Advertisement

Efficient Network Security Architecture for Heterogeneous Smart Meter Environment

  • Senthil PerumalEmail author
  • Sandanalakshmi Rajendiran
  • Sivadarishini Souprayen
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 39)

Abstract

In smart grid communication network, Smart meter (SM) to DCU communication is currently Homogenous in standard. As the trend of SM to DCU communication is approaching towards heterogeneous nature, Intrusion detection will be a challenging task, leading to security issues. A novel Network security scheme is proposed for Heterogeneous SM to DCU environment. Security is established in the network by using and Particle Swarm Optimization (PSO) and Bilinear Diffie-Hellman (BDH) The PSO algorithm helps in finding an access points (AP) best position selection method to forward SM data to DCU through local centralisation method. The BDH gives the best identification scheme is secure against the attacks. The simulation results show an increase of 15% Packet delivery ratio, 7% increase in the end to end delay and 20% increase in throughput is achieved with PSO algorithm for Heterogeneous SM environment with respect to AODV in Homogenous SM enviornment.

Keywords

Heterogenous Smart grid Network security Key exchange 

References

  1. 1.
    Li, H., Lu, R., Zhou, L., et al.: An efficient Merkle-Tree-based authentication scheme for smart grid. J. IEEE Syst. 8, 655–663 (2014)CrossRefGoogle Scholar
  2. 2.
    He, D., Wang, H., Khan, M.K., et al.: Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography. J. IET Commun. 10, 1795–1802 (2016)CrossRefGoogle Scholar
  3. 3.
    Nordell, D.: Terms of protection: the many faces of smart grid security. J. IEEE Power Energy. 10, 18–23 (2012)CrossRefGoogle Scholar
  4. 4.
    Li, X., Liang, X., Lu, R., et al.: Securing smart grid: cyber attacks, countermeasures, and challenges. J. IEEE Commun. Mag. 58, 38–45 (2012)CrossRefGoogle Scholar
  5. 5.
    McDaniel, P., McLaughlin, S.: Security and privacy challenges in the smart grid. J. IEEE Secur. Priv. 7, 75–77 (2009)CrossRefGoogle Scholar
  6. 6.
    Ericsson, G.N.: Cyber security and power system communication essential parts of a smart grid infrastructure. J. IEEE Trans. Power Deliv. 25, 1501–1507 (2010)CrossRefGoogle Scholar
  7. 7.
    Lu, R., Li, X., Liang, X., et al.: GRS: the green, reliability, and security of emerging machine to machine communications. J. IEEE Commun. Mag. 49, 28–35 (2011)CrossRefGoogle Scholar
  8. 8.
    Zhu, H., Lin, X., Lu, R., et al.: SLAB: secure localized authentication and billing scheme for wireless mesh networks. J. IEEE Trans. Wirel. Commun. 7, 3858–3868 (2008)CrossRefGoogle Scholar
  9. 9.
  10. 10.
    Lin, X., Lu, R., Ho, P.H., et al.: TUA: a novel compromise-resilient authentication architecture for wireless mesh networks. J. IEEE Trans. Wirel. Commun. 7, 1389–1399 (2008)CrossRefGoogle Scholar
  11. 11.
    Al-Fares, M., Loukissas, A., Vahdat, A.: A scalable, commodity data center network architecture. SIGCOMM Comput. Commun. Rev. 38, 63–74 (2008)CrossRefGoogle Scholar
  12. 12.
    Liu, Y., Cheng, C., Gu, T., et al.: A lightweight authenticated communication scheme for smart grid. J. IEEE Sens. 16, 836–842 (2010)CrossRefGoogle Scholar
  13. 13.
    Khurana, H., Hadley, M., Lu, N., Frincke, D.A.: Smart grid security issues. J. IEEE Secur. Priv. 8, 81–85 (2010)CrossRefGoogle Scholar
  14. 14.
    Aravinthan, V., Namboodiri, V., Sunku, S., Jewell, W.: Wireless AMI application and security for controlled home area networks. In: IEEE Power and Energy Society General Meeting, pp. 1–8 (2011)Google Scholar
  15. 15.
    Hopkinson, K., et al.: Quality-of-Service considerations in utility communication networks. J. IEEE Trans. Power Deliv. 24, 1465–1474 (2009)CrossRefGoogle Scholar
  16. 16.
    Sherry, J., et al.: Making middleboxes someone else’s problem: network processing as a cloud service. In: Proceedings ACM SIGCOMM, pp. 13–24 (2012)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Senthil Perumal
    • 1
    Email author
  • Sandanalakshmi Rajendiran
    • 1
  • Sivadarishini Souprayen
    • 1
  1. 1.ECE DepartmentPondicherry Engineering CollegePuducherryIndia

Personalised recommendations