[go: up one dir, main page]

Skip to main content

Advertisement

Log in

Development of Security WLAN Protocol Based on Quantum GHZ Stats

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

This paper addresses the security WLAN protocol based on Quantum Greenberger–Horne–Zeilinger stats to overcome the flaws of wired equivalent privacy, temporal key integrity protocol, counter mode with CBC-MAC protocol, IEEE802.11i protocol, and ensure wireless communication information security. Our main theorem have two important corollaries. The first is an ingenious application of quantum mechanics to apply in wireless communication theorem. The second is the proof of the protocol that Eve invariably introduces errors within communication network if it wants to gain useful information. Here the novel idea is that quantum cryptography guarantees the security of wireless communication information.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Chi, K.-H., Shih, Y.-C., Liu, H.-H., Wang, J.-T., Tsao, S.-L., & Tseng, C.-C. (2011). Fast handoff in secure IEEE 802.11s Mmsh networks. IEEE Transactions on Vehicular Technology, 60(1), 219–232.

    Article  Google Scholar 

  2. Aizan, N. H. K., Zukarnain, Z. A., & Zainuddin, H. (2010). Implementation of BB84 protocol on 802.11i. In 2010 Second international conference on network applications protocols and services (NETAPPS), pp. 130–134.

  3. Nguyen, T. M. T., Sfaxi, M. A., & Ghernaouti-Heliie, S. (2006). 802.11i encryption key distribution using quantum cryptography. Journal of Networks, 1(5), 9–20.

    Article  Google Scholar 

  4. Wijesekera, S., Huang, X., & Sharma, D. (2009). Multi-agent based approach for quantum key distribution in WiFi networks. Agent and multi-agent systems, technologies and applications. Berlin: Springer.

    Google Scholar 

  5. Bennett, C. H., & Brassard, G. (1984). Quantum cryptography: public key distribution and coin tossing. In Proceeedings of the IEEE international conference on computers, system and signal processing, pp. 175–179.

  6. Ekert, A. K. (1991). Quantum cryptography based on Bell’s theorem. Physical Review Letters, 67, 661–663.

    Article  MATH  MathSciNet  Google Scholar 

  7. Bostrom, K., & Felbinger, T. (2002). Deterministic secure direct communication using entanglement. Physical Review Letters, 89(18), 187902.

    Article  Google Scholar 

  8. Deng, F.-G., & Long, G. L. (2004). Secure direct communication with a quantum one-time pad. Physical Review A, 69, 052319.

    Article  Google Scholar 

  9. Wang, C., Deng, F.-G., Li, Y.-S., Liu, X.-S., & Long, G. L. (2005). Quantum secure direct communication with high-dimension quantum superdense coding. Physical Review A, 71, 044305.

    Article  Google Scholar 

  10. Zhang, Z., Li, Y., & Man, Z. (2005). Multiparty quantum secret sharing. Physical Review A, 71, 044301.

    Article  MathSciNet  Google Scholar 

  11. Ma, H., Chen, B., Guo, Z., & Li, H. (2008). Development of quantum network based on multiparty quantum secret sharing. Canadian Journal of Physics, 86(9), 1097–1101.

    Article  Google Scholar 

  12. Hillery, M., Buvek, V., & Berthiaume, A. (1999). Quantum secret sharing. Physical Review A, 59, 1829–1834.

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

This research was supported by Science and Technology Program of High Education of Shandong, China (Grant No. J11LG07), Qingdao Science and Technology Program—Fundamental Research, China (Grant No. 12-1-4-4-(6)-JCH), National Natural Science Foundation of China (Grant Nos. 61173056, 11304174).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongyang Ma.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ma, H., Wang, S. Development of Security WLAN Protocol Based on Quantum GHZ Stats. Wireless Pers Commun 80, 193–202 (2015). https://doi.org/10.1007/s11277-014-2003-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-014-2003-9

Keywords

Navigation