Wireless Sensor Networks (WSNs) are effective devices used for remote surveillance, device failure prediction,
and housing energy control in numerous smart grid implementations. Several interaction structures and remedies,
such as broadband networks, cable networks, Wireless Sensor networks, have been suggested to assist
Smart Grid implementations. Owing to their cheap, dynamic nature, robustness, and low energy profile, WSNs
are attractive devices, and preserving a low energy pattern is an essential factor in WSN. Implementing quality
services and safety techniques in sensor networks is challenging in smart grid applications. Thus, in this article,
Portable and Data Security Tolerancebased Energy-Efficient Framework(PDST-EEF) has been proposed for
maintaining a high standard of data security by lowering the sensor device energy usage in smart grid surroundings.
PDST model is developed to ensure data privacy in sensor networks by utilizing an authentication
method integrated with the cryptographic signature model to detect the various attacks. PDST identifies and
separates attacks like denial of service and replay efficiently. EEF presents a low-power cyber safety mechanism
on sensor networks with smart grid tracking applications. EEF is modeled with different stages like identifying
anti-nodes, group development, and allocating keys less energy. EEF can operate with higher power efficiency
techniques while preserving sustained throughput and reliability ideals. The experimental result shows that the
PDST-EEF’s specific request and authentication period is often enhanced by just a second with less energy usage
of 5.06%.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Wireless Sensor Network (WSN) is a promising field for research. As the use of this field increases, it is
required to give proper security to this field. So to ensure the security of communication of data or messages and to
control the use of data in WSN is of great importance. As sensor networks interact with responsive data and operate
in unfriendly unattended area, from the time of system design these security concerns should be addressed. The paper,
presents a modified Motesec security protocol which is a security mechanism for Wireless sensor network. In this
protocol a hash function based approach is used to detect replay attacks. For data access control key lock matching
method i.e. memory data access control policy is used to prevent unauthorized data access. Encoding and
reconstruction scheme is used to find out attacker. Flooding attack detection by comparing data rate. There is currently
massive research is present in the area of wireless sensor network security..Keywords: GPS,GCM,LBS Android.
Keywords: secure communication architecture, wireless Sensor network security.
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation
Integrated Framework for Secure and Energy Efficient Communication System in ...IJECEIAES
Irrespective of different forms and strategies implementing for securing Wireless Sensor Network (WSN), there are very less strategies that offers cost effective security over heterogeneous network. Therefore, this paper presents an integrated set of different processes that emphasize over secure routing, intellectual and delay-compensated routing, and optimization principle with a sole intention of securing the communication to and from the sensor nodes during data aggregation. The processed system advocates the non-usage of complex cryptography and encourages the usage of probability their and analytical modelling in order to render more practical implementation. The simulated outcome of study shows that proposed system offers reduced delay, more throughputs, and reduced energy consumption in contrast to existing system.
Next Generation Network: Security and Architectureijsrd.com
Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. Wireless Sensor Networks (WSN) are a most challenging and emerging technology for the Research due to their vital scope in the field coupled with their low processing power and associated low energy. As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design staring with a brief overview of the sensor networks security, a review is made of and how to provide the security in the wireless sensor networks. This paper studies the security problems, Requirement, Architecture of WSN and different platform, characterized by severely constrained computational and energy resources, and an ad hoc operational environment.
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption
security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN
and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is
used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for wireless sensor
networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security
performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between
in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource
time for efficient security aspects.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Wireless Sensor Network (WSN) is a promising field for research. As the use of this field increases, it is
required to give proper security to this field. So to ensure the security of communication of data or messages and to
control the use of data in WSN is of great importance. As sensor networks interact with responsive data and operate
in unfriendly unattended area, from the time of system design these security concerns should be addressed. The paper,
presents a modified Motesec security protocol which is a security mechanism for Wireless sensor network. In this
protocol a hash function based approach is used to detect replay attacks. For data access control key lock matching
method i.e. memory data access control policy is used to prevent unauthorized data access. Encoding and
reconstruction scheme is used to find out attacker. Flooding attack detection by comparing data rate. There is currently
massive research is present in the area of wireless sensor network security..Keywords: GPS,GCM,LBS Android.
Keywords: secure communication architecture, wireless Sensor network security.
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation
Integrated Framework for Secure and Energy Efficient Communication System in ...IJECEIAES
Irrespective of different forms and strategies implementing for securing Wireless Sensor Network (WSN), there are very less strategies that offers cost effective security over heterogeneous network. Therefore, this paper presents an integrated set of different processes that emphasize over secure routing, intellectual and delay-compensated routing, and optimization principle with a sole intention of securing the communication to and from the sensor nodes during data aggregation. The processed system advocates the non-usage of complex cryptography and encourages the usage of probability their and analytical modelling in order to render more practical implementation. The simulated outcome of study shows that proposed system offers reduced delay, more throughputs, and reduced energy consumption in contrast to existing system.
Next Generation Network: Security and Architectureijsrd.com
Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. Wireless Sensor Networks (WSN) are a most challenging and emerging technology for the Research due to their vital scope in the field coupled with their low processing power and associated low energy. As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design staring with a brief overview of the sensor networks security, a review is made of and how to provide the security in the wireless sensor networks. This paper studies the security problems, Requirement, Architecture of WSN and different platform, characterized by severely constrained computational and energy resources, and an ad hoc operational environment.
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption
security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN
and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is
used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for wireless sensor
networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security
performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between
in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource
time for efficient security aspects.
Hybrid Red Deer Algorithm with Physical Unclonable Function for Security Enha...IJCNCJournal
In this modern era, Wireless Sensor Network (WSNs) have turned out to be a more attractive option, because of the advancements in communication. If the network is insecure, an attacker can intercept messages and break the sensor nodes’ security; as well as duplicate the authentication codes to launch a variety of attacks. As a result, Physical Unclonable Functions (PUFs) with unpredictable features are encouraged to be used in the development of lightweight cryptographic protocols. This work introduced the Red Deer Algorithm (RDA) with PUF as a new mutual authentication system. When a sensor receives a challenge from the gateway, the inbuilt PUF generates a key and distributes it to the sensor by providing complete resilience against malicious attacks. PUF is resistant to node acquisition, cloning, and malicious attacks, as well as node physical security flaws. Key distribution is moving too quickly and the adversary won’t be able to conduct a harmful attack in time. Furthermore, PUF’s unclonability and unexpected qualities provide key uniqueness and two-way authentication for improving the security. When compared to existing Tunicate Swarm Grey Wolf optimization (TSGWO) and PUF-Based Mutual-Authenticated Key Distribution (PUF-MAKD), the proposed RDA-PUF demonstrated better results. The simulation results are obtained in terms of minimizing energy consumption as 0.7 J, end-to-end delay as 7 sec, packet delivery ratio of 97%, increasing network lifetime to 1330 sec, and improving secure connectivity to 1.211.
Hybrid Red Deer Algorithm with Physical Unclonable Function for Security Enha...IJCNCJournal
In this modern era, Wireless Sensor Network (WSNs) have turned out to be a more attractive option, because of the advancements in communication. If the network is insecure, an attacker can intercept messages and break the sensor nodes’ security; as well as duplicate the authentication codes to launch a variety of attacks. As a result, Physical Unclonable Functions (PUFs) with unpredictable features are encouraged to be used in the development of lightweight cryptographic protocols. This work introduced the Red Deer Algorithm (RDA) with PUF as a new mutual authentication system. When a sensor receives a challenge from the gateway, the inbuilt PUF generates a key and distributes it to the sensor by providing complete resilience against malicious attacks. PUF is resistant to node acquisition, cloning, and malicious attacks, as well as node physical security flaws. Key distribution is moving too quickly and the adversary won’t be able to conduct a harmful attack in time. Furthermore, PUF’s unclonability and unexpected qualities provide key uniqueness and two-way authentication for improving the security. When compared to existing Tunicate Swarm Grey Wolf optimization (TSGWO) and PUF-Based Mutual-Authenticated Key Distribution (PUF-MAKD), the proposed RDA-PUF demonstrated better results. The simulation results are obtained in terms of minimizing energy consumption as 0.7 J, end-to-end delay as 7 sec, packet delivery ratio of 97%, increasing network lifetime to 1330 sec, and improving secure connectivity to 1.211.
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
Internet of Things (IoT) offers reliable and seamless communication for the heterogeneous dynamic lowpower and lossy network (LLNs). To perform effective routing in IoT communication, LLN Routing Protocol (RPL) is developed for the tiny nodes to establish connection by using deflaut objective functions: OF0, MRHOF, for which resources are constraints like battery power, computation capacity, memory communication link impacts on varying traffic scenarios in terms of QoS metrics like packet delivery ratio, delay, secure communication channel. At present, conventional Internet of Things (IoT) are having secure communication channels issue for transmission of data between nodes. To withstand those issues, it is necessary to balance resource constraints of nodes in the network. In this paper, we developed a security algorithm for IoT networks with RPL routing. Initially, the constructed network in corporates optimizationbased deep learning (reinforcement learning) for route establishment in IoT. Upon the establishment of the route, the ClonQlearn based security algorithm is implemented for improving security which is based onaECC scheme for encryption and decryption of data. The proposed security technique incorporates reinforcement learning-based ClonQlearnintegrated with ECC (ClonQlearn+ECC) for random key generation. The proposed ClonQlearn+ECCexhibits secure data transmission with improved network performance when compared with the earlier works in simulation. The performance of network expressed that the proposed ClonQlearn+ECC increased the PDR of approximately 8% - 10%, throughput of 7% - 13%, end-to-end delay of 5% - 10% and power consumption variation of 3% - 7%.
