CFP last date
20 May 2024
Reseach Article

Multipath Routing of Fragmented Data Transfer in a Smart Grid Environment

by Tuhin Borgohain, Amardeep Borgohain, Rajdeep Borgohain, Sugata Sanyal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 111 - Number 4
Year of Publication: 2015
Authors: Tuhin Borgohain, Amardeep Borgohain, Rajdeep Borgohain, Sugata Sanyal
10.5120/19528-1165

Tuhin Borgohain, Amardeep Borgohain, Rajdeep Borgohain, Sugata Sanyal . Multipath Routing of Fragmented Data Transfer in a Smart Grid Environment. International Journal of Computer Applications. 111, 4 ( February 2015), 37-41. DOI=10.5120/19528-1165

@article{ 10.5120/19528-1165,
author = { Tuhin Borgohain, Amardeep Borgohain, Rajdeep Borgohain, Sugata Sanyal },
title = { Multipath Routing of Fragmented Data Transfer in a Smart Grid Environment },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 111 },
number = { 4 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 37-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume111/number4/19528-1165/ },
doi = { 10.5120/19528-1165 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:47:00.400507+05:30
%A Tuhin Borgohain
%A Amardeep Borgohain
%A Rajdeep Borgohain
%A Sugata Sanyal
%T Multipath Routing of Fragmented Data Transfer in a Smart Grid Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 111
%N 4
%P 37-41
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The purpose of this paper is to do a general survey on the existing communication modes inside a smart grid, the existing security loopholes and their countermeasures. Then we suggest a detailed countermeasure, building upon the Jigsaw based secure data transfer [8] for enhanced security of the data flow inside the communication system of a smart grid. The paper has been written without the consideration of any factor of inoperability between the various security techniques inside a smart grid

