Advanced Metering Infrastructure: A Concealed Based Approach to Secure Transmission PROJECT TITLE : A Concealed Based Approach for Secure Transmission in Advanced Metering Infrastructure ABSTRACT: The smart grid incorporates an essential component known as the Advanced Metering Infrastructure (AMI), which is the subsystem that is accountable for monitoring the amount of electricity consumed by individual customers. One of the components of the AMI subsystem that enables Communication between the utility provider and customers is the smart meter. These meters play an essential part in the process and play an important role in the overall system. Electric utilities can receive readings of a consumer's electricity consumption in real time from smart meters installed in that consumer's home. Protecting this Communication link from intrusions will continue to be of the utmost importance for ensuring the safe transmission of readings. There are a variety of methods and approaches that have been developed, and the majority of these works involve significant amounts of computational overhead. In this paper, a lightweight Concealed Based Security Scheme (CBSS) for secure transmission within the AMI is proposed. The CBSS will provide authentication while also reducing the computational overheads and the amount of energy consumed during transmission. When compared to the AMI Data Communication Scheme (ADCS), which does not involve any sort of authentication procedure, the CBSS method is utilized. The network is constructed inside of the environment of Network Simulator 2, which demonstrates the Communication that occurs between the nodes. Two random numbers are used in a straightforward encryption and decryption method, which provides an additional layer of protection. This paper makes a contribution by suggesting a lightweight method for the AMI that authenticates the transfer of data between smart meters and other components of the AMI system. This method is the paper's main contribution. A simulation evaluation has also been included in this paper for the design parameters that have been selected to resemble those of an AMI network. When security was added to the network, the simulations showed a 5% improvement in delivery ratio, a 3% improvement in throughput, and a 4% improvement in the amount of energy consumed. Did you like this research project? To get this research project Guidelines, Training and Code... Click Here facebook twitter google+ linkedin stumble pinterest A Real-Time Wireless Sensor Networks Frequency-Time Synchronization Scheme Modeling and Performance Analysis of a Cognitive Unmanned Aerial Vehicle-Assisted Human Bond Communication System