A secure trust-based protocol for hierarchical routing in wireless sensor ne...IJECEIAES
Wireless sensor networks (WSNs) became the backbone of the internet of things (IoT). IoT applications are vital and demand specific quality of service (QoS) requirements. In addition, security has become a primary concern to provide secure communication between wireless nodes, with additional challenges related to the node’s computational resources. Particular, the design of secure and resource efficient routing protocol is a critical issue in the current deployment of WSNs. Therefore, this paper proposes a novel secure-trust aware routing protocol (ST2A) that provides secure and reliable routing. The proposed protocol establishes communication routes based on calculated trust value in joint with a novel cluster head selection algorithm in the hierarchical routing process. The proposed trust-aware routing algorithm improves the routing security in WSN and optimizes many performance metrics related to WSNs unique characteristics. The results of simulation validate the feasibility of the proposed algorithm for enhancing the network lifetime up to 18% and data delivery by 17% as compared with some state-of-the-art routing algorithms.
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...cscpconf
Keying technique in Wireless Sensor Networks(WSNs) is one of the most emerging fields ofWSN security. In order to provide security on WSN, the role of Key distribution technique is
considered to be very significant and thus the key management plays a crucial and fundamentalroles in the security service of WSNs. This paper reviews pairwise key establishment techniquealong with the architecture and the environment of WSN. The cluster based group key
agreement protocols for infrastructure base WSN are discussed in this paper. This paper also
reviews how the security can be provided to WSNs with the integration of clustering and keying
techniques. The survey also provides a more detailed discussion on the comparison between different cluster based group key agreement protocols.
A survey on wireless sensor networks security with the integration of cluster...csandit
Keying technique in Wireless Sensor Networks(WSNs) is one of the most emerging fields of
WSN security. In order to provide security on WSN, the role of Key distribution technique is
considered to be very significant and thus the key management plays a crucial and fundamental
roles in the security service of WSNs. This paper reviews pairwise key establishment technique
along with the architecture and the environment of WSN. The cluster based group key
agreement protocols for infrastructure base WSN are discussed in this paper. This paper also
reviews how the security can be provided to WSNs with the integration of clustering and keying
techniques. The survey also provides a more detailed discussion on the comparison between
different cluster based group key agreement protocols.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
A data dissemination protocol for wireless sensor networks has been engaged for modifying configuration fields and circulating management controls to the mote. Earlier, a data dissemination protocol faces the henceforth two consequences. First, they are works on sink based model; only the sink can circulate data item to other motes. Such model is not suitable for large user wireless sensor networks. Second, those protocols are not provide with any security and hence intruders will make problems to misuse the network. We provided the seDrip protocol. It allows the network mentors to authorize multiple network uses with various permissions to simultaneously and directly distributed data items to the mote. seDrip is implemented in an laboratory of network restricted resources mote to depict its large capability in practice.
Security and risk analysis in the cloud with software defined networking arch...IJECEIAES
Cloud computing has emerged as the actual trend in business information technology service models, since it provides processing that is both costeffective and scalable. Enterprise networks are adopting software-defined networking (SDN) for network management flexibility and lower operating costs. Information technology (IT) services for enterprises tend to use both technologies. Yet, the effects of cloud computing and software defined networking on business network security are unclear. This study addresses this crucial issue. In a business network that uses both technologies, we start by looking at security, namely distributed denial-of-service (DDoS) attack defensive methods. SDN technology may help organizations protect against DDoS assaults provided the defensive architecture is structured appropriately. To mitigate DDoS attacks, we offer a highly configurable network monitoring and flexible control framework. We present a dataset shift-resistant graphic model-based attack detection system for the new architecture. The simulation findings demonstrate that our architecture can efficiently meet the security concerns of the new network paradigm and that our attack detection system can report numerous threats using real-world network data.
Improvement of quality of service parameters using reinvented fsmac protocol ...eSAT Journals
Abstract Now-a-days Wireless Sensor Networks (WSNs) have been used in a various applications including military and security monitoring, industrial control, health monitoring, home automation, intelligent agriculture and environmental sensing. The shared and easy to access medium is undoubtedly the biggest advantage of wireless networks. The shared nature of the medium in wireless Sensor Networks makes it easy for an attacker to launch a Denial of Service (DoS) attack. These attacks are happening to stop the legitimate node from accessing resources. There are many occasions where the attack can be much easier for an attacker. For example, in carrier sensing based networks (a) the transmissions at the sender are deferred because the medium is sensed to be busy, and/or (b) the reception at the receiver is interfered with due to the jamming signals. Both these effects degrade the wireless network performance significantly. As a result causes degradation in Quality-of-Service (QoS) of a sensor network. In proposed paper, Fuzzy Logic Secure Media Access Control (FSMAC) Protocol is reinvented using new intrusion detection parameter. These two parameters are Number of time channel sensed free and variation in Channel sensed period. Performance characteristics are measured in terms of successful data transmission rate and throughput of the network. Keywords: Wireless Sensor Networks, Denial-of-Service Attack, Quality of Service, Reinvented FSMAC Protocol.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networkscscpconf
A cellular network is an asymmetric radio network which is made up of fixed transceivers or
nodes, maintain the signal while the mobile transceiver which is using the network is in the
vicinity of the node. An ad-hoc network is a local area network (LAN) that is built
spontaneously as devices connect.
Instead of relying on a base station to coordinate the flow of messages to each node in the
network, the individual network nodes forward packets to and from each other.
This paper focuses on various issues in cellular, adhoc and sensor network. As issues proves helpful for forthcoming research, this paper work as a backbone to elaborate the various research areas.
Salsa20 based lightweight security scheme for smart meter communication in sm...TELKOMNIKA JOURNAL
The traditional power gird is altering dramatically to a smart power grid with the escalating development of information and communication technology (ICT). Among thousands of electronic devices connected to the grid through communication network, smart meter (SM) is the core networking device. The consolidation of ICT to the electronic devices centered on SM open loophole for the adversaries to launch cyber-attack. Therefore, for protecting the network from the adversaries it is required to design lightweight security mechanism for SM, as conventional cryptography schemes poses extensive computational cost, processing delay and overhead which is not suitable to be used in SM. In this paper, we have proposed a security mechanism consolidating elliptic curve cryptography (ECC) and Salsa20 stream cipher algorithm to ensure security of the network as well as addressing the problem of energy efficiency and lightweight security solution. We have numerically analyzed the performance of our proposed scheme in case of energy efficiency and processing time which reveals that the suggested mechanism is suitable to be used in SM as it consumes less power and requires less processing time to encrypt or decrypt.
Tactical approach to identify and quarantine spurious node participation requ...IJECEIAES
Securing Wireless Sensor Network (WSN) from variable forms of adversary is still an open end challenge. Review of diversified security apprroaches towards such problems that they are highly symptomatic with respect to resiliency strength against attack. Therefore, the proposed system highlights a novel and effective solution that is capable of identify the spurios request for participating in teh network building process from attacker and in return could deviate the route of attacker to some virtual nodes and links. A simple trust based mechanism is constructed for validating the legitimacy of such request generated from adversary node. The proposed system not only presents a security solution but also assists in enhancing the routing process significantly. The simulated outcome of the study shows that proposed system offers significantly good energy conservation, satisfactory data forwarding performance, reduced processing time in contrast to existing standard security practices.
A New Data Stream Mining Algorithm for Interestingness-rich Association RulesVenu Madhav
Frequent itemset mining and association rule generation is
a challenging task in data stream. Even though, various algorithms
have been proposed to solve the issue, it has been found
out that only frequency does not decides the significance
interestingness of the mined itemset and hence the association
rules. This accelerates the algorithms to mine the association
rules based on utility i.e. proficiency of the mined rules. However,
fewer algorithms exist in the literature to deal with the utility
as most of them deals with reducing the complexity in frequent
itemset/association rules mining algorithm. Also, those few
algorithms consider only the overall utility of the association
rules and not the consistency of the rules throughout a defined
number of periods. To solve this issue, in this paper, an enhanced
association rule mining algorithm is proposed. The algorithm
introduces new weightage validation in the conventional
association rule mining algorithms to validate the utility and
its consistency in the mined association rules. The utility is
validated by the integrated calculation of the cost/price efficiency
of the itemsets and its frequency. The consistency validation
is performed at every defined number of windows using the
probability distribution function, assuming that the weights are
normally distributed. Hence, validated and the obtained rules
are frequent and utility efficient and their interestingness are
distributed throughout the entire time period. The algorithm is
implemented and the resultant rules are compared against the
rules that can be obtained from conventional mining algorithms
An efficient educational data mining approach to support e-learningVenu Madhav
The e-learning is a recent development that has
emerged in the educational system due to the growth of the
information technology. The common challenges involved
in The e-learning platform include the collection and
annotation of the learning materials, organization of the
knowledge in a useful way, the retrieval and discovery of
the useful learning materials from the knowledge space in a
more significant way, and the delivery of the adaptive and
personalized learning materials. In order to handle these
challenges, the proposed system is developed using five
different steps of knowledge input such as the annotation of
the learning materials, creation of knowledge space,
indexing of learning materials using the multi-dimensional
knowledge and XML structure to generate a knowledge
grid and the retrieval of learning materials performed by
matching the user query with the indexed database and
ontology. The process is carried out in two modules such as
the server module and client module. The proposed
approach is evaluated using various parameters such as the
precision, recall and F-measure. Comprehensive results are
achieved by varying the keywords, number of documents
and the K-size. The proposed approach has yielded
excellent results by obtaining the higher evaluation metric,
together with an average precision of 0.81, average
More Related Content
Similar to Data security tolerance and portable based energy-efficient framework in sensor networks for smart grid environments
Hybrid Red Deer Algorithm with Physical Unclonable Function for Security Enha...IJCNCJournal
In this modern era, Wireless Sensor Network (WSNs) have turned out to be a more attractive option, because of the advancements in communication. If the network is insecure, an attacker can intercept messages and break the sensor nodes’ security; as well as duplicate the authentication codes to launch a variety of attacks. As a result, Physical Unclonable Functions (PUFs) with unpredictable features are encouraged to be used in the development of lightweight cryptographic protocols. This work introduced the Red Deer Algorithm (RDA) with PUF as a new mutual authentication system. When a sensor receives a challenge from the gateway, the inbuilt PUF generates a key and distributes it to the sensor by providing complete resilience against malicious attacks. PUF is resistant to node acquisition, cloning, and malicious attacks, as well as node physical security flaws. Key distribution is moving too quickly and the adversary won’t be able to conduct a harmful attack in time. Furthermore, PUF’s unclonability and unexpected qualities provide key uniqueness and two-way authentication for improving the security. When compared to existing Tunicate Swarm Grey Wolf optimization (TSGWO) and PUF-Based Mutual-Authenticated Key Distribution (PUF-MAKD), the proposed RDA-PUF demonstrated better results. The simulation results are obtained in terms of minimizing energy consumption as 0.7 J, end-to-end delay as 7 sec, packet delivery ratio of 97%, increasing network lifetime to 1330 sec, and improving secure connectivity to 1.211.
