e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science Volume:02/Issue:11/November -2020
Impact Factor- 5.354
www.irjmets.com
A FINGERPRINT BASED KEY GENERATION APPROACH USING BI KEY COMPUTATIONAL ALGORITHM FOR SMART METER COMMUNICATION Dhirendra Bagri *1, Shashi Kant Rathore*2 *1PhD
Research Scholar, Department of Computer Science and Engineering, Carrier Point University, Kota, Rajasthan, India.
*2Professor,
Department of Computer Science and Engineering, Carrier Point University, Kota, Rajasthan, India.
ABSTRACT The smart meter is a significant piece of interfacing the network to the smart grid. It gathers the clients' electric power utilization subtleties and communicate to the control center for bill generation and observing. This network is bidirectional in nature which not just not only transmit the power but also the details regarding power consumption is also transmitted. The smart meter is helpless against the different digital physical assaults, to keep up the wellbeing and guarantee the security of the smart meter is a significant worry in making sure about the smart grid network. Key based management system plays an important role in ensuring the security in the network. The deployment of this key-based management model for very large scale of devices such a smart meter is very complicated in nature. The information gets created progressively and the measure of information is colossal. In this article, a Safe and powerful key-based administration framework is proposed where keys are separated from the unique fingerprint-based strategy with the assistance of a bi-key computational calculation. The proposed approach is implemented using MATLAB Simulink and its performance is analyzed. In this paper the analytical study of proposed work demonstrates the suitability and security generated data from smart meter Keywords: fingerprint, bio-cryptogprhy, AMI.
I.
INTRODUCTION
To maintain flawless power distribution, smart meters intelligently sends the information to control server. These generated data from a smart meter is very sensible and quickly predictive. There are certain possibilities of direct attacks to end-user by hijacking the user data. So, this issue needs to be shorted out by enhancing the security mechanism for the generated data by smart meters. A review study has been done on communicating network which is suitable for the smart grid and wireless mesh network topology and this topology for the local area as found to be suitable and deployable for smart meter data collections. The various Cryptography security algorithms are implemented for ensuring the security for communicating network, one of the important methods of cryptography is a key-based management approach. In the network of the smart grid where a huge number of smart meters are connected and continuous informative data of users’ power consumption is generated, the key management system becomes complicated in its work and verifying the authentic keys increases the burden on smart meter [1]. to seek the solution for such problems bio Cryptography which is highly emerging technology can be implemented to generate the effective key-based management system. in this model, a fingerprint-based biometric technique is used for generating the keys where fingerprint feature extraction is done by rotation of image at a particular degree and by creating the subtemplates from the original template. nowadays it becomes very easy to hack the fingerprint impression of any particular user without their prior permission. Nowadays breaking into smart meter with the old implemented existing methods of keys generation is not a difficult task. These concerns raise a need to work on developing key generation measurement system using fingerprint biometric which can become available by the hijacker. The surveyed examination has demonstrated that the bio-Cryptography based algorithm may be appropriate for the smart grid network [2] bio Cryptography based algorithms have security and figure out how to get achievement in protection in contrasted with the regular cryptography. In this work a proficient key production method based on the unique fingerprint utilizing bi-key computational algorithm is proposed. This work is simulated in MATLAB and the performance of the proposed approach is dissected. www.irjmets.com
@International Research Journal of Modernization in Engineering, Technology and Science
[92]
e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science Volume:02/Issue:11/November -2020
II.
Impact Factor- 5.354
www.irjmets.com
LITERATURE REVIEW OF EXISTING METHODS
A Noval algorithm for the generation of keys with the help of image features has been proposed by Santhi et al. [1]. A gray-level co-event matrix for the given picture is utilized, which can assist with extricating the gray level co-event properties of the picture. Using face features, a key generation algorithm is designed by Lifang et al. [3]. With the help of the fingerprint patterns method is proposed for the generation of cryptographic key using. The stability of the pattern is very good; it remains for a very long time. In this methodology, the keys are produced legitimately from the biometric impression information, and they are not put away in the information base. Another technique for creating two numbers based on a picture that produces 256 bits key or higher for key trade algorithm is proposed by Muraliand Palraj [4].
