• Title/Summary/Keyword: energy security

Search Result 916, Processing Time 0.026 seconds

A study on Zigbee Authentication Protocol Using System IDs in Environments of Smart Grid (스마트 그리드 환경에서 시스템 ID를 이용한 지그비 인증 프로토콜에 관한 연구)

  • Kim, Kyoung-Mok;Im, Song-Bin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.101-110
    • /
    • 2011
  • A smart grid networks delivers electricity from suppliers to consumers using digital technology with two-way communications to control appliances at consumers' homes to save energy, reduce cost and increase reliability and transparency. Security is critically important for smart grid networks that are usually used for the electric power network and IT environments that are opened to attacks, such as, eavesdroping, replay attacks of abnormal messages, forgery of the messages to name a few. ZigBee has emerged as a strong contender for smart grid networks. ZigBee is used for low data rate and low power wireless network applications. To deploy smart grid networks, the collected information requires protection from an adversary over the network in many cases. The security mechanism should be provided for collecting the information over the network. However, the ZigBee protocol has some security weaknesses. In this paper, these weaknesses are discussed and a method to improve security aspect of the ZigBee protocol is presented along with a comparison of the message complexity of the proposed security protocol with that of the current ZigBee protocol.

Food Security and Children′s Nutritional Status of the Households Supported by the National Basic Livelihood Security System (국민기초생활보장사업 수급 가정에서의 식품공급안정성과 아동의 영양상태)

  • 오세영;김미연;홍민지;정해랑
    • Journal of Nutrition and Health
    • /
    • v.35 no.6
    • /
    • pp.650-657
    • /
    • 2002
  • In order to provide basic data for the means to improve food situation and nutritional status of those supported by the National Basic Livelihood Security System (NBLSS), we examined household food insecurity and nutritional status of children under the support of NBLSS. This study included 209 children aged 3-12 years (99 boys and 110 girls) and their caretakers. We measured house food insecurity using Radimer/cornell Scale, children's body sizes and nutrient intake by semi-quantitative food frequency questionnaire, and caretakers' nutritional management skills. Only 9.6% of the households were in food secured (FS) while 8.1% were in household food insecured, but without hunger (HFI), 42.1% were in adult food insecured with hunger (AFI), and 40.2% were in child hungry (CH). Important predictors of food security were nutritional management skills of the caretakers as well as their education, but neither income nor food expenditure of the households. Mean energy intake of the children was 86.0% of the Korean Recommended Dietary Allowance (RDA). Intakes of protein, phosphorous, vitamin A and B$_1$ were relatively high ranging from 112.3% to 124.4% of the RDAs while those of calcium, iron, niacin, vitamin C were low showing 74.8-83.3% of the RDAs. Height, weight and weight/height ratio were close to the reference levels. Lower nutrient intakes of children were observed as the households were more food insecured. However, nutrient intakes and body sizes of children did not differ as a function of household socioeconomic status representing by income, food expenditure and caretakers' education. Results of this study suggest the importance of food security and nutritional management skills for the children's nutrient intakes. Concerning this matter, a need for nutrition education in the program for NBLSS was discussed.

A Wireless Sensor Network Architecture and Security Protocol for Monitoring the State of Bridge (교량감시를 위한 무선 센서 네트워크 구조 및 보안 프로토콜)

  • Lim Hwa-Jung;Jeon Jin-Soon;Lee Heon-Guil
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.3
    • /
    • pp.465-476
    • /
    • 2005
  • The wireless sensor network consists of a number of sensor nodes which have physical constraints. Each sensor node senses surrounding environments and sends the sensed information to Sink. In order to alleviate the inherent vulnerability in security of the wireless sensor nodes with the hardware constraints, the lightweight security protocol is needed and a variety of research is ongoing. In this paper, we propose a non-hierarchical sensor network and a security protocol that is suitable for monitoring man-made objects such as bridges. This paper, furthermore, explores a two-layer authentication, key distribution scheme which distributes the key and location of a sensor node in advance, and an effective security routing protocol which can take advantage of the Sleep and Awake state. This also results in the increased data transfer rate by increasing the number of alternative routing paths and the reduced energy consumption rate.

  • PDF

Smart grid and nuclear power plant security by integrating cryptographic hardware chip

  • Kumar, Niraj;Mishra, Vishnu Mohan;Kumar, Adesh
    • Nuclear Engineering and Technology
    • /
    • v.53 no.10
    • /
    • pp.3327-3334
    • /
    • 2021
  • Present electric grids are advanced to integrate smart grids, distributed resources, high-speed sensing and control, and other advanced metering technologies. Cybersecurity is one of the challenges of the smart grid and nuclear plant digital system. It affects the advanced metering infrastructure (AMI), for grid data communication and controls the information in real-time. The research article is emphasized solving the nuclear and smart grid hardware security issues with the integration of field programmable gate array (FPGA), and implementing the latest Time Authenticated Cryptographic Identity Transmission (TACIT) cryptographic algorithm in the chip. The cryptographic-based encryption and decryption approach can be used for a smart grid distribution system embedding with FPGA hardware. The chip design is carried in Xilinx ISE 14.7 and synthesized on Virtex-5 FPGA hardware. The state of the art of work is that the algorithm is implemented on FPGA hardware that provides the scalable design with different key sizes, and its integration enhances the grid hardware security and switching. It has been reported by similar state-of-the-art approaches, that the algorithm was limited in software, not implemented in a hardware chip. The main finding of the research work is that the design predicts the utilization of hardware parameters such as slices, LUTs, flip-flops, memory, input/output blocks, and timing information for Virtex-5 FPGA synthesis before the chip fabrication. The information is extracted for 8-bit to 128-bit key and grid data with initial parameters. TACIT security chip supports 400 MHz frequency for 128-bit key. The research work is an effort to provide the solution for the industries working towards embedded hardware security for the smart grid, power plants, and nuclear applications.

Hash chain based Group Key Management Mechanism for Smart Grid Environments (스마트그리드 환경에 적용 가능한 해쉬체인 기반의 그룹키 관리 메커니즘)

  • Eun, Sun-Ki;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.149-160
    • /
    • 2011
  • Smart Grid is the next-generation intelligent power grid that maximizes energy efficiency with the convergence of IT technologies and the existing power grid. It enables consumers to check power rates in real time for active power consumption. It also enables suppliers to measure their expected power generation load, which stabilizes the operation of the power system. However, there are high possibility that various kinds of security threats such as data exposure, data theft, and privacy invasion may occur in interactive communication with intelligent devices. Therefore, to establish a secure environment for responding to such security threat with the smart grid, the key management technique, which is the core of the development of a security mechanism, is required. Using a hash chain, this paper suggests a group key management mechanism that is efficiently applicable to the smart grid environment with its hierarchical structure, and analyzes the security and efficiency of the suggested group key management mechanism.

Comparison of Home Automation System Using IPV-4 and IPV-6 Based On Mitigate Reconnaissance Attacks

  • Ali, Muhammad Shujat;Siddiq, Imran;Faisal, Abdullah;Awan, Muhammad Zubair
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.341-347
    • /
    • 2022
  • This research is designed to help and offer hold up to complete the requirements of aged and disable in a home. The control approach and the tone approach are used to manage the house appliances. The major organize system implementation in technology of wireless to offer distant contact from a phone Internet Protocol connectivity for access and calculating strategy and appliance remotely. The planned system no need a committed server PC with value of parallel systems and offers a new communication-protocol to observe and control a house environment with more than just the switch functionality. To express the possibility and efficiency of this system, devices like as lights switches, power plugs, and motion-sensors have been included with the planned home control system and supply more security manage on the control with low electrical energy activate method. The rank of switches is corresponding in all this control system whereby all user interfaces indicate the real time existing status. This system planned to manage electrical-appliances and devices in house with reasonably low cost of design, user friendly interface, easily install and provide high security. Research community generally specified that the network "Reconnaissance Attacks" in IPv6 are usually impossible due to they will take huge challenge to carry out address scanning of 264 hosts in an IPv6 subnet."It being deployed of IPv6 shows that it definitely enhances security and undermines the probability". This research of the IPv6 addressing-strategies at present utilizes and planned a new strategy and move toward to "mitigate reconnaissance attacks".

