Abstract
There are a large variety of kinds of mobile wireless networks, Wi-Fi, based on the IEEE 802.11 standard, is a wireless local area network, mainly used in offices and campus at universities, meeting rooms, halls in hotels or in airports. For such limited coverage area, IEEE 802.11 standard may be observed as building-oriented environment, which potentially offers a chance to let quantum key distribution (QKD) play a role in the security of wireless communications. In fact, secured data transmission is one of the prime aspects of wireless networks as they are much more vulnerable to security attacks. In this paper, we explore the possibility of using an agent-oriented Quantum Key Distribution for authentication and data encryption for IEEE 802.11 standard based on our previous research. It will focus on some basic concept that how QKD merges the wireless communication, in particular the IEEE 802.11 standard. The software implementation of the first two phases of QKD, namely (a) raw key extraction and (b) error estimation, will be carefully investigated in this paper. A Wi-Fi based concept has been extended to the implement the communication between two users in C++ language in this paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Park, D.: The Lack of WiFi Security (part 1) (December 07, 2006), http://www.windowsecurity.com/articles/WiFi-security-lack-Part1.html?prontversion
IEEE Standard for Local Metropolitan area networks, Part 16: Air Interface for Fixed Broadband Wireless Access Systems
Building the Quantum Network, Chip Elliott, BBN Technologies. New Journal of Physics 4, 46.1–46.12 (2002), http://www.iop.org/EJ/article/1367-2630/4/1/346/nj2146.html
Hasan, J.: Security Issues of IEEE 802.16 (WiMAX)
Bennett, C.H., et al.: Experimental Quantum Cryptography. J. Cryptology 5(1), 3–28 (1992)
IEEE Standrad 802.11i, Part 11: Wireless LAM Medium Access Control (MAC) and Physical Layer (PHY) specifications – Amendment 6: Medium Access Control (MAC) Security Enhancements (July 2004)
Xu, S., Matthews, M., Huang, C.-T.: Security Issues in Privacy Key Management Protocols of IEEE 802.16
Philip Craiger, J.: 802.11, 802.1x, and wireless security, GIAC security essentials certification Practical Asssignment, version 1.4, ©SANS Institute (2002)
Connolly, P.J.: The trouble with 802.1x, InfoWorld (March 8, 2002), http://www.infoworld.com/articles/fe/xml/02/03/11/020311fe8021x.xml
Schwartz, E.: Researchers crack new wireless security spec. InfoWorld (February 14, 2002), http://www.infoworld.com/articies/hn/xml/02/02/14/020214hnwifispec.xml
Bennett, C.H.: Quantum Cryptography: Uncertainty in the Service of Privacy. Science 257, 752–753 (1992)
Lenz, M.: High Bit Rate Quantum Key Distribution Systems 5th Year Project Report 2006/2007, Heriot Watt University (February 16, 2007), http://moritz.faui2k3.org/
Buttler, W.T., Hughes, R.J., Kwiat, P.G., Luther, G.G., Morgan, G.L., Nordholt, J.E., Peterson, C.G., Simmons, C.M.: Free-space quantum key distribution (January 1998) ar Xiv: quant-ph/9801006 v1
Wootters, W., Zurek, W.: A single quantum cannot be cloned. Nature 299, 802–803 (1982)
Edeny, J., Arbaugh, W.A.: Real 802.11 Security-Wi-Fi protected access and 802.11i. Addison Wesley, Reading (2004)
Nguyen, T.M.T., Sfaxi, M.A., Ghernaouti-Hélie, S.: 802.11i Encryption key distribution using quantum cryptography. Journal of Networks 1(5), 9–20 (2006)
Bennett, C.H., Brassard, G.: Quantum Cryptography: Public Key Distribution and Coin Tossing. In: Proceedings of IEEE International Conference on Computers Systems and Signal Processing, Bangalore, India, December 1984, pp. 175–179 (1984)
Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121–3124 (1992)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Huang, X., Sharma, D. (2008). An Agent-Oriented Quantum Key Distribution for Wi-Fi Network Security. In: Lovrek, I., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2008. Lecture Notes in Computer Science(), vol 5179. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85567-5_29
Download citation
DOI: https://doi.org/10.1007/978-3-540-85567-5_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-85566-8
Online ISBN: 978-3-540-85567-5
eBook Packages: Computer ScienceComputer Science (R0)