SlideShare a Scribd company logo
1 of 4
Download to read offline
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1563
Privacy Enhancing Routing Algorithm using Backbone Flooding
Schemes
Suresh Chimkode1, Radhika Sherikar2
1 Asst. Professor, Dept of Computer Science and Engineering, GNDEC College,Bidar,Karnataka (India)
24th Semester M.Tech Student, Dept of Computer Science and Engineering, GNDEC College,Bidar,
Karnataka (India)
---------------------------------------------------------------------------------***----------------------------------------------------------------
Abstract - Unique Privacy-saving steering conventions in
remote systems often use extra fake movement to shroud the
source-goal characters of the conveying pair. More often than
not, the expansion of counterfeit activity is done heuristically
without any ensures so as to the broadcast charge, inertness,
and so forth., are streamlined in each system topology. In this
paper, we unequivocally inspect the protection utility
exchange off issue for remote systems and build up a novel
security safeguarding steering calculation called Optimal
Privacy EnhancingRouting Algorithm. Musical showutilizesa
factual basic leadership structure to streamline the securityof
the directing convention given an utility imperative. We
consider worldwide enemies through together lossless and
lossy perceptions that utilization the Bayesian greatest a-
posteriori estimation procedure. We detail the protection
utility exchange off issue as a straight program which can be
effectively comprehended. Our recreation results exhibit that
OPE-RA decreases the foe's identification likelihood by up to
half contrasted with the irregular homogeneousandvoracious
heuristics, and up to five times contrasted with a pattern
conspire. What's more, OPERA likewise beats the ordinary
data theoretic shared data approach.
KeyWords: Pivacy, Routing, OPERA, Multihop, Global
Adversary.
1. INTRODUCTION
Movement investigation assaults are a genuinedangertothe
security of clients in a correspondence framework. The
investigation assaults can be utilized to deduce delicate
logical data from watched movement designs. All the
additional disturbingly, they be effortlessly execute with no
bringing doubts up in a multihop remote system where the
hub transmissions can be latently watched. Henceforth,
broad research endeavors have been put resources into
relieving movement investigation assaults in remote
systems. Commonplace activityexaminationstrategiesabuse
highlights, for example, bundle timings, sizes or tallies to
relate movement examples and bargainclientsecurity.Three
regular ways to deal with relieve investigation endeavorsbe
to modify the physical emergence of every bundle at every
bounce by means of jump by-bounce encryptions present
broadcast delay at every bounce to de-correlate activity
streams, present sham movement to jumble movement
designs. The initial two methodologies may not be alluring
for minimal effort or battery-controlledremotesystems,that
remote sensor arranges as the ease hubs will most likely be
unable to manage the cost of utilizing the computationally
costly encryptions at each jump, and presentingdelaysatthe
middle of the road hubs may not be viable when there is
little movement in the system. In this way, we utilize the
spurious activity way to deal with give protection by
bringing down the foe's recognition charge formally
characterized in part inside a remote system. In particular,
we think an enemy that use the ideal most extreme a-
posteriori estimation methodology particles in the whole
system was considered by. The creators proposed an
intermittent gathering and source recreationproceduresfor
giving source area security and the spine flooding and sink
reenactment methods for recipient area protection
1.1 RELATED WORK
Anchoring reconnaissance remote sensor systems in
unfriendly situations, for example, outskirts, borders and
front lines amid Base Station disappointment is testing.
Reconnaissance WS-Ns are exceptionally powerless against
BS disappointment. The aggressors can render the system
pointless by just crushing the BS as the required endeavors
to demolish the BS is significantly a smalleramountthanthat
is expected to decimate the system. This assault situation
will give the assailants the most obvious opportunity to
bargain many real hubs. Past works have handled BS
disappointment by conveying a versatile BS or by utilizing
variousB-Ss. In spite of the best electroniccountermeasures,
interruption resistance and against movement examination
methodologies to ensure the BSs, a foe still can decimate
