Quantum Key Distribution for Critical Infrastructures: Towards Cyber-Physical Security for Hydropower and Dams

Hydropower facilities are often remotely monitored or controlled from a centralized remote control room. Additionally, major component manufacturers monitor the performance of installed components, increasingly via public communication infrastructures. While these communications enable efficiencies...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Sensors (Basel, Switzerland) Ročník 23; číslo 24; s. 9818
Hlavní autoři: Green, Adrien, Lawrence, Jeremy, Siopsis, George, Peters, Nicholas A., Passian, Ali
Médium: Journal Article
Jazyk:angličtina
Vydáno: Switzerland MDPI AG 14.12.2023
MDPI
Témata:
ISSN:1424-8220, 1424-8220
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Hydropower facilities are often remotely monitored or controlled from a centralized remote control room. Additionally, major component manufacturers monitor the performance of installed components, increasingly via public communication infrastructures. While these communications enable efficiencies and increased reliability, they also expand the cyber-attack surface. Communications may use the internet to remote control a facility’s control systems, or it may involve sending control commands over a network from a control room to a machine. The content could be encrypted and decrypted using a public key to protect the communicated information. These cryptographic encoding and decoding schemes become vulnerable as more advances are made in computer technologies, such as quantum computing. In contrast, quantum key distribution (QKD) and other quantum cryptographic protocols are not based upon a computational problem, and offer an alternative to symmetric cryptography in some scenarios. Although the underlying mechanism of quantum cryptogrpahic protocols such as QKD ensure that any attempt by an adversary to observe the quantum part of the protocol will result in a detectable signature as an increased error rate, potentially even preventing key generation, it serves as a warning for further investigation. In QKD, when the error rate is low enough and enough photons have been detected, a shared private key can be generated known only to the sender and receiver. We describe how this novel technology and its several modalities could benefit the critical infrastructures of dams or hydropower facilities. The presented discussions may be viewed as a precursor to a quantum cybersecurity roadmap for the identification of relevant threats and mitigation.
AbstractList Hydropower facilities are often remotely monitored or controlled from a centralized remote control room. Additionally, major component manufacturers monitor the performance of installed components, increasingly via public communication infrastructures. While these communications enable efficiencies and increased reliability, they also expand the cyber-attack surface. Communications may use the internet to remote control a facility’s control systems, or it may involve sending control commands over a network from a control room to a machine. The content could be encrypted and decrypted using a public key to protect the communicated information. These cryptographic encoding and decoding schemes become vulnerable as more advances are made in computer technologies, such as quantum computing. In contrast, quantum key distribution (QKD) and other quantum cryptographic protocols are not based upon a computational problem, and offer an alternative to symmetric cryptography in some scenarios. Although the underlying mechanism of quantum cryptogrpahic protocols such as QKD ensure that any attempt by an adversary to observe the quantum part of the protocol will result in a detectable signature as an increased error rate, potentially even preventing key generation, it serves as a warning for further investigation. In QKD, when the error rate is low enough and enough photons have been detected, a shared private key can be generated known only to the sender and receiver. We describe how this novel technology and its several modalities could benefit the critical infrastructures of dams or hydropower facilities. The presented discussions may be viewed as a precursor to a quantum cybersecurity roadmap for the identification of relevant threats and mitigation.
Hydropower facilities are often remotely monitored or controlled from a centralized remote control room. Additionally, major component manufacturers monitor the performance of installed components, increasingly via public communication infrastructures. While these communications enable efficiencies and increased reliability, they also expand the cyber-attack surface. Communications may use the internet to remote control a facility's control systems, or it may involve sending control commands over a network from a control room to a machine. The content could be encrypted and decrypted using a public key to protect the communicated information. These cryptographic encoding and decoding schemes become vulnerable as more advances are made in computer technologies, such as quantum computing. In contrast, quantum key distribution (QKD) and other quantum cryptographic protocols are not based upon a computational problem, and offer an alternative to symmetric cryptography in some scenarios. Although the underlying mechanism of quantum cryptogrpahic protocols such as QKD ensure that any attempt by an adversary to observe the quantum part of the protocol will result in a detectable signature as an increased error rate, potentially even preventing key generation, it serves as a warning for further investigation. In QKD, when the error rate is low enough and enough photons have been detected, a shared private key can be generated known only to the sender and receiver. We describe how this novel technology and its several modalities could benefit the critical infrastructures of dams or hydropower facilities. The presented discussions may be viewed as a precursor to a quantum cybersecurity roadmap for the identification of relevant threats and mitigation.Hydropower facilities are often remotely monitored or controlled from a centralized remote control room. Additionally, major component manufacturers monitor the performance of installed components, increasingly via public communication infrastructures. While these communications enable efficiencies and increased reliability, they also expand the cyber-attack surface. Communications may use the internet to remote control a facility's control systems, or it may involve sending control commands over a network from a control room to a machine. The content could be encrypted and decrypted using a public key to protect the communicated information. These cryptographic encoding and decoding schemes become vulnerable as more advances are made in computer technologies, such as quantum computing. In contrast, quantum key distribution (QKD) and other quantum cryptographic protocols are not based upon a computational problem, and offer an alternative to symmetric cryptography in some scenarios. Although the underlying mechanism of quantum cryptogrpahic protocols such as QKD ensure that any attempt by an adversary to observe the quantum part of the protocol will result in a detectable signature as an increased error rate, potentially even preventing key generation, it serves as a warning for further investigation. In QKD, when the error rate is low enough and enough photons have been detected, a shared private key can be generated known only to the sender and receiver. We describe how this novel technology and its several modalities could benefit the critical infrastructures of dams or hydropower facilities. The presented discussions may be viewed as a precursor to a quantum cybersecurity roadmap for the identification of relevant threats and mitigation.
Audience Academic
Author Green, Adrien
Siopsis, George
Passian, Ali
Lawrence, Jeremy
Peters, Nicholas A.
AuthorAffiliation 2 Electric Power Research Institute, Charlotte, NC 28262, USA; jlawrence@epri.com
1 Department of Physics and Astronomy, The University of Tennessee, Knoxville, TN 37996, USA; agreen91@vols.utk.edu (A.G.); siopsis@tennessee.edu (G.S.)
3 Quantum Information Science Section, Computational Sciences and Engineering Division, Oak Ridge National Laboratory, Oak Ridge, TN 37831, USA; petersna@ornl.gov
AuthorAffiliation_xml – name: 1 Department of Physics and Astronomy, The University of Tennessee, Knoxville, TN 37996, USA; agreen91@vols.utk.edu (A.G.); siopsis@tennessee.edu (G.S.)
– name: 3 Quantum Information Science Section, Computational Sciences and Engineering Division, Oak Ridge National Laboratory, Oak Ridge, TN 37831, USA; petersna@ornl.gov
– name: 2 Electric Power Research Institute, Charlotte, NC 28262, USA; jlawrence@epri.com
Author_xml – sequence: 1
  givenname: Adrien
  orcidid: 0009-0005-4689-0437
  surname: Green
  fullname: Green, Adrien
– sequence: 2
  givenname: Jeremy
  surname: Lawrence
  fullname: Lawrence, Jeremy
– sequence: 3
  givenname: George
  orcidid: 0000-0002-1466-2772
  surname: Siopsis
  fullname: Siopsis, George
– sequence: 4
  givenname: Nicholas A.
  orcidid: 0000-0002-7215-9630
  surname: Peters
  fullname: Peters, Nicholas A.
– sequence: 5
  givenname: Ali
  orcidid: 0000-0002-4736-4157
  surname: Passian
  fullname: Passian, Ali
BackLink https://www.ncbi.nlm.nih.gov/pubmed/38139664$$D View this record in MEDLINE/PubMed
https://www.osti.gov/servlets/purl/2336680$$D View this record in Osti.gov
BookMark eNptkl1vFCEUhiemxn7ohX_ATPRGL7ZlgGGgN6bZqt3YRI31mjBw2GUzCyvM2My_l-nWTdsYLjjhPOflvHCOiwMfPBTF6wqdEiLQWcIEU8Er_qw4qiimM44xOngQHxbHKa0RwoQQ_qI4JLwigjF6VPgfg_L9sCm_wlheutRH1w69C760IZbz6HqnVVcuvI0qJwfdDxHSeXkTblU0qZyPLcTZ99WY7rifoIdcM95VX40mhm24hVgqb8pLtUkvi-dWdQle3e8nxa_Pn27mV7Prb18W84vrma4J62cEG7CC69aquqbKklbkADBXhgmtsaIcRNMS05q6ASMQIM4MUMsZw7ppyEmx2OmaoNZyG91GxVEG5eTdQYhLqWK21oFsWoZtRVuoTUUtsy2qawGCta1CVNhJ6-NOazu0GzAafB9V90j0cca7lVyGP7JCDeWYkqzwdqcQUu9k0q4HvdLBe9C9zH_CGEcZen9_TQy_B0i93LikoeuUhzAkiUVuDLMKTei7J-g6DNHnB50oKkhFxUSd7qilyjadtyF3p_MysHH5drAun180jcCcUsJzwZuHRvcO_01LBj7sAB1DShHsHqmQnCZR7icxs2dP2GxbTZOVu3Ddfyr-AjZs4Ds
CitedBy_id crossref_primary_10_1007_s11227_025_07758_x
crossref_primary_10_1103_PhysRevA_111_042626
crossref_primary_10_3390_fi16080275
crossref_primary_10_1016_j_compeleceng_2025_110366
crossref_primary_10_3390_info15040173
Cites_doi 10.34133/adi.0019
10.1063/1.1738173
10.3390/physics4010009
10.1038/npjqi.2016.25
10.1080/01430750.2018.1531258
10.1088/1367-2630/11/10/105001
10.1007/s11467-007-0050-3
10.1109/TCOMM.2023.3255900
10.1093/oso/9780198501770.001.0001
10.3390/s21134272
10.6028/NIST.GCR.16-010
10.1088/1367-2630/8/9/193
10.34133/research.0065
10.1103/PhysRevLett.112.040502
10.1109/PDGC.2018.8745822
10.1038/s41598-020-77459-3
10.1109/JSYST.2020.3024956
10.1016/j.matpr.2020.04.842
10.1038/s41598-022-16090-w
10.1021/nn204999j
10.1109/ACCESS.2021.3070222
10.1007/s43673-023-00076-5
10.1364/OE.19.003004
10.1038/s43247-022-00629-w
10.1103/PhysRevA.103.032614
10.1109/MC.2011.115
10.2139/ssrn.3769123
10.1088/1742-6596/2086/1/012092
10.1038/nature23655
10.1007/978-3-030-73991-1
10.1088/1367-2630/12/10/103042
10.1109/TCSI.2021.3087777
10.1007/978-3-030-46908-5
10.1364/OE.25.027923
10.3390/s21216978
10.1109/OJCOMS.2021.3106659
10.3390/s19184048
10.1177/16878132221101023
10.1038/s41566-021-00928-2
10.1103/PhysRevLett.94.230504
10.3390/ijerph182413051
10.34133/2022/9861078
10.3390/geosciences9040187
10.1109/NCCC57165.2022.10067433
10.1063/1.2760135
10.1038/s42005-022-00831-4
10.1103/PhysRevA.89.022307
10.34133/research.0193
10.1038/s41586-020-2401-y
10.1103/RevModPhys.81.1301
10.1016/j.tej.2020.106833
10.1103/PhysRevLett.95.200502
10.2172/1764035
10.1088/1367-2630/11/4/045012
10.1007/s43673-021-00017-0
ContentType Journal Article
Copyright COPYRIGHT 2023 MDPI AG
2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
2023 by the authors. 2023
Copyright_xml – notice: COPYRIGHT 2023 MDPI AG
– notice: 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: 2023 by the authors. 2023
CorporateAuthor Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States)
CorporateAuthor_xml – name: Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States)
DBID AAYXX
CITATION
NPM
3V.
7X7
7XB
88E
8FI
8FJ
8FK
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
DWQXO
FYUFA
GHDGH
K9.
M0S
M1P
PHGZM
PHGZT
PIMPY
PJZUB
PKEHL
PPXIY
PQEST
PQQKQ
PQUKI
7X8
OIOZB
OTOTI
5PM
DOA
DOI 10.3390/s23249818
DatabaseName CrossRef
PubMed
ProQuest Central (Corporate)
Health & Medical Collection
ProQuest Central (purchase pre-March 2016)
Medical Database (Alumni Edition)
Hospital Premium Collection
Hospital Premium Collection (Alumni Edition)
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials - QC
ProQuest Central
ProQuest One
ProQuest Central
Health Research Premium Collection
Health Research Premium Collection (Alumni)
ProQuest Health & Medical Complete (Alumni)
Health & Medical Collection (Alumni)
Medical Database
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest Publicly Available Content Database
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
One Health & Nursing
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
MEDLINE - Academic
OSTI.GOV - Hybrid
OSTI.GOV
PubMed Central (Full Participant titles)
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
PubMed
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest Health & Medical Complete (Alumni)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest One Health & Nursing
ProQuest Central
ProQuest Health & Medical Research Collection
Health Research Premium Collection
Health and Medicine Complete (Alumni Edition)
ProQuest Central Korea
Health & Medical Research Collection
ProQuest Central (New)
ProQuest Medical Library (Alumni)
ProQuest One Academic Eastern Edition
ProQuest Hospital Collection
Health Research Premium Collection (Alumni)
ProQuest Hospital Collection (Alumni)
ProQuest Health & Medical Complete
ProQuest Medical Library
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
MEDLINE - Academic
DatabaseTitleList


Publicly Available Content Database

MEDLINE - Academic
CrossRef
PubMed
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: NPM
  name: PubMed
  url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 3
  dbid: PIMPY
  name: Publicly Available Content Database
  url: http://search.proquest.com/publiccontent
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1424-8220
ExternalDocumentID oai_doaj_org_article_7b62f14be5d14f6fb0559e96bba049f7
PMC10748243
2336680
A779284438
38139664
10_3390_s23249818
Genre Journal Article
GeographicLocations Germany
GeographicLocations_xml – name: Germany
GrantInformation_xml – fundername: U.S. Department of Energy (DOE)
– fundername: Office of Cybersecurity Energy Security and Emergency Response (CESER)
– fundername: NSF
  grantid: DGE-2152168
– fundername: Oak Ridge National Laboratory (ORNL)
  grantid: DE-FG2-13ER41967
– fundername: Army Research Office
  grantid: W911NF-19-1-0397
GroupedDBID ---
123
2WC
53G
5VS
7X7
88E
8FE
8FG
8FI
8FJ
AADQD
AAHBH
AAYXX
ABDBF
ABUWG
ACUHS
ADBBV
ADMLS
AENEX
AFFHD
AFKRA
AFZYC
ALMA_UNASSIGNED_HOLDINGS
BENPR
BPHCQ
BVXVI
CCPQU
CITATION
CS3
D1I
DU5
E3Z
EBD
ESX
F5P
FYUFA
GROUPED_DOAJ
GX1
HH5
HMCUK
HYE
IAO
ITC
KQ8
L6V
M1P
M48
MODMG
M~E
OK1
OVT
P2P
P62
PHGZM
PHGZT
PIMPY
PJZUB
PPXIY
PQQKQ
PROAC
PSQYO
RNS
RPM
TUS
UKHRP
XSB
~8M
ALIPV
NPM
3V.
7XB
8FK
AZQEC
DWQXO
K9.
PKEHL
PQEST
PQUKI
7X8
ABJCF
ARAPS
HCIFZ
KB.
M7S
OIOZB
OTOTI
PDBOC
RIG
5PM
ID FETCH-LOGICAL-c536t-32def98cbfa554af3b9a55e28ad69cc2a48e97b3dbd57ed90e086de4f8662c773
IEDL.DBID PIMPY
ISICitedReferencesCount 5
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001139856300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1424-8220
IngestDate Tue Oct 14 18:49:06 EDT 2025
Tue Nov 04 02:06:09 EST 2025
Mon Apr 29 05:37:02 EDT 2024
Sun Nov 09 13:58:36 EST 2025
Tue Oct 07 07:46:08 EDT 2025
Tue Nov 04 18:28:48 EST 2025
Mon Jul 21 05:31:04 EDT 2025
Sat Nov 29 07:18:48 EST 2025
Tue Nov 18 22:02:32 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 24
Keywords critical infrastructure
hydropower
QKD post-processing
cyber-physical security
quantum key distribution
QKD
dams
quantum security
Language English
License Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c536t-32def98cbfa554af3b9a55e28ad69cc2a48e97b3dbd57ed90e086de4f8662c773
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
AC05-00OR22725; FG2-13ER41967; W911NF-19-1-0397; DGE-2152168
National Science Foundation (NSF)
USDOE Laboratory Directed Research and Development (LDRD) Program
US Army Research Office (ARO)
USDOE Office of Cybersecurity, Energy Security, and Emergency Response (CESER)
ORCID 0000-0002-1466-2772
0009-0005-4689-0437
0000-0002-7215-9630
0000-0002-4736-4157
0000000214662772
0000000247364157
0009000546890437
0000000272159630
OpenAccessLink https://www.proquest.com/publiccontent/docview/2904931490?pq-origsite=%requestingapplication%
PMID 38139664
PQID 2904931490
PQPubID 2032333
ParticipantIDs doaj_primary_oai_doaj_org_article_7b62f14be5d14f6fb0559e96bba049f7
pubmedcentral_primary_oai_pubmedcentral_nih_gov_10748243
osti_scitechconnect_2336680
proquest_miscellaneous_2905526100
proquest_journals_2904931490
gale_infotracacademiconefile_A779284438
pubmed_primary_38139664
crossref_primary_10_3390_s23249818
crossref_citationtrail_10_3390_s23249818
PublicationCentury 2000
PublicationDate 20231214
PublicationDateYYYYMMDD 2023-12-14
PublicationDate_xml – month: 12
  year: 2023
  text: 20231214
  day: 14
PublicationDecade 2020
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Basel
– name: United States
PublicationTitle Sensors (Basel, Switzerland)
PublicationTitleAlternate Sensors (Basel)
PublicationYear 2023
Publisher MDPI AG
MDPI
Publisher_xml – name: MDPI AG
– name: MDPI
References ref_50
ref_14
Baron (ref_30) 2022; 14
Philippe (ref_33) 2020; 10
ref_56
Mekhtiev (ref_59) 2021; 2086
Zhu (ref_66) 2021; 68
Bloom (ref_68) 2022; 4
ref_10
ref_54
ref_53
Ijaz (ref_34) 2022; 2022
Lim (ref_55) 2014; 89
ref_51
Zhang (ref_36) 2023; 4
Kong (ref_52) 2020; 16
ref_15
Yuan (ref_25) 2007; 91
Evans (ref_13) 2021; 9
ref_61
ref_60
Chen (ref_8) 2011; 44
Singh (ref_4) 2020; 28
ref_69
ref_22
Farahi (ref_11) 2012; 6
Dunjko (ref_16) 2014; 112
ref_62
Moschandreou (ref_57) 2021; 103
Cao (ref_19) 2023; 6
ref_29
Scherer (ref_45) 2011; 19
Alshowkan (ref_12) 2022; 12
Diamanti (ref_21) 2016; 2
Ratnam (ref_5) 2020; 33
Wang (ref_40) 2022; 16
Qi (ref_44) 2010; 12
ref_70
Chen (ref_17) 2005; 95
Rosenberg (ref_26) 2005; 7
Kwek (ref_35) 2021; 31
(ref_47) 2000; 61
Scarani (ref_23) 2009; 81
Liao (ref_41) 2017; 549
ref_32
Yin (ref_42) 2020; 582
Peters (ref_64) 2009; 11
Gobby (ref_24) 2004; 84
Ding (ref_58) 2017; 25
ref_38
Bharani (ref_39) 2021; 42
Hua (ref_67) 2023; 71
Mohanta (ref_31) 2017; 20
Ouellet (ref_28) 2022; 3
Hiskett (ref_27) 2007; 8
Sharma (ref_43) 2021; 2
ref_1
Long (ref_18) 2007; 2
Rothe (ref_20) 2023; 6
ref_3
ref_2
Wang (ref_37) 2023; 33
Makarov (ref_48) 2006; 30
ref_49
Li (ref_63) 2022; 5
ref_9
Lo (ref_46) 2005; 94
Chapuran (ref_65) 2009; 11
ref_7
ref_6
References_xml – volume: 4
  start-page: 19
  year: 2023
  ident: ref_36
  article-title: High-Sensitivity Force Sensors Based on Novel Materials
  publication-title: Adv. Devices Instrum.
  doi: 10.34133/adi.0019
– ident: ref_9
– volume: 84
  start-page: 3762
  year: 2004
  ident: ref_24
  article-title: Quantum key distribution over 122 km of standard telecom fiber
  publication-title: Appl. Phys. Lett.
  doi: 10.1063/1.1738173
– volume: 4
  start-page: 104
  year: 2022
  ident: ref_68
  article-title: Quantum Cryptography–A Simplified Undergraduate Experiment and Simulation
  publication-title: Physics
  doi: 10.3390/physics4010009
– volume: 2
  start-page: 16025
  year: 2016
  ident: ref_21
  article-title: Practical challenges in quantum key distribution
  publication-title: NPJ Quantum Inf.
  doi: 10.1038/npjqi.2016.25
– volume: 42
  start-page: 203
  year: 2021
  ident: ref_39
  article-title: A nonlinear load frequency controller for hydropower plants
  publication-title: Int. J. Ambient. Energy
  doi: 10.1080/01430750.2018.1531258
– volume: 11
  start-page: 105001
  year: 2009
  ident: ref_65
  article-title: Optical networking for quantum key distribution and quantum communications
  publication-title: New J. Phys.
  doi: 10.1088/1367-2630/11/10/105001
– volume: 2
  start-page: 251
  year: 2007
  ident: ref_18
  article-title: Quantum secure direct communication and deterministic secure quantum communication
  publication-title: Front. Phys. China
  doi: 10.1007/s11467-007-0050-3
– volume: 71
  start-page: 3103
  year: 2023
  ident: ref_67
  article-title: Channel Modeling for UAV-to-Ground Communications With Posture Variation and Fuselage Scattering Effect
  publication-title: IEEE Trans. Commun.
  doi: 10.1109/TCOMM.2023.3255900
– ident: ref_70
  doi: 10.1093/oso/9780198501770.001.0001
– ident: ref_62
  doi: 10.3390/s21134272
– ident: ref_7
  doi: 10.6028/NIST.GCR.16-010
– ident: ref_61
– volume: 8
  start-page: 193
  year: 2007
  ident: ref_27
  article-title: Long-distance quantum key distribution in optical fibre
  publication-title: New J. Phys.
  doi: 10.1088/1367-2630/8/9/193
– volume: 6
  start-page: 65
  year: 2023
  ident: ref_20
  article-title: Securing Data in Multimode Fibers by Exploiting Mode-Dependent Light Propagation Effects
  publication-title: Research
  doi: 10.34133/research.0065
– volume: 112
  start-page: 040502
  year: 2014
  ident: ref_16
  article-title: Quantum Digital Signatures without Quantum Memory
  publication-title: Phys. Rev. Lett.
  doi: 10.1103/PhysRevLett.112.040502
– ident: ref_50
  doi: 10.1109/PDGC.2018.8745822
– volume: 10
  start-page: 20605
  year: 2020
  ident: ref_33
  article-title: A physical unclonable neutron sensor for nuclear arms control inspections
  publication-title: Sci. Rep.
  doi: 10.1038/s41598-020-77459-3
– volume: 16
  start-page: 41
  year: 2020
  ident: ref_52
  article-title: A review of quantum key distribution protocols in the perspective of smart grid communication security
  publication-title: IEEE Syst. J.
  doi: 10.1109/JSYST.2020.3024956
– ident: ref_56
– volume: 28
  start-page: 1569
  year: 2020
  ident: ref_4
  article-title: Sustainability of maintenance management practices in hydropower plant: A conceptual framework
  publication-title: Mater. Today Proc.
  doi: 10.1016/j.matpr.2020.04.842
– ident: ref_69
– volume: 12
  start-page: 12731
  year: 2022
  ident: ref_12
  article-title: Authentication of smart grid communications using quantum key distribution
  publication-title: Sci. Rep.
  doi: 10.1038/s41598-022-16090-w
– volume: 6
  start-page: 4548
  year: 2012
  ident: ref_11
  article-title: Critical issues in sensor science to aid food and water safety
  publication-title: ACS Nano
  doi: 10.1021/nn204999j
– volume: 9
  start-page: 105220
  year: 2021
  ident: ref_13
  article-title: Trusted Node QKD at an Electrical Utility
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3070222
– volume: 33
  start-page: 5
  year: 2023
  ident: ref_37
  article-title: Squeezing for cosmic symphony
  publication-title: AAPPS Bull.
  doi: 10.1007/s43673-023-00076-5
– volume: 19
  start-page: 3004
  year: 2011
  ident: ref_45
  article-title: Long-distance practical quantum key distribution by entanglement swapping
  publication-title: Opt. Express
  doi: 10.1364/OE.19.003004
– volume: 3
  start-page: 301
  year: 2022
  ident: ref_28
  article-title: Advanced monitoring of tailings dam performance using seismic noise and stress models
  publication-title: Commun. Earth Environ.
  doi: 10.1038/s43247-022-00629-w
– volume: 103
  start-page: 032614
  year: 2021
  ident: ref_57
  article-title: Experimental decoy-state Bennett-Brassard 1984 quantum key distribution through a turbulent channel
  publication-title: Phys. Rev. A
  doi: 10.1103/PhysRevA.103.032614
– volume: 44
  start-page: 91
  year: 2011
  ident: ref_8
  article-title: Lessons from Stuxnet
  publication-title: Computer
  doi: 10.1109/MC.2011.115
– ident: ref_22
  doi: 10.2139/ssrn.3769123
– volume: 2086
  start-page: 012092
  year: 2021
  ident: ref_59
  article-title: Polarization control algorithm for QKD systems
  publication-title: Proc. J. Phys. Conf. Ser.
