Efficient Network Security Architecture for Heterogeneous Smart Meter Environment

  • Conference paper
  • First Online:
Sustainable Communication Networks and Application (ICSCN 2019)

Abstract

In smart grid communication network, Smart meter (SM) to DCU communication is currently Homogenous in standard. As the trend of SM to DCU communication is approaching towards heterogeneous nature, Intrusion detection will be a challenging task, leading to security issues. A novel Network security scheme is proposed for Heterogeneous SM to DCU environment. Security is established in the network by using and Particle Swarm Optimization (PSO) and Bilinear Diffie-Hellman (BDH) The PSO algorithm helps in finding an access points (AP) best position selection method to forward SM data to DCU through local centralisation method. The BDH gives the best identification scheme is secure against the attacks. The simulation results show an increase of 15% Packet delivery ratio, 7% increase in the end to end delay and 20% increase in throughput is achieved with PSO algorithm for Heterogeneous SM environment with respect to AODV in Homogenous SM enviornment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 213.99
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 267.49
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Li, H., Lu, R., Zhou, L., et al.: An efficient Merkle-Tree-based authentication scheme for smart grid. J. IEEE Syst. 8, 655–663 (2014)

    Article  Google Scholar 

  2. He, D., Wang, H., Khan, M.K., et al.: Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography. J. IET Commun. 10, 1795–1802 (2016)

    Article  Google Scholar 

  3. Nordell, D.: Terms of protection: the many faces of smart grid security. J. IEEE Power Energy. 10, 18–23 (2012)

    Article  Google Scholar 

  4. Li, X., Liang, X., Lu, R., et al.: Securing smart grid: cyber attacks, countermeasures, and challenges. J. IEEE Commun. Mag. 58, 38–45 (2012)

    Article  Google Scholar 

  5. McDaniel, P., McLaughlin, S.: Security and privacy challenges in the smart grid. J. IEEE Secur. Priv. 7, 75–77 (2009)

    Article  Google Scholar 

  6. Ericsson, G.N.: Cyber security and power system communication essential parts of a smart grid infrastructure. J. IEEE Trans. Power Deliv. 25, 1501–1507 (2010)

    Article  Google Scholar 

  7. Lu, R., Li, X., Liang, X., et al.: GRS: the green, reliability, and security of emerging machine to machine communications. J. IEEE Commun. Mag. 49, 28–35 (2011)

    Article  Google Scholar 

  8. Zhu, H., Lin, X., Lu, R., et al.: SLAB: secure localized authentication and billing scheme for wireless mesh networks. J. IEEE Trans. Wirel. Commun. 7, 3858–3868 (2008)

    Article  Google Scholar 

  9. IEEE p 2030 draft guide. http://grouper.ieee.org/groups/scc21/2030/2030_index.html

  10. Lin, X., Lu, R., Ho, P.H., et al.: TUA: a novel compromise-resilient authentication architecture for wireless mesh networks. J. IEEE Trans. Wirel. Commun. 7, 1389–1399 (2008)

    Article  Google Scholar 

  11. Al-Fares, M., Loukissas, A., Vahdat, A.: A scalable, commodity data center network architecture. SIGCOMM Comput. Commun. Rev. 38, 63–74 (2008)

    Article  Google Scholar 

  12. Liu, Y., Cheng, C., Gu, T., et al.: A lightweight authenticated communication scheme for smart grid. J. IEEE Sens. 16, 836–842 (2010)

    Article  Google Scholar 

  13. Khurana, H., Hadley, M., Lu, N., Frincke, D.A.: Smart grid security issues. J. IEEE Secur. Priv. 8, 81–85 (2010)

    Article  Google Scholar 

  14. Aravinthan, V., Namboodiri, V., Sunku, S., Jewell, W.: Wireless AMI application and security for controlled home area networks. In: IEEE Power and Energy Society General Meeting, pp. 1–8 (2011)

    Google Scholar 

  15. Hopkinson, K., et al.: Quality-of-Service considerations in utility communication networks. J. IEEE Trans. Power Deliv. 24, 1465–1474 (2009)

    Article  Google Scholar 

  16. Sherry, J., et al.: Making middleboxes someone else’s problem: network processing as a cloud service. In: Proceedings ACM SIGCOMM, pp. 13–24 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Senthil Perumal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Perumal, S., Rajendiran, S., Souprayen, S. (2020). Efficient Network Security Architecture for Heterogeneous Smart Meter Environment. In: Karrupusamy, P., Chen, J., Shi, Y. (eds) Sustainable Communication Networks and Application. ICSCN 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 39. Springer, Cham. https://doi.org/10.1007/978-3-030-34515-0_49

Download citation

Publish with us

Policies and ethics

Navigation