QUANTUM CRYPTOGRAPHY BASED KEY DISTRIBUTION IN WI-FI NETWORKS - Protocol Modifications in IEEE 802.11

Shirantha Wijesekera, Xu Huang, Dharmendra Sharma

2010

Abstract

Demand for wireless communications around the world is growing. IEEE 802.11 wireless networks, also known as Wi-Fi, are one of the popular wireless networks with over millions of users across the globe. Hence, providing secure communication for wireless networks has become one of the prime concerns. We have proposed a Quantum Key Distribution (QKD) based novel protocol to exchange the encryption key in Wi-Fi networks. In this paper, we present the protocol modifications done in the existing IEEE 802.11 standard to implement the proposed QKD based key exchange.

References

  1. IEEE 802.11 (2003), Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications.
  2. Xu Huang, Shirantha Wijesekera, and Dharmendra Sharma, 2009. “Quantum Cryptography for Wireless Network Communications,” IEEE International Symposium on Wireless and Pervasive Computing, Melbourne, Australia, ISBN: 978-1-4244-2966-0, Security pp.1-pp5.
  3. Shirantha Wijesekera, Xu Huang, and Dharmendra Sharma, 2009. “A Novel Protocol using Quantum Cryptography for Secure Communication in 802.11 Networks,” IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM 2009), Kos, Greece.
  4. Xu Huang, Shirantha Wijesekera, and Dharmendra Sharma, 2008. “Implementation of Quantum Key Distribution in Wi-Fi (IEEE 802.11) Wireless Networks,” IEEE the 10th International Conference on Advanced Communication Technology, Korea. Proceedings ISSN 1738-9445, ISBN 978-89-5519- 135-6, Vol. II, p865.
  5. IEEE Std 802.11i (2004), IEEE Standard for Information Technology - Telecommunication and information exchange between systems - Local and metropolitan area networks - Specific requirements. Part 11: Wireless LAN Medium Access Control O(MAC) and Physical Layer (PHY) specifications, Amendment 6: Medium Access Control (MAC) Security Enhancements.
  6. Bennett, C. H. and Brassard, G. (1984), "Quantum cryptography: Public-key distribution and coin tossing", Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, December 1984, pp. 175 - 179.
  7. C.H. Bennett (1992), Phys. Rev. Lett. 68, 3121.
  8. Valerio Scarani, Antonio Acin, Grégoire Ribordy and Nicolas Gisin (2004), Quantum cryptography protocols robust against photon number splitting attcks.
  9. Dagmar Bruß (1998), Optimal Eavesdropping in Quantum Cryptography with Six States, Physical Review Letters, 81.3018.
  10. Computer World (2004), Quantum cryptography gets practical, http://www.computerworld.com/s/article/96111/Quant um_cryptography_gets_practical.
  11. Hewlett-Packard - Quantum Cryptography (2009), http://www.hpl.hp.com/research/about/quantum_crypt ography.html.
  12. SECOQC (2008) , Development of a Global Network for Secure Communication based on Quantum Cryptography, http://www.secoqc.net/.
  13. Floriano De Rango, Dionogi Lentini, Salvatore Marano (2006) , Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i .
  14. Changhua He, John C. Mitchell (2005), Security Analysis and Improvements for IEEE 802.11i.
  15. IEEE Std 802.11 (2007), IEEE Standard for Information Technology - Amendment 6: Medium Access Control (MAC) Security Enhancements.
  16. Gilles Brassard, Louis Salvail, Secret-Key Reconciliation by Public Discussion, SBN 978-3-540-57600-6, 1994.
  17. W. T. Buttler, S. K. Lamoreaux, J. R. Torgerson, G. H. Nickel, C. H. Donahue, and C. G. Peterson, Fast, Efficient error reconciliation for quantum cryptography,2003.
Download


Paper Citation


in Harvard Style

Wijesekera S., Huang X. and Sharma D. (2010). QUANTUM CRYPTOGRAPHY BASED KEY DISTRIBUTION IN WI-FI NETWORKS - Protocol Modifications in IEEE 802.11 . In Proceedings of the 5th International Conference on Software and Data Technologies - Volume 1: ICSOFT, ISBN 978-989-8425-22-5, pages 146-151. DOI: 10.5220/0003008901460151


in Bibtex Style

@conference{icsoft10,
author={Shirantha Wijesekera and Xu Huang and Dharmendra Sharma},
title={QUANTUM CRYPTOGRAPHY BASED KEY DISTRIBUTION IN WI-FI NETWORKS - Protocol Modifications in IEEE 802.11},
booktitle={Proceedings of the 5th International Conference on Software and Data Technologies - Volume 1: ICSOFT,},
year={2010},
pages={146-151},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003008901460151},
isbn={978-989-8425-22-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 5th International Conference on Software and Data Technologies - Volume 1: ICSOFT,
TI - QUANTUM CRYPTOGRAPHY BASED KEY DISTRIBUTION IN WI-FI NETWORKS - Protocol Modifications in IEEE 802.11
SN - 978-989-8425-22-5
AU - Wijesekera S.
AU - Huang X.
AU - Sharma D.
PY - 2010
SP - 146
EP - 151
DO - 10.5220/0003008901460151