  doi: 10.1088/1742-6596/2086/1/012092
– ident: ref_53
– volume: 549
  start-page: 43
  year: 2017
  ident: ref_41
  article-title: Satellite-to-ground quantum key distribution
  publication-title: Nature
  doi: 10.1038/nature23655
– ident: ref_49
  doi: 10.1007/978-3-030-73991-1
– volume: 12
  start-page: 103042
  year: 2010
  ident: ref_44
  article-title: Feasibility of quantum key distribution through a dense wavelength division multiplexing network
  publication-title: New J. Phys.
  doi: 10.1088/1367-2630/12/10/103042
– volume: 68
  start-page: 3951
  year: 2021
  ident: ref_66
  article-title: A Real-Time Hardware Emulator for 3D Non-Stationary U2V Channels
  publication-title: IEEE Trans. Circuits Syst. I Regul. Pap.
  doi: 10.1109/TCSI.2021.3087777
– ident: ref_1
  doi: 10.1007/978-3-030-46908-5
– volume: 25
  start-page: 27923
  year: 2017
  ident: ref_58
  article-title: Polarization variations in installed fibers and their influence on quantum key distribution systems
  publication-title: Opt. Express
  doi: 10.1364/OE.25.027923
– ident: ref_3
– volume: 30
  start-page: 1043
  year: 2006
  ident: ref_48
  article-title: Optical attacks on practical continuous-variable quantum key distribution systems (or ‘how to hack a quantum cryptosystem’)
  publication-title: Opt. Lett.
– ident: ref_51
  doi: 10.3390/s21216978
– volume: 2
  start-page: 2049
  year: 2021
  ident: ref_43
  article-title: Quantum Key Distribution Secured Optical Networks: A Survey
  publication-title: IEEE Open J. Commun. Soc.
  doi: 10.1109/OJCOMS.2021.3106659
– ident: ref_10
  doi: 10.3390/s19184048
– ident: ref_14
– volume: 14
  start-page: 16878132221101023
  year: 2022
  ident: ref_30
  article-title: Vibrodiagnostics as a predictive maintenance tool in the operation of turbo generators of a small hydropower plant
  publication-title: Adv. Mech. Eng.
  doi: 10.1177/16878132221101023
– volume: 16
  start-page: 154
  year: 2022
  ident: ref_40
  article-title: Twin-field quantum key distribution over 830-km fibre
  publication-title: Nat. Photonics
  doi: 10.1038/s41566-021-00928-2
– volume: 61
  start-page: 052304
  year: 2000
  ident: ref_47
  article-title: Security against eavesdropping in quantum cryptography
  publication-title: Phys. Rev. A
– volume: 94
  start-page: 230504
  year: 2005
  ident: ref_46
  article-title: Decoy state quantum key distribution
  publication-title: Phys. Rev. Lett.
  doi: 10.1103/PhysRevLett.94.230504
– ident: ref_32
  doi: 10.3390/ijerph182413051
– volume: 2022
  start-page: 9861078
  year: 2022
  ident: ref_34
  article-title: The Dawn of Metadevices: From Contemporary Designs to Exotic Applications
  publication-title: Adv. Devices Instrum.
  doi: 10.34133/2022/9861078
– ident: ref_54
– ident: ref_2
– ident: ref_29
  doi: 10.3390/geosciences9040187
– volume: 20
  start-page: 637
  year: 2017
  ident: ref_31
  article-title: Sources of vibration and their treatment in hydro power stations-A review
  publication-title: Eng. Sci. Technol. Int. J.
– ident: ref_6
  doi: 10.1109/NCCC57165.2022.10067433
– volume: 91
  start-page: 041114
  year: 2007
  ident: ref_25
  article-title: High speed single photon detection in the near infrared
  publication-title: Appl. Phys. Lett.
  doi: 10.1063/1.2760135
– ident: ref_15
– volume: 5
  start-page: 53
  year: 2022
  ident: ref_63
  article-title: Improving the performance of practical decoy-state quantum key distribution with advantage distillation technology
  publication-title: Commun. Phys.
  doi: 10.1038/s42005-022-00831-4
– volume: 89
  start-page: 022307
  year: 2014
  ident: ref_55
  article-title: Concise security bounds for practical decoy-state quantum key distribution
  publication-title: Phys. Rev.
  doi: 10.1103/PhysRevA.89.022307
– volume: 6
  start-page: 193
  year: 2023
  ident: ref_19
  article-title: Realization of Quantum Secure Direct Communication with Continuous Variable
  publication-title: Research
  doi: 10.34133/research.0193
– volume: 582
  start-page: 501
  year: 2020
  ident: ref_42
  article-title: Entanglement-based secure quantum cryptography over 1120 kilometres
  publication-title: Nature
  doi: 10.1038/s41586-020-2401-y
– volume: 81
  start-page: 1301
  year: 2009
  ident: ref_23
  article-title: The security of practical quantum key distribution
  publication-title: Rev. Mod. Phys.
  doi: 10.1103/RevModPhys.81.1301
– volume: 33
  start-page: 106833
  year: 2020
  ident: ref_5
  article-title: Electricity system resilience in a world of increased climate change and cybersecurity risk
  publication-title: Electr. J.
  doi: 10.1016/j.tej.2020.106833
– ident: ref_60
– volume: 95
  start-page: 200502
  year: 2005
  ident: ref_17
  article-title: Experimental Quantum Secret Sharing and Third-Man Quantum Cryptography
  publication-title: Phys. Rev. Lett.
  doi: 10.1103/PhysRevLett.95.200502
– volume: 7
  start-page: 71
  year: 2005
  ident: ref_26
  article-title: Practical long-distance quantum key distribution system using decoy levels
  publication-title: New J. Phys.
– ident: ref_38
  doi: 10.2172/1764035
– volume: 11
  start-page: 045012
  year: 2009
  ident: ref_64
  article-title: Dense wavelength multiplexing of 1550 nm QKD with strong classical channels in reconfigurable networking environments
  publication-title: New J. Phys.
  doi: 10.1088/1367-2630/11/4/045012
– volume: 31
  start-page: 15
  year: 2021
  ident: ref_35
  article-title: Chip-based quantum key distribution
  publication-title: AAPPS Bull.
  doi: 10.1007/s43673-021-00017-0
SSID ssj0023338
Score 2.4611835
Snippet Hydropower facilities are often remotely monitored or controlled from a centralized remote control room. Additionally, major component manufacturers monitor...
SourceID doaj
pubmedcentral
osti
proquest
gale
pubmed
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
Enrichment Source
StartPage 9818
SubjectTerms Communication
Connectivity
Control systems
critical infrastructure
Cryptography
cyber-physical security
Cybersecurity
Cyberterrorism
Dams
Digital signatures
Germany
Hydroelectric power
Hydroelectric power plants
hydropower
Infrastructure
Infrastructure (Economics)
Internet
MATHEMATICS AND COMPUTING
Modernization
QKD
QKD post-processing
quantum key distribution
quantum security
R&D
Remote control
Research & development
Technology
Water-power
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1da9RAFB1k8UEfxG_XVhlF0JfQJJPMh2-1tVSUUrFC34b5pAWblc1uy_57zyTZsCsFX3xbdu6SzL3n7txDbs4l5J0zDudYAC0xEgSFFSazyhUZzh7giavoTRfpb-LkRJ6fq9ONUV-pJ6yXB-4dtycsL2NR2VD7ooo82hw1cFDcWoPiNnbvkedCrcnUQLUYmFevI8RA6vfaVDcomSZ7bJw-nUj_-Fc8mSGnbqsz_26X3Dh_jh6SB0PhSPf7G35E7oTmMbm_ISf4hDTfl_DT8op-DSt6mBRxh2FWFJUpXQ81oF-aODe9buwSZPsjPetaZ1t6sLJhnp0OkaM_htF23a-PVz7NU7gJc2oaTw_NVfuU_Dz6fHZwnA3zFDJXM77IWOlDVNLZaFBEmMiswodQSuO5cq40lQxKWOatr0XwKg_gOz5UUXJeOiHYMzJpZk14QWglI8utYjayWAkRjUXhgRDxXFifx2pKPqz9rN0gNp5mXvzSIB0pJHoMyZS8HU1_9wobtxl9SsEaDZIodvcFoKIHqOh_QWVK3qdQ65S6uBnAtH8DAVtKIlh6XwiF07piuNxOQoNGFZKkdF3qOXILDVhxLvMp2V2DRA8Z3-pS4RoMfBPLb8Zl5Gp6AGOaMFt2NnUNyprD5nmPqXFHqJwYqCc8J7fQtrXl7ZXm8qLTA089tbKs2Mv_4aQdcq9E_qSOnaLaJROgMbwid9314rKdv-6y7A8wHS_I
  priority: 102
  providerName: Directory of Open Access Journals
Title Quantum Key Distribution for Critical Infrastructures: Towards Cyber-Physical Security for Hydropower and Dams
URI https://www.ncbi.nlm.nih.gov/pubmed/38139664
https://www.proquest.com/docview/2904931490
https://www.proquest.com/docview/2905526100
https://www.osti.gov/servlets/purl/2336680
https://pubmed.ncbi.nlm.nih.gov/PMC10748243
https://doaj.org/article/7b62f14be5d14f6fb0559e96bba049f7
Volume 23
WOSCitedRecordID wos001139856300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: DOA
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: M~E
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: Health & Medical Collection
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: 7X7
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/healthcomplete
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: BENPR
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Publicly Available Content Database
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: PIMPY
