SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
Efficient Authentication and Key Management Mechanisms 
for Smart Grid Communications 
Abstract: 
we propose an efficient key management protocol based on our enhanced 
identity-based cryptography for secure SG communications using the public key 
infrastructure. Secure key distribution schemes for group communications allow to 
establish a secure multi cast communication between a group manager and group 
members through an unreliable broadcast channel. Our proposed mechanisms are 
capable of preventing various attacks while reducing the management overhead. The 
improved efficiency for key management is realized by periodically refreshing all 
public private key pairs as well as any multicast keys in all the nodes using only one 
newly generated function broadcasted by the key generator entity.The article 
classifies, analyzes and compares the most significant key distribution schemes, by 
looking at the selective key distribution algorithms, at the predistributed secret data 
management, and at the self-healing mechanisms. It reviews polynomial-based 
algorithms, exponential arithmetic based algorithms, hash-based techniques, and 
others. Propose classification of schemes based on the applied cryptographic 
primitives. Self-healing group key distribution schemes can be used in various 
network scenarios, thus, to make their analysis and comparison easier, we introduce 
an abstract model of the network in which these schemes are applicable. We 
identified three elements, or building blocks, of self healing key distribution scheme
which can be used to classify and compare the existing solutions 
Existing System: 
1) Insecure mechanisms provided in the existing network. 
2) Almost none of the schemes is suitable for large scale WSN in real- world 
applications. 
3) Existing solutions usually present some trade-off between scheme 
performance and security level. 
4) Identifies basic building blocks of the scheme and describes in details all major 
types of existing solutions. 
5) It also contains a thorough security and efficiency analysis of each solution, 
and points out issues not identified.
Proposed System: 
1) Functionality of the scheme is decomposed into three separate aspects, namely: 
selective key distribution mechanism, predistributed secret data management 
and self-healing mechanism, which are used to classify and compare schemes. 
2) Self-healing group key distribution schemes can be used in multi-cast 
networks with smart grid systems, which are established over a networksl, 
such as machine-to-machine systems, cellular networks and wireless 
networks. 
3) Communications security is achieved by message encryption and 
authentication using shared symmetric secret group key. 
4) A prospective group key distribution scheme should satisfy the following 
requirements: 
• The scheme should prevent adversaries or unauthorized user nodes, which 
are not in G, from learning the group key. 
• Key distribution scheme has to provide fresh keys.
Software Requirements: 
Platform : JAVA(JDK 1.6) 
Front End : JAVA Swing 
Back End : MySQL 
IDE : Net Beans 6.9 
Operating System : Microsoft Windows XP 
Hardware Requirements: 
Processor : Pentium IV Processor 
RAM : 512 MB 
Hard Disk : 10GB 
Monitor : 14” VGA COLOR MONITOR

Mais conteúdo relacionado

Mais de IEEEBEBTECHSTUDENTSPROJECTS

2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryptionIEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...
2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...
2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Profilr toward preserving privacy and...
2014 IEEE JAVA NETWORK SECURITY PROJECT Profilr toward preserving privacy and...2014 IEEE JAVA NETWORK SECURITY PROJECT Profilr toward preserving privacy and...
2014 IEEE JAVA NETWORK SECURITY PROJECT Profilr toward preserving privacy and...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...
2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...
2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...
2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...
2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...IEEEBEBTECHSTUDENTSPROJECTS
 

Mais de IEEEBEBTECHSTUDENTSPROJECTS (20)

2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
 
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
 
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...
 
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...
 
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...
 
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...
2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...
2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Profilr toward preserving privacy and...
2014 IEEE JAVA NETWORK SECURITY PROJECT Profilr toward preserving privacy and...2014 IEEE JAVA NETWORK SECURITY PROJECT Profilr toward preserving privacy and...
2014 IEEE JAVA NETWORK SECURITY PROJECT Profilr toward preserving privacy and...
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...
2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...
2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...
2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...
2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...
 

Último

Phase noise transfer functions.pptx
Phase noise transfer      functions.pptxPhase noise transfer      functions.pptx
Phase noise transfer functions.pptxSaiGouthamSunkara
 
Mohs Scale of Hardness, Hardness Scale.pptx
Mohs Scale of Hardness, Hardness Scale.pptxMohs Scale of Hardness, Hardness Scale.pptx
Mohs Scale of Hardness, Hardness Scale.pptxKISHAN KUMAR
 
دليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide Laboratory
دليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide Laboratoryدليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide Laboratory
دليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide LaboratoryBahzad5
 
Multicomponent Spiral Wound Membrane Separation Model.pdf
Multicomponent Spiral Wound Membrane Separation Model.pdfMulticomponent Spiral Wound Membrane Separation Model.pdf
Multicomponent Spiral Wound Membrane Separation Model.pdfGiovanaGhasary1
 
IT3401-WEB ESSENTIALS PRESENTATIONS.pptx
IT3401-WEB ESSENTIALS PRESENTATIONS.pptxIT3401-WEB ESSENTIALS PRESENTATIONS.pptx
IT3401-WEB ESSENTIALS PRESENTATIONS.pptxSAJITHABANUS
 
