Skip to main content

2018 | OriginalPaper | Buchkapitel

Secure Cyber Physical System R&D Project Issue in Korea

verfasst von : Donghyeok Lee, Won-chi Jung, Namje Park

Erschienen in: Frontier Computing

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this secure smart grid R&D project issue in Korea, we aimed to develop the smart grid security technology which is the type of support of security vulnerability analysis through the convergence of IT technology. In addition, through securing such cutting edge technologies as smart meter monitoring, vulnerability analysis modeling, privacy mining, light-type mutual authentication service mechanism, and contents-based approach controls, we are going to pursue our research and development activities to make the core technology suitable for domestic environments, and also plan to have these technologies used by the industries by transferring the technology in a timely manner.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S., Kumar, S., Wehrle, K.: Security challenges in the IP-based Internet of Things. Wirel. Pers. Commun. 61, 527–542 (2011)CrossRef Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S., Kumar, S., Wehrle, K.: Security challenges in the IP-based Internet of Things. Wirel. Pers. Commun. 61, 527–542 (2011)CrossRef
2.
Zurück zum Zitat Park, J., Shin, S., Kang, N.: Mutual authentication and key agreement scheme between lightweight devices in internet of things. J. Korea Inf. Commun. Soc. 38, 707–714 (2013) Park, J., Shin, S., Kang, N.: Mutual authentication and key agreement scheme between lightweight devices in internet of things. J. Korea Inf. Commun. Soc. 38, 707–714 (2013)
3.
Zurück zum Zitat Park, N.: Implementation of terminal middleware platform for mobile RFID computing. Int. J. Ad Hoc Ubiquitous Comput. 8, 205–219 (2011)CrossRef Park, N.: Implementation of terminal middleware platform for mobile RFID computing. Int. J. Ad Hoc Ubiquitous Comput. 8, 205–219 (2011)CrossRef
4.
Zurück zum Zitat Park, N.: Secure data access control scheme using type-based re-encryption in cloud environment. In: Katarzyniak, R. et al. (eds.) Semantic Methods for Knowledge Management and Communication, vol. 381, pp. 319–327. Springer, Berlin (2011)CrossRef Park, N.: Secure data access control scheme using type-based re-encryption in cloud environment. In: Katarzyniak, R. et al. (eds.) Semantic Methods for Knowledge Management and Communication, vol. 381, pp. 319–327. Springer, Berlin (2011)CrossRef
5.
Zurück zum Zitat Park, N.: Security scheme for managing a large quantity of individual information in RFID environment. In: Zhu, R. et al. (eds.) Information Computing and Applications, vol. 106, pp. 72–79. Springer, Berlin (2010) Park, N.: Security scheme for managing a large quantity of individual information in RFID environment. In: Zhu, R. et al. (eds.) Information Computing and Applications, vol. 106, pp. 72–79. Springer, Berlin (2010)
6.
Zurück zum Zitat Park, N.: Mobile RFID/NFC linkage based on UHF/HF dual band’s integration in U-sensor network era. In: Park, J.H. et al. (eds.) Information Technology Convergence, Secure and Trust Computing, and Data Management, vol. 180, pp. 265–271. Springer, Berlin (2012) Park, N.: Mobile RFID/NFC linkage based on UHF/HF dual band’s integration in U-sensor network era. In: Park, J.H. et al. (eds.) Information Technology Convergence, Secure and Trust Computing, and Data Management, vol. 180, pp. 265–271. Springer, Berlin (2012)
7.
Zurück zum Zitat Park, N., Ko, Y.: Computer education’s teaching-learning methods using educational programming language based on STEAM education. In: Park, J. et al. (eds.) Network and Parallel Computing, vol. 7513, pp. 320–327. Springer, Berlin (2012) Park, N., Ko, Y.: Computer education’s teaching-learning methods using educational programming language based on STEAM education. In: Park, J. et al. (eds.) Network and Parallel Computing, vol. 7513, pp. 320–327. Springer, Berlin (2012)
8.
Zurück zum Zitat Park, N., Cho, S.; Kim, B., Lee, B., Won, D.: Security enhancement of user authentication scheme using IVEF in vessel traffic service system. In: Yeo, S. et al. (eds.) Computer Science and Its Applications, vol. 203, pp. 699–705. Springer, Berlin (2012)CrossRef Park, N., Cho, S.; Kim, B., Lee, B., Won, D.: Security enhancement of user authentication scheme using IVEF in vessel traffic service system. In: Yeo, S. et al. (eds.) Computer Science and Its Applications, vol. 203, pp. 699–705. Springer, Berlin (2012)CrossRef
9.
Zurück zum Zitat Kim, K., Kim, B., Lee, B., Park, N.: Design and implementation of IVEF protocol using wireless communication on android mobile platform. In: Kim, T., et al. (eds.) Computer Applications for Security, Control and System Engineering, vol. 339, pp. 94–100. Springer, Berlin (2012) Kim, K., Kim, B., Lee, B., Park, N.: Design and implementation of IVEF protocol using wireless communication on android mobile platform. In: Kim, T., et al. (eds.) Computer Applications for Security, Control and System Engineering, vol. 339, pp. 94–100. Springer, Berlin (2012)
10.
Zurück zum Zitat Kim, G., Park, N.: Program development of science and culture education tapping into Jeju’s special characteristics for adults. In: Kim, T., et al. (eds.) Computer Applications for Security, Control and System Engineering. CCIS, vol. 339. Springer, Berlin, Heidelberg (2012) Kim, G., Park, N.: Program development of science and culture education tapping into Jeju’s special characteristics for adults. In: Kim, T., et al. (eds.) Computer Applications for Security, Control and System Engineering. CCIS, vol. 339. Springer, Berlin, Heidelberg (2012)
11.
Zurück zum Zitat Park, N., Kim, M.: Implementation of load management application system using smart grid privacy policy in energy management service environment. Clust. Comput. 17, 653–664 (2014)CrossRef Park, N., Kim, M.: Implementation of load management application system using smart grid privacy policy in energy management service environment. Clust. Comput. 17, 653–664 (2014)CrossRef
12.
Zurück zum Zitat Sultan, U., Zheng, X.: TCLOUD: a trusted storage architecture for cloud computting. Int. J. Adv. Sci. Technol. 63, 65–72 (2014)CrossRef Sultan, U., Zheng, X.: TCLOUD: a trusted storage architecture for cloud computting. Int. J. Adv. Sci. Technol. 63, 65–72 (2014)CrossRef
13.
Zurück zum Zitat Kim, N., Jing, C., Zhou, B., Kim, Y.: Smart parking information system exploiting visible light communication. Int. J. Smart Home 8, 251–260 (2014)CrossRef Kim, N., Jing, C., Zhou, B., Kim, Y.: Smart parking information system exploiting visible light communication. Int. J. Smart Home 8, 251–260 (2014)CrossRef
14.
Zurück zum Zitat Park, N.: Implementation of privacy policy-based protection system in BEMS based smart grid service. Int. J. Smart Home 7, 91–100 (2013)CrossRef Park, N.: Implementation of privacy policy-based protection system in BEMS based smart grid service. Int. J. Smart Home 7, 91–100 (2013)CrossRef
15.
Zurück zum Zitat Kim, J., Park, D.-H., Bang, H.-C., Park, N.: Development of open service interface’s instructional design model in USN Middleware platform environment. Lect. Notes Electr. Eng. 279, 411–416 (2014)CrossRef Kim, J., Park, D.-H., Bang, H.-C., Park, N.: Development of open service interface’s instructional design model in USN Middleware platform environment. Lect. Notes Electr. Eng. 279, 411–416 (2014)CrossRef
16.
Zurück zum Zitat Park, N., Park, J., Kim, H.J.: Hash-based authentication and session key agreement scheme in Internet of Things environment. Adv. Sci. Technol. Lett. 62, 9–12 (2014) Park, N., Park, J., Kim, H.J.: Hash-based authentication and session key agreement scheme in Internet of Things environment. Adv. Sci. Technol. Lett. 62, 9–12 (2014)
17.
Zurück zum Zitat Park, J., Kang, N.: Entity authentication scheme for secure WEB of Things applications. J. KICS 38, 394–400 (2013)CrossRef Park, J., Kang, N.: Entity authentication scheme for secure WEB of Things applications. J. KICS 38, 394–400 (2013)CrossRef
18.
Zurück zum Zitat Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI mobile platform with secure service for mobile RFID network environment. In: Shen, H.T.et al. (eds.) Proceedings of the APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748, Harbin, China, 16–18 January 2006. Springer, Heidelberg (2006) Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI mobile platform with secure service for mobile RFID network environment. In: Shen, H.T.et al. (eds.) Proceedings of the APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748, Harbin, China, 16–18 January 2006. Springer, Heidelberg (2006)
19.
Zurück zum Zitat Park, N.: Customized healthcare infrastructure using privacy weight level based on smart device. Commun. Comput. Inf. Sci. 206, 467–474 (2011) Park, N.: Customized healthcare infrastructure using privacy weight level based on smart device. Commun. Comput. Inf. Sci. 206, 467–474 (2011)
20.
Zurück zum Zitat Park, N.: The implementation of open embedded S/W platform for secure mobile RFID reader. J. Korea Inf. Commun. Soc. 35, 785–793 (2010) Park, N.: The implementation of open embedded S/W platform for secure mobile RFID reader. J. Korea Inf. Commun. Soc. 35, 785–793 (2010)
21.
Zurück zum Zitat Park, N., Bang, H.-C.: Mobile middleware platform for secure vessel traffic system in IoT service environment. Secur. Commun. Netw. 9(6), 451–582 (2014) Park, N., Bang, H.-C.: Mobile middleware platform for secure vessel traffic system in IoT service environment. Secur. Commun. Netw. 9(6), 451–582 (2014)
22.
Zurück zum Zitat Zhou, L., Chao, H.-C.: Multimedia traffic security architecture for the internet of things. IEEE Netw. 25, 35–40 (2011)CrossRef Zhou, L., Chao, H.-C.: Multimedia traffic security architecture for the internet of things. IEEE Netw. 25, 35–40 (2011)CrossRef
23.
Zurück zum Zitat Susanto, H., Muhaya, F.: Multimedia information security architecture framework. In: Proceedings of the 2010 5th International Conference on Future Information Technology, FutureTech 2010, Busan, Korea, 21–23 May 2010 Susanto, H., Muhaya, F.: Multimedia information security architecture framework. In: Proceedings of the 2010 5th International Conference on Future Information Technology, FutureTech 2010, Busan, Korea, 21–23 May 2010
24.
Zurück zum Zitat Zhou, L., Wang, X., Tu, W., Muntean, G., Geller, B.: Distributed scheduling scheme for video streaming over multi-channel multi-radio multi-hop wireless networks. IEEE J. Sel. Areas Commun. 28, 409–419 (2010)CrossRef Zhou, L., Wang, X., Tu, W., Muntean, G., Geller, B.: Distributed scheduling scheme for video streaming over multi-channel multi-radio multi-hop wireless networks. IEEE J. Sel. Areas Commun. 28, 409–419 (2010)CrossRef
25.
Zurück zum Zitat Wu, D., Cai, Y., Zhou, L., Wang, J.: A cooperative communication scheme based on dynamic coalition formation game in clustered wireless sensor networks. IEEE Trans. Wirel. Commun. 11, 1190–1200 (2012)CrossRef Wu, D., Cai, Y., Zhou, L., Wang, J.: A cooperative communication scheme based on dynamic coalition formation game in clustered wireless sensor networks. IEEE Trans. Wirel. Commun. 11, 1190–1200 (2012)CrossRef
Metadaten
Titel
Secure Cyber Physical System R&D Project Issue in Korea
verfasst von
Donghyeok Lee
Won-chi Jung
Namje Park
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7398-4_13

Premium Partner