Quantum Key Distribution for Wi-Fi Network Security

Research output: A Conference proceeding or a Chapter in BookConference contributionpeer-review

7 Citations (Scopus)
132 Downloads (Pure)

Abstract

There are a large variety of kinds of mobile wireless networks, Wi-Fi, based on the IEEE 802.11 standard, is a wireless local area network, mainly used in offices and campus at universities, meeting rooms, halls in hotels or in airports. For such limited coverage area, IEEE 802.11 standard may be observed as building-oriented environment, which potentially offers a chance to let quantum key distribution (QKD) play a role in the security of wireless communications. In fact, secured data transmission is one of the prime aspects of wireless networks as they are much more vulnerable to security attacks. In this paper, we explore the possibility of using Quantum Key Distribution (QKD) for authentication and data encryption for IEEE 802.11 standard. It will focus on some basic concept that how QKD merges the wireless communication, in particular the IEEE 802.11 standard. The software implementation of the first two phases of QKD, namely (a) raw key extraction and (b) error estimation, will be carefully investigated in this paper. A TCP/IP based Client-Server concept has been extended to the implement the communication between two users in C++ language in this paper.
Original languageEnglish
Title of host publicationIEEE International Conference on Circuits Systems for communications
EditorsBo Hu
Place of PublicationChina
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages121-125
Number of pages5
Volume2008
DOIs
Publication statusPublished - 2008
EventIEEE International Conference on Circuits & Systems for communications - Shanghai, China
Duration: 26 May 200828 May 2008

Conference

ConferenceIEEE International Conference on Circuits & Systems for communications
Country/TerritoryChina
CityShanghai
Period26/05/0828/05/08

Fingerprint

Dive into the research topics of 'Quantum Key Distribution for Wi-Fi Network Security'. Together they form a unique fingerprint.

Cite this