Abstract
Original language | English |
---|---|
Title of host publication | Proceedings: 2010 4th International Conference on Network and System Security (NSS) |
Editors | Yang Xiang , Pierangela Samarati , Jiankun Hu, Wanlei Zhou, Ahmad-Reza Sadeghi |
Place of Publication | Washington, DC, USA |
Publisher | IEEE, Institute of Electrical and Electronics Engineers |
Pages | 594-599 |
Number of pages | 6 |
Volume | 1 |
ISBN (Print) | 9780769541594 |
DOIs | |
Publication status | Published - 2010 |
Event | Fourth International Conference on Network and System Security (NSS 2010), - Melbourne, Australia Duration: 1 Sep 2010 → 3 Sep 2010 |
Conference
Conference | Fourth International Conference on Network and System Security (NSS 2010), |
---|---|
Country | Australia |
City | Melbourne |
Period | 1/09/10 → 3/09/10 |
Fingerprint
Cite this
}
Secure communication in 802.11 networks with a novel protocol using quantum cryptography. / Huang, Xu; Wijesekera, Don; Sharma, Dharmendra.
Proceedings: 2010 4th International Conference on Network and System Security (NSS). ed. / Yang Xiang ; Pierangela Samarati ; Jiankun Hu; Wanlei Zhou; Ahmad-Reza Sadeghi. Vol. 1 Washington, DC, USA : IEEE, Institute of Electrical and Electronics Engineers, 2010. p. 594-599.Research output: A Conference proceeding or a Chapter in Book › Conference contribution
TY - GEN
T1 - Secure communication in 802.11 networks with a novel protocol using quantum cryptography
AU - Huang, Xu
AU - Wijesekera, Don
AU - Sharma, Dharmendra
PY - 2010
Y1 - 2010
N2 - It is the fact that wireless local area networks are increasingly deployed by businesses, government and SOHO users as they offer many advantages to its customers with mobility, flexibility, convenience etc. It opened a wide range of new commercial areas for hardware vendors, at low cost. This justifies why wireless networks have become one of the most widely used communication systems in the world. However, since there are no boundaries in wireless networks, they are vulnerable to security threats than wired networks. Therefore, providing secure communication for wireless networks has become one of the prime concerns. Quantum cryptography, to be precise, Quantum Key Distribution (QKD), offers the promise of unconditional security. In this paper, we extend our previous research work of how QKD can be used in IEEE 802.11 wireless networks to ensure secure key distribution. Our contributions in this paper are as follows: (1) We discussed how QKD can be used in IEEE 802.11 wireless networks to securely distribute the keys. (2) We use new protocol QKD. (3) We introduced a method that take the advantage of mutual authentication features offered by some EAP variants of 802.1X Port-Based Network Access Control. (4) Finally, we present a new code called Quantum Message Integrity Code (Q-MIC) which provides mutual authentication between the two communication parties. Also experimental results are presented with Simulink Model.
AB - It is the fact that wireless local area networks are increasingly deployed by businesses, government and SOHO users as they offer many advantages to its customers with mobility, flexibility, convenience etc. It opened a wide range of new commercial areas for hardware vendors, at low cost. This justifies why wireless networks have become one of the most widely used communication systems in the world. However, since there are no boundaries in wireless networks, they are vulnerable to security threats than wired networks. Therefore, providing secure communication for wireless networks has become one of the prime concerns. Quantum cryptography, to be precise, Quantum Key Distribution (QKD), offers the promise of unconditional security. In this paper, we extend our previous research work of how QKD can be used in IEEE 802.11 wireless networks to ensure secure key distribution. Our contributions in this paper are as follows: (1) We discussed how QKD can be used in IEEE 802.11 wireless networks to securely distribute the keys. (2) We use new protocol QKD. (3) We introduced a method that take the advantage of mutual authentication features offered by some EAP variants of 802.1X Port-Based Network Access Control. (4) Finally, we present a new code called Quantum Message Integrity Code (Q-MIC) which provides mutual authentication between the two communication parties. Also experimental results are presented with Simulink Model.
U2 - 10.1109/NSS.2010.17
DO - 10.1109/NSS.2010.17
M3 - Conference contribution
SN - 9780769541594
VL - 1
SP - 594
EP - 599
BT - Proceedings: 2010 4th International Conference on Network and System Security (NSS)
A2 - Xiang , Yang
A2 - Samarati , Pierangela
A2 - Hu, Jiankun
A2 - Zhou, Wanlei
A2 - Sadeghi, Ahmad-Reza
PB - IEEE, Institute of Electrical and Electronics Engineers
CY - Washington, DC, USA
ER -