them during this document, we give point by point
determinations of security engineering.
We assess our composed protection design for dependable
system recuperation from BS disappointment. Our
assessment demonstrates that the future new safety
engineering be able to get together every one the coveted
determinations and our examination demonstrates that the
gave protection manager be equipped for organize
recuperation from BS disappointment. For sensor systems
conveyed to screen and report genuine occasions, occasion
source secrecy is an appealing and basic security property,
which sadly is likewise extremely troublesome and costlyto
accomplish. This isn't simply because foes may assault
against sensor source protection through activity
investigation, yet in addition since sensor systems are
exceptionally constrained in assets. In that capacity, a down
to earth exchange off amongst security and execution is
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1564
attractive. In this article, out of the blue we propose the
thought of measurably solid source obscurity, under a
testing assault display where a worldwide assailant can
screen the movement in the whole system.Wesuggestaplan
call Fit Prob Rate, which acknowledges measurably solid
source secrecy for sensor systems. We show the strength of
our plan under different measurable tests that may be
utilized by the aggressor to identify genuine occasions. Our
investigation and reenactment outcome demonstrate that
our plan, other than giving source obscurity, can altogether
diminish genuine occasion revealing inactivity contrasted
with two pattern plans. Be that as it may, the level of source
secrecy in the FitProbRate plan may diminish as genuine
message rate increments. We propose a dynamic
meanscheme which hasbetter executionunderhighgenuine
message rates. Reproduction results demonstrate that the
dynamic mean plan is equipped for expandingtheassailant's
false positive rate and diminishing the aggressor's Bayesian
location rate fundamentally even under high-rate constant
genuine messages.
Gadget to-Device correspondence introduces another
worldview in versatile systems administration to encourage
information trade among actually contiguous gadgets. The
advancement of is driven by portable administrators to
collect short range interchanges for enhancing system
execution and supporting nearness based administrations.
we explore two basic and interrelated parts of D2D
correspondence, security and protection, which are
fundamental for the appropriation and organization of D2D.
We show a broad audit of the stateof-the-craftsmanship
answers for improving security and protection in D2D
correspondence.By condensingthedifficulties,prerequisites,
and highlights of various recommendations, we recognize
exercises to be gained from existing examinations and infer
an arrangement of "best practices". The essentialobjectiveof
our work is to furnish scientists and designers with a
superior comprehension of the basic issuesandthepotential
answers for D2D security and protection.
1.2 SYSTEM DESIGN
Fig 1: System Architecture
Fig.1: Assume there exist three conceivable directing ways
from the source hub u to the goal hub v. The source needs to
choose a way appropriation over the three conceivableways
to its goal that limits the normal location likelihood of a
worldwide enemy who can watch the hub transmissions.
2. IMPLEMENTATION DETAILES
2.1MODULES
1. Network setup
2. Pre-processing
3. Privacy
4. Performance Analysis
1. Network setup
Framework includes four phases, system presentation,
customer joining, divide getting ready and package check.
For our fundamental protocol,in strategy occasion creation,
the framework proprietor does it clear and utilize secure
key, and a short time later stacks the overall public
parameters on each center point before the framework
sending. In the customer joining stage, a customer gets the
dispersal advantage through enrolling to the framework
proprietor. In distribute dealing with arrange, if a customer
enters the framework and requirements to scatter a couple
of data things, he/she ought to build up the data scrambling
assembles and forward it to the fundamental hub. In the
package affirmation arrange, a center point checks each got
allocate. If the result is sure, it upgrades the data according
to the got package. In the going with, each stage isdelineated
in purpose of intrigue.
2. Pre-processing
In this stage, The framework proprietor does the going with
stepsto gather a private key and some open parameters.itat
that point picksthe private key and figuresindividualswhen
all is said in done key. From that point onward, individuals
when all is said in done parameters are preloaded in each
center of the framework.
3. Privacy
Acknowledge that a customer, takes into the N/W and
necessities to scatter n data things For the advancement of
the packages of the different data,techniques are
used.Thusly, customer scatters each data thing close by the
best possible internal centers for check reason. Note that as
delineated above, customer confirmation containscustomer
character information UID and spread advantage.Preceding
the framework plan, the framework proprietor namesapre-
described key to recognize this business package.
4. Performance Analysis
For the proposed structure ,I use the going with specific
estimations to evaluate its execution.The estimationofthese
things isn't in term of number of bundles sent to the
collector hub in a given time End-to-End Delay's is
additionally fundamental issue investigated data ought not
dropped from the system's.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1565
2.2. Experimental Results
Fig 2: screen appearing after entering the terminal taking
commands for listing files and tcl which is a tool command
language.
Fig3: screen for selecting source and destination node.
Fig4: output window with various nodes including
suspected nodes and malicious nodes.
Fig 5:Shows for source and destination with hidden
nodes.
Fig6: Shows throughput comparing with existing and
proposed.
Fig7: Shows delay between existing and proposed system.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1566
3. CONCLUSION
We have built up a factual basic leadership system to ideally
take care of the protection saving directing issue in remote
systems given some utility imperatives expecting a great
worldwide enemy that uses the ideal maximum-posteriori
(MAP) estimation methodology. We likewise demonstrated
through reenactments that our advance be essentially
superior to the Uniform and Greedy heuristics, a standard
plan, and the common data minimization conspire. For
prospect effort, it is intriguing to examine the protection
usefulness exchange off issue designed for portable systems
and to give stricter security requirements to the conveying
party.
REFERENCES
[1] J. Deng, R. Han, and S. Mishra, “Countermeasures against
traffic analysis attacksin wireless sensor networks,”inProc.
Int. Conf. Security and Privacy for Emerging Areas in
Commun. Networks, pp. 113–126, 2005.
[2] M. Shao, Y. Yang, S. Zhu, and G. Cao, “Towardsstatistically
strong source anonymity for sensor networks,” inProc.IEEE
Int. Conf. Comput. Commun. (INFOCOM), Apr. 2008. [3] J. Y.
Koh, J. Teo, D. Leong, and W.-C. Wong, “Reliable
privacypreserving communications for wireless ad hoc
networks,” in Proc. IEEE Int. Conf. Commun. (ICC), pp.6271–
6276, Jun. 2015.
[4] P. Zhang, C. Lin, Y. Jiang, P. Lee, and J. Lui, “ANOC:
Anonymous network-coding-based communication with
efficient cooperation,” IEEE J. Sel. Areas Commun., vol. 30,
pp. 1738–1745, Oct. 2012
[5] H. Shen and L. Zhao, “ALERT: An anonymous location-
based efficient routing protocol in MANETs,” IEEE Trans.
Mobile Comput., vol. 12, pp. 1079–1093, Jun. 2013.
[6] M. Conti, J. Willemsen, and B. Crispo, “Providing source
location privacy in wireless sensor networks: A survey,”
IEEE Commun. Surveys Tuts., vol. 15, pp. 1238–1280, Jan.
2013.
[7] Z. Ling, J. Luo, W. Yu, X. Fu, D. Xuan, and W. Jia, “A new
cell-counting-based attack against tor,” IEEE/ACM Trans.
Networking, vol. 20, pp. 1245–1261, Aug 2012.
[8] D. L. Chaum, “Untraceable electronic mail, return
addresses, and digital pseudonyms,” Commun. ACM, vol. 24,
pp. 84–90, Feb. 1981.
[9] M. Reed, P. Syverson, and D. Goldschlag, “Anonymous
connections and onion routing,” IEEE J. Sel. Areas Commun.,
vol. 16, pp. 482–494, May 1998.
[10] S. Mathur and W. Trappe, “BIT-TRAPS: building
information-theoretic traffic privacy into packet streams,”
IEEE Trans. Inf. Forens. Security, vol. 6, pp. 752–762, Sep.
2011.
[11] C. Ozturk, Y. Zhang, and W. Trappe, “Source-location
privacy in energy-constrained sensor network routing,” in
Proc. ACM Workshop on Security of Ad Hoc and Sensor
Networks, pp. 88–93, 2004.
[12] Y. Jian, S. Chen, Z. Zhang, and L. Zhang, “A novel scheme
for protecting receiver’s location privacy in wireless sensor
networks,” IEEE Trans. Wireless Commun., vol. 7, pp. 3769–
3779, Oct. 2008.
AUTHORS
Suresh Chimkode
Assistant Professor.Department of
Computer Science and
Engineering, Guru Nanak Dev
Engineering College,Bidar.
Radhika Sherikar
M.Tech student in Computer
Science and Engineering,Guru
Nanak Dev Engineering
College,Bidar.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072

