Enhancing the Security of Multi-agent Networked Control Systems Using QKD based Homomorphic Encryption

The cyber-security of multi-agent control systems has become vital in practice. To protect the communication process between the individual agents over TCP/IP networks, one must encrypt the messages to be sent, which is costly in a large-scale network when high-level security is demanded. To lessen the burden of heavy encryption and decryption processes, we introduce the Homomorphic Encryption to reduce the number of encryption/decryption terminals that are supposed to equip with every agent. The security is enhanced by the quantum key distribution technology, which can generate secret keys that are theoretically absolutely secure even against quantum computation. We proposed a hybrid method that make good use of the randomness of quantum keys, one-time pad and symmetric encryption to make sure the overall security of homomorphic encryption algorithms. Numerical simulations are provided to illustrate how our scheme.

[1]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[2]  K. Najim,et al.  Generalized predictive control based on neural networks , 1996, Neural Processing Letters.

[3]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[4]  Iman Shames,et al.  Secure and private control using semi-homomorphic encryption , 2017 .

[5]  Quanyan Zhu,et al.  Agent-based cyber control strategy design for resilient control systems: Concepts, architecture and methodologies , 2012, 2012 5th International Symposium on Resilient Control Systems.

[6]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[7]  Hyungbo Shim,et al.  Encrypting Controller using Fully Homomorphic Encryption for Security of Cyber-Physical Systems* , 2016 .

[8]  Guangming Xie,et al.  Controllability of a Leader–Follower Dynamic Network With Switching Topology , 2008, IEEE Transactions on Automatic Control.

[9]  Tamer Basar,et al.  Toward Optimal Network Topology Design for Fast and Secure Distributed Computation , 2014, GameSec.

[10]  Takahiro Fujita,et al.  Cyber-security enhancement of networked control systems using homomorphic encryption , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[11]  Md. Apel Mahmud,et al.  Multi-Agent Approach for Enhancing Security of Protection Schemes in Cyber-Physical Energy Systems , 2017, IEEE Transactions on Industrial Informatics.

[12]  Bruce Schneier,et al.  Applied cryptography, second edition : protocols, algorithms,and source code in C , 2015 .

[13]  Senchun Chai,et al.  Design and stability analysis of networked control systems with random communication time delay using the modified MPC , 2006 .

[14]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .