메뉴 건너뛰기




Volumn 2, Issue 4, 2011, Pages 715-723

Energy efficient security algorithm for power grid wide area monitoring system

Author keywords

Cryptographic algorithm; power grid; scheduling; security; smart grid; wide area monitoring system

Indexed keywords

CRYPTOGRAPHIC ALGORITHMS; POWER GRIDS; SECURITY; SMART GRID; WIDE AREA MONITORING;

EID: 82155167643     PISSN: 19493053     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSG.2011.2160298     Document Type: Article
Times cited : (148)

References (28)
  • 1
    • 77952887143 scopus 로고    scopus 로고
    • Synchronized phasor measurement applications in power systems
    • J. Ree, V. Centeno, J. Thorp, and A. Phadke, "Synchronized phasor measurement applications in power systems," IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 20-27, 2010.
    • (2010) IEEE Trans. Smart Grid , vol.1 , Issue.1 , pp. 20-27
    • Ree, J.1    Centeno, V.2    Thorp, J.3    Phadke, A.4
  • 2
    • 33746995009 scopus 로고    scopus 로고
    • System-level power optimization: Techniques and tools
    • B. Luca and G. D. Micheli, "System-level power optimization: Techniques and tools," ACM Trans. Design Autom. Electron. Syst., vol. 5, no. 2, pp. 115-192, 2000.
    • (2000) ACM Trans. Design Autom. Electron. Syst. , vol.5 , Issue.2 , pp. 115-192
    • Luca, B.1    Micheli, G.D.2
  • 3
    • 77649188805 scopus 로고    scopus 로고
    • Dynamic and leakage energy minimization with soft real-time loop scheduling and voltage assignment
    • Mar.
    • M. Qiu, L. T. Yang, Z. Shao, and E. H.-M. Sha, "Dynamic and leakage energy minimization with soft real-time loop scheduling and voltage assignment," IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 18, no. 3, pp. 501-504, Mar. 2010.
    • (2010) IEEE Trans. Very Large Scale Integr. (VLSI) Syst. , vol.18 , Issue.3 , pp. 501-504
    • Qiu, M.1    Yang, L.T.2    Shao, Z.3    Sha, E.H.-M.4
  • 4
    • 65849231067 scopus 로고    scopus 로고
    • Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems
    • Art. 25 Apr. ACM TODAES 2011 Best Paper Award
    • M. Qiu and E. H.-M. Sha, "Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems," ACM Trans. Design Autom. Electron. Syst. (TODAES), vol. 14, no. 2, Art. 25, pp. 1-30, Apr. 2009, ACM TODAES 2011 Best Paper Award.
    • (2009) ACM Trans. Design Autom. Electron. Syst. (TODAES) , vol.14 , Issue.2 , pp. 1-30
    • Qiu, M.1    Sha, E.H.-M.2
  • 7
    • 33745137852 scopus 로고    scopus 로고
    • Accurate prediction of power consumption in sensor networks
    • DOI 10.1109/EMNETS.2005.1469097, 1469097, Second IEEE Workshop on Embedded Networked Sensors, EmNetS-II
    • O. Landsiedel, K. Wehrle, and S. Gotz, "Accurate prediction of power consumption in sensor networks," in Proc. 2nd IEEE Workshop Embedded Networked Sensors, 2005, pp. 37-44. (Pubitemid 43897527)
    • (2005) Second IEEE Workshop on Embedded Networked Sensors, EmNetS-II , vol.2005 , pp. 37-44
    • Landsiedel, O.1    Wehrle, K.2    Gotz, S.3
  • 13
    • 77956063489 scopus 로고    scopus 로고
    • Wide-area frequency monitoring network (FNET) architecture and applications
    • Y. Zhang, P. Markham, T. Xia, L. Chen, Y. Ye, and Z. Wu et al., "Wide-area frequency monitoring network (FNET) architecture and applications," IEEE Trans. Smart Grid, vol. 1, no. 2, pp. 159-167, 2010.
    • (2010) IEEE Trans. Smart Grid , vol.1 , Issue.2 , pp. 159-167
    • Zhang, Y.1    Markham, P.2    Xia, T.3    Chen, L.4    Ye, Y.5    Wu, Z.6
  • 14
    • 77952885267 scopus 로고    scopus 로고
    • A flexible phasor data concentrator design leveraging existing software technologies
    • A. Armenia and J. Chow, "A flexible phasor data concentrator design leveraging existing software technologies," IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 73-80, 2010.
