• Title/Summary/Keyword: Grid security

Search Result 326, Processing Time 0.026 seconds

Research Trend Analysis for Smart Grids Using Dynamic Topic Modeling (동적 토픽분석을 활용한 스마트그리드 연구동향 분석)

  • Na, Sang-Tae;Ahn, Joo-Eon;Jung, Min-Ho;Kim, Ja-Hee
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.4
    • /
    • pp.613-620
    • /
    • 2017
  • The power grid has been changed to a smart grid system to satisfy the growing need for power grid complexity, demand, reliability, security, and efficiency with a combination of existing power and ICT technology. This study analyzes the research trends in smart grid technology in the period since the introduction of the smart grid system and compares it with industrial trends to grasp the progress and characteristics of Smart Grid technology and look for ways to innovate the technology. To do this, we analyze the research trends using dynamic topic modeling, which is capable of time-series research topic analysis. Next, we compare the results of research trends with industrial trends analyzed by Gartner's experts to demonstrate that smart grid research is evolving to the level of industrialization. The results of this study are quantitative analysis through data mining, and it is expected that it will be used in many fields such as companies that want to participate in industry and government agencies that need to establish policies by showing more objective analysis results.

Scheduling Computational Loads in Single Level Tree Network

  • Cui, Run;Sundaram, Suresh;Kim, Hyoung-Joong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.131-135
    • /
    • 2009
  • This paper is the introduction of our work on distributed load scheduling in single-level tree network. In this paper, we derive a new calculation model in single-level tree network and show a closed-form formulation of the time for computation system. There are so many examples of the application of this technology such as distributed database, biology computation on genus, grid computing, numerical computing, video and audio signal processing, etc.

  • PDF

Security Threat Evaluation for Smartgrid Control System (스마트그리드 제어시스템 보안 위협 평가 방안 연구)

  • Ko, Jongbin;Lee, Seokjun;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.873-883
    • /
    • 2013
  • Security vulnerability quantification is the method that identify potential vulnerabilities by scoring vulnerabilities themselves and their countermeasures. However, due to the structural feature of smart grid system, it is difficult to apply existing security threat evaluation schemes. In this paper, we propose a network model to evaluate smartgrid security threat for AMI and derive attack scenarios. Additionally, we show that the result of security threat evaluation for proposed network model and attack scenario by applying MTTC scheme.

Design and Implementation of Grid-based PACS (Grid 기반 PACS 설계 및 구현)

  • Kim, Jung-Su;Lee, Se-Yul;Park, Jin-Sub;Lee, Bong-Hwan
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.143-156
    • /
    • 2008
  • Grid-based PACS can provide an advanced medical information services such as remote image file transfer, collaboration, remote diagnosis, and virtual hospital. In this paper, we have implemented Grid-PACS which guarantees both storage safety and extendability for virtual large scale storage system. The experimental results showed that the virtual storage system provided more efficient and faster data transfer than the conventional PACS. The proposed Grid data management system can be utilized to improve the effectiveness of the PACS data management and transmission between medical institutions.

  • PDF

The Design of Remote Digital Evidence Acquisition System for Incident Response of Smart Grid Devices (스마트그리드 기기 보안 침해사고 대응을 위한 원격 증거 수집 시스템 설계)

  • Kang, SeongKu;Kim, Sinkyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.49-60
    • /
    • 2015
  • Smart Grid devices are the major components of the Smart Grid. They collect and process a variety informations relating power services and support intelligent power services by exchanging informations with other SG devices or systems. However, If a SG device is attacked, the device can provide attack route to attacker and attacker can attack other SG devices or systems using the route. It may cause problem in power services. So, when cyber incident is happened, we need to acquire and examine digital evidence of SG device quickly to secure availability of SG. In this paper, we designed remote evidence acquisition system to acquire digital evidences from SG devices to response quickly to incidents of SG devices. To achieve this, we analyzed operating environment of SG devices and thought remote digital evidence acquisition system of SG devices will be more effective than remote digital evidence acquisition system targeted general IT devices. So, we introduce design method for SG devices remote evidence acquisition system considered operating environment of SG devices.

SG-RBAC : Role Based Access Control Model for Smart Grid Environment (SG-RBAC : 스마트그리드 환경에 적합한 역할기반접근제어 모델)

  • Lee, Woomyo;Lee, Gunhee;Kim, Sinkyu;Seo, Jungtaek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.307-318
    • /
    • 2013
  • Smart grid is composed of variable domains including different systems, and different types of the access control are needed in the multiple domain. Therefore, the access control model suitable for the smart grid environment is required to minimize access control error and deny the unauthorized access. This paper introduce the access control requirements in the smart grid environment and propose the access control model, SG-RBAC, satisfied with the requirements. SG-RBAC model imposes constraints on the access right activation according to the user property, the role property, and the system property. It also imposes constraints on the delegation and the inheritance of access right according to temporal/spatial information and a crisis occurrence.

Coordinated Control Strategy and Optimization of Composite Energy Storage System Considering Technical and Economic Characteristics

  • Li, Fengbing;Xie, Kaigui;Zhao, Bo;Zhou, Dan;Zhang, Xuesong;Yang, Jiangping
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.3
    • /
    • pp.847-858
    • /
    • 2015
  • Control strategy and corresponding parameters have significant impacts on the overall technical and economic characteristics of composite energy storage systems (CESS). A better control strategy and optimized control parameters can be used to improve the economic and technical characteristics of CESS, and determine the maximum power and stored energy capacity of CESS. A novel coordinated control strategy is proposed considering the coordination of various energy storage systems in CESS. To describe the degree of coordination, a new index, i.e. state of charge coordinated response margin of supercapacitor energy storage system, is presented. Based on the proposed control strategy and index, an optimization model was formulated to minimize the total equivalent cost in a given period for two purposes. The one is to obtain optimal control parameters of an existing CESS, and the other is to obtain the integrated optimal results of control parameters, maximum power and stored energy capacity for CESS in a given period. Case studies indicate that the developed index, control strategy and optimization model can be extensively applied to optimize the economic and technical characteristics of CESS. In addition, impacts of control parameters are discussed in detail.

A Case Study of the Base Technology for the Smart Grid Security: Focusing on a Performance Improvement of the Basic Algorithm for the DDoS Attacks Detection Using CUDA

  • Huh, Jun-Ho;Seo, Kyungryong
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.411-417
    • /
    • 2016
  • Since the development of Graphic Processing Unit (GPU) in 1999, the development speed of GPUs has become much faster than that of CPUs and currently, the computational power of GPUs exceeds CPUs dozens and hundreds times in terms of decimal calculations and costs much less. Owing to recent technological development of hardwares, general-purpose computing and utilization using GPUs are on the rise. Thus, in this paper, we have identified the elements to be considered for the Smart Grid Security. Focusing on a Performance Improvement of the Basic Algorithm for the Stateful Inspection to Detect DDoS Attacks using CUDA. In the program, we compared the search speeds of GPU against CPU while they search for the suffix trees. For the computation, the system constraints and specifications were made identical during the experiment. We were able to understand from the results of the experiment that the problem-solving capability improves when GPU is used. The other finding was that performance of the system had been enhanced when shared memory was used explicitly instead of a global memory as the volume of data became larger.

Agile Networking in Smart Grids

  • Qin, Zhenquan;Zhang, Jianing;Shi, Liang;Wang, Lei;Shu, Lei;Guo, Yuquan
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.1 no.1
    • /
    • pp.34-49
    • /
    • 2012
  • Recently, the smart grid (SG) has been introduced to solve the serious network issues caused by the increasing electrical demand and the complex nonlinear nature of the electric power distribution network. The SG, regarded as the next generation power grid, can transmit power in more efficient ways by building an automatic and distributed energy delivery network. In this paper, we first assess how various existing networking technologies, such as IEEE 802.11 (WiFi) and IEEE 802.15.4 (ZigBee), meet the requirements of the SG communication protocols. Specifically, we classify the existing network protocols into three categories: WSN-based networking, WiFi-based networking, and wireline-based networking. We then survey the security issues regarding the SG. Finally, we propose an agile SG networking architecture and show the effectiveness of different adopted networking technologies and, as a result, present a candidate solution to implement agile networking in SGs.

  • PDF

A Study on Global Scheduler for Computing Resources and Network Resources Management (컴퓨팅 자원 및 네트워크 자원의 관리를 위한 티켓 기반 글로벌 스케줄러에 관한 연구)

  • Lim, Chang-Sun;Ahn, Seong-Jin;Chung, Jin-Wook;Park, Jin-Sub
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.13-19
    • /
    • 2009
  • In this paper, the integrated management of grid resources for conducting research on the global scheduler, the proposed plan is designed for. Research on the global scheduler and the grid system as a global scheduler for the system to understand the concept of a global scheduler configuration was necessary to check conditions. And other global scheduler, global positioning system and the differentiation of a ticket-based system was introduced to the concept. Finally, this paper proposed by the global scheduler for the system design, through prototyping to determine the actual effect can be used to determine whether is was.

  • PDF