Abstract
This chapter extends the application space of the multi-stage multi-photon protocol to wireless communication. In particular, it examines the viability of using the multi-stage multi-photon protocol for secure key distribution in the IEEE 802.11i protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Nomula, R., Rifai, M. E., & Verma, P. (n.d.) Multi-photon tolerant protocols for quantum secure communication in wireless standards. International Journal of Security and Networks, 11 (in press).
Society, I. C. 802.1X. In IEEE Standard for Local and metropolitan area networks Port-Based Network Access Control. NY, USA: IEEE.
He, C., & Mitchell, J. C. (2004). Analysis of the 802.11i 4-way handshake. In Proceedings of the 3rd ACM Workshop on Wireless security, ACM.
He, C., & Mitchell, J. C. (2004). Message attack on the 4-Way handshake. In Submissions to IEEE.
De Rango, F., Lentini, D. C., & Marano, S. (2006). Static and dynamic 4-way handshake solutions to avoid denial of service attack in Wi-Fi protected access and IEEE 802.11i. EURASIP Journal on Wireless Communications and Networking, 2006(2), 73.
Mitchell, C. H. J. C. (2005) Security analysis and improvements for IEEE 802.11i. In The 12th Annual Network and Distributed System Security Symposium (NDSS’05), Citeseer.
Bai, Z., & Bai, Y. (2009) 4-way handshake solutions to avoid denial of service attack in ultra wideband networks. In Intelligent Information Technology Application, 2009. IITA 2009. Third International Symposium on, IEEE.
Wijesekera, S. (2011) Quantum cryptography for secure communication in IEEE 802.11 wireless networks. Canberra: University of Canberra.
Nguyen, T. M. T., Sfaxi, M. A. & Ghernaouti-Hélie, S. (2006). Integration of quantum cryptography in 802.11 networks. In Availability, Reliability and Security, 2006. ARES 2006. The First International Conference on, IEEE.
El Rifai, M., & Verma, P. K. (2013). An algorithmic approach to securing the three-stage quantum cryptography protocol. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, IEEE.
Thomas, J. H. (2007) Variations on Kak’s three stage quantum cryptography protocol. arXiv preprint arXiv:0706.2888.
Ganeshkumar, G., et al. (1999) The university of Canberra quantum key distribution testbed.
Edwards, P., & Lynam, P. (2002) The University of Canberra–Telstra tower free-space quantum key distribution testbed. ITEE Society Monitor (March 2002).
Edwards, P. J. The University of Canberra–Telstra tower quantum crypto-key telecommunications link, advanced telecommunications and electronics research centre.
Wijesekera, S., Huang, X., & Sharma, D. (2009) Multi-agent based approach for quantum key distribution in WiFi networks. In Agent and Multi-Agent Systems: Technologies and Applications (pp. 293–303). Berlin: Springer.
Weiss, G. (1999). Multiagent systems: A modern approach to distributed artificial intelligence. Cambridge: MIT press.
El Rifai, M., & Verma, P. K. (2015) Quantum secure communication using a multi-photon tolerant protocol. In Proc. SPIE 9377, Advances in Photonics of Quantum Computing, Memory, and Communication VIII, 937713 (March 4, 2015), https://doi.org/10.1117/12.2077229.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Verma, P.K., El Rifai, M., Chan, K.W.C. (2019). Application of the Multi-stage Protocol in IEEE 802.11i. In: Multi-photon Quantum Secure Communication. Signals and Communication Technology. Springer, Singapore. https://doi.org/10.1007/978-981-10-8618-2_9
Download citation
DOI: https://doi.org/10.1007/978-981-10-8618-2_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8617-5
Online ISBN: 978-981-10-8618-2
eBook Packages: EngineeringEngineering (R0)