• Title/Summary/Keyword: Smart-key system

Search Result 507, Processing Time 0.026 seconds

Hash chain based Group Key Management Mechanism for Smart Grid Environments (스마트그리드 환경에 적용 가능한 해쉬체인 기반의 그룹키 관리 메커니즘)

  • Eun, Sun-Ki;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.149-160
    • /
    • 2011
  • Smart Grid is the next-generation intelligent power grid that maximizes energy efficiency with the convergence of IT technologies and the existing power grid. It enables consumers to check power rates in real time for active power consumption. It also enables suppliers to measure their expected power generation load, which stabilizes the operation of the power system. However, there are high possibility that various kinds of security threats such as data exposure, data theft, and privacy invasion may occur in interactive communication with intelligent devices. Therefore, to establish a secure environment for responding to such security threat with the smart grid, the key management technique, which is the core of the development of a security mechanism, is required. Using a hash chain, this paper suggests a group key management mechanism that is efficiently applicable to the smart grid environment with its hierarchical structure, and analyzes the security and efficiency of the suggested group key management mechanism.

Smart City Feature Using Six European Framework and Multi Expert Multi Criteria: A Sampling of the Development Country

  • Kurniawan, Fachrul;Haviluddin, Haviluddin;Collantes, Leonel Hernandez;Nugroho, Supeno Mardi Susiki;Hariadi, Mochamad
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.43-50
    • /
    • 2022
  • Continuous development is the key of development issue in developing nations. Smart city measurement is prevalently carried through in the cities in which the nations have been classified as industrialized countries. In addition, cities in Europe becomes the models of smart city system. Smart city concept used in the cities in Europe applies six predominant features i.e. smart economic, smart mobility, smart environment, smart people, smart living, and smart governance. This paper focuses on figuring out city' development strategy in developing nations particularly Indonesia in regard with European Framework by way of Multi Expert Multi Criterion Decision Making (ME-MCDM). Recommendation is resulted from the tests using the data collected from one of the metropolis cities in Indonesia, whereby issuing recommendation must firstly implement smart education, secondly communication, thirdly smart government, and fourthly smart health, as well as simultaneously implement smart energy and smart mobility.

Wide-Area SCADA System with Distributed Security Framework

  • Zhang, Yang;Chen, Jun-Liang
    • Journal of Communications and Networks
    • /
    • v.14 no.6
    • /
    • pp.597-605
    • /
    • 2012
  • With the smart grid coming near, wide-area supervisory control and data acquisition (SCADA) becomes more and more important. However, traditional SCADA systems are not suitable for the openness and distribution requirements of smart grid. Distributed SCADA services should be openly composable and secure. Event-driven methodology makes service collaborations more real-time and flexible because of the space, time and control decoupling of event producer and consumer, which gives us an appropriate foundation. Our SCADA services are constructed and integrated based on distributed events in this paper. Unfortunately, an event-driven SCADA service does not know who consumes its events, and consumers do not know who produces the events either. In this environment, a SCADA service cannot directly control access because of anonymous and multicast interactions. In this paper, a distributed security framework is proposed to protect not only service operations but also data contents in smart grid environments. Finally, a security implementation scheme is given for SCADA services.

Implementation of an Intelligent Grid Computing Architecture for Transient Stability Constrained TTC Evaluation

  • Shi, Libao;Shen, Li;Ni, Yixin;Bazargan, Masound
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.1
    • /
    • pp.20-30
    • /
    • 2013
  • An intelligent grid computing architecture is proposed and developed for transient stability constrained total transfer capability evaluation of future smart grid. In the proposed intelligent grid computing architecture, a model of generalized compute nodes with 'able person should do more work' feature is presented and implemented to make full use of each node. A timeout handling strategy called conditional resource preemption is designed to improve the whole system computing performance further. The architecture can intelligently and effectively integrate heterogeneous distributed computing resources around Intranet/Internet and implement the dynamic load balancing. Furthermore, the robustness of the architecture is analyzed and developed as well. The case studies have been carried out on the IEEE New England 39-bus system and a real-sized Chinese power system, and results demonstrate the practicability and effectiveness of the intelligent grid computing architecture.

Pole Information Management System using RFID (RFID를 이용한 전주 정보관리 시스템)

  • Lee, Jeong-Gu;Kim, Eun-Ju;Bae, Young-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.12
    • /
    • pp.1367-1372
    • /
    • 2015
  • In this paper, we embed RFID tag into name plate of pole and store key value at its RFID tag in order to solve the problem for the management of name plate of pole, which identify by eyes of human for until now. The 900MHz RFID reader performs identification for stored key value, then its key value transmit into smart phone through Bluetooth. The smart phone transmit the key value into server through data communication network and receive again the necessary information after the authentication by the server. We develop pole information system that have such a structure.

A split spectrum processing of noise-contaminated wave signals for damage identification

  • Miao, X.T.;Ye, Lin;Li, F.C.;Sun, X.W.;Peng, H.K.;Lu, Ye;Meng, Guang
    • Smart Structures and Systems
    • /
    • v.10 no.3
    • /
    • pp.253-269
    • /
    • 2012
  • A split spectrum processing (SSP) method is proposed to accurately determine the time-of-flight (ToF) of damage-scattered waves by comparing the instantaneous amplitude variation degree (IAVD) of a wave signal captured from a damage case with that from the benchmark. The fundamental symmetrical ($S_0$) mode in aluminum plates without and with a notch is assessed. The efficiency of the proposed SSP method and Hilbert transform in determining the ToF of damage-scattered $S_0$ mode is evaluated for damage identification when the wave signals are severely contaminated by noise. Broadband noise can overwhelm damage-scattered wave signals in the time domain, and the Hilbert transform is only competent for determining the ToF of damage-scattered $S_0$ mode in a noise-free condition. However, the calibrated IAVD of the captured wave signal is minimally affected by noise, and the proposed SSP method is capable of determining the ToF of damage-scattered $S_0$ mode accurately even though the captured wave signal is severely contaminated by broadband noise, leading to the successful identification of damage (within an error on the order of the damage size) using a triangulation algorithm.

A Study on the Analysis on Manipulation System of MORPG Game based on Finger Movement and Key Input Data (손가락 움직임과 키 입력 데이터를 기반으로 한 MORPG 게임의 조작계 분석 방법론에 관한 연구)

  • Jungha Kim
    • Smart Media Journal
    • /
    • v.12 no.9
    • /
    • pp.116-123
    • /
    • 2023
  • In this study, I will describe the difference in operating methods centered on the game operating system between beginners and expert groups in MORPG PC games and focus on the methodology to analyze them. First of all, a hypothesis was established to distinguish between beginners and expert groups based on the manipulation system of character movements commonly used in MORPG, and through this distinction, it was analyzed whether finger movement data and key stroke data related to the manipulation system can be significantly used in the future. Based on these analysis results, it was found that the analysis methodology that combines finger motion data and key stroke analysis is meaningful as a user test methodology for the PC MORPG game operating system in the future.

A Security Nonce Generation Algorithm Scheme Research for Improving Data Reliability and Anomaly Pattern Detection of Smart City Platform Data Management (스마트시티 플랫폼 데이터 운영의 이상패턴 탐지 및 데이터 신뢰성 향상을 위한 보안 난수 생성 알고리즘 방안 연구)

  • Lee, Jaekwan;Shin, Jinho;Joo, Yongjae;Noh, Jaekoo;Kim, Jae Do;Kim, Yongjoon;Jung, Namjoon
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.4 no.2
    • /
    • pp.75-80
    • /
    • 2018
  • The smart city is developing an energy system efficiently through a common management of the city resource for the growth and a low carbon social. However, the smart city doesn't counter a verification effectively about a anomaly pattern detection when existing security technology (authentication, integrity, confidentiality) is used by fixed security key and key deodorization according to generated big data. This paper is proposed the "security nonce generation based on security nonce generation" for anomaly pattern detection of the adversary and a safety of the key is high through the key generation of the KDC (Key Distribution Center; KDC) for improvement. The proposed scheme distributes the generated security nonce and authentication keys to each facilities system by the KDC. This proposed scheme can be enhanced to the security by doing the external pattern detection and changed new security key through distributed security nonce with keys. Therefore, this paper can do improving the security and a responsibility of the smart city platform management data through the anomaly pattern detection and the safety of the keys.

A Study on Possibility of International Trade by using of Block Chain (국제 무역거래에서 블록체인의 활용 가능성에 관한 연구)

  • KIM, Jae-Seong;LIM, Sung-Chul
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.75
    • /
    • pp.137-158
    • /
    • 2017
  • Traditional banking systems of transactions are being replaced by FfinTech. Block Chain System can be a key point in Fourth Industrial Revolution such as AI, Big Data, IOT and also can be used as a tools of smart contract or smart payment systems in International Trade. If banking regulation is to be liberalized FinTech would be more activated in Korea and various attempts would be available especially smart payment in business. There are so many levels to be achieved from the time of contract to the time of clearance. We cannot expect speed and range of IT advancement and international trade, Block Chain system will challenge the traditional banking process. First, Block Chain Payment system can be used in P2P, B2B transaction and also T/T in small business. Second, Bit Coin transaction can be available within the parties without the Trusted Third Party. Third, By using of Block Chain system Traditional International Trade process can be altered.

  • PDF

The Development of a One-time Password Mechanism Improving on S/KEY (S/KEY를 개선한 일회용 패스워드 메커니즘 개발)

  • 박중길
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.2
    • /
    • pp.25-36
    • /
    • 1999
  • In this paper we propose a one-time password mechanism that solves the problems of the S/KEY: the limitation of a usage and the need of storage for keys. because of using a cryptographic algorithm the proposed mechanism has no the limitation of a usage. Also because of producing the key for an authentication from a user's password it is easy to manage the authentication key and is possible to share the session key between a client and a server after the authentication process. In addition the proposed mechanism is easy to protect and manage the authentication information because of using a smart card and is adopted by the system that needs a noe-way authentication from a client to a server without the challenge of a server.