Abstract

Quantum computing is a game-changing technology that affects modern cryptography and security systems including distributed energy resources (DERs) systems. Since the new quantum era is coming soon in 5–10 years, it is crucial to prepare and develop quantum-safe DER systems. This paper provides a comprehensive review of vulnerabilities caused by quantum computing attacks, potential defense strategies, and remaining challenges for DER networks. First, new security vulnerabilities and attack models of the cyber-physical DER systems caused by quantum computing attacks are explored. Moreover, this paper introduces potential quantum attack defense strategies including Quantum Key Distribution (QKD) and Post-Quantum Cryptography (PQC), which can be applied to DER networks and evaluates defense strategies. Finally, remaining research opportunities and challenges for next-generation quantum-safe DER are discussed.

Highlights

  • Distributed Energy Sources (DER) such as wind turbines and solar panels are being added to the power system as carbon-neutral policies are promoted around the world.Over the past decade, the proportion of PV and wind-turbine power generation has increased

  • The number of DERs is on the rise, and the need for a network to control the DER system has increased for the stable operation of the entire system [1,2,3]

  • The development of quantum computing poses a significant threat to the security of current cryptographic systems adopted in DER systems

Read more

Summary

Introduction

Distributed Energy Sources (DER) such as wind turbines and solar panels are being added to the power system as carbon-neutral policies are promoted around the world. In order to prepare for the quantum era, this paper analyzes the DER network attack model using quantum attacks, and we predict when quantum attacks become possible. In order to protect these quantum attacks on the DER network, we consider a method to introduce new encryption and security technologies (i.e., quantum key distribution (QKD) and post-quantum cryptography (PQC)) into the DER network.

Prediction of Future Quantum Attacks on DER Network
The Security Protocol of the DER Network
Predicting Possible Quantum Attacks
Sniffing
Attack Methods
Predicting When Quantum Attacks Become a Reality
Post-Quantum Cryptography
The structure structure of of the the DER
Quantum Key Distribution and Application
The performance of QKD:
Findings
Conclusions and Future Works

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.