Security Technology

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 360 Experts worldwide ranked by ideXlab platform

Randy L. Ekl - One of the best experts on this subject based on the ideXlab platform.

  • Smart Grid Security Technology
    Innovative Smart Grid Technologies (ISGT) 2010, 2010
    Co-Authors: Anthony R. Metke, Randy L. Ekl
    Abstract:

    The Security of the United States and the way of life of its citizens is dependant on the availability of the North American power grid. Much of the Technology currently in use by the grid is outdated and in many cases unreliable. There have been three major blackouts in the past nine years. Further, the reliance on old Technology leads to inefficient systems, costing the utilities and taxpayers unnecessary sums. There is virtually universal agreement that it is imperative to upgrade the electric grid to increase overall system efficiently and reliability. Such upgrades will require significant dependence on distributed intelligence and broadband communication capabilities. The access and communications capabilities require the latest in proven Security Technology for extremely large, wide area communications networks. This paper discusses the key components for a secure Smart Grid system.

  • Security Technology for smart grid networks
    IEEE Transactions on Smart Grid, 2010
    Co-Authors: Anthony R. Metke, Randy L. Ekl
    Abstract:

    There is virtually universal agreement that it is necessary to upgrade the electric grid to increase overall system efficiency and reliability. Much of the Technology currently in use by the grid is outdated and in many cases unreliable. There have been three major blackouts in the past ten years. The reliance on old Technology leads to inefficient systems, costing unnecessary money to the utilities, consumers, and taxpayers. To upgrade the grid, and to operate an improved grid, will require significant dependence on distributed intelligence and broadband communication capabilities. The access and communications capabilities require the latest in proven Security Technology for extremely large, wide-area communications networks. This paper discusses key Security technologies for a smart grid system, including public key infrastructures and trusted computing.

Jun-ho Huh - One of the best experts on this subject based on the ideXlab platform.

  • A study on the improvement of smart grid Security performance and blockchain smart grid perspective
    Energies, 2018
    Co-Authors: Seong-kyu Kim, Jun-ho Huh
    Abstract:

    Interest in green energy has increased worldwide. Therefore, smart grid projects to form a more efficient and eco-friendly intelligent grid by combining information Technology (IT) Technology with the existing grid are actively being conducted. In Korea, a national-level smart grid project road map has been confirmed, and an action plan has been prepared. Despite such actions, there may appear various threat scenarios in the application of the IT to the grid as a reverse function. Security Technology is a measure to respond to such threats effectively. The Security Technology of a smart grid is an important factor that is directly related to the success or failure of the smart grid project. A smart grid is a new type of next-generation grid born of the fusion with IT. If the smart grid, the backbone of the power supply, is damaged by a cyberattack, it may cause huge damage, such as a nationwide power outage. In fact, there is an increasing cyberattack threat, and the cyber Security threat to the smart grid is not insignificant. Furthermore, the legal system related to information protection is also important in order to support it systematically. In this paper, the necessity of the smart grid is examined, and the industry’s initiative toward the smart grid Security threat and threat response is examined. In this paper, we also suggest a Security plan of applying Rainbowchain, the Blockchain Technology, to the smart grid and energy exchange. We propose achieving superior performance and Security functions by using Rainbowchain, which contains seven authentication techniques among existing Blockchain technologies, and propose the ecosystem and architecture necessary for its application.

Victor Magar - One of the best experts on this subject based on the ideXlab platform.

  • cost and performance report use of cometabolic air sparging to remediate chloroethene contaminated groundwater aquifers
    2001
    Co-Authors: Victor Magar
    Abstract:

    Abstract : The Environmental Security Technology Certification Program (ESTCP) supported an 18-month field study to investigate the cometabolic air sparging (CAS) process at the McClellan National Test Site, California. The purpose of the demonstration was to evaluate the effectiveness of and costs associated with CAS for removal of chlorinated aromatic hydrocarbons (CAHs) from groundwater. Specific project objectives were: Evaluate subsurface oxygen and growth substrate (i.e. propane) distributions Determine growth substrate acclimation requirements; Determine growth substrate and oxygen uptake rates, after acclimation; Evaluate the ability of indigenous bacteria to degrade different CAH compounds; Predict long-term process stability Estimate CAS costs and compare costs with the cost of traditional air sparging or pump and treat technologies. This report describes the cost and performance aspects of the effort.