Hybrid Red Deer Algorithm with Physical Unclonable Function for Security Enha...IJCNCJournal
In this modern era, Wireless Sensor Network (WSNs) have turned out to be a more attractive option, because of the advancements in communication. If the network is insecure, an attacker can intercept messages and break the sensor nodes’ security; as well as duplicate the authentication codes to launch a variety of attacks. As a result, Physical Unclonable Functions (PUFs) with unpredictable features are encouraged to be used in the development of lightweight cryptographic protocols. This work introduced the Red Deer Algorithm (RDA) with PUF as a new mutual authentication system. When a sensor receives a challenge from the gateway, the inbuilt PUF generates a key and distributes it to the sensor by providing complete resilience against malicious attacks. PUF is resistant to node acquisition, cloning, and malicious attacks, as well as node physical security flaws. Key distribution is moving too quickly and the adversary won’t be able to conduct a harmful attack in time. Furthermore, PUF’s unclonability and unexpected qualities provide key uniqueness and two-way authentication for improving the security. When compared to existing Tunicate Swarm Grey Wolf optimization (TSGWO) and PUF-Based Mutual-Authenticated Key Distribution (PUF-MAKD), the proposed RDA-PUF demonstrated better results. The simulation results are obtained in terms of minimizing energy consumption as 0.7 J, end-to-end delay as 7 sec, packet delivery ratio of 97%, increasing network lifetime to 1330 sec, and improving secure connectivity to 1.211.
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
Internet of Things (IoT) offers reliable and seamless communication for the heterogeneous dynamic lowpower and lossy network (LLNs). To perform effective routing in IoT communication, LLN Routing Protocol (RPL) is developed for the tiny nodes to establish connection by using deflaut objective functions: OF0, MRHOF, for which resources are constraints like battery power, computation capacity, memory communication link impacts on varying traffic scenarios in terms of QoS metrics like packet delivery ratio, delay, secure communication channel. At present, conventional Internet of Things (IoT) are having secure communication channels issue for transmission of data between nodes. To withstand those issues, it is necessary to balance resource constraints of nodes in the network. In this paper, we developed a security algorithm for IoT networks with RPL routing. Initially, the constructed network in corporates optimizationbased deep learning (reinforcement learning) for route establishment in IoT. Upon the establishment of the route, the ClonQlearn based security algorithm is implemented for improving security which is based onaECC scheme for encryption and decryption of data. The proposed security technique incorporates reinforcement learning-based ClonQlearnintegrated with ECC (ClonQlearn+ECC) for random key generation. The proposed ClonQlearn+ECCexhibits secure data transmission with improved network performance when compared with the earlier works in simulation. The performance of network expressed that the proposed ClonQlearn+ECC increased the PDR of approximately 8% - 10%, throughput of 7% - 13%, end-to-end delay of 5% - 10% and power consumption variation of 3% - 7%.
A secure trust-based protocol for hierarchical routing in wireless sensor ne...IJECEIAES
Wireless sensor networks (WSNs) became the backbone of the internet of things (IoT). IoT applications are vital and demand specific quality of service (QoS) requirements. In addition, security has become a primary concern to provide secure communication between wireless nodes, with additional challenges related to the node’s computational resources. Particular, the design of secure and resource efficient routing protocol is a critical issue in the current deployment of WSNs. Therefore, this paper proposes a novel secure-trust aware routing protocol (ST2A) that provides secure and reliable routing. The proposed protocol establishes communication routes based on calculated trust value in joint with a novel cluster head selection algorithm in the hierarchical routing process. The proposed trust-aware routing algorithm improves the routing security in WSN and optimizes many performance metrics related to WSNs unique characteristics. The results of simulation validate the feasibility of the proposed algorithm for enhancing the network lifetime up to 18% and data delivery by 17% as compared with some state-of-the-art routing algorithms.
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...cscpconf
Keying technique in Wireless Sensor Networks(WSNs) is one of the most emerging fields ofWSN security. In order to provide security on WSN, the role of Key distribution technique is
considered to be very significant and thus the key management plays a crucial and fundamentalroles in the security service of WSNs. This paper reviews pairwise key establishment techniquealong with the architecture and the environment of WSN. The cluster based group key
agreement protocols for infrastructure base WSN are discussed in this paper. This paper also
reviews how the security can be provided to WSNs with the integration of clustering and keying
techniques. The survey also provides a more detailed discussion on the comparison between different cluster based group key agreement protocols.
A survey on wireless sensor networks security with the integration of cluster...csandit
Keying technique in Wireless Sensor Networks(WSNs) is one of the most emerging fields of
WSN security. In order to provide security on WSN, the role of Key distribution technique is
considered to be very significant and thus the key management plays a crucial and fundamental
roles in the security service of WSNs. This paper reviews pairwise key establishment technique
along with the architecture and the environment of WSN. The cluster based group key
agreement protocols for infrastructure base WSN are discussed in this paper. This paper also
reviews how the security can be provided to WSNs with the integration of clustering and keying
techniques. The survey also provides a more detailed discussion on the comparison between
different cluster based group key agreement protocols.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
A data dissemination protocol for wireless sensor networks has been engaged for modifying configuration fields and circulating management controls to the mote. Earlier, a data dissemination protocol faces the henceforth two consequences. First, they are works on sink based model; only the sink can circulate data item to other motes. Such model is not suitable for large user wireless sensor networks. Second, those protocols are not provide with any security and hence intruders will make problems to misuse the network. We provided the seDrip protocol. It allows the network mentors to authorize multiple network uses with various permissions to simultaneously and directly distributed data items to the mote. seDrip is implemented in an laboratory of network restricted resources mote to depict its large capability in practice.
Security and risk analysis in the cloud with software defined networking arch...IJECEIAES
Cloud computing has emerged as the actual trend in business information technology service models, since it provides processing that is both costeffective and scalable. Enterprise networks are adopting software-defined networking (SDN) for network management flexibility and lower operating costs. Information technology (IT) services for enterprises tend to use both technologies. Yet, the effects of cloud computing and software defined networking on business network security are unclear. This study addresses this crucial issue. In a business network that uses both technologies, we start by looking at security, namely distributed denial-of-service (DDoS) attack defensive methods. SDN technology may help organizations protect against DDoS assaults provided the defensive architecture is structured appropriately. To mitigate DDoS attacks, we offer a highly configurable network monitoring and flexible control framework. We present a dataset shift-resistant graphic model-based attack detection system for the new architecture. The simulation findings demonstrate that our architecture can efficiently meet the security concerns of the new network paradigm and that our attack detection system can report numerous threats using real-world network data.
Improvement of quality of service parameters using reinvented fsmac protocol ...eSAT Journals
Abstract Now-a-days Wireless Sensor Networks (WSNs) have been used in a various applications including military and security monitoring, industrial control, health monitoring, home automation, intelligent agriculture and environmental sensing. The shared and easy to access medium is undoubtedly the biggest advantage of wireless networks. The shared nature of the medium in wireless Sensor Networks makes it easy for an attacker to launch a Denial of Service (DoS) attack. These attacks are happening to stop the legitimate node from accessing resources. There are many occasions where the attack can be much easier for an attacker. For example, in carrier sensing based networks (a) the transmissions at the sender are deferred because the medium is sensed to be busy, and/or (b) the reception at the receiver is interfered with due to the jamming signals. Both these effects degrade the wireless network performance significantly. As a result causes degradation in Quality-of-Service (QoS) of a sensor network. In proposed paper, Fuzzy Logic Secure Media Access Control (FSMAC) Protocol is reinvented using new intrusion detection parameter. These two parameters are Number of time channel sensed free and variation in Channel sensed period. Performance characteristics are measured in terms of successful data transmission rate and throughput of the network. Keywords: Wireless Sensor Networks, Denial-of-Service Attack, Quality of Service, Reinvented FSMAC Protocol.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networkscscpconf
A cellular network is an asymmetric radio network which is made up of fixed transceivers or
nodes, maintain the signal while the mobile transceiver which is using the network is in the
vicinity of the node. An ad-hoc network is a local area network (LAN) that is built
spontaneously as devices connect.
Instead of relying on a base station to coordinate the flow of messages to each node in the
network, the individual network nodes forward packets to and from each other.
This paper focuses on various issues in cellular, adhoc and sensor network. As issues proves helpful for forthcoming research, this paper work as a backbone to elaborate the various research areas.
