SECURE SMART GRID DEVICE for HOME AREA NETWORKS Using WIRELESS APPLICATION PROTOCOL

Similar documents
Wireless Access Protocol(WAP) architecture

M.SARAVANA KARTHIKEYAN

Mobile Station Execution Environment (MExE( MExE) Developing web applications for PDAs and Cellphones. WAP (Wireless Application Protocol)

Potential Threats to Mobile Network Security

Chapter 3. Technology Adopted. 3.1 Introduction

WAP Access to SCADA-Typed Database System

Outline. CS5984 Mobile Computing HTTP. HTTP (especially 1.0) Problems 1/2. Dr. Ayman Abdel-Hamid, CS5984. Wireless Web.

CPS221 Lecture: Layered Network Architecture

Network Connectivity and Mobility

WHITE PAPER. Good Mobile Intranet Technical Overview

b) Diverse forms of physical connection - all sorts of wired connections, wireless connections, fiber optics, etc.

WAP via ORBCOMM. Andrew R Cardoza, Sias Mostert.

POSTER SESSION. Wireless Cardiology Decision Support System. Proceedings Paper. Slide Presentation. Dr. Saji Salam SSI Technologies Chennai, India

Jawaharlal Nehru Engineering College

Developing corporate mobile applications. An alternative approach to native development

Wireless Internet: layers 3,4,5. Wireless Internet: Layers 3,4,5 Case Study: WAP. WAP: Wireless Application Protocol

GRAPHICAL SIMULATION OF WIRELESS APPLICATION PROTOCOL

Pervasive Web Application Architecture. History Scalability Availability Development Application Architecture

Overview. M-commerce vs. E-commerce

Development of Communication Software for Mobile Computing

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

WAP. Bringing the internet to you. Cynthia Luk Marianne Morris Harvey Wong. 4 April, 2002 CMPUT 499

ThinAir Server Platform White Paper June 2000

Mobile Devices: Server and Management Lesson 04 Gateways and Portals

Study of Smart Home System based on Zigbee Wireless Sensor System. Jie Huang 1

Thin Client Content Options

The WAP Roadmap. Short Term Goals for WAP

S. Indirakumari, A. Thilagavathy

WIRELESS APPLICATION PROTOCOL (WAP)

User Manual. Mobile Viewer Mobile Manager Software (MMS) 1 st Edition : 10 Jan nd Edition : 31 Mar rd Edition : 20 May 2010

A novel approach to design a Wireless Communication based Railway Information System Kumar, Vijay; Patra, Sarat Kumar; Mishra, Sanjib; TENCON

UNIVERSITY EXAMINATIONS: NOV/DEC 2011 REGULATION PERVASIVE COMPUTING PART A

Introduction to 9.0. White Paper. Sync and Surf FirstClass Support for Mobile Users. November Powering collaborative online communities.

Reference Design for Residential Energy Gateways

Summer Webinar Series

[Hatwar, 3(3): March, 2014] ISSN: Impact Factor: 1.852

Autorama, Connecting Your Car to

MOBILE COMPUTING (Common to Computer Science & Engineering and Information Technology)

Light Mesh AP. User s Guide. 2009/2/20 v1.0 draft

4.1 Introduction to Media and Devices

MOBILE IP AND WIRELESS APPLICATION PROTOCOL

Enabling the Wireless Internet

HART COMMUNICATION. A Digital Upgrade For Existing Plants

Wireless-N. User Guide. USB Network Adapter WUSB300N WIRELESS. Model No.

Enterprise Software Architecture & Design

TECHNOLOGY Introduction The Difference Protection at the End Points Security made Simple

QuickSpecs. Compaq NonStop Transaction Server for Java Solution. Models. Introduction. Creating a state-of-the-art transactional Java environment

Solution Architecture

X-S Framework Leveraging XML on Servlet Technology

Session 4 Networks II

Datasheet. Shenzhen TG-NET Botone Technology Co., Ltd. M-5 TG-NET Cloud Box. Datasheet

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

SMS Based Household Appliance Monitoring and Controlling System Ms.Shraddha G.Rajkuwar*1, Ms.Rupali G.Bhople*2, Ms.Pooja V.

Everyplace Suite: Websphere Transcoding Publisher Technical Overview

Virtual Credit Card Processing System

Vortex Whitepaper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

TN3270 AND TN5250 INTERNET STANDARDS

An Introduction to NetWare 5.1 Web Services

IIOP: Internet Inter-ORB Protocol Make your code accessible even in future, with the next universal protocol

Switching on our smartphone and sending an to a friend living 5000 km from our home is something that we take for granted, but that involves a

Clouds and Things. Implications of the Cloud and Internet-of-Things for SCADA/ICS. April 25, 2018

All about the new SCMAD Certification Exam

Airo National Research Journal October, 2016 Volume V, ISSN:

DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK UNIT I PART A (2MARKS)

5G radio access. ericsson White paper Uen June research and vision

The Device Has Left the Building

AQU Information Systems Fundamentals Spring 2012 Pg. 9.1

Chapter 8: Smart Grid Communication and Networking

IPv6 Home Automation. IGC/INET, 12/05/2004 Jordi Palet & Francisco Ortiz Consulintel

Cisco Energy Management

BlackBerry 101: An Introduction to the BlackBerry Wireless Solution

SyncML DM: A SyncML Protocol for Device Management

4. B2C,B2E Systems: Concepts and Architectures

Diagnostic Trends 2017 An Overview

A Proposed Framework for Testing Mobile Cloud Based Applications Using Mobile Testing as a Service (MTaaS)

International Journal Of Advanced Research In Engineering Technology & Sciences

Cyan Technology Ltd. Smart energy solutions. Meeting the challenges of smart metering in emerging regions

Bob Warden. IP Metering and the Smart Grid WAN Revolution October 27, 2008

Chapter 2 Communication for Control in Heterogeneous Power Supply

S5 Communications. Rev. 1

IPv6 Network Construction Support Solution: Application to the IPv6 Experimental System of IPv6 Promotion Council

User Guide Supplement Measurement Systems International

A Practical Approach to IPv6

NM6000 User's guide v1.2

Part I: Hardware and communication

The convergence of network computing and telecommunications

Wireless Networking by Ron Fugazzi

Quality of service issues for world-wide mobile telephony

INTEGRATION OF SECURITY PROTOCOL IN BETWEEN THE NETWORK GATEWAY

WAP/ WML : Wireless Protocol wireless protocol

Authenticating on a Ham Internet

BlackBerry Integration With IBM WebSphere Everyplace Access 4.3

Feature Guide. Sybase mbanking

Celestix Networks, Inc. 702 Brown Road. Fremont, California Ph Fx Introduction to Wireless Local Area Network

JAWAP: the Java Application Framework

Panel: Enabling Consumer Visibility into Energy Usage

EFFECTS OF COMPRESSION ON SYSTEM THROUGHPUT IN WIRELESS APPLICATION PROTOCOL (WAP) 2.0 ARCHITECTURE. KASHIF KHAN. Masters of Computer Science

BUYING DECISION CRITERIA WHEN DEVELOPING IOT SENSORS

USB Key as an active device of Security System

IP PBX for Service Oriented Architectures Communications Web Services

Transcription:

826 SECURE SMART GRID DEVICE for HOME AREA NETWORKS Using WIRELESS APPLICATION PROTOCOL S. RAM KANNAN B.E, CSE Chennai, TN India ramkannan1991@gmail.com R. SABARISH B.E, CSE Chennai, TN India sabarish.raghu@gmail.com Abstract: The use of Internet and Mobile user reliance on Internet services, along with advancement of portable computing devices and wireless communication networks has been growing tremendously. This growth pattern is also seen in the day to day accidents that occur primarily due to negligence. House hold monitoring has become tedious to mankind and there is a need of a computing service that serves this purpose. In order to provide such an end-to-end solution, an open architecture is required to provide the intelligent network solution. To ensure the Secure and efficient communication between human being and managed devices for Smart Grid and Smart Home, this project propose the architecture and design of a secure access gateway (SAG) for home area networks. Wireless Application Protocol (WAP) is a widely used mobile Internet access solution, enabling users browse on the go. This paves way to a secure access gateway at homes and building controllable smart homes through WAP. Keywords: - Home Assistant, Smart Grid, SAG, WAP INTRODUCTION:- The Internet is becoming an ever essential and integral part of our lives, expanding well beyond the desktop and personal computer. In addition, Hand-held phones with Internet facilities are an integral part of a person s life these days and blooming technologies like Wireless Application Protocol (WAP) are starting to monopolize the day to day functions, offering convenient, simple and ease of use in the typically frantic lifestyle. For example, when a person leaves for a vacation, and he is not sure of whether he has switched off every device and appliance at home, a cell phone can be used to connect to the devicenetworking gateway in the home. The enabled appliances are checked and turned off remotely, as needed. Using your cell phone, you can pay for drinks in a vending machine as the phone remotely manages your account information for billing purposes. These and many other device networking solutions will find that a WAP-enabled cell phone is a convenient and appropriate technology for monitoring, managing, configuring and controlling embedded devices. Connecting everyday devices to the Internet is only a part of the solution. Once connected, a complete end-to- end solution needs to be in place to realize the promise of networked devices. In order to provide such an end-to-end solution, an open architecture is required to provide the intelligent network solution. In the wire line domain, the high-speed wire line links and the core routers are used as the backbone network, whereas the servers host the contents provided to the mobile Internet users. On the wireless domain, handheld devices such as Mobile Phones, Personal Digital Assistants (PDAs), Portable PCs, Smart Phones, etc., are used as enduser terminals. At the wire line / wireless interface, the base stations (Network Controller or Mobile Switching Center) are used to provide wireless network access points to mobile users. The system proposes the following features :- 1. This project proposes the architecture and design of a secure access gateway (SAG) for home area networks. 2. The proposed architecture contains three major components: the remote wireless enabled device (called C-Mobile), the Secure Access Gateway (SAG), and the

827 Smart Home managed devices, especially home devices for Smart Grid. 3. The main idea of the proposed secure access authentication. WAP gateway used for secure authentication. Control of Automation via Internet data from gateway to web server can be encrypted. However the data must be decrypted in the gateway, because the terminal uses WTP (Wireless Transfer Protocol) and the Internet uses HTTP as a transfer protocol. Direct conversion from a protocol to another is not possible in secure mode at least in the version. This established networking infrastructure provides the primary conduit between the gateway and the Client. TCP/IP is leveraged as it is with the existing base of development, diagnostic and monitoring tools In our experiments we used Nokia WAP Server 1.0 as a gateway and Nokia 7110 telephone (software v 4.69) as terminal equipment. a. Client Application This is the user interface or application in whatever forms it needs to be for the specific solution. The first user interface technology that comes to mind when considering networked devices is usually a web browser. Browser technology is appropriate for remote configuration, management and service. However, for aggregating information from a large number of devices in a non-persistent network, a database would better serve as the client. Custom or enterprise applications, telephony, cell phones, PDAs and pagers, are examples of user interfaces that can interact with devices through the gateway. Fig 1: Schematic diagram for control of automation through internet. The main purpose of the protocol stack is to ensure reliable and secure transfer of the content. The WAP protocol stack has four layers; the model is very similar to OSI model. A simple WAP application consists of a client application (WML and WMLS pages) that the WAP gateway downloads from the application server and passes to the user agent for execution (micro browser). More efficient applications are made with server side enhancements, like CGI scripts, servlets etc. The content can also be located on a separate web server from where the gateway receives it. The content and applications are addressed with an URL in the same way as in any other Internet protocol. From the user point of view WAP offers dynamic user interface in a similar manner as web browsers for desktop computers. WAP server security protocol (WTLS) is a noteworthy issue in WAP specifications. The WTLS protocol provides content encryption, content integrity and server authentication using certificates. WTLS is based on TLS/SSL; it is only optimized for use over wireless networks. The data from terminal to base station and to gateway, and There are other approaches to device networking that differ in the communication networks, the extent of the gateway functionality and the flexibility of the client applications. However, this discussion will focus on the principles of managing the device network from a client application, specifically a WAP-enabled device. b. Focus on The Client Application When an end-to-end is considered, for a device networking solution, there are many important factors that should be considered to be incorporated into the design. C. WAP-Enabled Devices as Clients There are many instances where cell phones, pagers or PDAs provide the appropriate