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9NAEF7RhAMceD9CS7QgJLhYcbzOPrigPlK1gkYBihROq322lahT4gSUC7-dWXtjElRx4mJF8UTZ9czOfp89_gahV0YZ2Mcc0BLFgaCQvkq0MP0E9h6IJyq8VZWnP7DRiE8mYhxfjy5jWeUqJ1aJulZ7DnXbkIR7dmrCHfNeJgDZEkD36bur70noIRWetcaGGluoHYS30hZqj49Pxl8bAkaAj9XqQgSofq8MaELw0O9jbU-qpPubBN2awkq7Dn3-XUS5tisd3v2_87mH7kR0infrcLqPbrjiAbq9pln4EBUfF-CMxSV-75b4IMjuxo5ZGOAvXnVOwMeFn6lanHYBjP4tPq3qc0u8v9RuloxjeODPsX9e9eujpQ1NG366GVaFxQfqsnyEvhwOT_ePkti0ITEDQucJyazzghvtFSAV5YkW8MFlXFkqjMlUzp1gmlhtB8xZkTogVdblnlOaGcbIY9QqpoV7inDOPUm1INoTnzPmlQZ04waWpkzb1Ocd9GblNmmionlorPFNArMJHpaNhzvoZWN6Vct4XGe0F3zfGATl7eqL6exMxoUsmaaZ7-caxtHPPfU6BU7mBNVagQs966DXIXJkyA8wGFgL9WsOMKWgtCV3GRMACXICf7cdgksC1Al6vSYUNpm5hCillKcdtLOKGxnTSin_hEkHvWhOQ0IIT3lU4aaLymYwAF6cgs2TOkSbGQE8I8Bv4crxjeDdmPLmmeLivBIdD4W7PMvJs3-PaxvdymChhYKffr6DWhBn7jm6aX7ML8pZF22xCauOvIvae8PR-FO3ugsCx5Nfw25csL8BvwZPxg
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9NAEF6VFAk48H6EFlgQCC5Wbe_G60VCqDRUiZpGQQSpnJZ9QiXqFDuhyp_iNzLrFwmquPXALYonya79zcw38fgbhJ5rqSGPWShLZAoFColkoLiOAsg9gKeEOyPLKz1i43F6dMQnG-hX8yyMb6tsYmIZqM1M-__Id2IOXJYAnw_fnv4I_NQof3e1GaFRweLALs-gZCveDPtwfV_E8f776d4gqKcKBLpHknlAYmMdT7VyElKpdERxeGHjVJqEax1LmlrOFDHK9Jg1PLTA-o2lLk2SWDNG4HsvoU0KYA87aHMyPJx8bks8AhVfpV9ECA93Cs9XeOoniqxkvXI4QJsCOjPw5fP47d9tmit5b__G_3bGbqLrNcPGu5VL3EIbNruNrq3oLt5B2YcFAGpxgmFhuO-lg-upXxgoPG6mP-Bh5nJZCewuclu8xtOyx7jAe0tl82BSQxx_rGcAlp8eLI0fPHFmcywzg_vypLiLPl3Ihu-hTjbL7AOEaepIqDhRjjjKmJMKGJrtmSRkyoSOdtGrBhhC16rsfjjIdwHVmceQaDHURc9a09NKiuQ8o3ceXa2BVw8v35jlX0UdjARTSewiqmAdEXWJUyHUlZYnSkmAjGNd9NJjU_gYB4sBf64e1YAtebUwscsYB1pDCfzcloevALrmNYe1b87ScwF-kCRp2EXbDTJFHRoL8QeWXfS0PQxBzd-pkpmdLUqbXg9q-xBs7ldO0O4IKCaBGh3OXLrmHmtbXj-SHX8rhdN983EaU_Lw3-t6gq4MpocjMRqOD7bQ1Rjc2jcwRXQbdQBz9hG6rH_Oj4v8ce3-GH25aP_5DdTvnps
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9NAEF6VFCE48H6EFlgQCC5WHa-zDySE2qZRo1ZRgCL1tuwTKlGn2AlV_hq_jlm_SFDFrQduUbxJZu1vZr4vHs8g9NIoA3nMgSxRHAQK6alIC9OLIPcAnqjwVpVX-pCNx_z4WEzW0K_mWZhQVtnExDJQ26kJ_5FvJQK4LAE-H2_5uixiMhi-P_sRhQlS4U5rM06jgsiBW5yDfCvejQZwrV8lyXDvaHc_qicMRKZP6CwiiXVecKO9grSqPNECXriEK0uFMYlKuRNME6ttnzkrYgcKwLrUc0oTwxiB772C1hkB0dNB6zt748nHVu4RUH9VLyNCwOoicBfBw3SRpQxYDgpo00FnCn59Edf9u2RzKQcOb_3PZ-82ulkzb7xducodtOayu-jGUj_Geyj7MAegzU8xGIYHoaVwPQ0MA7XHzVQIPMp8rqrGu_PcFW_xUVl7XODdhXZ5NKmhjz_VswHLT-8vbBhIce5yrDKLB-q0uI8-X8qGH6BONs3cI4RT7kmsBdGe-JQxrzQwN9e3NGbaxj7tojcNSKSpu7WHoSHfJai2gCfZ4qmLXrRLz6oWJRct2glIaxeEruLlG9P8q6yDlGSaJr6XarCjl3rqdQx60wmqtQL4eNZFrwNOZYh9YAz4efUIB2wpdBGT24wJoDspgZ_bCFCWQONCL2ITirbMTIJPUMrjLtpsUCrrkFnIPxDtouftYQh24Q6Wytx0Xq7p90Hzx7DmYeUQ7Y6AehLQ7nDm-IqrrGx59Uh28q1sqB6KknmSksf_tusZugZOIw9H44MNdD0BDw91Tb10E3UAcu4Jump-zk6K_GkdCTD6ctnu8xukWac1
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Quantum+Key+Distribution+for+Critical+Infrastructures%3A+Towards+Cyber-Physical+Security+for+Hydropower+and+Dams&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Green%2C+Adrien&rft.au=Lawrence%2C+Jeremy&rft.au=Siopsis%2C+George&rft.au=Peters%2C+Nicholas+A.&rft.date=2023-12-14&rft.issn=1424-8220&rft.eissn=1424-8220&rft.volume=23&rft.issue=24&rft.spage=9818&rft_id=info:doi/10.3390%2Fs23249818&rft.externalDBID=n%2Fa&rft.externalDocID=10_3390_s23249818
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon