CFP last date
20 December 2024
Reseach Article

Effective Key Authentication for IEEE 802.11 Networks using Quantum Cryptography

by G.. Murali, R. Siva Ram Prasad, V. Swetha Madhavi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 46 - Number 7
Year of Publication: 2012
Authors: G.. Murali, R. Siva Ram Prasad, V. Swetha Madhavi
10.5120/6921-9286

G.. Murali, R. Siva Ram Prasad, V. Swetha Madhavi . Effective Key Authentication for IEEE 802.11 Networks using Quantum Cryptography. International Journal of Computer Applications. 46, 7 ( May 2012), 26-28. DOI=10.5120/6921-9286

@article{ 10.5120/6921-9286,
author = { G.. Murali, R. Siva Ram Prasad, V. Swetha Madhavi },
title = { Effective Key Authentication for IEEE 802.11 Networks using Quantum Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { May 2012 },
volume = { 46 },
number = { 7 },
month = { May },
year = { 2012 },
issn = { 0975-8887 },
pages = { 26-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume46/number7/6921-9286/ },
doi = { 10.5120/6921-9286 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:39:09.269805+05:30
%A G.. Murali
%A R. Siva Ram Prasad
%A V. Swetha Madhavi
%T Effective Key Authentication for IEEE 802.11 Networks using Quantum Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 46
%N 7
%P 26-28
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless networks are growing tremendously and their applications are also becoming prominent from day to day [5]. As wireless applications are becoming popular, the security issues [3] related to 802. 11 are also has a great consideration. These are gaining popularity because of their mobility, low cost, convenience and easy establishment. Among many wireless networks, the 802. 11 has a large amount of users than compared to the others globally. The key which is used for encrypting and decrypting purpose plays a crucial role between users. As the wireless networks are open guide medium of wireless communications [3] , there is possibility for hackers to snoop on confidential communications. There is a chance to modify them to gain the access to the wireless networks more easily. In the key distribution of quantum is done according to Heisenberg uncertainty Principle. We will be focusing on Quantum Key Distribution which offers a high level security between two communication parties with the help of novel protocol. We will also focusing on the analysis of experimental results focusing on the different phases of protocol.

References
  1. Xu Huang, Shirantha Wijesekera and Dharmendra Sharma, "Secure Communication in 802. 11 Networks with a Novel Protocol Using Quantum Cryptography", 2010.
  2. Karen Scarfone, Derrick Dicoi, Matthew Sexton and Cyrus Tibbs, "Guide to Securing Legacy IEEE 802. 11 Wireless Networks", 2008.
  3. Robert J. Boncella, "WIRELESS SECURITY: AN OVERVIEW", 2002.
  4. Sandra Kay Miller, "Facing the Challenge of Wireless Security".
  5. Xu Huang, Shirantha Wijesekera and Dharmendra Sharma, "Secure Communication in 802. 11 Networks with a Novel Protocol Using Quantum Cryptography", 2010.
  6. Xu Huang, Shirantha Wijesekera, and Dharmendra Sharma, "Implementation of Quantum Key Distribution in Wi-Fi (IEEE 802. 11) Wireless Networks," IEEE the 10th International Conference on Advanced Communication Technology, Feb 17- 20, 2008 Phoenix Park, Korea. Proceedings ISSN 1738-9445, ISBN 978-89-5519-135-6, Vol. II, p865.
  7. Changhua He, John C Mitchell, Analysis of the802. 11i 4-way Handshake.
  8. BENNETT, c. H. , BRASSARD, G. BREIDBART, s. , and WIESNER, s. : 'Quantum cryptography or unforgeable subway tokens' in CHAUM, D. , RIVEST, R. L. , and SHERMAN, A. T. (Eds. ): 'Advances in cryptology: Proceedings of Crypto'BZ' (Alenium Press, New York 1983).
  9. Hewlett-Packard - Quantum Cryptography (2009) http://www. hpl. hp. com/research/about/quantum_cryptography. html.
  10. P. J Edwards The University of Canberra –Telstra Tower Quantum Crypto –Key Telecommunications Link, Advanced Telecommunications and Quantum Electronics Research Centre University of Canberra, 2002.
  11. IEEE Std 802. 11, IEEE Standard for Information Technology – Specific requirements. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, Amendment 6, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Quantum Cryptography Heisenberg Uncertainty Principle