Quantum Key Distribution Applicability to Smart Grid Cybersecurity Systems

被引:1
作者
Grice, Warren [1 ]
Olama, Mohammed [1 ]
Lee, Annabelle [2 ]
Evans, Philip G. [1 ]
机构
[1] Oak Ridge Natl Lab, Computat Sci & Engn Div, Oak Ridge, TN 37831 USA
[2] Nevermore Secur, Evergreen, CO 80439 USA
关键词
Smart grids; Security; Encryption; Reliability; Public key; Physics; Quantum communication; Costs; Quantum key distribution; Protocols; Smart grid security; symmetric and asymmetric cryptography; quantum key distribution;
D O I
10.1109/ACCESS.2025.3533942
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To meet the increasing demand for electricity and to have a more reliable and resilient electric grid against conventional and extreme events, grid modernization is more crucial now than ever before. This will require the development and deployment of devices that provide advanced communication capabilities. The overall efficiency, reliability, and resilience of the smart grid will be inextricably linked to the exchange of information between these devices. Unfortunately, the increased information flow will increase the potential attack surface and introduce new vulnerabilities. While a smarter grid will depend critically on information flow, these benefits will be accrued only if that information can be protected. Nowadays, information is secured in smart grids primarily through cryptography. However, with the increasing number of sophisticated attacks as well as the increasing computational power, the security of the "classical" cryptographic algorithms is threatened. Quantum information science offers solutions to this problem, specifically quantum key distribution (QKD), which provides a means for the generation and secure distribution of symmetric cryptographic keys. The security of QKD stems ultimately from the very nature of quantum physics. In this paper, we investigate the applicability of QKD to the various smart grid sectors and specific use cases. We have identified 18 smart grid use cases of interest for QKD suitability together with 7 QKD factors used for the assessment of the various use cases. For each use case, the impact to security of the loss of confidentiality, integrity, and/or availability is specified. In addition, the suitability of QKD is assessed for each use case with respect to multiple factors.
引用
收藏
页码:17398 / 17413
页数:16
相关论文
共 22 条
[1]  
Abulizi Julaiti, 2022, 2022 IEEE 22nd International Conference on Communication Technology (ICCT), P1213, DOI 10.1109/ICCT56141.2022.10072299
[2]  
Advanced Encryption Standard (AES), 2023, Standard FIPS PUB 197
[3]   Hierarchical Model-Free Transactional Control of Building Loads to Support Grid Services [J].
Amasyali, Kadir ;
Chen, Yang ;
Telsang, Bhagyashri ;
Olama, Mohammed ;
Djouadi, Seddik M. .
IEEE ACCESS, 2020, 8 :219367-219377
[4]  
[Anonymous], 2024, Tech. Bull.
[5]  
[Anonymous], 2020, Standard FERC Order 2222
[6]  
[Anonymous], 2004, Standard FIPS PUB 199
[7]   New Proofs for NMAC and HMAC: Security without Collision Resistance [J].
Bellare, Mihir .
JOURNAL OF CRYPTOLOGY, 2015, 28 (04) :844-878
[8]  
Brassard G, 1993, WORKSH THEOR APPL CR, V765, P410
[9]   An FPGA-Based 4 Mbps Secret Key Distillation Engine for Quantum Key Distribution Systems [J].
Constantin, Jeremy ;
Houlmann, Raphael ;
Preyss, Nicholas ;
Walenta, Nino ;
Zbinden, Hugo ;
Junod, Pascal ;
Burg, Andreas .
JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2017, 86 (01) :1-15
[10]   COMMUNICATION BY ELECTRON-PARAMAGNETIC-RES DEVICES [J].
DIEKS, D .
PHYSICS LETTERS A, 1982, 92 (06) :271-272