Skip to main content

Multi-Agent Based Approach for Quantum Key Distribution in WiFi Networks

  • Conference paper
Agent and Multi-Agent Systems: Technologies and Applications (KES-AMSTA 2009)

Abstract

Security in WiFi networks has become a major concern as the wireless networks are vulnerable to security threats than wired networks. The 802.11i wireless networks uses 4 way handshake protocol to distribute the key hierarchy in order to encrypt the data communication. In our previous research work [2], we have discussed the use of Quantum Key Distribution (QKD), for key distribution in 802.11 wireless networks. The whole communication flow of our proposed protocol can be split into several key processes. It can be seen that these processes can be implemented efficiently using Software Agents. In this paper we shall discuss the use of Software Agents in quantum cryptography based key distribution in WiFi wireless networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. IEEE Std 802.11i, IEEE Standard for Information Technology – Telecommunication and information exchange between systems – Local and metropolitan area networks – Specific requirements. Part 11: Wireless LAN Medium Access Control O(MAC) and Physical Layer (PHY) specifications, Amendment 6: Medium Access Control (MAC) Security Enhancements (2004)

    Google Scholar 

  2. Huang, X., Wijesekera, S., Sharma, D.: Implementation of Quantum Key Distribution in Wi-Fi (IEEE 802.11) Wireless Networks. In: IEEE the 10th International Conference on Advanced Communication Technology, Phoenix Park, Korea, Proceedings, February 17-20, vol. II, p. 865 (2008) ISSN 1738-9445, ISBN 978-89-5519-135-6

    Google Scholar 

  3. ANSI/IEEE 802.11, 1999 Edition (R2003), Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (2003)

    Google Scholar 

  4. IEEE Std 802.1X, IEEE Standard for Local and metropolitan area networks, Port-Based Network Access Control (2004)

    Google Scholar 

  5. Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: RFC – 3748, Extensible Authentication Protocol (EAP) (2004)

    Google Scholar 

  6. Scarani, V., Acin, A., Ribordy, G., Gisin, N.: Quantum cryptography protocols robust against photon number splitting attacks (2004)

    Google Scholar 

  7. Bennett, C.H., Brassard, G.: Quantum cryptography: Public-key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, December 1984, pp. 175–179 (1984)

    Google Scholar 

  8. Bennett, C.H.: Phys. Rev. Lett. 68, 3121 (1992)

    Google Scholar 

  9. Bruß, D.: Optimal Eavesdropping in Quantum Cryptography with Six States. Physical Review Letters 81, 3018 (1998)

    Article  Google Scholar 

  10. He, C., Mitchell, J.C.: Analysis of the 802.11i 4-way Handshake

    Google Scholar 

  11. De Rango, F., Lentini, D., Marano, S.: Statis and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i (June 2006)

    Google Scholar 

  12. He, C., Mitchell, J.C.: Security Analysis and Improvements for IEEE 802.11i

    Google Scholar 

  13. Mishra, A., Arbaudh, W.A.: An Initial Analysis of the IEEE 802.1X Standard (February 2002)

    Google Scholar 

  14. Neal Leavitt, Will IEEE 802.1X Finally Take Off in 2008? IEEE Computer Society, Los Alamitos, pp. 82–85 (March 2008)

    Google Scholar 

  15. Multi-Agent Systems, http://www.cs.cmu.edu/~softagents/multi.html

  16. SECOQC, Development of a Global Network for Secure Communication based on Quantum Cryptography, http://www.secoqc.net/

  17. Graham-Rowe, D.: Quantum ATM’ rules out fraudulent web purchases. New Scientist (2629) (November 2007)

    Google Scholar 

  18. Mayers, D.: Unconditional Security in Quantum Cryptography. Journal of the ACM 48(3), 351–406 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  19. Nwana, H.S.: Software Agents: An Overview, Intelligent Systems Research, AA&T, BT Laboratories (1996)

    Google Scholar 

  20. Automatic Resumption of Streaming Sessions over WiFi Using JADE, Alvaro Suárez, Member, IAENG, M. La-Menza, Elsa M. Macías, Member, IAENG and Vaidy Sunderam

    Google Scholar 

  21. Genesereth, M., Fikes, R.: Knowledge interchange format. Version 3.0 Reference Manual, Technical Report Logic 92-1, Computer Science Department, Stanford University (1992)

    Google Scholar 

  22. id Quantique, Quantum Cryptography, http://www.idquantique.com/

  23. New Scientist, Quantum ATM rules out fraudulent web purchases (November 10, 2007)

    Google Scholar 

  24. Appleby, Steward: Mobile Software Agents for Control in Telecommunications Networks. BT Technological Journal 12(2), 1040113 (1994)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wijesekera, S., Huang, X., Sharma, D. (2009). Multi-Agent Based Approach for Quantum Key Distribution in WiFi Networks. In: HÃ¥kansson, A., Nguyen, N.T., Hartung, R.L., Howlett, R.J., Jain, L.C. (eds) Agent and Multi-Agent Systems: Technologies and Applications. KES-AMSTA 2009. Lecture Notes in Computer Science(), vol 5559. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01665-3_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-01665-3_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-01664-6

  • Online ISBN: 978-3-642-01665-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics