• Title/Summary/Keyword: Smart-key system

Search Result 502, Processing Time 0.031 seconds

Authentication and Key Management of Smart Grid System using Bluetooth and Zigbee (Bluetooth, Zigbee를 응용한 Smart Grid 시스템의 인증 및 키 관리)

  • Chang, Young-Hyun;Pyo, Seong-Bae;Song, Jin-Young;Park, Dea-Woo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.06a
    • /
    • pp.87-90
    • /
    • 2011
  • Smart Grid는 전기 공급자와 수요자를 이어주는 전기 네트워크를 설치하여, 전기기기와 IT기술이 융합된 형태로 사용자내에서 Bluetooth, Zigbee를 이용한 전기기기를 통제하는 효율적인 에너지 네트워크의 일종이다. 하지만 Bluetooth, Zigbee는 인증과 키관리 문제가 있어 보안의 문제가 일어날 수 있다. 본 논문에서는 스마트 그리드에서 사용될 전기IT기기를 응용하여 제어하는 Bluetooth, Zigbee의 인증과 키관리, 키 생성 프로토콜을 통한 보안성 문제를 연구한다. 또한 Bluetooth, Zigbee에 대한 키 생성 프로토콜을 연구한다. 본 연구는 Smart Grid 시스템의 보안성과 안전성을 강화하여 Smart Grid 기술 발전에 기여할 것이다.

  • PDF

A Survey on the Works of Analog and Interface Technologies for Smart Phone System Integrated Circuits (스마트폰 시스템반도체를 위한 아날로그 및 인터페이스 기술과 이슈 분석)

  • Moon, San-Gook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.668-670
    • /
    • 2011
  • The Next-generation IT technology has been evolving from single technique to another which has merged, converging characteristics. The government categorized the 5 essential technologies to secure competitiveness in designing system semiconductors as smart motor vehicle info-tainment platform, smart TV multimedia system, smart phone analog interface technique, smart convergence digital communication and RF techniques, and advanced power management for smart devices. Also, it designated smart phone, smart TV, smart motor vehicle, and smart pad as the key industries. Such core techniques will become the key technologies of semiconductor design to secure the competitiveness of the next generation smart devices and the techniques can be transferred to fab-less design companies. In this contribution, we analyze the issues and the problems of the smart phone analog and interface techniques.

  • PDF

Wireless sensor network design for large-scale infrastructures health monitoring with optimal information-lifespan tradeoff

  • Xiao-Han, Hao;Sin-Chi, Kuok;Ka-Veng, Yuen
    • Smart Structures and Systems
    • /
    • v.30 no.6
    • /
    • pp.583-599
    • /
    • 2022
  • In this paper, a multi-objective wireless sensor network configuration optimization method is proposed. The proposed method aims to determine the optimal information and lifespan wireless sensor network for structural health monitoring of large-scale infrastructures. In particular, cluster-based wireless sensor networks with multi-type of sensors are considered. To optimize the lifetime of the wireless sensor network, a cluster-based network optimization algorithm that optimizes the arrangement of cluster heads and base station is developed. On the other hand, based on the Bayesian inference, the uncertainty of the estimated parameters can be quantified. The coefficient of variance of the estimated parameters can be obtained, which is utilized as a holistic measure to evaluate the estimation accuracy of sensor configurations with multi-type of sensors. The proposed method provides the optimal wireless sensor network configuration that satisfies the required estimation accuracy with the longest lifetime. The proposed method is illustrated by designing the optimal wireless sensor network configuration of a cable-stayed bridge and a space truss.

FPGA Implementation of RSA Public-Key Cryptographic Coprocessor for Restricted System

  • Kim, Mooseop;Park, Yongje;Kim, Howon
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1551-1554
    • /
    • 2002
  • In this paper, the hardware implementation of the RSA public-key cryptographic algorithm is presented. The RSA cryptographic algorithm is depends on the computation of repeated modular exponentials. The Montgomery algorithm is used and modified to reduce hardware resources and to achieve reasonable operating speed for smart card. An efficient architecture for modular multiplications based on the array multiplier is proposed. We have implemented a 10240it RSA cryptographic processor based on proposed scheme in IESA system developed for smart card emulating system. As a result, it is shown that proposed architecture contributes to small area and reasonable speed for smart cards.

  • PDF

Research on Core Function of Autonomous Vessels for INS (통합항해시스템(INS) 적용에 필요한 자율운항 선박 핵심 기능 연구)

  • Kim, Beom-Jun
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2018.05a
    • /
    • pp.158-159
    • /
    • 2018
  • It analyzed the domestic and overseas trends related to smart ship development in the world and identifies key functions required for smart vessels, especially autonomous vessels, and introduces key technologies that can be utilized in the development of INS(Integrated Navigation System) for autonomous vessels.

