LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Cho, Do-Eun; Yeo, Sang-Soo; Kim, Si-Jung (2014)
Publisher: Hindawi Publishing Corporation
Journal: Journal of Applied Mathematics
Languages: English
Types: Article
Subjects: Mathematics, QA1-939, Article Subject
Recently, the interest in green energy is increasing as a means to resolve problems including the exhaustion of the energy source and, effective management of energy through the convergence of various fields. Therefore, the projects of smart grid which is called intelligent electrical grid for the accomplishment of low carbon green growth are being carried out in a rush. However, as the IT is centered upon the electrical grid, the shortage of IT also appears in smart grid and the complexity of convergence is aggravating the problem. Also, various personal information and payment information within the smart grid are gradually becoming big data and target for external invasion and attack; thus, there is increase in concerns for this matter. The purpose of this study is to analyze the security vulnerabilities and security requirement within smart grid and the authentication and access control method for privacy protection within home network. Therefore, we propose a secure access authentication and remote control method for user’s home device within home network environment, and we present their security analysis. The proposed access authentication method blocks the unauthorized external access and enables secure remote access to home network and its devices with a secure message authentication protocol.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • Gunther, E. W., Snyder, A., Gilchrist, G., Highfill, D. R.. Smart Grid Standards Assessment and Recommendations for Adoption and Development (Draft v0. 82).
    • U.S. Department of Commerce, null. NIST Framework and Roadmap for Smart Grid Interoperability Standards Release 1. 0 (Draft).
    • Yeo, S.-S., Kang, D.-J., Park, J. H.. Intelligent decision-making system with green pervasive computing for renewable energy business in electricity markets on smart grid. Eurasip Journal on Wireless Communications and Networking. 2009; 2009
    • Geun-Young, K., Young-Myoung, K.. Implemen-tation of Telco Home Network-based AMI. Journal of the Korean Institute of Information Scientists and Engineers. 2009; 27 (11): 93-97
    • Wang, D.-S., Li, J.-P.. A novel mutual authentication scheme based on fingerprint biometric and nonce using smart cards. International Journal of Security and Its Applications. 2011; 5 (4): 1-12
    • Jin-Bum, H., Jong-Wook, H.. A security model for home networks with authority delegation. : 360-369
    • Sun, S., Yan, Z., Zambreno, J.. Demonstrable differential power analysis attacks on real-world FPGA-based embedded systems. Integrated Computer-Aided Engineering. 2009; 16 (2): 119-130
    • Cho, D.-E., Koh, B.-S., Yeo, S.-S.. Secure D-CAS system for digital contents downloading services. Journal of Supercomputing. 2011; 64 (26): 477-491
    • Pham, T. A. L., Le-Thanh, N., Sander, P.. Decomposition-based reasoning for large knowledge bases in description logics. Integrated Computer-Aided Engineering. 2008; 15 (1): 53-70
    • Tao, X., Li, Y., Nayak, R.. A knowledge retrieval model using ontology mining and user profiling. Integrated Computer-Aided Engineering. 2008; 15 (4): 313-329
    • Chen, Q., Zhang, S., Chen, Y.-P. P.. Rule-based dependency models for security protocol analysis. Integrated Computer-Aided Engineering. 2008; 15 (4): 369-380
    • Ko, H., Marreiros, G., Morais, H., Vale, Z., Ramos, C.. Intelligent supervisory control system for home devices using a cyber physical approach. Integrated Computer-Aided Engineering. 2012; 19 (1): 67-79
    • Kim, S.-C., Yeo, S.-S., Kim, S. K.. A hybrid user authentication protocol for mobile IPTV service. Multimedia Tools and Applications. 2011: 1-14
    • Sánchez, A., Nunes, E. O., Conci, A.. Using adaptive background subtraction into a multi-level model for traffic surveillance. Integrated Computer-Aided Engineering. 2012; 19 (3): 239-256
    • Tan, L., Xu, S.. A model-checking-based approach to risk analysis in supply chain consolidations. Integrated Computer-Aided Engineering. 2009; 16 (3): 243-257
    • Kim, J., Jeon, H., Lee, J.. Network management framework and lifetime evaluation method for wireless sensor networks. Integrated Computer-Aided Engineering. 2012; 19 (2): 165-178
    • Cho, D.-E., Kim, S.-J.. Study on safe remote control method of home device under environment of smart grid. Lecture Notes in Electrical Engineering. 2012; 179 (2): 281-286
    • Banković, Z., Moya, J. M., Araujo, Á., Fraga, D., Vallejo, J. C., de Goyeneche, J.-M.. Distributed intrusion detection system for wireless sensor networks based on a reputation system coupled with kernel self-organizing maps. Integrated Computer-Aided Engineering. 2010; 17 (2): 87-102
    • Cho, D.-E., Shin, H.-J., Kim, S.-J.. The personal information protection technique in smart grid environment. Information B. 2013; 16 (3): 2179-2184
    • NIST, null. Smart Grid Cyber Security Strategy and Requirements.
    • McDaniel, P., McLaughlin, S.. Security and privacy challenges in the smart grid. IEEE Security and Privacy. 2009; 7 (3): 75-77
  • Inferred research data

    The results below are discovered through our pilot algorithms. Let us know how we are doing!

    Title Trust
    43
    43%
  • No similar publications.
  • BioEntity Site Name
    3gppProtein Data Bank

Share - Bookmark

Cite this article