protocol can be highlighted, showing us an applicable field of research with a view to homogenizing the algorithms and protocols used by Smart Grids and achieve an integration of all elements that conform them. Green-RPL [53] Local positive degree coupling [44] IEE 802.11s [33] Web Of Energy [67] Dynamic Barrier Coverage [68] IEC61850 [70,89] Wind-driven bacterian foraging algorithm [86] Data Slicing [87] TSUBE energy trading algorithm [91] Stochastic Geometry [92] Rectangular quadrature amplitude modulation [37] Policy-based group authentication algorithm [103] Mapping interface integration COIIoT [99,104] Nash Equilibrium (NE) and the Bayesian NE [105] Wireless sensor network protocol [35,50,53,63,73,[76][77][78]98,108,110] Algorithmic Approach [36,37,48,52,93,107,109] Furthermore, Figure 6c shows the Protocols Applied in Smart Grid Algorithms, pointing out that these technologies are varied and abundant, since 46% concentrate 14 different prot...…”