SECURED AND EFFICIENT KEY MECHANISMS FOR DATA TRANSMISSION IN GRID COMMUNICATIONS
Journal Title: Elysium Journal of Engineering Research and Management - Year 2015, Vol 2, Issue 2
Abstract
The smart grid (SG) includes a number of subsystems and sub networks and they are all working together as a system. Remote attacks to the smart grid is the major problem in the design. The secure multi cast communication between manager and members of SG through unreliable channel established by key distribution mechanisms. In this paper, the analysis and comparison of most significant key distribution schemes are carried out to secure secret data management using self-healing mechanism. In SG, the secure remote password protocol and number of exchanged packets are reduced by utilizing an initial password and decreasing the number of steps. The key distribution protocol based on our enhanced secure using the public key distribution. We propose an efficient key management distribution are capable of preventing various attacks and reducing the management. An abstract model of the network in which Self-Healing key distribution scheme are applied are introduced in this paper to classify and compare the existing solutions.
Authors and Affiliations
Vanitha E, Nishanthi S.
DEVELOPMENT OF ERROR CORRECTION MECHANISM BASED ON RCIC TURBO CODES IN LTE NETWORK
This paper describes an error correction mechanism based on Rate-Compatible Insertion Convolutional (RCIC) Turbo codes.Rate-compatible Turbo codes are part of numerous mobile communication systems (...
A SURVEY ON ERGODIC RATING PREDICTION USING SEQUENCE CLASSIFICATION
Sequence classification has an extensive of applications range such as analysis of the genome, retrieval of information, information about fitness, economics, and abnormal detection. Thus, it creates...
FiDoop: Parallel Mining of Frequent Item sets Using MapReduce
Due to the exponential increase of real-time data monitoring systems, the extraction of frequent item (Frequent item set mining) set from large uncertain database is the challenging task. The existing parallel mining alg...
DETECTION AND PREVENTION OF MALICIOUS FEEDBACK RATING IN WEB SERVICE RECOMMENDATION SYSTEMS
To facilitate a recommendation to users for selecting an appropriate or reputed web service from mass of services by avoiding dishonest recommendation. To prevent, avoid and de...
A LITERATURE STUDY ON ASSOCIATION RULE MINING
Association Rule mining has become an essential topic in data mining during recent years. It gains more popularity because of its wide range of applicability. Many researches introduced new algorithms ba...