• 제목/요약/키워드: energy security

검색결과 912건 처리시간 0.022초

EERA: ENHANCED EFFICIENT ROUTING ALGORITHM FOR MOBILE SENSOR NETWORK

  • Hemalatha, S;Raj, E.George Dharma Prakash
    • International Journal of Computer Science & Network Security
    • /
    • 제22권9호
    • /
    • pp.389-395
    • /
    • 2022
  • A Mobile Sensor Network is widely used in real time applications. A critical need in Mobile Sensor Network is to achieve energy efficiency during routing as the sensor nodes have scarce energy resource. The nodes' mobility in MWSN poses a challenge to design an energy efficient routing protocol. Clustering helps to achieve energy efficiency by reducing the organization complexity overhead of the network which is proportional to the number of nodes in the network. This paper proposes"EERA: Energy Efficient Routing Algorithm for Mobile Sensor Network" is divided into five phases. 1, Cluster Formation 2.Cluster head and Transmission head selection 3.Path Establishment / Route discovery and 4,Data Transmission. Experimental Analysis has been done and is found that the proposed method performs better than the existing method with respect to four parameters.

Processes of Outflow of the Boiling Steam-Water Mixture in the Widening Part of Hydro-Steam Turbine Nozzles

  • Leonid, Serejkin;Boris, Shifrin;Victor, Perov;Alexandr, Goldin
    • International Journal of Computer Science & Network Security
    • /
    • 제22권12호
    • /
    • pp.178-184
    • /
    • 2022
  • Renewable energy sources based on solar radiation, wind energy, geothermal energy, and biomass energy have now reached the level of industrial application. A new way to generate electricity using low-potential heat is to install a hydro-steam turbine. In hydro-steam turbines, hot water is supplied directly to turbine rotor nozzles without prior separation into steam and water in separators, which significantly increases the efficiency of hot water energy use. Such turbines are suggested to be used as autonomous energy sources in geothermal heating systems, heating water boilers and cooling systems of chemical reactors, metallurgical furnaces, etc. The authors conclude that the installation of hydro-steam turbines in heating plants and process boiler plants can also be effective if the used exhaust steam-water mixture at the turbine outlet is used to heat the network water or as return water.

SNS 빅데이터 분석을 통한 재생에너지 동향 및 관계구조 (Renewable energy trends and relationship structure by SNS big data analysis)

  • 김종민
    • 융합보안논문지
    • /
    • 제22권1호
    • /
    • pp.55-60
    • /
    • 2022
  • 본 연구는 재생에너지와 관련된 에너지 분야의 동향과 관계구조를 분석하는 것이다. 이를 위해 본 연구에서는 SNS Data를 포한한 Big Data를 중점으로 분석하였다. SNS는 Instragram 플랫폼을 활용하여 재생에너지 해시태그들을 수집하였으며, 빅데이터 분석, 소셜네트워크 분석을 위한 워드임베딩 방법으로 사용하였고, 본 연구에서 도출된 결과를 토대로 재생에너지 산업의 발전에 활용할 수 있을 것으로 기대된다.

The Development of an Intelligent Home Energy Management System Integrated with a Vehicle-to-Home Unit using a Reinforcement Learning Approach

  • Ohoud Almughram;Sami Ben Slama;Bassam Zafar
    • International Journal of Computer Science & Network Security
    • /
    • 제24권4호
    • /
    • pp.87-106
    • /
    • 2024
  • Vehicle-to-Home (V2H) and Home Centralized Photovoltaic (HCPV) systems can address various energy storage issues and enhance demand response programs. Renewable energy, such as solar energy and wind turbines, address the energy gap. However, no energy management system is currently available to regulate the uncertainty of renewable energy sources, electric vehicles, and appliance consumption within a smart microgrid. Therefore, this study investigated the impact of solar photovoltaic (PV) panels, electric vehicles, and Micro-Grid (MG) storage on maximum solar radiation hours. Several Deep Learning (DL) algorithms were applied to account for the uncertainty. Moreover, a Reinforcement Learning HCPV (RL-HCPV) algorithm was created for efficient real-time energy scheduling decisions. The proposed algorithm managed the energy demand between PV solar energy generation and vehicle energy storage. RL-HCPV was modeled according to several constraints to meet household electricity demands in sunny and cloudy weather. Simulations demonstrated how the proposed RL-HCPV system could efficiently handle the demand response and how V2H can help to smooth the appliance load profile and reduce power consumption costs with sustainable power generation. The results demonstrated the advantages of utilizing RL and V2H as potential storage technology for smart buildings.

Geometric structure and electronic behavior of Rh decorating effect on zigzag CNTs (n=7-12): A DFT study

  • Cui, Hao;Zhang, Xiaoxing;Zhou, Yongjian;Zhang, Jun
    • Carbon letters
    • /
    • 제26권
    • /
    • pp.61-65
    • /
    • 2018
  • Comprehensive calculations of the Rh decoration effect on zigzag CNTs with n ranging from 7 to 12 were conducted in this work to understand the effect of Rh doping on geometric structures and electronic behaviors upon metallic and semiconducting CNTs. The obtained results indicated that Rh dopant not only contributes to the deformation of C-C bonds on the sidewall of CNTs, but also transforms the electron distribution of related complexes, thereby leading to a remarkable increase of the conductivity of pure CNTs given the emerged novel state within the energy gap for metallic CNTs and the narrowed energy gap for semiconducting CNTs. Our calculations will be meaningful for exploiting novel CNT-based materials with better sensitivity to electrons and higher electrical conductivity compared with pure CNTs.

