DOI QR코드

DOI QR Code

Embedded-based Power Monitoring Security Module Design

임베디드 전력 모니터링 보안 모듈 설계

  • 윤찬호 (전남대학교 컴퓨터공학과) ;
  • 김광준 (전남대학교 전기전자통신컴퓨터공학부) ;
  • 장창수 (전남대학교 전기전자통신컴퓨터공학부)
  • Received : 2013.08.23
  • Accepted : 2013.10.21
  • Published : 2013.10.31

Abstract

The demonstration project of the electrical grid for Smart grid is progressed, the smart digital appliances AV technology, Smart home energy management technology charging the management function of complex energy for the automation management of air conditioning and heating, humidity and air, the health care technology charging the design of housing for the elderly and disabled and the measurement of individual bio information, and the Smart home security technology dealing with the biometric security and motion sensors, etc. have been studied. The power monitoring terminal which uses a variety of wired and wireless networks and protocol is the target additionally to be considered in addition to the security vulnerabilities that was occurred in the existing terminal. In this research paper, the author analyzes the cryptographic techniques corresponding to the smart meter occurred by the problems that are exposed on the outside which are vulnerable to physical attacks, and intends to propose the design of the security systems for the Smart meter terminal being able to maximize the efficiency of the terminal.

스마트 그리드용 전력망이 구축시범사업이 진행됨에 따라 스마트 디지털가전 AV기술, 냉난방 습도 공기 자동관리를 위한 복합에너지 관리기능을 담당하는 스마트 홈 에너지관리기술, 노약자와 장애인을 위한 주거설계와 가족 구성원에 대한 개인별 바이오정보 측정을 담당하게 될 헬스케어 기술, 생체인식 보안과 동작감지센서 등을 다루는 스마트 홈 시큐리티 기술 등 연구가 진행되고 있다. 본 논문에서는 물리적 공격에 취약한 외부에 노출되는 문제점이 발생하게 되는 스마트미터기에 대응되는 암호기술을 분석하고 단말기의 효율성을 극대화 할수 있는 스마트 미터기 단말기용 보안시스템 설계를 제안하였다.

Keywords

References

  1. Don Johnson, The Elliptic Curve Digital Signature Algorithm,certicom.Corporation, 2001.
  2. Davies. John wiley&sonslnc,"Implementing Ssl/ Tls using cryptography and PKi"(2010) Algorithm (ECDSA), ANSI, x9.62-1998, approved Jan.1999.
  3. Sklavos, Nicolas(EDT), Zhang, Xinmiao(EDT), Wireless Security And Cryptography", Taylor &Francis, 2007.
  4. x9.62,Public key Cryptography for the financial services industry, The elliptic curve digital signature
  5. M. Ghorbel, M. Segarra, J. Kerdreux, R. Keryell, A. Thepaut, and M. Mokhtari, Networking and Communication in Smart Home for People with Disabilities, Computers Helping People with Special Needs, Springer Berlin/Heidelberg, 624, 2004.
  6. Kuk-se Kim, Gil-choon Kim and Joon Lee, "Embedded Linux System for Self-Control System of Car", The Journal of The Korea Institute of Electronic Communication Sciences, Vol. 2, No. 1, pp. 62-66, 2007.
  7. Hyun Huh and Jae-hak Lee, "A Study on Development of H8 MCU IDB(Integrated development board) for Embedded Education", The Journal of The Korea Institute of Electronic Communication Sciences, Vol. 4, No. 1, pp. 51-57, 2009.
  8. P. M. L. Chan, R. E. Sheriff, Y. F. Hu, P. Conforto, C. Tocci, and G. Losquadro, Mobility management incorporating fuzzy logic for a heterogeneous IP environment, IEEE Communications Magazine, Vol. 39, No. 12, pp. 42-51 2001. https://doi.org/10.1109/35.968811
  9. J. Hou, and D. C. O'Brien, Vertical handoverdecision- making algorithm using fuzzy logic for the integrated radio and OW system, IEEE Transactions on Wireless Communications, Vol. 5, No. 1, pp. 176-185, 2006. https://doi.org/10.1109/TWC.2006.1576541