III.
PROPOSED KEY GENERATION SCHEME
A new design of the key generation method is proposed which works on fingerprint-based technique where bi key computation algorithm’s feature is integrated for secure generation of keys in the smart meter. A. Registration of Smart Meter During the manufacturing process of a smart meter, a unique ID is assigned to a smart meter. The deployment of a smart meter begins by collecting the fingerprint detail of the customer. Once the impression of the fingerprint is received, removal of noises in fingerprint impression can be initiated by doing the thinning of images. Letter on random checkpoint manually inserted into the smart meter and control server by authorized people, these extra featured points are not known to anyone. This additional insertion of Chap point enhances the complexity of fingerprint features which will be used in key generations. This progression of stacking the chap point physically assumes an urgent part in keeping away to recognize the keys despite the fact that the fingerprint mark format is gotten to by the assailants. Comparable unique fingerprint mark impression which is stacked in deployed meter at client side and controlling and administrative server gives an answer for the inconstancy issue in the unique fingerprint mark data. B. Extraction of Features In this paper the point coordinates (X, Y) are used for the representation of Layout of fingerprint mark impression. random keys are produced by the implementation of bifurcated features of client’s fingerprint mark impression. here bifurcation of fingerprint mark Impressions feature is dividing point of one ridge in two different ridges. unique fingerprint mark expression consists of different bifurcating points and this is found in entire fingerprint mark impression. There are some possible cases where the arbitrary generation of keys are enhanced by the uses of ending of ridge. C. Key Generation by FBKG Protocol After the completion of the feature extraction process, FBKG technique is used by smart meter where is smart meter Indus performs a secure key generation task using fingerprint biometric. the encryption could be done on data with the help of generated keys by FBKG protocol. As per the smart meter data transmission standard at least 24 times data need to be sent per hour to control server and this quantity will become 576 the entire day. The first operations of the key generation process start by XORing the secret key, with smart meter unique ID, and the assignment of resultant value will be done to start key, . The Secret key at Smart meter end is received from the controller server. =
(i)
with the assistance of this beginning key the underlying keys are created arbitrarily. For the encryption the further keys are generated by the smart meter. If we take an instance where a control server transmits the starting keys minimum one time in an hour-long, the underlying keys are created with the assistance of strategy where rundown of mystery keys are requested in climbing way with beginning key. The selection of keys for randomization of keys are obtained by keeping the list ‘LP’ in table ‘TP’ of size Sz x ID. www.irjmets.com
@International Research Journal of Modernization in Engineering, Technology and Science
[93]
e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science Volume:02/Issue:11/November -2020
Impact Factor- 5.354
www.irjmets.com
Sz = (Total keys)/ID
(ii)
R=r%S
(iii)
C= r % ID
(iv)
Where, Total keys is the sum total number of keys required, r is the number mentioned in List ‘LT’ which is used to produce mystery key. The underlying keys are the numbers in ‘TP’ which are gotten to by column segment request design. Every mystery key is created from the underlying key of size n. Here ‘R’ and ‘C’ are Row and Column. Here the Bifurcation point list contains the bifurcation point of the fingerprint templates which are kept in list in ascending order. To comprehend this let us consider 'num' as a factor this variable which spares the count of the absolute number of bifurcating points extricated. The separating distance among the bifurcation points of the respective layout of fingerprint mark impression can be calculated and this calculated distance provides the information of random keys generated. The selection of the intermediate point is also very important. The intermediate point selection is achieved using the method where the intermediate point is considered as n equals to 4. ( ) ( ) ( )
( )
( )
( )
( )
( )
( )
( )
( )
( )
( )
( )
( )
( )
The above mentioned (3). the ending point is =floor (sqrt( (
(
( )+1)
(
( )+1)
(
( )+1)
(i) holds start (1), there are two intermediate points named (4), the position is represented by the points in BPL. )
(
(2) and
) )) +1
The directions are held in the situation of relating bifurcating points. The separation is assessed between the first and final point via the center point utilizing the separation procedure that calculated separation will be utilized as the arbitrary key for information encryption.
