• 제목/요약/키워드: Energy Security

검색결과 912건 처리시간 0.054초

A new method to detect attacks on the Internet of Things (IoT) using adaptive learning based on cellular learning automata

  • Dogani, Javad;Farahmand, Mahdieh;Daryanavard, Hassan
    • ETRI Journal
    • /
    • 제44권1호
    • /
    • pp.155-167
    • /
    • 2022
  • The Internet of Things (IoT) is a new paradigm that connects physical and virtual objects from various domains such as home automation, industrial processes, human health, and monitoring. IoT sensors receive information from their environment and forward it to their neighboring nodes. However, the large amounts of exchanged data are vulnerable to attacks that reduce the network performance. Most of the previous security methods for IoT have neglected the energy consumption of IoT, thereby affecting the performance and reducing the network lifetime. This paper presents a new multistep routing protocol based on cellular learning automata. The network lifetime is improved by a performance-based adaptive reward and fine parameters. Nodes can vote on the reliability of their neighbors, achieving network reliability and a reasonable level of security. Overall, the proposed method balances the security and reliability with the energy consumption of the network.

Analytic Model of Energy of Router in Wireless Sensor Networks

  • 이동춘
    • 융합보안논문지
    • /
    • 제7권4호
    • /
    • pp.43-50
    • /
    • 2007
  • 센서 노드들의 전기에너지 양은 극히 제한적이고, 밧데리 교체는 무선 센서 망에서는 매우 어렵다. 본 논문은 다른 라우터에서 에너지 손질에 대한 수학적 모델을 제안하며, 직접 Diffusion 기반에 에너지 소비를 근거로 하여 해석한다.

  • PDF

Current Situation of Renewable Energy Resources Marketing and its Challenges in Light of Saudi Vision 2030 Case Study: Northern Border Region

  • AL-Ghaswyneh, Odai Falah Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • 제22권3호
    • /
    • pp.89-94
    • /
    • 2022
  • The Saudi Vision 2030 defined the directions of the national economy and market towards diversifying sources of income, and developing energy to become less dependent on oil. The study sought through a theoretical review to identify the reality of the energy sector and the areas of investment available in the field of renewable energy. Findings showed that investment in the renewable energy sector is a promising source according to solar, wind, hydrogen, geothermal energy and burning waste than landfill to extract biogas for less emission. The renewable energy sector faces challenges related to technology, production cost, price, quantity of production and consumption, and markets. The study revealed some recommendations providing and suggested electronic marketing system to provide investors and consumers with energy available from renewable sources.

S-FEAR: Secure-Fuzzy Energy Aware Routing Protocol for Wireless Sensor Networks

  • Almomani, Iman;Saadeh, Maha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권4호
    • /
    • pp.1436-1457
    • /
    • 2018
  • Secure routing services in Wireless Sensor Networks (WSNs) are essential, especially in mission critical fields such as the military and in medical applications. Additionally, they play a vital role in the current and future Internet of Things (IoT) services. Lightness and efficiency of a routing protocol are not the only requirements that guarantee success; security assurance also needs to be enforced. This paper proposes a Secure-Fuzzy Energy Aware Routing Protocol (S-FEAR) for WSNs. S-FEAR applies a security model to an existing energy efficient FEAR protocol. As part of this research, the S-FEAR protocol has been analyzed in terms of the communication and processing costs associated with building and applying this model, regardless of the security techniques used. Moreover, the Qualnet network simulator was used to implement both FEAR and S-FEAR after carefully selecting the following security techniques to achieve both authentication and data integrity: the Cipher Block Chaining-Message Authentication Code (CBC-MAC) and the Elliptic Curve Digital Signature Algorithm (ECDSA). The performance of both protocols was assessed in terms of complexity and energy consumption. The results reveal that achieving authentication and data integrity successfully excluded all attackers from the network topology regardless of the percentage of attackers. Consequently, the constructed topology is secure and thus, safe data transmission over the network is ensured. Simulation results show that using CBC-MAC for example, costs 0.00064% of network energy while ECDSA costs about 0.0091%. On the other hand, attacks cost the network about 4.7 times the cost of applying these techniques.

