End-To-End Trust Based Transmission Optimization in Smartgrid Network Architecture
| ||International Journal of Computer Trends and Technology (IJCTT)|| |
|© - November Issue 2013 by IJCTT Journal|
|Volume-5 Issue-3 |
|Year of Publication : 2013|
|Authors :M.Ramasaravanan , M.Kirithikadevi|
M.Ramasaravanan , M.Kirithikadevi"End-To-End Trust Based Transmission Optimization in Smartgrid Network Architecture"International Journal of Computer Trends and Technology (IJCTT),V5(3):127-132 November Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract:- The end to end trust based transmission architecture usually crosses several ages to achieve their accuracy and defense tolerated mechanisms. In this trend the forced communication network brings more weakness to the evolving smart grid. Therefore, defensive techniques such as intrusion detection will need to be deployed in this already complicated system. Deployment and runtime cost due to the defensive trust systems will affect the original function of smart grid system without careful planning and design. For the above mentioned problem the new system is required which covers the approach in the following areas: 1) Trust based optimization in source end 2) Applying the new configuration mechanism in the transmission medium 3) Guaranteed the destination end to receive the quantity of stuff received in that system capacity(destination capacity). So that the new system should applying the configuration to the transmission medium to set and check the receiving ration of the destination end at each and every time. If the receiving capacity of the destination is equal to the transmission ratio, the configuration does not required to act; otherwise the configuration mechanism brings the technique to set the forced packets into the receiving capacity of the receiving end. This system is an effort to address this important issue. In particular, the set packing algorithm is used to optimize the placement of the trust nodes of the defensive system in the multiple layer architecture of the smart grid. After the trust nodes are placed, a trust node aware optimal routing algorithm is used to find the least cost routing in the communications of the nodes. The proposal of an algorithm is to identify new trust node to address the fault tolerance requirement of the smart grid system, and talented by providing safe, competent, and trustworthy communications in the smart grid network.
 J. M. C. Gonzalez, K. M. Hopkinson, G. H. Greve, M. D. Compton, J.Wilhelm, S. H. Kurkowski, and R. W. Thomas, “Optimization of trust system placement for power grid security and compartmentalization,”IEEE Trans. Power Syst., vol. 26, no. 2, pp. 550–563, 2011.
 G. N. Ericsson, “Cyber security and power system communication—Essential parts of a smart grid infrastructure,” IEEE Trans.Power Del., vol. 25, no. 3, pp. 1501–1507, Jul. 2010.
 P. McDaniel and S. McLaughlin, “Security and privacy challenges in the smart grid,” IEEE Security Privacy Mag., vol. 7, no. 3, pp. 75–77, May 2009.
 G. N. Ericsson and A. Torkilseng, “Management of information security for an electric power utility—on security domains and use of ISO/IEC17799 standard,” IEEE Trans. Power Del., vol. 20, no. 2, pp. 683–690, Apr. 2005
 G. N. Ericsson, “Classification of power systems communications needs and requirements: Experiences from case studies at Swedish national grid,” IEEE Trans. Power Del., vol. 17, no. 2, pp. 345– 347, Apr. 2002.
 S. B. Jeong, Y.Woo, and S. Kim, “An effective placement of detection systems for distributed attack detection in large scale networks,” in Proc. WISA 2004, 2004, LNCS 3325, pp. 204–210.
 R. Chandra, L. Qiu, K. Jain, and M. Mahdian, “Optimizing the placement of internet TAPs in wireless neighborhood networks,” in Proc. ICNP, Oct. 2004, pp. 271–282.
Keywords :— Smart grid, End to End Trust Based Transmission Architecture, Intrusion Detection System, Wide Area Network.