Skip to main content

Study on Encryption of Wireless Network-Based Mobility Energy-Enterprise Security Management

  • Conference paper
  • First Online:
  • 2097 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 301))

Abstract

The objective of this study is to propose the encrypted mobility Energy-Enterprise Security Management (E-EMS) for a green race environment currently widely adopted througout the global. E-EMS is a system which can actively monitor and control energy consumption. Unlike wired network, there are certain weakness in terms of surveillance and security for wireless network so it is critical to have information exchange between modules, and administrators for the management of each security module. To overcome the aforementioned limitation of wireless network, this study proposes an integrated security control system equipped with Smart Rack and AES, SEED encryption protocol.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. NIA (2013) Cool summer ICT for overcoming power crisis. Green IT Focus, vol 6

    Google Scholar 

  2. Kwon WO, Kim SW (2008) PC power is leaking. IITA Technol Weekly 1344:1–14

    Google Scholar 

  3. Lee DS (2013) Security management service framework in mobile convergence network. Ph.D Thesis, Sungkyunkwan University

    Google Scholar 

  4. Ha OH (2009) A study on conversion security control system for industrial security. J Inf Secur 9(4):1–6

    Google Scholar 

  5. Kim MJ, Kim KN (2011) A study of mining esm based on data-mining. J Inf Secur 11(6):3–8

    Google Scholar 

  6. No BK, Kim DW, Kim KS, Kim IK (2013) Intelligent cyber security technology and issue. PM Issue Report 2013 1(3)

    Google Scholar 

  7. Lee JP, Kim YH, Lim IK, Lee JG, Lee JK (2013) A study on the encryption protocol for security vulnerability and improvement in the carbon metering systems. The Korean Institute of Communications and Information Sciences conference, pp 114–115

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jae-Kwang Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Kim, YH., Lim, IK., Lee, JP., Lee, JG., Namgung, H., Lee, JK. (2014). Study on Encryption of Wireless Network-Based Mobility Energy-Enterprise Security Management. In: Park, J., Zomaya, A., Jeong, HY., Obaidat, M. (eds) Frontier and Innovation in Future Computing and Communications. Lecture Notes in Electrical Engineering, vol 301. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-8798-7_27

Download citation

  • DOI: https://doi.org/10.1007/978-94-017-8798-7_27

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-017-8797-0

  • Online ISBN: 978-94-017-8798-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics