Browse > Article
http://dx.doi.org/10.13067/JKIECS.2013.8.10.1485

Embedded-based Power Monitoring Security Module Design  

Yoon, Chan-Ho (전남대학교 컴퓨터공학과)
Kim, Gwang-Jun (전남대학교 전기전자통신컴퓨터공학부)
Jang, Chang-Soo (전남대학교 전기전자통신컴퓨터공학부)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.8, no.10, 2013 , pp. 1485-1490 More about this Journal
Abstract
The demonstration project of the electrical grid for Smart grid is progressed, the smart digital appliances AV technology, Smart home energy management technology charging the management function of complex energy for the automation management of air conditioning and heating, humidity and air, the health care technology charging the design of housing for the elderly and disabled and the measurement of individual bio information, and the Smart home security technology dealing with the biometric security and motion sensors, etc. have been studied. The power monitoring terminal which uses a variety of wired and wireless networks and protocol is the target additionally to be considered in addition to the security vulnerabilities that was occurred in the existing terminal. In this research paper, the author analyzes the cryptographic techniques corresponding to the smart meter occurred by the problems that are exposed on the outside which are vulnerable to physical attacks, and intends to propose the design of the security systems for the Smart meter terminal being able to maximize the efficiency of the terminal.
Keywords
Embedded System; Smart Grid; Security Module; Cryptography;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Don Johnson, The Elliptic Curve Digital Signature Algorithm,certicom.Corporation, 2001.
2 Davies. John wiley&sonslnc,"Implementing Ssl/ Tls using cryptography and PKi"(2010) Algorithm (ECDSA), ANSI, x9.62-1998, approved Jan.1999.
3 Sklavos, Nicolas(EDT), Zhang, Xinmiao(EDT), Wireless Security And Cryptography", Taylor &Francis, 2007.
4 x9.62,Public key Cryptography for the financial services industry, The elliptic curve digital signature
5 M. Ghorbel, M. Segarra, J. Kerdreux, R. Keryell, A. Thepaut, and M. Mokhtari, Networking and Communication in Smart Home for People with Disabilities, Computers Helping People with Special Needs, Springer Berlin/Heidelberg, 624, 2004.
6 Kuk-se Kim, Gil-choon Kim and Joon Lee, "Embedded Linux System for Self-Control System of Car", The Journal of The Korea Institute of Electronic Communication Sciences, Vol. 2, No. 1, pp. 62-66, 2007.   과학기술학회마을
7 Hyun Huh and Jae-hak Lee, "A Study on Development of H8 MCU IDB(Integrated development board) for Embedded Education", The Journal of The Korea Institute of Electronic Communication Sciences, Vol. 4, No. 1, pp. 51-57, 2009.
8 P. M. L. Chan, R. E. Sheriff, Y. F. Hu, P. Conforto, C. Tocci, and G. Losquadro, Mobility management incorporating fuzzy logic for a heterogeneous IP environment, IEEE Communications Magazine, Vol. 39, No. 12, pp. 42-51 2001.   DOI   ScienceOn
9 J. Hou, and D. C. O'Brien, Vertical handoverdecision- making algorithm using fuzzy logic for the integrated radio and OW system, IEEE Transactions on Wireless Communications, Vol. 5, No. 1, pp. 176-185, 2006.   DOI   ScienceOn