SURVEY ON: MININIZING THE MESSAGE DELAY BY USING SMARD GRID APPLICATION
Journal: International Journal of Computer Engineering and Technology (IJCET) (Vol.8, No. 5)Publication Date: 2017-10-30
Authors : S. Syed Shajahaan;
Page : 144-150
Keywords : Smart Grid; potential security; wireless networks; spread spectrum; overcrowding process; jamming models.;
Abstract
Wireless networks introduce potential security vulnerabilities due to the shared nature of wireless channels. In wireless sensor network we have so many issues under jamming attacks. A wireless network that uses multiple frequency and code channels to provide jamming attacks resilience for smart grid applications (group of system connected in source provider). A synergistic combination of multipath relay transmissions, K-out-of N message encoding, packet encryption, heteromorphy packet relay and dynamically assignable IP addresses. The characteristics of the virtual network topology and protocols together impede the attacker's ability to analyze traf ic patterns, limit the visibility of real IP addresses to those cooperating hosts that are topologically adjacent to a host whose traf ic is being monitored, and allow hosts to spread their IP identities and to modify the IPs associated with a host. By defining a generic overcrowding process that characterizes a wide range of existing jamming models, we show that the worst-case message delay is a U-shaped function of network traf ic load. This indicates that, interestingly, increasing a fair amount of redundant traf ic, called camouflage, can improve the worst-case delay performance
Other Latest Articles
- SURVEY OF CROWDSOURCING IN SOFTWARE ENGINEERING: MODELS, OPPORTUNITIES AND CHALLENGES
- USAGE OF FULLY CONVOLUTION NETWORK WITH CLUSTERING ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORKS
- AN ENERGY AWARE OPTIMIZED INTELLIGENT TRANSPORT SYSTEM USING ELHACO WITH FUZZY METHOD TO CONTROL TRAFFIC IN INTERNET OF VEHICLES
- DATA PERTURBATION FOR PRIVACY PRESERVATION IN DATA MINING
- INTEGRATED AUTOMATE CLIMATE CHANGE FACTORS DETECTION AND MONITORING USING MULTIPLE TECHNOLOGIES
Last modified: 2021-07-07 20:21:50