More Related Content

What's hot

IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in ManetIRJET Journal
 
IRJET- Secure Data Transmission from Malicious Attacks: A Review
IRJET-  	  Secure Data Transmission from Malicious Attacks: A ReviewIRJET-  	  Secure Data Transmission from Malicious Attacks: A Review
IRJET- Secure Data Transmission from Malicious Attacks: A ReviewIRJET Journal
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Editor IJCATR
 
Bayes based arp attack detection algorithm for cloud centers
Bayes based arp attack detection algorithm for cloud centersBayes based arp attack detection algorithm for cloud centers
Bayes based arp attack detection algorithm for cloud centersredpel dot com
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...LogicMindtech Nologies
 
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...IRJET Journal
 
Environment based secure transfer of data in wireless sensor networks
Environment based secure transfer of data in wireless sensor networksEnvironment based secure transfer of data in wireless sensor networks
Environment based secure transfer of data in wireless sensor networksijsptm
 
Evaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainEvaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainIJCI JOURNAL
 
Secure intrusion detection and attack measure selection
Secure intrusion detection and attack measure selectionSecure intrusion detection and attack measure selection
Secure intrusion detection and attack measure selectionUvaraj Shan
 
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...IRJET Journal
 
Cryptographic Countermeasure Against Prevention Of Dos and Distributed DOS A...
Cryptographic Countermeasure Against  Prevention Of Dos and Distributed DOS A...Cryptographic Countermeasure Against  Prevention Of Dos and Distributed DOS A...
Cryptographic Countermeasure Against Prevention Of Dos and Distributed DOS A...IRJET Journal
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...IRJET Journal
 
Efficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvsEfficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvseSAT Journals
 
Efficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvsEfficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvseSAT Publishing House
 
Secure data aggregation technique for wireless
Secure data aggregation technique for wirelessSecure data aggregation technique for wireless
Secure data aggregation technique for wirelessjpstudcorner
 
SURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKS
SURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKSSURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKS
SURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKSijcseit
 
Preemptive modelling towards classifying vulnerability of DDoS attack in SDN ...
Preemptive modelling towards classifying vulnerability of DDoS attack in SDN ...Preemptive modelling towards classifying vulnerability of DDoS attack in SDN ...
Preemptive modelling towards classifying vulnerability of DDoS attack in SDN ...IJECEIAES
 
A System for Denial of Service Attack Detection Based On Multivariate Corelat...
A System for Denial of Service Attack Detection Based On Multivariate Corelat...A System for Denial of Service Attack Detection Based On Multivariate Corelat...
A System for Denial of Service Attack Detection Based On Multivariate Corelat...IJCERT
 

What's hot (18)

IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in Manet
 
IRJET- Secure Data Transmission from Malicious Attacks: A Review
IRJET-  	  Secure Data Transmission from Malicious Attacks: A ReviewIRJET-  	  Secure Data Transmission from Malicious Attacks: A Review
IRJET- Secure Data Transmission from Malicious Attacks: A Review
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
 
Bayes based arp attack detection algorithm for cloud centers
Bayes based arp attack detection algorithm for cloud centersBayes based arp attack detection algorithm for cloud centers
Bayes based arp attack detection algorithm for cloud centers
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
 
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...
 
Environment based secure transfer of data in wireless sensor networks
Environment based secure transfer of data in wireless sensor networksEnvironment based secure transfer of data in wireless sensor networks
Environment based secure transfer of data in wireless sensor networks
 
Evaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainEvaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chain
 
Secure intrusion detection and attack measure selection
Secure intrusion detection and attack measure selectionSecure intrusion detection and attack measure selection
Secure intrusion detection and attack measure selection
 
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
 
Cryptographic Countermeasure Against Prevention Of Dos and Distributed DOS A...
Cryptographic Countermeasure Against  Prevention Of Dos and Distributed DOS A...Cryptographic Countermeasure Against  Prevention Of Dos and Distributed DOS A...
Cryptographic Countermeasure Against Prevention Of Dos and Distributed DOS A...
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
 
Efficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvsEfficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvs
 
Efficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvsEfficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvs
 
Secure data aggregation technique for wireless
Secure data aggregation technique for wirelessSecure data aggregation technique for wireless
Secure data aggregation technique for wireless
 
SURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKS
SURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKSSURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKS
SURVEY ON LINK LAYER ATTACKS IN COGNITIVE RADIO NETWORKS
 
Preemptive modelling towards classifying vulnerability of DDoS attack in SDN ...
Preemptive modelling towards classifying vulnerability of DDoS attack in SDN ...Preemptive modelling towards classifying vulnerability of DDoS attack in SDN ...
Preemptive modelling towards classifying vulnerability of DDoS attack in SDN ...
 
A System for Denial of Service Attack Detection Based On Multivariate Corelat...
A System for Denial of Service Attack Detection Based On Multivariate Corelat...A System for Denial of Service Attack Detection Based On Multivariate Corelat...
A System for Denial of Service Attack Detection Based On Multivariate Corelat...
 

Similar to IRJET- A Review of the Concept of Smart Grid

710201940
710201940710201940
710201940IJRAT
 
Authentication and Authorization for User Roles and Device for Attack Detecti...
Authentication and Authorization for User Roles and Device for Attack Detecti...Authentication and Authorization for User Roles and Device for Attack Detecti...
Authentication and Authorization for User Roles and Device for Attack Detecti...IRJET Journal
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using BacktrackingIRJET Journal
 
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless...
IRJET-  	  An Efficient Dissemination and Dynamic Risk Management in Wireless...IRJET-  	  An Efficient Dissemination and Dynamic Risk Management in Wireless...
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless...IRJET Journal
 
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...theijes
 
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET Journal
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through TokenIRJET Journal
 
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyIRJET Journal
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
 
Enhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEnhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEswar Publications
 
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET Journal
 
IRJET- Insider Interruption Identification and Protection by using Forens...
IRJET-  	  Insider Interruption Identification and Protection by using Forens...IRJET-  	  Insider Interruption Identification and Protection by using Forens...
IRJET- Insider Interruption Identification and Protection by using Forens...IRJET Journal
 
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingCrypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingIRJET Journal
 
A Plagiarism Checker: Analysis of time and space complexity
A Plagiarism Checker: Analysis of time and space complexityA Plagiarism Checker: Analysis of time and space complexity
A Plagiarism Checker: Analysis of time and space complexityIRJET Journal
 
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSDESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSIJNSA Journal
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET Journal
 
Survey of Clustering Based Detection using IDS Technique
Survey of Clustering Based Detection using   IDS Technique Survey of Clustering Based Detection using   IDS Technique
Survey of Clustering Based Detection using IDS Technique IRJET Journal
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
 

Similar to IRJET- A Review of the Concept of Smart Grid (20)

710201940
710201940710201940
710201940
 
Authentication and Authorization for User Roles and Device for Attack Detecti...
Authentication and Authorization for User Roles and Device for Attack Detecti...Authentication and Authorization for User Roles and Device for Attack Detecti...
Authentication and Authorization for User Roles and Device for Attack Detecti...
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using Backtracking
 
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless...
IRJET-  	  An Efficient Dissemination and Dynamic Risk Management in Wireless...IRJET-  	  An Efficient Dissemination and Dynamic Risk Management in Wireless...
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless...
 
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
 
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through Token
 
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic Secrecy
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
Enhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEnhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor Networks
 
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
 
IRJET- Insider Interruption Identification and Protection by using Forens...
IRJET-  	  Insider Interruption Identification and Protection by using Forens...IRJET-  	  Insider Interruption Identification and Protection by using Forens...
IRJET- Insider Interruption Identification and Protection by using Forens...
 