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdfSummer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdfNaveenVerma126
 
GENERAL CONDITIONS FOR CONTRACTS OF CIVIL ENGINEERING WORKS
GENERAL CONDITIONS  FOR  CONTRACTS OF CIVIL ENGINEERING WORKS GENERAL CONDITIONS  FOR  CONTRACTS OF CIVIL ENGINEERING WORKS
GENERAL CONDITIONS FOR CONTRACTS OF CIVIL ENGINEERING WORKS Bahzad5
 
Landsman converter for power factor improvement
Landsman converter for power factor improvementLandsman converter for power factor improvement
Landsman converter for power factor improvementVijayMuni2
 
Graphics Primitives and CG Display Devices
Graphics Primitives and CG Display DevicesGraphics Primitives and CG Display Devices
Graphics Primitives and CG Display DevicesDIPIKA83
 
How to Write a Good Scientific Paper.pdf
How to Write a Good Scientific Paper.pdfHow to Write a Good Scientific Paper.pdf
How to Write a Good Scientific Paper.pdfRedhwan Qasem Shaddad
 
Engineering Mechanics Chapter 5 Equilibrium of a Rigid Body
Engineering Mechanics  Chapter 5  Equilibrium of a Rigid BodyEngineering Mechanics  Chapter 5  Equilibrium of a Rigid Body
Engineering Mechanics Chapter 5 Equilibrium of a Rigid BodyAhmadHajasad2
 
solar wireless electric vechicle charging system
solar wireless electric vechicle charging systemsolar wireless electric vechicle charging system
solar wireless electric vechicle charging systemgokuldongala
 
Modelling Guide for Timber Structures - FPInnovations
Modelling Guide for Timber Structures - FPInnovationsModelling Guide for Timber Structures - FPInnovations
Modelling Guide for Timber Structures - FPInnovationsYusuf Yıldız
 
Clutches and brkesSelect any 3 position random motion out of real world and d...
Clutches and brkesSelect any 3 position random motion out of real world and d...Clutches and brkesSelect any 3 position random motion out of real world and d...
Clutches and brkesSelect any 3 position random motion out of real world and d...sahb78428
 
Nodal seismic construction requirements.pptx
Nodal seismic construction requirements.pptxNodal seismic construction requirements.pptx
Nodal seismic construction requirements.pptxwendy cai
 
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...amrabdallah9
 
Technology Features of Apollo HDD Machine, Its Technical Specification with C...
Technology Features of Apollo HDD Machine, Its Technical Specification with C...Technology Features of Apollo HDD Machine, Its Technical Specification with C...
Technology Features of Apollo HDD Machine, Its Technical Specification with C...Apollo Techno Industries Pvt Ltd
 
Transforming Process Safety Management: Challenges, Benefits, and Transition ...
Transforming Process Safety Management: Challenges, Benefits, and Transition ...Transforming Process Safety Management: Challenges, Benefits, and Transition ...
Transforming Process Safety Management: Challenges, Benefits, and Transition ...soginsider
 
nvidia AI-gtc 2024 partial slide deck.pptx
nvidia AI-gtc 2024 partial slide deck.pptxnvidia AI-gtc 2024 partial slide deck.pptx
nvidia AI-gtc 2024 partial slide deck.pptxjasonsedano2
 

Último (20)

Phase noise transfer functions.pptx
Phase noise transfer      functions.pptxPhase noise transfer      functions.pptx
Phase noise transfer functions.pptx
 
Mohs Scale of Hardness, Hardness Scale.pptx
Mohs Scale of Hardness, Hardness Scale.pptxMohs Scale of Hardness, Hardness Scale.pptx
Mohs Scale of Hardness, Hardness Scale.pptx
 
دليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide Laboratory
دليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide Laboratoryدليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide Laboratory
دليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide Laboratory
 
Multicomponent Spiral Wound Membrane Separation Model.pdf
Multicomponent Spiral Wound Membrane Separation Model.pdfMulticomponent Spiral Wound Membrane Separation Model.pdf
Multicomponent Spiral Wound Membrane Separation Model.pdf
 
IT3401-WEB ESSENTIALS PRESENTATIONS.pptx
IT3401-WEB ESSENTIALS PRESENTATIONS.pptxIT3401-WEB ESSENTIALS PRESENTATIONS.pptx
IT3401-WEB ESSENTIALS PRESENTATIONS.pptx
 
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdfSummer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
 
GENERAL CONDITIONS FOR CONTRACTS OF CIVIL ENGINEERING WORKS
GENERAL CONDITIONS  FOR  CONTRACTS OF CIVIL ENGINEERING WORKS GENERAL CONDITIONS  FOR  CONTRACTS OF CIVIL ENGINEERING WORKS
GENERAL CONDITIONS FOR CONTRACTS OF CIVIL ENGINEERING WORKS
 
Landsman converter for power factor improvement
Landsman converter for power factor improvementLandsman converter for power factor improvement
Landsman converter for power factor improvement
 
Graphics Primitives and CG Display Devices
Graphics Primitives and CG Display DevicesGraphics Primitives and CG Display Devices
Graphics Primitives and CG Display Devices
 
