Skip to main content

Multi-Agent Systems in Quantum Security for Modern Wireless Networks

  • Conference paper
Knowledge-Based and Intelligent Information and Engineering Systems (KES 2009)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 5712))

  • 974 Accesses

Abstract

Security in wireless networks has become a major concern as the wireless networks are vulnerable to security threats than wired networks. The 802.11i wireless networks uses 4 way handshake protocol to distribute the key hierarchy in order to encrypt the data communication. In our previous research work [2], [3], we have investigated Quantum Key Distribution (QKD), for key distribution in 802.11 wireless networks. The whole communication flow of our proposed protocol can be split into several key processes. It can be seen that these processes can be implemented efficiently using Software Agents. In this paper we shall focus on the use of Software Agents in quantum cryptography based key distribution in WiFi wireless networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. IEEE Std 802.11i, IEEE Standard for Information Technology – Telecommunication and information exchange between systems – Local and metropolitan area networks – Specific requirements. Part 11, Security Enhancements (2004)

    Google Scholar 

  2. Huang, X., Wijesekera, S., Sharma, D.: Implementation of QKD in 802.11 Networks. In: Proceeding 2009 IEEE International Conference on Networks Security, Wireless Communications and Trusted Computing, vol. 2, p. 125 (2009)

    Google Scholar 

  3. Wijesekera, S., Huang, X., Sharma, D.: Multi-Agent Based Approach for Quantum Key Distribution in WiFi Networks. In: Håkansson, A., et al. (eds.) KES-AMSTA 2009. LNCS (LNAI), vol. 5559, pp. 293–303. Springer, Heidelberg (2009)

    Google Scholar 

  4. ANSI/IEEE 802.11, 1999 edn (R2003), Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (2003)

    Google Scholar 

  5. IEEE Std 802.1X, IEEE Standard for Local and metropolitan area networks, Port-Based Network Access Control (2004)

    Google Scholar 

  6. Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: RFC – 3748, Extensible Authentication Protocol, EAP (2004)

    Google Scholar 

  7. Scarani, V., Acin, A., Ribordy, G., Gisin, N.: Quantum cryptography protocols robust against photon number splitting attcks (2004)

    Google Scholar 

  8. Bennett, C.H., Brassard, G.: Quantum cryptography: Public-key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, December 1984, pp. 175–179 (1984)

    Google Scholar 

  9. Bennett, C.H.: Phys. Rev. Lett. 68, 3121 (1992)

    Google Scholar 

  10. Bruß, D.: Optimal Eavesdropping in Quantum Cryptography with Six States. Physical Review Letters 81, 3018 (1998)

    Article  Google Scholar 

  11. He, C., Mitchell, J.C.: Analysis of the 802.11i 4-way Handshake

    Google Scholar 

  12. De Rango, F., Lentini, D., Marano, S.: Statis and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i (June 2006)

    Google Scholar 

  13. He, C., Mitchell, J.C.: Security Analysis and Improvements for IEEE 802.11i

    Google Scholar 

  14. Mishra, A., Arbaudh, W.A.: An Initial Analysis of the IEEE 802.1X Standard (February 2002)

    Google Scholar 

  15. Leavitt, N.: Will IEEE 802.1X Finally Take Off in 2008?, pp. 82–85. IEEE Computer Society, Los Alamitos (2008)

    Google Scholar 

  16. Multi-Agent Systems, http://www.cs.cmu.edu/~softagents/multi.html

  17. SECOQC, Development of a Global Network for Secure Communication based on Quantum Cryptography, http://www.secoqc.net/

  18. Graham-Rowe, D.: ’Quantum ATM’ rules out fraudulent web purchases, New Scientist, Magazine (2629) (November 2007)

    Google Scholar 

  19. Mayers, D.: Unconditional Security in Quantum Cryptography. Journal of the ACM 48(3), 351–406 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  20. Software Agents: An Overview, Hyacinth S. Nwana, Intelligent Systems Research, AA&T, BT Laboratories (1996)

    Google Scholar 

  21. Automatic Resumption of Streaming Sessions over WiFi Using JADE, Alvaro Suárez, Member, IAENG, M. La-Menza, Elsa M. Macías, Member, IAENG and Vaidy Sunderam

    Google Scholar 

  22. Genesereth, M., Fikes, R.: Knowledge interchange format. Version 3.0 Reference Manual, Tech-nical Report Logic 92-1, Computer Science Department, Stanford University (1992)

    Google Scholar 

  23. http://www.idquantique.com/ id Quantique, Quantum Cryptography

  24. New Scientist, Quantum ATM rules out fraudulent web purchases, November 10 (2007)

    Google Scholar 

  25. Appleby, Steward: Mobile Software Agents for Control in Telecommunications Networks. BT Technological Journal 12(2), 1040113 (1994)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Huang, X., Sharma, D. (2009). Multi-Agent Systems in Quantum Security for Modern Wireless Networks. In: Velásquez, J.D., Ríos, S.A., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based and Intelligent Information and Engineering Systems. KES 2009. Lecture Notes in Computer Science(), vol 5712. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04592-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04592-9_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04591-2

  • Online ISBN: 978-3-642-04592-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics