SlideShare a Scribd company logo
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
139
Certain Investigations on Security Issues in Smart Grid
over Wireless Communication
S.Fathima1
1
PG Scholar, Department of Computer Science and Engineering
SNS College of Technology Coimbatore,
Dr.S.Karthik2
Dean & Professor, Department of Computer Science and Engineering
SNS College of Technology Coimbatore,
Abstract— Smart Grid (SG) communication has recently received significant attentions to facilitate intelligent and distributed electric power
transmission systems. The advent of the smart grid promises to user in an era that will bring intelligence, efficiency, and optimality to the
power grid. Most of these challenges will occur as an Internet-like communications network is super imposed on top of the current power
grid using wireless mesh network technologies with the 802.15.4, 802.11 and WiMAX Standards. Each of these will expose the power grid to
security threats. Wireless communication offers the benefits of low cost, rapid deployment, shared communication medium, and mobility. It
causes many security and privacy challenges. The concept of dynamic secret is applied to design an encryption scheme for smart grid in
wireless communication. Between two parties of communication, the previous packets are coded as retransmission sequence, where
retransmitted packet is marked as ―1‖ and the other is marked as ―0‖.During the communication, the retransmission sequence is generated at
both sides to update the dynamic encryption key. Any missing or misjudging sequence would prevent the adversary from achieving key. A
Smart Grid platform is built, employing the ZigBee protocol for wireless communication. The Simulation results show that the retransmission
and packet loss in ZigBee communication are inevitable and unpredictable and it is impossible of the adversary to track the updating of
dynamic encryption key. Even though the DES scheme can protect the encryption key from attackers, the hackers can obtain the keys some
time, due to the block size 64 bits used by DES that makes the adversary (hacker) to hack the data. It introduces vulnerabilities and liner crypt
analysis; this can be achieved by using AES scheme. The AES uses 128 bits block size for a single encryption key a data of 256 billion
gigabytes can be transmitted thus its provide much more safety to user from hacker and it reduces the end to end delay and increases packet
transmission rate.
Index Terms— Analyzing Module (AM), Clonal Rate(CR), Smart Grid(SG), WiMAX, ZIGBEE.
——————————  ——————————
1 INTRODUCTION
The Smart Grid (SG) is considered as a desirable infrastructure
for energy efficient consumption and transmission, where the build-
in information flow, facilitate significant penetration of renewable
energy sources into the grid, and empower consumer with tools for
optimized energy consumption. Essentially, its aim is to create a
more flexible, efficient, and reliable power grid. And at the heart of
smart grid infrastructure is the communications network.
Cryptography is a method of storing and transmitting data in a
particular form so that only those for whom it is intended can read
and process it. Cryptography is closely related to the disciplines of
cryptology and cryptanalysis. Cryptography includes techniques
such as microdots, merging words with images, and other ways to
hide information in storage or transit. Cryptography is most often
associated with scrambling plaintext (ordinary text, sometimes
referred to as clear text) into cipher text (a process called
encryption), then back again (known as decryption). Individuals who
practice this field are known as cryptographers. Cryptography plays
a significant role in improving the integrity and confidentiality of the
data in SG. Symmetric cryptographies, such as DES (Data
Encryption Standard), Triple AES (Advanced Encryption Standard),
are widely employed in SG to effectively defend against possible
threats.
Zigbee is a specification for a suite of high-level communication
protocols used to create personal area networks built from small,
low-power digital radios. Zigbee is based on an IEEE 802.15
stanadard. Zigbee is a low-cost, low-power, wireless mesh network
standard targeted at wide development of long battery life devices in
wireless control and monitoring applications. Zigbee devices have
low latency, which further reduces average current. Zigbee chips are
typically integrated with radios and with microcontrollers that have
between 60-256 KB flash memory. Zigbee operates in the industrial
scientific and medical (ISM) radio bands. Data rates vary from 20
kbit/s (868 MHz band) to 250 kbit/s (2.4 GHz band).
1.1 Characteristics of Smart Grid
The principal characteristics of the Smart Grid include the
following,
 Self-healing
 Empowers and incorporates the consumer
 Tolerates security attacks
 Provides enhanced power quality
 Accommodates a wide variety of generation
options
1.2 Advantages of Smart Grid
 The Smart Grid helps determine the life cycle of power
generation and transmission equipment, schedule
preventive maintenance on time.
 The use of robust two-way communication, advanced
sensors, and distributed computing technology improves all
round efficiency, reliability, and safety of energy
transmissions.
 It is greatly helpful to the users in remote areas to get in
touch through wireless communication.
 A modernization of Smart Grid improves the end-use
devices and appliances.
 It decreased customer discontent, greater personal and
economic security, and greater confidence in public
governance.
2. RELATED WORK
Yichi Zhang et al. proposed that a distributed intrusion detection
system for smart grid (SGDIDS) by developing and deploying an
intelligent module, the analyzing module (AM), in multiple layers of
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
140
the smart grid. Multiple AMs is embedded at each level of the smart
grid to improve detection and classify malicious data and possible
cyber attacks. In this paper it achieves effective analysis of
communication traffic and detects the type of attack, its occurrence
into the communication system. But the paper not proposed the
optimal combination of different classification techniques and
different Intrusion Detection System (IDS) for achieving a higher
overall accuracy for intrusion detection. Thus, the scheme is
subjected to vulnerabilities. AffinityThresholdScalar(ATS), Clonal
Rate(CR), Hyper mutation Rate(HR), Stimulation Threshold(ST)
were the parameters considered.
Merits
 Effective analysis of communication traffic.
 It is possible to detect the type of attack, it’s occurrence
into the communication system
Demerits
 The scheme is subjected to vulnerabilities
3. DYNAMIC ENCRYPTION SCHEME FOR SMART GRID IN WIRELESS
COMMUNICATION
Integrating information network into power system is the key
for realizing the vision of smart grid (SG), but also introduces many
security problems. Smart grid is a network of computer and
infrastructures to monitor and manage energy usage. Wireless
communication offers the benefits of low cost, rapid deployment,
shared communication medium, and mobility; at the same time, it
causes many security and privacy challenges during transmission.
The concept of dynamic secret is applied to design an encryption
scheme for smart grid wireless communication. Synchronous data
transmission between sender and receiver using OTF (One Time
Frame), within the time data transmission and acknowledgement
from receiver will be completed, that is treated as OTF. A node
which doesn’t produce the ACK within the time can cause packet
loss where retransmission of packet/data again is done. During the
communication, the retransmission sequence is generated at both
sides to update the dynamic encryption key. Any missing or
misjudging in retransmission sequence would prevent the adversary
from achieving the keys. The retransmission and packet loss in
ZigBee communication are inevitable and unpredictable, and it is
impossible for the adversary to track the updating of the dynamic
encryption key.
3.1 Methodology
The dynamic secret based encryption in smart grid is employed
for securing wireless communication. The basic idea of dynamic
secret is that the legitimate users dynamically generate a shared
symmetric secret key utilizing the inevitable transmission errors and
other random factors in wireless communication.
3.1.1 Smart Grid
The smart grid (SG) is considered as a desirable infrastructure
for energy efficient consumption and transmission, where the built-in
information networks support two-way energy and information flow,
facilitate significant penetration of renewable energy sources into the
grid, and empower consumer with tools for optimized energy
consumption.
3.1.2 Dynamic Secret:
The sender and receiver monitor the error retransmission in link
layer to synchronously select a group of frames. These frames are
hashed into dynamic secret to encrypt the data.
This part is a brief introduction of dynamic secret as follows,
i) Retransmission analysis /OTF set generation:
On the link layer’s communication, error retransmission
happens unavoidable and randomly at both side of the sender and the
receiver. According to Stop-and-Wait (SW) protocol, the sender
transmits a frame and waits for the corresponding acknowledgement
before sending a new frame. If a frame is only transmitted once and
its acknowledgement frame is received in time, this frame is named
as one time frame (OTF).
ii) Dynamic secret generation:
The number of OTF set ¥ reaches the threshold ((length of RS),
the sender and receiver agree on a uniformly random choice of
universal-2 hash functions to compress into the dynamic secret.
Then, the set ¥ is reset to empty.
iii) Encryption/Decryption:
When a new dynamic secret is generated, it will be applied to
update the encryption key at both sides of communication. This
symmetric encryption key is used to encrypt the data at sender and
decrypt the cipher at receiver. To reduce the computation
consumption, the XOR function is used for encryption and
decryption.
3.1.3 DSE Scheme for SG Wireless Communication:
Dynamic secret-based encryption (DSE) scheme is designed to
secure the wireless communication between the smart devices and
control center.The DSE scheme consists of retransmission sequence
generation (RSG), DS generation (DSG), and encrypt/decrypt.
i. Retransmission Sequence Generation (RSG):
This module is applied to monitor the link layer error
retransmission. The communication packets which have been
retransmitted are marked as ―1‖ and the nonretransmitted packets
are marked as ―0.‖ The pervious packets are coded as 0/1 sequence
¥, named as retransmission sequence (RS).In DSE, RS is applied to
replace the OTF set for dynamic secret generation due to the
limitation of computation capability and storage resources.
ii. Dynamic Secret Generation (DSG):
Once ¥ reaches the threshold (length of RS), it would be compressed
to a DS in DSG module. Considering the limitation on computation
power, the hash functions are recommended in DSG module.
a) Encrypt/Decrypt:
The new dynamic secret is applied to update the dynamic
encryption key (DEK) by
DEK(k) is generated at both sides of communication
synchronously. The sender applies it to encrypt the Data, and the
receiver applies it to decrypt the Cipher. XOR function, as one of the
most light-weight and easy-implementation algorithm, is applied to
update the DEK and encrypt/decrypt the data on both sides. If DEK
is shorter than the data, DEK(k) is replicated and padded circularly to
generate whose length is equal to the raw data or cipher text.
DSE scheme is an appropriate solution for securing SG wireless
communication. It can prevent eavesdropping and forging by
utilizing the inevitable errors in wireless communication; can reduce
the cost on computation and storage by applying the simple
algorithms; can self-organize and self-manage.
3.1.4 Attack case in Smart Grid
A smart grid platform is constructed to investigate how the
attacker intercepts the communication of smart meter and injects bad
data into smart meter.
a) Smart grid Platform
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
141
It established with three sides: Smart Terminal (ST), Control
Center (CC), and Adversary. IEEE 802.15.4 standard defines the
physical and MAC layers of ZigBee, while the ZigBee Alliance
defines the network and application layers. Since it is designed as a
low cost, low rate, low power and low complexity personal area
network.
b) Smart terminal
Smart meters are applied to monitor a micro power grid
including various electronic devices for displaying, storing, and
monitoring all relevant system parameters, such as voltages, currents
et al.
c) Control Center(CC)
Several computers are deployed as the CC . On the CC, the
ZigBee module is set as normal mode to communicate with ST.
d) Adversary
On the Adversary, it is set as promiscuous mode to eavesdrop
the communication between the ST and CC.
e) Smart grid attack cases
Most terminal devices in smart grid are connected into intranet,
such as smart sensors and intelligent applications. It is believed that
the malicious users could not access them without the intranet and
Mac address of these devices. The Adversary obtains the address of
the smart meter by monitoring their communication and then injects
the false data into the meter. The Adversary can capture the packet
sent from ST through Zigbee. The address of ZigBee module on
Smart Meter and the short address of coordinator on control center
the measurement can be decoded from the data part of the packet.
Using the captured address, attacker can access the smart meter and
inject false data.
f) Analysis
To analyze the security of DSE, the difference between the RS
on the CC and Adversary should be listed. Then, retransmitted
packet ratio (RPR), packet loss ratio (PLR) and length of RS (L_RS)
are investigated to guide the design of DSE. The number of packets
is transmitted per seconds; the attacker can capture the data without
knowing the packet loss. Control center again retransmit the loss of
data to the terminal. Then attacker can generate the dynamic secret
with the false data and fail to track the DEK without knowledge of
retransmission again he could not start it from the beginning. Thus it
is difficult for the attacker to brute force crack the RS. If the
Adversary tries to crack the RS, the complexity is related to three
key factors: the number of retransmitted packets, the lost packets of
the Adversary and the length of the RS.
4. PARAMETERS
The performance of network were evaluated using the following
metrics,
4.1 Retransmitted Packet Ratio(RPR):
The complexity of RS is determined by the number of the
retransmitted packet. For example, if there is no retransmitted or
non-retransmitted packet, the RS is all-zeroes or all-ones; if there is
only 1 retransmitted packet, the Adversary can easily crack the RS
using brute force. Thus, we need enough retransmitted and non-
retransmitted packets to prevent against the brute force cracking. The
number of retransmitted packet is determined by two factors: the
RPR and the L_RS.
4.2 Packet Loss Ratio
It is the ratio of the number of data packets loss occurs when
one or more packets of data travelling across a computer network fail
to reach their destination.
4.3 Packet Delivery Ratio
It is the ratio of the number of data packets successfully
received by the CBR destinations to the number of data packets
generated by the CBR sources.
4.4 Average End – to – End Delay
It represents the average delay of successfully delivered CBR
packets from source to destination node. It includes all possible
delays from the CBR sources to destinations.
5. RESULTS AND DISCUSSIONS
The evaluation of performance of the Secure Smart Grid (SSG)
protocol was evaluated by comparing it with AODV protocol using
NS - 2 Simulator. The security mechanism in Smart Grid makes use
of data transmission. Here, the analysis is done for security in data
transmission. For comparing the security performance of SSG
protocol, a dynamic secret based encryption scheme is used for
reducing the security issues of data packet during data transmission.
5.1 Performance Analysis for Retransmitted Rate between
AODV Vs. SSG
In AODV protocol due to packet loss which leads to excessive
packet transmission. It is severe when the number of nodes increases.
It is important to reduce retransmission and packet drops. Compared
with AODV protocol, the SSG protocol reduces the rate of
Retransmission.
Figure 3.2: Performance Analysis for Retransmission Rate between
AODV Vs. SSG
5.2 Performance Analysis for Packet Delivery Ratio between
AODV Vs. SSG
The SSG protocol can increase the packet delivery ratio due to
the reduction in security issues and also parallely reduces the packet
drops. On average the packet delivery ratio in SSG protocols is
improved when compared with the AODV protocol.
Figure 3.3: Performance Analysis for Packet Delivery Ratio between
AODV Vs. SSG
5.3 Performance Analysis for Average End – to – End Delay
between AODV Vs. SSG
The SSG protocol reduces the average end – to – end delay due
to a decrease in number of packet drops. The retransmission
increases delay due to too many collisions and interferences thus
leading to excessive packet drops and also increases the number of
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
142
retransmissions. Thus, reducing the retransmission of data packets
the delay can be decreased.
Figure 3.4: Performance Analysis for Average End – to – End Delay
between AODV Vs. SSG
5.4 Performance Analysis for Packet Loss between AODV Vs.
SSG
The SSG protocol significantly reduces the security issues
during the packet transmission. By applying security mechanism to
transmission it reduces the congestion and collision. Thus, compared
with AODV protocol it’s reduces the number of packet loss during
transmission.
Figure 3.5: Performance Analysis for Packet Loss between AODV
Vs. SSG
6. CONCLUSION
A dynamic secret-based encryption scheme is designed to secure
the wireless communication of SG. The DSE scheme can protect the
users against eavesdropping by updating the dynamic encryption key
with retransmission sequence in communication, even the attackers
know the details of DSE scheme and obtain the encryption key at
some time. It is self-contained, that is, it is dynamically generated
during the normal communication without additional traffic and
control command. The generated simulation results depicts the
security issues thus reducing the retransmission of packets due to
packet loss and increase the packet delivery ratio and thus decreasing
the end – to – end delay. But the performance gets reduced, since the
security issues do not properly overcome by Dynamic secret based
encryption. The problem is overcome by using Electing trust head
which reduces the retransmission rate and increased packet delivery
ratio and decreased end to end delay during transmission.
REFERENCES
1. R.Moghe, F. C. Lambert, and D. Divan, ―Smart ―Stick-on‖
sensors for the smart grid,‖ IEEE Trans. Smart Grid, vol. 3, pp. 241–
252, 2012.
2. M. M. Fouda, Z. M. Fadlullah, N. Kato, L. Rongxing, and S.
Xuemin,―A lightweight message authentication scheme for smart
grid communications,‖IEEE Trans. Smart Grid, vol. 2, pp. 675–685,
2011.
3. Z. Yichi, W. Lingfeng, S. Weiqing, R. C. Green, and M. Alam,
―Distributed intrusion detection system in a multi-layer network
architecture of smart grids,‖ IEEE Trans. Smart Grid, vol. 2, pp. 796–
808,201.
4. J. Xia and Y.Wang, ―Secure key distribution for the smart grid,‖
IEEE Trans. Smart Grid, vol. 3, pp. 437–1443, 2012.
5. L. Rongxing, L. Xiaohui, L. Xu, L. Xiaodong, and S. Xuemin,
―EPPA:An efficient and privacy-reserving aggregation scheme for
secure smart grid communications,‖ IEEE Trans. Parallel Distrib.
Syst., vol.23, pp. 1621– 1631, 2012.
6. Zhong Fan, Parag Kulkarni, Sedat Gormus, Costas Efthymiou,
Georgios Kalogridis, Mahesh Sooriyabandara, Ziming Zhu,
Sangarapillai Lambotharan, and Woon Hau Chin, ―Smart Grid
Communications: Overview of Research Challenges, Solutions, and
Standardization Activities,‖ IEEE Communications surveys &
Tutorials, vol.15,No. 1, First Quarter 2013.
7. Y. Ye, Q. Yi, and H. Sharif, ―A secure data aggregation and
dispatch scheme for home area networks in smart grid,‖ in Proc. 2011
IEEE Global Telecommun. Conf., pp. 1–6.
8. H. Li, S. Gong, L. Lai, Z. Han, R. Q. Qiu, and D. Yang,
―Efficient and secure wireless communications for advanced
metering infrastructure in smart grids,‖ IEEE Trans. Smart Grid, vol.
3, pp. 1540–1551, 2012.
9. T. Liu, Y. Gu,D.Wang, Y. Gui, and X. Guan, ―A novel method to
detect bad data injection attack in smart grid,‖ in Proc. IEEE
INFOCOM
Workshop Commun. Control Smart Energy Syst..
10. S.Fathima, Dr.S.Karthick, Mrs.R.M.Bhavadharani, ―Overview
on Network Security and its Vulnarabilities‖,International Journal of
Recent and Innovation Treands in Computing and Communicatiion,
vol.2,Issue:8,August 2014.

