This document summarizes a research paper that proposes a design for a secure, Wi-Fi integrated electricity meter called an Impregnable Device for Secured Metering (IDSM). The IDSM consists of a sophisticated meter with additional security features compared to traditional meters. It uses Wi-Fi communication, a microcontroller, and a centralized monitoring and control unit. Random number addressing cryptography (RAC) is chosen as the most secure encryption technique. The meter in each home connects via a wireless network to a server that calculates billing amounts and sends updates to be displayed on the home meter, reducing labor while increasing transparency. The design aims to provide secure communication at high speeds with an advanced metering system and unique database backend.
This document discusses cyber security in smart grids. It begins with an introduction to smart grids and their reliance on information and communication technologies (ICT). It then discusses three security objectives for smart grids: data availability, confidentiality, and integrity. Several types of cyber attacks on smart grids are described, including denial-of-service attacks, random attacks, and false data injection attacks. The document concludes by evaluating techniques for detecting attacks, such as using chi-square tests and cosine similarity matching to compare expected and measured smart grid data.
Smart Grid security expert & previous hacker Emil Gurevitch explains how hackers can get to your Smart Grid, and how utilities can detect and respond to Smart Metering Cyber-attacks.
Smart grids is an added communication capabilities and intelligence to traditional grids,smart grids are enabled by Intelligent sensors and actuators, Extended data management system,Expanded two way communication between utility operation system facilities and customers,Network security ,National integration ,Self healing and adaptive –Improve distribution and transmission system operation,Allow customers freedom to purchase power based on dynamic pricing ,Improved quality of power-less wastage ,Integration of large variety of generation options.
We have seen the more complex and critical infrastructure the more vulnerable they are. From the Year of 1994 we have seen lots of incidents where SmartGrid were Hacked the latest and booming incident was Stuxnet Worm which targeted Nuclear Power System of Iran and Worldwide.There are different types of Attacks we will see. Security needed for Smart Grid.
Smart Grid Systems Based Survey on Cyber Security IssuesjournalBEEI
The future power system will be an innovative administration of existing power grids, which is called smart grid. Above all, the application of advanced communication and computing tools is going to significantly improve the productivity and consistency of smart grid systems with renewable energy resources. Together with the topographies of the smart grid, cyber security appears as a serious concern since a huge number of automatic devices are linked through communication networks. Cyber attacks on those devices had a direct influence on the reliability of extensive infrastructure of the power system. In this survey, several published works related to smart grid system vulnerabilities, potential intentional attacks, and suggested countermeasures for these threats have been investigated.
Practical analysis of the cybersecurity of European smart gridsSergey Gordeychik
This paper summarizes the experience gained during a series of
practical cybersecurity assessments of various components of Europe’s
smart electrical grids.
This document discusses analytics for assessing cybersecurity risks in smart grids. It identifies several risk management practices for smart grids including the NIST supply chain risk management practice, Department of Energy risk management practice, and compliance with technical standards. It also maps the relationships between smart grid domains, actors, interfaces, and vulnerabilities based on NIST guidelines to identify high-risk areas and inform priority actions. Finally, it shows how risk identification and assessment can be conducted based on analyzing security objectives, impact levels, and relationships between smart grid components defined in NIST guidelines.
- The smart grid extends power systems into homes and businesses, creating new security challenges as critical infrastructure connects to less secure networks.
- We need accurate models of the smart grid that consider both cyber and physical pathways between components in order to understand vulnerabilities and identify security weaknesses across the integrated system.
- A federated approach is needed to both secure the smart grid and model its complex interactions, as the system spans multiple organizations with critical and non-critical functions that must be isolated despite sharing physical infrastructure.
This document discusses cyber security in smart grids. It begins with an introduction to smart grids and their reliance on information and communication technologies (ICT). It then discusses three security objectives for smart grids: data availability, confidentiality, and integrity. Several types of cyber attacks on smart grids are described, including denial-of-service attacks, random attacks, and false data injection attacks. The document concludes by evaluating techniques for detecting attacks, such as using chi-square tests and cosine similarity matching to compare expected and measured smart grid data.
Smart Grid security expert & previous hacker Emil Gurevitch explains how hackers can get to your Smart Grid, and how utilities can detect and respond to Smart Metering Cyber-attacks.
Smart grids is an added communication capabilities and intelligence to traditional grids,smart grids are enabled by Intelligent sensors and actuators, Extended data management system,Expanded two way communication between utility operation system facilities and customers,Network security ,National integration ,Self healing and adaptive –Improve distribution and transmission system operation,Allow customers freedom to purchase power based on dynamic pricing ,Improved quality of power-less wastage ,Integration of large variety of generation options.
We have seen the more complex and critical infrastructure the more vulnerable they are. From the Year of 1994 we have seen lots of incidents where SmartGrid were Hacked the latest and booming incident was Stuxnet Worm which targeted Nuclear Power System of Iran and Worldwide.There are different types of Attacks we will see. Security needed for Smart Grid.
Smart Grid Systems Based Survey on Cyber Security IssuesjournalBEEI
The future power system will be an innovative administration of existing power grids, which is called smart grid. Above all, the application of advanced communication and computing tools is going to significantly improve the productivity and consistency of smart grid systems with renewable energy resources. Together with the topographies of the smart grid, cyber security appears as a serious concern since a huge number of automatic devices are linked through communication networks. Cyber attacks on those devices had a direct influence on the reliability of extensive infrastructure of the power system. In this survey, several published works related to smart grid system vulnerabilities, potential intentional attacks, and suggested countermeasures for these threats have been investigated.
Practical analysis of the cybersecurity of European smart gridsSergey Gordeychik
This paper summarizes the experience gained during a series of
practical cybersecurity assessments of various components of Europe’s
smart electrical grids.
This document discusses analytics for assessing cybersecurity risks in smart grids. It identifies several risk management practices for smart grids including the NIST supply chain risk management practice, Department of Energy risk management practice, and compliance with technical standards. It also maps the relationships between smart grid domains, actors, interfaces, and vulnerabilities based on NIST guidelines to identify high-risk areas and inform priority actions. Finally, it shows how risk identification and assessment can be conducted based on analyzing security objectives, impact levels, and relationships between smart grid components defined in NIST guidelines.
- The smart grid extends power systems into homes and businesses, creating new security challenges as critical infrastructure connects to less secure networks.
- We need accurate models of the smart grid that consider both cyber and physical pathways between components in order to understand vulnerabilities and identify security weaknesses across the integrated system.
- A federated approach is needed to both secure the smart grid and model its complex interactions, as the system spans multiple organizations with critical and non-critical functions that must be isolated despite sharing physical infrastructure.
A Defense-in-depth Cybersecurity for Smart SubstationsIJECEIAES
The increase of cyber-attacks on industrial and power systems in the recent years make the cybersecurity of supervisory control and data acquisition and substation automation systemsa high important engineering issue. This paper proposes a defense in depth cybersecurity solution for smart substations in different layers of the substation automation system. In fact, it presents possible vulnerabilities in the substation automation system and propose a multiple layer solution based on best practice in cyber security such as the hardening ofdevices, whitelisting, network configuration, network segmentation, role-based account management and cyber security management and deployement.
The document discusses cyber security threats to the US power grid. It notes that the power grid consists of over 300,000 km of transmission lines operated by 500 companies. Cyber attacks on critical infrastructure like the power grid are increasing in frequency and sophistication, which could have severe consequences. For example, a DDoS attack costing just $40 could overwhelm network links and cause a blackout. The document also provides examples of past cyber attacks on energy systems like Stuxnet and the 2015 attack on Ukraine's power grid that left 700,000 residents without electricity for 7 hours.
This document discusses the cyber security risks of smart grids and proposes an integrated security framework to address these risks. Smart grids integrate information infrastructure with electrical infrastructure, improving performance but also increasing vulnerability to cyber attacks. The framework features security agents, managed security switches, and a security manager to provide layered protection, intrusion detection, and access control across the power automation network in a scalable and extensible manner. This integrated approach is needed as power systems have different security needs than traditional IT networks.
Cyber Security in Substation Automation (IEC 61850)Nikandrov Maxim
This document discusses cyber security risks in electrical substation automation systems that use IEC 61850 protocols. It outlines how unauthorized access and spoofing attacks can manipulate systems by sending false operational commands and positioning data. Specifically, it demonstrates how Man-in-the-Middle attacks can spoof Multicast MAC Secure (MMS) and Generic Object Oriented Substation Event (GOOSE) messages to send false commands. The document calls for improvements in cyber security practices, policies, personnel training, use of encryption and other protections to address these risks.
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityLeonardo ENERGY
This Cybersecurity webinar, the second in a series, addresses issues of importance to executive, technical, and academic professionals involved with managing and protecting Electric Utilities and Smart Grids worldwide. Technology and market challenges will be addressed, followed by cybersecurity approaches (including those used in Europe and US) and best practices. Three case studies, and legal and regulatory constraints, for architecting smart grids in a secure way also will be presented.
Cyber-Defensive Architecture for Networked Industrial Control SystemsIJEACS
This paper deals with the inevitable consequence of the convenience and efficiency we benefit from the open, networked control system operation of safety-critical applications: vulnerability to such system from cyber-attacks. Even with numerous metrics and methods for intrusion detection and mitigation strategy, a complete detection and deterrence of internal code flaws and outside cyber-attacks has not been found and would not be found anytime soon. Considering the ever incompleteness of detection and prevention and the impact and consequence of mal-functions of the safety-critical operations caused by cyber incidents, this paper proposes a new computer control system architecture which assures resiliency even under compromised situations. The proposed architecture is centered on diversification of hardware systems and unidirectional communication from the proposed system in alerting suspicious activities to upper layers. This paper details the architectural structure of the proposed cyber defensive computer control system architecture for power substation applications and its validation in lab experimentation and on a cybersecurity testbed.
Security Issues in SCADA based Industrial Control Systems aswanthmrajeev112
This document discusses security concerns in industrial control systems. It provides an overview of industrial control systems (ICS) and SCADA systems, which are widely used to control infrastructure systems. It outlines several vulnerabilities in ICS, including issues with legacy systems not being designed with modern cybersecurity threats in mind. Specific threats like zero-day vulnerabilities, non-prioritized tasks, and database/communication protocol issues are examined. The conclusion states that additional digital security techniques are needed to protect critical infrastructure control systems.
Next Generation Network: Security and Architectureijsrd.com
Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. Wireless Sensor Networks (WSN) are a most challenging and emerging technology for the Research due to their vital scope in the field coupled with their low processing power and associated low energy. As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design staring with a brief overview of the sensor networks security, a review is made of and how to provide the security in the wireless sensor networks. This paper studies the security problems, Requirement, Architecture of WSN and different platform, characterized by severely constrained computational and energy resources, and an ad hoc operational environment.
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Underwriters Laboratories
This UL white paper discusses some of the many issues and challenges that must be addressed in the future deployment of wireless technology for the processing
of secure transactions. It begins with a discussion of the strengths and limitations of both contactless and wireless technologies. The white paper then reviews and assesses internal system risks, as well as external security concerns, for both technologies. The paper concludes with some thoughts on the future use of wireless technology in secure transactions, and how manufacturers can provide assurances to both system providers and users regarding the security of their private data.
This document discusses cyber security concerns regarding smart grid technology integration. It outlines how increased data sharing and connectivity between new and legacy systems introduces new cyber vulnerabilities. It then summarizes existing cyber security standards from organizations like ISO, NERC, and IEC that can provide frameworks for addressing these vulnerabilities. Finally, it notes challenges integrating new technologies with legacy systems and the need for a strategic roadmap to help guide secure technology adoption.
ICSA 2019 Architectural Security Weaknesses in Industrial Control SystemsDanielleGonzalez25
Architectural Security Weaknesses in Industrial Control Systems; An Empirical Study Based on Disclosed Software Vulnerabilities
Presented March 2019 at the IEEE International Conference on Software Architecture (ICSA) in Hamburg, Germany
Nozomi Networks is the leader of industrial cybersecurity, delivering real-time visibility to manage cyber risk & improve resilience for industrial operations. With one solution, customers gain advanced cybersecurity, improved operational reliability & easy IT/OT integration. Innovating the use of artificial intelligence, the company helps the largest industrial sites around the world See and Secure™ their critical industrial control networks. Today Nozomi Networks supports over a quarter of a million devices in the critical infrastructure, energy, manufacturing, mining, transportation & utility sectors, making it possible to tackle the escalating cyber risks to operational networks (OT).
This document summarizes an article from the International Journal of Computer Engineering and Technology. The article proposes using an FPGA-based hardware dongle to securely implement RSA cryptography and prevent secret software information from being extracted. It describes using the FPGA to perform half of the RSA encryption process, with the other half decrypted on the software side. The document provides details on the RSA encryption algorithm, FPGA programming, a design for interfacing between a computer and the FPGA dongle, and results of encrypting data with the proposed system. It concludes the approach provides a way to wrap the RSA layer and restrict applications from running without a connected dongle.
The Nozomi Networks solution improves ICS cyber resiliency and provides real-time operational visibility. Major customers have improved reliability, cybersecurity and operational efficiency using our technology. Learn more about our solutions and technology here and how they can bring immediate benefit to your industrial control system (ICS)
The document discusses cyber security challenges for smart grids. It begins by defining smart grids and explaining their benefits over traditional power grids. It then outlines some key security requirements for smart grids, including confidentiality, availability, and integrity. The document goes on to describe various types of cyber attacks against smart grids, such as reconnaissance, scanning, exploitation attacks like denial of service and man-in-the-middle attacks. It concludes by discussing detection and countermeasures, including network security protocols, cryptography, and device security that can be implemented both before and during attacks to enhance smart grid cyber security.
The document discusses applying autonomic computing principles to wireless sensor networks (WSNs). It introduces WSNs and their design goals/challenges, which include fault tolerance, power management, efficient routing and data aggregation. Autonomic computing aims to make systems self-configuring, self-healing, self-optimizing and self-protecting. The document argues that autonomic computing is well-suited for addressing WSN challenges by allowing for self-configuration, recovery from failures, optimized resource usage, and protection. It outlines architectures like MANNA that apply a service-oriented approach to autonomically manage WSNs.
Vulnerabilities on the Wire: Mitigations for Insecure ICS Device CommunicationMuhammad FAHAD
Modbus, an industrial protocol used for server to client communication, has been
used for over 40 years and is still widely deployed in new ICS installations (Mostia,
2019). Modbus can be transported over serial mediums of RS232, RS485, or it can be
wrapped in an IEEE 802.3 TCP segment. Within TCP, the typical implementation is
Modbus Remote Terminal Unit (RTU) contained in the TCP/IP stack Application layer,
which can be easily viewed in Wireshark (Sanchez, 2017). Modbus uses simple function
calls combined with data range requests to read and write bits, called coils. Additionally,
it can also read and write integers or floats, called registers. When engineers were
encapsulating Modbus within TCP, cybersecurity concerns were nonexistent and,
therefore, Modbus RTU does not have any built-in security mechanisms (Rinaldi, n.d.).
From an ICS security perspective, Modbus is rife with many vulnerabilities and is subject
to Probe, Scan, Flood, Authentication Bypass, Spoof, Eavesdrop, Misdirect, Read/Copy,
Terminate, Execute, Modify, and Delete attacks (Draias, Serhrouchni, & Vogel, 2015)
Standards based security for energy utilitiesNirmal Thaliyil
The document discusses standards for cybersecurity in the energy sector. It notes that threats are increasing as energy infrastructure becomes more connected and data-driven. The document outlines some key cybersecurity standards for the energy industry including NERC CIP, IEEE1686, and IEC 62351. It maps these standards based on their level of technical detail and completeness. The document also discusses best practices for cybersecurity including technological and operational controls and how standards relate to controls for protection, detection and response.
The document describes an algorithm for eye detection in face images. It begins with face detection using skin color detection in HSV color space. Then it finds the symmetric axis of the extracted face region using gradient orientation histograms to determine the location of the eyes. It further finds the symmetric axis within the eye region to locate the center of the eyes. The algorithm aims to accurately detect the eyes even when the face is rotated, which is important for applications like face recognition and gaze tracking.
The document describes an intersection-based geographical routing protocol (IGRP) for vehicular ad hoc networks (VANETs) that uses an anonymous batch authentication and key agreement scheme (ABAKA) for security. IGRP selects optimal routes between intersections to ensure network connectivity while satisfying quality of service constraints. It formulates the routing problem as an optimization problem solved using a genetic algorithm. ABAKA allows for batch authentication of multiple requests and establishes session keys efficiently using elliptic curve cryptography to reduce overhead. It provides anonymity and deals with invalid requests. The proposed approach uses IGRP with ABAKA to provide a secure routing environment for value-added services in VANETs.
A Defense-in-depth Cybersecurity for Smart SubstationsIJECEIAES
The increase of cyber-attacks on industrial and power systems in the recent years make the cybersecurity of supervisory control and data acquisition and substation automation systemsa high important engineering issue. This paper proposes a defense in depth cybersecurity solution for smart substations in different layers of the substation automation system. In fact, it presents possible vulnerabilities in the substation automation system and propose a multiple layer solution based on best practice in cyber security such as the hardening ofdevices, whitelisting, network configuration, network segmentation, role-based account management and cyber security management and deployement.
The document discusses cyber security threats to the US power grid. It notes that the power grid consists of over 300,000 km of transmission lines operated by 500 companies. Cyber attacks on critical infrastructure like the power grid are increasing in frequency and sophistication, which could have severe consequences. For example, a DDoS attack costing just $40 could overwhelm network links and cause a blackout. The document also provides examples of past cyber attacks on energy systems like Stuxnet and the 2015 attack on Ukraine's power grid that left 700,000 residents without electricity for 7 hours.
This document discusses the cyber security risks of smart grids and proposes an integrated security framework to address these risks. Smart grids integrate information infrastructure with electrical infrastructure, improving performance but also increasing vulnerability to cyber attacks. The framework features security agents, managed security switches, and a security manager to provide layered protection, intrusion detection, and access control across the power automation network in a scalable and extensible manner. This integrated approach is needed as power systems have different security needs than traditional IT networks.
Cyber Security in Substation Automation (IEC 61850)Nikandrov Maxim
This document discusses cyber security risks in electrical substation automation systems that use IEC 61850 protocols. It outlines how unauthorized access and spoofing attacks can manipulate systems by sending false operational commands and positioning data. Specifically, it demonstrates how Man-in-the-Middle attacks can spoof Multicast MAC Secure (MMS) and Generic Object Oriented Substation Event (GOOSE) messages to send false commands. The document calls for improvements in cyber security practices, policies, personnel training, use of encryption and other protections to address these risks.
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityLeonardo ENERGY
This Cybersecurity webinar, the second in a series, addresses issues of importance to executive, technical, and academic professionals involved with managing and protecting Electric Utilities and Smart Grids worldwide. Technology and market challenges will be addressed, followed by cybersecurity approaches (including those used in Europe and US) and best practices. Three case studies, and legal and regulatory constraints, for architecting smart grids in a secure way also will be presented.
