7 results on '"Divya M Menon"'
Search Results
2. Cyber-Resilient Energy Infrastructure and IoT
- Author
-
Divya M. Menon, S. Sindhu, M. R. Manu, and Soumya Varma
- Subjects
business.industry ,Computer science ,Grid ,Computer security ,computer.software_genre ,Smart grid ,Home automation ,Architecture ,Internet of Things ,business ,Resilience (network) ,Message queue ,computer ,Data transmission - Abstract
Energy infrastructure is of strategic importance to every nation as it plays a significant role in the development of a country. Smart grid, the new-generation power grid, focuses on duplex communication between suppliers and consumers. The heterogeneous nature of smart grid possesses different security threats, and integrating these components in the grid increases the possibility of vulnerabilities. The major challenge is to make sure that power availability is not affected when implementing security in the grid and hence a cyber-resilient smart grid is the need of the hour. Secure smart grid last-mile communication includes secure smart meters, smart homes and home area network. Internet of Things (IoT)-enabled smart homes are distributed throughout the smart grid home area network to facilitate the dynamic nature of grid. Smart meters communicate with all the entities involved in last-mile communication of the smart grid. A social Internet of Things based on trust model should be implemented for cyber resilience in smart homes for secure data transmission. The trust-based social IoT smart home architecture consists of machine learning-based predictive system for detection of cyber-attacks in smart homes. Machine learning approaches will be able to consider the computing capabilities of devices involved in smart homes and analyse the possible patterns of cyber-attack in the grid. This will help in early detection of attacks and threats in the smart grid. Machine learning-based approaches in smart homes can make the grid fault-tolerant and resilient which improves the security and efficiency of the smart grid.
- Published
- 2021
- Full Text
- View/download PDF
3. Design of a Trusted Third Party Key Exchange Protocol for Secure Internet of Things (IoT)
- Author
-
Divya M Menon and P. K Jamshiya
- Subjects
Key generation ,business.industry ,Process (engineering) ,Computer science ,020206 networking & telecommunications ,02 engineering and technology ,Trusted third party ,Encryption ,Computer security ,computer.software_genre ,0202 electrical engineering, electronic engineering, information engineering ,Session key ,The Internet ,business ,computer ,Protocol (object-oriented programming) ,Key exchange - Abstract
IoT incorporates a system of physical objects that are interconnected to exchange and collect data over the internet. The services provided by IoT, though improves the standard of our lives, have major challenges on securing networks and data in transmission because of the innumerable devices and services that are associated with it. Securing data is essential and it must not be seen as an afterthought. This paper proposes a secure Trusted-third-party based key exchange protocol (STKEP) for data communication in Internet of Things (IOT). This work employs an elliptic curve cryptographic method for encryption process. A session key is used to encrypt the data which is transmitted between the communication parties with the help of a trusted third party.
- Published
- 2018
- Full Text
- View/download PDF
4. Design of a Secure Architecture for Last Mile Communication in Smart Grid Systems
- Author
-
Divya M Menon and N. Radhika
- Subjects
Engineering ,business.industry ,Fault tolerance ,Smart grid ,Enterprise information security architecture ,Encryption ,Computer security ,computer.software_genre ,Smart Meters (SM) ,Secure communication ,Data integrity ,Default gateway ,General Earth and Planetary Sciences ,Digital Signature ,Last mile ,business ,computer ,General Environmental Science ,Computer network - Abstract
Ever increasing need of electricity has paved the need for Smart Grids. Smart Meters, digitalized networks and fault tolerant systems are the basic infrastructure which supports Smart Grid. Security in Smart Grid has become a major concern in the present scenario. In this paper we have proposed security architecture at the last mile distribution in Home Area Networks. A Secure communication architecture has been modeled which focuses on secure data transmission between the Smart Meters at home and Central Gateway at the utility centre. Hybrid Encryption algorithms and Digital Signature has been used to provide data integrity. The strength of the model has been verified with the help of an attacker and the model is found to resist attacks. The Encryption time and Decryption time of the cyptostack is lower when compared with other encryption algorithms.
- Published
- 2015
- Full Text
- View/download PDF
5. Design of an integrated speed tracking and toll management system for express highways
- Author
-
P. Gautham Raj, S. M. Keerthana, P. Anju, Divya M Menon, and Allen Francis Antony
- Subjects
biology ,Computer science ,Reliability (computer networking) ,media_common.quotation_subject ,Real-time computing ,Optical character recognition ,computer.software_genre ,Tracking (particle physics) ,Identification (information) ,Toll ,Logic gate ,Management system ,biology.protein ,Quality (business) ,computer ,media_common - Abstract
This paper is about the more sensitive and innovative way of maintaining the traffic speed standards along with impartial toll distribution for every citizen passes through the highway giving prior importance to the human safety, security and egalitarianism. It's a novel replacement for the dull conventional traffic system. In this, the time of passing of a vehicle is recorded at every instant where the scanners are placed to deduce the fair toll amount from their account and to record their speed. Even if, we prefer to use Radio-frequency identification tags on every vehicle that passes the toll gate, on the worst side, the Optical Character Recognition technology is used and applied over the high contrast images being captured by the cameras. The time-and-speed thresholds between the checkpoints are then calculated and have been set up accordingly. The vehicles exceeding the thresholds are noted and are charged with appropriate penalty. This results in an impartial and symmetric way of tracking speed resulting on an effect over the fear-factor of drivers on taking up speed. This work aims to provide the realtime speed monitoring system and fair toll distribution system thus ensuring more reliability and quality to the Indian traffic system.
- Published
- 2017
- Full Text
- View/download PDF
6. Anomaly detection in smart grid traffic data for home area network
- Author
-
Divya M Menon and N. Radhika
- Subjects
Engineering ,business.industry ,010401 analytical chemistry ,Home area network ,020206 networking & telecommunications ,Denial-of-service attack ,02 engineering and technology ,Intrusion detection system ,Computer security ,computer.software_genre ,01 natural sciences ,0104 chemical sciences ,Flooding (computer networking) ,Smart grid ,Software deployment ,0202 electrical engineering, electronic engineering, information engineering ,Anomaly detection ,business ,Cluster analysis ,computer ,Computer network - Abstract
Strengthening of Smart Grid functionalities has become the need of the 21st Century. Security evolves to be the primary concern at the deployment level of Smart Grids. Cyber security threats and vulnerabilities in Smart grid Network needs to be addressed before the deployment of the Smart Grid. Our proposed intrusion detection scheme identifies anomalies in the Smart Grid traffic and detects attacks like flooding which causes Denial of Service in Smart Grid Networks. This paper applies k-Means algorithm for clustering of traffic data and outlier detection for the data transmitted between utility Centre and the Smart Homes. Performance of the algorithm has been compared with other clustering algorithms and the results were found to have higher percentage in anomaly detection.
- Published
- 2016
- Full Text
- View/download PDF
7. Design of a secure smart grid architecture model using damgard Jurik cryptosystem
- Author
-
K. Seethal, N. Radhika, and Divya M Menon
- Subjects
Engineering ,Authentication ,General Computer Science ,business.industry ,General Engineering ,Fault tolerance ,computer.software_genre ,Encryption ,Grid ,Smart grid ,Digital signature ,Grid computing ,Embedded system ,business ,computer ,Efficient energy use - Abstract
Smart grid is a paradigm shift from the traditional Power grid which promises to make the electric grid both energy efficient and Fault tolerant. Trade-off between Energy savings and Security is a critical issue in Smart grid architecture. Smart grid architecture requires a high level secure data exchanges between sensors like Phasor Measurement Units and Advanced Metering Infrastructures like Smart Meters. In this study a Secure Smart grid Architecture model is proposed for the Smart grid network. Initially DamgardJurik encryption algorithm is applied on the data from the Phasor Measurement Units and a digital signature is then attached to the encrypted text to provide further authentication. The digitally signed data is collected in Data centre where it is decrypted. The proposed architecture has been implemented in both software and hardware. The effectiveness of the system is verified by introducing an intruder in hardware implementation.
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.