[go: up one dir, main page]

Skip to main content

Advertisement

Log in

Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

The primary goals of security such as authentication, confidentiality, integrity and non-repudiation in communication networks can be achieved with secure key distribution. Quantum mechanisms are highly secure means of distributing secret keys as they are unconditionally secure. Quantum key distribution protocols can effectively prevent various attacks in the quantum channel, while classical cryptography is efficient in authentication and verification of secret keys. By combining both quantum cryptography and classical cryptography, security of communications over networks can be leveraged. Hwang, Lee and Li exploited the merits of both cryptographic paradigms for provably secure communications to prevent replay, man-in-the-middle, and passive attacks. In this paper, we propose a new scheme with the combination of quantum cryptography and classical cryptography for 802.11i wireless LANs. Since quantum cryptography is premature in wireless networks, our work is a significant step forward toward securing communications in wireless networks. Our scheme is known as hybrid quantum key distribution protocol. Our analytical results revealed that the proposed scheme is provably secure for wireless networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Notes

  1. Key distribution protocols with time stamps stop replays of compromised keys. The time stamps have the further advantage of replacing a four step handshake.

  2. Allow Alice and Bob be the two participants in a quantum channel, where Alice is the sender of qubits and Bob is the receiver of qubits. The horizontal polarizations and the vertical polarizations (defined in Sect. 6.2) are required to create or calculate qubits.

  3. QKD uses quantum mechanics to promise safe message through by quantum superposition states (defined in Sects. 4.1, 4.2 and 6.2) [811, 1720, 2528].

References

  1. Neuman, B., Ts’o, T.: Kerberos: an authentication service for computer networks. IEEE Commun. 32(9), 33–38 (1994)

    Article  Google Scholar 

  2. Kohl, J.T.: The evolution of the Kerberos authentication service. In: EurOpen Conference Proceedings, pp. 295–313 (1991)

  3. Li, G.: Efficient network authentication protocols: lower bounds and optimal implementations. Distrib. Comput. 9(3), 131–145 (1995)

    Article  Google Scholar 

  4. Wen, H.A., Lee, T.F., Hwang, T.: A provably secure three-party password-based authenticated key exchange protocol using Weil pairing. IEE Proc. Commun. 152(2), 138–143 (2005)

    Article  MATH  Google Scholar 

  5. Nam, J., Cho, S., Kim, S., Won, D.: Simple and efficient group key agreement based on factoring. In: Proceedings of International Conference on Computational Science and Its Applications (ICCSA ’04), pp. 645–654 (2004)

  6. Bellare, M., Rogaway, P.: Provably secure session key distribution: the three party case. In: Proceedings of 27th ACM Symposium Theory of Computing, pp. 57–66 (1995)

  7. Kehne, A., Schonwalder, J., Langendorfer, H.: A nonce-based protocol for multiple authentications. ACM Oper. Syst. Rev. 26(4), 84–89 (1992)

    Article  Google Scholar 

  8. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference Computers, Systems, and Signal Processing, pp. 175–179 (1984)

  9. Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121 (1992)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  10. Hwang, W.Y., Koh, I.G., Han, Y.D.: Quantum cryptography without public announcement of bases. Phys. Lett. A 244, 489–494 (1998)

    Article  ADS  MATH  Google Scholar 

  11. Zeng, G., Zhang, W.: Identity verification in quantum key distribution. Phys. Rev. A 61, 22–23 (2000)

  12. Hwang, T., Lee, K.-C., Li, C.-M.: Provably secure three-party authenticated quantum key distribution protocols. IEEE Trans. Dependable Secure Comput. 4, 71–80 (2007)

  13. Elsevier (n.d). Fundamentals of spread-spectrum techniques. Elsevier, pp. 153–194. MérouaneDebbah, “Short introduction to OFDM”. Supelec, pp. 1–11 (2002)

  14. Huang, X., Wijesekera, S., Sharma, D.: Agent-Oriented Novel Quantum Key Distribution Protocol for the Security in Wireless Network. ISBN 978-3-902613-51-6. 0 (0), pp. 1–17 (2009)

  15. Mink, Alan, Frankel, Sheila, Perlner, Ray: Quantum key distribution (QKD) and commodity security protocols: introduction and integration. Int. J. Netw. Secur. Appl. 1(2), 1–12 (2009)

    Google Scholar 

  16. Thayananthan, V., Alzahran, A.: Analysis of Key Management and Quantum Cryptography in Wireless Sensors Networks. IJCA Special Issue on “Network Security and Cryptography” NSC, p1-1 (2011)

  17. Einstein, A., Podolsky, P., Rosen, S.: Can quantum-mechanical description of physical reality be considered complete? Phys. Rev. 47, 777–780 (1935)

    Article  ADS  MATH  Google Scholar 

  18. Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145–190 (2002)

    Article  ADS  Google Scholar 

  19. Hughes, R.J., Luther, G.G., Morgan, G.L., Peterson, C.G., Simmons, C.: Quantum cryptography over underground optical fibers. In: Proceedings of Advances in Cryptology (CRYPTO ’96), pp. 329–342 (1996)

  20. Townsend, P.D.: Secure key distribution system based on quantum cryptography. Electron. Lett. 30, 809–811 (1994)

    Article  MathSciNet  ADS  Google Scholar 

  21. Bennett, C.H., Bessette, F., Brassard, G., Salvail, L., Smolin, J.: Experimental quantum cryptography. J. Cryptol. 5, 3–28 (1992)

    Article  MATH  Google Scholar 

  22. Gottesman, D., Lo, H.-K.: Proof of security of quantum key distribution with two-way classical communications. IEEE Trans. Inf. Theory 49, 457 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  23. Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299, 802–803 (1992)

    Article  ADS  Google Scholar 

  24. Nguyen, T.M.T., Sfaxi, M.A., Ghernaouti-Hélie, S.: Integration of quantum cryptography in 802.11 networks. In: Proceedings of the First International Conference on Availability, Reliability and Security (ARES), pp. 116–123, Vienna (2006)

  25. Gong, Li-Hua, Song, Han-Chong, He, Chao-Sheng, Liu, Ye, Zhou, Nan-Run: A continuous variable quantum deterministic key distribution based on two-mode squeezed states. Phys. Scr. 89(3), 035101 (2014)

    Article  ADS  Google Scholar 

  26. Zhou, Nan-Run, Wang, Li-Jun, Ding, Jie, Gong, Li-Hua: Quantum deterministic key distribution protocols based on the authenticated entanglement channel. Phys. Scr. 81(4), 045009 (2010)

    Article  ADS  MATH  Google Scholar 

  27. Zhou, Nan-Run, Wang, Li-Jun, Ding, Jie, Gong, Li-Hua: Novel quantum deterministic key distribution protocols with entangled states. Int. J. Theor. Phys. 49(9), 2035–2044 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  28. Zhou, Nan-Run, Wang, Li-Jun, Gong, Li-Hua, Zuo, Xiangwu, Liu, Ye: Quantum deterministic key distribution protocols based on teleportation and entanglement swapping. Opt. Commun. 284(19), 4836–4842 (2011)

    Article  ADS  Google Scholar 

Download references

Acknowledgments

The authors would like to thank the anonymous reviewers for their very helpful and valuable comments to enhance the clarity of the manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Lalu Naik.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Naik, R.L., Reddy, P.C. Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach. Quantum Inf Process 14, 4557–4574 (2015). https://doi.org/10.1007/s11128-015-1129-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11128-015-1129-3

Keywords

Navigation