Development and Performance Evaluation of a Novel Dual EuclideanAlgorithm for Secure Data Communication in Smart Grid

R. Vijayanand,*, D. Devaraj**, B. Kannapiran***, K. Kartheeban****
* Research Scholar, Department of CSE, Kalasalingam University, Tamilnadu, India.
** Professor and Head, Department of EEE, Kalasalingam University, Tamilnadu, India.
***Associate Professor and Head, Department of ICE, Kalasalingam University, Tamilnadu, India.
**** Associate Professor, Department of CSE, Kalasalingam University, Tamilnadu, India.
Periodicity:November - January'2015
DOI : https://doi.org/10.26634/jcs.4.1.3289

Abstract

Smart Grid is the integration of Electrical and Communication network in which data and power flows bi-directionally. The activity of a Smart Grid heavily depends on the instant electrical data received through the communication network. The massiveness of devices and direct communication with the end user makes the Smart Grid infrastructure easily prone to attacks. A slight modification in the data by an unauthorized person may destruct the entire grid. Characteristics like vast data generation, complexity, prompt speed and large geographical distribution area limits the existing security algorithms from being used in the communication network of the Smart Grid. In this paper, we propose an efficient security algorithm using Dual Euclidean algorithm along with its key management technique for Smart Grid application. The proposed algorithm uses two keys to encrypt the data which provides NP-hard complexity and the adversary cannot reveal the original data without knowing both the keys. The performance and security of the proposed algorithm are evaluated and compared with AES algorithm. The simulation results demonstrate that proposed algorithm is suitable for Smart Grid applications.

Keywords

Smart Grid Security, Secure Data Transmission, Dual Euclidean, Key Management.

How to Cite this Article?

Vijayanand, R., Devaraj, D., Kannapiran, B., and Kartheeban, K. (2015). Development and Performance Evaluation of a Novel Dual Euclidean Algorithm for Secure Data Communication in Smart Grid. i-manager’s Journal on Communication Engineering and Systems, 4(1), 1-7. https://doi.org/10.26634/jcs.4.1.3289

References

[1]. Loi Lei Lai, Hao Tian Zhang, Chun Sing Lai, Fang Yuan Xu and Sukumar Mishra (2013). “Investigation on July 2012 Indian Blackout”, Proceedings of the 2013 International Conference on Machine Learning and Cybernetics, Tianjin, Vol.1, pp.92-97.
[2] Vinod Namboodiri, Visvakumar Aravinthan, Surya Narayan Mohapatra and Ward Jewel (2014). “Toward a Secure Wireless-Based Home Area Network for Metering in Smart Grids”, IEEE Systems Journal, Vol. 8, No.2, pp.509- 520.
[3]. Vehbi C. Gungor, Dilan Sahin, Salih ergut, Concettina Buccella, Carlo cecati and Gerhard P. Hancke (2011). “Smart Grid Technologies: Communication Technologies and Standards”, IEEE Transaction on Industrial Information, Vol. 7, No. 4, pp.529-539.
[4]. Ahmad Usman, Sajjid Haider Shami (2012). “Evolution of Communication Technologies for Smart Grid applications”, Renewable and Sustainable Energy Reviews, Elsevier, Vol.19, pp.191-199.
[5]. Ye Yan, Yi Quan, Hamid Sharif and David Tipper (2012). “A Survey on Cyber Security for Smart Grid Communications”, IEEE Communications Surveys and tutorials, Vol.14, No.4, pp.998-1010.
[6]. Jing Liu, Yang Xiao, Shuhui Li, Wei Liang and C. L. Philip Chen (2012). “Cyber Security and Privacy Issues in Smart Grids”, IEEE Communications Surveys and Tutorials, Vol.14, No.4, pp.981-997.
[7]. Junboem Hur (2013). “Improving Security and Efficiency in Attribute-Based Data Sharing”, IEEE Transaction on Knowledge and Data Engineering, Vol. 25, No. 10, pp.2271-2282.
[8]. Junbeom Hur (2013). “Attribute Based Secure Data Sharing with Hidden Policies in Smart Grid”, IEEE Transaction on Parallel and Distributed Systems, Vol.24, No.11, pp.2171-2180.
[9]. Zubair Md. Fadlullah, Nei Kato, Rongxing Lu, Xuemin Shen, Yousuke Nozaki (2012). ”Toward Secure Targeted Broadcast in Smart Grid”, IEEE Communications Magazine, Vol.50, No. 5, pp.150-156.
[10]. K. Kartheeban and M. Venkatesulu (2010). “EAB – Euclidean Algorithm Based Key Computation Protocol for Secure Group Communication in Dynamic Grid Environment”, International Journal of Grid and Distributed Computing, Vol. 3, No. 4, pp.45-56.
[11]. Ting Liu, Yang Liu, Yashan Mao, Yao Sun, Xiaohong Guan, Weibo Gong and Sheng Xiao (2014). “A Dynamic Secret-Based Encryption Scheme for Smart Grid Wireless Communication”, IEEE Transactions on Smart Grid, Vol. 5, No. 3, pp.1175-1182.
[12]. Nian Liu, Jinshen Chen, Lin Zhu, Jianhua Zhang and Yanling He (2013). “A key Management Scheme for Secure Communications of Advanced Metering Infrastructure in Smart Grid”, IEEE Transactions on Industrial Electronics, Vol. 60, No. 10, pp.4746-4756.
[13]. Ye Yan, Rose Qingyang Hu, Sajal K.Das, Hamid Sharif and Yi Qian (2013). “An Efficient Security Protocol for Advanced Metering Infrastructure in Smart Grid”, IEEE Network, Vol.27, No.4, pp.64-71.
[14]. Emilio Ancillotti, Raffaele Bruno and Marco Conti (2013). “The role of Communication Systems in Smart Grids: Architectures, technical solutions and Research Challenges”, Computer Communications, Vol.36, No.18, pp.1665-1697.
[15]. Weixiao Meng, Ruofei Ma and Hsiao-Hwa Chen (2014). “Smart Grid Neighborhood Area Networks: A Survey”, IEEE Network, Vol.28, No.1, pp.24-32.
[16]. Nikos Komninos, Eleni Philippou and Andreas Pitsillides (2014). “Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures”, IEEE Communication Surveys & Tutorials, Vol. 16, No. 4, pp.1933-1954.
[17]. Saurabh Singh and Gaurav Agarwal (2010). “Use of Chinese Remainder Theorem to generate random numbers for Cryptography”, International Journal of Applied Engineering Research, Vol. 1, No. 1, pp.165-174.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.