Tutorials

Print

 

Title: optimization, privacy and security in microgrids by: Professor Suleyman Uldag

 

 

 

 

 Abstract: The energy sector worldwide has embarked on a transformational process to modernize the over-a-century-old  power grid under an umbrella term of Smart Grid (SG). This vast infrastructural upgrade involves integration of a variety of digital computing,  communications and industrial control systems and technologies into an advanced power grid. One catalyzer ingredient of the SG repertoire of changes is the idea of microgrids. As a new low voltage distribution subsystem, microgrids are expected to improve reliability, help integrate distributed resources, isolate power disturbances, and ameliorate load and supply balance. In this tutorial, we initially provide an overview of the Smart Grid of future and the research problems it has spawned. On top of the foundational coverage of the Smart Grid, we delve into one of the underlying enabling technologies, commonly referred to as microgrids. The goal of this tutorial is present the emerging topics within the smart microgrids research from the communications, security and privacy perspectives. We provide optimization formulations for various problems in microgrid scheduling and control.

 

Bio:

 Suleyman Uludag received his Ph.D. from DePaul University, Chicago in 2007. He is an Associate Professor of Computer Science at the University of Michigan - Flint. 

The general areas of his research include network quality of service, routing in wireless and wired networks, microgrids, network security and privacy, smart grid, and automatic time-series models. He has co-chaired the IEEE LCN Workshop on Smart Grid Networking Infrastructure held in conjunction with IEEE LCN 2010 Conference in Denver, CO.

He has been awarded the Lois Matz Rosen Junior Faculty Excellence in Teaching Award in September 2010 at the University of Michigan - Flint. 

He has also been awarded a Fulbright Grant Core Program to visit TOBB University of Economics and Technology in Ankara, Turkey during the 2012-2013 academic year.

Currently, he is visiting the TCIPG (Trustworthy Cyber Infrastructure for the Power Grid) and the MONET research group at the University of Illinois at Urbana-Champaign and the MONET research group  at UIUC. 


 

Title: Cloud of Secure Elements (CoSE), concepts and applications for NFC services and Cloud Security by: Professor Pascal Urien 

 

 

 

 

 Abstract: In this talk we present a new and emerging technology named "Cloud of Secure Element", which goal is to enforce trust and security to all services hosted by cloud platforms. We detail four emerging applications dealing with identity, mobile payments, and access control for the Internet of Things, and trusted cryptographic provider for cloud environments.

A Secure Element is a tamper resistant microcontroller equipped with host interfaces such as ISO7816, SPI (Serial Peripheral Interface) or I2C (Inter Integrated Circuit). The area of these chips is about 25 mm2, security is enforced by multiple physical and logical countermeasures. Most of secure elements include a Java Virtual Machine (JVM) and therefore execute embedded program written in the JAVACARD language.

We introduces the main technologies and concepts of secure elements, according to an historical review divided in three periods, the mask age, the applications age and the NFC (Near Field Communication) age.

- The secure element concept was born in 1980 with the first electronic bank device, called the B0’ card. In the first generation the operating is buried during the manufacturing process in the ROM, and for this reason is usually referred as a "mask".

- With the invention of Java Card, in 1996, the smartcard becomes a "useful component of Internet computing". A java virtual machine (JVM) runs applications written in javacard, a subset of the java language.  The development of the javacard technology creates a need for trusted management of embedded software. This request is fulfilled by the Global Platform specifications that enforce the applications lifecycle i.e. downloading, activation and deletion in secure elements.

- The early Near Field Communication technology, initially designed by NXP for Mifare chips, was normalized by the ISO 14443 standards at the beginning of the 21st century. NFC standards build an extended framework over ISO 14443. They defined three working modes; 1) reader/writer, it is a CAD device, compatible with ISO 14443 standards, feeding a contactless device, and supporting typeA, typeB and typeF radio coding schemes 2) card emulation, it is a set of protocols working with reader/writer appliances, which are realized by secure elements or by pure software means; 3) Peer to Peer (P2P).

Some mobiles are already supporting some or all NFC modes, and because it is expected that most of smartphones in a near future will support it. According to GOOGLE one million of NFC mobiles are sold every week and according to an In-Stat's market study it could reach 30 % percent global penetration by 2015.. Therefore NFC applications are a very attractive and promising topic

A Cloud of Secure Element (CoSE) platform comprises the following elements; 1) NFC kiosks typically delivering payment or access control facilities; 2) Users equipped with NFC enabled smartphones, or various terminals needing trusted cryptographic resources; 3) Grid of Secure Elements (GoSE), i.e. internet servers hosting numerous secure elements 4) Secure elements, whose resources are identified by URIs; 5) Remote administration entities, which perform management operations dealing with applications downloading, activation and deletion in secure elements.

A grid of secure elements (GoSE) is an Internet server that hosts a set of secure elements. Secure elements may be plugged in USB readers, hardware sockets, or inserted in classical case soldered on electronic boards. Although some products are today commercially available (usually referred as SIM-Server), there is no standard for data exchange and remote administration. We recently designed the RACS protocol, which works over an IP/TCP/TLS stack and performs the grid inventory, and data exchange with secure elements.

Finally we present four emerging applications, dealing with identity, payment, access control, and cryptographic (HSM) services

 

 

Bio:

Pascal Urien (http://www.enst.fr/~urien) is full professor at Telecom ParisTech; he graduated from Ecole Centrale de Lyon, and holds a PHD in computer science. He founded in 2007 the EtherTrust Company. His main research interests include security, smart cards, and NFC technologies especially for networks and distributed computing architectures. He holds fifteen patents and about one hundred publications in these domains. Pascal collaborates in several industrial committees like the IETF. He participated in various French and European research projects. He is the father of the internet smart card technology, which won two industrial awards, Best Technological Innovation at cartes'2000 (Paris) and Most Innovative Product of Year at the Advanced Card Award 2001 (London). He invented the EAP smart card, that won two industrial awards, Best Technological Innovation at cartes'2003 (Paris), and Breakthrough Innovation Award at CardTech/SecureTech 2004 (Washington DC). In 2006 he won a bronze award at the SecureTheWeb Developer Contest, organized by Gemalto and Microsoft. Pascal was one of the winners of French 9th and 11th national contest, for the support of innovative start-ups.

 

Tuesday the 21st. | Sixth IFIP International Conference on New Technologies, Mobility & Security (NTMS 2014) - www.ntms-conf.org
Pwd by Coupons for Hostgator