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingCrypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
 
A Plagiarism Checker: Analysis of time and space complexity
A Plagiarism Checker: Analysis of time and space complexityA Plagiarism Checker: Analysis of time and space complexity
A Plagiarism Checker: Analysis of time and space complexity
 
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSDESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
 
Survey of Clustering Based Detection using IDS Technique
Survey of Clustering Based Detection using   IDS Technique Survey of Clustering Based Detection using   IDS Technique
Survey of Clustering Based Detection using IDS Technique
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 

Recently uploaded (20)

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 

IRJET- A Review of the Concept of Smart Grid

  • 1. © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1563 Privacy Enhancing Routing Algorithm using Backbone Flooding Schemes Suresh Chimkode1, Radhika Sherikar2 1 Asst. Professor, Dept of Computer Science and Engineering, GNDEC College,Bidar,Karnataka (India) 24th Semester M.Tech Student, Dept of Computer Science and Engineering, GNDEC College,Bidar, Karnataka (India) ---------------------------------------------------------------------------------***---------------------------------------------------------------- Abstract - Unique Privacy-saving steering conventions in remote systems often use extra fake movement to shroud the source-goal characters of the conveying pair. More often than not, the expansion of counterfeit activity is done heuristically without any ensures so as to the broadcast charge, inertness, and so forth., are streamlined in each system topology. In this paper, we unequivocally inspect the protection utility exchange off issue for remote systems and build up a novel security safeguarding steering calculation called Optimal Privacy EnhancingRouting Algorithm. Musical showutilizesa factual basic leadership structure to streamline the securityof the directing convention given an utility imperative. We consider worldwide enemies through together lossless and lossy perceptions that utilization the Bayesian greatest a- posteriori estimation procedure. We detail the protection utility exchange off issue as a straight program which can be effectively comprehended. Our recreation results exhibit that OPE-RA decreases the foe's identification likelihood by up to half contrasted with the irregular homogeneousandvoracious heuristics, and up to five times contrasted with a pattern conspire. What's more, OPERA likewise beats the ordinary data theoretic shared data approach. KeyWords: Pivacy, Routing, OPERA, Multihop, Global Adversary. 1. INTRODUCTION Movement investigation assaults are a genuinedangertothe security of clients in a correspondence framework. The investigation assaults can be utilized to deduce delicate logical data from watched movement designs. All the additional disturbingly, they be effortlessly execute with no bringing doubts up in a multihop remote system where the hub transmissions can be latently watched. Henceforth, broad research endeavors have been put resources into relieving movement investigation assaults in remote systems. Commonplace activityexaminationstrategiesabuse highlights, for example, bundle timings, sizes or tallies to relate movement examples and bargainclientsecurity.Three regular ways to deal with relieve investigation endeavorsbe to modify the physical emergence of every bundle at every bounce by means of jump by-bounce encryptions present broadcast delay at every bounce to de-correlate activity streams, present sham movement to jumble movement designs. The initial two methodologies may not be alluring for minimal effort or battery-controlledremotesystems,that remote sensor arranges as the ease hubs will most likely be unable to manage the cost of utilizing the computationally costly encryptions at each jump, and presentingdelaysatthe middle of the road hubs may not be viable when there is little movement in the system. In this way, we utilize the spurious activity way to deal with give protection by bringing down the foe's recognition charge formally characterized in part inside a remote system. In particular, we think an enemy that use the ideal most extreme a- posteriori estimation methodology particles in the whole system was considered by. The creators proposed an intermittent gathering and source recreationproceduresfor giving source area security and the spine flooding and sink reenactment methods for recipient area protection 1.1 RELATED WORK Anchoring reconnaissance remote sensor systems in unfriendly situations, for example, outskirts, borders and front lines amid Base Station disappointment is testing. Reconnaissance WS-Ns are exceptionally powerless against BS disappointment. The aggressors can render the system pointless by just crushing the BS as the required