Wireless sensor networks (WSN's) are preferred for industrial applications due to progressive increase of sensor electronics. One such application is deployment of WSN's in smart grids. Smart Grid integrates information and communication techniques with electricity network. Smart grids utilize sophisticated control and monitoring devices for improving the efficiency of the grid. For energy efficient, low cost monitoring and control in smart grid WSN's is treated as a promising technology. Advanced Metering Infrastructure (AMI) is the key technology in the distribution networks of Smart Grid. The AMI is composed of various sensors for metering purpose. The meter data is also useful for the distribution operators to manage the demand response. The network involves smart meters, smart electric gas and water meters along with digital network management appliances for optimizing the electric network with real time data management. The smart sensors are limited in terms of battery, operational power and memory. These sensors communicate with the base station in restricted range. The communication between smart grid nodes and base station (sink) is multi-hop in nature. The communication takes place within limited range of communication so the security concerns that are involved in the network are to be handled by the routing protocols. So as to make the bidirectional communication efficient between the smart sensors and utility an effective routing scheme is required for these energy limited devices to handle the heavy network traffic in smart grids. Here energy efficient routing for WSN's in NAN networks to attain load balancing is proposed through density based Fuzzy C means clustering (DFCM). The obtained simulation results show that DFCM can provide a satisfactory performance for enhancing the network life span.
相似文献Nicanfar and Leung proposed a multilayer consensus elliptic curve based password authenticated key-exchange (MCEPAK) protocol for smart grid. They claimed that their protocol is secure against possible attacks. In this paper, we show that the MCEPAK protocol is vulnerable to the dictionary attack and an adversary can obtain the passwords of the appliances by eavesdropping the communicated messages in the protocol. Moreover, we state that the passwords can be discovered by curious operators of the building area networks and the neighbor area networks. Theses weaknesses motivated us to introduce a chaotic maps based authenticated key exchange protocol for smart grid. To the best of our knowledge, the chaotic maps based key exchange protocol has not yet been devised for smart grid and the same objective has been fulfilled in this paper. In addition, we prove the security of the proposed protocol by a formal analysis.
相似文献Cloud computing has proven to be applicable in smart grid systems with the help of the cloud-based Internet of things (IoT) technology. In this concept, IoT is deployed as a front-end enabling the acquisition of smart grid-related data and its outsourcing to the cloud for data storage purposes. It is obvious that data storage is a pertinent service in cloud computing. However, its wide adoption is hindered by the concern of having a secure access to data without a breach on confidentiality and authentication. To address this problem, we propose a novel data access control scheme that simultaneously accomplishes confidentiality and authentication for cloud-based smart grid systems. Our scheme can enable the storing of encrypted smart grid-related data in the cloud. When a user prefers to access the data, the data owner issues a delegation command to the cloud for data re-encryption. The cloud is unable to acquire any plaintext information on the data. Only authorized users are capable of decrypting the data. Moreover, the integrity and authentication of data can only be verified by the authorized user. We obtain the data access control scheme by proposing a pairing free certificateless signcryption with proxy re-encryption (CLS-PRE) scheme. We prove that our CLS-PRE scheme has indistinguishability against adaptive chosen ciphertext attack under the gap Diffie–Hellman problem and existential unforgeability against adaptive chosen message attack under elliptic curve discrete logarithm problem in the random oracle model.
相似文献The Internet of Things (IoT) is a network of globally connected physical objects, which are associated with each other via Internet. The IoT foresees the interconnection of few trillions of intelligent objects around us, uniquely and addressable every day, these objects have the ability to accumulate process and communicate data about themselves and their surrounding environment. The best examples of IoT systems are health care, building smart city with advance construction management system, public and defense surveillance and data acquisition. Recent advancement in the technology has developed smart and intelligent sensor nodes and RFIDs lead to a large number of wireless networks with smart and intelligent devices (object, or things) connected to the Internet continuously transmit the data. So to provide security and privacy to this data in IoT is a very challenging task, which is to be concerned at highest priority for several current and future applications of IoT. Devices such as smart phone, WSNs and RFIDs etc., are the major components of IoT network which are basically resource constrained devices. Design and development of security and privacy management schemes for these devices is guided by factors like good performance, low power consumption, robustness to attacks, tampering of the data and end to end security. Security schemes in IoT provide unauthorized access to information or other objects by protecting against alterations or destruction. Privacy schemes maintain the right to control about the collected information for its usage and purpose. In this paper, we have surveyed major challenges such as Confidentiality, Integrity, Authentication, and Availability for IoT in a brief manner.
相似文献Internet of Things (IoT) is a widely adoptable technology in industrial, smart home, smart grid, smart city and smart healthcare applications. The real world objects are remotely connected through internet and it provides services with the help of friendly devices. Currently IEEE 802.15.4e Time Slotted Channel Hopping (TSCH) standard is gaining a part of consideration among the IoT research community because of its effectiveness to improvise the reliability of communication which is orchestrated by the scheduling. As TSCH is an emerging Medium Access Control (MAC) protocol, it is used in the proposed work to enhance the network scheduling by throughput maximization and delay minimization. The paper focuses on proper utilization of the channel through node scheduling. NeuroGenetic Algorithm (NGA) has been proposed for TSCH scheduling and its performance is evaluated with respect to time delay and throughput. The system is implemented in real time IoT devices and results are perceived and analyzed. The proposed algorithm is compared with existing TSCH scheduling algorithms.
相似文献The expanded deployment of smart objects in IoT applications is pushing existing IoT platform architectures and their security functionalities to their limits. Indeed, smart objects exhibit semi-autonomous behaviours, are not centrally controlled all the time and therefore need more dynamic approaches in protecting them against vulnerabilities and security incidents. In this paper, we introduce a novel framework for securing the latest generation of IoT applications that involve smart objects, while illustrating its application in securing an Ambient Assisted Living (AAL) system that comprises socially assistive robots. The framework’s innovative aspects lie in the use of predictive analytics for anticipating the behaviour of smart objects, including abnormalities in their security behaviour. The importance of anticipating such abnormalities is validated, demonstrated and discussed in the context of the AAL application.
相似文献In this paper, a framework of smart transportation system is proposed, aiming to address the transportation problem in Karachi city. In modern day world, the mega cities and urban areas are on the edge of transformation into smart cities. With the advancement of engineering and technology, smart cities are designed to integrate and utilize these scientific innovations to provide smart solutions and social innovations for sustainable infrastructure, thus they are able to provide its resident highest quality of life by utilizing its resources effectively. One of the major application of smart cities is the Smart Transportation System, which provides safer, quick, environment friendly service to the residents. Thus, this study highlights the current traffic situation of Karachi and propose a framework to transform it into a smart transportation system. In order to have a smart transportation system, it is necessary to have in-depth knowledge and information about the city dynamics and its traffic related issues. Therefore, this study also highlights current traffic situation of Karachi, its road conditions and capacity, vehicles condition, alternate mean of transport (other than road-based system) and its present condition, and finally proposes a framework to develop a smart transportation system while keeping in mind the aforesaid traffic problems.
相似文献With the recent advances in ubiquitous communications and the growing demand for low-power wireless technology, smart IoT device (SID) to access various Internet of Things (IoT) resources through Internet at any time and place alternately. There are some new requirements for integration IoT servers in which each one is individually gathering its local resources in Internet, which cooperatively supports SID to get some flexibility or temporary contract(s) and privileges in order to access their corresponding desired service(s) in a group of collaboration IoT servers. However, traditional access control schemes designed for a single server are not sufficient to handle such applications across multiple collaboration IoT servers to get rich services in IoT environments. It does not take into account both security and efficiency of IoT servers, which securely share their resources. Therefore, the collaboration IoT-based RBAC (Role-based Access Control) with trust evaluation (TE) algorithm model to reducing internal security threats in intra-server and inter server for the massive IoT integrated application is proposed in this paper. Finally, the three trust evaluation algorithms including a local trust evaluation algorithm, a virtual trust evaluation algorithm and a cooperative trust evaluation algorithm in the proposed collaboration IoT-based RBAC model, which are designed and presented for reducing internal security threats in collaborative IoT servers.
相似文献