SECURED AND EFFICIENT KEY MECHANISMS FOR DATA TRANSMISSION IN GRID COMMUNICATIONS
Journal Title: Elysium Journal of Engineering Research and Management - Year 2015, Vol 2, Issue 2
Abstract
The smart grid (SG) includes a number of subsystems and sub networks and they are all working together as a system. Remote attacks to the smart grid is the major problem in the design. The secure multi cast communication between manager and members of SG through unreliable channel established by key distribution mechanisms. In this paper, the analysis and comparison of most significant key distribution schemes are carried out to secure secret data management using self-healing mechanism. In SG, the secure remote password protocol and number of exchanged packets are reduced by utilizing an initial password and decreasing the number of steps. The key distribution protocol based on our enhanced secure using the public key distribution. We propose an efficient key management distribution are capable of preventing various attacks and reducing the management. An abstract model of the network in which Self-Healing key distribution scheme are applied are introduced in this paper to classify and compare the existing solutions.
Authors and Affiliations
Vanitha E, Nishanthi S.
RESOURCE PROCUREMENT MECHANISM SCHEME FOR CLOUD COMPUTING
The cloud resource the limitations auctions, dynamic pricing
SELECTION OF OPTIMAL MINING ALGORITHM FOR OUTLIER DETECTION - AN EFFICIENT METHOD TO PREDICT/DETECT MONEY LAUNDERING CRIME IN FINANCE INDUSTRY
Today, Money Laundering (ML) poses a serious threat and unique challenge to financial institutions. Most of the financial institutions internationally have been implementing Anti-Money Laundering solutions (AML) to fight...
CURRENT SURVEY OF WEB CONTENT MINING TECHNIQUES
Data mining is also called knowledge discovery in databases (KDD). Web Mining is the application of data mining techniques to discovery interesting patterns that can be useful from ever expanding dat...
A SURVEY ON ERGODIC RATING PREDICTION USING SEQUENCE CLASSIFICATION
Sequence classification has an extensive of applications range such as analysis of the genome, retrieval of information, information about fitness, economics, and abnormal detection. Thus, it creates...
A Modified Blowfish Algorithm for Improving the Cloud Security
The accessing of sensitive information from the cloud database is done through the internet. To avoid the hacking number of privacy preservation mechanisms such as cryptography, attribute-based models are employed. The e...