III.
SIMULATION WORK
With the assistance of a simulator for an advanced metering communication network with the exhibition of the proposed FBKG conventional protocol is investigated which is appeared in Figure 1. The correspondence network is set between a meter which is Wi-Fi enabled, local region network, and mesh topology in wireless fashion is maintained. To make this happen as a real-time operation the communication channel is taken as file which include the property of channel it's having the information of data loss the gaussian noise is added to the selection of a path for communication. This is arbitrarily chosen by meters utilizing ‘if’ condition. In the simulation work, smart meters are taken as particular file in MATLAB, in this file the manual reading is done. The implemented encoding algorithm, unique identity, ID of smart meter and unique fingerprint mark impression is used and stored in a file for a particular smart meter. The grayscale image of John Doe [5] is used as a fingerprint image for the proposed method. while performing the encryption, the proposed protocol is also considered as a file method. The initial stage of encryption is generating the key and a letter on the encryption is also done on a generated key. varieties of methods are existing for generating keys from biometric.
www.irjmets.com
@International Research Journal of Modernization in Engineering, Technology and Science
[94]
e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science Volume:02/Issue:11/November -2020
Impact Factor- 5.354
www.irjmets.com
Figure 1: Simulation for smart metering communication Post-work centers around bifurcating features for unique fingerprint impression executed to create arbitrary keys. The biometric of the fingerprint is shown in bidimensional with x and y-pivot for a given size. The carried-out work consists of working on the generation of random keys and for the production of the keys bifurcating feature of finger impression is used. A bidimensional x and y-pivot with size 600 and 600 respectively used to represent the fingerprint biometric impression. Picture filtration is done to get the location of bifurcation points from the finger impression picture and to do this 'nlďŹ lter' procedural function is utilized in MATLAB. The pre-owned capacity is a sliding area work that attempts to extricate the significant feature of fingerprints, for example, particulars points. The function takes input as M X N Matrix and with the sliding on every pixel of the picture it gives scalar as yield. For sliding a block is taken and the size of the sliding entity is acknowledged as [6]. This sliding block provides more than 70 bifurcation points in the provided image. The estimation of the bifurcation point is spoken to as in arranges X and Y. with the assistance of the Euclidian separation calculation the separation between the bifurcation points are determined and the floor function is actualized on the generated secret or mystery key. During the encryption, every smart meter produces secret key by implementing FBKG function. The functionality of the presented technic is applicable for a bunch of smart meters in an N A N communication. In their group, the last node works as a collector that finally collects the information and it conveys each meter's data to the control server through wide-region network. The introduced approach produces powerful key administration system for meters and security level is upgraded with this method.
IV.
PERFORMANCE AND RESULT ANALYSIS
Smart grid having a limited resource where the generated data from smart meters are received and processing is done without any delay[7]. The proposed approach is evaluated based on the time consumed in maximum processing. the proposed approach is done with a speed of 20 -60 Mb per second which fulfills the minimum criteria of being processing system. The presented method is evaluated and with the existing techniques. The time taken by the presented approach is very less in comparison to the existing approach, the proposed approach having the protocol is FKGE found very effective than the existing approach. The comparison work has been done by analyzing the performance of the proposed approach with the existing scheme. The obtained results are similar outcome is promising for the single key generation just as huge amount of keys. The proposed approach is somewhat quicker to contrast with the existing approach. The minimum fulfilling criteria for advanced metering infrastructure to data transmission is acceptable latency which should be in the range from 2 to 15 second. the presented scheme produces keys in the microseconds. The performance of the proposed approach ensures the effectiveness of data transmission www.irjmets.com
@International Research Journal of Modernization in Engineering, Technology and Science
[95]
e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science Volume:02/Issue:11/November -2020
Impact Factor- 5.354
www.irjmets.com
Another significant concerns should be tended to for the utilization of bio-Cryptography in the smart meter the memory utilized in smart meter is of very small size[8]. so, to store the biometric images there is need of thirdparty compression software using this software the size of the biometric picture can be packed to under 10 KB without influencing the picture quality to store the pictures. The proposed approach sources its performance for generating keys and it becomes suitable for securing AMI key generation. Table 1 Comparative Work between Proposed approach and Existing Method No of Keys Time(microsecond) Time(microsecond) taken by proposed taken by Yu et al. approach scheme 1 30 40 2 45 65 3 60 95 4 75 125 5 90 155 6 105 185 7 120 215 8 135 240 9 148 270 10 165 310
Figure 2: Key Generation time
V.
CONCLUSION
Without proper security to the data generated from the smart meter can introduce a substantial financial loss, and it can travel to the distribution of power. In this work varieties of security concern for smart meter communication has been understood and the emphasis is given on improving the security algorithms so that protection to smart meters can be e provided. In this work and effective fingerprint-based key management has been proposed. Generation of the key is done based on the concept of finding the particular distance between the bifurcating points for the particular image of the fingerprint. The distance between the bifurcation points is computed using the existing Euclidian algorithm. The calculated distance is taken as key. For each key, there is a particular bifurcation point, and the selection of the key is done on random methods and techniques. The Random selection of the keys provides security assurance for the communication channel. The keys are implemented for encryption of uses of our data which is generated by the smart meter. The proposed work is implemented in MATLAB simulation, and the comparative performance analysis Prove the method Provides the good security for the smart meter Communication.
VI.
REFERENCES
[1] Kosut, O., Jia, L., Thomas, R.J., Tong, L.: Malicious data attacks on the smart grid. IEEE Trans. Smart Grid. 2(4), 645–658 (2011) [2] Ancillotti, E., Bruno, R., Conti, M.: The role of communication systems in smart grids: architectures, technical solutions and research challenges. J. Comp. Comm. 36(17), 1665– 1697 (2013) 3. Liu, J., Xiao, Y., www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[96]
e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science Volume:02/Issue:11/November -2020
[3] [4] [5] [6] [7] [8]
Impact Factor- 5.354
www.irjmets.com
Li, S., Liang, W., Chen, C.L.P.: Cyber security and privacy issues in smart grids. IEEE Commun. Sur. Tut. 14(4), 981–997 (2012) Zhang, P., Hu, J., Li, C., Bennamoun, M.: A pitfall in fingerprint bio-cryptography key generation. J. Comp. Secur. 30(5), 311–319 (2011) Habib, A., Ateeq, I.S., Hameed, K.: Biometric security system based on fingerprint recognition. Int. J. Sci. Eng. Technol. 2(9), 892–894 (2013) Hu, J., Pota, H.R., Guo, S.: Taxonamy of attacks for agent-based smart grids. IEEE Trans. Parallel Distrib. Syst. 25(7), 1886–1895 (2014) Singh, S., Agarwal, G.: Use of Chinese remainder theorem to generate random numbers for cryptography. Int. J. Appl. Eng. Res. 1(1), 168–174 (2010) Nath, A., Ghosh, S., Mallik, S.A.: Symmetric key cryptography using random key generator. Int. Conf. Secur. Manag. 2, 239–244 (2010) Yu, K., Arifuzzaman, M., Wen, Z., Zhang, D., Sato, T.: A key management scheme for secure communications of information centric advanced metering infrastructure in smart grid. IEEE Trans. Instrum. Measur. 64(8), 2072–2085 (2015) 10. Kounev, V., Tipper, D.: Advanced metering and demand response communication performance in Zigbee based HANs. In: IEEE Conference Computer Communications Workshops, pp. 31–36 (2013)
www.irjmets.com
@International Research Journal of Modernization in Engineering, Technology and Science
[97]