    • (2010) IEEE Trans. Smart Grid , vol.1 , Issue.1 , pp. 73-80
    • Armenia, A.1    Chow, J.2
  • 15
    • 77956061246 scopus 로고    scopus 로고
    • Next-generation monitoring, analysis, and controlfor the future smart control center
    • P. Zhang, F. Li, and N. Bhatt, "Next-generation monitoring, analysis, and controlfor the future smart control center," IEEE Trans. Smart Grid, vol. 1, no. 2, pp. 186-192, 2010.
    • (2010) IEEE Trans. Smart Grid , vol.1 , Issue.2 , pp. 186-192
    • Zhang, P.1    Li, F.2    Bhatt, N.3
  • 16
    • 39349085430 scopus 로고    scopus 로고
    • Secure key management architecture against sensor-node fabrication attacks
    • DOI 10.1109/GLOCOM.2007.39, 4410949, IEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings
    • J. Dwoskin, D. Xu, J. Huang, M. Chiang, and R. Lee, "Secure key management architecture against sensor-node fabrication attacks," in IEEE Global Telecommun. Conf., 2007, pp. 166-171. (Pubitemid 351259027)
    • (2007) GLOBECOM - IEEE Global Telecommunications Conference , pp. 166-171
    • Dwoskin, J.1    Xu, D.2    Huang, J.3    Chiang, M.4    Lee, R.5
  • 17
    • 38149061688 scopus 로고    scopus 로고
    • Preventing DoS attacks in wireless sensor networks: A repeated game theory approach
    • A. Agah and S. Das, "Preventing DoS attacks in wireless sensor networks: A repeated game theory approach," Int. J. Network Security, vol. 5, no. 2, pp. 145-153, 2007.
    • (2007) Int. J. Network Security , vol.5 , Issue.2 , pp. 145-153
    • Agah, A.1    Das, S.2
  • 18
    • 27544460282 scopus 로고    scopus 로고
    • Distributed detection of node replication attacks in sensor networks
    • Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
    • B. Parno, A. Perrig, and V. Gligor, "Distributed detection of node replication attacks in sensor networks," in Proc. IEEE Symp. Security Privacy, 2005, pp. 49-63. (Pubitemid 41543646)
    • (2005) Proceedings - IEEE Symposium on Security and Privacy , pp. 49-63
    • Parno, B.1    Perrig, A.2    Gligor, V.3
  • 19
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasure
    • C. Karlof and D.Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasure," Ad-Hoc Network, vol. 1, no. 2, pp. 293-315, 2007.
    • (2007) Ad-Hoc Network , vol.1 , Issue.2 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 23
    • 56749174919 scopus 로고    scopus 로고
    • On the energy cost of communication and cryptography in wireless sensor networks
    • Networking, Commun.
    • G. D. Meulenaer, F. Gosset, F.-X. Standaert, and O. Pereira, "On the energy cost of communication and cryptography in wireless sensor networks," in IEEE Int. Conf. Wireless Mobile Comput., Networking, Commun., 2008, pp. 580-585.
    • (2008) IEEE Int. Conf. Wireless Mobile Comput. , pp. 580-585
    • Meulenaer, G.D.1    Gosset, F.2    Standaert, F.-X.3    Pereira, O.4
  • 25
    • 39049158752 scopus 로고    scopus 로고
    • Experimental performance evaluation of cryptographic algorithms on sensor nodes
    • M. Passing and F. Dressler, "Experimental performance evaluation of cryptographic algorithms on sensor nodes," in Proc. IEEE Int. Conf. Mobile Adhoc Sensor Syst., 2006, pp. 882-887.
    • (2006) Proc. IEEE Int. Conf. Mobile Adhoc Sensor Syst. , pp. 882-887
    • Passing, M.1    Dressler, F.2
  • 28
    • 82155177638 scopus 로고    scopus 로고
    • Energy evaluation of software implementations of block ciphers under memory constraints
    • J. Grossschadl, S. Tillich, C. Rechberger, M. Hofmann, and M. Medwed, "Energy evaluation of software implementations of block ciphers under memory constraints," in Proc. IEEE/ACM DATE, 2007, pp. 1-6.
    • (2007) Proc. IEEE/ACM DATE , pp. 1-6
    • Grossschadl, J.1    Tillich, S.2    Rechberger, C.3    Hofmann, M.4    Medwed, M.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.