Salsa20 based lightweight security scheme for smart meter communication in sm...TELKOMNIKA JOURNAL
The traditional power gird is altering dramatically to a smart power grid with the escalating development of information and communication technology (ICT). Among thousands of electronic devices connected to the grid through communication network, smart meter (SM) is the core networking device. The consolidation of ICT to the electronic devices centered on SM open loophole for the adversaries to launch cyber-attack. Therefore, for protecting the network from the adversaries it is required to design lightweight security mechanism for SM, as conventional cryptography schemes poses extensive computational cost, processing delay and overhead which is not suitable to be used in SM. In this paper, we have proposed a security mechanism consolidating elliptic curve cryptography (ECC) and Salsa20 stream cipher algorithm to ensure security of the network as well as addressing the problem of energy efficiency and lightweight security solution. We have numerically analyzed the performance of our proposed scheme in case of energy efficiency and processing time which reveals that the suggested mechanism is suitable to be used in SM as it consumes less power and requires less processing time to encrypt or decrypt.
Tactical approach to identify and quarantine spurious node participation requ...IJECEIAES
Securing Wireless Sensor Network (WSN) from variable forms of adversary is still an open end challenge. Review of diversified security apprroaches towards such problems that they are highly symptomatic with respect to resiliency strength against attack. Therefore, the proposed system highlights a novel and effective solution that is capable of identify the spurios request for participating in teh network building process from attacker and in return could deviate the route of attacker to some virtual nodes and links. A simple trust based mechanism is constructed for validating the legitimacy of such request generated from adversary node. The proposed system not only presents a security solution but also assists in enhancing the routing process significantly. The simulated outcome of the study shows that proposed system offers significantly good energy conservation, satisfactory data forwarding performance, reduced processing time in contrast to existing standard security practices.
A New Data Stream Mining Algorithm for Interestingness-rich Association RulesVenu Madhav
Frequent itemset mining and association rule generation is
a challenging task in data stream. Even though, various algorithms
have been proposed to solve the issue, it has been found
out that only frequency does not decides the significance
interestingness of the mined itemset and hence the association
rules. This accelerates the algorithms to mine the association
rules based on utility i.e. proficiency of the mined rules. However,
fewer algorithms exist in the literature to deal with the utility
as most of them deals with reducing the complexity in frequent
itemset/association rules mining algorithm. Also, those few
algorithms consider only the overall utility of the association
rules and not the consistency of the rules throughout a defined
number of periods. To solve this issue, in this paper, an enhanced
association rule mining algorithm is proposed. The algorithm
introduces new weightage validation in the conventional
association rule mining algorithms to validate the utility and
its consistency in the mined association rules. The utility is
validated by the integrated calculation of the cost/price efficiency
of the itemsets and its frequency. The consistency validation
is performed at every defined number of windows using the
probability distribution function, assuming that the weights are
normally distributed. Hence, validated and the obtained rules
are frequent and utility efficient and their interestingness are
distributed throughout the entire time period. The algorithm is
implemented and the resultant rules are compared against the
rules that can be obtained from conventional mining algorithms
An efficient educational data mining approach to support e-learningVenu Madhav
The e-learning is a recent development that has
emerged in the educational system due to the growth of the
information technology. The common challenges involved
in The e-learning platform include the collection and
annotation of the learning materials, organization of the
knowledge in a useful way, the retrieval and discovery of
the useful learning materials from the knowledge space in a
more significant way, and the delivery of the adaptive and
personalized learning materials. In order to handle these
challenges, the proposed system is developed using five
different steps of knowledge input such as the annotation of
the learning materials, creation of knowledge space,
indexing of learning materials using the multi-dimensional
knowledge and XML structure to generate a knowledge
grid and the retrieval of learning materials performed by
matching the user query with the indexed database and
ontology. The process is carried out in two modules such as
the server module and client module. The proposed
approach is evaluated using various parameters such as the
precision, recall and F-measure. Comprehensive results are
achieved by varying the keywords, number of documents
and the K-size. The proposed approach has yielded
excellent results by obtaining the higher evaluation metric,
together with an average precision of 0.81, average
Ant-based distributed denial of service detection technique using roaming vir...Venu Madhav
Nowadays, distributed denial of service (DDoS) becomes a major challenge in the network as it affects the
network at multi-level. This leads to traffic overhead and wastage of bandwidth utilisation. In order to overcome these
issues, ant-based DDoS detection technique using roaming virtual honeypots is proposed. In this technique, virtual
roaming honeypot along with the multi-level secure architecture is used to collect the information about the various
intruders at different levels in the network. Ant colony optimisation technique is used to detect the intruders based on
the pheromone deposit on that considered area. A multi-level IP log table is used to detect the intruders at different
levels of the network. Once the affected area is found, the information is sent to multi-level architecture to limit the
spread of the affected area to the honeypot. This information is sent to the honeypot to make a defence system against
the attackers. The advantage of the proposed technique is that it provides a full defence against DDoS at multi-level
without creating any traffic overhead.
Human muscle rigidity identification by human-robot approximation characteris...Venu Madhav
In the health care system and Internet of Things (IoT) platform, medical care robotics is
becoming one of the quickest expanding areas of robot technology. The integration of
robotics and human knowledge identifies human muscle rigidity from the healthcare
data obtained from the wearable sensor. In an IoT platform, Electromyography is a
method used for evaluating and tracking the electrical activity of muscles. The transferring
of human muscle rigidity to a robot facilitates the robot to obtain resistive management
initiatives in a useful and effective way while carrying out physical interaction
activities in unstructured surroundings. The major challenges to overcome the
unpredictability during physical interaction allow a robot to realize the individual behaviour
with adaptability and versatility of muscles. Therefore, in this article, Human-Robot
Approximation Characteristics Framework (HRACF) has been proposed for developing
physiological communication between humans and robots. HRACF permits robots to
understand differential resistive abilities of muscles from human presentations. The
pulses collected from Electromyography are used to retrieve human arm muscle rigidity
during activity presentation. The characteristics of motion and rigidity are concurrently
modelled using an estimation and approximation model with a logistic regression
obtained by IoT devices. The analysed human arm muscle rigidity is then connected to
the robot impedance regulator. HR model uses an optimized resistive approximator to
measure the creative variables of the robot and continue driving to monitor the quoted
pathways at the time of interaction. The relationship between motion data and rigidity
data is systematically coded in the HR model. HRACF makes it possible to detect uncertainties
through space and time that facilitates the robot to meet rigidity specification
to 98[Nm/Rad] and error rate to 0.15% during physical interaction.
Attribute‑based data fusion for designing a rational trust model for improvin...Venu Madhav
Data fusion is reliable in achieving the computing and service demands of the applications in diverse real-time implications.
In particular, security-based trust models rely on multi-feature data from different sources to improve the consistency of the
solutions. The service providing solutions are relied on using the optimal decisions by exploiting the data fusion trust. By
considering the significance of the security requirement in smart city applications connected with the Internet of Things,
this manuscript introduces a rational attribute-based data fusion trust model. The proposed trust model relies on different
timely attributes for identifying the reputation of the available service. This reputation is computed as the accumulative factor
of trust observed at different times and details. The attributes and the uncertain characteristics of the service provider in
the successive sharing instances are recurrently analyzed using deep machine learning to fuse uncertain-less data. This data
fusion method reduces the uncertainties in estimating the precise trust during different application responses and service
dissemination. The performance of the proposed method is verified using the metrics false positive, uncertainty, data loss,
computing time, and service reliability.
Optimized Energy Management Model on Data Distributing Framework of Wireless ...Venu Madhav
Data Dissemination is an essential transmitting method for a sensor network to the endusers
across any set of interconnected frameworks. WSN is often used within an IoT system,
in other words. As in a mesh network, a wide collection of sensors can collect data
individually and send data to the web via an IoT system through a router. The conventional
defined solution for data dissemination in Wireless Sensor Networks (WSN) does not
include the wide range of new applications built on the Internet of Things (IoT)systems.
Hence, it is observed that searching for an appropriate transmission link while distributing
data with optimized utilization of energy is a significant challenge in the IoT communication
infrastructure. Therefore, in this paper, an Optimized Energy Management Model for
Data Dissemination (OEM-DD) framework has been proposed to optimize energy during
data transmission efficiently across all sensor network nodes in the IoT system. The efficiency
of the data dissemination across an interconnected network has been achieved by
introducing a Non-adaptive routing approach in which data is distributed effectively from
a single source to various points. Besides, Non-adaptive routing involves the dispersed collaboration
system and the priority task planning principle combined with an integer framework
for the efficient energy processing and grouping of data in the sensor’s network. Optimization
of the energy management model through Non-adaptive routing allows low power
consumption and minimal energy usage for each sensor node in the IoT system to improve
the transfer and handling of data in severe interruption. The experimental results show that
the suggested model enhances the data transmission rate of 96.33%
Real-time agricultural field monitoring and smart irrigation architecture usi...Venu Madhav
Farming and agricultural production account for a substantial part of the global
economic system, and most people rely on them for their living. In this perspective,
real-time agricultural field monitoring and smart irrigation using modern technologies
are now important for effective farming in green homes, smart cities, and rural
areas. Water is an essential resource to be conserved using the newest technology.
