Abstract
Challenges facing the deployment of quantum key distribution (QKD) systems in critical infrastructure protection applications include the optical loss-key rate tradeoff, addition of network clients, and interoperability of vendor-specific QKD hardware. Here, we address these challenges and present results from a recent field demonstration of three QKD systems on a real-world electric utility optical fiber network.
Highlights
Electric power is a fundamental utility in modern society
1) NETWORK COMMUNICATION AND STATISTICS Upon software startup, each node creates a connection with the network manager (NM) and reports the total number of available network and quantum keys, number of used network and quantum keys, together with secret key generation rate (SKR) and quantum bit error rate (QBER) of the link
The number of available quantum keys for each system link, as well as the number of available network keys distributed over the entire network are shown
Summary
Electric power is a fundamental utility in modern society. For the most part, today’s power systems rely on dated technology developed for one-way power flows from large power plants to passive customers. Voltage, current, frequency, and phase of the grid at a specific geographic point; and include meteorological data pertinent for renewable energy generation such as wind speed and direction, solar flux and cloud cover, and instantaneous charge available on battery banks [5] Following analysis of this data, decisions are made by humans-in-the-loop and, increasingly, by machine-based decision makers - leading to commands issued which implement controls on the smart grid itself. Evans et al.: Trusted Node QKD at an Electrical Utility severe computational resource (and latency) penalties accompanying public-key cryptographic schemes on limited computer hardware With these requirements and constraints in mind, quantum communications - quantum key distribution provides a unique solution for security of the smart grid, and promises to provide the foundation for SCADA communications in a future-proof manner with security regardless of technological developments.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.