Exploration of Quantum Cryptography Security Applications for Industrial Control Systems

被引:0
|
作者
Li H. [1 ]
Dong Y. [1 ]
Zhang Y. [1 ]
Wang H. [2 ]
机构
[1] Beijing Products Quality Supervision and Inspection Institute, Beijing
[2] Beijing Zhonghai Wenda Information Technology Co. Ltd., Beijing
关键词
Industrial control system; Invisible state transfer; Key distribution; Quantum cryptography; Upper and lower computer;
D O I
10.2478/amns-2024-1711
中图分类号
学科分类号
摘要
The exploration of security applications of quantum cryptography for industrial control systems is a key research effort aimed at enhancing the security of industrial control systems through quantum cryptography. In this paper, we study the security threats faced by industrial control systems, including network attacks, data leakage, and system tampering, and propose to utilize quantum key distribution and quantum invisible state transfer algorithms to ensure the secure transmission of industrial control system data. The simulation test environment of the upper and lower computers of the industrial control system is built. The quantum encryption and decryption algorithms are deployed in the embedded environment and PCs to test the effectiveness of quantum cryptography to enhance the advanced encryption standard key scheme. The experimental results show that the quantum cryptography technology successfully realizes the encryption and decryption of data, and the total time consumed in the whole process is less than 61.8 seconds, which meets the requirements of a real-time industrial control system. Therefore, quantum cryptography is suitable for protecting field-level data in industrial control systems. © 2023 Hengyu Li, Yun Dong, Yusheng Zhang and Haiping Wang, published by Sciendo.
引用
收藏
相关论文
共 50 条
  • [21] IT SECURITY ASPECTS OF INDUSTRIAL CONTROL SYSTEMS
    Holecko, P.
    Krbilova, I.
    ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING, 2006, 5 (01) : 136 - 139
  • [22] Survey of Industrial Control Systems Security
    Yang T.
    Zhang J.
    Huang Z.
    Chen Y.
    Huang C.
    Zhou W.
    Liu P.
    Feng T.
    Zhang Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (05): : 1035 - 1053
  • [23] Quantum Entanglement and Cryptography for Automation and Control of Dynamic Systems
    Farbod KHOSHNOUD
    Ibrahim I.ESAT
    Shayan JAVAHERIAN
    Behnam BAHR
    Instrumentation, 2019, 6 (04) : 109 - 127
  • [24] Security bounds in quantum cryptography using d-level systems
    Acin, A
    Gisin, N
    Scarani, V
    QUANTUM INFORMATION & COMPUTATION, 2003, 3 (06) : 563 - 580
  • [25] Machine Learning Method with Applications in Hardware Security of Post-Quantum Cryptography
    Haibo Yi
    Journal of Grid Computing, 2023, 21
  • [26] Composable security in relativistic quantum cryptography
    Vilasini, V.
    Portmann, Christopher
    del Rio, Lidia
    NEW JOURNAL OF PHYSICS, 2019, 21 (04)
  • [27] Security of quantum cryptography with realistic sources
    Lütkenhaus, N
    ACTA PHYSICA SLOVACA, 1999, 49 (04) : 549 - 556
  • [28] Bitcoin Security with Post Quantum Cryptography
    Semmouni, Meryem Cherkaoui
    Nitaj, Abderrahmane
    Belkasmi, Mostafa
    NETWORKED SYSTEMS, NETYS 2019, 2019, 11704 : 281 - 288
  • [29] Quantum cryptography: Security criteria reexamined
    Kaszlikowski, D
    Gopinathan, A
    Liang, YC
    Kwek, LC
    Englert, BG
    PHYSICAL REVIEW A, 2004, 70 (03): : 032306 - 1
  • [30] Error correction and security in quantum cryptography
    Lo, HK
    2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 2003, : 481 - 481