Quantum Key Distribution for Critical Infrastructures: Towards Cyber-Physical Security for Hydropower and Dams
Hydropower facilities are often remotely monitored or controlled from a centralized remote control room. Additionally, major component manufacturers monitor the performance of installed components, increasingly via public communication infrastructures. While these communications enable efficiencies...
Uloženo v:
| Vydáno v: | Sensors (Basel, Switzerland) Ročník 23; číslo 24; s. 9818 |
|---|---|
| Hlavní autoři: | , , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Switzerland
MDPI AG
14.12.2023
MDPI |
| Témata: | |
| ISSN: | 1424-8220, 1424-8220 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Hydropower facilities are often remotely monitored or controlled from a centralized remote control room. Additionally, major component manufacturers monitor the performance of installed components, increasingly via public communication infrastructures. While these communications enable efficiencies and increased reliability, they also expand the cyber-attack surface. Communications may use the internet to remote control a facility’s control systems, or it may involve sending control commands over a network from a control room to a machine. The content could be encrypted and decrypted using a public key to protect the communicated information. These cryptographic encoding and decoding schemes become vulnerable as more advances are made in computer technologies, such as quantum computing. In contrast, quantum key distribution (QKD) and other quantum cryptographic protocols are not based upon a computational problem, and offer an alternative to symmetric cryptography in some scenarios. Although the underlying mechanism of quantum cryptogrpahic protocols such as QKD ensure that any attempt by an adversary to observe the quantum part of the protocol will result in a detectable signature as an increased error rate, potentially even preventing key generation, it serves as a warning for further investigation. In QKD, when the error rate is low enough and enough photons have been detected, a shared private key can be generated known only to the sender and receiver. We describe how this novel technology and its several modalities could benefit the critical infrastructures of dams or hydropower facilities. The presented discussions may be viewed as a precursor to a quantum cybersecurity roadmap for the identification of relevant threats and mitigation. |
|---|---|
| AbstractList | Hydropower facilities are often remotely monitored or controlled from a centralized remote control room. Additionally, major component manufacturers monitor the performance of installed components, increasingly via public communication infrastructures. While these communications enable efficiencies and increased reliability, they also expand the cyber-attack surface. Communications may use the internet to remote control a facility’s control systems, or it may involve sending control commands over a network from a control room to a machine. The content could be encrypted and decrypted using a public key to protect the communicated information. These cryptographic encoding and decoding schemes become vulnerable as more advances are made in computer technologies, such as quantum computing. In contrast, quantum key distribution (QKD) and other quantum cryptographic protocols are not based upon a computational problem, and offer an alternative to symmetric cryptography in some scenarios. Although the underlying mechanism of quantum cryptogrpahic protocols such as QKD ensure that any attempt by an adversary to observe the quantum part of the protocol will result in a detectable signature as an increased error rate, potentially even preventing key generation, it serves as a warning for further investigation. In QKD, when the error rate is low enough and enough photons have been detected, a shared private key can be generated known only to the sender and receiver. We describe how this novel technology and its several modalities could benefit the critical infrastructures of dams or hydropower facilities. The presented discussions may be viewed as a precursor to a quantum cybersecurity roadmap for the identification of relevant threats and mitigation. Hydropower facilities are often remotely monitored or controlled from a centralized remote control room. Additionally, major component manufacturers monitor the performance of installed components, increasingly via public communication infrastructures. While these communications enable efficiencies and increased reliability, they also expand the cyber-attack surface. Communications may use the internet to remote control a facility's control systems, or it may involve sending control commands over a network from a control room to a machine. The content could be encrypted and decrypted using a public key to protect the communicated information. These cryptographic encoding and decoding schemes become vulnerable as more advances are made in computer technologies, such as quantum computing. In contrast, quantum key distribution (QKD) and other quantum cryptographic protocols are not based upon a computational problem, and offer an alternative to symmetric cryptography in some scenarios. Although the underlying mechanism of quantum cryptogrpahic protocols such as QKD ensure that any attempt by an adversary to observe the quantum part of the protocol will result in a detectable signature as an increased error rate, potentially even preventing key generation, it serves as a warning for further investigation. In QKD, when the error rate is low enough and enough photons have been detected, a shared private key can be generated known only to the sender and receiver. We describe how this novel technology and its several modalities could benefit the critical infrastructures of dams or hydropower facilities. The presented discussions may be viewed as a precursor to a quantum cybersecurity roadmap for the identification of relevant threats and mitigation.Hydropower facilities are often remotely monitored or controlled from a centralized remote control room. Additionally, major component manufacturers monitor the performance of installed components, increasingly via public communication infrastructures. While these communications enable efficiencies and increased reliability, they also expand the cyber-attack surface. Communications may use the internet to remote control a facility's control systems, or it may involve sending control commands over a network from a control room to a machine. The content could be encrypted and decrypted using a public key to protect the communicated information. These cryptographic encoding and decoding schemes become vulnerable as more advances are made in computer technologies, such as quantum computing. In contrast, quantum key distribution (QKD) and other quantum cryptographic protocols are not based upon a computational problem, and offer an alternative to symmetric cryptography in some scenarios. Although the underlying mechanism of quantum cryptogrpahic protocols such as QKD ensure that any attempt by an adversary to observe the quantum part of the protocol will result in a detectable signature as an increased error rate, potentially even preventing key generation, it serves as a warning for further investigation. In QKD, when the error rate is low enough and enough photons have been detected, a shared private key can be generated known only to the sender and receiver. We describe how this novel technology and its several modalities could benefit the critical infrastructures of dams or hydropower facilities. The presented discussions may be viewed as a precursor to a quantum cybersecurity roadmap for the identification of relevant threats and mitigation. |
| Audience | Academic |
| Author | Green, Adrien Siopsis, George Passian, Ali Lawrence, Jeremy Peters, Nicholas A. |
| AuthorAffiliation | 2 Electric Power Research Institute, Charlotte, NC 28262, USA; jlawrence@epri.com 1 Department of Physics and Astronomy, The University of Tennessee, Knoxville, TN 37996, USA; agreen91@vols.utk.edu (A.G.); siopsis@tennessee.edu (G.S.) 3 Quantum Information Science Section, Computational Sciences and Engineering Division, Oak Ridge National Laboratory, Oak Ridge, TN 37831, USA; petersna@ornl.gov |
| AuthorAffiliation_xml | – name: 1 Department of Physics and Astronomy, The University of Tennessee, Knoxville, TN 37996, USA; agreen91@vols.utk.edu (A.G.); siopsis@tennessee.edu (G.S.) – name: 3 Quantum Information Science Section, Computational Sciences and Engineering Division, Oak Ridge National Laboratory, Oak Ridge, TN 37831, USA; petersna@ornl.gov – name: 2 Electric Power Research Institute, Charlotte, NC 28262, USA; jlawrence@epri.com |
| Author_xml | – sequence: 1 givenname: Adrien orcidid: 0009-0005-4689-0437 surname: Green fullname: Green, Adrien – sequence: 2 givenname: Jeremy surname: Lawrence fullname: Lawrence, Jeremy – sequence: 3 givenname: George orcidid: 0000-0002-1466-2772 surname: Siopsis fullname: Siopsis, George – sequence: 4 givenname: Nicholas A. orcidid: 0000-0002-7215-9630 surname: Peters fullname: Peters, Nicholas A. – sequence: 5 givenname: Ali orcidid: 0000-0002-4736-4157 surname: Passian fullname: Passian, Ali |
| BackLink | https://www.ncbi.nlm.nih.gov/pubmed/38139664$$D View this record in MEDLINE/PubMed https://www.osti.gov/servlets/purl/2336680$$D View this record in Osti.gov |
| BookMark | eNptkl1vFCEUhiemxn7ohX_ATPRGL7ZlgGGgN6bZqt3YRI31mjBw2GUzCyvM2My_l-nWTdsYLjjhPOflvHCOiwMfPBTF6wqdEiLQWcIEU8Er_qw4qiimM44xOngQHxbHKa0RwoQQ_qI4JLwigjF6VPgfg_L9sCm_wlheutRH1w69C760IZbz6HqnVVcuvI0qJwfdDxHSeXkTblU0qZyPLcTZ99WY7rifoIdcM95VX40mhm24hVgqb8pLtUkvi-dWdQle3e8nxa_Pn27mV7Prb18W84vrma4J62cEG7CC69aquqbKklbkADBXhgmtsaIcRNMS05q6ASMQIM4MUMsZw7ppyEmx2OmaoNZyG91GxVEG5eTdQYhLqWK21oFsWoZtRVuoTUUtsy2qawGCta1CVNhJ6-NOazu0GzAafB9V90j0cca7lVyGP7JCDeWYkqzwdqcQUu9k0q4HvdLBe9C9zH_CGEcZen9_TQy_B0i93LikoeuUhzAkiUVuDLMKTei7J-g6DNHnB50oKkhFxUSd7qilyjadtyF3p_MysHH5drAun180jcCcUsJzwZuHRvcO_01LBj7sAB1DShHsHqmQnCZR7icxs2dP2GxbTZOVu3Ddfyr-AjZs4Ds |
| CitedBy_id | crossref_primary_10_1007_s11227_025_07758_x crossref_primary_10_1103_PhysRevA_111_042626 crossref_primary_10_3390_fi16080275 crossref_primary_10_1016_j_compeleceng_2025_110366 crossref_primary_10_3390_info15040173 |
| Cites_doi | 10.34133/adi.0019 10.1063/1.1738173 10.3390/physics4010009 10.1038/npjqi.2016.25 10.1080/01430750.2018.1531258 10.1088/1367-2630/11/10/105001 10.1007/s11467-007-0050-3 10.1109/TCOMM.2023.3255900 10.1093/oso/9780198501770.001.0001 10.3390/s21134272 10.6028/NIST.GCR.16-010 10.1088/1367-2630/8/9/193 10.34133/research.0065 10.1103/PhysRevLett.112.040502 10.1109/PDGC.2018.8745822 10.1038/s41598-020-77459-3 10.1109/JSYST.2020.3024956 10.1016/j.matpr.2020.04.842 10.1038/s41598-022-16090-w 10.1021/nn204999j 10.1109/ACCESS.2021.3070222 10.1007/s43673-023-00076-5 10.1364/OE.19.003004 10.1038/s43247-022-00629-w 10.1103/PhysRevA.103.032614 10.1109/MC.2011.115 10.2139/ssrn.3769123 10.1088/1742-6596/2086/1/012092 10.1038/nature23655 10.1007/978-3-030-73991-1 10.1088/1367-2630/12/10/103042 10.1109/TCSI.2021.3087777 10.1007/978-3-030-46908-5 10.1364/OE.25.027923 10.3390/s21216978 10.1109/OJCOMS.2021.3106659 10.3390/s19184048 10.1177/16878132221101023 10.1038/s41566-021-00928-2 10.1103/PhysRevLett.94.230504 10.3390/ijerph182413051 10.34133/2022/9861078 10.3390/geosciences9040187 10.1109/NCCC57165.2022.10067433 10.1063/1.2760135 10.1038/s42005-022-00831-4 10.1103/PhysRevA.89.022307 10.34133/research.0193 10.1038/s41586-020-2401-y 10.1103/RevModPhys.81.1301 10.1016/j.tej.2020.106833 10.1103/PhysRevLett.95.200502 10.2172/1764035 10.1088/1367-2630/11/4/045012 10.1007/s43673-021-00017-0 |
| ContentType | Journal Article |
| Copyright | COPYRIGHT 2023 MDPI AG 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. 2023 by the authors. 2023 |
| Copyright_xml | – notice: COPYRIGHT 2023 MDPI AG – notice: 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: 2023 by the authors. 2023 |
| CorporateAuthor | Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States) |
| CorporateAuthor_xml | – name: Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States) |
| DBID | AAYXX CITATION NPM 3V. 7X7 7XB 88E 8FI 8FJ 8FK ABUWG AFKRA AZQEC BENPR CCPQU DWQXO FYUFA GHDGH K9. M0S M1P PHGZM PHGZT PIMPY PJZUB PKEHL PPXIY PQEST PQQKQ PQUKI 7X8 OIOZB OTOTI 5PM DOA |
| DOI | 10.3390/s23249818 |
| DatabaseName | CrossRef PubMed ProQuest Central (Corporate) Health & Medical Collection ProQuest Central (purchase pre-March 2016) Medical Database (Alumni Edition) Hospital Premium Collection Hospital Premium Collection (Alumni Edition) ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials - QC ProQuest Central ProQuest One ProQuest Central Health Research Premium Collection Health Research Premium Collection (Alumni) ProQuest Health & Medical Complete (Alumni) Health & Medical Collection (Alumni) Medical Database ProQuest Central Premium ProQuest One Academic (New) ProQuest Publicly Available Content Database ProQuest Health & Medical Research Collection ProQuest One Academic Middle East (New) One Health & Nursing ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic (retired) ProQuest One Academic UKI Edition MEDLINE - Academic OSTI.GOV - Hybrid OSTI.GOV PubMed Central (Full Participant titles) DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef PubMed Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest Health & Medical Complete (Alumni) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest One Health & Nursing ProQuest Central ProQuest Health & Medical Research Collection Health Research Premium Collection Health and Medicine Complete (Alumni Edition) ProQuest Central Korea Health & Medical Research Collection ProQuest Central (New) ProQuest Medical Library (Alumni) ProQuest One Academic Eastern Edition ProQuest Hospital Collection Health Research Premium Collection (Alumni) ProQuest Hospital Collection (Alumni) ProQuest Health & Medical Complete ProQuest Medical Library ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) MEDLINE - Academic |
| DatabaseTitleList | Publicly Available Content Database MEDLINE - Academic CrossRef PubMed |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 3 dbid: PIMPY name: Publicly Available Content Database url: http://search.proquest.com/publiccontent sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1424-8220 |
| ExternalDocumentID | oai_doaj_org_article_7b62f14be5d14f6fb0559e96bba049f7 PMC10748243 2336680 A779284438 38139664 10_3390_s23249818 |
| Genre | Journal Article |
| GeographicLocations | Germany |
| GeographicLocations_xml | – name: Germany |
| GrantInformation_xml | – fundername: U.S. Department of Energy (DOE) – fundername: Office of Cybersecurity Energy Security and Emergency Response (CESER) – fundername: NSF grantid: DGE-2152168 – fundername: Oak Ridge National Laboratory (ORNL) grantid: DE-FG2-13ER41967 – fundername: Army Research Office grantid: W911NF-19-1-0397 |
| GroupedDBID | --- 123 2WC 53G 5VS 7X7 88E 8FE 8FG 8FI 8FJ AADQD AAHBH AAYXX ABDBF ABUWG ACUHS ADBBV ADMLS AENEX AFFHD AFKRA AFZYC ALMA_UNASSIGNED_HOLDINGS BENPR BPHCQ BVXVI CCPQU CITATION CS3 D1I DU5 E3Z EBD ESX F5P FYUFA GROUPED_DOAJ GX1 HH5 HMCUK HYE IAO ITC KQ8 L6V M1P M48 MODMG M~E OK1 OVT P2P P62 PHGZM PHGZT PIMPY PJZUB PPXIY PQQKQ PROAC PSQYO RNS RPM TUS UKHRP XSB ~8M ALIPV NPM 3V. 7XB 8FK AZQEC DWQXO K9. PKEHL PQEST PQUKI 7X8 ABJCF ARAPS HCIFZ KB. M7S OIOZB OTOTI PDBOC RIG 5PM |
| ID | FETCH-LOGICAL-c536t-32def98cbfa554af3b9a55e28ad69cc2a48e97b3dbd57ed90e086de4f8662c773 |
| IEDL.DBID | PIMPY |
| ISICitedReferencesCount | 5 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001139856300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1424-8220 |
| IngestDate | Tue Oct 14 18:49:06 EDT 2025 Tue Nov 04 02:06:09 EST 2025 Mon Apr 29 05:37:02 EDT 2024 Sun Nov 09 13:58:36 EST 2025 Tue Oct 07 07:46:08 EDT 2025 Tue Nov 04 18:28:48 EST 2025 Mon Jul 21 05:31:04 EDT 2025 Sat Nov 29 07:18:48 EST 2025 Tue Nov 18 22:02:32 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 24 |
| Keywords | critical infrastructure hydropower QKD post-processing cyber-physical security quantum key distribution QKD dams quantum security |
| Language | English |
| License | Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c536t-32def98cbfa554af3b9a55e28ad69cc2a48e97b3dbd57ed90e086de4f8662c773 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 AC05-00OR22725; FG2-13ER41967; W911NF-19-1-0397; DGE-2152168 National Science Foundation (NSF) USDOE Laboratory Directed Research and Development (LDRD) Program US Army Research Office (ARO) USDOE Office of Cybersecurity, Energy Security, and Emergency Response (CESER) |
| ORCID | 0000-0002-1466-2772 0009-0005-4689-0437 0000-0002-7215-9630 0000-0002-4736-4157 0000000214662772 0000000247364157 0009000546890437 0000000272159630 |
| OpenAccessLink | https://www.proquest.com/publiccontent/docview/2904931490?pq-origsite=%requestingapplication% |
| PMID | 38139664 |
| PQID | 2904931490 |
| PQPubID | 2032333 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_7b62f14be5d14f6fb0559e96bba049f7 pubmedcentral_primary_oai_pubmedcentral_nih_gov_10748243 osti_scitechconnect_2336680 proquest_miscellaneous_2905526100 proquest_journals_2904931490 gale_infotracacademiconefile_A779284438 pubmed_primary_38139664 crossref_primary_10_3390_s23249818 crossref_citationtrail_10_3390_s23249818 |
| PublicationCentury | 2000 |
| PublicationDate | 20231214 |
| PublicationDateYYYYMMDD | 2023-12-14 |
| PublicationDate_xml | – month: 12 year: 2023 text: 20231214 day: 14 |
| PublicationDecade | 2020 |
| PublicationPlace | Switzerland |
| PublicationPlace_xml | – name: Switzerland – name: Basel – name: United States |
| PublicationTitle | Sensors (Basel, Switzerland) |
| PublicationTitleAlternate | Sensors (Basel) |
| PublicationYear | 2023 |
| Publisher | MDPI AG MDPI |
| Publisher_xml | – name: MDPI AG – name: MDPI |
| References | ref_50 ref_14 Baron (ref_30) 2022; 14 Philippe (ref_33) 2020; 10 ref_56 Mekhtiev (ref_59) 2021; 2086 Zhu (ref_66) 2021; 68 Bloom (ref_68) 2022; 4 ref_10 ref_54 ref_53 Ijaz (ref_34) 2022; 2022 Lim (ref_55) 2014; 89 ref_51 Zhang (ref_36) 2023; 4 Kong (ref_52) 2020; 16 ref_15 Yuan (ref_25) 2007; 91 Evans (ref_13) 2021; 9 ref_61 ref_60 Chen (ref_8) 2011; 44 Singh (ref_4) 2020; 28 ref_69 ref_22 Farahi (ref_11) 2012; 6 Dunjko (ref_16) 2014; 112 ref_62 Moschandreou (ref_57) 2021; 103 Cao (ref_19) 2023; 6 ref_29 Scherer (ref_45) 2011; 19 Alshowkan (ref_12) 2022; 12 Diamanti (ref_21) 2016; 2 Ratnam (ref_5) 2020; 33 Wang (ref_40) 2022; 16 Qi (ref_44) 2010; 12 ref_70 Chen (ref_17) 2005; 95 Rosenberg (ref_26) 2005; 7 Kwek (ref_35) 2021; 31 (ref_47) 2000; 61 Scarani (ref_23) 2009; 81 Liao (ref_41) 2017; 549 ref_32 Yin (ref_42) 2020; 582 Peters (ref_64) 2009; 11 Gobby (ref_24) 2004; 84 Ding (ref_58) 2017; 25 ref_38 Bharani (ref_39) 2021; 42 Hua (ref_67) 2023; 71 Mohanta (ref_31) 2017; 20 Ouellet (ref_28) 2022; 3 Hiskett (ref_27) 2007; 8 Sharma (ref_43) 2021; 2 ref_1 Long (ref_18) 2007; 2 Rothe (ref_20) 2023; 6 ref_3 ref_2 Wang (ref_37) 2023; 33 Makarov (ref_48) 2006; 30 ref_49 Li (ref_63) 2022; 5 ref_9 Lo (ref_46) 2005; 94 Chapuran (ref_65) 2009; 11 ref_7 ref_6 |
| References_xml | – volume: 4 start-page: 19 year: 2023 ident: ref_36 article-title: High-Sensitivity Force Sensors Based on Novel Materials publication-title: Adv. Devices Instrum. doi: 10.34133/adi.0019 – ident: ref_9 – volume: 84 start-page: 3762 year: 2004 ident: ref_24 article-title: Quantum key distribution over 122 km of standard telecom fiber publication-title: Appl. Phys. Lett. doi: 10.1063/1.1738173 – volume: 4 start-page: 104 year: 2022 ident: ref_68 article-title: Quantum Cryptography–A Simplified Undergraduate Experiment and Simulation publication-title: Physics doi: 10.3390/physics4010009 – volume: 2 start-page: 16025 year: 2016 ident: ref_21 article-title: Practical challenges in quantum key distribution publication-title: NPJ Quantum Inf. doi: 10.1038/npjqi.2016.25 – volume: 42 start-page: 203 year: 2021 ident: ref_39 article-title: A nonlinear load frequency controller for hydropower plants publication-title: Int. J. Ambient. Energy doi: 10.1080/01430750.2018.1531258 – volume: 11 start-page: 105001 year: 2009 ident: ref_65 article-title: Optical networking for quantum key distribution and quantum communications publication-title: New J. Phys. doi: 10.1088/1367-2630/11/10/105001 – volume: 2 start-page: 251 year: 2007 ident: ref_18 article-title: Quantum secure direct communication and deterministic secure quantum communication publication-title: Front. Phys. China doi: 10.1007/s11467-007-0050-3 – volume: 71 start-page: 3103 year: 2023 ident: ref_67 article-title: Channel Modeling for UAV-to-Ground Communications With Posture Variation and Fuselage Scattering Effect publication-title: IEEE Trans. Commun. doi: 10.1109/TCOMM.2023.3255900 – ident: ref_70 doi: 10.1093/oso/9780198501770.001.0001 – ident: ref_62 doi: 10.3390/s21134272 – ident: ref_7 doi: 10.6028/NIST.GCR.16-010 – ident: ref_61 – volume: 8 start-page: 193 year: 2007 ident: ref_27 article-title: Long-distance quantum key distribution in optical fibre publication-title: New J. Phys. doi: 10.1088/1367-2630/8/9/193 – volume: 6 start-page: 65 year: 2023 ident: ref_20 article-title: Securing Data in Multimode Fibers by Exploiting Mode-Dependent Light Propagation Effects publication-title: Research doi: 10.34133/research.0065 – volume: 112 start-page: 040502 year: 2014 ident: ref_16 article-title: Quantum Digital Signatures without Quantum Memory publication-title: Phys. Rev. Lett. doi: 10.1103/PhysRevLett.112.040502 – ident: ref_50 doi: 10.1109/PDGC.2018.8745822 – volume: 10 start-page: 20605 year: 2020 ident: ref_33 article-title: A physical unclonable neutron sensor for nuclear arms control inspections publication-title: Sci. Rep. doi: 10.1038/s41598-020-77459-3 – volume: 16 start-page: 41 year: 2020 ident: ref_52 article-title: A review of quantum key distribution protocols in the perspective of smart grid communication security publication-title: IEEE Syst. J. doi: 10.1109/JSYST.2020.3024956 – ident: ref_56 – volume: 28 start-page: 1569 year: 2020 ident: ref_4 article-title: Sustainability of maintenance management practices in hydropower plant: A conceptual framework publication-title: Mater. Today Proc. doi: 10.1016/j.matpr.2020.04.842 – ident: ref_69 – volume: 12 start-page: 12731 year: 2022 ident: ref_12 article-title: Authentication of smart grid communications using quantum key distribution publication-title: Sci. Rep. doi: 10.1038/s41598-022-16090-w – volume: 6 start-page: 4548 year: 2012 ident: ref_11 article-title: Critical issues in sensor science to aid food and water safety publication-title: ACS Nano doi: 10.1021/nn204999j – volume: 9 start-page: 105220 year: 2021 ident: ref_13 article-title: Trusted Node QKD at an Electrical Utility publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3070222 – volume: 33 start-page: 5 year: 2023 ident: ref_37 article-title: Squeezing for cosmic symphony publication-title: AAPPS Bull. doi: 10.1007/s43673-023-00076-5 – volume: 19 start-page: 3004 year: 2011 ident: ref_45 article-title: Long-distance practical quantum key distribution by entanglement swapping publication-title: Opt. Express doi: 10.1364/OE.19.003004 – volume: 3 start-page: 301 year: 2022 ident: ref_28 article-title: Advanced monitoring of tailings dam performance using seismic noise and stress models publication-title: Commun. Earth Environ. doi: 10.1038/s43247-022-00629-w – volume: 103 start-page: 032614 year: 2021 ident: ref_57 article-title: Experimental decoy-state Bennett-Brassard 1984 quantum key distribution through a turbulent channel publication-title: Phys. Rev. A doi: 10.1103/PhysRevA.103.032614 – volume: 44 start-page: 91 year: 2011 ident: ref_8 article-title: Lessons from Stuxnet publication-title: Computer doi: 10.1109/MC.2011.115 – ident: ref_22 doi: 10.2139/ssrn.3769123 – volume: 2086 start-page: 012092 year: 2021 ident: ref_59 article-title: Polarization control algorithm for QKD systems publication-title: Proc. J. Phys. Conf. Ser. doi: 10.1088/1742-6596/2086/1/012092 – ident: ref_53 – volume: 549 start-page: 43 year: 2017 ident: ref_41 article-title: Satellite-to-ground quantum key distribution publication-title: Nature doi: 10.1038/nature23655 – ident: ref_49 doi: 10.1007/978-3-030-73991-1 – volume: 12 start-page: 103042 year: 2010 ident: ref_44 article-title: Feasibility of quantum key distribution through a dense wavelength division multiplexing network publication-title: New J. Phys. doi: 10.1088/1367-2630/12/10/103042 – volume: 68 start-page: 3951 year: 2021 ident: ref_66 article-title: A Real-Time Hardware Emulator for 3D Non-Stationary U2V Channels publication-title: IEEE Trans. Circuits Syst. I Regul. Pap. doi: 10.1109/TCSI.2021.3087777 – ident: ref_1 doi: 10.1007/978-3-030-46908-5 – volume: 25 start-page: 27923 year: 2017 ident: ref_58 article-title: Polarization variations in installed fibers and their influence on quantum key distribution systems publication-title: Opt. Express doi: 10.1364/OE.25.027923 – ident: ref_3 – volume: 30 start-page: 1043 year: 2006 ident: ref_48 article-title: Optical attacks on practical continuous-variable quantum key distribution systems (or ‘how to hack a quantum cryptosystem’) publication-title: Opt. Lett. – ident: ref_51 doi: 10.3390/s21216978 – volume: 2 start-page: 2049 year: 2021 ident: ref_43 article-title: Quantum Key Distribution Secured Optical Networks: A Survey publication-title: IEEE Open J. Commun. Soc. doi: 10.1109/OJCOMS.2021.3106659 – ident: ref_10 doi: 10.3390/s19184048 – ident: ref_14 – volume: 14 start-page: 16878132221101023 year: 2022 ident: ref_30 article-title: Vibrodiagnostics as a predictive maintenance tool in the operation of turbo generators of a small hydropower plant publication-title: Adv. Mech. Eng. doi: 10.1177/16878132221101023 – volume: 16 start-page: 154 year: 2022 ident: ref_40 article-title: Twin-field quantum key distribution over 830-km fibre publication-title: Nat. Photonics doi: 10.1038/s41566-021-00928-2 – volume: 61 start-page: 052304 year: 2000 ident: ref_47 article-title: Security against eavesdropping in quantum cryptography publication-title: Phys. Rev. A – volume: 94 start-page: 230504 year: 2005 ident: ref_46 article-title: Decoy state quantum key distribution publication-title: Phys. Rev. Lett. doi: 10.1103/PhysRevLett.94.230504 – ident: ref_32 doi: 10.3390/ijerph182413051 – volume: 2022 start-page: 9861078 year: 2022 ident: ref_34 article-title: The Dawn of Metadevices: From Contemporary Designs to Exotic Applications publication-title: Adv. Devices Instrum. doi: 10.34133/2022/9861078 – ident: ref_54 – ident: ref_2 – ident: ref_29 doi: 10.3390/geosciences9040187 – volume: 20 start-page: 637 year: 2017 ident: ref_31 article-title: Sources of vibration and their treatment in hydro power stations-A review publication-title: Eng. Sci. Technol. Int. J. – ident: ref_6 doi: 10.1109/NCCC57165.2022.10067433 – volume: 91 start-page: 041114 year: 2007 ident: ref_25 article-title: High speed single photon detection in the near infrared publication-title: Appl. Phys. Lett. doi: 10.1063/1.2760135 – ident: ref_15 – volume: 5 start-page: 53 year: 2022 ident: ref_63 article-title: Improving the performance of practical decoy-state quantum key distribution with advantage distillation technology publication-title: Commun. Phys. doi: 10.1038/s42005-022-00831-4 – volume: 89 start-page: 022307 year: 2014 ident: ref_55 article-title: Concise security bounds for practical decoy-state quantum key distribution publication-title: Phys. Rev. doi: 10.1103/PhysRevA.89.022307 – volume: 6 start-page: 193 year: 2023 ident: ref_19 article-title: Realization of Quantum Secure Direct Communication with Continuous Variable publication-title: Research doi: 10.34133/research.0193 – volume: 582 start-page: 501 year: 2020 ident: ref_42 article-title: Entanglement-based secure quantum cryptography over 1120 kilometres publication-title: Nature doi: 10.1038/s41586-020-2401-y – volume: 81 start-page: 1301 year: 2009 ident: ref_23 article-title: The security of practical quantum key distribution publication-title: Rev. Mod. Phys. doi: 10.1103/RevModPhys.81.1301 – volume: 33 start-page: 106833 year: 2020 ident: ref_5 article-title: Electricity system resilience in a world of increased climate change and cybersecurity risk publication-title: Electr. J. doi: 10.1016/j.tej.2020.106833 – ident: ref_60 – volume: 95 start-page: 200502 year: 2005 ident: ref_17 article-title: Experimental Quantum Secret Sharing and Third-Man Quantum Cryptography publication-title: Phys. Rev. Lett. doi: 10.1103/PhysRevLett.95.200502 – volume: 7 start-page: 71 year: 2005 ident: ref_26 article-title: Practical long-distance quantum key distribution system using decoy levels publication-title: New J. Phys. – ident: ref_38 doi: 10.2172/1764035 – volume: 11 start-page: 045012 year: 2009 ident: ref_64 article-title: Dense wavelength multiplexing of 1550 nm QKD with strong classical channels in reconfigurable networking environments publication-title: New J. Phys. doi: 10.1088/1367-2630/11/4/045012 – volume: 31 start-page: 15 year: 2021 ident: ref_35 article-title: Chip-based quantum key distribution publication-title: AAPPS Bull. doi: 10.1007/s43673-021-00017-0 |
| SSID | ssj0023338 |
| Score | 2.4611835 |
| Snippet | Hydropower facilities are often remotely monitored or controlled from a centralized remote control room. Additionally, major component manufacturers monitor... |
| SourceID | doaj pubmedcentral osti proquest gale pubmed crossref |
| SourceType | Open Website Open Access Repository Aggregation Database Index Database Enrichment Source |
| StartPage | 9818 |
| SubjectTerms | Communication Connectivity Control systems critical infrastructure Cryptography cyber-physical security Cybersecurity Cyberterrorism Dams Digital signatures Germany Hydroelectric power Hydroelectric power plants hydropower Infrastructure Infrastructure (Economics) Internet MATHEMATICS AND COMPUTING Modernization QKD QKD post-processing quantum key distribution quantum security R&D Remote control Research & development Technology Water-power |
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1da9RAFB1k8UEfxG_XVhlF0JfQJJPMh2-1tVSUUrFC34b5pAWblc1uy_57zyTZsCsFX3xbdu6SzL3n7txDbs4l5J0zDudYAC0xEgSFFSazyhUZzh7giavoTRfpb-LkRJ6fq9ONUV-pJ6yXB-4dtycsL2NR2VD7ooo82hw1cFDcWoPiNnbvkedCrcnUQLUYmFevI8RA6vfaVDcomSZ7bJw-nUj_-Fc8mSGnbqsz_26X3Dh_jh6SB0PhSPf7G35E7oTmMbm_ISf4hDTfl_DT8op-DSt6mBRxh2FWFJUpXQ81oF-aODe9buwSZPsjPetaZ1t6sLJhnp0OkaM_htF23a-PVz7NU7gJc2oaTw_NVfuU_Dz6fHZwnA3zFDJXM77IWOlDVNLZaFBEmMiswodQSuO5cq40lQxKWOatr0XwKg_gOz5UUXJeOiHYMzJpZk14QWglI8utYjayWAkRjUXhgRDxXFifx2pKPqz9rN0gNp5mXvzSIB0pJHoMyZS8HU1_9wobtxl9SsEaDZIodvcFoKIHqOh_QWVK3qdQ65S6uBnAtH8DAVtKIlh6XwiF07piuNxOQoNGFZKkdF3qOXILDVhxLvMp2V2DRA8Z3-pS4RoMfBPLb8Zl5Gp6AGOaMFt2NnUNyprD5nmPqXFHqJwYqCc8J7fQtrXl7ZXm8qLTA089tbKs2Mv_4aQdcq9E_qSOnaLaJROgMbwid9314rKdv-6y7A8wHS_I priority: 102 providerName: Directory of Open Access Journals |
| Title | Quantum Key Distribution for Critical Infrastructures: Towards Cyber-Physical Security for Hydropower and Dams |
| URI | https://www.ncbi.nlm.nih.gov/pubmed/38139664 https://www.proquest.com/docview/2904931490 https://www.proquest.com/docview/2905526100 https://www.osti.gov/servlets/purl/2336680 https://pubmed.ncbi.nlm.nih.gov/PMC10748243 https://doaj.org/article/7b62f14be5d14f6fb0559e96bba049f7 |
| Volume | 23 |
| WOSCitedRecordID | wos001139856300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: DOA dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: M~E dateStart: 20010101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: Health & Medical Collection customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: 7X7 dateStart: 20010101 isFulltext: true titleUrlDefault: https://search.proquest.com/healthcomplete providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: BENPR dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: Publicly Available Content Database customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: PIMPY dateStart: 20010101 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9NAEF7RhAMceD9CS7QgJLhYcbzOPrigPlK1gkYBihROq322lahT4gSUC7-dWXtjElRx4mJF8UTZ9czOfp89_gahV0YZ2Mcc0BLFgaCQvkq0MP0E9h6IJyq8VZWnP7DRiE8mYhxfjy5jWeUqJ1aJulZ7DnXbkIR7dmrCHfNeJgDZEkD36bur70noIRWetcaGGluoHYS30hZqj49Pxl8bAkaAj9XqQgSofq8MaELw0O9jbU-qpPubBN2awkq7Dn3-XUS5tisd3v2_87mH7kR0infrcLqPbrjiAbq9pln4EBUfF-CMxSV-75b4IMjuxo5ZGOAvXnVOwMeFn6lanHYBjP4tPq3qc0u8v9RuloxjeODPsX9e9eujpQ1NG366GVaFxQfqsnyEvhwOT_ePkti0ITEDQucJyazzghvtFSAV5YkW8MFlXFkqjMlUzp1gmlhtB8xZkTogVdblnlOaGcbIY9QqpoV7inDOPUm1INoTnzPmlQZ04waWpkzb1Ocd9GblNmmionlorPFNArMJHpaNhzvoZWN6Vct4XGe0F3zfGATl7eqL6exMxoUsmaaZ7-caxtHPPfU6BU7mBNVagQs966DXIXJkyA8wGFgL9WsOMKWgtCV3GRMACXICf7cdgksC1Al6vSYUNpm5hCillKcdtLOKGxnTSin_hEkHvWhOQ0IIT3lU4aaLymYwAF6cgs2TOkSbGQE8I8Bv4crxjeDdmPLmmeLivBIdD4W7PMvJs3-PaxvdymChhYKffr6DWhBn7jm6aX7ML8pZF22xCauOvIvae8PR-FO3ugsCx5Nfw25csL8BvwZPxg |
| linkProvider | ProQuest |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9NAEF6VFAk48H6EFlgQCC5Wbe_G60VCqDRUiZpGQQSpnJZ9QiXqFDuhyp_iNzLrFwmquPXALYonya79zcw38fgbhJ5rqSGPWShLZAoFColkoLiOAsg9gKeEOyPLKz1i43F6dMQnG-hX8yyMb6tsYmIZqM1M-__Id2IOXJYAnw_fnv4I_NQof3e1GaFRweLALs-gZCveDPtwfV_E8f776d4gqKcKBLpHknlAYmMdT7VyElKpdERxeGHjVJqEax1LmlrOFDHK9Jg1PLTA-o2lLk2SWDNG4HsvoU0KYA87aHMyPJx8bks8AhVfpV9ECA93Cs9XeOoniqxkvXI4QJsCOjPw5fP47d9tmit5b__G_3bGbqLrNcPGu5VL3EIbNruNrq3oLt5B2YcFAGpxgmFhuO-lg-upXxgoPG6mP-Bh5nJZCewuclu8xtOyx7jAe0tl82BSQxx_rGcAlp8eLI0fPHFmcywzg_vypLiLPl3Ihu-hTjbL7AOEaepIqDhRjjjKmJMKGJrtmSRkyoSOdtGrBhhC16rsfjjIdwHVmceQaDHURc9a09NKiuQ8o3ceXa2BVw8v35jlX0UdjARTSewiqmAdEXWJUyHUlZYnSkmAjGNd9NJjU_gYB4sBf64e1YAtebUwscsYB1pDCfzcloevALrmNYe1b87ScwF-kCRp2EXbDTJFHRoL8QeWXfS0PQxBzd-pkpmdLUqbXg9q-xBs7ldO0O4IKCaBGh3OXLrmHmtbXj-SHX8rhdN983EaU_Lw3-t6gq4MpocjMRqOD7bQ1Rjc2jcwRXQbdQBz9hG6rH_Oj4v8ce3-GH25aP_5DdTvnps |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9NAEF6VFCE48H6EFlgQCC5WHa-zDySE2qZRo1ZRgCL1tuwTKlGn2AlV_hq_jlm_SFDFrQduUbxJZu1vZr4vHs8g9NIoA3nMgSxRHAQK6alIC9OLIPcAnqjwVpVX-pCNx_z4WEzW0K_mWZhQVtnExDJQ26kJ_5FvJQK4LAE-H2_5uixiMhi-P_sRhQlS4U5rM06jgsiBW5yDfCvejQZwrV8lyXDvaHc_qicMRKZP6CwiiXVecKO9grSqPNECXriEK0uFMYlKuRNME6ttnzkrYgcKwLrUc0oTwxiB772C1hkB0dNB6zt748nHVu4RUH9VLyNCwOoicBfBw3SRpQxYDgpo00FnCn59Edf9u2RzKQcOb_3PZ-82ulkzb7xducodtOayu-jGUj_Geyj7MAegzU8xGIYHoaVwPQ0MA7XHzVQIPMp8rqrGu_PcFW_xUVl7XODdhXZ5NKmhjz_VswHLT-8vbBhIce5yrDKLB-q0uI8-X8qGH6BONs3cI4RT7kmsBdGe-JQxrzQwN9e3NGbaxj7tojcNSKSpu7WHoSHfJai2gCfZ4qmLXrRLz6oWJRct2glIaxeEruLlG9P8q6yDlGSaJr6XarCjl3rqdQx60wmqtQL4eNZFrwNOZYh9YAz4efUIB2wpdBGT24wJoDspgZ_bCFCWQONCL2ITirbMTIJPUMrjLtpsUCrrkFnIPxDtouftYQh24Q6Wytx0Xq7p90Hzx7DmYeUQ7Y6AehLQ7nDm-IqrrGx59Uh28q1sqB6KknmSksf_tusZugZOIw9H44MNdD0BDw91Tb10E3UAcu4Jump-zk6K_GkdCTD6ctnu8xukWac1 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Quantum+Key+Distribution+for+Critical+Infrastructures%3A+Towards+Cyber-Physical+Security+for+Hydropower+and+Dams&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Green%2C+Adrien&rft.au=Lawrence%2C+Jeremy&rft.au=Siopsis%2C+George&rft.au=Peters%2C+Nicholas+A.&rft.date=2023-12-14&rft.issn=1424-8220&rft.eissn=1424-8220&rft.volume=23&rft.issue=24&rft.spage=9818&rft_id=info:doi/10.3390%2Fs23249818&rft.externalDBID=n%2Fa&rft.externalDocID=10_3390_s23249818 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon |