Exploration of Quantum Cryptography Security Applications for Industrial Control Systems

被引:0
作者
Li H. [1 ]
Dong Y. [1 ]
Zhang Y. [1 ]
Wang H. [2 ]
机构
[1] Beijing Products Quality Supervision and Inspection Institute, Beijing
[2] Beijing Zhonghai Wenda Information Technology Co. Ltd., Beijing
关键词
Industrial control system; Invisible state transfer; Key distribution; Quantum cryptography; Upper and lower computer;
D O I
10.2478/amns-2024-1711
中图分类号
学科分类号
摘要
The exploration of security applications of quantum cryptography for industrial control systems is a key research effort aimed at enhancing the security of industrial control systems through quantum cryptography. In this paper, we study the security threats faced by industrial control systems, including network attacks, data leakage, and system tampering, and propose to utilize quantum key distribution and quantum invisible state transfer algorithms to ensure the secure transmission of industrial control system data. The simulation test environment of the upper and lower computers of the industrial control system is built. The quantum encryption and decryption algorithms are deployed in the embedded environment and PCs to test the effectiveness of quantum cryptography to enhance the advanced encryption standard key scheme. The experimental results show that the quantum cryptography technology successfully realizes the encryption and decryption of data, and the total time consumed in the whole process is less than 61.8 seconds, which meets the requirements of a real-time industrial control system. Therefore, quantum cryptography is suitable for protecting field-level data in industrial control systems. © 2023 Hengyu Li, Yun Dong, Yusheng Zhang and Haiping Wang, published by Sciendo.
引用
收藏
相关论文
共 50 条
[31]   Embracing the quantum frontier: Investigating quantum communication, cryptography, applications and future directions [J].
Vasani, Vatsal ;
Prateek, Kumar ;
Amin, Ruhul ;
Maity, Soumyadev ;
Dwivedi, Ashutosh Dhar .
JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2024, 39
[32]   Cyber Physical Security for Industrial Control Systems and IoT [J].
Kobara, Kazukuni .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (04) :787-795
[33]   Categorical quantum cryptography for access control in cloud computing [J].
Qiu, Lirong ;
Sun, Xin ;
Xu, Juan .
SOFT COMPUTING, 2018, 22 (19) :6363-6370
[34]   Security analysis of quantum cryptography with modified coherent state [J].
Lu, YJ ;
Ou, ZY .
QUANTUM COMMUNICATIONS AND QUANTUM IMAGING II, 2004, 5551 :105-112
[35]   Security enhanced quantum cryptography by controlled spontaneous randomness [J].
Matsueda, H .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (04) :658-664
[36]   Cyber Security challenges and Issues of Industrial Control Systems - Some Security Recommendations [J].
El Idrissi, Omar ;
Mezrioui, Abdellatif ;
Belmekki, Abdelhamid .
2019 5TH IEEE INTERNATIONAL SMART CITIES CONFERENCE (IEEE ISC2 2019), 2019, :330-335
[37]   On the Correction of Errors in Quantum Cryptography Systems [J].
Balygin, K. A. ;
Klimov, A. N. ;
Kulik, S. P. ;
Molotkov, S. N. .
JETP LETTERS, 2016, 104 (05) :341-346
[38]   Security of Entanglement Based Version of BB84 protocol for Quantum Cryptography [J].
Sharma, Anand ;
Ojha, Vibha ;
Lenka, S. K. .
PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 9 (ICCSIT 2010), 2010, :615-619
[39]   Survey of the Development of Quantum Cryptography and Its Applications [J].
Alvarez, Daniel ;
Kim, Yoohwan .
2021 IEEE 11TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2021, :1074-1080
[40]   An AutoML-based security defender for industrial control systems [J].
Vasan, Danish ;
Alqahtani, Ebtesam Jubran S. ;
Hammoudeh, Mohammad ;
Ahmed, Adel F. .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2024, 47