• Title/Summary/Keyword: Distributed Key Generation

Search Result 74, Processing Time 0.022 seconds

A Novel Dual-Input Boost-Buck Converter with Coupled Inductors for Distributed Thermoelectric Generation Systems

  • Zhang, Junjun;Wu, Hongfei;Sun, Kai;Xing, Yan;Cao, Feng
    • Journal of Power Electronics
    • /
    • v.15 no.4
    • /
    • pp.899-909
    • /
    • 2015
  • A dual-input boost-buck converter with coupled inductors (DIBBC-CI) is proposed as a thermoelectric generator (TEG) power conditioner with a wide input voltage range. The DIBBC-CI is built by cascading two boost cells and a buck cell with shared inverse coupled filter inductors. Low current ripple on both sides of the TEG and the battery are achieved. Reduced size and power losses of the filter inductors are benefited from the DC magnetic flux cancellation in the inductor core, leading to high efficiency and high power density. The operational principle, impact of coupled inductors, and design considerations for the proposed converter are analyzed in detail. Distributed maximum power point tracking, battery charging, and output control are implemented using a competitive logic to ensure seamless switching among operational modes. Both the simulation and experimental results verify the feasibility of the proposed topology and control.

Randomized Block Size (RBS) Model for Secure Data Storage in Distributed Server

  • Sinha, Keshav;Paul, Partha;Amritanjali, Amritanjali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4508-4530
    • /
    • 2021
  • Today distributed data storage service are being widely used. However lack of proper means of security makes the user data vulnerable. In this work, we propose a Randomized Block Size (RBS) model for secure data storage in distributed environments. The model work with multifold block sizes encrypted with the Chinese Remainder Theorem-based RSA (C-RSA) technique for end-to-end security of multimedia data. The proposed RBS model has a key generation phase (KGP) for constructing asymmetric keys, and a rand generation phase (RGP) for applying optimal asymmetric encryption padding (OAEP) to the original message. The experimental results obtained with text and image files show that the post encryption file size is not much affected, and data is efficiently encrypted while storing at the distributed storage server (DSS). The parameters such as ciphertext size, encryption time, and throughput have been considered for performance evaluation, whereas statistical analysis like similarity measurement, correlation coefficient, histogram, and entropy analysis uses to check image pixels deviation. The number of pixels change rate (NPCR) and unified averaged changed intensity (UACI) were used to check the strength of the proposed encryption technique. The proposed model is robust with high resilience against eavesdropping, insider attack, and chosen-plaintext attack.

Distributed Optimal Path Generation Based on Delayed Routing in Smart Camera Networks

  • Zhang, Yaying;Lu, Wangyan;Sun, Yuanhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3100-3116
    • /
    • 2016
  • With the rapid development of urban traffic system and fast increasing of vehicle numbers, the traditional centralized ways to generate the source-destination shortest path in terms of travel time(the optimal path) encounter several problems, such as high server pressure, low query efficiency, roads state without in-time updating. With the widespread use of smart cameras in the urban traffic and surveillance system, this paper maps the optimal path finding problem in the dynamic road network to the shortest routing problem in the smart camera networks. The proposed distributed optimal path generation algorithm employs the delay routing and caching mechanism. Real-time route update is also presented to adapt to the dynamic road network. The test result shows that this algorithm has advantages in both query time and query packet numbers.

Secure Recovery Protocol of (1,3) Distributed Key Share with Trustless Setup for Asset Management in Blockchain (블록체인 기반 가상자산 관리를 위한 (1,3) 분산키의 비신뢰 기반 안전한 분산 복구 프로토콜)

  • Bae, Kyoungil;Park, Junhoo;Ryou, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.863-874
    • /
    • 2021
  • Distributed key generation (DKG) with trustless setup is a cryptographic protocol that distributes Shamir secret shares of a private key to participants while keeping the actual private key hidden to the participants. Also, by extending it to a threshold signature protocol, digital signatures can be generated without construction of private keys. This paper proposes a recovery protocol maintaining trustless setup assumptions, in particular to the useful (1,3) share structure. The proposed protocol meets same levels of security requirements with DKG in terms of correctness and secrecy. The protocol can also enable delegation and revocation of digital sign rights for blockchain-based asset management.

A Study on the Participation of Virtual Power Plant Based Technology Utilizing Distributed Generation Resources in Electricity Market (분산발전자원을 활용한 가상발전소 기반 기술의 전력시장 참여 방안에 대한 연구)

  • Lee, Yun-Hwan
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.65 no.2
    • /
    • pp.94-100
    • /
    • 2016
  • A virtual power plant (VPP) technology is a cluster of distributed generation installations. VPP system is that integrates several types of distributed generation sources, so as to give a reliable overall power supply. Virtual power plant systems play a key role in the smart grids concept and the move towards alternative sources of energy. They ensure improved integration of the renewable energy generation into the grids and the electricity market. VPPs not only deal with the supply side, but also help manage demand and ensure reliability of grid functions through demand response (DR) and other load shifting approaches in real time. In this paper, utilizing a variety of distributed generation resources(such as emergency generator, commercial generator, energy storage device), activation scheme of the virtual power plant technology. In addition, through the analysis of the domestic electricity market, it describes a scheme that can be a virtual power plant to participate in electricity market. It attempts to derive the policy support recommendation in order to obtain the basics to the prepared in position of power generation companies for the commercialization of virtual power plant.

Reducing Cybersecurity Risks in Cloud Computing Using A Distributed Key Mechanism

  • Altowaijri, Saleh M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.1-10
    • /
    • 2021
  • The Internet of things (IoT) is the main advancement in data processing and communication technologies. In IoT, intelligent devices play an exciting role in wireless communication. Although, sensor nodes are low-cost devices for communication and data gathering. However, sensor nodes are more vulnerable to different security threats because these nodes have continuous access to the internet. Therefore, the multiparty security credential-based key generation mechanism provides effective security against several attacks. The key generation-based methods are implemented at sensor nodes, edge nodes, and also at server nodes for secure communication. The main challenging issue in a collaborative key generation scheme is the extensive multiplication. When the number of parties increased the multiplications are more complex. Thus, the computational cost of batch key and multiparty key-based schemes is high. This paper presents a Secure Multipart Key Distribution scheme (SMKD) that provides secure communication among the nodes by generating a multiparty secure key for communication. In this paper, we provide node authentication and session key generation mechanism among mobile nodes, head nodes, and trusted servers. We analyzed the achievements of the SMKD scheme against SPPDA, PPDAS, and PFDA schemes. Thus, the simulation environment is established by employing an NS 2. Simulation results prove that the performance of SMKD is better in terms of communication cost, computational cost, and energy consumption.

Re-Ordering of Users in the Group Key Generation Tree Protocol (사용자 순서 재조정을 통한 그룹 키 생성 트리 프로토콜)

  • Hong, Sung-Hyuck
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.247-251
    • /
    • 2012
  • Tree-based Group Diffie-Hellman (TGDH) is one of the efficient group key agreement protocols to generate the GK. TGDH assumes all members have an equal computing power. As one of the characteristics of distributed computing is heterogeneity, the member can be at a workstation, a laptop or even a mobile computer. Therefore, the group member sequence should be reordered in terms of the member's computing power to improve performance. This research proposes a reordering of members in the group key generation tree to enhance the efficiency of the group key generation.

Integrated Voltage and Power Flow Management Considering the Cost of Opera in Active Distribution Networks

  • Xu, Tao;Guo, Lingxu;Wei, Wei;Wang, Xiaoxue;Wang, Chengshan;Lin, Jun;Li, Tianchu
    • Journal of Electrical Engineering and Technology
    • /
    • v.11 no.2
    • /
    • pp.274-284
    • /
    • 2016
  • The increasing penetration of distributed energy resources on the distribution networks have brought a number of technical impacts where voltage and thermal variations have been identified as the dominant effects. Active network management in distribution networks aims to integrate distributed energy resources with flexible network management so that distributed energy resources are organized to make better use of existing capacity and infrastructure. This paper propose active solutions which aims to solve the voltage and thermal issues in a distributed manner utilizing a collaborative approach. The proposed algorithms have been fully tested on a distribution network with distributed generation units.

Optimal Coordination of Intermittent Distributed Generation with Probabilistic Power Flow

  • Xing, Haijun;Cheng, Haozhong;Zhang, Yi
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.6
    • /
    • pp.2211-2220
    • /
    • 2015
  • This paper analyzes multiple active management (AM) techniques of active distribution network (ADN), and proposes an optimal coordination model of intermittent distributed generation (IDG) accommodation considering the timing characteristic of load and IDG. The objective of the model is to maximize the daily amount of IDG accommodation under the uncertainties of IDG and load. Various active management techniques such as IDG curtailment, on-load tap changer (OLTC) tap adjusting, voltage regulator (VR) tap adjusting, shunt capacitors compensation and so on are fully considered. Genetic algorithm and Primal-Dual Interior Point Method (PDIPM) is used for the model solving. Point estimate method is used to simulate the uncertainties. Different scenarios are selected for the IDG accommodation capability investigation under different active management schemes. Finally a modified IEEE 123 case is used to testify the proposed accommodation model, the results show that the active management can largely increase the IDG accommodation and penetration.

Submodule Level Distributed Maximum Power Point Tracking PV Optimizer with an Integrated Architecture

  • Wang, Feng;Zhu, Tianhua;Zhuo, Fang;Yi, Hao;Shi, Shuhuai
    • Journal of Power Electronics
    • /
    • v.17 no.5
    • /
    • pp.1308-1316
    • /
    • 2017
  • The distributed maximum power point tracking (DMPPT) concept is widely adopted in photovoltaic systems to avoid mismatch loss. However, the high cost and complexity of DMPPT hinder its further promotion in practice. Based on the concept of DMPPT, this paper presents an integrated submodule level half-bridge stack structure along with an optimal current point tracking (OCPT) control algorithm. In this full power processing integrated solution, the number of power switches and passive components is greatly reduced. On the other hand, only one current sensor and its related AD unit are needed to perform the ideal maximum power generation for all of the PV submodules in any irradiance case. The proposal can totally eliminate different small-scaled mismatch effects in real-word condition and the true maximum power point of each PV submodule can be achieved. As a result, the ideal maximum power output of the whole PV system can be achieved. Compared with current solutions, the proposal further develops the integration level of submodule DMPPT solutions with a lower cost and a smaller size. Moreover, the individual MPPT tracking for all of the submodules are guaranteed.