Toward Quantum Secured Distributed Energy Resources: Adoption of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD)

Quantum computing is a game-changing technology that affects modern cryptography and security systems including distributed energy resources (DERs) systems. Since the new quantum era is coming soon in 5–10 years, it is crucial to prepare and develop quantum-safe DER systems. This paper provides a co...

Full description

Bibliographic Details
Main Authors: Jongmin Ahn, Hee-Yong Kwon, Bohyun Ahn, Kyuchan Park, Taesic Kim, Mun-Kyu Lee, Jinsan Kim, Jaehak Chung
Format: Article
Language:English
Published: MDPI AG 2022-01-01
Series:Energies
Subjects:
Online Access:https://www.mdpi.com/1996-1073/15/3/714
_version_ 1797488224556285952
author Jongmin Ahn
Hee-Yong Kwon
Bohyun Ahn
Kyuchan Park
Taesic Kim
Mun-Kyu Lee
Jinsan Kim
Jaehak Chung
author_facet Jongmin Ahn
Hee-Yong Kwon
Bohyun Ahn
Kyuchan Park
Taesic Kim
Mun-Kyu Lee
Jinsan Kim
Jaehak Chung
author_sort Jongmin Ahn
collection DOAJ
description Quantum computing is a game-changing technology that affects modern cryptography and security systems including distributed energy resources (DERs) systems. Since the new quantum era is coming soon in 5–10 years, it is crucial to prepare and develop quantum-safe DER systems. This paper provides a comprehensive review of vulnerabilities caused by quantum computing attacks, potential defense strategies, and remaining challenges for DER networks. First, new security vulnerabilities and attack models of the cyber-physical DER systems caused by quantum computing attacks are explored. Moreover, this paper introduces potential quantum attack defense strategies including Quantum Key Distribution (QKD) and Post-Quantum Cryptography (PQC), which can be applied to DER networks and evaluates defense strategies. Finally, remaining research opportunities and challenges for next-generation quantum-safe DER are discussed.
first_indexed 2024-03-09T23:59:01Z
format Article
id doaj.art-0c77c99b871d453ab836d21c0a9bf9e8
institution Directory Open Access Journal
issn 1996-1073
language English
last_indexed 2024-03-09T23:59:01Z
publishDate 2022-01-01
publisher MDPI AG
record_format Article
series Energies
spelling doaj.art-0c77c99b871d453ab836d21c0a9bf9e82023-11-23T16:18:38ZengMDPI AGEnergies1996-10732022-01-0115371410.3390/en15030714Toward Quantum Secured Distributed Energy Resources: Adoption of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD)Jongmin Ahn0Hee-Yong Kwon1Bohyun Ahn2Kyuchan Park3Taesic Kim4Mun-Kyu Lee5Jinsan Kim6Jaehak Chung7Department of Electrical Engineering and Computer Science, Incheon, INHA University, 100, Inha-ro, Michuhol-gu, Incheon 22212, KoreaDepartment of Electrical Engineering and Computer Science, Incheon, INHA University, 100, Inha-ro, Michuhol-gu, Incheon 22212, KoreaDepartment of Electrical Engineering and Computer Science, Texas A&M University-Kingsville, MSC 192, 700 University Blvd, Kingsville, TX 78363, USADepartment of Electrical Engineering and Computer Science, Incheon, INHA University, 100, Inha-ro, Michuhol-gu, Incheon 22212, KoreaDepartment of Electrical Engineering and Computer Science, Texas A&M University-Kingsville, MSC 192, 700 University Blvd, Kingsville, TX 78363, USADepartment of Electrical Engineering and Computer Science, Incheon, INHA University, 100, Inha-ro, Michuhol-gu, Incheon 22212, KoreaDepartment of Electrical Engineering and Computer Science, Incheon, INHA University, 100, Inha-ro, Michuhol-gu, Incheon 22212, KoreaDepartment of Electrical Engineering and Computer Science, Incheon, INHA University, 100, Inha-ro, Michuhol-gu, Incheon 22212, KoreaQuantum computing is a game-changing technology that affects modern cryptography and security systems including distributed energy resources (DERs) systems. Since the new quantum era is coming soon in 5–10 years, it is crucial to prepare and develop quantum-safe DER systems. This paper provides a comprehensive review of vulnerabilities caused by quantum computing attacks, potential defense strategies, and remaining challenges for DER networks. First, new security vulnerabilities and attack models of the cyber-physical DER systems caused by quantum computing attacks are explored. Moreover, this paper introduces potential quantum attack defense strategies including Quantum Key Distribution (QKD) and Post-Quantum Cryptography (PQC), which can be applied to DER networks and evaluates defense strategies. Finally, remaining research opportunities and challenges for next-generation quantum-safe DER are discussed.https://www.mdpi.com/1996-1073/15/3/714distributed energy resourcespost-quantum cryptographyquantum computing attackquantum key distribution
spellingShingle Jongmin Ahn
Hee-Yong Kwon
Bohyun Ahn
Kyuchan Park
Taesic Kim
Mun-Kyu Lee
Jinsan Kim
Jaehak Chung
Toward Quantum Secured Distributed Energy Resources: Adoption of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD)
Energies
distributed energy resources
post-quantum cryptography
quantum computing attack
quantum key distribution
title Toward Quantum Secured Distributed Energy Resources: Adoption of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD)
title_full Toward Quantum Secured Distributed Energy Resources: Adoption of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD)
title_fullStr Toward Quantum Secured Distributed Energy Resources: Adoption of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD)
title_full_unstemmed Toward Quantum Secured Distributed Energy Resources: Adoption of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD)
title_short Toward Quantum Secured Distributed Energy Resources: Adoption of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD)
title_sort toward quantum secured distributed energy resources adoption of post quantum cryptography pqc and quantum key distribution qkd
topic distributed energy resources
post-quantum cryptography
quantum computing attack
quantum key distribution
url https://www.mdpi.com/1996-1073/15/3/714
work_keys_str_mv AT jongminahn towardquantumsecureddistributedenergyresourcesadoptionofpostquantumcryptographypqcandquantumkeydistributionqkd
AT heeyongkwon towardquantumsecureddistributedenergyresourcesadoptionofpostquantumcryptographypqcandquantumkeydistributionqkd
AT bohyunahn towardquantumsecureddistributedenergyresourcesadoptionofpostquantumcryptographypqcandquantumkeydistributionqkd
AT kyuchanpark towardquantumsecureddistributedenergyresourcesadoptionofpostquantumcryptographypqcandquantumkeydistributionqkd
AT taesickim towardquantumsecureddistributedenergyresourcesadoptionofpostquantumcryptographypqcandquantumkeydistributionqkd
AT munkyulee towardquantumsecureddistributedenergyresourcesadoptionofpostquantumcryptographypqcandquantumkeydistributionqkd
AT jinsankim towardquantumsecureddistributedenergyresourcesadoptionofpostquantumcryptographypqcandquantumkeydistributionqkd
AT jaehakchung towardquantumsecureddistributedenergyresourcesadoptionofpostquantumcryptographypqcandquantumkeydistributionqkd