Authentication Method for Privacy Protection in Smart Grid Environment

Other literature type, Article English OPEN
Cho, Do-Eun ; Yeo, Sang-Soo ; Kim, Si-Jung (2014)
  • Publisher: Hindawi Publishing Corporation
  • Journal: (issn: 1110-757X, eissn: 1687-0042)
  • Related identifiers: doi: 10.1155/2014/280978
  • Subject: Mathematics | QA1-939 | Article Subject

Recently, the interest in green energy is increasing as a means to resolve problems including the exhaustion of the energy source and, effective management of energy through the convergence of various fields. Therefore, the projects of smart grid which is called intelligent electrical grid for the accomplishment of low carbon green growth are being carried out in a rush. However, as the IT is centered upon the electrical grid, the shortage of IT also appears in smart grid and the complexity of convergence is aggravating the problem. Also, various personal information and payment information within the smart grid are gradually becoming big data and target for external invasion and attack; thus, there is increase in concerns for this matter. The purpose of this study is to analyze the security vulnerabilities and security requirement within smart grid and the authentication and access control method for privacy protection within home network. Therefore, we propose a secure access authentication and remote control method for user’s home device within home network environment, and we present their security analysis. The proposed access authentication method blocks the unauthorized external access and enables secure remote access to home network and its devices with a secure message authentication protocol.
  • References (22)
    22 references, page 1 of 3

    Gunther, E. W., Snyder, A., Gilchrist, G., Highfill, D. R.. Smart Grid Standards Assessment and Recommendations for Adoption and Development (Draft v0. 82).

    U.S. Department of Commerce, null. NIST Framework and Roadmap for Smart Grid Interoperability Standards Release 1. 0 (Draft).

    Yeo, S.-S., Kang, D.-J., Park, J. H.. Intelligent decision-making system with green pervasive computing for renewable energy business in electricity markets on smart grid. Eurasip Journal on Wireless Communications and Networking. 2009; 2009

    Geun-Young, K., Young-Myoung, K.. Implemen-tation of Telco Home Network-based AMI. Journal of the Korean Institute of Information Scientists and Engineers. 2009; 27 (11): 93-97

    Wang, D.-S., Li, J.-P.. A novel mutual authentication scheme based on fingerprint biometric and nonce using smart cards. International Journal of Security and Its Applications. 2011; 5 (4): 1-12

    Jin-Bum, H., Jong-Wook, H.. A security model for home networks with authority delegation. : 360-369

    Sun, S., Yan, Z., Zambreno, J.. Demonstrable differential power analysis attacks on real-world FPGA-based embedded systems. Integrated Computer-Aided Engineering. 2009; 16 (2): 119-130

    Cho, D.-E., Koh, B.-S., Yeo, S.-S.. Secure D-CAS system for digital contents downloading services. Journal of Supercomputing. 2011; 64 (26): 477-491

    Pham, T. A. L., Le-Thanh, N., Sander, P.. Decomposition-based reasoning for large knowledge bases in description logics. Integrated Computer-Aided Engineering. 2008; 15 (1): 53-70

    Tao, X., Li, Y., Nayak, R.. A knowledge retrieval model using ontology mining and user profiling. Integrated Computer-Aided Engineering. 2008; 15 (4): 313-329

  • Related Research Results (1)
  • Bioentities (1)
    3gpp Protein Data Bank
  • Metrics
    No metrics available
Share - Bookmark