How to Write a Good Scientific Paper.pdf
How to Write a Good Scientific Paper.pdfHow to Write a Good Scientific Paper.pdf
How to Write a Good Scientific Paper.pdf
 
Engineering Mechanics Chapter 5 Equilibrium of a Rigid Body
Engineering Mechanics  Chapter 5  Equilibrium of a Rigid BodyEngineering Mechanics  Chapter 5  Equilibrium of a Rigid Body
Engineering Mechanics Chapter 5 Equilibrium of a Rigid Body
 
solar wireless electric vechicle charging system
solar wireless electric vechicle charging systemsolar wireless electric vechicle charging system
solar wireless electric vechicle charging system
 
Modelling Guide for Timber Structures - FPInnovations
Modelling Guide for Timber Structures - FPInnovationsModelling Guide for Timber Structures - FPInnovations
Modelling Guide for Timber Structures - FPInnovations
 
Clutches and brkesSelect any 3 position random motion out of real world and d...
Clutches and brkesSelect any 3 position random motion out of real world and d...Clutches and brkesSelect any 3 position random motion out of real world and d...
Clutches and brkesSelect any 3 position random motion out of real world and d...
 
Nodal seismic construction requirements.pptx
Nodal seismic construction requirements.pptxNodal seismic construction requirements.pptx
Nodal seismic construction requirements.pptx
 
Présentation IIRB 2024 Chloe Dufrane.pdf
Présentation IIRB 2024 Chloe Dufrane.pdfPrésentation IIRB 2024 Chloe Dufrane.pdf
Présentation IIRB 2024 Chloe Dufrane.pdf
 
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
 
Technology Features of Apollo HDD Machine, Its Technical Specification with C...
Technology Features of Apollo HDD Machine, Its Technical Specification with C...Technology Features of Apollo HDD Machine, Its Technical Specification with C...
Technology Features of Apollo HDD Machine, Its Technical Specification with C...
 
Transforming Process Safety Management: Challenges, Benefits, and Transition ...
Transforming Process Safety Management: Challenges, Benefits, and Transition ...Transforming Process Safety Management: Challenges, Benefits, and Transition ...
Transforming Process Safety Management: Challenges, Benefits, and Transition ...
 
nvidia AI-gtc 2024 partial slide deck.pptx
nvidia AI-gtc 2024 partial slide deck.pptxnvidia AI-gtc 2024 partial slide deck.pptx
nvidia AI-gtc 2024 partial slide deck.pptx
 

2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient authentication and key management mechanisms for smart grid communications

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com Efficient Authentication and Key Management Mechanisms for Smart Grid Communications Abstract: we propose an efficient key management protocol based on our enhanced identity-based cryptography for secure SG communications using the public key infrastructure. Secure key distribution schemes for group communications allow to establish a secure multi cast communication between a group manager and group members through an unreliable broadcast channel. Our proposed mechanisms are capable of preventing various attacks while reducing the management overhead. The improved efficiency for key management is realized by periodically refreshing all public private key pairs as well as any multicast keys in all the nodes using only one newly generated function broadcasted by the key generator entity.The article classifies, analyzes and compares the most significant key distribution schemes, by looking at the selective key distribution algorithms, at the predistributed secret data management, and at the self-healing mechanisms. It reviews polynomial-based algorithms, exponential arithmetic based algorithms, hash-based techniques, and others. Propose classification of schemes based on the applied cryptographic primitives. Self-healing group key distribution schemes can be used in various network scenarios, thus, to make their analysis and comparison easier, we introduce an abstract model of the network in which these schemes are applicable. We identified three elements, or building blocks, of self healing key distribution scheme
  • 2. which can be used to classify and compare the existing solutions Existing System: 1) Insecure mechanisms provided in the existing network. 2) Almost none of the schemes is suitable for large scale WSN in real- world applications. 3) Existing solutions usually present some trade-off between scheme performance and security level. 4) Identifies basic building blocks of the scheme and describes in details all major types of existing solutions. 5) It also contains a thorough security and efficiency analysis of each solution, and points out issues not identified.
  • 3. Proposed System: 1) Functionality of the scheme is decomposed into three separate aspects, namely: selective key distribution mechanism, predistributed secret data management and self-healing mechanism, which are used to classify and compare schemes. 2) Self-healing group key distribution schemes can be used in multi-cast networks with smart grid systems, which are established over a networksl, such as machine-to-machine systems, cellular networks and wireless networks. 3) Communications security is achieved by message encryption and authentication using shared symmetric secret group key. 4) A prospective group key distribution scheme should satisfy the following requirements: • The scheme should prevent adversaries or unauthorized user nodes, which are not in G, from learning the group key. • Key distribution scheme has to provide fresh keys.
  • 4. Software Requirements: Platform : JAVA(JDK 1.6) Front End : JAVA Swing Back End : MySQL IDE : Net Beans 6.9 Operating System : Microsoft Windows XP Hardware Requirements: Processor : Pentium IV Processor RAM : 512 MB Hard Disk : 10GB Monitor : 14” VGA COLOR MONITOR