Design of Power Monitoring Security Module for Embedded Device with Elliptic Curve Algorithm
-
2018-08-29 https://doi.org/10.14419/ijet.v7i3.33.18531 -
SPA, Scalar multiplication, Elliptic Curve Discrete Logarithm Problem, sub channel attacks. -
Abstract
Currently, we are pursuing smart home construction, intelligent living environment, environment-friendly residential living and quality of life. However, power monitoring terminals using various wired and wireless networks and protocols in home networks are very vulnerable to security. In this study, we design and develop security system for smart meter terminal which can analyze the cryptographic technology of smart meter, which is vulnerable to physical attack, and exposes personal information from the outside, and maximize the efficiency of terminal.
Â
Â
-
References
[1] Diffie W, Hellman ME (1976), “Multiuser cryptographic techniques,†presented at National Computer Conference, New York, and June 7-10, 1976.
[2] Koblitz N (1987), “Elliptic curve cryptosystemsâ€, Math Computer 48, 203–209.
[3] Miller V (1986), “Use of elliptic curves in cryptographyâ€, Advances in Cryptology—CRYPTO ’85, Lecture Notes in Computer Science, 218. Springer, 417–426
-
Downloads
-
How to Cite
Jeon, A., & Ko, Y. (2018). Design of Power Monitoring Security Module for Embedded Device with Elliptic Curve Algorithm. International Journal of Engineering & Technology, 7(3.33), 90-93. https://doi.org/10.14419/ijet.v7i3.33.18531Received date: 2018-08-28
Accepted date: 2018-08-28
Published date: 2018-08-29