Advertisement

Analysis and Optimization Technique of Secure Smart Grid Communication Network for Sustainable Development

Conference paper
  • 380 Downloads
Part of the Lecture Notes on Multidisciplinary Industrial Engineering book series (LNMUINEN)

Abstract

The smart network includes many sub-frameworks, for example, the Home Area Network (HAN), which are at risk and prone to be attacked remotely. A smart grid communication is meant to design a mutual authentication scheme and a key management protocol. This study is aimed with an efficient arrangement for HAN that analyzes a framework set-up for HAN. In this paper, we have analyzed three cases: First, we show the normal execution then execution along with attackers. Using mutual authentication, we overcome attacks. It has introduced a number of routing schemes for grid networks in recent years, and they provide different level of privacy protection at different cost. First, an unspecified key establishment process is performed to construct secret session keys. By using NS-2, the performance analysis such as energy, bandwidth is simulated. In this work, our primary concern is to identify the attacks in HAN.

Keywords

Authentication Confidentiality Security Smart grid Routing 

Notes

Acknowledgements

Indira Gandhi National Tribal University (India) and the University of Agder (Norway) gratefully acknowledge the partial support for this work from the project ‘India Norway Cooperation Program Project INCP 2014/10110’, which is jointly funded by the University Grants Commission (India) and the Norwegian Centre for International Cooperation in Education.

References

  1. 1.
    Wang, J., Leung, V.: A survey of technical requirements and Consumer application standards for IP-based Grid networkAMI network. In: Proceedings of ICOIN, pp. 114–119 (2011)Google Scholar
  2. 2.
    Nicanfar, H., Jokar, P., Leung, V.: Grid network authentication and key management for unicast and multicast communications. In: Proceedings of IEEE PES ISGT, pp. 1–8 (2011)Google Scholar
  3. 3.
    Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., Polk, W.: Internet X. 509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Internet Engineering Task Force, Fremont, CA, USA (2008)CrossRefGoogle Scholar
  4. 4.
    Amin, M.: Challenges in reliability, security, efficiency, and resilience of energy infrastructure: toward smart self-healing electric power grid. In: Power and Energy Society General Meeting Conversion and Delivery of Electrical Energy in the 21st Century, pp. 1–5. IEEE (2008)Google Scholar
  5. 5.
    Fan, Z., Kulkarni, P., Gormus, S., Efthymiou, C., Kalogridis, G., Sooriyabandara, M., Zhu, Z., Lambotharan, S., Chin, W.H.: Grid network communications: Overview of research challenges, solutions, and standardization activities. IEEE Commun. Surveys Tuts. 15(1), 21–38 (2013)CrossRefGoogle Scholar
  6. 6.
    Metke, A., Ekl, R.: Security technology for smart grid networks. IEEE Trans. Smart Grid 1(1), 99–107 (2010)CrossRefGoogle Scholar
  7. 7.
    Fadlullah, Z., Kato, N., Lu, R., Shen, X., Nozaki, Y.: Towards secure targeted broadcast in smart grid. IEEE Commun. Mag. 50(5), 150–156 (2012). [Online]. Available: http://bbcr.uwaterloo.ca/h8liang/sg/Papesgcommx.pdf
  8. 8.
    Kushwaha, D.S., Khare, A., Dr. Rana, J.L.: Improved trustful routing protocol to detect wormhole attack in MANET. Int. J. Comput. Appl. (IJCA) 62(7), 21–25 (2013)CrossRefGoogle Scholar
  9. 9.
    Xia, J., Wang, Y.: Secure key distribution for the smart grid. IEEE Trans. Smart Grid 3(3), 1437–1443 (2012)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Faculty of ComputronicsIndira Gandhi National Tribal UniversityAmarkantakIndia
  2. 2.Faculty of Engineering and ScienceUniversity of AgderKristiansandNorway
  3. 3.Faculty of Computronics and Head Department of Computer ScienceIndira Gandhi National Tribal UniversityAmarkantakIndia

Personalised recommendations