DOI QR코드

DOI QR Code

Android-based Implementation of Remote Monitoring System for Industrial Gas Turbines

안드로이드 기반 산업용 가스터빈 원격 모니터링 시스템 구현

  • 최준혁 (경북대학교 전자공학부) ;
  • 이동익 (경북대학교 전자공학부)
  • Received : 2018.01.12
  • Accepted : 2018.04.15
  • Published : 2018.04.30

Abstract

This paper presents an android-based implementation of real-time remote monitoring system for industrial gas turbines. The use of remote monitoring techniques can be beneficial in terms of not only the reduction of monitoring cost but also the earlier detection of abnormal status. In order to achieve the ability of protecting sensitive information from unauthorized persons, the proposed system supports secure transmissions using the RSA(Rivest Shamir Adleman) algorithm. In the event of abnormal situation on the gas turbine, the remote monitoring system generates an alarm to attract the user's attention by exploiting a push-message technique. The proposed system has been verified through a series of experiments with an experimental setup including a virtual data generator.

본 논문은 안드로이드 기반으로 구현된 실시간 원격 모니터링 시스템을 제안한다. 원격 모니터링 기술은 모니터링에 필요한 비용의 절감과 비정상 상태의 빠른 발견에 이점이 있다. 제안된 모니터링 시스템은 민감한 정보를 보호하기 위해 RSA(Rivest Shamir Adleman) 알고리즘을 이용하는 보안 통신을 사용한다. 가스터빈의 이상 상황이 발생하였을 때, 원격 모니터링 시스템은 사용자의 주의를 끌기 위해 푸시 메시지를 이용한 경고를 한다. 제안된 시스템은 가상 데이터 발생기를 포함하는 실험 환경에서의 실험으로 검증되었다.

Keywords

References

  1. J. Cho and K. Jeong, "Remote Controlled Robots Used for the Mitigation of the Fukushima Nuclear Power Plant Accident," J. of Institute of Control, Robotics and Systems, vol. 2011, no. 12, 2011, pp. 148-151.
  2. X. Hao and C. Kim, "Design and Implementation of a Smart Home Cloud Control System Using Bridge based on IoT," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 5, 2017, pp. 865-872. https://doi.org/10.13067/JKIECS.2017.12.5.865
  3. H. Ko and H. Kim, "A Study on Vulnerability Analysis and Incident Response Methodology based on the Penetration Test of the Power Plant's Main Control Systems," J. of the Korea Institute of Information Security and Cryptology, vol. 24, no. 2, 2014, pp. 295-310. https://doi.org/10.13089/JKIISC.2014.24.2.295
  4. S. Park, W. Choi, B. Chung, J. N. Kim, and J. M. Kim, "The Study on the Cyber Security Requirements of Cyber-Physical Systems for Cyber Security Frameworks," J. of Institute of Embedded Engineering of Korea, vol. 7, no. 5, 2012, pp. 255-265.
  5. T. H. Cormen, Algorithms Unlocked. London: MIT Press, 2013.
  6. Y. Jang, "Analysis of Concentration-Related EEG Component Due to SmartPhone," J. of the KIECS, vol. 11, no. 7, 2016, pp. 712-722.
  7. Y. Shin and J. Ryu, "Study on Adoption of Suitable Encryption Scheme According to Data Properties on MySQL Database," Proc. Korea Computer Congress 2010, Jeju island, South Korea, June, 2010.
  8. R. D. Silverman, "A Cost-Based Security Analysis of Symmetric and Asymmetric Key Lengths," Bulletin of RSA Laboratories, no. 13, April, 2000.
  9. B. S. Dhillon, Engineering Safety. Singapore: World Scientific, 2003.
  10. C. Kong and L. Semyeong, "A Study of Inverse Modeling from Micro Gas Turbine Experimental Test Data," J. of Korean Society of Propulsion Engineers, vol. 13, no. 6, 2009, pp. 1-7.
  11. A. Selby and C. Mitchel, "Algorithms for Software Implementations of RSA," IEE Proc. E - Computer and Digital Techniques, vol. 136, no. 3, 1989, pp. 166-170. https://doi.org/10.1049/ip-e.1989.0023
  12. T. Fujita, K. Kogiso, K. Sawada, and S. Shin, "Security Enhancement of Networked Control Systems Using RSA Public-key Cryptosystem," Proc. 10th Asian Control Conf., Kota Kinabalu, Malaysia, May, 2015.