Cyber-Defensive Architecture for Networked Industrial Control SystemsIJEACS
This paper deals with the inevitable consequence of the convenience and efficiency we benefit from the open, networked control system operation of safety-critical applications: vulnerability to such system from cyber-attacks. Even with numerous metrics and methods for intrusion detection and mitigation strategy, a complete detection and deterrence of internal code flaws and outside cyber-attacks has not been found and would not be found anytime soon. Considering the ever incompleteness of detection and prevention and the impact and consequence of mal-functions of the safety-critical operations caused by cyber incidents, this paper proposes a new computer control system architecture which assures resiliency even under compromised situations. The proposed architecture is centered on diversification of hardware systems and unidirectional communication from the proposed system in alerting suspicious activities to upper layers. This paper details the architectural structure of the proposed cyber defensive computer control system architecture for power substation applications and its validation in lab experimentation and on a cybersecurity testbed.
Security Issues in SCADA based Industrial Control Systems aswanthmrajeev112
This document discusses security concerns in industrial control systems. It provides an overview of industrial control systems (ICS) and SCADA systems, which are widely used to control infrastructure systems. It outlines several vulnerabilities in ICS, including issues with legacy systems not being designed with modern cybersecurity threats in mind. Specific threats like zero-day vulnerabilities, non-prioritized tasks, and database/communication protocol issues are examined. The conclusion states that additional digital security techniques are needed to protect critical infrastructure control systems.
Next Generation Network: Security and Architectureijsrd.com
Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. Wireless Sensor Networks (WSN) are a most challenging and emerging technology for the Research due to their vital scope in the field coupled with their low processing power and associated low energy. As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design staring with a brief overview of the sensor networks security, a review is made of and how to provide the security in the wireless sensor networks. This paper studies the security problems, Requirement, Architecture of WSN and different platform, characterized by severely constrained computational and energy resources, and an ad hoc operational environment.
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Underwriters Laboratories
This UL white paper discusses some of the many issues and challenges that must be addressed in the future deployment of wireless technology for the processing
of secure transactions. It begins with a discussion of the strengths and limitations of both contactless and wireless technologies. The white paper then reviews and assesses internal system risks, as well as external security concerns, for both technologies. The paper concludes with some thoughts on the future use of wireless technology in secure transactions, and how manufacturers can provide assurances to both system providers and users regarding the security of their private data.
This document discusses cyber security concerns regarding smart grid technology integration. It outlines how increased data sharing and connectivity between new and legacy systems introduces new cyber vulnerabilities. It then summarizes existing cyber security standards from organizations like ISO, NERC, and IEC that can provide frameworks for addressing these vulnerabilities. Finally, it notes challenges integrating new technologies with legacy systems and the need for a strategic roadmap to help guide secure technology adoption.
ICSA 2019 Architectural Security Weaknesses in Industrial Control SystemsDanielleGonzalez25
Architectural Security Weaknesses in Industrial Control Systems; An Empirical Study Based on Disclosed Software Vulnerabilities
Presented March 2019 at the IEEE International Conference on Software Architecture (ICSA) in Hamburg, Germany
Nozomi Networks is the leader of industrial cybersecurity, delivering real-time visibility to manage cyber risk & improve resilience for industrial operations. With one solution, customers gain advanced cybersecurity, improved operational reliability & easy IT/OT integration. Innovating the use of artificial intelligence, the company helps the largest industrial sites around the world See and Secure™ their critical industrial control networks. Today Nozomi Networks supports over a quarter of a million devices in the critical infrastructure, energy, manufacturing, mining, transportation & utility sectors, making it possible to tackle the escalating cyber risks to operational networks (OT).
This document summarizes an article from the International Journal of Computer Engineering and Technology. The article proposes using an FPGA-based hardware dongle to securely implement RSA cryptography and prevent secret software information from being extracted. It describes using the FPGA to perform half of the RSA encryption process, with the other half decrypted on the software side. The document provides details on the RSA encryption algorithm, FPGA programming, a design for interfacing between a computer and the FPGA dongle, and results of encrypting data with the proposed system. It concludes the approach provides a way to wrap the RSA layer and restrict applications from running without a connected dongle.
The Nozomi Networks solution improves ICS cyber resiliency and provides real-time operational visibility. Major customers have improved reliability, cybersecurity and operational efficiency using our technology. Learn more about our solutions and technology here and how they can bring immediate benefit to your industrial control system (ICS)
The document discusses cyber security challenges for smart grids. It begins by defining smart grids and explaining their benefits over traditional power grids. It then outlines some key security requirements for smart grids, including confidentiality, availability, and integrity. The document goes on to describe various types of cyber attacks against smart grids, such as reconnaissance, scanning, exploitation attacks like denial of service and man-in-the-middle attacks. It concludes by discussing detection and countermeasures, including network security protocols, cryptography, and device security that can be implemented both before and during attacks to enhance smart grid cyber security.
The document discusses applying autonomic computing principles to wireless sensor networks (WSNs). It introduces WSNs and their design goals/challenges, which include fault tolerance, power management, efficient routing and data aggregation. Autonomic computing aims to make systems self-configuring, self-healing, self-optimizing and self-protecting. The document argues that autonomic computing is well-suited for addressing WSN challenges by allowing for self-configuration, recovery from failures, optimized resource usage, and protection. It outlines architectures like MANNA that apply a service-oriented approach to autonomically manage WSNs.
Vulnerabilities on the Wire: Mitigations for Insecure ICS Device CommunicationMuhammad FAHAD
Modbus, an industrial protocol used for server to client communication, has been
used for over 40 years and is still widely deployed in new ICS installations (Mostia,
2019). Modbus can be transported over serial mediums of RS232, RS485, or it can be
wrapped in an IEEE 802.3 TCP segment. Within TCP, the typical implementation is
Modbus Remote Terminal Unit (RTU) contained in the TCP/IP stack Application layer,
which can be easily viewed in Wireshark (Sanchez, 2017). Modbus uses simple function
calls combined with data range requests to read and write bits, called coils. Additionally,
it can also read and write integers or floats, called registers. When engineers were
encapsulating Modbus within TCP, cybersecurity concerns were nonexistent and,
therefore, Modbus RTU does not have any built-in security mechanisms (Rinaldi, n.d.).
From an ICS security perspective, Modbus is rife with many vulnerabilities and is subject
to Probe, Scan, Flood, Authentication Bypass, Spoof, Eavesdrop, Misdirect, Read/Copy,
Terminate, Execute, Modify, and Delete attacks (Draias, Serhrouchni, & Vogel, 2015)
Standards based security for energy utilitiesNirmal Thaliyil
The document discusses standards for cybersecurity in the energy sector. It notes that threats are increasing as energy infrastructure becomes more connected and data-driven. The document outlines some key cybersecurity standards for the energy industry including NERC CIP, IEEE1686, and IEC 62351. It maps these standards based on their level of technical detail and completeness. The document also discusses best practices for cybersecurity including technological and operational controls and how standards relate to controls for protection, detection and response.
The document describes an algorithm for eye detection in face images. It begins with face detection using skin color detection in HSV color space. Then it finds the symmetric axis of the extracted face region using gradient orientation histograms to determine the location of the eyes. It further finds the symmetric axis within the eye region to locate the center of the eyes. The algorithm aims to accurately detect the eyes even when the face is rotated, which is important for applications like face recognition and gaze tracking.
The document describes an intersection-based geographical routing protocol (IGRP) for vehicular ad hoc networks (VANETs) that uses an anonymous batch authentication and key agreement scheme (ABAKA) for security. IGRP selects optimal routes between intersections to ensure network connectivity while satisfying quality of service constraints. It formulates the routing problem as an optimization problem solved using a genetic algorithm. ABAKA allows for batch authentication of multiple requests and establishes session keys efficiently using elliptic curve cryptography to reduce overhead. It provides anonymity and deals with invalid requests. The proposed approach uses IGRP with ABAKA to provide a secure routing environment for value-added services in VANETs.
This document discusses the "black hole attack" in mobile ad hoc networks using the AODV routing protocol. In a black hole attack, a malicious node advertises itself as having the shortest route to a destination node in order to intercept packets. The document surveys various techniques to detect and prevent black hole attacks, including intrusion detection systems, route confirmation approaches, waiting for multiple route replies, statistical anomaly detection, and prior-receive reply methods. Each approach has advantages and disadvantages in detecting malicious nodes and ensuring secure transmission in the network.
This document presents a system for detecting stop line violations in Myanmar using license plate detection. The system first preprocesses video frames, then uses projection analysis and filtering to localize license plates. It extracts candidate plates based on geometric features like area and aspect ratio. Finally, it makes a decision by comparing the Y-coordinate of the license plate to the Y-coordinate of the stop line - if the plate is above the line, it is a violation. The system was tested on 17 hours of video from Myanmar intersections and showed accuracy in determining violated versus non-violated vehicles.
This document summarizes research on the exposure of microwaves from cellular networks. It describes how microwaves interact with biological systems and discusses measurement techniques and safety standards regarding microwave exposure. While some studies have alleged health hazards from microwaves, independent reviews by health organizations have found no evidence that exposure to microwaves below international safety limits causes harm. The document concludes that with precautions like limiting exposure time and using phones with lower SAR ratings, microwaves from cell phones pose minimal health risks.
The document discusses web usage mining, which involves automatically discovering patterns in how users access and interact with web pages on a website by analyzing web server log files. It describes the three main stages of the web usage mining process: data collection and preprocessing, pattern discovery, and pattern analysis. In the preprocessing stage, user access data is cleaned and organized into user sessions. Statistical and machine learning algorithms are then used to find hidden patterns in user behavior. Discovered patterns can be used by applications like recommendation engines. The document provides details on gathering and preprocessing usage data, including identifying unique users and constructing user sessions from server logs. It also discusses applying sequential pattern mining algorithms to discover frequent traversal patterns between pages within user sessions.
This document discusses the parameters and efficiency calculation of a 750kV transmission line that is 500km long and handling 2000MW of capacitive load, using MATLAB programming. It provides the line parameters such as resistance, inductance, capacitance and efficiency both with and without shunt compensation. The results show that the power transfer capability and voltage profile are improved with a shunt compensating device. Key parameters like sending end voltage and current, receiving end current, line losses, and efficiency are calculated both with and without compensation.
This document discusses radio interference from high voltage transmission lines and analyzes the performance of 750kV and 400kV transmission lines through MATLAB simulations. It provides background on how transmission lines can generate radio interference through corona discharge and spark gaps. It then summarizes the methodology used in MATLAB to calculate radio interference levels based on transmission line parameters such as conductor spacing, height, and voltage levels. The results of simulations of a 750kV and 400kV transmission line are presented, showing the radio interference levels calculated for each. It concludes that radio interference depends on receiving end voltage, sag, conductor configuration and is helpful for transmission line planning and design.
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...IJTET Journal
Smart Grid (SG) communication has recently received significant attentions to facilitate intelligent and distributed electric power transmission systems. The advent of the smart grid promises to user in an era that will bring intelligence, efficiency, and optimality to the power grid. Most of these challenges will occur as an Internet-like communications network is super imposed on top of the current power grid using wireless mesh network technologies with the 802.15.4, 802.11 and WiMAX Standards. Each of these will expose the power grid to security threats. Wireless communication offers the benefits of low cost, rapid deployment, shared communication medium, and mobility. It causes many security and privacy challenges. The concept of dynamic secret is applied to design an encryption scheme for smart grid in wireless communication. Between two parties of communication, the previous packets are coded as retransmission sequence, where retransmitted packet is marked as ―1‖ and the other is marked as ―0‖.During the communication, the retransmission sequence is generated at both sides to update the dynamic encryption key. Any missing or misjudging sequence would prevent the adversary from achieving key. A Smart Grid platform is built, employing the ZigBee protocol for wireless communication. The Simulation results show that the retransmission and packet loss in ZigBee communication are inevitable and unpredictable and it is impossible of the adversary to track the updating of dynamic encryption key. Even though the DES scheme can protect the encryption key from attackers, the hackers can obtain the keys some time, due to the block size 64 bits used by DES that makes the adversary (hacker) to hack the data. It introduces vulnerabilities and liner crypt analysis; this can be achieved by using AES scheme. The AES uses 128 bits block size for a single encryption key a data of 256 billion gigabytes can be transmitted thus its provide much more safety to user from hacker and it reduces the end to end delay and increases packet transmission rate.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELijaia
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
This document discusses the importance of cryptography standards in wireless local area networks (WLANs). It begins by explaining how wireless networks are vulnerable to threats like eavesdropping, tampering, and denial of service attacks due to the open nature of wireless communication. It then examines some common wireless security protocols like WEP, WPA, and RSN and compares their features to provide insight for securing WLANs. Finally, it discusses some basic hardware requirements for setting up a local wireless network, including a wireless access point and network interface cards for devices to connect to the network securely.
Smart metering and control of transmission systemDurgarao Gundu
The document discusses smart metering and control of transmission systems in a smart grid. It describes characteristics of a smart grid like self-healing, including consumers, and accommodating different generation sources. It compares smart grids to existing systems and lists components of smart metering infrastructure like integrated communications and smart meters. Challenges of adopting smart grids include costs, complex structure, security, and privacy issues. Cyber security strategies for smart grids focus on availability, integrity, and confidentiality of data through encryption, authentication, and digital signatures.
The Internet of Things (IoT) offers many industries significant new opportunities, but it also exposes them and their customers to a host of security issues. Securing the IoT requires new ways of thinking that can defend the enterprise and its customers against attackers and privacy abuses.
This document summarizes an article from the International Journal of Computer Engineering and Technology about enhancing power-aware hybrid intrusion detection architecture in an ad-hoc network using mobile agents. It discusses designing and implementing an energy-efficient anomaly-based cooperative intrusion detection system that applies mobile agent technology to minimize network load, conserve bandwidth, and improve reactivity. It also aims to minimize energy consumption of monitoring nodes using the Back-Propagation algorithm. The paper then presents a new approach to intrusion detection system architecture in ad-hoc networks using mobile agents to determine which network events need monitoring and where.
Wireless ad hoc networks are autonomous nodes that communicate with each other in a
decentralized manner through multi hop radio network. Wireless nodes form a dynamic network
topology and communicate with each other directly without wireless access point. Wireless networks
are particularly vulnerable to intrusions, as they operate in open medium, and use cooperative
strategies for network communication.
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSGeorge Wainblat
SUMMARY - Current power grids increasingly emerging into smart networked grids and are more accessible from the public internet which poses new cyber threats in the grid. More computer based systems are introduced into power networks in order to monitor and control the network. Future model smart grid and micro grid systems will be based on data flows for communication of system status, usage and control throughout the network infrastructure in addition to the power flow. This creates new security threats on the power grid. Instead of relying mainly on power plants for power generation, there will be a combination of multiple generation sources and at the same time wider use of electrical computer based equipment by consumers. Both increase the amount of data flows in the network as well as introduce additional vulnerable spots. Vulnerability of the power grid to cyber-attacks increases even more because of the wide use of SCADA networks. SCADA networks are more accessible to the internet and lack authentication and authorization mechanisms therefore expose the grid to threats such as DDOS, Data interception, Data alteration and additional hacking threats.
The transition from present to future model has already begun and rapidly growing while it already poses new security challenges which must be attended immediately. It is essential to introduce immediately a single comprehensive security solution which will provide fast detection and prevention tools to cope with a variety of threats with different nature and from multiple sources. The solution should not be tightly coupled with each device in the network so it won’t require upgrade of the devices inside the grid.
The Cyber defense solution should be versatile using variety of cyber technologies such as Firewalls, anomaly detection, Big Data analytics, machine learning and more in a network wise combination.
Supervisory control and data acquisition (SCADA) are applications that collect data from a system in order to automate the monitoring and controlling of its activities. Several industrial fields such as, electric utilities, water supplies and buildings' facilities have already adopted SCADA systems to increase the efficiency and reduce cost. However, the IT community is concerned about the level of security that any applied SCADA system provides. This paper concentrates on the major security threats encountered in SCADA systems. In addition, it discusses a new proposed methodology in order to increase the system security with minimal impact on efficiency. The proposed scheme provides several security services which are mutual authentication, confidentiality, data integrity and accountability.
A new algorithm to enhance security against cyber threats for internet of thi...IJECEIAES
One major problem is detecting the unsuitability of traffic caused by a distributed denial of services (DDoS) attack produced by third party nodes, such as smart phones and other handheld Wi-Fi devices. During the transmission between the devices, there are rising in the number of cyber attacks on systems by using negligible packets, which lead to suspension of the services between source and destination, and can find the vulnerabilities on the network. These vulnerable issues have led to a reduction in the reliability of networks and a reduction in consumer confidence. In this paper, we will introduce a new algorithm called rout attack with detection algorithm (RAWD) to reduce the affect of any attack by checking the packet injection, and to avoid number of cyber attacks being received by the destination and transferred through a determined path or alternative path based on the problem. The proposed algorithm will forward the real time traffic to the required destination from a new alternative backup path which is computed by it before the attacked occurred. The results have showed an improvement when the attack occurred and the alternative path has used to make sure the continuity of receiving the data to the main destination without any affection.
Revisiting the experiment on detecting of replay and message modificationiaemedu
This document summarizes a research paper that proposes methods for detecting message modification and replay attacks in ad-hoc wireless networks. It begins with background on security issues in wireless networks and types of attacks. It then reviews existing intrusion detection systems and security techniques. Related work that detects attacks using features from the media access control layer or radio frequency fingerprinting is also discussed. The paper aims to present a simple, economical, and platform-independent system for detecting message modification, replay attacks, and unauthorized users in ad-hoc networks.
Internet Of Things(IoT) is emerging technology in future world.The term IoT comprises of Cloud computing, Data mining,
Big data analytics, hardware board. The Security and Interoperability is a main factor that influences the IoT Enegy
consumption is also main fator for IoT application designing.The various protocols such as MQTT,AMQP,XMPP are used in
IoT.This paper analysis the various protocols used in Internet of Things.
The document describes a robust and trusted routing scheme (RTS) for IoT-based mobile wireless mesh networks. The RTS aims to improve network reliability and security. It consists of two main techniques: (1) a network infrastructure using multi-hop connectivity between mesh clients, routers and gateways; and (2) secure and trusted data routing between devices using RSA cryptography with public/private keys. The RTS allows for self-configuration, coverage expansion, and recovery from failures while preventing various security attacks.
Wireless Sensor Network (WSN) is a promising field for research. As the use of this field increases, it is
required to give proper security to this field. So to ensure the security of communication of data or messages and to
control the use of data in WSN is of great importance. As sensor networks interact with responsive data and operate
in unfriendly unattended area, from the time of system design these security concerns should be addressed. The paper,
presents a modified Motesec security protocol which is a security mechanism for Wireless sensor network. In this
protocol a hash function based approach is used to detect replay attacks. For data access control key lock matching
method i.e. memory data access control policy is used to prevent unauthorized data access. Encoding and
reconstruction scheme is used to find out attacker. Flooding attack detection by comparing data rate. There is currently
massive research is present in the area of wireless sensor network security..Keywords: GPS,GCM,LBS Android.
Keywords: secure communication architecture, wireless Sensor network security.
This document discusses cyber security issues in smart grids. It begins with an introduction to smart grids and their reliance on information and communication technologies. It then discusses three key security objectives for smart grids: data availability, confidentiality, and integrity. Several types of cyber attacks on smart grids are described, including denial-of-service attacks, random attacks, and false data injection attacks. The document concludes by evaluating techniques for detecting attacks, such as using chi-square tests and cosine similarity matching to compare expected and measured smart grid data.
