Skip to main content

Application of the Multi-stage Protocol in IEEE 802.11i

  • Chapter
  • First Online:
Multi-photon Quantum Secure Communication

Abstract

This chapter extends the application space of the multi-stage multi-photon protocol to wireless communication. In particular, it examines the viability of using the multi-stage multi-photon protocol for secure key distribution in the IEEE 802.11i protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Nomula, R., Rifai, M. E., & Verma, P. (n.d.) Multi-photon tolerant protocols for quantum secure communication in wireless standards. International Journal of Security and Networks, 11 (in press).

    Google Scholar 

  2. Society, I. C. 802.1X. In IEEE Standard for Local and metropolitan area networks Port-Based Network Access Control. NY, USA: IEEE.

    Google Scholar 

  3. He, C., & Mitchell, J. C. (2004). Analysis of the 802.11i 4-way handshake. In Proceedings of the 3rd ACM Workshop on Wireless security, ACM.

    Google Scholar 

  4. He, C., & Mitchell, J. C. (2004). Message attack on the 4-Way handshake. In Submissions to IEEE.

    Google Scholar 

  5. De Rango, F., Lentini, D. C., & Marano, S. (2006). Static and dynamic 4-way handshake solutions to avoid denial of service attack in Wi-Fi protected access and IEEE 802.11i. EURASIP Journal on Wireless Communications and Networking, 2006(2), 73.

    Google Scholar 

  6. Mitchell, C. H. J. C. (2005) Security analysis and improvements for IEEE 802.11i. In The 12th Annual Network and Distributed System Security Symposium (NDSS’05), Citeseer.

    Google Scholar 

  7. Bai, Z., & Bai, Y. (2009) 4-way handshake solutions to avoid denial of service attack in ultra wideband networks. In Intelligent Information Technology Application, 2009. IITA 2009. Third International Symposium on, IEEE.

    Google Scholar 

  8. Wijesekera, S. (2011) Quantum cryptography for secure communication in IEEE 802.11 wireless networks. Canberra: University of Canberra.

    Google Scholar 

  9. Nguyen, T. M. T., Sfaxi, M. A. & Ghernaouti-Hélie, S. (2006). Integration of quantum cryptography in 802.11 networks. In Availability, Reliability and Security, 2006. ARES 2006. The First International Conference on, IEEE.

    Google Scholar 

  10. El Rifai, M., & Verma, P. K. (2013). An algorithmic approach to securing the three-stage quantum cryptography protocol. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, IEEE.

    Google Scholar 

  11. Thomas, J. H. (2007) Variations on Kak’s three stage quantum cryptography protocol. arXiv preprint arXiv:0706.2888.

  12. Ganeshkumar, G., et al. (1999) The university of Canberra quantum key distribution testbed.

    Google Scholar 

  13. Edwards, P., & Lynam, P. (2002) The University of Canberra–Telstra tower free-space quantum key distribution testbed. ITEE Society Monitor (March 2002).

    Google Scholar 

  14. Edwards, P. J. The University of Canberra–Telstra tower quantum crypto-key telecommunications link, advanced telecommunications and electronics research centre.

    Google Scholar 

  15. Wijesekera, S., Huang, X., & Sharma, D. (2009) Multi-agent based approach for quantum key distribution in WiFi networks. In Agent and Multi-Agent Systems: Technologies and Applications (pp. 293–303). Berlin: Springer.

    Google Scholar 

  16. Weiss, G. (1999). Multiagent systems: A modern approach to distributed artificial intelligence. Cambridge: MIT press.

    Google Scholar 

  17. El Rifai, M., & Verma, P. K. (2015) Quantum secure communication using a multi-photon tolerant protocol. In Proc. SPIE 9377, Advances in Photonics of Quantum Computing, Memory, and Communication VIII, 937713 (March 4, 2015), https://doi.org/10.1117/12.2077229.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pramode K. Verma .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Verma, P.K., El Rifai, M., Chan, K.W.C. (2019). Application of the Multi-stage Protocol in IEEE 802.11i. In: Multi-photon Quantum Secure Communication. Signals and Communication Technology. Springer, Singapore. https://doi.org/10.1007/978-981-10-8618-2_9

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8618-2_9

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8617-5

  • Online ISBN: 978-981-10-8618-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics