• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于开关滤波器的智能电网中具有信息理论安全性的增强型约翰逊噪声密钥分发。

Information theoretically secure, enhanced Johnson noise based key distribution over the smart grid with switched filters.

机构信息

Department of Electrical and Computer Engineering, Texas A&M University, College Station, Texas, United States of America.

出版信息

PLoS One. 2013 Jul 25;8(7):e70206. doi: 10.1371/journal.pone.0070206. Print 2013.

DOI:10.1371/journal.pone.0070206
PMID:23936164
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC3723689/
Abstract

We introduce a protocol with a reconfigurable filter system to create non-overlapping single loops in the smart power grid for the realization of the Kirchhoff-Law-Johnson-(like)-Noise secure key distribution system. The protocol is valid for one-dimensional radial networks (chain-like power line) which are typical of the electricity distribution network between the utility and the customer. The speed of the protocol (the number of steps needed) versus grid size is analyzed. When properly generalized, such a system has the potential to achieve unconditionally secure key distribution over the smart power grid of arbitrary geometrical dimensions.

摘要

我们提出了一种协议,其中包含一个可重构滤波器系统,以在智能电网中创建非重叠的单环,从而实现基尔霍夫-约翰逊(类似)噪声安全密钥分发系统。该协议适用于一维径向网络(链式电源线),这是典型的公用事业和客户之间的配电网。我们分析了协议的速度(即所需的步骤数)与网格大小的关系。当适当推广时,这样的系统有可能在任意几何尺寸的智能电网中实现无条件安全的密钥分发。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/b5178880fa6f/pone.0070206.g021.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/2040dd06aad7/pone.0070206.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/ee6956639ed1/pone.0070206.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/066b1feaeff9/pone.0070206.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/052cdbf7ab22/pone.0070206.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/b22b5a44f9cf/pone.0070206.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/af1b2562906b/pone.0070206.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/bb335b04227a/pone.0070206.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/8479fb2baf14/pone.0070206.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/7720bc6f8898/pone.0070206.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/b5cb80122afd/pone.0070206.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/ddc42fbff0b6/pone.0070206.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/c231ba25a643/pone.0070206.g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/1283a143b14a/pone.0070206.g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/5bbfd2648286/pone.0070206.g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/ddad388ba556/pone.0070206.g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/6e703e93bde3/pone.0070206.g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/f3fce5bf5fe5/pone.0070206.g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/aba871eebf3a/pone.0070206.g018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/8d766c08dd4f/pone.0070206.g019.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/27eb27e4aa09/pone.0070206.g020.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/b5178880fa6f/pone.0070206.g021.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/2040dd06aad7/pone.0070206.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/ee6956639ed1/pone.0070206.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/066b1feaeff9/pone.0070206.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/052cdbf7ab22/pone.0070206.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/b22b5a44f9cf/pone.0070206.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/af1b2562906b/pone.0070206.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/bb335b04227a/pone.0070206.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/8479fb2baf14/pone.0070206.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/7720bc6f8898/pone.0070206.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/b5cb80122afd/pone.0070206.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/ddc42fbff0b6/pone.0070206.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/c231ba25a643/pone.0070206.g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/1283a143b14a/pone.0070206.g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/5bbfd2648286/pone.0070206.g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/ddad388ba556/pone.0070206.g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/6e703e93bde3/pone.0070206.g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/f3fce5bf5fe5/pone.0070206.g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/aba871eebf3a/pone.0070206.g018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/8d766c08dd4f/pone.0070206.g019.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/27eb27e4aa09/pone.0070206.g020.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1ec1/3723689/b5178880fa6f/pone.0070206.g021.jpg

相似文献

1
Information theoretically secure, enhanced Johnson noise based key distribution over the smart grid with switched filters.基于开关滤波器的智能电网中具有信息理论安全性的增强型约翰逊噪声密钥分发。
PLoS One. 2013 Jul 25;8(7):e70206. doi: 10.1371/journal.pone.0070206. Print 2013.
2
Pruning the Communication Bandwidth between Reinforcement Learning Agents through Causal Inference: An Innovative Approach to Designing a Smart Grid Power System.通过因果推理修剪强化学习代理之间的通信带宽:设计智能电网电力系统的创新方法。
Sensors (Basel). 2022 Oct 13;22(20):7785. doi: 10.3390/s22207785.
3
Noise properties in the ideal Kirchhoff-Law-Johnson-Noise secure communication system.理想基尔霍夫定律-约翰逊噪声安全通信系统中的噪声特性。
PLoS One. 2014 Apr 22;9(4):e96109. doi: 10.1371/journal.pone.0096109. eCollection 2014.
4
An efficient heterogeneous signcryption for smart grid.一种用于智能电网的高效异构签密方案。
PLoS One. 2018 Dec 18;13(12):e0208311. doi: 10.1371/journal.pone.0208311. eCollection 2018.
5
The data dimensionality reduction and bad data detection in the process of smart grid reconstruction through machine learning.通过机器学习实现智能电网重构过程中的数据降维和坏数据检测。
PLoS One. 2020 Oct 7;15(10):e0237994. doi: 10.1371/journal.pone.0237994. eCollection 2020.
6
DSM and Optimization of Multihop Smart Grid Based on Genetic Algorithm.基于遗传算法的 DSM 与多跳智能电网优化。
Comput Intell Neurosci. 2022 Jun 10;2022:5354326. doi: 10.1155/2022/5354326. eCollection 2022.
7
Message passing for optimization and control of a power grid: model of a distribution system with redundancy.用于电网优化与控制的消息传递:具有冗余性的配电系统模型
Phys Rev E Stat Nonlin Soft Matter Phys. 2009 Oct;80(4 Pt 2):046112. doi: 10.1103/PhysRevE.80.046112. Epub 2009 Oct 19.
8
Smart grid as a service: a discussion on design issues.作为服务的智能电网:关于设计问题的探讨。
ScientificWorldJournal. 2014;2014:535308. doi: 10.1155/2014/535308. Epub 2014 Aug 27.
9
Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids.基于椭圆曲线密码学的智能电网身份保护认证
PLoS One. 2016 Mar 23;11(3):e0151253. doi: 10.1371/journal.pone.0151253. eCollection 2016.
10
Artificial neural networks for control of a grid-connected rectifier/inverter under disturbance, dynamic and power converter switching conditions.人工神经网络在干扰、动态和功率变换器开关条件下控制并网整流器/逆变器。
IEEE Trans Neural Netw Learn Syst. 2014 Apr;25(4):738-50. doi: 10.1109/TNNLS.2013.2280906.

引用本文的文献

1
Generalized Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system using arbitrary resistors.采用任意电阻器的广义基尔霍夫定律-约翰逊噪声(KLJN)安全密钥交换系统。
Sci Rep. 2015 Sep 3;5:13653. doi: 10.1038/srep13653.
2
Noise properties in the ideal Kirchhoff-Law-Johnson-Noise secure communication system.理想基尔霍夫定律-约翰逊噪声安全通信系统中的噪声特性。
PLoS One. 2014 Apr 22;9(4):e96109. doi: 10.1371/journal.pone.0096109. eCollection 2014.
3
Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-Law-Johnson-noise scheme.

本文引用的文献

1
Controlling an actively-quenched single photon detector with bright light.用强光控制主动猝灭单光子探测器。
Opt Express. 2011 Nov 7;19(23):23590-600. doi: 10.1364/OE.19.023590.
2
Experimentally faking the violation of Bell's inequalities.实验性地伪造违反贝尔不等式。
Phys Rev Lett. 2011 Oct 21;107(17):170404. doi: 10.1103/PhysRevLett.107.170404. Epub 2011 Oct 20.
3
Device calibration impacts security of quantum key distribution.设备校准影响量子密钥分发的安全性。
对贝内特 - 里德尔通过基尔霍夫定律 - 约翰逊噪声方案对安全密码密钥分发的攻击的批判性分析。
PLoS One. 2013 Dec 16;8(12):e81810. doi: 10.1371/journal.pone.0081810. eCollection 2013.
4
Errors and their mitigation at the kirchhoff-law-johnson-noise secure key exchange.基尔霍夫-约翰逊-噪声密钥交换中的误差及其缓解方法。
PLoS One. 2013 Nov 26;8(11):e81103. doi: 10.1371/journal.pone.0081103. eCollection 2013.
Phys Rev Lett. 2011 Sep 9;107(11):110501. doi: 10.1103/PhysRevLett.107.110501.
4
Full-field implementation of a perfect eavesdropper on a quantum cryptography system.全场实现量子密码系统的完美窃听者。
Nat Commun. 2011 Jun 14;2:349. doi: 10.1038/ncomms1348.
5
Thermal blinding of gated detectors in quantum cryptography.量子密码术中门控探测器的热致盲
Opt Express. 2010 Dec 20;18(26):27938-54. doi: 10.1364/OE.18.027938.