References
  1. Xi Fang, Student Member, IEEE, Satyajayant Misra, Member, IEEE, Guoliang Xue, Fellow, IEEE, and Dejun Yang, Student Member, IEEE, "Smart Grid – The New and Improved Power Grid: A Survey", IEEE Trans. Smart Grid, 2011
  2. W. Wang and Z. Lu, "Cyber security in the smart grid: Survey and challenges," Computer Networks, vol. 57, no. 5, pp. 1344–1371, 2013.
  3. G. N. Ericsson, "Cyber security and power system communication–Essential parts of a smart grid infrastructure", IEEE Transactions on Power Delivery 25 (3) (2010) 1501–1507.
  4. Sugata Sanyal, Rohit Bhadauria and Chittabrata Ghosh, "Secure Communication in Cognitive Radio Networks", 2009
  5. Sugata Sanyal, Ayu Tiwari and Sudip Sanyal. "A multifactor secure authentication system for wireless payment. " Emergent Web Intelligence: Advanced Information Retrieval. Springer London, 2010. 341-369
  6. Sandipan Dey, Ajith Abraham, Bijoy Bandyopadhyay and Sugata Sanyal, "Data Hiding Techniques Using Prime and Natural Numbers", Journal of Digital Information Management, Volume 6, 2008.
  7. Punit Rathod, Nirali Mody, Dhaval Gada, Rajat Gogri, Zalak Dedhia, Sugata Sanyal, and Ajith Abraham, "Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks," Lecture Notes in Computer Science, 2004, vol. 3326, pp. 541-542.
  8. Rangarajan A. Vasudevan, Ajith Abraham, Sugata Sanyal and Dharma P. Agrawal, "Jigsaw-based Secure Data Transfer over Computer Networks", IEEE International Conference on Information Technology: Coding and Computing, 2004. (ITCC'04), Proceedings of ITCC 2004, Vol. 1, April, 2004, Las Vegas, Nevada, USA, pp. 2-6.
  9. Sandipan Dey, Ajith Abraham and Sugata Sanyal "An LSB Data Hiding Technique Using Natural Numbers", IEEE Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007, Nov 26-28, 2007, Kaohsiung City, Taiwan, IEEE Computer Society press, USA, ISBN 0-7695-2994-1, pp. 473-476, 2007
  10. US Patents, Securing Fiber Optic Communications against Optical Tapping Methods, Oyster Optics, Inc. 2003. Available: www. rootsecure. net/content/downloads/pdf/fiber_optic_taps. pdf [Accessed: 14 February, 2012]
  11. M. R. Thakur, D. R. Khilnani, K. Gupta, S. Jain, V. Agarwal, S. Sane, S. Sanyal and P. S. Dhekne, "Detection and Prevention of Botnets and malware in an enterprise network, " International Journal of Mobile and Wireless Computing, vol. no. 5, 2012, pp. 144-153.
  12. http://en. wikipedia. org/wiki/Supply_chain_cyber_security
  13. J. Gao, Y. Xiao, J. Liu, W. Liang, and C. L. P. Chen, "A Survey of Communication/Networking in Smart Grids," (Elsevier) Future Generation Computer Systems, Vol. 28, No. 2, Feb. 2012, pp. 391-404. DOI:10. 1016/j. future. 2011. 04. 014
  14. T. M. Overman, et al. , "High-Assurance Smart Grid: A Three-Part Model for Smart Grid Control Systems", Proceedings of the IEEE, vol. 99, no. 6, pp. 1046-1062, June 2011.
  15. B. Y. Mo, T. H. -J. Kim, K. Brancik, D. Dickinson, H. Lee et al. , "Cyber-physical security of a smart grid infrastructure," Proc. IEEE, vol. 100, no. 1, pp. 195–209, Jan. 2012.
  16. Scott Palmquist, Senior Product Manager, "Securing the Smart Grid: A Multi-Layered Approach".
  17. http://en. wikipedia. org/wiki/Patch_%28computing%29
  18. Danish Jamil and Hassan Zaki. "Cloud Computing Security", International Journal of Engineering Science and Technology, Vol. 3, No. 4, 2011, pp. 3478-3483.
  19. K. Hwang, S. Kulkarni and Y. Hu, "Cloud security with virtualized defence and Reputation-based Trust management," Proceedings of 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (security in cloud computing), pp. 621-628, Chengdu, China, December, 2009. ISBN: 978-0-7695-3929-4.
  20. Yan L, Rong C, Zhao G: "Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography". Proceedings of the 1st International Conference on Cloud Computing, CloudCom '09 2009.
  21. K. Vieira, A. Schulter, C. Westphall, and C. Westphall, "Intrusion Detection Techniques in Grid and Cloud Computing Environment," IT Professional, vol. 99, no. Preprints, 2009.
  22. Krautheim FJ (2009) Private virtual infrastructure for cloud computing. In: Proc. of Hot Cloud
  23. Needham, R. M and Schroeder, M. D. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM 21(12), December, 1978.
  24. Wang, Xudong, and Ping Yi. "Security framework for wireless communications in smart distribution grid. " Smart Grid, IEEE Transactions on 2. 4 (2011): 809-818.
  25. Shein, Rob. "Security measures for advanced metering infrastructure components. " Power and Energy Engineering Conference (APPEEC), 2010 Asia-Pacific. IEEE, 2010.
  26. Lee, Annabelle, and Tanya Brewer. "Smart grid cyber security strategy and requirements. " Draft Interagency Report NISTIR 7628 (2009).
  27. Efthymiou, Costas, and Georgios Kalogridis. "Smart grid privacy via anonymization of smart metering data. " Smart Grid Communications (Smart Grid Comm. ), 2010 First IEEE International Conference on. IEEE, 2010.
  28. M. Okuhara, T. Shiozaki, and T. Suzuki, "Security Architecture for Cloud Computing", FUJITSU Sci. Tech. J, 46, pp. 397-402, 2010.
  29. Bibhash Roy, Suman Banik, Parthi Dey, Sugata Sanyal, Nabendu Chaki, "Ant Colony based Routing for Mobile Ad-Hoc Networks towards Improved Quality of Services", Journal of Emerging Trends in Computing & Information Sciences vol. 3,issue1, 2012
  30. Ankur Mishra, Ruchita Mathur, Shishir Jain, and Jitendra Singh Rathore. 2013. Cloud Computing Security. International Journal on Recent and Innovation Trends in Computing and Communication 1, 1 (2013), 36–39.
  31. http://en. wikipedia. org/wiki/Stuxnet
Index Terms

Computer Science
Information Sciences

Keywords

Smart Grid Multi-path routing Data Transfer