828 technology to fill the solution requirements at the client end of the device network. Many of these devices are capable of communicating via WAP. WAP is an open, global specification that empowers mobile users with wireless devices to easily access and interact with information and services. ARCHITECTURE :Home Automation using WAP/WML & JAVA Automation and especially remote automation will obtain substantial benefits when applying these new techniques. The basic idea of WAP is to bring the same services that are used in Internet, available also for the mobile users. It defines the application environment, the communication protocol itself, as well as an application layer consisting of a markup language (WML) and scripting language (WMLS). WAP pays attention also to limitations of mobile phones: small displays, slow data transmission and limited input capabilities. guaranteed and no one else can control the process than an authorized user. Home Automation Emergence of distributed intelligent control systems and home automation has changed the traditional concept of smart consumer appliances and their control architectures. The smart consumer appliances won't be the standalone devices anymore; they already have on board computers or abilities to be connected to home network and other local or global networks. It is not difficult to envision a local domestic network based on all these smart appliances. WAP satisfies the new needs in industry and home automation. With WAP you can control and monitor everything that can be connected to the Internet. Nowadays your washing machine as well as fieldbuses may have Internet capabilities. Its real significance is revealed when we need wireless data transfer. We are no longer tied to our computers; we have almost the same functionality in our mobile phones. The key to the security is naturally a gateway, which translates WAP requests into HTTP requests, converts the responses to WAP, and encodes content to binary form. In Nokia WAP Server you can protect control commands transferred from the Nokia WAP Server to WAP terminals by combining the Nokia WAP Server with the Nokia WAP Server Security Pack. Similar solutions are also available from several other vendors gateways, e.g. Infinite Technologies WAP Lite. There are also some security problems with different software versions of Nokia 7110, e.g. software versions before 4.75 don t support WTLS. In such industrial experiments like our pilot process where user controls the process, it is important that security is Fig 2: Architecture for SAG home automation system. In figure-1, shows the home networking, it is possible to remotely control how home automation systems work. Therefore, to improve the system performance a lot, for instance, to read utilities automatically to view home surveillance cameras at office, and to adjust the residential environments. (i.e. lighting, temperature, cooler so on). ALGORITHM DEVELOPED :Before programming the AT89C51 the address data and control signals should be set up according to the Flash programming mode. To program the AT89C51 take the following steps.

829 1. Get the desired memory location on the address lines. 2. Get the appropriate data byte on the data lines. 3. Activate the right combination of the control signals. 4. Increase EA to 12 V for the high-voltage programming mode. 5. Pulse ALE / PROG ones to program a byte in the Flash array and the lock bits. The byte write cycle being self-timed takes no more than 1.5 meters. Repeat steps 1 through 4, Change the address and data for the entire array or till the end of the object file is reached. Fig: 3 PROJECT CONTROL FLOW : The product control flow for this project can be represented in the diagram. It shows that a network has been established between a Smartphones and a WAP browser. A webcam directly operates using the instructions given by the web server. The server can be accessed using any WAP browser in Smartphones. The RMI will serve as the medium to control home equipments. Fig: 4 A separate secure login system is created by the server. Each user has to go through the CONCLUSION authentication process to access the Home Reliable and efficient communication between human being and devices plays a key role for Smart Grid and Smart Home. In this article, we discussed the design of a secure access gateway (SAG) for home area network. The SAG serves the purpose as the interface between the remote users and their devices, such that real-time secure monitoring and control of the devices can be achieved through a Smart Phone. The major challenges for the design and deployment of the SAG lie in the ever-increasing demand on security and capacity. We enhance the security from both the network layer and the physical layer. A framework on how to improve the system security, capability, robustness and scalability through Network. Each user is allotted a separate session state along with a specific session expiry time. A means of communication is established in the network using RMI interface which provides serial communication between the control station and micro-controller for setting the specific Device State.

830 cognitive networking is provided thereby a potentially, secure monitoring and control of home devices through wireless communications will gradually penetrate into the world surrounding us and bring great changes to our daily lifestyle. REFERENCES [1] The Smart Grid: An Introduction, http://www.oe.energy.gov/smartgridintroduction. htm. [2] Simmons, Mobile Tips and Tricks, http://www.mobiletipstricks.com/home-controlcentre/. [3] J. Massey, Shift-Register Synthesis and BCH Decoding, IEEE Trans. Info. Theory, vol. 15, Jan. 1969, pp. 122 27. [4] National Bureau of Standards, FIPS Publication 197:Advanced Encryption Standard (AES), http://csrc.nist.gov/publications/fips/fips198/fips198a.pdf, Mar. 2002. [5] L. Lightfoot et al., Secure Collision-Free FrequencyHopping for OFDMA Based Wireless Networks, EURASIP J. Advances in Sig. Proc., 2009 (Article ID361063), 2009. [6] V. Tarokh, H. Jafarkhani, and A. R. Calderbank, Space-Time Block Code from Orthogonal Designs, IEEE Trans.Info. Theory, July 1999. [7] S. Haykin, Cognitive Radio: Brain-Empowered WirelessCommunications, IEEE JSAC, vol. 23, no. 2, Feb. 2005,pp. 201 20.