Quantum-Secure Microgrid

Existing microgrid communication relies on classical public key systems, which are vulnerable to attacks from quantum computers. This paper uses quantum key distribution (QKD) to solve these quantum-era microgrid challenges. Specifically, this paper makes the following novel contributions: 1) it offers a QKD-based microgrid communication architecture for microgrids; 2) it shows how to build a quantum-secure microgrid testbed in an RTDS environment; 3) it develops a key pool sharing (KPS) strategy to improve the cyberattack resilience of the QKD-based microgrid; and 4) it analyzes the impacts of critical QKD parameters with the testbed. Test results provide insightful resources for building a quantum-secure microgrid.

[1]  Jino Heo,et al.  Quantum digital signature in a network , 2019, Quantum Information Processing.

[2]  Marco Liserre,et al.  Microgrid Stability Definitions, Analysis, and Examples , 2020, IEEE Transactions on Power Systems.

[3]  Song Y. Yan,et al.  Logarithm Based Cryptography , 2018, Cybercryptography: Applicable Cryptography for Cyberspace Security.

[4]  Nzimako Onyinyechi Real tIme simulation of a microgrid system with distributed energy resources , 2015 .

[5]  Aditya Ashok,et al.  Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid , 2013, IEEE Transactions on Smart Grid.

[6]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[7]  Tsuyoshi Murata,et al.  {m , 1934, ACML.

[8]  Do Ngoc Diep,et al.  No-Cloning Theorem, Kochen-Specker Theorem, and Quantum Measurement Theories , 2019, International Journal of Theoretical Physics.

[9]  M. Kasevich,et al.  Quantum superposition at the half-metre scale , 2015, Nature.

[10]  Joshua D. Guttman,et al.  Enrich-by-need Protocol Analysis for Diffie-Hellman (Extended Version) , 2019, Foundations of Security, Protocols, and Equational Reasoning.

[11]  Feihu Xu,et al.  Concise security bounds for practical decoy-state quantum key distribution , 2013, 1311.7129.

[12]  Peng Zhang,et al.  Software-Defined Microgrid Control: The Genesis of Decoupled Cyber-Physical Microgrids , 2020, IEEE Open Access Journal of Power and Energy.

[13]  J. D. Wong-Campos,et al.  Benchmarking an 11-qubit quantum computer , 2019, Nature Communications.

[14]  René Schoof,et al.  The Discrete Logarithm Problem , 2016, Open Problems in Mathematics.

[15]  Rodney Van Meter,et al.  Quantum Networking , 2019, Cryptography Apocalypse.

[16]  Nicolas Gisin,et al.  Quantum key distribution and 1 Gbps data encryption over a single fibre , 2009, 0912.1798.

[17]  G. Burkard,et al.  Spin qubits in graphene quantum dots , 2006, cond-mat/0611252.

[18]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[19]  S. C. Coutinho The Mathematics of Ciphers: Number Theory and RSA Cryptography , 1999 .

[20]  Peter B. Luh,et al.  Enabling Resilient Microgrid Through Programmable Network , 2017, IEEE Transactions on Smart Grid.

[21]  Danna Zhou,et al.  d. , 1840, Microbial pathogenesis.

[22]  Daniel Smith-Tone,et al.  Report on Post-Quantum Cryptography , 2016 .

[23]  Andrey Bogdanov,et al.  Compact circuits for combined AES encryption/decryption , 2017, Journal of Cryptographic Engineering.

[24]  Renato Renner,et al.  Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.

[25]  Hugo Zbinden,et al.  Finite-key analysis for the 1-decoy state QKD protocol , 2018, 1801.03443.

[26]  Anoud Bani-Hani,et al.  Online Authentication Methods Used in Banks and Attacks Against These Methods , 2019, ANT/EDI40.

[27]  Sheila Cobourne,et al.  Quantum Key Distribution Protocols and Applications , 2011 .

[28]  Colin P. Williams Quantum Chemistry with a Quantum Computer , 2011 .

[29]  C. Cobeli,et al.  ON THE DISCRETE LOGARITHM PROBLEM , 2008, 0811.4182.

[30]  Roman Orus,et al.  Quantum computing for finance: Overview and prospects , 2018, Reviews in Physics.

[31]  V. Makarov Controlling passively quenched single photon detectors by bright light , 2007, 0707.3987.

[32]  Lorena Isabel Barona López,et al.  Trends on Computer Security: Cryptography, User Authentication, Denial of Service and Intrusion Detection , 2019, ArXiv.

[33]  G. Manimaran,et al.  Vulnerability Assessment of Cybersecurity for SCADA Systems , 2008, IEEE Transactions on Power Systems.

[34]  Peng Zhang,et al.  Enhanced Microgrid Power Flow Incorporating Hierarchical Control , 2020, IEEE Transactions on Power Systems.

[35]  J. S. Shaari,et al.  Advances in Quantum Cryptography , 2019, 1906.01645.

[36]  Xiongfeng Ma,et al.  Practical issues in quantum-key-distribution postprocessing , 2009, 0910.0312.