Design of Power Monitoring Security Module for Embedded Device with Elliptic Curve Algorithm

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Currently, we are pursuing smart home construction, intelligent living environment, environment-friendly residential living and quality of life. However, power monitoring terminals using various wired and wireless networks and protocols in home networks are very vulnerable to security. In this study, we design and develop security system for smart meter terminal which can analyze the cryptographic technology of smart meter, which is vulnerable to physical attack, and exposes personal information from the outside, and maximize the efficiency of terminal.

     

     


  • Keywords


    SPA, Scalar multiplication, Elliptic Curve Discrete Logarithm Problem, sub channel attacks.

  • References


      [1] Diffie W, Hellman ME (1976), “Multiuser cryptographic techniques,” presented at National Computer Conference, New York, and June 7-10, 1976.

      [2] Koblitz N (1987), “Elliptic curve cryptosystems”, Math Computer 48, 203–209.

      [3] Miller V (1986), “Use of elliptic curves in cryptography”, Advances in Cryptology—CRYPTO ’85, Lecture Notes in Computer Science, 218. Springer, 417–426


 

View

Download

Article ID: 18531
 
DOI: 10.14419/ijet.v7i3.33.18531




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.