Exploration of Quantum Cryptography Security Applications for Industrial Control Systems

被引:0
作者
Li H. [1 ]
Dong Y. [1 ]
Zhang Y. [1 ]
Wang H. [2 ]
机构
[1] Beijing Products Quality Supervision and Inspection Institute, Beijing
[2] Beijing Zhonghai Wenda Information Technology Co. Ltd., Beijing
关键词
Industrial control system; Invisible state transfer; Key distribution; Quantum cryptography; Upper and lower computer;
D O I
10.2478/amns-2024-1711
中图分类号
学科分类号
摘要
The exploration of security applications of quantum cryptography for industrial control systems is a key research effort aimed at enhancing the security of industrial control systems through quantum cryptography. In this paper, we study the security threats faced by industrial control systems, including network attacks, data leakage, and system tampering, and propose to utilize quantum key distribution and quantum invisible state transfer algorithms to ensure the secure transmission of industrial control system data. The simulation test environment of the upper and lower computers of the industrial control system is built. The quantum encryption and decryption algorithms are deployed in the embedded environment and PCs to test the effectiveness of quantum cryptography to enhance the advanced encryption standard key scheme. The experimental results show that the quantum cryptography technology successfully realizes the encryption and decryption of data, and the total time consumed in the whole process is less than 61.8 seconds, which meets the requirements of a real-time industrial control system. Therefore, quantum cryptography is suitable for protecting field-level data in industrial control systems. © 2023 Hengyu Li, Yun Dong, Yusheng Zhang and Haiping Wang, published by Sciendo.
引用
收藏
相关论文
共 50 条
  • [21] Quantum Cryptography for the Future Internet and the Security Analysis
    Zhou, Tianqi
    Shen, Jian
    Li, Xiong
    Wang, Chen
    Shen, Jun
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [22] Security aspects of the authentication used in quantum cryptography
    Cederlof, Jorgen
    Larsson, Jan-Ake
    FOUNDATIONS OF PROBABILITY AND PHYSICS - 4, 2007, 889 : 162 - +
  • [23] Providing Variable Levels of Security in Quantum Cryptography
    Parakh, Abhishek
    QUANTUM COMMUNICATIONS AND QUANTUM IMAGING XVI, 2018, 10771
  • [24] Quantum Cryptography Protocols for IOE Security: A Perspective
    Pradeep, Ch Nikhil
    Rao, M. Kameswara
    Vikas, B. Sai
    ADVANCED INFORMATICS FOR COMPUTING RESEARCH, ICAICR 2019, PT II, 2019, 1076 : 107 - 115
  • [25] Security of quantum cryptography against individual attacks
    Slutsky, BA
    Rao, R
    Sun, PC
    Fainman, Y
    MULITMEDIA NETWORKS: SECURITY, DISPLAYS, TERMINALS, AND GATEWAYS, 1998, 3228 : 310 - 321
  • [26] Quantum Cryptography: A way of Improving Security of Information
    Panhwar, Muhammad Aamir
    Khuhro, Sijjad Ali
    Mazhar, Tehseen
    Deng ZhongLiang
    Qadir, Nabeel
    INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE, 2021, 16 (01) : 9 - 21
  • [27] Security Bounds for Quantum Cryptography with Finite Resources
    Scarani, Valerio
    Renner, Renato
    THEORY OF QUANTUM COMPUTATION, COMMUNICATION, AND CRYPTOGRAPHY, 2008, 5106 : 83 - +
  • [28] Quantum cryptography in the security of cognitive radio networks
    Ezhilarasi, I. Evelyn
    Clement, J. Christopher
    Agnes, Nalini Vincent
    PHYSICA SCRIPTA, 2024, 99 (11)
  • [29] Quantum Cryptography: Approaching Communication Security from a Quantum Perspective
    Porzio, Alberto
    2014 FOTONICA AEIT ITALIAN CONFERENCE ON PHOTONICS TECHNOLOGIES, 2014,
  • [30] Embracing the quantum frontier: Investigating quantum communication, cryptography, applications and future directions
    Vasani, Vatsal
    Prateek, Kumar
    Amin, Ruhul
    Maity, Soumyadev
    Dwivedi, Ashutosh Dhar
    JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2024, 39