IoT Driven HRES Smart Grid with Advanced Routing and IQKM Security Mechanism

PDF (1740KB), PP.1-13

Views: 0 Downloads: 0

Author(s)

J. B. Shriram 1,* P. Anbalagan 2 A. Vegi Fernando 3 Srikanth Mylapalli 4

1. Department of Information Technology, University College of Engineering, BIT Campus, Anna University, Tiruchirappalli, Tamil Nadu, India

2. Department of Electrical and Electronics, University College of Engineering, BIT Campus, Anna University, Tiruchirappalli, Tamil Nadu, India

3. Department of Computer Science and Engineering (AIML), Dayananda Sagar University, Bengaluru, Karnataka-562112, India

4. Faculty of Computer Science and Engineering, Tirumala Engineering College, Jonnalagadda, Narasaraopet, Guntur, A.P, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijitcs.2026.01.01

Received: 7 Jul. 2025 / Revised: 19 Aug. 2025 / Accepted: 11 Oct. 2025 / Published: 8 Feb. 2026

Index Terms

IoT, HRES, Shortest Routing Path, BSO, Advanced Encryption and Improved Quantum Key Management (IQKM)

Abstract

Expansion of Internet of Things (IoT) technologies has greatly enhanced monitoring and management of energy systems, especially in Hybrid Renewable Energy Systems (HRES). This paper presents an IoT-based HRES smart grid framework with a modified Brain Storm Optimization (BSO) algorithm for routing optimization and an Improved Quantum Key Management (IQKM) is a quantum inspired protocol for better data security. The enhanced BSO algorithm, hosted in the cloud infrastructure, optimizes IoT sensor data routing paths, thus diminishing packet transmission latency and improving the network throughput. In contrast to conventional BSO techniques, the enhancement is through dynamic cluster refinement and adaptive node prioritization, designed specifically for real-time cloud-integrated energy systems. In order to protect sensitive energy transmission information, the IQKM protocol includes strong quantum-aided encryption processes and dynamic key creation. These enhancements directly counter the dangers of man-in-the-middle and replay attacks, which exceed capabilities of standard encryption approaches by facilitating low-latency, quantum-resistant communication between HRES nodes. Both Photovoltaic (PV) and wind-based energy sources are utilized by the system to provide power consistently, with cloud-based analytics and IoT sensors ensuring real-time monitoring. Experimental testing via the Adafruit platform reports a 23% Packet Delivery Ratio (PDR) enhancement and 17% encryption/decryption delay reduction compared to baseline and traditional routing algorithms. Such findings ensure the potential for stable, secure, and scalable grid performance by the proposed system.

Cite This Paper

J. B. Shriram, P. Anbalagan, A. Vegi Fernando, Srikanth Mylapalli, "IoT Driven HRES Smart Grid with Advanced Routing and IQKM Security Mechanism", International Journal of Information Technology and Computer Science(IJITCS), Vol.18, No.1, pp.1-13, 2026. DOI:10.5815/ijitcs.2026.01.01

Reference

[1]P. K. Udayaprasad, J. Shreyas, N. N. Srinidhi, S. D. Kumar, P. Dayananda, S. S.  Askar, and M. Abouhawwash, “Energy Efficient Optimized Routing Technique with Distributed SDN-AI to Large Scale I-IoT Networks”, IEEE Access, vol. 12, pp.2742-2759, 2024, doi: https://doi.org/10.1109/ACCESS.2023.3346679.
[2]A. K. Soma, “Weighted Graph Clustering with PaCCo”, In 2025 International Conference on Emerging Systems and Intelligent Computing (ESIC), pp. 815-818. 2025, doi: https://doi.org/10.1109/ESIC64052.2025.10962723.
[3]C. L. D. Santos, A. M. Mezher, J. P. A. León, J. C. Barrera, E. C. Guerra and J. Meng, “ML-RPL: Machine Learning-Based Routing Protocol for Wireless Smart Grid Networks”, in IEEE Access, vol. 11, pp. 57401-57414, 2023, doi: 10.1109/ACCESS.2023.3283208.
[4]M. A. Islam, R. Atat and M. Ismail, “Software-Defined Networking-Based Resilient Proactive Routing in Smart Grids Using Graph Neural Networks and Deep Q-Networks”, in IEEE Access, vol. 12, pp. 111169-111186, 2024, doi: 10.1109/ACCESS.2024.3438938.
[5]Soma, Arun Kumar. "Enhancing Supply Chain Transparency and Integrity: A Permissioned Blockchain Framework." In 2025 International Conference on Emerging Systems and Intelligent Computing (ESIC), pp. 819-826. IEEE, 2025.
[6]A. K. Al Mhdawi, H. Al-Raweshidy, W. J. Al-Karkhi and A. Jaleel Humaidi, “Micro Software Defined Control (μSDC): Empowering Smart Grids with Enhanced Control and Optimization”, in IEEE Access, vol. 12, pp. 95750-95761, 2024, doi: 10.1109/ACCESS.2024.3421947.
[7]C. L. D. Santos, A. M. Mezher, J. P. A. León, J. C. Barrera, E. C. Guerra, and J. Meng, “Ml-rpl: Machine learning-based routing protocol for wireless smart grid networks”, IEEE Access, vol. 11, pp. 57401-57414, 2023, doi: https://doi.org/10.1109/ACCESS.2023.3283208.
[8]A. K. Soma, “Building Aether Sensor Network using LoRaWAN Network”, In 2025 International Conference on Emerging Systems and Intelligent Computing (ESIC), pp. 807-814, 2025, doi: https://doi.org/10.1109/ESIC64052.2025.10962750.
[9]A. Khan, S. H. Shirazi, M. Adeel, M. Assam, Y. Y. Ghadi, H. G. Mohamed, and Y. Xie, “A QoS-Aware Data Aggregation Strategy for Resource Constrained IoT-Enabled AMI Network in Smart Grid”, in IEEE Access, vol. 11, pp. 98988-99004, 2023, doi: 10.1109/ACCESS.2023.3312552.
[10]A. kumar Soma, “Hybrid RNN-GRU-LSTM Model for Accurate Detection of DDoS Attacks on IDS Dataset”, Journal of Modern Technology, vol.  2, no. 01, pp. 283-291, 2025, doi: https://doi.org/10.71426/jmt.v2.i1.pp283-291.
[11]M. U. Saleem, M. R. Usman, M. A. Yaqub, A. Liotta and A. Asim, “Smarter Grid in the 5G Era: Integrating the Internet of Things with a Cyber-Physical System”, in IEEE Access, vol. 12, pp. 34002-34018, 2024, doi: 10.1109/ACCESS.2024.3372379.
[12]B. Priyanka, P. Udayaraju, C. S. Koppireddy, and A. Neethika “Developing a region-based energy-efficient IoT agriculture network using region-based clustering and shortest path routing for making sustainable agriculture environment”, Measurement: Sensors, vol. 27, pp. 100734, 2023, doi: https://doi.org/10.1016/j.measen.2023.100734.
[13]Z. Ning, H. Chen, X. Wang, S. Wang, and L. Guo, “Blockchain-enabled electrical fault inspection and secure transmission in 5G smart grids”, IEEE Journal of Selected Topics in Signal Processing, vol. 16, no. 1, pp. 82-96, 2021,doi: https://doi.org/10.1109/JSTSP.2021.3120872.
[14]T. Vaiyapuri, V. S. Parvathy, V. Manikandan, N. Krishnaraj, D. Gupta, and K. Shankar, “A novel hybrid optimization for cluster‐based routing protocol in information-centric wireless sensor networks for IoT based mobile edge computing”, Wireless Personal Communications, vol. 127, no. 1, pp. 39-62, 2022,doi: https://doi.org/10.1007/s11277-021-08088-w.
[15]H. Mohapatra, and A. K. Rath “A fault tolerant routing scheme for advanced metering infrastructure: an approach towards smart grid”, Cluster computing, vol. 24, no. 3, pp. 2193-2211, 2021, doi: https://doi.org/10.1007/s10586-021-03255-x.
[16]M. Elshrkawey, H. Al-Mahdi, and W. Atwa, “An enhanced routing algorithm based on a re-position particle swarm optimization (RA-RPSO) for wireless sensor network”, Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 10, pp. 10304-10318, 2022,doi: https://doi.org/10.1016/j.jksuci.2022.10.022.
[17]S. Prithi, and S. Sumathi. “Automata based hybrid PSO–GWO algorithm for secured energy efficient optimal routing in wireless sensor network”, Wireless personal communications, vol. 117, pp. 545-559, 2021, doi: https://doi.org/10.1007/s11277-020-07882-2.
[18]M. Sohal, and S. Sharma, “BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing”, Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 1, pp. 1417-1425, 2022, doi: https://doi.org/10.1016/j.jksuci.2018.09.024.
[19]B. Alaya, and L. Sellami, “Clustering method and symmetric/asymmetric cryptography scheme adapted to securing urban VANET networks”, Journal of Information Security and Applications, vol. 58, pp. 102779, 2021, doi: https://doi.org/10.1016/j.jisa.2021.102779.
[20]X. Li, S. Shang, S. Liu, K. Gu, M. A. Jan, X. Zhang, and F. Khan, “An identity-based data integrity auditing scheme for cloud-based maritime transportation systems”, IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 2, pp. 2556-2567, 2022, doi: https://doi.org/10.1109/TITS.2022.3179991.
[21]P. Du, X. Yan, and P. Feng, “Design of information security transmission scheme and related authentication services based on Kerberos”, Highlights in Science, Engineering and Technology, vol. 60, pp. 266-273, 2023.
[22]A. Orobosade, T. A. Favour-Bethy, A. B. Kayode, and A. J. Gabriel, “Cloud application security using hybrid encryption”, Communications on Applied Electronics, vol. 7, no. 33, pp. 25-31, 2020, doi: 10.5120/cae2020652866.
[23]R. Imam, F. Anwer, and M. Nadeem, “An effective and enhanced RSA based public key encryption scheme (XRSA)”, International Journal of Information Technology, vol. 14, no. 5, pp. 2645-2656, 2022, doi: https://doi.org/10.1007/s41870-022-00993-y.
[24]Z. Lu, and H. Mohamed, “A complex encryption system design implemented by AES”, Journal of Information Security, vol. 12, no. 2, pp. 177-187, 2021, doi: https://doi.org/10.4236/jis.2021.122009.
[25]M. U. Khan, M. Hosseinzadeh, and A. Mosavi, “An intersection-based routing scheme using Q-learning in vehicular ad hoc networks for traffic management in the intelligent transportation system”, Mathematics, vol. 10, no. 20, pp. 3731, 2022, doi: https://doi.org/10.3390/math10203731.
[26]R. Hemalatha, R. Umamaheswari, and S. Jothi. “Optimal route maintenance based on adaptive equilibrium optimization and GTA based route discovery model in MANET”, Peer-to-Peer Networking and Applications, vol. 14, no. 6, pp. 3416-3430, 2021, doi: https://doi.org/10.1007/s12083-021-01186-3.
[27]S. Vadivel, S. Konda, K. R. Balmuri, A. Stateczny and B. D. Parameshachari, “Dynamic route discovery using modified grasshopper optimization algorithm in wireless Ad-Hoc visible light communication network”, Electronics, vol. 10, no. 10, pp. 1176, 2021, doi: https://doi.org/10.3390/electronics10101176.
[28]R. P. Pingale, and S. N. Shinde, “Multi-objective sunflower based grey wolf optimization algorithm for multipath routing in IoT network”, Wireless Personal Communications, vol. 117, no. 3, pp. 1909-1930, 2021, doi: https://doi.org/10.1007/s11277-020-07951-6.
[29]H. Yin, H. Yang, and S. Shahmoradi, “EATMR: an energy-aware trust algorithm based the AODV protocol and multi-path routing approach in wireless sensor networks”, Telecommunication Systems, vol. 81, no. 1, pp. 1-19, 2022, doi: https://doi.org/10.1007/s11235-022-00915-0.
[30]G. Arya, A. Bagwari, and D. S. Chauhan, “Performance analysis of deep learning-based routing protocol for an efficient data transmission in 5G WSN communication”, IEEE Access, vol. 10, pp. 9340-9356, 2022, doi: https://doi.org/10.1109/ACCESS.2022.3142082.
[31]A. F. Subahi, Y. Alotaibi, O. I. Khalaf, and F. Ajesh, “Packet Drop Battling Mechanism for Energy Aware Detection in Wireless Networks”, Computers, Materials & Continua, vol. 66, no. 2, 2021, doi: https://doi.org/10.32604/cmc.2020.014094. 
[32]E. Palacios Jara, A. Mohamad Mezher, M. Aguilar Igartua, R. P. D. Redondo, and A. Fernandez-Vilas, “QSMVM: QoS-aware and social-aware multimetric routing protocol for video-streaming services over MANETS”, Sensors, vol. 21, no. 3, pp. 901, 2021, doi: https://doi.org/10.3390/s21030901.
[33]P. Garg, A. Dixit, and P. Sethi, “Ml-fresh: novel routing protocol in opportunistic networks using machine learning”, Computer Systems Science & Engineering, Forthcoming, vol. 40, no. 2, pp. 703-717, 2022, doi: https://doi.org/10.32604/csse.2022.019557.