A Basic Study on the Development of Oily Sludge Treatment System by Ultrasonic Waves (초음파 오일 스러지 처리 시스템 개발을 위한 기초 연구)

  • 이은방
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.6 no.1
    • /
    • pp.57-67
    • /
    • 2000
  • All crude oil carries a little of water, sand, and mineral sediment molecules tightly bounded with hydrocarbons. The result is the gradual precipitation of these heavier elements into thick, granular petroleum by products known as crude oil sludge. The oily sludges in ship tanks and in storage facilities have to be treated efficiently in order to keep the security and the capacity of storage facilities, to protect a serious environmental pollution, and to retrieve lost resource. The oily sludge treatment system should be designed to satisfy requirements mentioned in safe work condition. As a basic study, in this paper, an oily sludge treatment system by ultrasonic waves was proposed. Then, the features of ultrasonic energy and recovery of sludge with ultrasonic waves are investigated by experiments. As results, we found that ultrasonic waves are a new energy to flow oil sludge environment-friendly in safe work condition. In addition, it was shown that ultrasonic energy is more efficient than thermal energy in treating oil sludge, and that the volume of wastes for disposal is reduced remarkably.

  • PDF

Visions and Technical Challenges of Hydrogen Economy: Power System Viewpoint

  • Won Dong-Jun;Liu Chen-Ching
    • KIEE International Transactions on Power Engineering
    • /
    • v.5A no.4
    • /
    • pp.339-343
    • /
    • 2005
  • Hydrogen, as a future energy source, is thought as an alternative of fossil fuel in view of environment and energy security. Hydrogen has the properties of both fuel and electricity so that it can make the energy paradigm shift in the future. Therefore, researches on hydrogen in power system area are essential and urgent due to their huge effects on current paradigm. In this paper, the visions and technical challenges of hydrogen in power system are reviewed as energy storage, dispersed generation (DG), DC generator, and combined heat and power (CHP).

Power System Concerns in Hydrogen Economy (수소경제하에서의 전력시스템)

  • Won, Dong-Jun;Liu, Chen-Ching;Moon, Seung-Il
    • Proceedings of the KIEE Conference
    • /
    • 2005.07a
    • /
    • pp.486-488
    • /
    • 2005
  • Hydrogen, as a future energy source, can be a good alternative of fossil fuel in view of environment and energy security. Hydrogen can be both fuel and electricity so that it will greatly change energy paradigm. Therefore, researches on hydrogen in power system area are essential and urgent due to their huge effects. In this paper, the importances and meanings of hydrogen in power system are reviewed as energy storage, DC generator, dispersed generation (DG), and combined heat and power (CHP). Technical challenges in hydrogen economy are also listed.

  • PDF

A Fundamental Study of Optimization to Control on Height of Roller Shade in Office Building through Mock-up Experiment (Mock-up 실험을 통한 사무소 건축물의 Roller Shade 높이 제어 최적화에 관한 기초적 연구)

  • Lim, Ji-Sun;Kim, Yu-Sin;Choi, An-Seop;Lee, Jeong-Ho
    • 한국태양에너지학회:학술대회논문집
    • /
    • 2008.04a
    • /
    • pp.148-153
    • /
    • 2008
  • An inflow of daylight to the room offers comfortable view environment, psychological and physical security to people in the room and there are merits such as a work efficiency and energy saving. But, it has many problems as an excessive direct sunlight, cooling and heating. We can expect to have energy saving effect for illumination with comfortable view environment creation through control on height of roller shade. This study will be a used a fundamental approach to control on height of roller shade to changing daylight.

  • PDF