  • Use of Cometabolic Air Sparging to Remediate Chloroethene-Contaminated Groundwater Aquifers
    2001
    Co-Authors: Victor Magar
    Abstract:

    Abstract : The Environmental Security Technology Certification Program (ESTCP) supported an 18-month field study to investigate the cometabolic air sparging (CAS) process at the McClellan National Test Site, California. The purpose of the demonstration was to evaluate the effectiveness of and costs associated with CAS for removal of chlorinated aromatic hydrocarbons (CAHs) from groundwater. Specific project objectives were: Evaluate subsurface oxygen and growth substrate (i.e. propane) distributions Determine growth substrate acclimation requirements Determine growth substrate and oxygen uptake rates, after acclimation Evaluate the ability of indigenous bacteria to degrade different CAH compounds Predict long-term process stability Estimate CAS costs and compare costs with the cost of traditional air sparging or pump and treat technologies. This report describes the technical results of the field demonstration.

Anthony R. Metke - One of the best experts on this subject based on the ideXlab platform.

  • Smart Grid Security Technology
    Innovative Smart Grid Technologies (ISGT) 2010, 2010
    Co-Authors: Anthony R. Metke, Randy L. Ekl
    Abstract:

    The Security of the United States and the way of life of its citizens is dependant on the availability of the North American power grid. Much of the Technology currently in use by the grid is outdated and in many cases unreliable. There have been three major blackouts in the past nine years. Further, the reliance on old Technology leads to inefficient systems, costing the utilities and taxpayers unnecessary sums. There is virtually universal agreement that it is imperative to upgrade the electric grid to increase overall system efficiently and reliability. Such upgrades will require significant dependence on distributed intelligence and broadband communication capabilities. The access and communications capabilities require the latest in proven Security Technology for extremely large, wide area communications networks. This paper discusses the key components for a secure Smart Grid system.

  • Security Technology for smart grid networks
    IEEE Transactions on Smart Grid, 2010
    Co-Authors: Anthony R. Metke, Randy L. Ekl
    Abstract:

    There is virtually universal agreement that it is necessary to upgrade the electric grid to increase overall system efficiency and reliability. Much of the Technology currently in use by the grid is outdated and in many cases unreliable. There have been three major blackouts in the past ten years. The reliance on old Technology leads to inefficient systems, costing unnecessary money to the utilities, consumers, and taxpayers. To upgrade the grid, and to operate an improved grid, will require significant dependence on distributed intelligence and broadband communication capabilities. The access and communications capabilities require the latest in proven Security Technology for extremely large, wide-area communications networks. This paper discusses key Security technologies for a smart grid system, including public key infrastructures and trusted computing.

Seong-kyu Kim - One of the best experts on this subject based on the ideXlab platform.

  • A study on the improvement of smart grid Security performance and blockchain smart grid perspective
    Energies, 2018
    Co-Authors: Seong-kyu Kim, Jun-ho Huh
    Abstract:

    Interest in green energy has increased worldwide. Therefore, smart grid projects to form a more efficient and eco-friendly intelligent grid by combining information Technology (IT) Technology with the existing grid are actively being conducted. In Korea, a national-level smart grid project road map has been confirmed, and an action plan has been prepared. Despite such actions, there may appear various threat scenarios in the application of the IT to the grid as a reverse function. Security Technology is a measure to respond to such threats effectively. The Security Technology of a smart grid is an important factor that is directly related to the success or failure of the smart grid project. A smart grid is a new type of next-generation grid born of the fusion with IT. If the smart grid, the backbone of the power supply, is damaged by a cyberattack, it may cause huge damage, such as a nationwide power outage. In fact, there is an increasing cyberattack threat, and the cyber Security threat to the smart grid is not insignificant. Furthermore, the legal system related to information protection is also important in order to support it systematically. In this paper, the necessity of the smart grid is examined, and the industry’s initiative toward the smart grid Security threat and threat response is examined. In this paper, we also suggest a Security plan of applying Rainbowchain, the Blockchain Technology, to the smart grid and energy exchange. We propose achieving superior performance and Security functions by using Rainbowchain, which contains seven authentication techniques among existing Blockchain technologies, and propose the ecosystem and architecture necessary for its application.