III. OBFUSCATION OF SMART METER DATA
A. Need for cryptography
During the process of transmission of information, it is almost impossible to prevent eavesdropping. The transmission of smart meter readings is often done over an insecure channel. The privacy related issues become the focal point determining the future of the smart meter technology. In this paper, we propose a novel method to secure the smart meter readings using the concept of cryptography [15]. Cryptography refers to the art of securing data by adopting mathematical tools to encrypt and decrypt data. It aims at sending information between two parties in a way that prevents the intrusion of a third party. Cryptographic systems are associated with an algorithm as well as a secret value known as a key. Based on the agreement on a shared key between the sender and the receiver, the messages can be confidently send over an insecure channel without being concerned about eavesdroppers. This is because decryption of the information is impossible without the aid of the secret key [12], [9].
B. Discrete Cosine Transform
Power signal which is procured, has numerous high frequency and low frequency components. The main objective of this paper is to increase the secrecy of the power signal data, which is made feasible by computing the DCT. This transformation converts a signal in time domain to frequency domain. A single spike in time domain of the power signal may appear as many spikes in frequency domain, i.e., a single
Accordingly, this document has been developed to provide information regarding DTL Power and the measures that have been developed and implemented to safeguard its information and information systems from a cyber threat. This document is broken down into several sections that will provide an analysis of DTL Power and the energy sector; as well as the effectiveness of cybersecurity technology/policies in the energy sector, the team’s cyber strategy, and budget.
In today’s world of instant connectivity and information at users’ fingertips, it’s vital that sensitive information is safeguarded against those who seek to do personal harm and profit from gaining access to the data. The key behind keeping information safe is the method in which it’s protected and encrypted. In order to appreciate how information is secured, users must understand the encryption concepts behind it. To do this, one must comprehend the current encryption standards, the trends and developments in encryption technology, the importance of securing data, the government’s regulations pertaining to encryption, the companies involved in research and implementation, the implications of leaked or stolen data, and a brief look into
In the past decade, rapid advances have been made in the field of cryptography. These advances have brought considerable
During this time Richard has showed himself as a promising young specialist and researcher. His major specialization is Applied Mathematics and Computer Science, but as an exception for academic achievements, Alex was allowed by our faculty to write his projects and degree thesis in the field of Cryptography under Computer Security and Applied Algebra Department.
Abstract— Wireless Sensor Networks (WSN) introduce a new way to interact with the physical environment. The security in WSNs became an attractive area of research. WSNs are susceptible to a wide range of malicious attacks. At present ECC is considered for secure communications, which is having good potential for WSN security due to its smaller key size and its high strength of security. Unfortunately, the execution time of ECC is more which is not suitable for more number of applications. A number of other security mechanisms have been proposed for sensor networks to provide data confidentiality, namely Advanced Encryption Standard (AES) and Data Encryption Standard (DES). In this paper, we propose an algorithm, which is compared and analyzed with the existing ECC and AES to provide better security with authenticated sensor nodes. The authentication is done with a secret code. The proposed algorithm will ensure the secure communication with authenticated devices. The analysis results shows that the scheme works better than the common existent schemes with better utilization of available memory.
With the world becoming more advanced and more and more devices being conceived, ie. Smartphones, Smart car, and Smart house, along with a growing dependence on, them even on the level of the government, we need to protect our privacy and safety. It has been statistically shown that our safeguards against hackers and foreign threats is severely lacking. Still, this a worldwide problem, and with the technological revolution, people don’t know how to keep their information safe, so it is our job as part of the government to protect our citizens even from digital
Communications Security is critical to preventing adversaries from obtaining information traversing the internet. With today’s technology just about all information is being transmitted via the internet or phone lines or mobile radios. This can be anything from credit card payments for online purchases to classified secret level or above information for military operations. The technology involved in the area evolving crypto systems such as KG-175s, emissions security or TEMPEST requirements protecting emanations, physical security like ensuring material is accounted for, and transmissions security or protecting information from interception. To support the ever growing technology there is specific equipment and storage requirements for network traffic and voice traffic. There is even equipment devised just to manage and account for the encryption devices on the network. The companies and organizations overseeing communications security include the National Security Agency, General Dynamics, and the Committee on National Security Systems. Finally there are global implications for communications security. National Security Agency surveillance and cyber attacks are among the most relevant concerns in today’s communications security. First discussed will be the technology involved in the area.
In this paper we will present you a brief summary of recent attacks on Elliptic Curve Cryptography and countermeasure of these attacks. We will introduce only attacks which have been either performed practically or there is proof of concept of these attacks. We will not introduce any new attack on Elliptic Curve Cryptography. There is no perfect countermeasure against these attacks.
There are many aspects to security and applications, from secure commerce and payment to private communications and protecting passwords. Cryptography, is the practice and study in securing communication between parties in the presence of potential adversaries (Yousuf, N.D.). This report focuses on modern methods of cryptography its operation, strengths and weaknesses, its application techniques in computing and some other aspects where cryptography deemed essential as discussed in this report.
From the viewpoint of data security, which has always been an important form of quality of service, Cloud computing surely poses new challenging security threats for number of reasons. Firstly, traditional cryptographic primitives for the purpose of data security protection cannot be straight accepted due to users loss control of data under cloud computing. Therefore, verification of correct data storage in the cloud must be attended without accurate knowledge of the whole data. Considering different kind of data for every user stored in the cloud and the requirement of long term continuous security of their data safety, the problem of checking correctness of data storage in the cloud becomes even more challenging.[1]
Cloud-assisted mobile health (mHealth) monitoring, which applies the prevailing mobile communications and cloud computing technologies to provide feedback decision support, has been considered as a revolutionary approach to improving the quality of healthcare service while lowering the healthcare cost. Unfortunately, it also poses a serious risk on both clients’ privacy and intellectual property of monitoring service providers, which could deter the wide adoption of mHealth technology. This paper is to address this important problem and design a cloud-assisted privacy preserving mobile health monitoring system to protect the privacy of the involved parties and their data. Moreover, the outsourcing decryption technique and a newly proposed
The aim of this document is to provide an overview on the various cryptographic technologies in use today and what the future might hold. The document will cover the following subjects:
Abstract— Crucial methods are employed to deploy the majority networks to acquire the data. Modern improvements stores, transfer data at higher rate. Traditional methods which provide security to the information. Using single encryption algorithms are more prone to issues and these are implemented without knowing its shortcomings. This proposed algorithms provides new step to avoid shortcomings. We resemble some famous algorithms as follows. Firstly, we create a new algorithms, In order to provide security issue and time constraint of operation. Secondly, We combine AES using multiplexing of keys, Improvement of DES key size and blowfish algorithm, then we encrypt data using the proposed algorithm. This can enhance the security and complicates the Encryption. In this paper we provide both the encryption and decryption that supports in real time application and algorithm has a practical value.5
Authentication is the only method which protects information or data of an individual or organization from a second party to access. Based upon the confidentiality of that particular data or information, the level of authentication depends. Now-a-days, all this data and information what we are talking about is getting digitized all around the world. For this digitized data or information to be secure, a proper authentication procedure must be set. This arise the need for an authentication secret which belongs to the category “Something we know” to come into picture. These secrets authenticate each secret holder as the authorized legitimate user to access their particular account. Technology is
Security and privacy Issues Depending on the field of application, and in some cases, it may become necessary to prevent unauthorized persons from reading or writing data stored on or transmitted from tags. To this end, encryption must be ensured at all interfaces where data could be intercepted or transmitted (on the medium itself, as well as tag–reader and reader–host communication)