Abstract
The primary goals of security such as authentication, confidentiality, integrity and non-repudiation in communication networks can be achieved with secure key distribution. Quantum mechanisms are highly secure means of distributing secret keys as they are unconditionally secure. Quantum key distribution protocols can effectively prevent various attacks in the quantum channel, while classical cryptography is efficient in authentication and verification of secret keys. By combining both quantum cryptography and classical cryptography, security of communications over networks can be leveraged. Hwang, Lee and Li exploited the merits of both cryptographic paradigms for provably secure communications to prevent replay, man-in-the-middle, and passive attacks. In this paper, we propose a new scheme with the combination of quantum cryptography and classical cryptography for 802.11i wireless LANs. Since quantum cryptography is premature in wireless networks, our work is a significant step forward toward securing communications in wireless networks. Our scheme is known as hybrid quantum key distribution protocol. Our analytical results revealed that the proposed scheme is provably secure for wireless networks.






Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Notes
Key distribution protocols with time stamps stop replays of compromised keys. The time stamps have the further advantage of replacing a four step handshake.
Allow Alice and Bob be the two participants in a quantum channel, where Alice is the sender of qubits and Bob is the receiver of qubits. The horizontal polarizations and the vertical polarizations (defined in Sect. 6.2) are required to create or calculate qubits.
References
Neuman, B., Ts’o, T.: Kerberos: an authentication service for computer networks. IEEE Commun. 32(9), 33–38 (1994)
Kohl, J.T.: The evolution of the Kerberos authentication service. In: EurOpen Conference Proceedings, pp. 295–313 (1991)
Li, G.: Efficient network authentication protocols: lower bounds and optimal implementations. Distrib. Comput. 9(3), 131–145 (1995)
Wen, H.A., Lee, T.F., Hwang, T.: A provably secure three-party password-based authenticated key exchange protocol using Weil pairing. IEE Proc. Commun. 152(2), 138–143 (2005)
Nam, J., Cho, S., Kim, S., Won, D.: Simple and efficient group key agreement based on factoring. In: Proceedings of International Conference on Computational Science and Its Applications (ICCSA ’04), pp. 645–654 (2004)
Bellare, M., Rogaway, P.: Provably secure session key distribution: the three party case. In: Proceedings of 27th ACM Symposium Theory of Computing, pp. 57–66 (1995)
Kehne, A., Schonwalder, J., Langendorfer, H.: A nonce-based protocol for multiple authentications. ACM Oper. Syst. Rev. 26(4), 84–89 (1992)
Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference Computers, Systems, and Signal Processing, pp. 175–179 (1984)
Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121 (1992)
Hwang, W.Y., Koh, I.G., Han, Y.D.: Quantum cryptography without public announcement of bases. Phys. Lett. A 244, 489–494 (1998)
Zeng, G., Zhang, W.: Identity verification in quantum key distribution. Phys. Rev. A 61, 22–23 (2000)
Hwang, T., Lee, K.-C., Li, C.-M.: Provably secure three-party authenticated quantum key distribution protocols. IEEE Trans. Dependable Secure Comput. 4, 71–80 (2007)
Elsevier (n.d). Fundamentals of spread-spectrum techniques. Elsevier, pp. 153–194. MérouaneDebbah, “Short introduction to OFDM”. Supelec, pp. 1–11 (2002)
Huang, X., Wijesekera, S., Sharma, D.: Agent-Oriented Novel Quantum Key Distribution Protocol for the Security in Wireless Network. ISBN 978-3-902613-51-6. 0 (0), pp. 1–17 (2009)
Mink, Alan, Frankel, Sheila, Perlner, Ray: Quantum key distribution (QKD) and commodity security protocols: introduction and integration. Int. J. Netw. Secur. Appl. 1(2), 1–12 (2009)
Thayananthan, V., Alzahran, A.: Analysis of Key Management and Quantum Cryptography in Wireless Sensors Networks. IJCA Special Issue on “Network Security and Cryptography” NSC, p1-1 (2011)
Einstein, A., Podolsky, P., Rosen, S.: Can quantum-mechanical description of physical reality be considered complete? Phys. Rev. 47, 777–780 (1935)
Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145–190 (2002)
Hughes, R.J., Luther, G.G., Morgan, G.L., Peterson, C.G., Simmons, C.: Quantum cryptography over underground optical fibers. In: Proceedings of Advances in Cryptology (CRYPTO ’96), pp. 329–342 (1996)
Townsend, P.D.: Secure key distribution system based on quantum cryptography. Electron. Lett. 30, 809–811 (1994)
Bennett, C.H., Bessette, F., Brassard, G., Salvail, L., Smolin, J.: Experimental quantum cryptography. J. Cryptol. 5, 3–28 (1992)
Gottesman, D., Lo, H.-K.: Proof of security of quantum key distribution with two-way classical communications. IEEE Trans. Inf. Theory 49, 457 (2003)
Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299, 802–803 (1992)
Nguyen, T.M.T., Sfaxi, M.A., Ghernaouti-Hélie, S.: Integration of quantum cryptography in 802.11 networks. In: Proceedings of the First International Conference on Availability, Reliability and Security (ARES), pp. 116–123, Vienna (2006)
Gong, Li-Hua, Song, Han-Chong, He, Chao-Sheng, Liu, Ye, Zhou, Nan-Run: A continuous variable quantum deterministic key distribution based on two-mode squeezed states. Phys. Scr. 89(3), 035101 (2014)
Zhou, Nan-Run, Wang, Li-Jun, Ding, Jie, Gong, Li-Hua: Quantum deterministic key distribution protocols based on the authenticated entanglement channel. Phys. Scr. 81(4), 045009 (2010)
Zhou, Nan-Run, Wang, Li-Jun, Ding, Jie, Gong, Li-Hua: Novel quantum deterministic key distribution protocols with entangled states. Int. J. Theor. Phys. 49(9), 2035–2044 (2010)
Zhou, Nan-Run, Wang, Li-Jun, Gong, Li-Hua, Zuo, Xiangwu, Liu, Ye: Quantum deterministic key distribution protocols based on teleportation and entanglement swapping. Opt. Commun. 284(19), 4836–4842 (2011)
Acknowledgments
The authors would like to thank the anonymous reviewers for their very helpful and valuable comments to enhance the clarity of the manuscript.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Naik, R.L., Reddy, P.C. Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach. Quantum Inf Process 14, 4557–4574 (2015). https://doi.org/10.1007/s11128-015-1129-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11128-015-1129-3