endeavors to demolish the BS is significantly a smalleramountthanthat is expected to decimate the system. This assault situation will give the assailants the most obvious opportunity to bargain many real hubs. Past works have handled BS disappointment by conveying a versatile BS or by utilizing variousB-Ss. In spite of the best electroniccountermeasures, interruption resistance and against movement examination methodologies to ensure the BSs, a foe still can decimate them during this document, we give point by point determinations of security engineering. We assess our composed protection design for dependable system recuperation from BS disappointment. Our assessment demonstrates that the future new safety engineering be able to get together every one the coveted determinations and our examination demonstrates that the gave protection manager be equipped for organize recuperation from BS disappointment. For sensor systems conveyed to screen and report genuine occasions, occasion source secrecy is an appealing and basic security property, which sadly is likewise extremely troublesome and costlyto accomplish. This isn't simply because foes may assault against sensor source protection through activity investigation, yet in addition since sensor systems are exceptionally constrained in assets. In that capacity, a down to earth exchange off amongst security and execution is International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072
  • 2. © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1564 attractive. In this article, out of the blue we propose the thought of measurably solid source obscurity, under a testing assault display where a worldwide assailant can screen the movement in the whole system.Wesuggestaplan call Fit Prob Rate, which acknowledges measurably solid source secrecy for sensor systems. We show the strength of our plan under different measurable tests that may be utilized by the aggressor to identify genuine occasions. Our investigation and reenactment outcome demonstrate that our plan, other than giving source obscurity, can altogether diminish genuine occasion revealing inactivity contrasted with two pattern plans. Be that as it may, the level of source secrecy in the FitProbRate plan may diminish as genuine message rate increments. We propose a dynamic meanscheme which hasbetter executionunderhighgenuine message rates. Reproduction results demonstrate that the dynamic mean plan is equipped for expandingtheassailant's false positive rate and diminishing the aggressor's Bayesian location rate fundamentally even under high-rate constant genuine messages. Gadget to-Device correspondence introduces another worldview in versatile systems administration to encourage information trade among actually contiguous gadgets. The advancement of is driven by portable administrators to collect short range interchanges for enhancing system execution and supporting nearness based administrations. we explore two basic and interrelated parts of D2D correspondence, security and protection, which are fundamental for the appropriation and organization of D2D. We show a broad audit of the stateof-the-craftsmanship answers for improving security and protection in D2D correspondence.By condensingthedifficulties,prerequisites, and highlights of various recommendations, we recognize exercises to be gained from existing examinations and infer an arrangement of "best practices". The essentialobjectiveof our work is to furnish scientists and designers with a superior comprehension of the basic issuesandthepotential answers for D2D security and protection. 1.2 SYSTEM DESIGN Fig 1: System Architecture Fig.1: Assume there exist three conceivable directing ways from the source hub u to the goal hub v. The source needs to choose a way appropriation over the three conceivableways to its goal that limits the normal location likelihood of a worldwide enemy who can watch the hub transmissions. 2. IMPLEMENTATION DETAILES 2.1MODULES 1. Network setup 2. Pre-processing 3. Privacy 4. Performance Analysis 1. Network setup Framework includes four phases, system presentation, customer joining, divide getting ready and package check. For our fundamental protocol,in strategy occasion creation, the framework proprietor does it clear and utilize secure key, and a short time later stacks the overall public parameters on each center point before the framework sending. In the customer joining stage, a customer gets the dispersal advantage through enrolling to the framework proprietor. In distribute dealing with arrange, if a customer enters the framework and requirements to scatter a couple of data things, he/she ought to build up the data scrambling assembles and forward it to the fundamental hub. In the package affirmation arrange, a center point checks each got allocate. If the result is sure, it upgrades the data according to the got package. In the going with, each stage isdelineated in purpose of intrigue. 