• 제목/요약/키워드: energy security

검색결과 916건 처리시간 0.024초

Optimizing Network Lifetime of RPL Based IOT Networks Using Neural Network Based Cuckoo Search Algorithm

  • Prakash, P. Jaya;Lalitha, B.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.255-261
    • /
    • 2022
  • Routing Protocol for Low-Power and Lossy Networks (RPLs) in Internet of Things (IoT) is currently one of the most popular wireless technologies for sensor communication. RPLs are typically designed for specialized applications, such as monitoring or tracking, in either indoor or outdoor conditions, where battery capacity is a major concern. Several routing techniques have been proposed in recent years to address this issue. Nevertheless, the expansion of the network lifetime in consideration of the sensors' capacities remains an outstanding question. In this research, aANN-CUCKOO based optimization technique is applied to obtain a more efficient and dependable energy efficient solution in IOT-RPL. The proposed method uses time constraints to minimise the distance between source and sink with the objective of a low-cost path. By considering the mobility of the nodes, the technique outperformed with an efficiency of 98% compared with other methods. MATLAB software is used to simulate the proposed model.

A Comparative Analysis on Performance of Wireless Sensor Networks Routing Protocols

  • KRISHNA, KONDA. HARI;NAGPAL, TAPSI;BABU, Y. SURESH
    • International Journal of Computer Science & Network Security
    • /
    • 제22권7호
    • /
    • pp.240-244
    • /
    • 2022
  • The common goals of designing a routing algorithm are not only to reduce control packet overhead, maximize throughput and minimize the end-to-end delay, but also take into consideration the energy consumption. Scalability is an important factor in designing an efficient routing protocol for wireless sensor networks (WSN's). Three metrics (power consumption, time of transmission and packet loss rate) are used in order to compare three routing protocols which are AODV, DSDV and LEACH.

A Cooperative Multiagent System for Enhancing Smart Grid Performance

  • Mohammad A Obeidat
    • International Journal of Computer Science & Network Security
    • /
    • 제23권2호
    • /
    • pp.164-172
    • /
    • 2023
  • Sharing power data between electrical power grids is crucial in energy management. The multi-agent approach has been applied in various applications to improve the development of complex systems by making them both independent and collaborative. The smart grid is one of the most intricate systems that requires a higher level of independence, reliability, protection, and adaptability to user requests. In this paper, a multi-agent system is utilized to share knowledge and tackle challenges in smart grids. The shared information is used to make decisions that aid in power distribution management within the grid and with other networks. The proposed multi-agent mechanism improves the reliability of the power system by providing the necessary information at critical times. The results indicate that the multi-agent system operates efficiently and promptly, making it a highly promising candidate for smart grid management.

신재생에너지 인력양성의 인적자본 축적 효과 (The Human Capital Accumulation Effect of New and Renewable Energy Human Resource Development Programs)

  • 이유아;김진수;허은녕
    • 신재생에너지
    • /
    • 제5권3호
    • /
    • pp.49-55
    • /
    • 2009
  • Human resource for the new and renewable energy technology is an important factor in the respect of the sustainable growth and energy security. In this paper, we focused on measuring the economic effect of human resource development on new and renewable energy development programs. The human capital accumulation model developed by Mincer (1974) was modified in terms of the rate of the researchers' investment in human capital. As a result of a empirical case study, the value of human capital was estimated by 102 million Korean won per year worth 18% of the project labor cost. In case of the assumption of 100% participation of researchers, the level of human capital accumulation increased to 914 million Korean won per year. These results imply that the new and renewable energy development programs has been successful, on the concept of learning by doing, in terms of providing the researchers with opportunities to accumulate human capital.

  • PDF

센서 네트워크 보안을 위한 정적인 보안 메카니즘에 대한 분석 (Analyses of Dynamic Crypto Mechanism in Sensor Network Security)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2010년도 추계학술대회
    • /
    • pp.514-515
    • /
    • 2010
  • Security has become a major concern for many real world applications for wireless sensor networks. Usually, all these approaches are based on well known cryptographic algorithms. At the same time, performance analyses have shown that the applicability of sensor networks strongly depends on effective routing sessions or energy aware wireless communication. Based on our experiments, we provide some analyses and considerations on practical feasibility of such cryptographic algorithms in sensor networks.

