Quantum Communication Technology for Optimizing 3D Cost Estimation and Secure Data Transmission in Substation Engineering

Authors

  • Junchao Li Economic and Technical Research Institute, State Grid Ningxia Electric Power Co., Ltd.
  • Fei You Economic and Technical Research Institute, State Grid Ningxia Electric Power Co., Ltd.
  • Dan Chen Economic and Technical Research Institute, State Grid Ningxia Electric Power Co., Ltd.

DOI:

https://doi.org/10.4108/eetsis.12021

Keywords:

Quantum communication, Secure data transmission, Substation engineering, 3D cost estimation, Distributed systems

Abstract

INTRODUCTION: The highly sensitive 3D cost estimation data in substation projects faces significant security challenges during distributed transmission, as conventional encryption approaches prove inadequate against quantum computing threats for large-scale engineering data protection. OBJECTIVES: This study aims to develop a quantum communication-based secure transmission framework for substation 3D cost estimation data, employing a three-tier quantum architecture to achieve information-theoretic security levels with robust defense against network attacks. METHODS: The proposed solution employs a three-tier quantum architecture encompassing physical, network, and application layers, with optimized quantum channels for engineering data flow. The framework utilizes the BB84 protocol with the decoy state method, implementing quantum key distribution and classical encryption integration to maintain data integrity through a distributed optimization strategy. RESULTS: Simulation validation across 10-50 node networks demonstrates quantum key generation rates of 8-40 kbps and 23% improvement in network throughput compared to star topology over traditional methods. The system achieves 99.99% reduction in key usage compared to pure quantum approaches while maintaining information-theoretic security levels. CONCLUSION: This research establishes fundamental principles and implementation pathways for quantum communication applications in engineering domains, offering significant advancement in secure data transmission for sensitive industrial applications and providing a reliable solution for protecting critical infrastructure engineering data.

References

[1] Achaal, B., et al., Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges. Cybersecurity, 2024. 7(1): p. 10.

[2] Knake, R.K., A Cyberattack on the U.S. Power Grid. 2017, Council on Foreign Relations.

[3] Holik, F., S.Y. Yayilgan, and G.B. Olsborg, Emulation of Digital Substations Communication for Cyber Security Awareness. Electronics, 2024. 13(12): p. 2318.

[4] Jarmakiewicz, J., K. Parobczak, and K. Maślanka, Cybersecurity protection for power grid control infrastructures. International Journal of Critical Infrastructure Protection, 2017. 18: p. 20-33.

[5] Abraham, D., et al., Consequence simulation of cyber attacks on key smart grid business cases. Frontiers in Energy Research, 2024. Volume 12 - 2024.

[6] García, C.R., et al., Enhanced Network Security Protocols for the Quantum Era: Combining Classical and Post-Quantum Cryptography, and Quantum Key Distribution. IEEE Journal on Selected Areas in Communications, 2025. 43(8): p. 2765-2781.

[7] Lo, H.-K., M. Curty, and K. Tamaki, Secure quantum key distribution. Nature Photonics, 2014. 8(8): p. 595-604.

[8] Mummadi, S. and S. Fathima. A Comprehensive Study on Quantum Key Distribution Protocols. in 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). 2024.

[9] Padamvathi, V., B.V. Vardhan, and A.V.N. Krishna. Quantum Cryptography and Quantum Key Distribution Protocols: A Survey. in 2016 IEEE 6th International Conference on Advanced Computing (IACC). 2016.

[10] Mangla, C., S. Rani, and A. Abdelsalam, QLSN: Quantum key distribution for large scale networks. Information and Software Technology, 2024. 165: p. 107349.

[11] Cao, Y., et al., The Evolution of Quantum Key Distribution Networks: On the Road to the Qinternet. IEEE Communications Surveys & Tutorials, 2022. 24(2): p. 839-894.

[12] Purohit, K. and A.K. Vyas, Quantum key distribution through quantum machine learning: a research review. Frontiers in Quantum Science and Technology, 2025. Volume 4 - 2025.

[13] Kong, P.Y., A Review of Quantum Key Distribution Protocols in the Perspective of Smart Grid Communication Security. IEEE Systems Journal, 2022. 16(1): p. 41-54.

[14] Liu, J., et al., Traceable Attribute-Based Encryption Scheme Using BIM Collaborative Design. Buildings, 2024. 14(3): p. 731.

[15] Das, M., X. Tao, and J.C.P. Cheng, BIM security: A critical review and recommendations using encryption strategy and blockchain. Automation in Construction, 2021. 126: p. 103682.

[16] Wang, J., et al., Research on multi-person collaborative design of BIM drawing based on blockchain. Scientific Reports, 2022. 12(1): p. 16312.

[17] Feng, M. and H. Wu, Construction of a BIM smart building collaborative design model combining the Internet of Things. Nonlinear Engineering, 2025. 14(1).

[18] Tache , M.D., O. Păscuțoiu, and E. Borcoci, Optimization Algorithms in SDN: Routing, Load Balancing, and Delay Optimization. Applied Sciences, 2024. 14(14): p. 5967.

[19] Kong, L., et al., Open BIM exchange on Blockchain 3.0 virtual disk: A traceable semantic differential transaction approach. Frontiers of Engineering Management, 2025. 12(3): p. 510-528.

[20] Forghani, M., M. Soltanaghaei, and F. Zamani Boroujeni, Dynamic optimization scheme for load balancing and energy efficiency in software-defined networks utilizing the krill herd meta-heuristic algorithm. Computers and Electrical Engineering, 2024. 114: p. 109057.

[21] Wei, D.S.L., et al., Guest Editorial: Building a More Secure Future: Developing Unbreakable Communication Protocols for the Quantum Era. IEEE Journal on Selected Areas in Communications, 2025. 43(8): p. 2728-2731.

[22] Durr, E.S., et al., Quantum Cryptography for Future Networks Security: A Systematic Review. IEEE Access, 2024. 12: p. 180048-180078.

[23] Rostami, M. and S. Goli-Bidgoli, An overview of QoS-aware load balancing techniques in SDN-based IoT networks. Journal of Cloud Computing, 2024. 13(1): p. 89.

[24] Farahi, R., A comprehensive overview of load balancing methods in software-defined networks. Discover Internet of Things, 2025. 5(1): p. 6.

[25] Sharma, A., V. Balasubramanian, and J. Kamruzzaman, A Temporal Deep Q Learning for Optimal Load Balancing in Software-Defined Networks. Sensors, 2024. 24(4): p. 1216.

[26] Mahmoudi, M., et al., A new method for load balancing in DSDN-Based data centers using adaptive clustering and normal Cone-Based estimation approaches. Expert Systems with Applications, 2025. 280: p. 127606.

[27] Cheng, Y., et al., Optimizing incremental SDN upgrades for load balancing in ISP networks. Theoretical Computer Science, 2023. 962: p. 113927.

[28] Alhilali, A.H. and A. Montazerolghaem, Artificial intelligence based load balancing in SDN: A comprehensive survey. Internet of Things, 2023. 22: p. 100814.

[29] Gottesman, D., et al. Security of quantum key distribution with imperfect devices. in International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings. 2004.

[30] Houhamdi, Z. and B. Athamena. Load Balancing Algorithms for Software-Defined Networks. in 2023 Tenth International Conference on Software Defined Systems (SDS). 2023.

Downloads

Published

16-03-2026

How to Cite

1.
Li J, You F, Chen D. Quantum Communication Technology for Optimizing 3D Cost Estimation and Secure Data Transmission in Substation Engineering. EAI Endorsed Scal Inf Syst [Internet]. 2026 Mar. 16 [cited 2026 Mar. 18];12(8). Available from: https://publications.eai.eu/index.php/sis/article/view/12021