Back to Issue

Lightweight Encryption Authentication Scheme for Smart Grid using SLIM and JAYA Algorithm

Author(s) - Razaullah, Puneet Jain, Ajay Kumar

Original Article | Open Access

About Authors

It is becoming more common for power grids to go down because of unbalanced loads, resulting in power outages and financial losses for consumers. In the future generation of electricity grids, the Smart Grid allows for two-way communication between customers and suppliers. Various sensors in smart metres offer real-time power use and are managed and given instructions by a central unit in the smart grid. Additionally, a smart metre improves power management, dependability, and balance between consumption and production [1].

1Research Scholar, Electronics and Communication Engineering Dept., Adesh Institute of Engineering & Technology, Faridkot, Punjab, India.

2Assistant Professor, Electrical Engineering Dept., Adesh Institute of Engineering & Technology, Faridkot, Punjab, India.

3Research Scholar, Electronics and Communication Engineering Dept., Thapar Institute of Engineering & Technology, Patiala, Punjab, India.,

Authentication, Encryption, JAYA, SLIM, Security, Smart Grid

Published: 14 August 2022

PAPER ID: IRJEEEV1I107221222000006

Pages: 11-20

DOI: 10.55083/cct.irjeee.2022.v01i01006

Journal: IRJEEE, Volume 1, Issue 1





  • Kumar, A. and Agarwal, A., 2016, November. Research issues related to cryptography algorithms and key generation for smart grid: A survey. In 2016 7th India International Conference on Power Electronics (IICPE)(pp. 1-5). IEEE.
  • Arnold, G.W., 2011. Challenges and opportunities in smart grid: A position article. Proceedings of the IEEE99(6), pp.922-927.
  • Komninos, N., Philippou, E. and Pitsillides, A., 2014. Survey in smart grid and smart home security: Issues, challenges and countermeasures. IEEE Communications Surveys & Tutorials16(4), pp.1933-1954.
  • Qian, J., Cao, Z., Dong, X., Shen, J., Liu, Z. and Ye, Y., 2020. Two secure and efficient lightweight data aggregation schemes for smart grid. IEEE Transactions on Smart Grid12(3), pp.2625-2637.
  • Mahmood, K., Chaudhry, S.A., Naqvi, H., Shon, T. and Ahmad, H.F., 2016. A lightweight message authentication scheme for smart grid communications in power sector. Computers & Electrical Engineering52, pp.114-124.
  • Abood, O.G., Elsadd, M.A. and Guirguis, S.K., 2017, December. Investigation ofcryptography algorithms used for security and privacy protection in smart grid. In 2017Nineteenth International Middle East Power Systems Conference (MEPCON) (pp. 644-649).IEEE.
  • Rajdeep Kaur, Puneet Jain, Navdeep Kaur Jhajj. 2020.Data and key encapsulation for the smart grid using improved AES and difference expansion algorithm. International Journal of Advance Research, Ideas and Innovations in Technology, 6(5), pp. 127-133.
  • Ravi Duddi, Puneet Jain 2021. Authentication encryption scheme using leopard and chaotic tent map algorithm for smart gridInternational Journal of Advance Research, Ideas and Innovations in Technology, 7(2), pp. 453-458.
  • Aboushosha, B., Ramadan, R.A., Dwivedi, A.D., El-Sayed, A. and Dessouky, M.M., 2020. SLIM: A lightweight block cipher for internet of health things. IEEE Access8, pp.203747-203757.
  • DESSOUKY, M.M., SLIM: A Lightweight Block Cipher for Internet of Health Things.
  • Zitar, R.A., Al-Betar, M.A., Awadallah, M.A., Doush, I.A. and Assaleh, K., 2021. An intensive and comprehensive overview of JAYA algorithm, its versions and applications. Archives of Computational Methods in Engineering, pp.1-30.
  • Pandey, H.M., 2016, January. Jaya a novel optimization algorithm: What, how and why?. In 2016 6th International Conference-Cloud System and Big Data Engineering (Confluence)(pp. 728-730). IEEE.
  • Houssein, E.H., Gad, A.G. and Wazery, Y.M., 2021. Jaya algorithm and applications: A comprehensive review. Metaheuristics and Optimization in Computer and Electrical Engineering, pp.3-24.
  • Kanwal, S., Inam, S., Cheikhrouhou, O., Mahnoor, K., Zaguia, A. and Hamam, H., 2021. Analytic study of a novel color image encryption method based on the chaos system and color codes. Complexity2021.
  • Kumar, A., Karmakar, A. and Agarwal, A., 2021. Privacy-Preserving Method for Public Health Surveillance Data using Image Steganography. Tobacco Regulatory Science7(6), pp.6814-6830.
  • Barker, E., Barker, E., Roginsky, A. and Davis, R., 2012. Recommendation for cryptographic key generation.

Razaullah, Puneet Jain, Ajay Kumar. (2022). Lightweight Encryption Authentication Scheme for Smart Grid using SLIM and JAYA Algorithm. International Research Journal of Electrical & Electronics Engineering  (IRJEEE), Vol.1 Issue 1, pp 11-20.