Skip to main content

An Agent-Oriented Quantum Key Distribution for Wi-Fi Network Security

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2008)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 5179))

Abstract

There are a large variety of kinds of mobile wireless networks, Wi-Fi, based on the IEEE 802.11 standard, is a wireless local area network, mainly used in offices and campus at universities, meeting rooms, halls in hotels or in airports. For such limited coverage area, IEEE 802.11 standard may be observed as building-oriented environment, which potentially offers a chance to let quantum key distribution (QKD) play a role in the security of wireless communications. In fact, secured data transmission is one of the prime aspects of wireless networks as they are much more vulnerable to security attacks. In this paper, we explore the possibility of using an agent-oriented Quantum Key Distribution for authentication and data encryption for IEEE 802.11 standard based on our previous research. It will focus on some basic concept that how QKD merges the wireless communication, in particular the IEEE 802.11 standard. The software implementation of the first two phases of QKD, namely (a) raw key extraction and (b) error estimation, will be carefully investigated in this paper. A Wi-Fi based concept has been extended to the implement the communication between two users in C++ language in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Park, D.: The Lack of WiFi Security (part 1) (December 07, 2006), http://www.windowsecurity.com/articles/WiFi-security-lack-Part1.html?prontversion

  2. IEEE Standard for Local Metropolitan area networks, Part 16: Air Interface for Fixed Broadband Wireless Access Systems

    Google Scholar 

  3. Building the Quantum Network, Chip Elliott, BBN Technologies. New Journal of Physics 4, 46.1–46.12 (2002), http://www.iop.org/EJ/article/1367-2630/4/1/346/nj2146.html

  4. Hasan, J.: Security Issues of IEEE 802.16 (WiMAX)

    Google Scholar 

  5. Bennett, C.H., et al.: Experimental Quantum Cryptography. J. Cryptology 5(1), 3–28 (1992)

    Article  MATH  Google Scholar 

  6. IEEE Standrad 802.11i, Part 11: Wireless LAM Medium Access Control (MAC) and Physical Layer (PHY) specifications – Amendment 6: Medium Access Control (MAC) Security Enhancements (July 2004)

    Google Scholar 

  7. Xu, S., Matthews, M., Huang, C.-T.: Security Issues in Privacy Key Management Protocols of IEEE 802.16

    Google Scholar 

  8. Philip Craiger, J.: 802.11, 802.1x, and wireless security, GIAC security essentials certification Practical Asssignment, version 1.4, ©SANS Institute (2002)

    Google Scholar 

  9. Connolly, P.J.: The trouble with 802.1x, InfoWorld (March 8, 2002), http://www.infoworld.com/articles/fe/xml/02/03/11/020311fe8021x.xml

  10. Schwartz, E.: Researchers crack new wireless security spec. InfoWorld (February 14, 2002), http://www.infoworld.com/articies/hn/xml/02/02/14/020214hnwifispec.xml

  11. Bennett, C.H.: Quantum Cryptography: Uncertainty in the Service of Privacy. Science 257, 752–753 (1992)

    Article  Google Scholar 

  12. Lenz, M.: High Bit Rate Quantum Key Distribution Systems 5th Year Project Report 2006/2007, Heriot Watt University (February 16, 2007), http://moritz.faui2k3.org/

  13. Buttler, W.T., Hughes, R.J., Kwiat, P.G., Luther, G.G., Morgan, G.L., Nordholt, J.E., Peterson, C.G., Simmons, C.M.: Free-space quantum key distribution (January 1998) ar Xiv: quant-ph/9801006 v1

    Google Scholar 

  14. Wootters, W., Zurek, W.: A single quantum cannot be cloned. Nature 299, 802–803 (1982)

    Article  Google Scholar 

  15. Edeny, J., Arbaugh, W.A.: Real 802.11 Security-Wi-Fi protected access and 802.11i. Addison Wesley, Reading (2004)

    Google Scholar 

  16. Nguyen, T.M.T., Sfaxi, M.A., Ghernaouti-Hélie, S.: 802.11i Encryption key distribution using quantum cryptography. Journal of Networks 1(5), 9–20 (2006)

    Article  Google Scholar 

  17. Bennett, C.H., Brassard, G.: Quantum Cryptography: Public Key Distribution and Coin Tossing. In: Proceedings of IEEE International Conference on Computers Systems and Signal Processing, Bangalore, India, December 1984, pp. 175–179 (1984)

    Google Scholar 

  18. Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121–3124 (1992)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ignac Lovrek Robert J. Howlett Lakhmi C. Jain

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Huang, X., Sharma, D. (2008). An Agent-Oriented Quantum Key Distribution for Wi-Fi Network Security. In: Lovrek, I., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2008. Lecture Notes in Computer Science(), vol 5179. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85567-5_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-85567-5_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-85566-8

  • Online ISBN: 978-3-540-85567-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics