Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

Research Article

A Novel Bi-Key Computational Algorithm for Secure Data Transmission in Smart Meter Environment

Author(s): Dhirendra Bagri and Shashikant Rathore*

Volume 15, Issue 8, 2022

Published on: 07 December, 2020

Page: [1052 - 1058] Pages: 7

DOI: 10.2174/2666255813666201207153825

Price: $65

Abstract

Objective: Smart grid is an evolved grid with smart features. The smart grid is responsible for the uninterrupted flow of energy and transmission of data generated by the stakeholders. The versatility and integrity of the entire network completely rely on the protection of data which is generated by the smart meters. These smart meters are deployed at the user’s end. By various possible attacks, smart communication network can be hijacked. Also, existing security approaches are not sufficient for handling the generated enormous amount of data. These issues facilitate the need to work on designing a security algorithm that provides better security and better efficiency in smart meter communication.

Methods: This paper presents a proposed model with enhanced security that not only encrypts enormous amount of data but also does it in a very little time. The proposed algorithm is based on a bi-key computational algorithm where two different entities are used as keys. With the use of this algorithm, breaking the originality of message becomes NP Hard problem.

Results: The proposed method has been analyzed with the existing cryptographic algorithm and this method has shown promising results.

Conclusion: This paper presents a method. The working of the method is simulated in Matlab. The obtained results confirm the adaptability and acceptability of the proposed method for the enormous data.

Keywords: GCD, network security, smart meter, grid, data transmission, security, AES, DES.

Graphical Abstract
[1]
H. Ning, and H. Liu, "Cyber-physical-social based security architecture for future internet of things", Sci. Res., vol. 2, pp. 1-7, 2012.
[http://dx.doi.org/10.4236/ait.2012.21001]
[2]
M. Stojcic, and A. Stjepanovic, "ANFIS model for the prediction of generated electricity of photovoltaic modules", Decision Making: Applications in Management and Engineering, vol. 2, no. 1, pp. 35-48, 2019.
[3]
B. Li, Y. Wang, J. Li, and S. Cao, "A Fully Distributed Approach for Economic Dispatch Problem of Smart Grid", Energies, vol. 11, p. 1993, 2018.
[http://dx.doi.org/10.3390/en11081993]
[4]
A. Bartoli, J. Hernandez-Serrano, M. Soriano, M. Dohler, A. Kountouris, and D. Barthel, "Secure lossless aggregation for smart gridM2M networks", Proc. of IEEE Conference on Smart GridCommunications, 2010.
[5]
I.H. Lim, S. Hong, M.S. Choi, S.J. Lee, T.W. Kim, S.W. Lee, and B.N. Ha, "Security protocols against cyber attacks in the distributionautomation system", IEEE Trans. Power Deliv., vol. 25, pp. 448-455, 2010.
[http://dx.doi.org/10.1109/TPWRD.2009.2021083]
[6]
Julius Jow, "A survey of intrusion detection systems in smart grid", International Journal of Sensor Networks., vol. 23, pp. 170-186, 2017.
[http://dx.doi.org/10.1504/IJSNET.2017.083410]
[7]
P. Neumann, "Crypto Key Management", Commun. ACM, vol. 40, 1997.
[http://dx.doi.org/10.1145/257874.257900]
[8]
J. Hur, "Attribute Based Secure Data Sharing with Hidden Policies in Smart Grid", IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 11, pp. 2171-2180, 2013.
[http://dx.doi.org/10.1109/TPDS.2012.61]
[9]
Y. Yan, Y. Quan, H. Sharif, and D. Tipper, "A Survey on Cyber Security for Smart Grid Communications", IEEE Comm. Surv. and Tutor., vol. 14, no. 4, 2012.
[http://dx.doi.org/10.1109/SURV.2012.010912.00035]
[10]
Y.W. Law, G. Kounga, and A. Lo, "WAKE: Key Management Scheme for Wide Area Monitoring Systems in Smart Grid", IEEE Commun. Mag., 2013.
[11]
W. Meng, R. Ma, and H-H. Chen, "Smart Grid Neighborhood Area Networks: A Survey", IEEE Netw., 2014.
[http://dx.doi.org/10.1109/MNET.2014.6724103]
[12]
K. Moslehi, A.B.R. Kumar, D. Shurtleff, M. Laufenberg, A. Bose, and P. Hirsch, Framework for a self-healing power grid.IEEE on Power Engineering Society General Meeting, vol. 3, p. 3027, 2005.
[http://dx.doi.org/10.1109/PES.2005.1489709]
[13]
V.C. Gungor, and G. Hancke, "Industrial wireless sensor networks: challenges, design principles, and technical approaches", IEEE Trans. Ind. Electron., vol. 56, no. 10, pp. 4258-4265, 2009.
[http://dx.doi.org/10.1109/TIE.2009.2015754]
[14]
S. Sremac, I. Tanackov, M. Kopic, and D. Radovic, "ANFIS model for determining the economic order quantity", Decision Making: Applications in Management and Engineering, vol. 1, no. 2, pp. 81-89, 2018.
[http://dx.doi.org/10.31181/dmame1802079s]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy