e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science Volume:02/Issue:11/November -2020
Impact Factor- 5.354
www.irjmets.com
A FINGERPRINT BASED KEY GENERATION APPROACH USING BI KEY COMPUTATIONAL ALGORITHM FOR SMART METER COMMUNICATION Dhirendra Bagri *1, Shashi Kant Rathore*2 *1PhD
Research Scholar, Department of Computer Science and Engineering, Carrier Point University, Kota, Rajasthan, India.
*2Professor,
Department of Computer Science and Engineering, Carrier Point University, Kota, Rajasthan, India.
ABSTRACT The smart meter is a significant piece of interfacing the network to the smart grid. It gathers the clients' electric power utilization subtleties and communicate to the control center for bill generation and observing. This network is bidirectional in nature which not just not only transmit the power but also the details regarding power consumption is also transmitted. The smart meter is helpless against the different digital physical assaults, to keep up the wellbeing and guarantee the security of the smart meter is a significant worry in making sure about the smart grid network. Key based management system plays an important role in ensuring the security in the network. The deployment of this key-based management model for very large scale of devices such a smart meter is very complicated in nature. The information gets created progressively and the measure of information is colossal. In this article, a Safe and powerful key-based administration framework is proposed where keys are separated from the unique fingerprint-based strategy with the assistance of a bi-key computational calculation. The proposed approach is implemented using MATLAB Simulink and its performance is analyzed. In this paper the analytical study of proposed work demonstrates the suitability and security generated data from smart meter Keywords: fingerprint, bio-cryptogprhy, AMI.
I.
INTRODUCTION
To maintain flawless power distribution, smart meters intelligently sends the information to control server. These generated data from a smart meter is very sensible and quickly predictive. There are certain possibilities of direct attacks to end-user by hijacking the user data. So, this issue needs to be shorted out by enhancing the security mechanism for the generated data by smart meters. A review study has been done on communicating network which is suitable for the smart grid and wireless mesh network topology and this topology for the local area as found to be suitable and deployable for smart meter data collections. The various Cryptography security algorithms are implemented for ensuring the security for communicating network, one of the important methods of cryptography is a key-based management approach. In the network of the smart grid where a huge number of smart meters are connected and continuous informative data of users’ power consumption is generated, the key management system becomes complicated in its work and verifying the authentic keys increases the burden on smart meter [1]. to seek the solution for such problems bio Cryptography which is highly emerging technology can be implemented to generate the effective key-based management system. in this model, a fingerprint-based biometric technique is used for generating the keys where fingerprint feature extraction is done by rotation of image at a particular degree and by creating the subtemplates from the original template. nowadays it becomes very easy to hack the fingerprint impression of any particular user without their prior permission. Nowadays breaking into smart meter with the old implemented existing methods of keys generation is not a difficult task. These concerns raise a need to work on developing key generation measurement system using fingerprint biometric which can become available by the hijacker. The surveyed examination has demonstrated that the bio-Cryptography based algorithm may be appropriate for the smart grid network [2] bio Cryptography based algorithms have security and figure out how to get achievement in protection in contrasted with the regular cryptography. In this work a proficient key production method based on the unique fingerprint utilizing bi-key computational algorithm is proposed. This work is simulated in MATLAB and the performance of the proposed approach is dissected. www.irjmets.com
@International Research Journal of Modernization in Engineering, Technology and Science
[92]