A Novel Method Of Secured Scheme For Smart Grid Wireless Communication

R. Naveenraj*, S. Ranjithkumar**, G. Vasanthi***, V. Ramya****, K. Rathinakumar*****
*-**** Bachelor of Electronics and Communication Engineering, Knowledge Institute of Technology, India.
***** Assistant Professor, Electronics and Communication Engineering, Knowledge Institute of Technology, India.
Periodicity:April - June'2015
DOI : https://doi.org/10.26634/jwcn.4.1.3458

Abstract

In future, the smart grid power transmission could be the most usable system for power transmission, however it also introduces many security problems. To overcome the security problem, the authors have used an encryption scheme which is introduced by an information network in the communication medium. In this paper, the information network can be integrated into the smart grid power transmission. In between the two systems of communication, the previous packets can be taken as re-transmission sequences. Here the re-transmitted packet is marked as “1” and the non retransmitted packet can be marked as “0”. At the time of communication, the re-transmission sequences can be generated at both sides to update the encryption key. In this paper, the smart grid is built by using ZigBee protocol for wireless communication of the information network. The encryption system is designed based on this platform. The result shows that the re-transmission and packet loss can be very low and it is impossible for the attacker to track the updation of the encryption key.

Keywords

Encryption, Re-Transmission, Security, Smart Grid, Wireless Communication, ZigBee.

How to Cite this Article?

Naveenraj, R., Ranjithkumar, S., Vasanthi, G., Ramya, V., and Rathinakumar, K. (2015). A Novel Method Of Secured Scheme For Smart Grid Wireless Communication. i-manager's Journal on Wireless Communication Networks, 4(1), 11-18. https://doi.org/10.26634/jwcn.4.1.3458

References

[1]. R. Moghe, F. C. Lambert, and D. Divan, (2012). “Smart “Stick-on” sensors for the smart grid,” IEEE Trans. Smart Grid, Vol. 3, pp. 241–252.
[2]. Federal Energy Regulatory Commission, (2011). “Renewables & energy efficiency Generation & efficiency s t a n d a r d s ” [ O n l i n e ] . A v a i l a b l e : h t t p : / / w w w. f e r c . g o v / m a r k e t - o v e r s i g h t / o t h r - mkts/renew.asp
[3]. K. Ren, Z. Li, and R. C. Qiu, (2011). “Guest editorial cyber, physical, and system security for smart grid,” IEEE Trans. Smart Grid, Vol. 2, pp. 643–644.
[4]. DOE's Office of Electricity De-livery and Energy Reliability (2008). “The smart grid: An introduction”.
[5]. P. Jokar, N. Arianpoo, and V. C. M. Leung, “A survey on security issues in smart grids,” Security Commun. Netw., 2012 [Online]. Avail-able: http://onlinelibrary.wiley.com/ doi/10.1002/sec.559/ab-stract.
[6]. T. Liu, Y. Gu, D. Wang, Y. Gui, and X. Guan, “A novel method to de-tect bad data injection attack in smart grid,” in Proc. IEEE INFOCOM Workshop Commun. Control Smart Energy Syst.
[7]. P. McDaniel and S. McLaughlin (2009). “Security and privacy challenges in the smart grid,” IEEE Security Privacy, Vol. 7, pp. 75–77.
[8]. Office of the National Cordination for Smart Grid Interoperability, (2010). “NIST framework and roadmap for smart grid interoperability standards,” [Online]. Available: http://www.nist.gov/smartgrid/
[9]. Cisco, (2009). “Security for the smart grid,” White Paper [ O n - l i n e ] . A v a i l a b l e : h t t p : / / w w w. c i s c o . c o m / w e b / s t r a t e g y / d o c s / e n - e r g y / w h i t e _ p a p e r _c11_539161.pdf
[10]. W. Xudong and Y. Ping, (2011). “Security framework for wireless communi-cations in smart distribution grid,” IEEE Trans. Smart Grid, Vol. 2, pp. 809–818.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.