Browse > Article
http://dx.doi.org/10.12673/jkoni.2012.16.4.709

Electricity Consumption Information Transmission Protocol with ID-based Key Distribution Method  

Jung, Su-Young (ISAA Lab, Department of Information security Engineering, Soonchunhyang University)
Kwak, Jin (Department of Information security Engineering, Soonchunhyang University)
Abstract
Recently, smartgrid has interested in enable to existing electrical grid to supplying stably and efficient energy management. Smartgrid environment using PLC is transmit PLC module collected electricity consumption information in each house from PLC module to server. This communication process can occurred security threats such as personal information leak of consumer, electrical grid paralysis. In this paper, we propose efficient electricity consumption information transmission protocol with ID-based key distribution method for respond to security threats.
Keywords
Smartgrid; ID-based Key Distribution; Electricity Consumption Information Transmission;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 "클라우드 기반 스마트그리드를 위한 보안기술 연구," 한국인터넷진흥원, 2010.12
2 홍정대, 천정희, 주성호, 최문석, "원격 검침용 PLC 기술 (KS X 4600-1 / ISO IEC 12139-1) 보안성 분석," 한국정보보호학회논문지, 제21권제1호, pp. 65-75, 2011.02.   과학기술학회마을
3 NIST, Smart grid cyber security strategy and requirements. Aug. 2010. [Online]. Available: http://csrc.nist.gov/publications/nistir/ir7628/nistir-7628_vol1.pdf
4 주성호, 임용훈, 박병석, 김태완, 김영현, 최문석, 이범석, "PLC 홈네트워크의 보안 취약성 및 대응방안 분석," 전력전자학술대회 논문집, pp. 478-480, 2006.06.   과학기술학회마을
5 정수영, 박대식, 곽진, "스마트그리드 환경에서 안전한 데이터 전송 프로토콜 연구," 한국 지식정보기술학회 2011년도 추계학술발표대회 논문집, 제5권 제2호, pp. 99-102, 2011.11.
6 Khanh V. Nguyen, "Simplifying Peer-to-Peer Device Authentication Using Identity-Based Cryptography," In proceedings of IEEE ICNS 2006, pp. 43-47, July 2004.
7 Joon Heo, Choong Seon Hong, Moon Seok Choi, Seong Ho Ju, Yong Hoon Lim, "Identity-Based Mutual Device Authentication Schemes for PLC System," IEEE International Symposium on, Power Line Communications and Its Applications(ISPLC 2008).
8 주성호, 최문석, 백종목, 임용훈, "PLC기반 원격검침인프라 보안시스템," 전력전자학회 2009년도 추계학술대회 논문집, pp. 256-258, 2009. 11.   과학기술학회마을
9 Sungwook Kim, Eun Young Kwon, Myungsun Kim, Jung Hee Cheon, Seong-ho Ju, Yong-hoon Lim, and Moon-seok Choi, "A Secure Smart-Metering Protocol Over Power-Line Communication," IEEE TRANSACTIONS ON POWER DELIVERY, vol. 26, no. 4, October 2011.
10 S. Goldwasser, S. Micali, and R. Rivest, "A digital signature scheme secure against adaptive chosen message attacks", SIAM J. Comput., vol. 17, no. 2, pp. 281-308, April. 1988.   DOI   ScienceOn
11 Open Smart Grid Users Group, AMI System Security Requirements v1.01 Dec. 2008. [Online]. Available: http://www.oe.energy.gov/DocumentsandMedia/14-AMI_System_Security_Requirements.pdf