2. Pre-processing In this stage, The framework proprietor does the going with stepsto gather a private key and some open parameters.itat that point picksthe private key and figuresindividualswhen all is said in done key. From that point onward, individuals when all is said in done parameters are preloaded in each center of the framework. 3. Privacy Acknowledge that a customer, takes into the N/W and necessities to scatter n data things For the advancement of the packages of the different data,techniques are used.Thusly, customer scatters each data thing close by the best possible internal centers for check reason. Note that as delineated above, customer confirmation containscustomer character information UID and spread advantage.Preceding the framework plan, the framework proprietor namesapre- described key to recognize this business package. 4. Performance Analysis For the proposed structure ,I use the going with specific estimations to evaluate its execution.The estimationofthese things isn't in term of number of bundles sent to the collector hub in a given time End-to-End Delay's is additionally fundamental issue investigated data ought not dropped from the system's. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072
  • 3. © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1565 2.2. Experimental Results Fig 2: screen appearing after entering the terminal taking commands for listing files and tcl which is a tool command language. Fig3: screen for selecting source and destination node. Fig4: output window with various nodes including suspected nodes and malicious nodes. Fig 5:Shows for source and destination with hidden nodes. Fig6: Shows throughput comparing with existing and proposed. Fig7: Shows delay between existing and proposed system. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072
  • 4. © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1566 3. CONCLUSION We have built up a factual basic leadership system to ideally take care of the protection saving directing issue in remote systems given some utility imperatives expecting a great worldwide enemy that uses the ideal maximum-posteriori (MAP) estimation methodology. We likewise demonstrated through reenactments that our advance be essentially superior to the Uniform and Greedy heuristics, a standard plan, and the common data minimization conspire. For prospect effort, it is intriguing to examine the protection usefulness exchange off issue designed for portable systems and to give stricter security requirements to the conveying party. REFERENCES [1] J. Deng, R. Han, and S. Mishra, “Countermeasures against traffic analysis attacksin wireless sensor networks,”inProc. Int. Conf. Security and Privacy for Emerging Areas in Commun. Networks, pp. 113–126, 2005. [2] M. Shao, Y. Yang, S. Zhu, and G. Cao, “Towardsstatistically strong source anonymity for sensor networks,” inProc.IEEE Int. Conf. Comput. Commun. (INFOCOM), Apr. 2008. [3] J. Y. Koh, J. Teo, D. Leong, and W.-C. Wong, “Reliable privacypreserving communications for wireless ad hoc networks,” in Proc. IEEE Int. Conf. Commun. (ICC), pp.6271– 6276, Jun. 2015. [4] P. Zhang, C. Lin, Y. Jiang, P. Lee, and J. Lui, “ANOC: Anonymous network-coding-based communication with efficient cooperation,” IEEE J. Sel. Areas Commun., vol. 30, pp. 1738–1745, Oct. 2012 [5] H. Shen and L. Zhao, “ALERT: An anonymous location- based efficient routing protocol in MANETs,” IEEE Trans. Mobile Comput., vol. 12, pp. 1079–1093, Jun. 2013. [6] M. Conti, J. Willemsen, and B. Crispo, “Providing source location privacy in wireless sensor networks: A survey,” IEEE Commun. Surveys Tuts., vol. 15, pp. 1238–1280, Jan. 2013. [7] Z. Ling, J. Luo, W. Yu, X. Fu, D. Xuan, and W. Jia, “A new cell-counting-based attack against tor,” IEEE/ACM Trans. Networking, vol. 20, pp. 1245–1261, Aug 2012. [8] D. L. Chaum, “Untraceable electronic mail, return addresses, and digital pseudonyms,” Commun. ACM, vol. 24, pp. 84–90, Feb. 1981. [9] M. Reed, P. Syverson, and D. Goldschlag, “Anonymous connections and onion routing,” IEEE J. Sel. Areas Commun., vol. 16, pp. 482–494, May 1998. [10] S. Mathur and W. Trappe, “BIT-TRAPS: building information-theoretic traffic privacy into packet streams,” IEEE Trans. Inf. Forens. Security, vol. 6, pp. 752–762, Sep. 2011. [11] C. Ozturk, Y. Zhang, and W. Trappe, “Source-location privacy in energy-constrained sensor network routing,” in Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 88–93, 2004. [12] Y. Jian, S. Chen, Z. Zhang, and L. Zhang, “A novel scheme for protecting receiver’s location privacy in wireless sensor networks,” IEEE Trans. Wireless Commun., vol. 7, pp. 3769– 3779, Oct. 2008. AUTHORS Suresh Chimkode Assistant Professor.Department of Computer Science and Engineering, Guru Nanak Dev Engineering College,Bidar. Radhika Sherikar M.Tech student in Computer Science and Engineering,Guru Nanak Dev Engineering College,Bidar. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072