More Related Content

What's hot

Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
IJERA Editor
 
International Journal of Engineering Research and Development (IJERD)
 International Journal of Engineering Research and Development (IJERD) International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Secure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wirelessSecure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wireless
Sai Sirisha
 
Security Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area NetworksSecurity Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area Networks
CSCJournals
 
M.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsM.E Computer Science Network Security Projects
M.E Computer Science Network Security Projects
Vijay Karan
 
M.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security ProjectsM.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security Projects
Vijay Karan
 
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
EECJOURNAL
 
Three Tire Proxy Re - Encryption Secret Key (PRESK) Generation for Secure Tr...
Three Tire Proxy Re - Encryption Secret Key (PRESK)  Generation for Secure Tr...Three Tire Proxy Re - Encryption Secret Key (PRESK)  Generation for Secure Tr...
Three Tire Proxy Re - Encryption Secret Key (PRESK) Generation for Secure Tr...
Karthikeyan Ece venkatesan
 
Ijarcet vol-2-issue-3-901-903
Ijarcet vol-2-issue-3-901-903Ijarcet vol-2-issue-3-901-903
Ijarcet vol-2-issue-3-901-903Editor IJARCET
 
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
IJET - International Journal of Engineering and Techniques
 
Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...
IEEEFINALYEARPROJECTS
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
Editor IJCTER
 
Privacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile NetworksPrivacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile Networks
DefCamp
 
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
IJET - International Journal of Engineering and Techniques
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor Network
Editor IJCATR
 
Wsn1 ppt
Wsn1 pptWsn1 ppt
Wsn1 ppt
NamrathaGrandhi
 
50120140507012
5012014050701250120140507012
50120140507012
IAEME Publication
 

What's hot (19)

Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
 
International Journal of Engineering Research and Development (IJERD)
 International Journal of Engineering Research and Development (IJERD) International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Secure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wirelessSecure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wireless
 
Security Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area NetworksSecurity Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area Networks
 
M.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsM.E Computer Science Network Security Projects
M.E Computer Science Network Security Projects
 
M.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security ProjectsM.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security Projects
 
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
 
1678 1683
1678 16831678 1683
1678 1683
 
Three Tire Proxy Re - Encryption Secret Key (PRESK) Generation for Secure Tr...
Three Tire Proxy Re - Encryption Secret Key (PRESK)  Generation for Secure Tr...Three Tire Proxy Re - Encryption Secret Key (PRESK)  Generation for Secure Tr...
Three Tire Proxy Re - Encryption Secret Key (PRESK) Generation for Secure Tr...
 
Ijarcet vol-2-issue-3-901-903
Ijarcet vol-2-issue-3-901-903Ijarcet vol-2-issue-3-901-903
Ijarcet vol-2-issue-3-901-903
 
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
 
Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
Privacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile NetworksPrivacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile Networks
 
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
 
Gw2412271231
Gw2412271231Gw2412271231
Gw2412271231
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor Network
 
Wsn1 ppt
Wsn1 pptWsn1 ppt
Wsn1 ppt
 
50120140507012
5012014050701250120140507012
50120140507012
 

Similar to Certain Investigations on Security Issues in Smart Grid over Wireless Communication

A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRIDA DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
ijcisjournal
 
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
IAEME Publication
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
Editor IJMTER
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
CSCJournals
 
M phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsM phil-computer-science-network-security-projects
M phil-computer-science-network-security-projects
Vijay Karan
 
Ijcnc050210
Ijcnc050210Ijcnc050210
Ijcnc050210
IJCNCJournal
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
Alexander Decker
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
IJERA Editor
 
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
ijassn
 
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
ijassn
 
Final_year_project_documentation
Final_year_project_documentationFinal_year_project_documentation
Final_year_project_documentationUshnish Chowdhury
 
TAM new report
TAM new reportTAM new report
TAM new reportSuzit Punk
 
Container-Beating Approaches for Avoiding Discriminative Cramming Assaults
Container-Beating Approaches for Avoiding Discriminative Cramming AssaultsContainer-Beating Approaches for Avoiding Discriminative Cramming Assaults
Container-Beating Approaches for Avoiding Discriminative Cramming Assaults
International Journal of Engineering Inventions www.ijeijournal.com
 
3 Elsevier Venu Mar 2022.pdf
3 Elsevier Venu Mar 2022.pdf3 Elsevier Venu Mar 2022.pdf
3 Elsevier Venu Mar 2022.pdf
Venu Madhav
 
Data security tolerance and portable based energy-efficient framework in sens...
Data security tolerance and portable based energy-efficient framework in sens...Data security tolerance and portable based energy-efficient framework in sens...
Data security tolerance and portable based energy-efficient framework in sens...
Venu Madhav
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
journalBEEI
 
Sustainable Lightweight Wireless Communication Stack
Sustainable Lightweight Wireless Communication StackSustainable Lightweight Wireless Communication Stack
Sustainable Lightweight Wireless Communication Stack
IJERA Editor
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
JIEMS Akkalkuwa
 

Similar to Certain Investigations on Security Issues in Smart Grid over Wireless Communication (20)

A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRIDA DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
 
1678 1683
1678 16831678 1683
1678 1683
 
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
 
M phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsM phil-computer-science-network-security-projects
M phil-computer-science-network-security-projects
 
Ijcnc050210
Ijcnc050210Ijcnc050210
Ijcnc050210
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
 
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
 
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
 
Final_year_project_documentation
Final_year_project_documentationFinal_year_project_documentation
Final_year_project_documentation
 
Am03402220229
Am03402220229Am03402220229
Am03402220229
 
TAM new report
TAM new reportTAM new report
TAM new report
 
Container-Beating Approaches for Avoiding Discriminative Cramming Assaults
Container-Beating Approaches for Avoiding Discriminative Cramming AssaultsContainer-Beating Approaches for Avoiding Discriminative Cramming Assaults
Container-Beating Approaches for Avoiding Discriminative Cramming Assaults
 
3 Elsevier Venu Mar 2022.pdf
3 Elsevier Venu Mar 2022.pdf3 Elsevier Venu Mar 2022.pdf
3 Elsevier Venu Mar 2022.pdf
 
Data security tolerance and portable based energy-efficient framework in sens...
Data security tolerance and portable based energy-efficient framework in sens...Data security tolerance and portable based energy-efficient framework in sens...
Data security tolerance and portable based energy-efficient framework in sens...
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
 
Sustainable Lightweight Wireless Communication Stack
Sustainable Lightweight Wireless Communication StackSustainable Lightweight Wireless Communication Stack
Sustainable Lightweight Wireless Communication Stack
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
 

More from IJTET Journal

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For Security
IJTET Journal
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
IJTET Journal
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
IJTET Journal
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
IJTET Journal
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
IJTET Journal
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
IJTET Journal
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRS
IJTET Journal
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
IJTET Journal
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
IJTET Journal
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile Application
IJTET Journal
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
IJTET Journal
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor Networks
IJTET Journal
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query Services
IJTET Journal
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing Techniques
IJTET Journal
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
IJTET Journal
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting Structures
IJTET Journal
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
IJTET Journal
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC Converter
IJTET Journal
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
IJTET Journal
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
IJTET Journal
 

More from IJTET Journal (20)

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For Security
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRS
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile Application
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor Networks
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query Services
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing Techniques
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting Structures
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC Converter
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
 

Recently uploaded

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 

Recently uploaded (20)

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 

Certain Investigations on Security Issues in Smart Grid over Wireless Communication