The document proposes a Portable and Data Security Tolerance-based Energy-Efficient Framework (PDST-EEF) for maintaining data security while lowering energy usage of sensor devices in smart grid environments. PDST is developed to ensure data privacy using an authentication method integrated with cryptographic signatures to detect various attacks like denial of service and replay attacks. EEF then presents an energy-efficient cybersecurity mechanism for sensor networks in smart grids. It identifies malicious nodes, forms groups, and allocates keys with less energy. Experimental results show that PDST-EEF improves authentication time by a second with 5.06% less energy usage. The framework aims to provide high-level security for sensor networks while minimizing their energy consumption.
Data security tolerance and portable based energy-efficient framework in sens...Venu Madhav
Wireless Sensor Networks (WSNs) are effective devices used for remote surveillance, device failure prediction,
and housing energy control in numerous smart grid implementations. Several interaction structures and remedies,
such as broadband networks, cable networks, Wireless Sensor networks, have been suggested to assist
Smart Grid implementations. Owing to their cheap, dynamic nature, robustness, and low energy profile, WSNs
are attractive devices, and preserving a low energy pattern is an essential factor in WSN. Implementing quality
services and safety techniques in sensor networks is challenging in smart grid applications. Thus, in this article,
Portable and Data Security Tolerancebased Energy-Efficient Framework(PDST-EEF) has been proposed for
maintaining a high standard of data security by lowering the sensor device energy usage in smart grid surroundings.
PDST model is developed to ensure data privacy in sensor networks by utilizing an authentication
method integrated with the cryptographic signature model to detect the various attacks. PDST identifies and
separates attacks like denial of service and replay efficiently. EEF presents a low-power cyber safety mechanism
on sensor networks with smart grid tracking applications. EEF is modeled with different stages like identifying
anti-nodes, group development, and allocating keys less energy. EEF can operate with higher power efficiency
techniques while preserving sustained throughput and reliability ideals. The experimental result shows that the
PDST-EEF’s specific request and authentication period is often enhanced by just a second with less energy usage
of 5.06%.
Supervisory control and data acquisition (SCADA) are applications that collect data from a system in order to automate the monitoring and controlling of its activities. Several industrial fields such as, electric utilities, water supplies and buildings’ facilities have already adopted SCADA systems to increase the efficiency and reduce cost. However, the IT community is concerned about the level of security that any applied SCADA system provides. This paper concentrates on the major security threats encountered in SCADA systems. In addition, it discusses a new proposed methodology in order to increase the system security with minimal impact on efficiency. The proposed scheme provides several security services which are mutual authentication, confidentiality, data integrity and accountability.
Electrically small antennas: The art of miniaturizationEditor IJARCET
We are living in the technological era, were we preferred to have the portable devices rather than unmovable devices. We are isolating our self rom the wires and we are becoming the habitual of wireless world what makes the device portable? I guess physical dimensions (mechanical) of that particular device, but along with this the electrical dimension is of the device is also of great importance. Reducing the physical dimension of the antenna would result in the small antenna but not electrically small antenna. We have different definition for the electrically small antenna but the one which is most appropriate is, where k is the wave number and is equal to and a is the radius of the imaginary sphere circumscribing the maximum dimension of the antenna. As the present day electronic devices progress to diminish in size, technocrats have become increasingly concentrated on electrically small antenna (ESA) designs to reduce the size of the antenna in the overall electronics system. Researchers in many fields, including RF and Microwave, biomedical technology and national intelligence, can benefit from electrically small antennas as long as the performance of the designed ESA meets the system requirement.
This document provides a comparative study of two-way finite automata and Turing machines. Some key points:
- Two-way finite automata are similar to read-only Turing machines in that they have a finite tape that can be read in both directions, but cannot write to the tape.
- Turing machines have an infinite tape that can be read from and written to, allowing them to recognize recursively enumerable languages.
- Both models are examined in their ability to accept the regular language L={anbm|m,n>0}.
- The time complexity of a two-way finite automaton for this language is O(n2) due to making two passes over the
This document analyzes and compares the performance of the AODV and DSDV routing protocols in a vehicular ad hoc network (VANET) simulation. Simulations were conducted using NS-2, SUMO, and MOVE simulators for a grid map scenario with varying numbers of nodes. The results show that AODV performed better than DSDV in terms of throughput and packet delivery fraction, while DSDV had lower end-to-end delays. However, neither protocol was found to be fully suitable for the highly dynamic VANET environment. The document concludes that further work is needed to develop improved routing protocols optimized for VANETs.
This document discusses the digital circuit layout problem and approaches to solving it using graph partitioning techniques. It begins by introducing the digital circuit layout problem and how it has become more complex with increasing circuit sizes. It then discusses how the problem can be decomposed into subproblems using graph partitioning to assign geometric coordinates to circuit components. The document reviews several traditional approaches to solve the problem, such as the Kernighan-Lin algorithm, and discusses their limitations for larger circuit sizes. It also discusses more recent approaches using evolutionary algorithms and concludes by analyzing the contributions of various approaches.
This document summarizes various data mining techniques that have been used for intrusion detection systems. It first describes the architecture of a data mining-based IDS, including sensors to collect data, detectors to evaluate the data using detection models, a data warehouse for storage, and a model generator. It then discusses supervised and unsupervised learning approaches that have been applied, including neural networks, support vector machines, K-means clustering, and self-organizing maps. Finally, it reviews several related works applying these techniques and compares their results, finding that combinations of approaches can improve detection rates while reducing false alarms.
This document provides an overview of speech recognition systems and recent progress in the field. It discusses different types of speech recognition including isolated word, connected word, continuous speech, and spontaneous speech. Various techniques used in speech recognition are also summarized, such as simulated evolutionary computation, artificial neural networks, fuzzy logic, Kalman filters, and Hidden Markov Models. The document reviews several papers published between 2004-2012 that studied speech recognition methods including using dynamic spectral subband centroids, Kalman filters, biomimetic computing techniques, noise estimation, and modulation filtering. It concludes that Hidden Markov Models combined with MFCC features provide good recognition results for large vocabulary, speaker-independent, continuous speech recognition.
This document discusses integrating two assembly lines, Line A and Line B, based on lean line design concepts to reduce space and operators. It analyzes the current state of the lines using tools like takt time analysis and MTM/UAS studies. Improvements are identified to eliminate waste, including methods improvements, workplace rearrangement, ergonomic changes, and outsourcing. Paper kaizen is conducted and work elements are retimed. The goal is to integrate the lines to better utilize space and manpower while meeting manufacturing standards.
This document summarizes research on the exposure of microwaves from cellular networks. It describes how microwaves interact with biological systems and discusses measurement techniques and safety standards regarding microwave exposure. While some studies have alleged health hazards from microwaves, independent reviews by health organizations have found no evidence that exposure to microwaves below international safety limits causes harm. The document concludes that with precautions like limiting exposure time and using phones with lower SAR ratings, microwaves from cell phones pose minimal health risks.
This document summarizes a research paper that examines the effect of feature reduction in sentiment analysis of online reviews. It uses principle component analysis to reduce the number of features (product attributes) from a dataset of 500 camera reviews labeled as positive or negative. Two models are developed - one using the original set of 95 product attributes, and one using the reduced set. Support vector machines and naive Bayes classifiers are applied to both models and their performance is evaluated to determine if classification accuracy can be maintained while using fewer features. The results show it is possible to achieve similar accuracy levels with less features, improving computational efficiency.
This document provides a review of multispectral palm image fusion techniques. It begins with an introduction to biometrics and palm print identification. Different palm print images capture different spectral information about the palm. The document then reviews several pixel-level fusion methods for combining multispectral palm images, finding that Curvelet transform performs best at preserving discriminative patterns. It also discusses hardware for capturing multispectral palm images and the process of region of interest extraction and localization. Common fusion methods like wavelet transform and Curvelet transform are also summarized.
This document describes a vehicle theft detection system that uses radio frequency identification (RFID) technology. The system involves embedding an RFID chip in each vehicle that continuously transmits a unique identification signal. When a vehicle is stolen, the owner reports it to the police, who upload the vehicle's information to a central database. Police vehicles are equipped with RFID receivers. If a stolen vehicle passes within range of a receiver, the receiver detects the vehicle's ID signal and displays its details on a tablet. This allows police to quickly identify and recover stolen vehicles. The system aims to make it difficult for thieves to hide a vehicle's identity and allows vehicles to be tracked globally wherever the detection system is implemented.
This document discusses and compares two techniques for image denoising using wavelet transforms: Dual-Tree Complex DWT and Double-Density Dual-Tree Complex DWT. Both techniques decompose an image corrupted by noise using filter banks, apply thresholding to the wavelet coefficients, and reconstruct the image. The Double-Density Dual-Tree Complex DWT yields better denoising results than the Dual-Tree Complex DWT as it produces more directional wavelets and is less sensitive to shifts and noise variance. Experimental results on test images demonstrate that the Double-Density method achieves higher peak signal-to-noise ratios, especially at higher noise levels.
This document compares the k-means and grid density clustering algorithms. It summarizes that grid density clustering determines dense grids based on the densities of neighboring grids, and is able to handle different shaped clusters in multi-density environments. The grid density algorithm does not require distance computation and is not dependent on the number of clusters being known in advance like k-means. The document concludes that grid density clustering is better than k-means clustering as it can handle noise and outliers, find arbitrary shaped clusters, and has lower time complexity.
This document proposes a method for detecting, localizing, and extracting text from videos with complex backgrounds. It involves three main steps:
1. Text detection uses corner metric and Laplacian filtering techniques independently to detect text regions. Corner metric identifies regions with high curvature, while Laplacian filtering highlights intensity discontinuities. The results are combined through multiplication to reduce noise.
2. Text localization then determines the accurate boundaries of detected text strings.
3. Text binarization filters background pixels to extract text pixels for recognition. Thresholding techniques are used to convert localized text regions to binary images.
The method exploits different text properties to detect text using corner metric and Laplacian filtering. Combining the results improves
This document describes the design and implementation of a low power 16-bit arithmetic logic unit (ALU) using clock gating techniques. A variable block length carry skip adder is used in the arithmetic unit to reduce power consumption and improve performance. The ALU uses a clock gating circuit to selectively clock only the active arithmetic or logic unit, reducing dynamic power dissipation from unnecessary clock charging/discharging. The ALU was simulated in VHDL and synthesized for a Xilinx Spartan 3E FPGA, achieving a maximum frequency of 65.19MHz at 1.98mW power dissipation, demonstrating improved performance over a conventional ALU design.
This document describes using particle swarm optimization (PSO) and genetic algorithms (GA) to tune the parameters of a proportional-integral-derivative (PID) controller for an automatic voltage regulator (AVR) system. PSO and GA are used to minimize the objective function by adjusting the PID parameters to achieve optimal step response with minimal overshoot, settling time, and rise time. The results show that PSO provides high-quality solutions within a shorter calculation time than other stochastic methods.
This document discusses implementing trust negotiations in multisession transactions. It proposes a framework that supports voluntary and unexpected interruptions, allowing negotiating parties to complete negotiations despite temporary unavailability of resources. The Trust-x protocol addresses issues related to validity, temporary loss of data, and extended unavailability of one negotiator. It allows a peer to suspend an ongoing negotiation and resume it with another authenticated peer. Negotiation portions and intermediate states can be safely and privately passed among peers to guarantee stability for continued suspended negotiations. An ontology is also proposed to provide formal specification of concepts and relationships, which is essential in complex web service environments for sharing credential information needed to establish trust.
This document discusses and compares various nature-inspired optimization algorithms for resolving the mixed pixel problem in remote sensing imagery, including Biogeography-Based Optimization (BBO), Genetic Algorithm (GA), and Particle Swarm Optimization (PSO). It provides an overview of each algorithm, explaining key concepts like migration and mutation in BBO. The document aims to prove that BBO is the best algorithm for resolving the mixed pixel problem by comparing it to other evolutionary algorithms. It also includes figures illustrating concepts like the species model and habitat in BBO.
This document discusses principal component analysis (PCA) for face recognition. It begins with an introduction to face recognition and PCA. PCA works by calculating eigenvectors from a set of face images, which represent the principal components that account for the most variance in the image data. These eigenvectors are called "eigenfaces" and can be used to reconstruct the face images. The document then discusses how the system is implemented, including preparing a face database, normalizing the training images, calculating the eigenfaces/principal components, projecting the face images into this reduced space, and recognizing faces by calculating distances between projected test images and training images.
This document summarizes research on using wireless sensor networks to detect mobile targets. It discusses two optimization problems: 1) maximizing the exposure of the least exposed path within a sensor budget, and 2) minimizing sensor installation costs while ensuring all paths have exposure above a threshold. It proposes using tabu search heuristics to provide near-optimal solutions. The research also addresses extending the models to consider wireless connectivity, heterogeneous sensors, and intrusion detection using a game theory approach. Experimental results show the proposed mobile replica detection scheme can rapidly detect replicas with no false positives or negatives.
An All-Around Benchmark of the DBaaS MarketScyllaDB
The entire database market is moving towards Database-as-a-Service (DBaaS), resulting in a heterogeneous DBaaS landscape shaped by database vendors, cloud providers, and DBaaS brokers. This DBaaS landscape is rapidly evolving and the DBaaS products differ in their features but also their price and performance capabilities. In consequence, selecting the optimal DBaaS provider for the customer needs becomes a challenge, especially for performance-critical applications.
To enable an on-demand comparison of the DBaaS landscape we present the benchANT DBaaS Navigator, an open DBaaS comparison platform for management and deployment features, costs, and performance. The DBaaS Navigator is an open data platform that enables the comparison of over 20 DBaaS providers for the relational and NoSQL databases.
This talk will provide a brief overview of the benchmarked categories with a focus on the technical categories such as price/performance for NoSQL DBaaS and how ScyllaDB Cloud is performing.
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessScyllaDB
What can you expect when migrating from MongoDB to ScyllaDB? This session provides a jumpstart based on what we’ve learned from working with your peers across hundreds of use cases. Discover how ScyllaDB’s architecture, capabilities, and performance compares to MongoDB’s. Then, hear about your MongoDB to ScyllaDB migration options and practical strategies for success, including our top do’s and don’ts.
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc
Global data transfers can be tricky due to different regulations and individual protections in each country. Sharing data with vendors has become such a normal part of business operations that some may not even realize they’re conducting a cross-border data transfer!
The Global CBPR Forum launched the new Global Cross-Border Privacy Rules framework in May 2024 to ensure that privacy compliance and regulatory differences across participating jurisdictions do not block a business's ability to deliver its products and services worldwide.
To benefit consumers and businesses, Global CBPRs promote trust and accountability while moving toward a future where consumer privacy is honored and data can be transferred responsibly across borders.
This webinar will review:
- What is a data transfer and its related risks
- How to manage and mitigate your data transfer risks
- How do different data transfer mechanisms like the EU-US DPF and Global CBPR benefit your business globally
- Globally what are the cross-border data transfer regulations and guidelines
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google CloudScyllaDB
Digital Turbine, the Leading Mobile Growth & Monetization Platform, did the analysis and made the leap from DynamoDB to ScyllaDB Cloud on GCP. Suffice it to say, they stuck the landing. We'll introduce Joseph Shorter, VP, Platform Architecture at DT, who lead the charge for change and can speak first-hand to the performance, reliability, and cost benefits of this move. Miles Ward, CTO @ SADA will help explore what this move looks like behind the scenes, in the Scylla Cloud SaaS platform. We'll walk you through before and after, and what it took to get there (easier than you'd guess I bet!).
CTO Insights: Steering a High-Stakes Database MigrationScyllaDB
In migrating a massive, business-critical database, the Chief Technology Officer's (CTO) perspective is crucial. This endeavor requires meticulous planning, risk assessment, and a structured approach to ensure minimal disruption and maximum data integrity during the transition. The CTO's role involves overseeing technical strategies, evaluating the impact on operations, ensuring data security, and coordinating with relevant teams to execute a seamless migration while mitigating potential risks. The focus is on maintaining continuity, optimising performance, and safeguarding the business's essential data throughout the migration process
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My IdentityCynthia Thomas
Identities are a crucial part of running workloads on Kubernetes. How do you ensure Pods can securely access Cloud resources? In this lightning talk, you will learn how large Cloud providers work together to share Identity Provider responsibilities in order to federate identities in multi-cloud environments.
For senior executives, successfully managing a major cyber attack relies on your ability to minimise operational downtime, revenue loss and reputational damage.
Indeed, the approach you take to recovery is the ultimate test for your Resilience, Business Continuity, Cyber Security and IT teams.
Our Cyber Recovery Wargame prepares your organisation to deliver an exceptional crisis response.
Event date: 19th June 2024, Tate Modern
ScyllaDB is making a major architecture shift. We’re moving from vNode replication to tablets – fragments of tables that are distributed independently, enabling dynamic data distribution and extreme elasticity. In this keynote, ScyllaDB co-founder and CTO Avi Kivity explains the reason for this shift, provides a look at the implementation and roadmap, and shares how this shift benefits ScyllaDB users.
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
So You've Lost Quorum: Lessons From Accidental DowntimeScyllaDB
The best thing about databases is that they always work as intended, and never suffer any downtime. You'll never see a system go offline because of a database outage. In this talk, Bo Ingram -- staff engineer at Discord and author of ScyllaDB in Action --- dives into an outage with one of their ScyllaDB clusters, showing how a stressed ScyllaDB cluster looks and behaves during an incident. You'll learn about how to diagnose issues in your clusters, see how external failure modes manifest in ScyllaDB, and how you can avoid making a fault too big to tolerate.
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving
What began over 115 years ago as a supplier of precision gauges to the automotive industry has evolved into being an industry leader in the manufacture of product branding, automotive cockpit trim and decorative appliance trim. Value-added services include in-house Design, Engineering, Program Management, Test Lab and Tool Shops.
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
QA or the Highway - Component Testing: Bridging the gap between frontend appl...zjhamm304
These are the slides for the presentation, "Component Testing: Bridging the gap between frontend applications" that was presented at QA or the Highway 2024 in Columbus, OH by Zachary Hamm.
Guidelines for Effective Data VisualizationUmmeSalmaM1
This PPT discuss about importance and need of data visualization, and its scope. Also sharing strong tips related to data visualization that helps to communicate the visual information effectively.
Test Management as Chapter 5 of ISTQB Foundation. Topics covered are Test Organization, Test Planning and Estimation, Test Monitoring and Control, Test Execution Schedule, Test Strategy, Risk Management, Defect Management
ScyllaDB Real-Time Event Processing with CDCScyllaDB
ScyllaDB’s Change Data Capture (CDC) allows you to stream both the current state as well as a history of all changes made to your ScyllaDB tables. In this talk, Senior Solution Architect Guilherme Nogueira will discuss how CDC can be used to enable Real-time Event Processing Systems, and explore a wide-range of integrations and distinct operations (such as Deltas, Pre-Images and Post-Images) for you to get started with it.
Discover the Unseen: Tailored Recommendation of Unwatched ContentScyllaDB
The session shares how JioCinema approaches ""watch discounting."" This capability ensures that if a user watched a certain amount of a show/movie, the platform no longer recommends that particular content to the user. Flawless operation of this feature promotes the discover of new content, improving the overall user experience.
JioCinema is an Indian over-the-top media streaming service owned by Viacom18.
This time, we're diving into the murky waters of the Fuxnet malware, a brainchild of the illustrious Blackjack hacking group.