The Internet of Things (IoT) and Industry 4.0 enable smart farming, including
using Quadrotor unmanned aerial vehicles (Q-UAV) with computer vision. The
IoT-based smart irrigation management systems with real-time sensors and Q-UAVs
have contributed to the optimum use of water resources in precision farming. The
research presented an intelligent irrigation and field surveillance system using
atmospheric and soil data such as temperature, humidity, salinity, wind speed, as
well as photographs of the field using UAVs. The parameters mentioned above are
available on the smartphone of the farmers using IoT and are hosted without any
delay in the Firebase console. In addition to this, a user can control the water pump on
various fields via Firebase Cloud Message platform. The intelligence and smartness
of the proposed system are implemented with a powerful and low-cost platform
Raspberry Pi 4B system on chip computer with Industry 4.0 standard dedicated for
IoT, real-time embedded protocol interfacing, and computer vision applications.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
2. Sustainable Energy Technologies and Assessments 52 (2022) 102184
2
characteristics, such as low cost, low power usage, high efficiency,
failure sensitivity, and broad visibility of areas, WSNs have become
increasingly popular [13]. Despite these, WSNs may be prone to attacks
even though their restricted assets are challenging to enforce advanced
cyber methodologies in data transmission [14]. In preserving the sensor
nodes safe and secure, they must be located in difficult locations to ac
cess. The sensor device can increase security in smart grid environments
while consuming less energy.
WSN threats are susceptible to numerous cyber threats, including
Denial of Service (DoS), malware detection, and bugging [15]. DoS
threats are one of the most powerful threats on WSNs [16]. A DoS and
replay attack is a particular type that prevents sensor modules from
waking up to drain their battery packs [17]. An attacker may start DoS
and replay attacks on the sensor network to dismiss specific nodes, cause
issues, and limit data transmission [18]. An offender can incorporate
fake data into the network [19]. An instance is a tapping attack, which
can cause service denial and request reaction system impairment [20].
Researchers engage in some form of communication; it can be normal or
stratified communication. However, normal communication is a
different matter altogether when it comes to distributing messages. This
technical term in stratified communications describes the act of mass
communication. Things like radio transmissions and other forms of
technology fall under this category.
DoS and replay attacks can indeed be categorized as a denial-of-
service threat section, and these threats can have severe consequences
on smart grid networks [7]. PDST-EEF focuses on DoSand replaying
attacks against sensor networks because of its criticism of specific smart
power grids. Security processes in sensor networks usually react to at
tacks on various levels, such as physical threats, network layers, and
distribution layers [7]. However, it was not regarded that the nodes
would be isolated from the good attacks by a technique to sustain low
energy usage. Consequently, cybersecurity methods for energy-efficient
sensor networkscan handle different attacks such as DoS and replaying.
Sensor networks have restricted energy usage and are frequently situ
ated in locations that are difficult to achieve such that the sensor nodes
must be securely maintained and monitored. The sensor device can
enhance security levels with less energy usage in the smart grid sur
roundings. The contribution of PDST-EEF is described below.
• PDST is developed to guarantee data privacy by using a cryptogra
pher’s signature concept authentication method to detect different
attacks.
• EEF is modelled on various phases, such as identifying anti-nodes,
group development, and allocating the key with less energy-use
separation. EEF can operate with higher technology of efficiency
while maintaining long-term latency.
• Experimental result shows PDST-EEF are often improved with the
authentication period and less energy consumption.
The remaining manuscript is organized as follows: Section 2 com
prises various background studies related to security maintenance by the
sensor device in smart grid applications. Section 3 Elaborates the pro
posed PDST-EEF to control the threats in data transmission by lowering
the sensor device energy usage in smart grid environments. Section 4
constitutes the results that validate the authentication stage with less
energy usage. Finally, the conclusion with future perspectives is dis
cussed in section 5.
Background study on security maintenance in smart grid
application
This section discusses the researchers’ several works; Yuemin Ding
et al. [21] developed a Constrained Broadcast Scheme with Minimized
Latency (CBS-ML). CBS-ML is presented with minimized latency by a
restricted broadcasting program. CBS-ML limits the Transmission to a
limited set of core nodes to prevent traffic problems. Theoretical
approaches address a selection of core nodes related to network
configuration and connect durability. Sensor nodes for PD tracking are
integrated according to the three-dimensional features of the devices for
the target rate assumption measures. The Standing Guard Protocol fo
cuses on this sensor collaboration system, which aims to verify its impact
on the premise of target identification rate on energy savings and time
reduction.
SungJin Yu et al. [22] introduced Privacy-Preserving Lightweight
Authentication Protocol (PPLAP). The proposed PPLAP resists numerous
attacks and guarantees reciprocal confidentiality and encryption. The
safety characteristics of the proposed system are assessed utilizing an
unofficial safety assessment and demonstrated the key management
workout of the proposed system. Consequently, the proposed scheme
delivers better security and energy efficiency than current connected
guidelines and suits realistic Smart Grid environments.
Uthman Baroudi et al. [23] proposed a genetic algorithm for Ticket-
based QoS routing (GA-TBR). In this work, GA-TBR is used in the
reference sensor node for data collection within the smart grid’s WSN
atmosphere and thus optimizes the choice of paths to guarantee the
necessary Quality of Service. The simulation results showed very few
tickets. The algorithm suggested can choose routes at a small lag po
tential and demonstrates an enhancement of 28 percent contrasted with
the ad hoc protocol.
Yuchen Jia et al. [24] discussed the Wireless sensor network moni
toring algorithm (WSNMA). WSNMA constructs a high-voltage (HV)
partial discharge (PD) monitoring system. The integration plan of sensor
nodes for PD tracking is addressed as per the three-dimensional features
of the devices. The proposal is for a system of sensor collaboration
focused on the Standing Guard Protocol to verify its energy-saving and
time-reducing impact on the premise of the target identification rate. It
uses wireless link properties to decompose the natural SNR sequence
into a time series and a stochastic series. This algorithm has SNR period
limits that are forecast, and comparison experiments are used to eval
uate the preview results’ authenticity and applicability before they can
be used in actual experiments.
Prakash Pawar et al. [25] narrated a Smart Energy Management
System (SEMS). The SEMS is designed to replace, according to the user’s
tendency, the scenario of a whole power failure of a province with a
limited load discharge. Experimental work is demonstrated in supply
reaction considering the highest requirement threshold restriction in
separate situations and changes in priority for the device.
Fei Fan et al. [26] developed Dynamic Barrier Coverage (DBC). DBC
is merged with robot evaluation and a wireless sensor network (WSN). A
reduced, energy-saving and flexible smart grid-centered sensing system
focused on the mobile wireless sensor network would be developed in
the DBC proposed. Moreover, the dynamic barrier coverage method for
the actual smart grid surveillance scene considers the equilibrium
among network quality and financial costs.
Xue Xue et al. [27] introduced a Random-Vector-Functional-Link-
based Link Quality Prediction (RVFL-LQP). The algorithm selects a
qualitative connection measure for a signal-to-noise (SNR) ratio. It
breaks the natural SNR sequence down into a time series and the sto
chastic series based on wireless link properties. Finally, the probability-
guaranteed SNR period limit is forecasted, and comparison experiments
assess the preview results’ authenticity and workability, respectively.
Melike Yigit et al. [28] proposed A new efficient error control al
gorithm (EECA). EECA compares two forward error controls (FCE)
coding technologies like Bose-Chaudhuri-Hochquenghem code (BCH)
and Reed Solomon coding (RS) with various modulation methods, which
include Frequency Shift Keying, Offset Quadrature Phase Shift (OQPSK).
In addition, EECA compares itself in various smart grid environments to
RS static or FEC-free techniques centered on performance measures such
as throughput, Bit Error Rate, or delay.
To overcome all the issues in the smart grid environment in the form
of security measures, PDST-EEF has been developed to maintain the
highest security level by reducing the energy usage for sensor devices in
V. Madhav Kuthadi et al.
3. Sustainable Energy Technologies and Assessments 52 (2022) 102184
3
the smart grid atmosphere. PDST is implemented to maintain the secu
rity level by identifying the different types of attacks in the network. EEF
is designed for high power efficiency to preserve the latency.
Portable and data security tolerance based energy-efficient
framework
PDST-EEF is developed to preserve a high standard of safety by
decreasing the energy usage of sensors in the smart grid environment.
The PDST model provides confidentiality in the sensor network through
a cryptographic signature model by implementing an authentication
method for identifying attacks. PDST can efficiently identify and sepa
rate the various types of attacks, such as service denial. PDST ensures the
data transmission to the base station and the attacks in a sensor network.
PDST has an authentication method integrated with the cryptographic
signature method. The service providers and the control centers monitor
all the attacks like DoS and replay. The smart grid environment includes
the smart home, thermal power plant, factories, wind generator, as
illustrated in Fig. 1. EEF helps to identify antinode, group development,
and allocation of keys; these three stages use less energy in a smart grid
environment and identify threats during the time of data transmission.
PDST model
Authentication method
The authentication method is a reduced subscription system and
works for devices with limited resources. The whole system always
understands standardized participants, and attackers may even be
acknowledged. Group development and key allocation are three stages
of EEF that use less energy in a smart grid environment even while
Fig. 1. The architecture of PDST-EEF.
Fig. 2. The security maintenance by authentication and cryptographic method.
V. Madhav Kuthadi et al.
4. Sustainable Energy Technologies and Assessments 52 (2022) 102184
4
identifying threats during data transmission. The three stages are iden
tifying antinode, group development, and allocation of keys. The system
would be known as the false positive likelihood and variable for
measuring the safety level in the smart grid environment. The authen
tication method involves encryption, decryption, and the authenticated
key generation stage. Select the variables l with two larger primary
digits a, b where |a|=|b|, and calculate δ = (a − 1, b − 1) based on the
safety variables l. Set a feature k(V) = V− 1
m ; m = ab. The alternator is
selected h ∈ A*
m2
, calculate δ(k(hδ
‖m2
)− 1
. The generation of the public
key is p = (m, h), and the secret key is s = (δ, α). Encryption is imple
mented when the text is sent by n ∈ Am, and e ∈ A+
m can be measured.
The text of a particular count can be calculated as D = C(A) =
hn
.em
‖m2
. The decryption is provided with the encoded data with a
secret key E(d) = k
(
αδ‖m2
)
.δ‖m is used to reconstruct the original signal.
