Novel protocol and its implementation QKD in Wi-Fi networks

Xu Huang, Shirantha Wijesekera, Dharmendra Sharma

Research output: A Conference proceeding or a Chapter in BookConference contributionpeer-review

Abstract

It is the fact that wireless networks have become one of the most widely used communication systems in the world. However, providing secure communication for wireless networks has become one of the prime concerns. Quantum cryptography, namely Quantum Key Distribution (QKD), offers the promise of unconditional security. In this paper, we have extended our previous research work to a new protocol with the method of integrating quantum cryptography for key distribution in 802.11 wireless networks. Our contributions, based on our previous results [1], are as follows: (1) we shall show how QKD can be implemented in IEEE 802.11 wireless networks to securely distribute the keys. (2) We shall introduce a novel protocol with a method that take the advantage of mutual authentication features offered by some EAP variants of 802.1X Port-Based Network Access Control. (3) Finally, we present a new code called Quantum Message Integrity Code (Q-MIC) which provides mutual authentication between the two communication parties and its implementation

Original languageEnglish
Title of host publicationProceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009
EditorsHuaikou Miao, Gongzhu Hu
Place of PublicationPiscataway, USA
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages812-817
Number of pages6
ISBN (Print)9780769536415
DOIs
Publication statusPublished - 2009
Event8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009 - Shanghai, China
Duration: 1 Jun 20093 Jun 2009

Conference

Conference8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009
Country/TerritoryChina
CityShanghai
Period1/06/093/06/09

Fingerprint

Dive into the research topics of 'Novel protocol and its implementation QKD in Wi-Fi networks'. Together they form a unique fingerprint.

Cite this