A SECURE AND RELIABLE WIRELESS DATA COMMUNICATION FOR SMART GRID
Journal Title: Elysium Journal of Engineering Research and Management - Year 2015, Vol 2, Issue 3
Abstract
Power system incorporating an information network, is the key to realizing the smart grid vision, but also introduced a number of security issues. Lower the high cost of wireless protocol to communicate the benefits of rapid deployment, shared communication medium, provides the movement; At the same time, it creates a number of security and privacy challenges. In this project, the concept of dynamic secret in order to ensure safety and reliability of data transmitted to a cryptographic system used to design smart grid wireless communication. Update the encryption key will be generated on both sides of the line of contact retransmission. Or to prevent the retransmission of missing keys to the display as an opponent to reach misjudging. Here's a smart grid platform for ZigBee wireless protocol for communication protocol, using the built. And a dynamic secret based encryption demo system is designed based on this platform. ZigBee communication protocol and the project results in the retransmission packet loss will be inevitable and unpredictable show that it is impossible to keep track of enemies, dynamic encryption key renewal. By this method we are able to verify the reliability of the transmitted data. In this scheme, a method of cyclic redundancy check data transmitted and received. The main objective of the project to protect the data from our enemies and make sure there is reliable data transmission.
Authors and Affiliations
Keerthana S. , Selvakumar P. , Kannan K.
XML DATA PROCESSING APPROACH FOR AUTOMATIC IDENTIFICATION OF CARDIAC ABNORMALITIES IN ECG
In medical applications, the process that records the electrical activity of the heart is termed as Electrocardiography (ECG). The traditional way of ECG is in the form of the transthoracic interpretatio...
SENSOR BASED AUTHENTICATION USING ACCELEROMETER SENSOR
In Some Application or Web services Password offer their users lots of possibilities and a feeling of freedom. Eventually, this cause some new security threats like Sensitive data might be stolen and abused,...
Working Principle of Semidual Dynamic Bridge Converter with Dual Source
A soft-switching circuit topology derived from the semi dual- Dynamic-bridge converter(S-DDB) get wide attention for applications requiring unidirectional power flow such as the dc-dc stage of a photovoltaic power conver...
IMPROVING SECURITY AND DEDUPLICATION FOR OUTSOURCED DATABASE IN CLOUD COMPUTING
To improve the security of data by using Elliptic Curve Cryptography (ECC) Algorithm. The duplicated data will be detected and avoid with a Secure Hash Algorithm (SHA). In many case when the dishonest Cloud Service Provi...
A SURVEY ON TIME BASED CLOUD SCHEDULING
The current internet application and online task completion relies more on cloud environments. Cloud provides dynamic services are large scalable and virtualized resources over the Internet. In cloud compu...