The authentication stage is implemented by the false-positive chance,
and it is shown below.
⎧
⎪
⎨
⎪
⎩
D = C(A) = hn
.em
‖m2
E(d) = k
(
αδ‖m2
)
.δ‖m
positivelikelihood = (J − a− lM/n
)l
(1)
The implementation of the authentication stage is obtained from
Equation (1), J represent the number of changes in the safety level, a
denote the false positive likelihood function, M is the size described for
the amount of authenticated users during startup phases n. l denote the
number of devices. Devices with limited resources can use this authen
tication method because it uses a reduced subscription system. The
system understands standardized participants based on equation (1),
and even attackers are acknowledged. False-positive likelihood and
safety level in the smart grid environment ensures system’s metric by
encryption, decryption, and the generation of an authenticated key are
all part of the authentication process.D denote the decryption, E(d)
represent the encryption stage, C(A) denote the text content.hn
denote
the number of key functions, m2
is the number of variables, em
represent
the encoded data, k
(
αδ‖m2
)
denote the secret key in encryption. The
participants represent the number of smart grid application users in
which data security must be ensured. The smart gid environment should
ensure the security level to overcome the DoS and replay attacks by the
authentication and cryptographic method, as shown in Fig. 2.
The sender and the intended receiver of a message can see the
message’s contents encrypted with cryptographic techniques. As the
Greek word Kryptos implies, it refers to something hidden. Individuals
can decrypt and decode the text if the message is intercepted. The
authentication method assists a highly complicated signature method
filter arriving signals from theDoS attack in the smart grid environment.
The cryptography is the benefit of one such system, and the recipient end
delay can be regulated with the binomial threshold value with each
riddle stiffness as described below.
mG,k =
a{1 − [
(1− 10− 10
)
k2
high
(
k −
(
khigh + 1
)
)2
]}
a{1 − (1
2
)k
}
(2)
The recipient end delay mG,k can be regulated from Equation (2), the
threshold value restricts the series of cryptographic iterations focused on
a predefined authentication stage represented in the significance of the
challenge k2
high. a denote the false positive likelihood function, k repre
sents the threshold value. The largest amount of cryptographic iterations
in the polynomial limit feature for each riddle creation is shown below.
mG =
a{1 −
[
(1− 10− 10
)
k2
high
(
l − khigh + 1
)
)2
]}
a{1 − (1
2
)l
}
(3)
The polynomial limit feature mG for each iteration are obtained from
Equation (3), khigh is the beginning force with the threshold value. If the
amount of cryptographic iterations is above the target value and would
be reduced by a lower limit. If the outcome of riddle hardness k is larger
than one, the riddle answer is discovered. The final stage is the pro
duction of tags. This tag would then alter the mechanical properties of
the indicator and riddles. The label is k -bits in a particular distance. The
entire process to ensure security in the authentication method is
described below in the developmental security algorithm.
The developmental security algorithm.
Signature ← value_Polynomial (G).
If iter < limit_value(k)then.
k ← k + 1.
Repeat (Iter).
End.
Crypt a ← authentication_.mG,k(G‖khigh)
Iter = iter-1.
End.
If k ∕
= 0, then.
1_value.
Else.
A.←a + 1
End.
Algorithm 1 described above is used to determine the appropriate level
of security. The polynomial security algorithm shows the steps of the
authentication method. Authentication is the first step in the develop
ment of a security algorithm. The next step is to create a riddle that
meets the iterations (iter), and the actual quality of the riddle is khigh. The
label is k -bits in a particular distance.
The PDST model for WSN is useful in identifying the DoS and replay
attacks and depends without a sorting procedure on a principal signa
ture method.PDST uses a source delay-controlled riddle system to ensure
the privacy of the signal conveyed with cryptography. The framework
for subscription relation illustrates the interaction among the sensor
network, user, investigator. The investigator must log in to their
decryption key and access code with developers that wish to connect the
WSN. The first step in authentication is to identify the user, and the
latter is to authenticate the user at the central level. A real user’s in
dividuality is supplied in the id number and verification during the first
step of the authentication system. However, this will not mean that the
visitor has been authenticated even though the first step has been suc
cessful. Provided l variables to select two basic values ar = br = l and
develops the key for the symmetric key cryptographic protocol oper
ating op(l) with the digital signature. The digital signature with the
public key p : (M = arbr, h) and the secret key s : (δ,α). The investigator
describes the functionality in the form of four stages like G : (1, 0)+
→A+
A ,
G1 : (1, 0)+
→H, G2 : (1, 0)+
→A+
A , G3 : (1, 0)+
. The client V’
j r with the
identification stage IdentityVj
. IdentityVj
∈ (1, 0)+
, client calculation V’
j r
private identification Ridentityj
= G1(Identityj). The authenticated data is
stored by a structure-like box over which the cryptographic key has been
chosen, unavoidable.The network’s participants are observed and
investigated to guarantee that security measurements are taken. The key
sequence provides the security measurement using equation (4).The
cryptographic finding is a peculiar situation, which symbolizes the exact
location in the authentication method, as explained below.
⎧
⎪
⎪
⎨
⎪
⎪
⎩
Ridentityj
= G1
(
IdentityVj
)
V’
j r = (1, 0)+
G : A→J × K + (D*mG) + 1
(4)
The cryptographic finding is obtained from Equation (4), the box
count is denoted as A, the structure indicator K, and the signature J. G is
the combination of username and digital signature at WSN. The inves
tigator must assess the actual valuation D with the reasonable false-
positive possibility mG and fingerprint thickness of the amount of box
V. Madhav Kuthadi et al.
5. Sustainable Energy Technologies and Assessments 52 (2022) 102184
5
count.IdentityVj indicate the identification stage. V’
j r represent the cli
ent’s identification stage, Ridentityj
denote the complete stage of identifi
cation. The interaction among the participants in the network is
monitored and investigated to ensure security measurement. The secu
rity measurement is ensured by the sequence of keys, as shown in Fig. 3.
Depending on the number of authorized participants, the data
capability has to be initiated. The cryptographic finding inhibits higher
inventory processing, particularly in sensor nodes.The authentication
method and cryptographic signature method distinguish the key
sequenceaccording to the box’s capability used for encryption. To the
receiver, a cryptographic signature serves as proof that the document is
being approved by the person claiming to use it. An authentication
method guarantees that the sender cannot later claim that they never
sent the message.The number of boxes is reduced if the predicted
number of verified participants in each box complies with the total
number of sequences. The number of boxes is finalized when the first
comment is not met. The encryption stage for ensuring the security level
is displayed below.
A =
(
M
δ.D
)
+ [1 −
M
(
M
δ.D
)
.D
+ 1 −
M
(
M
δ.D
)
.D
] (5)
The encryption stage for ensuring security level is obtained from
Equation (5). The outcome is the number of exact keys A used for
encryption, where it can be utilized to measure the ordinary quantity of
pieces in the sequence δ, the median amount of material M. The same
could be used to evaluate the ability of each box by utilizing such var
iables,and the storing capacity (SC) is shown below.
{
Aability =
[
D × δordinary
]
SC = [A × (D2A) + K +
(
Bcap × (box + 1)
)] (6)
The ability of the box Aability by utilizing variables and the storing
capacity Bcap can be utilized from Equation (6) for measuring the ordi
nary quantity of pieces δordinary. The cryptographic discovery involves
two keys to encrypt and decrypt data in these applications, which are
called public-key encryption (PKI). Encryption authentication uses
digital identifiers and exceptional codes for each party to stop these
attacks. An official authenticates signature and secret.The element
length is denoted as D and the distance of the signature (box) S. The
combined stocking needed to develop the encrypted key is determined
by the box capability, biometric data amount, chain primary keys, and
the number of keys used.
The interaction between users and investigators with WSN can begin
when the sensor nodes accept the stages for interaction in actual envi
ronments. The smart grid application describes the sender’s and re
cipient’s procedures. The cryptographic signature method has been
selected for the duration of encrypted code to ensure security re
quirements. The cryptographic signature method utilizes the possibility
Fig. 3. Security measurement stages.
Fig. 4. The cryptographic and signature method.
V. Madhav Kuthadi et al.
6. Sustainable Energy Technologies and Assessments 52 (2022) 102184
6
option with the median amount of material denoted as {M1, M2…..Ml}
and the element length {D1, D2…..Dl} as shown in Fig. 4. The storage
capacity box has an encrypted code, single-way key, event key with the
data series.
The procedure continues with the key management of the challenge.
A single-way key string uses the random number as the primary algo
rithm and generates the event key. The key channels are described
below.
∏
Ma− 1
j=1
Gj
(a)
∏
a; a ∈ unspecified (7)
The channels for each key in the cryptographic method is obtained
from Equation (7), Where Ma− 1 is predicted and Gj
(a) implies the secret
key that would be repeated for different values. Ma− 1 is the significance
of the most recent version of the main chain creation with the unspec
ified values. PDST model attains privacy in sensor networks, and the
various types of attacks are detected by the authentication method in
tegrated with the cryptographic signature model.
Energy-Efficient framework
With smart grid tracking applications, EEF gains low power cyber
safety on WSN. The three phases are used in EEF with less energy con
sumption and preserve sustained latency.
Identifying antinode
In an attempt to improve cybersecurity toward DoS and replay at
tacks, the network must distinguish among legitimate users and hidden
nodes just before creation. All anit-node can be removed from the WSN
network and implemented in smart grid applications. Therefore, the
anti-nodes could be removed from the layout of the network in smart
grid implementation. Every client Vj gathers information (b1, b2, ⋯⋯bm)
by antinode separation (ANi) at a particular time s ∈ S and execute steps
to produce V’
j summary. V’
j determines the sequence number G(s). The
randomly generated ej ∈ A*
m is selected, and the encrypted data calcu
lated after the authentication to identify the antinodeis shown below.