  • PDF

무선 센서 네트워크망에서의 효율적인 키 관리 프로토콜 분석 (Analyses of Key Management Protocol for Wireless Sensor Networks in Wireless Sensor Networks)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2005년도 추계종합학술대회
    • /
    • pp.799-802
    • /
    • 2005
  • In this paper, we analyses of Key Management Protocol for Wireless Sensor Networks in Wireless Sensor Networks. Wireless sensor networks have a wide spectrum of civil military application that call for security, target surveillance in hostile environments. Typical sensors possess limited computation, energy, and memory resources; therefore the use of vastly resource consuming security mechanism is not possible. In this paper, we propose a cryptography key management protocol, which is based on identity based symmetric keying.

  • PDF

수소에너지의 승용차부문 도입에 따른 CO2 배출 감축 및 비용효과 분석 연구 (An Analysis on CO2 Emission and Cost Effects of Hydrogen Energy in Sedan Sector)

  • 홍종철;강승진;최상진;박상용;김종욱
    • 한국수소및신에너지학회논문집
    • /
    • 제20권1호
    • /
    • pp.9-21
    • /
    • 2009
  • As one of the alternative solution for energy and environmental issues such as climate change, energy security, oil price, etc., hydrogen energy has been getting so much attentions these days. This paper analyzed the $CO_2$ emission, costs, and energy consumptions when the hydrogen energy was introduced to transportation, specifically in Sedan sector using the energy system model, MARKAL. As results, 21.5% of $CO_2$ emission in 2040 could be reduced and additional 76 billion dollars will be needed in the high energy price scenario. The amount of energy saving mainly due to the replacement of existing car to hydrogen vehicle was 16% of the final energy consumption in 2040.

산업용 무선통신기기 사이버 보안위협 및 보안요구사항에 관한 연구 (A Study on Cyber Security Threat and Security Requirements for Industrial Wireless Communication Devices)

  • 이지섭;박경미;김신규
    • 정보보호학회논문지
    • /
    • 제30권4호
    • /
    • pp.757-770
    • /
    • 2020
  • 산업제어시스템(ICS)은 분산된 다양한 자산을 측정, 감시, 제어하는 시스템으로 에너지, 화학, 교통, 수처리, 제조 공장 등의 산업 시설 및 국가기반시설에서 사용된다. 산업제어시스템의 특성상 보안위협에 노출되면 오동작, 중단 등으로 인해 막대한 인명, 자산 피해 등이 발생할 수 있어 산업제어시스템의 보안위협을 예방하고 최소화하기 위한 연구가 필요하다. 기존의 산업제어시스템의 경우 보안위협을 고려하여 무선통신기기의 사용을 제한하였으나 최근에는 유지보수의 용이성 및 비용의 장점으로 인해 산업용 무선통신기기 도입이 점차 증가하고 있다. 이에 본 논문에서는 WirelessHART와 ISA100.11a를 지원하는 산업용 무선통신기기의 보안위협을 분석하고, 분석 결과를 기반으로 산업용 무선통신기기의 도입 및 운영에 필요한 보안요구사항을 제시하였다. 본 연구에서 제시한 보안요구사항을 활용하여 국가기반시설을 포함한 다양한 산업분야의 산업용 무선통신환경 구축 시 보안위협을 완화할 수 있을 것으로 기대한다.

지능형교통시스템의 보안취약점 개선방안에 관한 연구 (A Study on the Improvement of Security Vulnerabilities in Intelligent Transport Systems)

  • 조평현;임종인;김휘강
    • 정보보호학회논문지
    • /
    • 제23권3호
    • /
    • pp.531-543
    • /
    • 2013
  • 에너지 방송 통신 교통 등의 주요 기반시설의 파괴와 침해는 사회 경제적 손실 뿐 아니라 개인의 자유와 권리를 위협하는 결과를 초래할 수 있다. 특히 교통신호제어시설이 침해되었을 경우에는 시민들의 생활 불편 뿐 아니라 교통사고 등 사회 혼란을 유발시킨다. 최근의 제어시스템은 폐쇄망으로 운영하고 있어 안전하다는 생각으로 정보보호시스템이 구축되어 있지 않거나 보안 패치 및 바이러스 백신 업데이트 등이 제대로 이루어지지 않아 보안취약점을 이용한 사이버 공격에 노출되어 있다. 따라서, 사이버 공격 및 침해사고를 방지하기 위해서 지능형교통시스템의 특성을 파악하고 그에 맞는 대응방안을 마련할 필요가 있다. 본 논문에서는 지능형교통시스템에 대한 보안취약요인을 분석하고 보안취약점 개선방안을 제시하고자 한다.