A SECURE AND RELIABLE WIRELESS DATA COMMUNICATION FOR SMART GRID
Journal Title: Elysium Journal of Engineering Research and Management - Year 2015, Vol 2, Issue 3
Abstract
Power system incorporating an information network, is the key to realizing the smart grid vision, but also introduced a number of security issues. Lower the high cost of wireless protocol to communicate the benefits of rapid deployment, shared communication medium, provides the movement; At the same time, it creates a number of security and privacy challenges. In this project, the concept of dynamic secret in order to ensure safety and reliability of data transmitted to a cryptographic system used to design smart grid wireless communication. Update the encryption key will be generated on both sides of the line of contact retransmission. Or to prevent the retransmission of missing keys to the display as an opponent to reach misjudging. Here's a smart grid platform for ZigBee wireless protocol for communication protocol, using the built. And a dynamic secret based encryption demo system is designed based on this platform. ZigBee communication protocol and the project results in the retransmission packet loss will be inevitable and unpredictable show that it is impossible to keep track of enemies, dynamic encryption key renewal. By this method we are able to verify the reliability of the transmitted data. In this scheme, a method of cyclic redundancy check data transmitted and received. The main objective of the project to protect the data from our enemies and make sure there is reliable data transmission.
Authors and Affiliations
Keerthana S. , Selvakumar P. , Kannan K.
SECURED AND EFFICIENT KEY MECHANISMS FOR DATA TRANSMISSION IN GRID COMMUNICATIONS
The smart grid (SG) includes a number of subsystems and sub networks and they are all working together as a system. Remote attacks to the smart grid is the major problem in the design. T...
AN EFFICIENT INFORMATION RETRIEVAL (EIR) ALGORITHM FOR PRIVACY PRESERVATION IN WEB SEARCH
Internet is occupied largely by the web search engines, to find and access a data. They pose a serious risk of privacy breach over the users. Thus, personalized search engines become the need for facing the privacy chall...
STATIC ANALYSIS FOR EXTRACTING PERMISSION CHECKS IN ANDROID USING EVENT GRAPH TECHNIQUE
Applications for Android are written in Java which is then compiled into Dalvik byte code. Memory and processing power are limited, when the byte code is improve to run on devices. An Android applicat...
A SURVEY ON UNIFIED COMMUNICATION
In recent years, unified communication is becoming a critical part in enterprise communication. Voice, messaging, conferencing, presence and availability, and directories have all become fundamental requirements...
SENSOR-FAULT TOLERANT BASED GAIN SCHEDULING CONTROLLER FOR NETWORKED DC MOTOR SYSTEM
This work is concerned with the controller design of NDCMS. A fuzzy gain scheduling controller has been designed to overcome the sensor faults and also to manage the network delay and packet dropouts. Fu...