Implementation of QKD in 802.11 Networks

Xu Huang, Don Wijesekera, Dharmendra Sharma

    Research output: A Conference proceeding or a Chapter in BookConference contribution

    2 Citations (Scopus)

    Abstract

    It is the fact that wireless networks have become one of the most widely used communication systems in the world. However, providing secure communication for wireless networks has become one of the prime concerns. Quantum cryptography, namely quantum key distribution (QKD), offers the promise of unconditional security. In this paper, we shall extend our previous research work to a new method of integrating quantum cryptography for key distribution in 802.11 wireless networks. Our contributions, based on our previous results, are as follows: (1) showing how QKD can be implemented in IEEE 802.11 wireless networks (2) introducing a novel method that takes the advantage of mutual authentication features offered by some EAP variants of 802.1X port-based network access control (PBNAC) (3) presenting a new code titled quantum message integrity code (Q-MIC) that provides mutual authentication between the two communication parties and its implementation.
    Original languageEnglish
    Title of host publicationProceedings of the International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009)
    EditorsZhengbing Hu, Weiming Li
    Place of PublicationUnited States
    PublisherIEEE, Institute of Electrical and Electronics Engineers
    Pages125-128
    Number of pages4
    Volume2
    ISBN (Print)9780769536101
    DOIs
    Publication statusPublished - 2009
    EventIEEE International Conference on Network Security, Wireless Communication and Trusted Computing - Wuhan, China
    Duration: 25 Apr 200926 Apr 2009

    Conference

    ConferenceIEEE International Conference on Network Security, Wireless Communication and Trusted Computing
    CountryChina
    CityWuhan
    Period25/04/0926/04/09

    Fingerprint

    Quantum cryptography
    Wireless networks
    Authentication
    Access control
    Communication systems
    Communication

    Cite this

    Huang, X., Wijesekera, D., & Sharma, D. (2009). Implementation of QKD in 802.11 Networks. In Z. Hu, & W. Li (Eds.), Proceedings of the International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009) (Vol. 2, pp. 125-128). United States: IEEE, Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/NSWCTC.2009.48
    Huang, Xu ; Wijesekera, Don ; Sharma, Dharmendra. / Implementation of QKD in 802.11 Networks. Proceedings of the International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009). editor / Zhengbing Hu ; Weiming Li. Vol. 2 United States : IEEE, Institute of Electrical and Electronics Engineers, 2009. pp. 125-128
    @inproceedings{61b719098ed447b19167ca22e0f05341,
    title = "Implementation of QKD in 802.11 Networks",
    abstract = "It is the fact that wireless networks have become one of the most widely used communication systems in the world. However, providing secure communication for wireless networks has become one of the prime concerns. Quantum cryptography, namely quantum key distribution (QKD), offers the promise of unconditional security. In this paper, we shall extend our previous research work to a new method of integrating quantum cryptography for key distribution in 802.11 wireless networks. Our contributions, based on our previous results, are as follows: (1) showing how QKD can be implemented in IEEE 802.11 wireless networks (2) introducing a novel method that takes the advantage of mutual authentication features offered by some EAP variants of 802.1X port-based network access control (PBNAC) (3) presenting a new code titled quantum message integrity code (Q-MIC) that provides mutual authentication between the two communication parties and its implementation.",
    author = "Xu Huang and Don Wijesekera and Dharmendra Sharma",
    year = "2009",
    doi = "10.1109/NSWCTC.2009.48",
    language = "English",
    isbn = "9780769536101",
    volume = "2",
    pages = "125--128",
    editor = "Zhengbing Hu and Weiming Li",
    booktitle = "Proceedings of the International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009)",
    publisher = "IEEE, Institute of Electrical and Electronics Engineers",
    address = "United States",

    }

    Huang, X, Wijesekera, D & Sharma, D 2009, Implementation of QKD in 802.11 Networks. in Z Hu & W Li (eds), Proceedings of the International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009). vol. 2, IEEE, Institute of Electrical and Electronics Engineers, United States, pp. 125-128, IEEE International Conference on Network Security, Wireless Communication and Trusted Computing, Wuhan, China, 25/04/09. https://doi.org/10.1109/NSWCTC.2009.48

    Implementation of QKD in 802.11 Networks. / Huang, Xu; Wijesekera, Don; Sharma, Dharmendra.

    Proceedings of the International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009). ed. / Zhengbing Hu; Weiming Li. Vol. 2 United States : IEEE, Institute of Electrical and Electronics Engineers, 2009. p. 125-128.

    Research output: A Conference proceeding or a Chapter in BookConference contribution

    TY - GEN

    T1 - Implementation of QKD in 802.11 Networks

    AU - Huang, Xu

    AU - Wijesekera, Don

    AU - Sharma, Dharmendra

    PY - 2009

    Y1 - 2009

    N2 - It is the fact that wireless networks have become one of the most widely used communication systems in the world. However, providing secure communication for wireless networks has become one of the prime concerns. Quantum cryptography, namely quantum key distribution (QKD), offers the promise of unconditional security. In this paper, we shall extend our previous research work to a new method of integrating quantum cryptography for key distribution in 802.11 wireless networks. Our contributions, based on our previous results, are as follows: (1) showing how QKD can be implemented in IEEE 802.11 wireless networks (2) introducing a novel method that takes the advantage of mutual authentication features offered by some EAP variants of 802.1X port-based network access control (PBNAC) (3) presenting a new code titled quantum message integrity code (Q-MIC) that provides mutual authentication between the two communication parties and its implementation.

    AB - It is the fact that wireless networks have become one of the most widely used communication systems in the world. However, providing secure communication for wireless networks has become one of the prime concerns. Quantum cryptography, namely quantum key distribution (QKD), offers the promise of unconditional security. In this paper, we shall extend our previous research work to a new method of integrating quantum cryptography for key distribution in 802.11 wireless networks. Our contributions, based on our previous results, are as follows: (1) showing how QKD can be implemented in IEEE 802.11 wireless networks (2) introducing a novel method that takes the advantage of mutual authentication features offered by some EAP variants of 802.1X port-based network access control (PBNAC) (3) presenting a new code titled quantum message integrity code (Q-MIC) that provides mutual authentication between the two communication parties and its implementation.

    U2 - 10.1109/NSWCTC.2009.48

    DO - 10.1109/NSWCTC.2009.48

    M3 - Conference contribution

    SN - 9780769536101

    VL - 2

    SP - 125

    EP - 128

    BT - Proceedings of the International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009)

    A2 - Hu, Zhengbing

    A2 - Li, Weiming

    PB - IEEE, Institute of Electrical and Electronics Engineers

    CY - United States

    ER -

    Huang X, Wijesekera D, Sharma D. Implementation of QKD in 802.11 Networks. In Hu Z, Li W, editors, Proceedings of the International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009). Vol. 2. United States: IEEE, Institute of Electrical and Electronics Engineers. 2009. p. 125-128 https://doi.org/10.1109/NSWCTC.2009.48