Dj = (h’
)bj
.G(s)H(aj).Ki(0)
.SM
j ‖M2
= hk.bj
.G(s)h(aj).kj(0)
.SM
j ‖M2
(8)
The authentication stage to identify the antinode is obtained from
Equation (8), G(s)H(aj).Ki(0)
denote the encryption stage, G(s)h(aj).kj(0)
represent the decryption stage, (h’
)bj
represent the number of antinodes,
SM
j separation of antinode, M denotes the number of users.
Group development
Group Development is often used to choose pattern heads and an
entry point node for intra-group and inter-group interaction and divide
the sensor network into different groups. A node with the highest
number of neighbors is a potential candidate for node formation and
cluster heading. Sensor nodes are coordinated into groups by allocating
a group identification with the necessary data. All sensor nodes notify
the data of their neighbors to choose the new cluster head.The control
center sets the grouping limit as per current energy usage and the pos
sibility of damage in the sensor node. The proportion r ∈ Am is selected,
r +r0= 0‖M is calculated, and the number r ∈ Am with l(l ≥ m) is for
warded to the destination gateway. Then, the secret variable would be
partitioned into m parts with more respondents H(a). Control center
delivers {H
(
aj
)
, ki(0)} to Vj with the safety platform. The respondent’s
data delivery rate is shown below.
H(a) = r0 + i1a + i2a + ⋯.. + il− 1al− 1
Ki(a) = Ul
j=1,i∕
=1
a − aj
ai − aj
⎫
⎪
⎬
⎪
⎭
(9)
The respondent’s data delivery rate is obtained from Equation (9),
here i1a +i2a +⋯.. +il− 1al− 1
represent the number of the sensor node,
Ki(a) denote the control center delivery rate, ai, aj represent the number
of secret variables chosen, r0 represent the proportion.
Allocation of keys
Multiple secret keys would be circulated and encoded by a pre-
distributed key in allocating keys. In allocating keys, the initial step is
the group key provided among the group head, and the next step is a
portal that is exchanged across two groups to ensure safe communica
tion. After the above-described antinode detection stage, allocating keys
eliminates the unused anti-nodes already introduced in the network.
Allocation of the key is necessary to improve the safety of interaction
between groups.
Cyber safety on sensor network
The real-time data users gather energy usage for every step, deliver
queries to consumers, and obtain an exact energy usage pattern.The
Control Centre generates an arbitrary amount k∊Mn to the first time and
calculates h’
= hk
. The information-gathering application is then sent to
the client Vj ∈ V and sent to the gateway. The client Vj ∈ V would then
pick an irregular quantity bj ∈ Mn and then deliver the data packets to
predict the secret identification values Rb
identity. The pre-generated key
encrypts the query Vk
j for Transmission of data among the client and
gateway. The data transmission between the client, gateway and the
gateway and client is shown below.
clientj→gatewayi : {Rb
identityj
‖Ridentityj
}Vj
gatewayi→clientj: {Rb
identityj
‖Ridentity‖Ra
identityi
⎫
⎬
⎭
(10)
The smart grid improves conversation, technology, and intercon
nection of power network components for users can interact. Data
Fig. 5. The data transmission between the client and the gateway.
V. Madhav Kuthadi et al.
7. Sustainable Energy Technologies and Assessments 52 (2022) 102184
7
analysis helps power plants better anticipate and respond to high de
mand in the smart grid application in an actual environment. The data
transmission is obtained from Equation (10), clientj denote the client
node, gatewayi represent the gateway node, Rb
identityj
denote the secret
identification values, Ridj
represent the number of values, Vj denote the
number of clients. Gateway gatewayi would then decode the values from
an arbitrary amount aj ∈ Mn after getting the data packet from the client
and calculates Ra
identityj
to the client Ridentityj
. The data transfer by the
sender and receiver during the active and rest mode is illustrated in
Fig. 5.
The Cybersafety approach depends on the verification method and
consists of the recipient’s verification using a workout key according to
level 1. In Level 1, the transmitter groups respond and generate a
declaration containing a safe token for the sender and recipient identi
fication. For one hash functions, the safe sign,sign = g(Ld|Mr) with a
group key Ld and an irregular quantity Mr Chosen as an input by the
recipient.The randomly generated choice g is streamlined because the
hacked identity and controller unit indicates the combination of frames.
The final relationship gives the energy usage on the sensor network is
described below.
eu = [(Ecu × Dcu) + (Erm × Dcu)] (11)
The energy usage on the sensor network eu is obtained from Equation
(11), Ecu denote the energy of controller unit inactive phase, Dcu repre
sent the active controller unit and operating period in stages, Erm denote
energy in the silent phase.
The recipient goes away to sleep and conserves energy when the safe
item is inaccurate. The recipient then calculates the request key when
the token is checked.The sender’s station would be transmitted during
the transaction period and then attend regularly to the recipient for the
identification stage. The token transfer between sender and receiver has
antinode identification, allocation key, group development. The
Fig. 6. Energy usage during the active and rest mode.
Fig. 7. Energy usage during signal transmission.
V. Madhav Kuthadi et al.
8. Sustainable Energy Technologies and Assessments 52 (2022) 102184
8
controller unit initiates the Transmission between the administrator.
The energy usage during the rest and active mode during signal trans
mission is shown in Fig. 6.
The broadcast of the recipient is received, and the controller unit is
effective after the last declaration has been received. The mentioned
relationship gives the energy usage as shown below.
eu= [Ecu × (DI + DIat) + (Esx + DI) + (Erx × DIat) (12)
The relationship gives the energy usage eu in smart grid applications
is obtained from Equation (12), DI represent the period of introduction,
DIat denote the identification stage, Ecu denote the energy of controller
unit inactive phase, Esx represent senders sign in the form of the original
text, Erx represent the receiver token for declaration. The receiver must
have the same period as the transmitter calculation period. As soon as
the safe item is inaccurate, the recipient sleeps and saves energy. When
the token is checked, the recipient calculates the request key. During the
transaction period, the sender’s station would be transmitted, and then
the recipient would be regularly visited for identification.Thetransmitter
and receiver have the following relationships to their energy usage:
{
et = (Ecu × Dcu) + (Eidle × Dcu)
er = (Ecu × Dcu) + (Erest × Dcu)
(13)
The energy usage among the transmitter et and the receiver er is
obtained from Equation (13), Ecu denote the energy of controller unit
inactive phase, Dcu represent the active controller unit, Eidle denote the
energy usage in idle state, Erest represent the energy usage in the resting
state. In the energy usage phase, the transmitter and receiver signals are
transmitted and received in the same configuration. The two controller
units are still active. The energy usage during the signal transmission is
described below.
(
et = (Ecu × Dtransmitter) + (Etransmitter × Dtransmitter)
er == (Ecu × Dreceiver) + (Ereceiver × Dreceiver)
)
(14)
The energy usage during Transmission is obtained from Equation
(13), (14), et represent the transmitters state, er denote the receiver state,
Etransmitter represent the path followed by the transmitter, Dtransmitter denote
the communication period by the transmitter, Ereceiver denote the path
followed by the receiver, Dreceiver denote the communication period of the
receiver. The Transmission of a signal between the transmitter and the
receiver, the path followed is illustrated in Fig. 7. The event key gen
eration during signal transmission and the energy usage follows an
active path.
PDST-EEF ensures the data security standards with less energy usage
by sensor devices in smart grid environments. The data privacy in sensor
networks is obtained by the authentication method combined with the
cryptographic signature method to detect attacks. EEF achieves cyber
safety on sensor networks with less energy consumption.
Results and discussion
The experimental section PSDT-EEF was validated by utilizing 200
nodes within the 200 × 200 m network region. This integration method
has been used with a simulation sustained frame rate generator to
specify the communication structures with numerous security measures.
Every node has been connected to one single node with the desired
location. During the iterations, the activation moment of the outlets has
been evenly split, and the modeling setting is presented energy usage
and security level. The simulation parameters of PSDT-EEF are shown in
Table.1.
The standard procedure is a non-preventive key focus provider
whenever a higher importance data signal reaches the scheme and does
not disrupt the service of lesser priority data messages. The entry rates
for smart grid applications based onPSDT-EEF and the data delivery
rates are obtained from M = Rs
E . δ = M × A × E. Here M is the test
quantity per phase; the data rate is denoted as Rs, the structure peri
odicity is represented as E, the delivery ratio is denoted as δ, and the data
delivery rate of PSDT-EEF is shown in Fig. 8. (a). The destination method
is immense in the waiting delay framework, even if happenings in the
Smart Grid environment regularly occur at sustained average rates.
The delay rate of PSDT-EEF is illustrated in Fig. 8.(b). Although the
data messages are served with specified periods, all the data packets
with equivalent durations have the average length ina probabilistic
manner.The energy usage is the energy specification dedicated to con
sideringenergy flow from the basic sender node to the destination. En
ergy confidence attempts to measure whether such a node contains
sufficient leftover energy to finish new interaction and data handling to
measure battery life. xandy are two different groups, and the computa
tional form is given as Esa,b = (Esd
a,b + Esi
a,b)/2. The energy usage among
Table 1
The simulation parameters of PSDT-EEF.
Number of Parameters Obtained Values
Number of nodes 200
Data delivery rate (%) 98.56
Energy usage (%) 5.06
Throughput (%) 94.66
Delay (ms) 2.1
Fig. 8. (a) Packet delivery rate, (b) Delay.
V. Madhav Kuthadi et al.
9. Sustainable Energy Technologies and Assessments 52 (2022) 102184
9
all nodes in WSN is calculated from the above Equation. Here a, b rep
resents the number of nodes. Esd
a,b, Esi
a,b representthe primary and sec
ondary points in which the energy flows from one cluster head to
another. The energy usage of PDST-EEF is shown in Fig. 9. (a).
