• Title/Summary/Keyword: Smart-key system

Search Result 510, Processing Time 0.024 seconds

Optimized Security Algorithm for IEC 61850 based Power Utility System

  • Yang, Hyo-Sik;Kim, Sang-Sig;Jang, Hyuk-Soo
    • Journal of Electrical Engineering and Technology
    • /
    • v.7 no.3
    • /
    • pp.443-450
    • /
    • 2012
  • As power grids are integrated into one big umbrella (i.e., Smart Grid), communication network plays a key role in reliable and stable operation of power grids. For successful operation of smart grid, interoperability and security issues must be resolved. Security means providing network system integrity, authentication, and confidentiality service. For a cyber-attack to a power grid system, which may jeopardize the national security, vulnerability of communication infrastructure has a serious impact on the power grid network. While security aspects of power grid network have been studied much, security mechanisms are rarely adopted in power gird communication network. For security issues, strict timing requirements are defined in IEC 61850 for mission critical messages (i.e., GOOSE). In this paper, we apply security algorithms (i.e., MD-5, SHA-1, and RSA) and measure their processing time and transmission delay of secured mission critical messages. The results show the algorithms satisfying the timing requirements defined in IEC 61850 and we observer the algorithm that is optimal for secure communication of mission critical messages. Numerical analysis shows that SHA-1 is preferable for secure GOOSE message sending.

A Study on Smart Home Service System Design to Support Aging in Place (Aging in Place 지원을 위한 스마트 홈 서비스 시스템 설계에 관한 연구)

  • Sim, Sungho
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.249-254
    • /
    • 2019
  • According to the recent expansion of the network environment, the spread of smart devices is continuously increasing. With the spread of smart devices such as smart phones, smart pads and wearables, changes are taking place in smart technologies and IT convergence technologies. The development of smart technology is a key element of the 4th industrial technology. The Fourth Industrial Revolution expanded the new service-based industry by adding intelligence to residential, industrial and production environments using IT convergence and smart devices. Research on providing various services using smart technologies, such as smart home, smart factory, smart farm, and smart healthcare, is being conducted in variety. In particular, There is a sharp rise in smart homes due to the proliferation of IoT devices and the growth of sensor technology, control technology, applications, data management, and cloud services. Smart home services using smart technology provide residents with convenient, beneficial services and environments. Smart home service has complemented the existing home network service, but there still are flaws to be modified. In other words, the spread of smart devices, the development of service provider-oriented services, and the interlocking of services have limitations in providing services in consideration of user environment and user state. In order to solve this problem, this study proposes a smart home service system that considers the situation of the elderly.

Comparison Gait Analysis of Normal and Amputee: Filtering Graph Data Based on Joint Angle

  • Junhyung Kim;Seunghyun Lee;Soonchul Kwon
    • International journal of advanced smart convergence
    • /
    • v.12 no.3
    • /
    • pp.61-67
    • /
    • 2023
  • Gait analysis plays a key role in the research field of exploring and understanding human movement. By quantitatively analyzing the complexity of human movement and the various factors that influence it, it is possible to identify individual gait characteristics and abnormalities. This is especially true for people with walking difficulties or special circumstances, such as amputee, for example. This is because it can help us understand their gait characteristics and provide individualized rehabilitation plans. In this paper, we compare and analyze the differences in ankle joint motion and angles between normal and amputee. In particular, a filtering process was applied to the ankle joint angle data to obtain high accuracy results. The results of this study can contribute to a more accurate understanding and improvement of the gait patterns of normal and amputee.

Structural health monitoring system for Sutong Cable-stayed Bridge

  • Wang, Hao;Tao, Tianyou;Li, Aiqun;Zhang, Yufeng
    • Smart Structures and Systems
    • /
    • v.18 no.2
    • /
    • pp.317-334
    • /
    • 2016
  • Structural Health Monitoring System (SHMS) works as an efficient platform for monitoring the health status and performance deterioration of engineering structures during long-term service periods. The objective of its installation is to provide reasonable suggestions for structural maintenance and management, and therefore ensure the structural safety based on the information extracted from the real-time measured data. In this paper, the SHMS implemented on a world-famous kilometer-level cable-stayed bridge, named as Sutong Cable-stayed Bridge (SCB), is introduced in detail. The composition and core functions of the SHMS on SCB are elaborately presented. The system consists of four main subsystems including sensory subsystem, data acquisition and transmission subsystem, data management and control subsystem and structural health evaluation subsystem. All of the four parts are decomposed to separately describe their own constitutions and connected to illustrate the systematic functions. Accordingly, the main techniques and strategies adopted in the SHMS establishment are presented and some extension researches based on structural health monitoring are discussed. The introduction of the SHMS on SCB is expected to provide references for the establishment of SHMSs on long-span bridges with similar features as well as the implementation of potential researches based on structural health monitoring.

Growth Monitoring for Soybean Smart Water Management and Production Prediction Model Development

  • JinSil Choi;Kyunam An;Hosub An;Shin-Young Park;Dong-Kwan Kim
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2022.10a
    • /
    • pp.58-58
    • /
    • 2022
  • With the development of advanced technology, automation of agricultural work is spreading. In association with the 4th industrial revolution-based technology, research on field smart farm technology is being actively conducted. A state-of-the-art unmanned automated agricultural production demonstration complex was established in Naju-si, Jeollanam-do. For the operation of the demonstration area platform, it is necessary to build a sophisticated, advanced, and intelligent field smart farming model. For the operation of the unmanned automated agricultural production demonstration area platform, we are building data on the growth of soybean for smart cultivated crops and conducting research to determine the optimal time for agricultural work. In order to operate an unmanned automation platform, data is collected to discover digital factors for water management immediately after planting, water management during the growing season, and determination of harvest time. A subsurface drip irrigation system was established for smart water management. Irrigation was carried out when the soil moisture was less than 20%. For effective water management, soil moisture was measured at the surface, 15cm, and 30cm depth. Vegetation indices were collected using drones to find key factors in soybean production prediction. In addition, major growth characteristics such as stem length, number of branches, number of nodes on the main stem, leaf area index, and dry weight were investigated. By discovering digital factors for effective decision-making through data construction, it is expected to greatly enhance the efficiency of the operation of the unmanned automated agricultural production demonstration area.

  • PDF

A hybrid deep neural network compression approach enabling edge intelligence for data anomaly detection in smart structural health monitoring systems

  • Tarutal Ghosh Mondal;Jau-Yu Chou;Yuguang Fu;Jianxiao Mao
    • Smart Structures and Systems
    • /
    • v.32 no.3
    • /
    • pp.179-193
    • /
    • 2023
  • This study explores an alternative to the existing centralized process for data anomaly detection in modern Internet of Things (IoT)-based structural health monitoring (SHM) systems. An edge intelligence framework is proposed for the early detection and classification of various data anomalies facilitating quality enhancement of acquired data before transmitting to a central system. State-of-the-art deep neural network pruning techniques are investigated and compared aiming to significantly reduce the network size so that it can run efficiently on resource-constrained edge devices such as wireless smart sensors. Further, depthwise separable convolution (DSC) is invoked, the integration of which with advanced structural pruning methods exhibited superior compression capability. Last but not least, quantization-aware training (QAT) is adopted for faster processing and lower memory and power consumption. The proposed edge intelligence framework will eventually lead to reduced network overload and latency. This will enable intelligent self-adaptation strategies to be employed to timely deal with a faulty sensor, minimizing the wasteful use of power, memory, and other resources in wireless smart sensors, increasing efficiency, and reducing maintenance costs for modern smart SHM systems. This study presents a theoretical foundation for the proposed framework, the validation of which through actual field trials is a scope for future work.

A Direction of Convergence and Security of Smart Grid and Information Communication Network (스마트그리드(Smart Grid) 전력망과 정보통신망 융합 보안 방향)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.5
    • /
    • pp.477-486
    • /
    • 2010
  • This Study suggests security directions to reconstruct separate network of Smart Grid and information communication network as one communications system and implement Smart Grid integrated information communication network. In addition, it suggests prevention directions to prevent future cyber attacks by reorganizing network as the key three-stage network and separating TCP/IP four layers that consist of existing information communication network from Smart Grid. Moreover, it suggests the foundation for the study and the test by providing current problems of Smart Grid, weak points, and three security models. This study is meaningful to suggest development directions and situations as a technology of future-oriented electric industries, integrate attacks and preventions of TCP/IP Layers with Smart Grid, and seek for a new technology of Smart Grid and future tasks for Smart Grid information security.