Let's set the scene: Moscow, a city unsuspectingly going about its business, unaware that it's about to be the star of Blackjack's latest production. The method? Oh, nothing too fancy, just the classic "let's potentially disable sensor-gateways" move.
In a move of unparalleled transparency, Blackjack decides to broadcast their cyber conquests on ruexfil.com. Because nothing screams "covert operation" like a public display of your hacking prowess, complete with screenshots for the visually inclined.
Ah, but here's where the plot thickens: the initial claim of 2,659 sensor-gateways laid to waste? A slight exaggeration, it seems. The actual tally? A little over 500. It's akin to declaring world domination and then barely managing to annex your backyard.
For Blackjack, ever the dramatists, hint at a sequel, suggesting the JSON files were merely a teaser of the chaos yet to come. Because what's a cyberattack without a hint of sequel bait, teasing audiences with the promise of more digital destruction?
-------
This document presents a comprehensive analysis of the Fuxnet malware, attributed to the Blackjack hacking group, which has reportedly targeted infrastructure. The analysis delves into various aspects of the malware, including its technical specifications, impact on systems, defense mechanisms, propagation methods, targets, and the motivations behind its deployment. By examining these facets, the document aims to provide a detailed overview of Fuxnet's capabilities and its implications for cybersecurity.
The document offers a qualitative summary of the Fuxnet malware, based on the information publicly shared by the attackers and analyzed by cybersecurity experts. This analysis is invaluable for security professionals, IT specialists, and stakeholders in various industries, as it not only sheds light on the technical intricacies of a sophisticated cyber threat but also emphasizes the importance of robust cybersecurity measures in safeguarding critical infrastructure against emerging threats. Through this detailed examination, the document contributes to the broader understanding of cyber warfare tactics and enhances the preparedness of organizations to defend against similar attacks in the future.
1. ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1678
www.ijarcet.org
DESIGN OF WI-FI INTEGRATED SOPHISTICATED
METER USING EMBEDDED SYSTEM
Iswarya.V
PG Scholar, K.S.R. College of Engineering/ECE, Tiruchengode,India
ABSTRACT: Focusing on a recent real time issue
Electricity Hacking and malactivities in bill
processing, a prototype Impregnable Device for
secured metering (IDSM) is designed which
consists of a sophisticated meter(SM) differing
from other meters in security with a legacy Wi-Fi
system for communication, a microcontroller, a
centralized monitoring and control unit
implemented cost effectively and a C Database
Management System for data backing. In order to
provide security at a higher level various
cryptography techniques are to be analyzed and
the most secure cryptography Random number
Address Cryptography (RAC) is chosen. For
wireless communication to be more efficient Radio
Frequency (RF) is used designing a wide range to
cover longer distances. The SM present in each
house is connected by wireless network which
periodically gets updates from the server. The
server using a backend database calculates the
amount to be paid according to the number of
units consumed and sends it back to the meter for
display at home along with the required
information which reduces manpower along with
the grievances. Our prototype focuses on security,
communication at a higher speed with an
advanced metering and a unique database for
backend system.
Index Terms:- Cryptography, Sophisticated
meter, legacy Wi-Fi, CDBMS, unconditional
security.
I. INTRODUCTION
Embedded systems are widespread in
consumer, industrial, commercial and military
applications. Networking in embedded systems is
needed to integrate devices for any application so
they are increasingly widespread and important.
Many real time applications nowadays are dependent
on integration of many systems which allow efficient,
ubiquitous computing, intelligent system, cost
effective implementation, efficient power utilization
concerning memory etc.. In many situations a
communication link between two devices becomes
essential. This communication can be wired or
wireless. Radio Frequency (RF) communication has a
wide range, from few meters to millions of
kilometers, does not require two devices to be in line
of sight, can cross many obstacles. When
communication is wireless hackers are more than in
wired communication. Security plays a vital role in
all applications, there are many reasons to protect the
information used on the computer and during
communication. Considering a recent real time issue,
let us consider electricity hacking along with the
electricity billing system in existence, for this we take
an example of this trend the metering infrastructure
that can be used in both domestic and commercial
purposes.
Our prototype IDSM deals with a
specially designed architecture on whole comprising
of a client module and a server module.
The client module comprises of electrical
devices in domestic or commercial purpose whose
power consumption is calculated using a SM
differing from other meters, an Atmel 89C51
microcontroller to receive the data from the meter
and communicate with other devices via legacy Wi-
Fi and a legacy Wi-Fi transceiver unit specifically
designed for communication between the client and
the server.
2. ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1679
www.ijarcet.org
The Server module comprises of a legacy
Wi-Fi transceiver unit which communicates with the
client, a data acquisition unit for receiving the data
from legacy Wi-Fi and transferring it to the
centralized monitoring and control unit, a centralized
monitoring and control unit monitors and controls the
whole architecture. It is generally a desktop or an
individual system and a CDBMS which is a database
that generally backs up the data.
II. REVIEW
Application oriented project – Advanced
Metering Infrastructure.An architecture for providing
remote attestation for advanced meters, called a
Cumulative Attestation Kernel (CAK), is
implemented at a low level in the meter and
Cryptographically secure audit data.Data integrity on
meters can be compromised by malicious application
firmware in various ways. Three modes of attack on
sensor data available to malicious application
firmware running during various lifetime phases
occupied by that data. Data acquisition is not reliable,
stored data may be corrupted or deleted leading to
data corruption or misled. Application is remote so
attackers are more. Elliptic curve Cryptography is
used for security. Attestation is either from a
mobile or a desktop in which response time is short
so in any process delay in response affects the whole
system. Cost of Implementation is high[1]. Universal
connectivity of embedded system provides increased
possibilities for malicious users to gain unauthorized
access to sensitive information. Various attacks at
different abstraction levels are defined. Security is
needed at both data transfer and within the
device[3].Smart home device descriptions and
standard practices for demand response and load
management “Smart Energy “ applications needed in
a smart energy based residential or light commercial
environment. Alogrithm used is Disjoint Multi Path
Routing protocol, Kruskal‟s algorithm, Sensor
Network Analyzer(T)[6].Wireless LAN-IEEE are
licence free bands available worldwide.Security is
less as no authentication is provided.Two
requirements are highly considered, QOS in real time
environment over non-real time and power saving
that meets user‟s perspective.bEDCA + S-
APSD(Enhanced distributed channel association,
Scheduled Advanced power save delivery) is best
suited for bidirectional applications with no periods
of no activity [7]. System uses wireless
communications from consumer home to EB office
with the help of GSM using a RFID in both ways.
Reduced manual labour, taking time, power
Blackout. Along with a billing information via SMS
sent . RF signaling and Ad-Hoc data transfer can be
used in various fields[8].Single chip VLSI
processor–HCgorilla needs more complicated
strategy, involves parallelizing compilers . The
prototyping compliers are written in Java.
Compilation Techniques are Multicore compiler,
LIW compiler[9].The following proposed methods
are analysed key-based multiple Huffman
tables(MHT), arithmetic coding with key-based
interval splitting(KSAC) and randomized arithmetic
coding(RAC).Our analysis shows that MHT and
KSAC are vulnerable to low complexity known and
/or chosen plaintext attacks. Although we do not
provide any attacks on RAC , we point out some
disadvantages of RAC over the classical compress
then encrypt approach. Other approaches under
argument do not have advantages over RAC in terms
of efficiency and security[10]. Secure architecture
based on virtual machines and attestation for software
agents that use meter.TPM and Xen VMM are used
in prototype. First approach using virtual machine.
ESP isolution is made less vulnerable to a variety of
security threats. Advance metering systems may be
connected to the Internet or even a wireless network
that is highly vulnerable to eavesdropping and
physical attacks.IA32 architecture based on
embedded processors such as ARM.Due to space
restrictions many issues surrounding software
distribution, updates and removal are not
addressed[11]. Ubiquitous system has dual features
diversity and threat.RAC is developed in a single
chip unique processor to run on any platform. Found
effective as it considers whole text without division
and does not involve any arithmetic operations,
performed using simple memory access. Memory
scrambling is done at hardware along with software
support. A dedicated processor is needed to achieve
sufficient speed, performance and strength used for
low power and high throughput[12].Anecdotes
obtained from an installation on a large industrial
power system. IED configuration with PLC.
Integrates many functions with minimal
maintenance/testing, uploading and downloading of
3. ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1680
www.ijarcet.org
data and logs in serial communications [13].
Government: In order to reduce electricity theft and
to calculate power consumed govt has introduced a
new technique in which ESP client notifies the
reading from the street instead of notifying each
house.A LPRF receiver captures the transmitted data
from the houses,for that a repeater is placed along
with ordinary meter and immediately registers data
online.The work done by the government was not yet
transparent, and the real technology behind that is not
yet revealed. All the present data was just an
overview, and got with the help of bing.com
III. NEED AND APPROACH
A. Need for Security:
The universal connectivity for
embedded systems creates increased possibilities for
malicious users to gain unauthorized access to
sensitive information. The security of today‟s
systems is appallingly bad. Attacks on these systems
are getting sophisticated. Malicious data can be sent
to unsecured back-end databases and other systems
that are susceptible to common attacks. In networked
embedded systems an attacker does not need to
physically possess the system. Embedded system
security often requires protecting critical or sensitive
information (code or data) throughout its lifetime.
Potential attacks first must be identified which can
come from both internal and external sources. The
security needs for an embedded device thus can be
classified into two, Security needs for data transfer
and Security needs within the device. So it is
desirable that information stored in a system is free
from unauthorized alteration throughout its lifetime
and it is properly erased at the end of its lifetime.
Security should be taken into account during the
design phase .Proper security solutions should be
found for Message authentication, Key management,
Encryption. Access to the embedded networks should
be restricted to authorized users. Security functions
implemented in an embedded system must be
considered in both hardware and software.Security
defined in a system is to identify threat, set targets,
assess risks, device countermeasures (people,
processes, measures and procedures).