  • 1. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303 139 Certain Investigations on Security Issues in Smart Grid over Wireless Communication S.Fathima1 1 PG Scholar, Department of Computer Science and Engineering SNS College of Technology Coimbatore, Dr.S.Karthik2 Dean & Professor, Department of Computer Science and Engineering SNS College of Technology Coimbatore, Abstract— Smart Grid (SG) communication has recently received significant attentions to facilitate intelligent and distributed electric power transmission systems. The advent of the smart grid promises to user in an era that will bring intelligence, efficiency, and optimality to the power grid. Most of these challenges will occur as an Internet-like communications network is super imposed on top of the current power grid using wireless mesh network technologies with the 802.15.4, 802.11 and WiMAX Standards. Each of these will expose the power grid to security threats. Wireless communication offers the benefits of low cost, rapid deployment, shared communication medium, and mobility. It causes many security and privacy challenges. The concept of dynamic secret is applied to design an encryption scheme for smart grid in wireless communication. Between two parties of communication, the previous packets are coded as retransmission sequence, where retransmitted packet is marked as ―1‖ and the other is marked as ―0‖.During the communication, the retransmission sequence is generated at both sides to update the dynamic encryption key. Any missing or misjudging sequence would prevent the adversary from achieving key. A Smart Grid platform is built, employing the ZigBee protocol for wireless communication. The Simulation results show that the retransmission and packet loss in ZigBee communication are inevitable and unpredictable and it is impossible of the adversary to track the updating of dynamic encryption key. Even though the DES scheme can protect the encryption key from attackers, the hackers can obtain the keys some time, due to the block size 64 bits used by DES that makes the adversary (hacker) to hack the data. It introduces vulnerabilities and liner crypt analysis; this can be achieved by using AES scheme. The AES uses 128 bits block size for a single encryption key a data of 256 billion gigabytes can be transmitted thus its provide much more safety to user from hacker and it reduces the end to end delay and increases packet transmission rate. Index Terms— Analyzing Module (AM), Clonal Rate(CR), Smart Grid(SG), WiMAX, ZIGBEE. ——————————  —————————— 1 INTRODUCTION The Smart Grid (SG) is considered as a desirable infrastructure for energy efficient consumption and transmission, where the build- in information flow, facilitate significant penetration of renewable energy sources into the grid, and empower consumer with tools for optimized energy consumption. Essentially, its aim is to create a more flexible, efficient, and reliable power grid. And at the heart of smart grid infrastructure is the communications network. Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography is closely related to the disciplines of cryptology and cryptanalysis. Cryptography includes techniques such as microdots, merging words with images, and other ways to hide information in storage or transit. Cryptography is most often associated with scrambling plaintext (ordinary text, sometimes referred to as clear text) into cipher text (a process called encryption), then back again (known as decryption). Individuals who practice this field are known as cryptographers. Cryptography plays a significant role in improving the integrity and confidentiality of the data in SG. Symmetric cryptographies, such as DES (Data Encryption Standard), Triple AES (Advanced Encryption Standard), are widely employed in SG to effectively defend against possible threats. Zigbee is a specification for a suite of high-level communication protocols used to create personal area networks built from small, low-power digital radios. Zigbee is based on an IEEE 802.15 stanadard. Zigbee is a low-cost, low-power, wireless mesh network standard targeted at wide development of long battery life devices in wireless control and monitoring applications. Zigbee devices have low latency, which further reduces average current. Zigbee chips are typically integrated with radios and with microcontrollers that have between 60-256 KB flash memory. Zigbee operates in the industrial scientific and medical (ISM) radio bands. Data rates vary from 20 kbit/s (868 MHz band) to 250 kbit/s (2.4 GHz band). 1.1 Characteristics of Smart Grid The principal characteristics of the Smart Grid include the following,  Self-healing  Empowers and incorporates the consumer  Tolerates security attacks  Provides enhanced power quality  Accommodates a wide variety of generation options 1.2 Advantages of Smart Grid  The Smart Grid helps determine the life cycle of power generation and transmission equipment, schedule preventive maintenance on time.  The use of robust two-way communication, advanced sensors, and distributed computing technology improves all round efficiency, reliability, and safety of energy transmissions.  It is greatly helpful to the users in remote areas to get in touch through wireless communication.  A modernization of Smart Grid improves the end-use devices and appliances.  It decreased customer discontent, greater personal and economic security, and greater confidence in public governance. 2. RELATED WORK Yichi Zhang et al. proposed that a distributed intrusion detection system for smart grid (SGDIDS) by developing and deploying an intelligent module, the analyzing module (AM), in multiple layers of
  • 2. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303 140 the smart grid. Multiple AMs is embedded at each level of the smart grid to improve detection and classify malicious data and possible cyber attacks. In this paper it achieves effective analysis of communication traffic and detects the type of attack, its occurrence into the communication system. But the paper not proposed the optimal combination of different classification techniques and different Intrusion Detection System (IDS) for achieving a higher overall accuracy for intrusion detection. Thus, the scheme is subjected to vulnerabilities. AffinityThresholdScalar(ATS), Clonal Rate(CR), Hyper mutation Rate(HR), Stimulation Threshold(ST) were the parameters considered. Merits  Effective analysis of communication traffic.  It is possible to detect the type of attack, it’s occurrence into the communication system Demerits  The scheme is subjected to vulnerabilities 3. DYNAMIC ENCRYPTION SCHEME FOR SMART GRID IN WIRELESS COMMUNICATION Integrating information network into power system is the key for realizing the vision of smart grid (SG), but also introduces many security problems. Smart grid is a network of computer and infrastructures to monitor and manage energy usage. Wireless communication offers the benefits of low cost, rapid deployment, shared communication medium, and mobility; at the same time, it causes many security and privacy challenges during transmission. The concept of dynamic secret is applied to design an encryption scheme for smart grid wireless communication. Synchronous data transmission between sender and receiver using OTF (One Time Frame), within the time data transmission and acknowledgement from receiver will be completed, that is treated as OTF. A node which doesn’t produce the ACK within the time can cause packet loss where retransmission of packet/data again is done. During the communication, the retransmission sequence is generated at both sides to update the dynamic encryption key. Any missing or misjudging in retransmission sequence would prevent the adversary from achieving the keys. The retransmission and packet loss in ZigBee communication are inevitable and unpredictable, and it is impossible for the adversary to track the updating of the dynamic encryption key. 3.1 Methodology The dynamic secret based encryption in smart grid is employed for securing wireless communication. The basic idea of dynamic secret is that the legitimate users dynamically generate a shared symmetric secret key utilizing the inevitable transmission errors and other random factors in wireless communication. 3.1.1 Smart Grid The smart grid (SG) is considered as a desirable infrastructure for energy efficient consumption and transmission, where the built-in information networks support two-way energy and information flow, facilitate significant penetration of renewable energy sources into the grid, and empower consumer with tools for optimized energy consumption. 3.1.2 Dynamic Secret: The sender and receiver monitor the error retransmission in link layer to synchronously select a group of frames. These frames are hashed into dynamic secret to encrypt the data. This part is a brief introduction of dynamic secret as follows, i) Retransmission analysis /OTF set generation: On the link layer’s communication, error retransmission happens unavoidable and randomly at both side of the sender and the receiver. According to Stop-and-Wait (SW) protocol, the sender transmits a frame and waits for the corresponding acknowledgement before sending a new frame. If a frame is only transmitted once and its acknowledgement frame is received in time, this frame is named as one time frame (OTF). ii) Dynamic secret generation: The number of OTF set ¥ reaches the threshold ((length of RS), the sender and receiver agree on a uniformly random choice of universal-2 hash functions to compress into the dynamic secret. Then, the set ¥ is reset to empty. iii) Encryption/Decryption: When a new dynamic secret is generated, it will be applied to update the encryption key at both sides of communication. This symmetric encryption key is used to encrypt the data at sender and decrypt the cipher at receiver. To reduce the computation consumption, the XOR function is used for encryption and decryption. 3.1.3 DSE Scheme for SG Wireless Communication: Dynamic secret-based encryption (DSE) scheme is designed to secure the wireless communication between the smart devices and control center.The DSE scheme consists of retransmission sequence generation (RSG), DS generation (DSG), and encrypt/decrypt. i. Retransmission Sequence Generation (RSG): This module is applied to monitor the link layer error retransmission. The communication packets which have been retransmitted are marked as ―1‖ and the nonretransmitted packets are marked as ―0.‖ The pervious packets are coded as 0/1 sequence ¥, named as retransmission sequence (RS).In DSE, RS is applied to replace the OTF set for dynamic secret generation due to the limitation of computation capability and storage resources. ii. Dynamic Secret Generation (DSG): Once ¥ reaches the threshold (length of RS), it would be compressed to a DS in DSG module. Considering the limitation on computation power, the hash functions are recommended in DSG module. a) Encrypt/Decrypt: The new dynamic secret is applied to update the dynamic encryption key (DEK) by DEK(k) is generated at both sides of communication synchronously. The sender applies it to encrypt the Data, and the receiver applies it to decrypt the Cipher. XOR function, as one of the most light-weight and easy-implementation algorithm, is applied to update the DEK and encrypt/decrypt the data on both sides. If DEK is shorter than the data, DEK(k) is replicated and padded circularly to generate whose length is equal to the raw data or cipher text. DSE scheme is an appropriate solution for securing SG wireless communication. It can prevent eavesdropping and forging by utilizing the inevitable errors in wireless communication; can reduce the cost on computation and storage by applying the simple algorithms; can self-organize and self-manage. 3.1.4 Attack case in Smart Grid A smart grid platform is constructed to investigate how the attacker intercepts the communication of smart meter and injects bad data into smart meter. a) Smart grid Platform
  • 3. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303 141 It established with three sides: Smart Terminal (ST), Control Center (CC), and Adversary. IEEE 802.15.4 standard defines the physical and MAC layers of ZigBee, while the ZigBee Alliance defines the network and application layers. Since it is designed as a low cost, low rate, low power and low complexity personal area network. b) Smart terminal Smart meters are applied to monitor a micro power grid including various electronic devices for displaying, storing, and monitoring all relevant system parameters, such as voltages, currents et al. c) Control Center(CC) Several computers are deployed as the CC . On the CC, the ZigBee module is set as normal mode to communicate with ST. d) Adversary On the Adversary, it is set as promiscuous mode to eavesdrop the communication between the ST and CC. e) Smart grid attack cases Most terminal devices in smart grid are connected into intranet, such as smart sensors and intelligent applications. It is believed that the malicious users could not access them without the intranet and Mac address of these devices. The Adversary obtains the address of the smart meter by monitoring their communication and then injects the false data into the meter. The Adversary can capture the packet sent from ST through Zigbee. The address of ZigBee module on Smart Meter and the short address of coordinator on control center the measurement can be decoded from the data part of the packet. Using the captured address, attacker can access the smart meter and inject false data. f) Analysis To analyze the security of DSE, the difference between the RS on the CC and Adversary should be listed. Then, retransmitted packet ratio (RPR), packet loss ratio (PLR) and length of RS (L_RS) are investigated to guide the design of DSE. The number of packets is transmitted per seconds; the attacker can capture the data without knowing the packet loss. Control center again retransmit the loss of data to the terminal. Then attacker can generate the dynamic secret with the false data and fail to track the DEK without knowledge of retransmission again he could not start it from the beginning. Thus it is difficult for the attacker to brute force crack the RS. If the Adversary tries to crack the RS, the complexity is related to three key factors: the number of retransmitted packets, the lost packets of the Adversary and the length of the RS. 4. PARAMETERS The performance of network were evaluated using the following metrics, 4.1 Retransmitted Packet Ratio(RPR): The complexity of RS is determined by the number of the retransmitted packet. For example, if there is no retransmitted or non-retransmitted packet, the RS is all-zeroes or all-ones; if there is only 1 retransmitted packet, the Adversary can easily crack the RS using brute force. Thus, we need enough retransmitted and non- retransmitted packets to prevent against the brute force cracking. The number of retransmitted packet is determined by two factors: the RPR and the L_RS. 4.2 Packet Loss Ratio It is the ratio of the number of data packets loss occurs when one or more packets of data travelling across a computer network fail to reach their destination. 4.3 Packet Delivery Ratio It is the ratio of the number of data packets successfully received by the CBR destinations to the number of data packets generated by the CBR sources. 4.4 Average End – to – End Delay It represents the average delay of successfully delivered CBR packets from source to destination node. It includes all possible delays from the CBR sources to destinations. 5. RESULTS AND DISCUSSIONS The evaluation of performance of the Secure Smart Grid (SSG) protocol was evaluated by comparing it with AODV protocol using NS - 2 Simulator. The security mechanism in Smart Grid makes use of data transmission. Here, the analysis is done for security in data transmission. For comparing the security performance of SSG protocol, a dynamic secret based encryption scheme is used for reducing the security issues of data packet during data transmission. 5.1 Performance Analysis for Retransmitted Rate between AODV Vs. SSG In AODV protocol due to packet loss which leads to excessive packet transmission. It is severe when the number of nodes increases. It is important to reduce retransmission and packet drops. Compared with AODV protocol, the SSG protocol reduces the rate of Retransmission. Figure 3.2: Performance Analysis for Retransmission Rate between AODV Vs. SSG 5.2 Performance Analysis for Packet Delivery Ratio between AODV Vs. SSG The SSG protocol can increase the packet delivery ratio due to the reduction in security issues and also parallely reduces the packet drops. On average the packet delivery ratio in SSG protocols is improved when compared with the AODV protocol. Figure 3.3: Performance Analysis for Packet Delivery Ratio between AODV Vs. SSG 5.3 Performance Analysis for Average End – to – End Delay between AODV Vs. SSG The SSG protocol reduces the average end – to – end delay due to a decrease in number of packet drops. The retransmission increases delay due to too many collisions and interferences thus leading to excessive packet drops and also increases the number of
  • 4. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303 142 retransmissions. Thus, reducing the retransmission of data packets the delay can be decreased. Figure 3.4: Performance Analysis for Average End – to – End Delay between AODV Vs. SSG 5.4 Performance Analysis for Packet Loss between AODV Vs. SSG The SSG protocol significantly reduces the security issues during the packet transmission. By applying security mechanism to transmission it reduces the congestion and collision. Thus, compared with AODV protocol it’s reduces the number of packet loss during transmission. Figure 3.5: Performance Analysis for Packet Loss between AODV Vs. SSG 6. CONCLUSION A dynamic secret-based encryption scheme is designed to secure the wireless communication of SG. The DSE scheme can protect the users against eavesdropping by updating the dynamic encryption key with retransmission sequence in communication, even the attackers know the details of DSE scheme and obtain the encryption key at some time. It is self-contained, that is, it is dynamically generated during the normal communication without additional traffic and control command. The generated simulation results depicts the security issues thus reducing the retransmission of packets due to packet loss and increase the packet delivery ratio and thus decreasing the end – to – end delay. But the performance gets reduced, since the security issues do not properly overcome by Dynamic secret based encryption. The problem is overcome by using Electing trust head which reduces the retransmission rate and increased packet delivery ratio and decreased end to end delay during transmission. REFERENCES 1. R.Moghe, F. C. Lambert, and D. Divan, ―Smart ―Stick-on‖ sensors for the smart grid,‖ IEEE Trans. Smart Grid, vol. 3, pp. 241– 252, 2012. 2. M. M. Fouda, Z. M. Fadlullah, N. Kato, L. Rongxing, and S. Xuemin,―A lightweight message authentication scheme for smart grid communications,‖IEEE Trans. Smart Grid, vol. 2, pp. 675–685, 2011. 3. Z. Yichi, W. Lingfeng, S. Weiqing, R. C. Green, and M. Alam, ―Distributed intrusion detection system in a multi-layer network architecture of smart grids,‖ IEEE Trans. Smart Grid, vol. 2, pp. 796– 808,201. 4. J. Xia and Y.Wang, ―Secure key distribution for the smart grid,‖ IEEE Trans. Smart Grid, vol. 3, pp. 437–1443, 2012. 5. L. Rongxing, L. Xiaohui, L. Xu, L. Xiaodong, and S. Xuemin, ―EPPA:An efficient and privacy-reserving aggregation scheme for secure smart grid communications,‖ IEEE Trans. Parallel Distrib. Syst., vol.23, pp. 1621– 1631, 2012. 6. Zhong Fan, Parag Kulkarni, Sedat Gormus, Costas Efthymiou, Georgios Kalogridis, Mahesh Sooriyabandara, Ziming Zhu, Sangarapillai Lambotharan, and Woon Hau Chin, ―Smart Grid Communications: Overview of Research Challenges, Solutions, and Standardization Activities,‖ IEEE Communications surveys & Tutorials, vol.15,No. 1, First Quarter 2013. 7. Y. Ye, Q. Yi, and H. Sharif, ―A secure data aggregation and dispatch scheme for home area networks in smart grid,‖ in Proc. 2011 IEEE Global Telecommun. Conf., pp. 1–6. 8. H. Li, S. Gong, L. Lai, Z. Han, R. Q. Qiu, and D. Yang, ―Efficient and secure wireless communications for advanced metering infrastructure in smart grids,‖ IEEE Trans. Smart Grid, vol. 3, pp. 1540–1551, 2012. 9. T. Liu, Y. Gu,D.Wang, Y. Gui, and X. Guan, ―A novel method to detect bad data injection attack in smart grid,‖ in Proc. IEEE INFOCOM Workshop Commun. Control Smart Energy Syst.. 10. S.Fathima, Dr.S.Karthick, Mrs.R.M.Bhavadharani, ―Overview on Network Security and its Vulnarabilities‖,International Journal of Recent and Innovation Treands in Computing and Communicatiion, vol.2,Issue:8,August 2014.