  • PDF

Advanced Droop Control Scheme in Multi-terminal DC Transmission Systems

  • Che, Yanbo;Zhou, Jinhuan;Li, Wenxun;Zhu, Jiebei;Hong, Chao
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.3
    • /
    • pp.1060-1068
    • /
    • 2018
  • Droop control schemes have been widely employed in the control strategies for Multi-Terminal Direct Current (MTDC) system for its high reliability. Under the conventional DC voltage-active power droop control, the droop slope applies a proportional relationship between DC voltage error and active power error for power sharing. Due to the existence of DC network impedance and renewable resource fluctuation, there is inevitably a DC voltage deviation from the droop characteristic, which in turn results in inaccurate control of converter's power. To tackle this issue, a piecewise droop control with DC voltage dead band or active power dead band is implemented into controller design. Besides, an advanced droop control scheme with versatile function is proposed, which enables the converter to regulate DC voltage and AC voltage, control active and reactive power, get participated into frequency control, and feed passive network. The effectiveness of the proposed control method has been verified by simulation results.

A Design of Key Generation and Communication for Device Access Control based on Smart Health Care (스마트 헬스케어 기반의 디바이스 접근제어를 위한 키 생성 및 통신기법 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.746-754
    • /
    • 2016
  • Smart healthcare systems, a convergent industry based on information and communications technologies (ICT), has emerged from personal health management to remote medical treatment as a distinguished industry. The smart healthcare environment provides technology to deliver vital information, such as pulse rate, body temperature, health status, and so on, from wearable devices to the hospital network where the physician is located. However, since it deals with the patient's personal medical information, there is a security issue for personal information management, and the system may be vulnerable to cyber-attacks in wireless networks. Therefore, this study focuses on a key-development and device-management system to generate keys in the smart environment to safely manage devices. The protocol is designed to provide safe communications with the generated key and to manage the devices, as well as the generated key. The security level is analyzed against attack methods that may occur in a healthcare environment, and it was compared with existing key methods and coding capabilities. In the performance evaluation, we analyze the security against attacks occurring in a smart healthcare environment, and the security and efficiency of the existing key encryption method, and we confirmed an improvement of about 15%, compared to the existing cipher systems.

Overview of SAE/LTE security

  • Prasad, Anand R.;Zhang, Xiaowei
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.1
    • /
    • pp.36-43
    • /
    • 2013
  • This paper provides an overview of the security in the System Architecture Evolution (SAE) / Long-Term Evolution (LTE) system. Security is an integral part of SAE/LTE with improvements over the Third Generation (3G) system. This paper reviews the SAE/LTE system architecture, and discusses the security requirements, algorithms, Authentication and Key Agreement (AKA), Security Mode Command (SMC), key hierarchy and security for mobility.

  • PDF

Integrated Voltage and Power Flow Management Considering the Cost of Opera in Active Distribution Networks

  • Xu, Tao;Guo, Lingxu;Wei, Wei;Wang, Xiaoxue;Wang, Chengshan;Lin, Jun;Li, Tianchu
    • Journal of Electrical Engineering and Technology
    • /
    • v.11 no.2
    • /
    • pp.274-284
    • /
    • 2016
  • The increasing penetration of distributed energy resources on the distribution networks have brought a number of technical impacts where voltage and thermal variations have been identified as the dominant effects. Active network management in distribution networks aims to integrate distributed energy resources with flexible network management so that distributed energy resources are organized to make better use of existing capacity and infrastructure. This paper propose active solutions which aims to solve the voltage and thermal issues in a distributed manner utilizing a collaborative approach. The proposed algorithms have been fully tested on a distribution network with distributed generation units.

Smart grid and nuclear power plant security by integrating cryptographic hardware chip

  • Kumar, Niraj;Mishra, Vishnu Mohan;Kumar, Adesh
    • Nuclear Engineering and Technology
    • /
    • v.53 no.10
    • /
    • pp.3327-3334
    • /
    • 2021
  • Present electric grids are advanced to integrate smart grids, distributed resources, high-speed sensing and control, and other advanced metering technologies. Cybersecurity is one of the challenges of the smart grid and nuclear plant digital system. It affects the advanced metering infrastructure (AMI), for grid data communication and controls the information in real-time. The research article is emphasized solving the nuclear and smart grid hardware security issues with the integration of field programmable gate array (FPGA), and implementing the latest Time Authenticated Cryptographic Identity Transmission (TACIT) cryptographic algorithm in the chip. The cryptographic-based encryption and decryption approach can be used for a smart grid distribution system embedding with FPGA hardware. The chip design is carried in Xilinx ISE 14.7 and synthesized on Virtex-5 FPGA hardware. The state of the art of work is that the algorithm is implemented on FPGA hardware that provides the scalable design with different key sizes, and its integration enhances the grid hardware security and switching. It has been reported by similar state-of-the-art approaches, that the algorithm was limited in software, not implemented in a hardware chip. The main finding of the research work is that the design predicts the utilization of hardware parameters such as slices, LUTs, flip-flops, memory, input/output blocks, and timing information for Virtex-5 FPGA synthesis before the chip fabrication. The information is extracted for 8-bit to 128-bit key and grid data with initial parameters. TACIT security chip supports 400 MHz frequency for 128-bit key. The research work is an effort to provide the solution for the industries working towards embedded hardware security for the smart grid, power plants, and nuclear applications.