An Enhanced Mutual Key Agreement Protocol for Mobile RFID-enabled Devices

  • Mtoga, Kambombo;Yoon, Eun-Jun
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.1 no.1
    • /
    • pp.65-71
    • /
    • 2012
  • Mobile RFID is a new application that uses a mobile phone as an RFID reader with wireless technology and provides a new valuable service to users by integrating RFID and ubiquitous sensor network infrastructures with mobile communication and wireless Internet. Whereas the mobile RFID system has many advantages, privacy violation problems on the reader side are very concerning to individuals and researchers. Unlike in regular RFID environments, where the communication channel between the server and reader is assumed to be secure, the communication channel between the backend server and the RFID reader in the mobile RFID system is not assumed to be safe. Therefore it has become necessary to devise a new communication protocol that secures the privacy of mobile RFID-enabled devices. Recently, Lo et al. proposed a mutual key agreement protocol that secures the authenticity and privacy of engaged mobile RFID readers by constructing a secure session key between the reader and server. However, this paper shows that this protocol does not meet all of the necessary security requirements. Therefore we developed an enhanced mutual key agreement protocol for mobile RFID-enabled devices that alleviates these concerns. We further show that our protocol can enhance data security and provide privacy protection for the reader in an unsecured mobile RFID environment, even in the presence of an active adversary.

  • PDF

Shuffling of Elliptic Curve Cryptography Key on Device Payment

  • Kennedy, Chinyere Grace;Cho, Dongsub
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.4
    • /
    • pp.463-471
    • /
    • 2019
  • The growth of mobile technology particularly smartphone applications such as ticketing, access control, and making payments are on the increase. Elliptic Curve Cryptography (ECC)-based systems have also become widely available in the market offering various convenient services by bringing smartphones in proximity to ECC-enabled objects. When a system user attempts to establish a connection, the AIK sends hashes to a server that then verifies the values. ECC can be used with various operating systems in conjunction with other technologies such as biometric verification systems, smart cards, anti-virus programs, and firewalls. The use of Elliptic-curve cryptography ensures efficient verification and signing of security status verification reports which allows the system to take advantage of Trusted Computing Technologies. This paper proposes a device payment method based on ECC and Shuffling based on distributed key exchange. Our study focuses on the secure and efficient implementation of ECC in payment device. This novel approach is well secure against intruders and will prevent the unauthorized extraction of information from communication. It converts plaintext into ASCII value that leads to the point of curve, then after, it performs shuffling to encrypt and decrypt the data to generate secret shared key used by both sender and receiver.

Integrity Guarantee System in IoT Virtual Environment Platform: Through Hyperedfger Indy and MQTT (IoT 가상환경 플랫폼에서의 무결성 보장 시스템:Hyperledger Indy와 MQTT를 통하여)

  • Yoosung Hong;Geun-Hyung Kim
    • Smart Media Journal
    • /
    • v.13 no.4
    • /
    • pp.76-85
    • /
    • 2024
  • In this paper, we propose a system that improves the data integrity of IoT(Internet of Things) devices in the virtual environment by combining Hyperledger Indy and MQTT(Message Queuing Telemetry Transport). The system complements the limitations of the centralized system by realizing a DPKI(Decentralized Public Key Infrastructure) structure that utilizes a distributed network in publish-subscribe(pub/sub) pattern communication. Digital signature technology was applied to ensure the data integrity of IoT devices and communication scenarios between the four core components of the client, IoT device, broker, and blockchain, as well as a topic structure using a decentralized identifier to ensure safety in the virtual environment. We present a systematic method for transparent data exchange. To prove the performance of the proposed system, this paper conducted experiments on four scenarios and evaluated communication performance in a virtual environment. The experimental results confirmed that the proposed system provides a reliable IoT data communication structure in a virtual environment.