Secure and Energy-Efficient Join-Leave Operations in ZigBee Network

  • Kim, Bong-Whan;Park, Chang-Seop
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권11호
    • /
    • pp.2874-2892
    • /
    • 2013
  • Since security plays an important role in several ZigBee applications, such as Smart Energy and medical sensor applications, ZigBee Specification includes various security mechanisms to protect ZigBee frames and infrastructure. Among them, the Join and Leave operations of ZigBee are investigated in this paper. The current Join-Leave operation is protected by the network key (a kind of group key). We claim it is not adequate to employ the network key for such purpose, and propose a new Join-Leave operation protected by the application link key (a kind of pairwise key), which is based on a more efficient key management scheme than that of ZigBee. Hence, the original Join operation consists of a total of 12 command frames, while the new Join operation consists of only 6 command frames. In particular, the security of the proposed Join-Leave operation is equivalent to or better than that of the original Join-Leave operation. The new Join-Leave operation is extensively analyzed in terms of security and efficiency, and compared with the original Join-Leave operation of ZigBee.

무선 환경에서 SSL/TLS를 사용하는 IoT의 에너지 효율성 향상을 위한 기법 (A Method to Improve Energy Efficiency for IoT Using SSL/TLS on Wireless Network)

  • 정진희;조대호
    • 정보보호학회논문지
    • /
    • 제26권3호
    • /
    • pp.661-666
    • /
    • 2016
  • 사물인터넷은 다양한 기기들이 서로 연결되어 효율적인 에너지 소모와 높은 보안을 유지하기 위해 경량의 메시징 프로토콜인 MQTT와 암호화 프로토콜인 SSL/TLS를 사용한다. SSL/TLS의 cipher suite 협상 단계에서 기기에 고정된 cipher suites로부터 선호도가 가장 높은 cipher suite를 선택한다. 선택된 cipher suite는 해당 통신 중에 필수적으로 제공받아야 하는 무결성, 기밀성을 제공하지만 필요 이상으로 높은 강도의 보안성을 제공할 수 있다. 이러한 한계는 에너지를 필요 이상으로 소비하게 만들 수 있으므로 본 논문에서는 SSL/TLS를 사용한 기기들의 에너지 효율성을 향상시키는 퍼지 기반 cipher suite 결정 기법을 제안한다. 실험을 통해 제안 기법은 기존 기법보다 에너지 효율성이 평균 36.03% 향상되었다.

계약망 프로토콜과 DEVS 모델링을 통한 센서네트워크 보안 모델의 설계 (Design of Sensor Network Security Model using Contract Net Protocol and DEVS Modeling)

  • 허수만;서희석
    • 디지털산업정보학회논문지
    • /
    • 제4권4호
    • /
    • pp.41-49
    • /
    • 2008
  • Sensor networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection attacks in which an adversary injects forged reports into the network through compromised nodes. Such attacks by compromised sensors can cause not only false alarms but also the depletion of the finite amount of energy in a battery powered network. In order to reduce damage from these attacks, several security solutions have been proposed. Researchers have also proposed some techniques to increase the energy-efficiency of such security solutions. In this paper, we propose a CH(Cluster Header) selection algorithm to choose low power delivery method in sensor networks. The CNP(Contract Net Protocol), which is an approach to solve distribution problems, is applied to choose CHs for event sensing. As a result of employing CNP, the proposed method can prevent dropping of sensing reports with an insufficient number of message authentication codes during the forwarding process, and is efficient in terms of energy saving.

An Adaptive Key Redistribution Method for Filtering-based Wireless Sensor Networks

  • Kim, Jin Myoung;Lee, Hae Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권6호
    • /
    • pp.2518-2533
    • /
    • 2020
  • In wireless sensor networks, adversaries may physically capture sensor nodes on the fields, and use them to launch false positive attacks (FPAs). FPAs could be conducted by injecting forged or old sensing reports, which would represent non-existent events on the fields, with the goal of disorientating the base stations and/or reducing the limited energy resources of sensor nodes on the fields. Researchers have proposed various mitigation methods against FPAs, including the statistical en-route filtering scheme (SEF). Most of these methods are based on key pre-distribution schemes and can efficiently filter injected false reports out at relay nodes through the verification of in-transit reports using the pre-distributed keys. However, their filtering power may decrease as time goes by since adversaries would attempt to capture additional nodes as many as possible. In this paper, we propose an adaptive key distribution method that could maintain the security power of SEF in WSNs under such circumstances. The proposed method makes, if necessary, BS update or re-distribute keys, which are used to endorse and verify reports, with the consideration of the filtering power and energy efficiency. Our experimental results show that the proposed method is more effective, compared to SEF, against FPAs in terms of security level and energy saving.

Impacts of Wind Power Integration on Generation Dispatch in Power Systems

  • Lyu, Jae-Kun;Heo, Jae-Haeng;Kim, Mun-Kyeom;Park, Jong-Keun
    • Journal of Electrical Engineering and Technology
    • /
    • 제8권3호
    • /
    • pp.453-463
    • /
    • 2013
  • The probabilistic nature of renewable energy, especially wind energy, increases the needs for new forms of planning and operating with electrical power. This paper presents a novel approach for determining the short-term generation schedule for optimal operations of wind energy-integrated power systems. The proposed probabilistic security-constrained optimal power flow (P-SCOPF) considers dispatch, network, and security constraints in pre- and post-contingency states. The method considers two sources of uncertainty: power demand and wind speed. The power demand is assumed to follow a normal distribution, while the correlated wind speed is modeled by the Weibull distribution. A Monte Carlo simulation is used to choose input variables of power demand and wind speed from their probability distribution functions. Then, P-SCOPF can be applied to the input variables. This approach was tested on a modified IEEE 30-bus system with two wind farms. The results show that the proposed approach provides information on power system economics, security, and environmental parameters to enable better decision-making by system operators.