Visible to the public Research on Multi-Source Data Security Protection of Smart Grid Based on Quantum Key Combination

TitleResearch on Multi-Source Data Security Protection of Smart Grid Based on Quantum Key Combination
Publication TypeConference Paper
Year of Publication2019
AuthorsWang, L., Wang, D., Gao, J., Huo, C., Bai, H., Yuan, J.
Conference Name2019 IEEE 4th International Conference on Cloud Computing and Big Data Analysis (ICCCBDA)
Date Publishedapr
ISBN Number978-1-7281-1410-1
KeywordsBusiness, business data, business terminals, combination technology, communication security, communication terminals, composability, data protection, Encryption, key segments, key updating, Metrics, Microelectronics, Microelectronics Security, multisource data security protection, power communication network, power data protection, power engineering computing, power grid, pubcrawl, quantum communication, quantum cryptography, quantum key combination, Quantum mechanics, resilience, Resiliency, segmentation and combination of key, segmentation technology, Smart grid, smart power grids
Abstract

Power communication network is an important infrastructure of power system. For a large number of widely distributed business terminals and communication terminals. The data protection is related to the safe and stable operation of the whole power grid. How to solve the problem that lots of nodes need a large number of keys and avoid the situation that these nodes cannot exchange information safely because of the lack of keys. In order to solve the problem, this paper proposed a segmentation and combination technology based on quantum key to extend the limited key. The basic idea was to obtain a division scheme according to different conditions, and divide a key into several different sub-keys, and then combine these key segments to generate new keys and distribute them to different terminals in the system. Sufficient keys were beneficial to key updating, and could effectively enhance the ability of communication system to resist damage and intrusion. Through the analysis and calculation, the validity of this method in the use of limited quantum keys to achieve the business data secure transmission of a large number of terminal was further verified.

URLhttps://ieeexplore.ieee.org/document/8725680
DOI10.1109/ICCCBDA.2019.8725680
Citation Keywang_research_2019