• Title/Summary/Keyword: Real grid

Search Result 710, Processing Time 0.094 seconds

Privacy Enhancement and Secure Data Transmission Mechanism for Smart Grid System

  • Li, Shi;Choi, Kyung;Doh, Inshil;Chae, Ki-Joon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.1009-1011
    • /
    • 2011
  • With the growth of Smart Grid technologies, security and privacy will become the most important issues and more attention should be paid. There are some existing solutions about anonymization of smart meters, however, they still have some potential threats. In this paper, we describe an enhanced method to protect the privacy of consumer data. When metering data are required by a utility or the electrical energy distribution center for operational reasons, data are delivered not with the real IDs but with temporary IDs. In addition, these temporary IDs are changed randomly to prevent the attackers from analyzing the energy usage patterns. We also describe secure data transmission method for securing data delivered. In this way, we can enhance the privacy of Smart Grid System with low overhead.

Optimal Control Approach for a Smart Grid

  • Imen Amdouni;Naziha Labiadh;Lilia El amraoui
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.194-198
    • /
    • 2023
  • The current electricity networks will undergo profound changes in the years to come to be able to meet the growing demand for electricity, while minimizing the costs of consumers and producers, etc. The electricity network of tomorrow or even the intelligent « Smart Grids » network will be the convergence of two networks: the electricity network and the telecommunications network. In this context falls our work which aims to study the impact of the integration of energy decentralization into the electricity network. In this sense, we have implemented a new smart grid model where several coexisting suppliers can exchange information with consumers in real time. In addition, a new approach to energy distribution optimization has been developed. The simulation results prove the effectiveness of this approach in improving energy exchange and minimizing consumer purchase costs and line losses.

Key Management Framework based on Double Hash Chain for Secure Smart Grid Environments (안전한 스마트 그리드 환경을 위한 이중 해쉬 체인 기반 키 관리 프레임워크)

  • Lee, Young-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2063-2072
    • /
    • 2013
  • Smart Grid is the next-generation intelligent power grid that maximizes energy efficiency with the convergence of IT technologies and the existing power grid. It enables consumers to check power rates in real time for active power consumption. It also enables suppliers to measure their expected power generation load, which stabilizes the operation of the power system. However, there are high possibility that various kinds of security threats such as data exposure, data theft, and privacy invasion may occur in interactive communication with intelligent devices. Therefore, to establish a secure environment for responding to such security threat with the smart grid, the key management technique, which is the core of the development of a security mechanism, is required. Using a hash chain, this paper suggests a group key management mechanism that is efficiently applicable to the smart grid environment with its hierarchical structure, and analyzes the security and efficiency of the suggested group key management framework.

Secure Distributed Data Management Architecture for Consumer Protection of Smart Grid (스마트 그리드의 소비자 보호를 위한 안전한 분산 데이터 관리 구조)

  • Park, Nam-Je;Song, You-Jin;Park, Kwang-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.9
    • /
    • pp.57-67
    • /
    • 2010
  • Smart grid technology can expand energy efficiency into the home by monitoring consumer energy usage in real time and communicating with household devices that respond to demands to shut off during periods of non-use, allowing individual consumers to control their electricity usage more effectively. But, the information collected on a smart grid will form a library of personal information, the mishandling of which could be highly invasive of consumer privacy. There will be major concerns if consumer-focused principles of transparency and control are not treated as essential design principles from beginning to end. In this paper, using. All-Or-Nothing Transform encryption mode for providing smart grid security, we propose efficient distributed data Management based on XOR operation. The contribution of this paper is to provide a secure algorithm that manages efficiently distributed data in the field of private data in smart grid environment.

Secure Data Transaction Protocol for Privacy Protection in Smart Grid Environment (스마트 그리드 환경에서 프라이버시 보호를 위한 안전한 데이터 전송 프로토콜)

  • Go, Woong;Kwak, Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1701-1710
    • /
    • 2012
  • Recently, it has been found that it is important to use a smart grid to reduce greenhouse-gas emissions worldwide. A smart grid is a digitally enabled electrical grid that gathers, distributes, and acts on information regarding the behavior of all participants (suppliers and consumers) to improve the efficiency, importance, reliability, economics, and sustainability of electricity services. The smart grid technology uses two-way communication, where users can monitor and limit the electricity consumption of their home appliances in real time. Likewise, power companies can monitor and limit the electricity consumption of home appliances for stabilization of the electricity supply. However, if information regarding the measured electricity consumption of a user is leaked, serious privacy issues may arise, as such information may be used as a source of data mining of the electricity consumption patterns or life cycles of home residents. In this paper, we propose a data transaction protocol for privacy protection in a smart grid. In addition, a power company cannot decrypt an encrypted home appliance ID without the user's password.

Building Control Box Attached Monitor based Color Grid Recognition Methods for User Access Authentication

  • Yoon, Sung Hoon;Lee, Kil Soo;Cha, Jae Sang;Khudaybergenov, Timur;Kim, Min Soo;Woo, Deok Gun;Kim, Jeong Uk
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.1-7
    • /
    • 2020
  • The secure access the lighting, Heating, ventilation, and air conditioning (HVAC), fire safety, and security control boxes of building facilities is the primary objective of future smart buildings. This paper proposes an authorized user access to the electrical, lighting, fire safety, and security control boxes in the smart building, by using color grid coded optical camera communication (OCC) with face recognition Technologies. The existing CCTV subsystem can be used as the face recognition security subsystem for the proposed approach. At the same time a smart device attached camera can used as an OCC receiver of color grid code for user access authentication data sent by the control boxes to proceed authorization. This proposed approach allows increasing an authorization control reliability and highly secured authentication on accessing building facility infrastructure. The result of color grid code sequence received by the unauthorized person and his face identification allows getting good results in security and gaining effectiveness of accessing building facility infrastructure. The proposed concept uses the encoded user access authentication information through control box monitor and the smart device application which detect and decode the color grid coded informations combinations and then send user through the smart building network to building management system for authentication verification in combination with the facial features that gives a high protection level. The proposed concept is implemented on testbed model and experiment results verified for the secured user authentication in real-time.

