Abstract
This paper addresses the security WLAN protocol based on Quantum Greenberger–Horne–Zeilinger stats to overcome the flaws of wired equivalent privacy, temporal key integrity protocol, counter mode with CBC-MAC protocol, IEEE802.11i protocol, and ensure wireless communication information security. Our main theorem have two important corollaries. The first is an ingenious application of quantum mechanics to apply in wireless communication theorem. The second is the proof of the protocol that Eve invariably introduces errors within communication network if it wants to gain useful information. Here the novel idea is that quantum cryptography guarantees the security of wireless communication information.



Similar content being viewed by others
References
Chi, K.-H., Shih, Y.-C., Liu, H.-H., Wang, J.-T., Tsao, S.-L., & Tseng, C.-C. (2011). Fast handoff in secure IEEE 802.11s Mmsh networks. IEEE Transactions on Vehicular Technology, 60(1), 219–232.
Aizan, N. H. K., Zukarnain, Z. A., & Zainuddin, H. (2010). Implementation of BB84 protocol on 802.11i. In 2010 Second international conference on network applications protocols and services (NETAPPS), pp. 130–134.
Nguyen, T. M. T., Sfaxi, M. A., & Ghernaouti-Heliie, S. (2006). 802.11i encryption key distribution using quantum cryptography. Journal of Networks, 1(5), 9–20.
Wijesekera, S., Huang, X., & Sharma, D. (2009). Multi-agent based approach for quantum key distribution in WiFi networks. Agent and multi-agent systems, technologies and applications. Berlin: Springer.
Bennett, C. H., & Brassard, G. (1984). Quantum cryptography: public key distribution and coin tossing. In Proceeedings of the IEEE international conference on computers, system and signal processing, pp. 175–179.
Ekert, A. K. (1991). Quantum cryptography based on Bell’s theorem. Physical Review Letters, 67, 661–663.
Bostrom, K., & Felbinger, T. (2002). Deterministic secure direct communication using entanglement. Physical Review Letters, 89(18), 187902.
Deng, F.-G., & Long, G. L. (2004). Secure direct communication with a quantum one-time pad. Physical Review A, 69, 052319.
Wang, C., Deng, F.-G., Li, Y.-S., Liu, X.-S., & Long, G. L. (2005). Quantum secure direct communication with high-dimension quantum superdense coding. Physical Review A, 71, 044305.
Zhang, Z., Li, Y., & Man, Z. (2005). Multiparty quantum secret sharing. Physical Review A, 71, 044301.
Ma, H., Chen, B., Guo, Z., & Li, H. (2008). Development of quantum network based on multiparty quantum secret sharing. Canadian Journal of Physics, 86(9), 1097–1101.
Hillery, M., Buvek, V., & Berthiaume, A. (1999). Quantum secret sharing. Physical Review A, 59, 1829–1834.
Acknowledgments
This research was supported by Science and Technology Program of High Education of Shandong, China (Grant No. J11LG07), Qingdao Science and Technology Program—Fundamental Research, China (Grant No. 12-1-4-4-(6)-JCH), National Natural Science Foundation of China (Grant Nos. 61173056, 11304174).