심야전력제도의 문제점과 개선 방향 : 경제성·환경성·형평성 및 에너지 안보 (A Study on the Night Thermal-storage Power Service : Sustainability and Energy Security)

  • 조영탁;김창섭
    • 자원ㆍ환경경제연구
    • /
    • 제17권2호
    • /
    • pp.419-455
    • /
    • 2008
  • 이 논문은 심야전력제도의 경제성 환경성 형평성을 평가하고, 이를 토대로 심야전력제도가 전력 및 가스수급계획 등 국가 에너지정책에 미치는 작용을 분석하였다. 분석 결과에 따르면, 심야전기난방은 등유난방에 비해 연간 약 6~8억 달러의 연료낭비, 약 2배의 온실가스 배출, 1.4조 원의 소비자 부담증가를 유발하고 있다. 뿐만 아니라 심야전력제도는 동절기 LNG 수급교란을 유발함과 동시에 장기전원계획, 가스수급계획, 온실가스감축 등 국가에너지정책에도 부정적인 효과를 야기한다. 요컨대 심야전력제도는 우리나라 에너지정책의 두 가지 기본축인 지속가능한 에너지체제와 에너지안보에 정면으로 위배되며, 문제해결을 위해서는 등유세제와 심야건기요금의 통합조정에 기초한 신규수요의 억제조치와 기존 수용가의 등유전환 프로그램을 병행하는 것이 바람직하다.

  • PDF

대규모 시설에서 이용가능한 미활용 에너지의 부존량과 그 이용 가능성에 관한 조사연구-하천수.해수.하수처리수를 중심으로 (An Estimation of Quantity of Unused Energy of River Water, Seawater and Treated Sewage as Heat Source and Its Availability in Large Facilities)

  • 허재영
    • 안보군사학연구
    • /
    • 통권1호
    • /
    • pp.423-446
    • /
    • 2003
  • While the demand for energy has shown a sharp increase recently, the supply seems to be limited by the fact that the conventional fossil fuel energy or nuclear energy has its own environmental problems such as, for example, global warming or nuclear waste disposal. To overcome such limited supply of energy, the utilization of natural thermal energy such as river water and seawater as well as treated sewage can be a substantial supplement. The potential use of the unused energy has become more and more feasible these days as the heat pump technology has been advanced. In the present study, the unused energy resources are estimated on regional and monthly basis for each resource by the method proposed here in order to establish the fundamental data for its utilization. The potential use of the unused energy is a1so discussed.

  • PDF

사물인터넷 통신을 위한 경량 암호기술 동향 분석 (Analyses of Light-weight Cryptography Technology for Internet of Things)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2016년도 추계학술대회
    • /
    • pp.234-235
    • /
    • 2016
  • With the development of the Internet, the popularization of internet has become the new trend and enormously changed the way of human communication. There is a strong need for security. The following research will provide the definition and purpose of IoT and examine its security concerns, In this paper, we surveyed at energy consumption of lightweight block ciphers implemented in reconfigurable devices, and we analyze d the effects that round unrolling might have on the energy consumed during the encryption.

  • PDF

안정도 지수와 에너지 마진을 이용한 불안정 발전기의 clustering 법 (A Novel Method for Clustering Critical Generator by using Stability Indices and Energy Margin)

  • 장동환;정연재;전영환;남해곤
    • 대한전기학회논문지:전력기술부문A
    • /
    • 제54권9호
    • /
    • pp.441-448
    • /
    • 2005
  • On-line dynamic security assessment is becoming more and more important for the stable operation of power systems as load level increases. The necessity is getting apparent under Electricity Market environments, as operation of power system is exposed to more various operating conditions. For on-line dynamic security assessment, fast transient stability analysis tool is required for contingency selection. The TEF(Transient Energy Function) method is a good candidate for this purpose. The clustering of critical generators is crucial for the precise and fast calculation of energy margin. In this paper, we propose a new method for fast decision of mode of instability by using stability indices. Case study shows very promising results.

온라인 과도안정도 평가를 위한 새로운 불안정모드 선정 알고리즘 (A New Algorithm for Unstable Mode Decision in the On-line Transient Stability Assessment)

  • 장동환;김정우;전영환
    • 전기학회논문지
    • /
    • 제57권7호
    • /
    • pp.1123-1128
    • /
    • 2008
  • The necessity of online dynamic security assessment is getting apparent under Electricity Market environments, as operation of power system is exposed to more various operating conditions. For on-line dynamic security assessment, fast transient stability analysis tool is required for contingency selection. The TEF(Transient Energy Function) method is a good candidate for this purpose. The clustering of critical generators is crucial for the precise and fast calculation of energy margin. In this paper, we propose a new method for fast decision of mode of instability by using stability indices and energy margin. The method is a new version of our previous paper.[1] Case studies are showing very promising results.