The Development of Kernel-based Monitoring System for Grid Application (커널 기반 그리드 응용 모니터링 시스템의 개발)

  • Kim Tae-Kyung;Kim Dong-Su;Byeon Ok-Hwan;Chung Tai M.
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.821-828
    • /
    • 2004
  • To analyze the usage information of system and network resources to the each grid application by measuring the real time traffic and calculating the statistic information, we suggested the kernel-based monitoring methods by researching the efficient monitoring method. This method use small system resourcesand measure the monitoring information accurately with less delay than the usual packet capture methods such as tcpdump. Also we implemented the monitoring systems which can monitor the used resources of system and network for grid application using the suggested kernel-based monitoring method. This research can give the useful information to the development of grid application and to grid network scheduler which can assign the proper resources to the grid application to perform efficiently. Network administrator can decide whether the expansion of network is required or not using the monitoring information.

Analysis on the Saturation of Grid Artifact and its Reduction in Digital Radiography Images Based on the Adaptive Filtering (디지털 방사선 영상에서 그리드 왜곡의 포화 특성에 관한 연구와 적응 필터링에 기초한 제거)

  • Kim, Dong-Sik;Lee, Sang-Gyun
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.48 no.4
    • /
    • pp.1-11
    • /
    • 2011
  • In order to obtain more clear x-ray images, an antiscatter grid, which can absorb the scattered rays, is employed. The artifacts due to the grid pattern are, however, visible, and thus should be removed by employing digital filters. For over exposed x-ray images, the strength of the grid artifacts are too big to be removed if fixed-bandwidth filters are employed. In this paper, for an efficient grid artifact reduction, we analyze the characteristics of the image formation and image saturation as the x-ray exposure increases. We can notice that, as the saturation begins to occur, the maximum of the artifact component decreases contrary to increasing exposure amount. We propose then an adaptive filtering algorithm for reduction of the grid artifacts, where the significant-signal bandwidth of the artifact component is used to choose appropriate filter bandwidths. The proposed algorithm is tested for real x-ray digital images, and can efficiently remove the grid artifacts.

Thermo-mechanical Behavior of Wire Bonding PBGA Packages with Different Solder Ball Grid Patterns (Wire Bonding PBGA 패키지의 솔더볼 그리드 패턴에 따른 열-기계적 거동)

  • Joo, Jin-Won
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.16 no.2
    • /
    • pp.11-19
    • /
    • 2009
  • Thermo-mechanical behaviors of wire-bond plastic ball grid array (WB-PBGA) package assemblies are characterized by high-sensitivity moire interferometry. Using the real-time moire setup, fringe patterns are recorded and analyzed for several temperatures. Experiments are conducted for three types of WB-PBGA package that have full grid pattern and perimeter pattern with/without central connections. Bending deformations of the assemblies and average strains of the solder balls are investigated, with an emphasis on the effect of solder interconnection grid patterns, Thermal strain distributions and the location of the critical solder ball in package assemblies are quite different with the form of solder ball grid pattern. For the WB-PBGA-PC, The largest of effective strain occurred in the inner solder ball of perimeter closest to the chip solder balls. The critical solder ball is located at the edge of the chip for the WB-PBGA-FG, at the most outer solder ball of central connections for the WB-PBGA-P/C, and at the inner solder ball closest to the chip for the WB-PBGA-P.

  • PDF

Economic Evaluation Algorithm of Island Micro-grid for Utility and Independent Power Producer (전력회사와 발전사업자 측면에서 도서지역용 마이크로그리드의 경제성평가 알고리즘)

  • Nam, Yang-Hyum;Lee, Hoo-Dong;Kim, Yu-Rim;Marito, Ferrira;Kim, Mi-Young;Rho, Dae-Seok
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.7
    • /
    • pp.1032-1038
    • /
    • 2017
  • Recently, regulation on carbon emissions has been strengthened according to the new climate change convention (COP21) held in Paris, and then Korea has decided to reduce CO2 emissions by 37% until 2030. As one of countermeasures, the government has energetically performed demonstration projects of island micro-grid including solar power, wind power and energy storage system. However, in order to smoothly introduce island micro-grid, it is a critical issue to carry out the economic evaluation for power utility aspect and independent power producer aspect. Therefore, this paper proposes economic evaluation algorithms of island micro-grid which are based on the present worth method, considering cost and benefit factors in the aspect of both sides. Firstly, in case of power utility this paper proposes algorithm to estimate a period of return on investment according to the introduction capacity of distributed generators replacing diesel generator. And also, in case of independent power producer, this paper proposes evaluation algorithm to estimate weighting factor of SMP and benefit rate based on break-even point related with cost and benefit. From a case study result on real island micro-grid model, it is confirmed that proposed algorithms are useful and practical for the economic evaluation of island micro-grid.