Abstract
Security in WiFi networks has become a major concern as the wireless networks are vulnerable to security threats than wired networks. The 802.11i wireless networks uses 4 way handshake protocol to distribute the key hierarchy in order to encrypt the data communication. In our previous research work [2], we have discussed the use of Quantum Key Distribution (QKD), for key distribution in 802.11 wireless networks. The whole communication flow of our proposed protocol can be split into several key processes. It can be seen that these processes can be implemented efficiently using Software Agents. In this paper we shall discuss the use of Software Agents in quantum cryptography based key distribution in WiFi wireless networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
IEEE Std 802.11i, IEEE Standard for Information Technology – Telecommunication and information exchange between systems – Local and metropolitan area networks – Specific requirements. Part 11: Wireless LAN Medium Access Control O(MAC) and Physical Layer (PHY) specifications, Amendment 6: Medium Access Control (MAC) Security Enhancements (2004)
Huang, X., Wijesekera, S., Sharma, D.: Implementation of Quantum Key Distribution in Wi-Fi (IEEE 802.11) Wireless Networks. In: IEEE the 10th International Conference on Advanced Communication Technology, Phoenix Park, Korea, Proceedings, February 17-20, vol. II, p. 865 (2008) ISSN 1738-9445, ISBN 978-89-5519-135-6
ANSI/IEEE 802.11, 1999 Edition (R2003), Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (2003)
IEEE Std 802.1X, IEEE Standard for Local and metropolitan area networks, Port-Based Network Access Control (2004)
Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: RFC – 3748, Extensible Authentication Protocol (EAP) (2004)
Scarani, V., Acin, A., Ribordy, G., Gisin, N.: Quantum cryptography protocols robust against photon number splitting attacks (2004)
Bennett, C.H., Brassard, G.: Quantum cryptography: Public-key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, December 1984, pp. 175–179 (1984)
Bennett, C.H.: Phys. Rev. Lett. 68, 3121 (1992)
Bruß, D.: Optimal Eavesdropping in Quantum Cryptography with Six States. Physical Review Letters 81, 3018 (1998)
He, C., Mitchell, J.C.: Analysis of the 802.11i 4-way Handshake
De Rango, F., Lentini, D., Marano, S.: Statis and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i (June 2006)
He, C., Mitchell, J.C.: Security Analysis and Improvements for IEEE 802.11i
Mishra, A., Arbaudh, W.A.: An Initial Analysis of the IEEE 802.1X Standard (February 2002)
Neal Leavitt, Will IEEE 802.1X Finally Take Off in 2008? IEEE Computer Society, Los Alamitos, pp. 82–85 (March 2008)
Multi-Agent Systems, http://www.cs.cmu.edu/~softagents/multi.html
SECOQC, Development of a Global Network for Secure Communication based on Quantum Cryptography, http://www.secoqc.net/
Graham-Rowe, D.: Quantum ATM’ rules out fraudulent web purchases. New Scientist (2629) (November 2007)
Mayers, D.: Unconditional Security in Quantum Cryptography. Journal of the ACM 48(3), 351–406 (2001)
Nwana, H.S.: Software Agents: An Overview, Intelligent Systems Research, AA&T, BT Laboratories (1996)
Automatic Resumption of Streaming Sessions over WiFi Using JADE, Alvaro Suárez, Member, IAENG, M. La-Menza, Elsa M. MacÃas, Member, IAENG and Vaidy Sunderam
Genesereth, M., Fikes, R.: Knowledge interchange format. Version 3.0 Reference Manual, Technical Report Logic 92-1, Computer Science Department, Stanford University (1992)
id Quantique, Quantum Cryptography, http://www.idquantique.com/
New Scientist, Quantum ATM rules out fraudulent web purchases (November 10, 2007)
Appleby, Steward: Mobile Software Agents for Control in Telecommunications Networks. BT Technological Journal 12(2), 1040113 (1994)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wijesekera, S., Huang, X., Sharma, D. (2009). Multi-Agent Based Approach for Quantum Key Distribution in WiFi Networks. In: HÃ¥kansson, A., Nguyen, N.T., Hartung, R.L., Howlett, R.J., Jain, L.C. (eds) Agent and Multi-Agent Systems: Technologies and Applications. KES-AMSTA 2009. Lecture Notes in Computer Science(), vol 5559. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01665-3_30
Download citation
DOI: https://doi.org/10.1007/978-3-642-01665-3_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-01664-6
Online ISBN: 978-3-642-01665-3
eBook Packages: Computer ScienceComputer Science (R0)