The performance relates to a communication connection to the
typical data ratefor effective data or message distribution. Network
performance in bits per second is evaluated based on the throughput
values. The throughput of PDST-EEF is shown in Fig. 9.(b). The inter
ference can describe the lifespan of the entire network among the set up
of the network’s packet adsorption and the initial node disruption,
which results in a battery decrease. The lifespan of the entire network is
shown in Table.2.
The impact of the attacks on the reliability of various attacks dura
tions is described as the possibility of effective packet transmission. Data
or message distribution effectiveness depends on a specific communi
cation connection operating at a standard data rate. A network’s
throughput values are used to calculate its bit rate. The reliability is 100
percent under normal conditions without attacks. The trustworthiness
for a minute is 50 percent. The reliability of PDST-EEF depends on the
security level in various threats. The reliability of PDST-EEF is shown in
Fig. 10. (a) The control center of the transmitter continues to remain
inactive state for security handling throughout the data encryption
authentication, and the broadcast can go into sleep mode. The re
cipient’s watching time must be the same as the sender’s calculation
time. The security level of PDST-EEF is shown in Fig. 10.(b).
When attacks occur at node and antinode, the sender’s mean energy
Fig. 9. (a) Energy Usage, (b) Throughput.
Table 2
The lifespan of the entire network in PDST-EEF.
Nodes in the network (hrs) Lifespan
20 120
40 90
60 85
80 113
100 120
120 125
140 109
160 105
180 88
200 97
Fig. 10. (a) Reliability of network, (b) Security level.
Table 3
The interaction and the computational delay.
Condition Sender (ms) Receiver (ms)
Interaction 10.34 9.76
Computational 9.33 8.44
Attack in node PDST-EEF
Interaction 5.77 6.88
Computational 8.66 8.90
V. Madhav Kuthadi et al.
10. Sustainable Energy Technologies and Assessments 52 (2022) 102184
10
consumption is measured from the security level. The energy consumed
by the transmitter is usually less for fewer nodes.Whenever an antinode
targets every 60 s, the combination of multiple packets sent to the
receiver decreases with the reducing power usage. The interaction and
computational delay for the sender and receiver in normal conditionsare
shown in Table 3.
The proposed PDST-EEF achieves the highest reliability and less
energy consumption when compared with other existing Random-
Vector-Functional-Link-based Link Quality Prediction (RVFL-LQP),
Constrained Broadcast Scheme with Minimized Latency (CBS-ML), ge
netic algorithm for Ticket-based QoS routing (GA-TBR).
Conclusion
This paper presents PDST-EEF to maintain a high level of data se
curity by reducing energy consumption in a smart grid environment. The
PDST model provides data privacy in sensor networks with a crypto
graphic signature model embedded withan authentication method to
detect various attacks. PDST identifies and separates various attack
types such as DoS and replay attacks. EEF presents a low-power cyber
security mechanism with smart grid tracking applications in the sensor
network. EEF is modeled on various stages such as anti-nodes identifi
cation, group development, and allocating keys with less energy usage.
EEF can operate with higher technological efficiency while maintaining
sustained performance and reliability. The experimental findings show
that the standard requirements of the PDST-EEF lead to the lesser energy
consumption of 5.06%.This work’s PDST-EEF shortcoming involves
identifying and separating for two types of attacks alone (DoS and replay
attacks). These can be used for more types of attacks to provide security
in the future.
Declaration of Competing Interest
The authors declare that they have no known competing financial
interests or personal relationships that could have appeared to influence
the work reported in this paper.
References
[1] Gunduz MZ, Das R. Cyber-security on a smart grid: Threats and potential solutions.
Comput Netw 2020;14(169):107094.
[2] Khalil EE. In: Solving Urban Infrastructure Problems Using Smart City
Technologies. Elsevier; 2021. p. 249–68. https://doi.org/10.1016/B978-0-12-
816816-5.00012-7.
[3] Kaur K, Garg S, Kaddoum G, Kumar N, Gagnon F. SDN-based internet of
autonomous vehicles: an energy-efficient approach for controller placement. IEEE
Wirel Commun 2019;26(6):72–9.
[4] Zandonà A, Vasta R, Chiò A, Di Camillo B. A Dynamic Bayesian Network model for
the simulation of Amyotrophic Lateral Sclerosis progression. BMC Bioinf 2019 Apr;
20(4):1.
[5] Liu Z, Wang D, Wang J, Wang X, Li H. A blockchain-enabled secure power trading
mechanism for smart grid employing wireless networks. IEEE Access 2020;8:
177745–56.
[6] Velusamy D, Pugalendhi GaneshKumar. Water cycle algorithm tuned fuzzy expert
system for trusted routing in smart grid communication network. IEEE Trans Fuzzy
Syst 2020;28(6):1167–77.
[7] Du D, Li X, Li W, Chen R, Fei M, Wu L. ADMM-based distributed state estimation of
the smart grid under data deception and denial of service attacks. IEEE
Transactions on Systems, Man, and Cybernetics: Systems 2019 Feb 26;49(8):
1698–711.
[8] Rath M, Tomar A. In: Advances in Smart Grid Power System. Elsevier; 2021.
p. 191–212. https://doi.org/10.1016/B978-0-12-824337-4.00007-2.
[9] Oozeer MI, Haykin S. Cognitive dynamic system for control and cyber-attack
detection in smart grid. IEEE Access 2019;7:78320–35.
[10] Kimani K, Oduol V, Langat K. Cybersecurity challenges for IoT-based smart grid
networks. Int J Crit Infrastruct Prot 2019 Jun;1(25):36–49.
[11] Islam SN, Baig Z, Zeadally S. Physical layer security for the smart grid:
vulnerabilities, threats, and countermeasures. IEEE Trans Ind Inf 2019;15(12):
6522–30.
[12] Abujubbeh M, Al-Turjman F, Fahrioglu M. Software-defined wireless sensor
networks in smart grids: An overview. Sustainable Cities and Society 2019;51:
101754. https://doi.org/10.1016/j.scs.2019.101754.
[13] Watt AJ, Phillips MR, Campbell CA, Wells I, Hole S. Wireless Sensor Networks for
monitoring underwater sediment transport. Sci Total Environ 2019 Jun;1(667):
160–5.
[14] Hassan MU, Rehmani MH, Chen J. Differential privacy techniques for cyber-
physical systems: a survey. IEEE Commun Surv Tutorials 2020;22(1):746–89.
[15] Lalos AS, Kalogeras AP, Koulamas C, Tselios C, Alexakos C, Serpanos D. Secure and
safe iiot systems via machine and deep learning approaches. Security and Quality
in Cyber-Physical. Systems Engineering 2019:443–70.
[16] Al-issa AI, Al-Akhras M, ALsahli MS, Alawairdhi M. Using machine learning to
detect DoS attacks in wireless sensor networks. In2019 IEEE Jordan International
Joint Conference on Electrical Engineering and Information Technology (JEEIT)
2019 Apr 9 (pp. 107-112). IEEE.
[17] Park H. Anti-Malicious Attack Algorithm for Low-Power Wake-Up Radio Protocol.
IEEE Access 2020;8:127581–92.
[18] De Rango F, Potrino G, Tropea M, Fazio P. Energy-aware dynamic Internet of
Things security system based on Elliptic Curve Cryptography and Message Queue
Telemetry Transport protocol for mitigating Replay attacks. Pervasive Mob
Comput 2020;61:101105. https://doi.org/10.1016/j.pmcj.2019.101105.
[19] Maimon D, Santos M, Park Y. Online deception and situations conducive to the
progression of non-payment fraud. Journal of Crime and Justice 2019;42(5):
516–35.
[20] Sommovigo V, Setti I, O’ Shea D, Argentero P. Investigating employees’ emotional
and cognitive reactions to customer mistreatment: an experimental study.
European Journal of Work and Organizational Psychology 2020;29(5):707–27.
[21] Ding Y, Tian Y-C, Li X, Mishra Y, Ledwich G, Zhou C. Constrained broadcast with
minimized latency in neighborhood area networks of smart grid. IEEE Trans Ind Inf
2020;16(1):309–18.
[22] Yu S, Park K, Lee J, Park Y, Park Y, Lee S, et al. Privacy-preserving lightweight
authentication protocol for demand response management in the smart grid
environment. Applied Sciences 2020 Jan;10(5):1758.
[23] Baroudi U, Bin-Yahya M, Alshammari M, Yaqoub U. Ticket-based QoS routing
optimization using genetic algorithm for WSN applications in smart grid.
J Ambient Intell Hum Comput 2019;10(4):1325–38.
[24] Jia Y, He P, Huo L. Wireless sensor network monitoring algorithm for partial
discharge in smart grid. Electr Power Syst Res 2020;189:106592. https://doi.org/
10.1016/j.epsr.2020.106592.
[25] Pawar P. Design and development of advanced smart energy management system
integrated with IoT framework in the smart grid environment. J Storage Mater
2019 Oct;1(25):100846.
[26] Fan F, Ji Q, Wu G, Wang M, Ye X, Mei Q. Dynamic barrier coverage in a wireless
sensor network for smart grids. Sensors 2019 Jan;19(1):41.
[27] Xue X, Sun W, Wang J, Li Q, Luo G, Yu K. RVFL-LQP: RVFL-based link quality
prediction of wireless sensor networks in smart grid. IEEE Access 2020;8:7829–41.
[28] Yigit M, Boluk PS, Gungor VC. A new efficient error control algorithm for wireless
sensor networks in smart grid. Computer standards & interfaces 2019 Mar;1(63):
27–42.
V. Madhav Kuthadi et al.