Toward Quantum Secured Distributed Energy Resources: Adoption of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD)
Jongmin Ahn,
Hee-Yong Kwon,
Bohyun Ahn,
Kyuchan Park,
Taesic Kim,
Mun-Kyu Lee,
Jinsan Kim and
Jaehak Chung
Additional contact information
Jongmin Ahn: Department of Electrical Engineering and Computer Science, Incheon, INHA University, 100, Inha-ro, Michuhol-gu, Incheon 22212, Korea
Hee-Yong Kwon: Department of Electrical Engineering and Computer Science, Incheon, INHA University, 100, Inha-ro, Michuhol-gu, Incheon 22212, Korea
Bohyun Ahn: Department of Electrical Engineering and Computer Science, Texas A&M University-Kingsville, MSC 192, 700 University Blvd, Kingsville, TX 78363, USA
Kyuchan Park: Department of Electrical Engineering and Computer Science, Incheon, INHA University, 100, Inha-ro, Michuhol-gu, Incheon 22212, Korea
Taesic Kim: Department of Electrical Engineering and Computer Science, Texas A&M University-Kingsville, MSC 192, 700 University Blvd, Kingsville, TX 78363, USA
Mun-Kyu Lee: Department of Electrical Engineering and Computer Science, Incheon, INHA University, 100, Inha-ro, Michuhol-gu, Incheon 22212, Korea
Jinsan Kim: Department of Electrical Engineering and Computer Science, Incheon, INHA University, 100, Inha-ro, Michuhol-gu, Incheon 22212, Korea
Jaehak Chung: Department of Electrical Engineering and Computer Science, Incheon, INHA University, 100, Inha-ro, Michuhol-gu, Incheon 22212, Korea
Energies, 2022, vol. 15, issue 3, 1-20
Abstract:
Quantum computing is a game-changing technology that affects modern cryptography and security systems including distributed energy resources (DERs) systems. Since the new quantum era is coming soon in 5–10 years, it is crucial to prepare and develop quantum-safe DER systems. This paper provides a comprehensive review of vulnerabilities caused by quantum computing attacks, potential defense strategies, and remaining challenges for DER networks. First, new security vulnerabilities and attack models of the cyber-physical DER systems caused by quantum computing attacks are explored. Moreover, this paper introduces potential quantum attack defense strategies including Quantum Key Distribution (QKD) and Post-Quantum Cryptography (PQC), which can be applied to DER networks and evaluates defense strategies. Finally, remaining research opportunities and challenges for next-generation quantum-safe DER are discussed.
Keywords: distributed energy resources; post-quantum cryptography; quantum computing attack; quantum key distribution (search for similar items in EconPapers)
JEL-codes: Q Q0 Q4 Q40 Q41 Q42 Q43 Q47 Q48 Q49 (search for similar items in EconPapers)
Date: 2022
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/1996-1073/15/3/714/pdf (application/pdf)
https://www.mdpi.com/1996-1073/15/3/714/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jeners:v:15:y:2022:i:3:p:714-:d:728264
Access Statistics for this article
Energies is currently edited by Ms. Agatha Cao
More articles in Energies from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().