Earticle

현재 위치 Home

International Journal of Security and Its Applications

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJSIA) [Science & Engineering Research Support Center, Republic of Korea(IJSIA)]
  • pISSN
    1738-9976
  • 간기
    격월간
  • 수록기간
    2008 ~ 2016
  • 등재여부
    SCOPUS
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.9 No.7 (32건)
No
31

Security Authentication Method of Terminal Trusted Access in Smart Grid

Yufeng Wang, Lie Wu, Yun Yang

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.7 2015.07 pp.337-346

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A security authentication method in smart grid terminal is proposed in this paper. This method layers the terminal authentication system structure of smart grid so as to improve the simplicity and extensibility on system deployment and realize flexible communication mechanism and the interaction mechanism among systems. This paper aims at preventing terminal information from being destroyed and achieving terminal verification integrity. Besides, this kind of authentication method has no special requirements for terminal users.

32

In this paper, we drew new security threats on IoT (Internet of Thing) based smart battlefield environment and proposed countermeasures against them. DoD (Department of Defense) is focusing its attention on the development of unmanned combat systems (UCS) to prepare for future war. The IoT technology provides networking service to connect each other unmanned combat system. But, IoT has the security vulnerabilities of each element of the technology itself because the technology integrates several components to configure a specific service. And new security vulnerabilities will be caused when they are interconnecting. If we fail to defend the security threat that may arise from IoT based smart battlefield environment, we can’t obtain intelligence superiority and furthermore will not be able to assure the victory of the cyber war. In smart battlefield environment applied to IoT, we can draw four main security threats; illegal remote control, information leakage, false information insert, and signal disturbance. And we propose countermeasures in response to these security threats; authentication, access control, intrusion prevention, and cryptography technology.

 
1 2
페이지 저장