B. Secure Measures:
The common security objectives which need
to be satisfied by security protocols are
confidentiality, integrity, authentication, non-
repudiation and availability. Cryptography is the
technique for secure communication in the presence
of third parties, not only protects data from theft or
alteration, but can also be used for user
authentication. On analyzing the commonly used
cryptography techniques that are generally used we
infer that the most commonly used cryptography
technique is Elliptic Curve Cryptography (ECC)
followed by Ron Rivest, Adi Shamir and Leonard
Adleman(RSA)., in competency with other
algorithms.
ECC is an approach to public-key
cryptography based on the algebraic structure
of elliptic curves over finite fields. For elliptic-curve-
based protocols, it is assumed that finding
the discrete logarithm of a random elliptic curve
element with respect to a publicly known base point
is infeasible. The primary benefit promised by ECC
is a smaller key size, reducing storage and
transmission requirements.
RSA is an algorithm for public-key
cryptography that is based on the presumed difficulty
of factoring large integers, the factoring problem. A
user of RSA creates and then publishes the product of
two large prime numbers, along with an auxiliary
value, as their public key. The prime factors must be
kept secret. Anyone can use the public key to encrypt
a message, but with currently published methods, if
the public key is large enough, only someone with
knowledge of the prime factors can feasibly decode
the message. Whether breaking RSA encryption is as
hard as factoring is an open question known as
the RSA problem.
So Random Number Addressing
Cryptography (RAC) is considered.RAC is a
common key technique with ideal cipher strength like
vernam cipher in which the plaintext is combined
with the "key stream" of the same length, to generate
the cipher text, using the Boolean "exclusive or".
RAC is theoretically high speed, because it does not
do any arithmetic logic operation speed and simple
like XOR, but does simply memory access. Due to its
high memory access without any arithmetic logic
operation, RAC shows its merit to achieve usability
and safety. Memory scrambling is done at hardware
along with software support. A dedicated processor is
needed to achieve sufficient speed, performance and
strength used for low power and high throughput.
4. ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1681
www.ijarcet.org
It owes a multicore architecture to enhance
throughput with less power. The power conscious
highly performance of RAC is due to a novel
architecture following symmetric multicore,
superscalar, and LIW (Long Instruction Word)
processor techniques. LIW is not so broad parallelism
like VLIW (Very Long Instruction Word), yet it is
effective to practically enhance multimedia
communication that deals with large quantity of data
in pervasive environment. A Ubiquitous system has
dual features diversity and threat. Since, it is
expected that the input data is longer than the
compressed data, the RAC efficiency is expected to
be worse than that of the standard approach. Provably
secure schemes are more appreciated than heuristic
scheme. The standard approach is proven secure
assuming that the PRBG is cryptographically secure.
If one can break the encryption scheme, then one can
distinguish the output of the PRBG from a random
sequence. So far, such proof has not been provided
for RAC.
C. Other parameters:
Embedded systems have special limitations
concerning cost, power efficiency, computation, and
memory that influence how this goal can be achieved.
The power efficiency when compared with other
computation of various techniques in cryptography
state that RAC consumes less power when compared
with other cryptography, on considering cost the
prototype to be implemented in the project is cost
efficient.
IV. SYSTEM MODEL:
A. CLIENT MODULE:
The client module refers to the HAN home
area network which considered domestic may also be
applied in commercial purposes. It comprises of
certain units which are Electrical devices refer to the
appliances in common that consume power to
function and the power consumed is analyzed using a
Watt-Hour meter. The Watt hour meter is designed
with additional features and referred as a
sophisticated meter. The AT89C51 is a 8-bit
microcomputer with 4Kbytes of Flash Erasable and
Programmable Read Only Memory (EPROM). The
Atmel AT89C51 is a powerful microcomputer which
provides a highly-flexible and cost-effective solution
to many embedded control applications In many
situations a communication link between to devices
becomes essential for that RF communication is used.
A frequency is defined for transmission and
reception between the devices, it covers a Wide
range, from few meters to millions of kilometers it
does not require the two devices to be in line of sight
and can cross many obstacles.
B. SERVER MODULE:
The server refers to the EB office which
collects the information from the client modules via
connectors (if necessary) which are domestic may
also be applied in commercial purposes. Data
acquisition unit is a system that acquires the analog
data and converts it into digital data. It allows you to
measure currents, voltage, and temperature, etc...
Simple modules can be used for personal, small lab
projects. Industrial uses include testing of battery,
fuel cell, etc...Here atmel89C51 is used as a data
acquisition unit. The centralized monitoring and
5. ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1682
www.ijarcet.org
control unit that is generally used here is a simple
desktop system and it does not require any server
connected with many client systems. The data will be
stored in CDBMS a data base system for „C‟
Database Management System.
V. CONCLUSION
A. Analysis
The various cryptography techniques have
been analyzed for various inputs such as text,
image,etc using hackman tool and the tool on
analysis reports that RAC is found more secure than
other cryptography techniques in existence.
When considering in a networked embedded
system power and memory are also factors that are
considered in equivalent to security as power affects
computation speed, computation time etc. Memory
utilization must also be considered during
implementation.
B. Communication Medium
While considering the wireless standards that are
available for communication, the IEEE standards are
license free bands and are easily vulnerable. So
attackers and possibility of data theft is high. RF is
used in this project where a frequency is defined for
communication which can communicate longer
distances effectively.
C. IDSM
Our prototype on whole comprises of SM is
a specially designed Watt-Hour meter which
comprises of the single phase Watt-Hour meter
integrated with an LCD display and a
microcontroller. It furnishes the data acquired in a
secure way using cryptography techniques. The ways
for hacking data remains easier during
communication. It overcomes factors such as
response time, cost of implementation and security at
a higher level when compared with the available
techniques. A legacy Wi-Fi unit is designed using RF
communication to cover a wider area and a
multimedia encryption technique is to be made easier
for secure data transaction and a demo of the
prototype is done which can be applied in higher to
provide a better system than in existence
Prototype - Client Module
Prototype - Server Module
0
50
100
RSA ECC RAC
SecurityLevelin%
Cryptography techniques
Security Level of Various
Cryptography Techniques
0
100
200
RSA ECC RAC
PowerConsumptionin%
Cryptography Techniques
Power consumed by various
Cryptography Techniques
6. ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1683
www.ijarcet.org
REFERENCES:
1. Michael LeMay and carl A. Gunter, Senior
Member,[2012] ”Cumulative Attestation Kernels
for Embedded Systems”, IEEE Transactions on
Smart grid, vol. 3, no. 2,pp.744 – 760,
2. Francesco Benzi, Norma Anglani, , Ezio Bassi,
and Lucia Frosini [2011] ” Electricity Smart
Meters Interfacing the Households”, IEEE
Transactions On Industrial Electronics, vol. 58,
no. 10.
3. K.Jyostna(Asst Prof,VNR
VJIET,Hyderabad,India), Dr.V.Padmaja
(Prof,VNRVJIET, Hyderabad,India), [2011]
”Secured Embedded System Networking:
Advanced Security perspective”-ISSN:0975-
5462 Vol 3 No.5
4. Raj S. Katti, , Sudarshan K. Srinivasan and Aida
Vosoughi[2011], On the Security of Randomized
Arithmetic Codes Against Ciphertext-Only
Attacks, IEEE Transactions On Information
Forensics And Security, vol. 6, no. 1.
5. Seunghyun Park, Hanjoo Kim, Hichan
Moon[2010]”Concurrent Simulation Platform
for Energy-Aware Smart Metering Systems”,
IEEE Transactions on Consumer Electronics,
Vol. 56, No. 3
6. Dae-Man Han and Jae-Hyun Lim
Member,[2010] “Smart Home Energy
Management system using IEEE 802.15.4 and
Zigbee” published in IEEE
7. Xavier Perez-costa and Daniel camps Mur, NEc
laboratories Europe [2010] “IEEE 802.11E QOS
and Power saving Features Overview and
Analysis of combined performance” published in
IEEE on Wireless communications.
8. A.Vijayaraj and R.Saravanan, Associate
Professor Saveetha Engineering college [2010,]”
Automated Eb Billing System Using Gsm And
Ad-Hoc Wireless Routing” published in
International Journal of Engineering and
Technology Vol.2 (5), 343-347.
9. Masa-aki FUKASE(Graduate School of Science
and Technology, Hirosaki University) and
Tomoaki SATO( c & c Systems center, Hirosaki
University Pike Research)[2009], “Compilation
Techniques Specific for a Hardware
cryptography-Embedded Multimedia Mobile
Processor” Smart meter installations to reach 250
million worldwide by 2015,”
10. Goce Jakimoski and K. P. Subbalakshmi,
Member, [2008]“cryptanalysis of Some
Multimedia Encryption Schemes” published in
IEEE transactions on Multimedia vol.10,No.3.
11. M. LeMay, G.Gross, c.Gunter, and S.Garg,
University of Illinnois, Urban campaign[2007]
“Unified architecture for large-scale attested
metering” in Hawalian International conference
on System Sciences,Waikoloa Hawaii
12. Masa-aki FUKASE(Graduate School of Science
and Technology, Hirosaki University) and
Tomoaki SATO( c & c Systems center, Hirosaki
University) [2006] “Innovative Ubiquitious
cryptography and Sophisticated Implementation”
published in IEEE.
13. Brent K.Ducan and Bruce G.Bailey [2004]
”Protection, Metering, Monitoring, and Control
of Medium Voltage Power Systems” published
in IEEE transactions on Industry Applications
vol.40.No.1.
14. Article regarding Government notification in
Dinamalar Newspaper “மின் திருட்டு
இனி கிடையாது ”,A new meter reading
scheme[2012].