Implementation of QKD in 802.11 Networks

Xu Huang, Don Wijesekera, Dharmendra Sharma

Research output: A Conference proceeding or a Chapter in BookConference contributionpeer-review

3 Citations (Scopus)
51 Downloads (Pure)

Abstract

It is the fact that wireless networks have become one of the most widely used communication systems in the world. However, providing secure communication for wireless networks has become one of the prime concerns. Quantum cryptography, namely quantum key distribution (QKD), offers the promise of unconditional security. In this paper, we shall extend our previous research work to a new method of integrating quantum cryptography for key distribution in 802.11 wireless networks. Our contributions, based on our previous results, are as follows: (1) showing how QKD can be implemented in IEEE 802.11 wireless networks (2) introducing a novel method that takes the advantage of mutual authentication features offered by some EAP variants of 802.1X port-based network access control (PBNAC) (3) presenting a new code titled quantum message integrity code (Q-MIC) that provides mutual authentication between the two communication parties and its implementation.
Original languageEnglish
Title of host publicationProceedings of the International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009)
EditorsZhengbing Hu, Weiming Li
Place of PublicationUnited States
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages125-128
Number of pages4
Volume2
ISBN (Print)9780769536101
DOIs
Publication statusPublished - 2009
EventIEEE International Conference on Network Security, Wireless Communication and Trusted Computing - Wuhan, China
Duration: 25 Apr 200926 Apr 2009

Conference

ConferenceIEEE International Conference on Network Security, Wireless Communication and Trusted Computing
Country/TerritoryChina
CityWuhan
Period25/04/0926/04/09

Fingerprint

Dive into the research topics of 'Implementation of QKD in 802.11 Networks'. Together they form a unique fingerprint.

Cite this