Abstract
Security in wireless networks has become a major concern as the wireless networks are vulnerable to security threats than wired networks. The 802.11i wireless networks uses 4 way handshake protocol to distribute the key hierarchy in order to encrypt the data communication. In our previous research work [2], [3], we have investigated Quantum Key Distribution (QKD), for key distribution in 802.11 wireless networks. The whole communication flow of our proposed protocol can be split into several key processes. It can be seen that these processes can be implemented efficiently using Software Agents. In this paper we shall focus on the use of Software Agents in quantum cryptography based key distribution in WiFi wireless networks.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
IEEE Std 802.11i, IEEE Standard for Information Technology – Telecommunication and information exchange between systems – Local and metropolitan area networks – Specific requirements. Part 11, Security Enhancements (2004)
Huang, X., Wijesekera, S., Sharma, D.: Implementation of QKD in 802.11 Networks. In: Proceeding 2009 IEEE International Conference on Networks Security, Wireless Communications and Trusted Computing, vol. 2, p. 125 (2009)
Wijesekera, S., Huang, X., Sharma, D.: Multi-Agent Based Approach for Quantum Key Distribution in WiFi Networks. In: Håkansson, A., et al. (eds.) KES-AMSTA 2009. LNCS (LNAI), vol. 5559, pp. 293–303. Springer, Heidelberg (2009)
ANSI/IEEE 802.11, 1999 edn (R2003), Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (2003)
IEEE Std 802.1X, IEEE Standard for Local and metropolitan area networks, Port-Based Network Access Control (2004)
Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: RFC – 3748, Extensible Authentication Protocol, EAP (2004)
Scarani, V., Acin, A., Ribordy, G., Gisin, N.: Quantum cryptography protocols robust against photon number splitting attcks (2004)
Bennett, C.H., Brassard, G.: Quantum cryptography: Public-key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, December 1984, pp. 175–179 (1984)
Bennett, C.H.: Phys. Rev. Lett. 68, 3121 (1992)
Bruß, D.: Optimal Eavesdropping in Quantum Cryptography with Six States. Physical Review Letters 81, 3018 (1998)
He, C., Mitchell, J.C.: Analysis of the 802.11i 4-way Handshake
De Rango, F., Lentini, D., Marano, S.: Statis and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i (June 2006)
He, C., Mitchell, J.C.: Security Analysis and Improvements for IEEE 802.11i
Mishra, A., Arbaudh, W.A.: An Initial Analysis of the IEEE 802.1X Standard (February 2002)
Leavitt, N.: Will IEEE 802.1X Finally Take Off in 2008?, pp. 82–85. IEEE Computer Society, Los Alamitos (2008)
Multi-Agent Systems, http://www.cs.cmu.edu/~softagents/multi.html
SECOQC, Development of a Global Network for Secure Communication based on Quantum Cryptography, http://www.secoqc.net/
Graham-Rowe, D.: ’Quantum ATM’ rules out fraudulent web purchases, New Scientist, Magazine (2629) (November 2007)
Mayers, D.: Unconditional Security in Quantum Cryptography. Journal of the ACM 48(3), 351–406 (2001)
Software Agents: An Overview, Hyacinth S. Nwana, Intelligent Systems Research, AA&T, BT Laboratories (1996)
Automatic Resumption of Streaming Sessions over WiFi Using JADE, Alvaro Suárez, Member, IAENG, M. La-Menza, Elsa M. MacÃas, Member, IAENG and Vaidy Sunderam
Genesereth, M., Fikes, R.: Knowledge interchange format. Version 3.0 Reference Manual, Tech-nical Report Logic 92-1, Computer Science Department, Stanford University (1992)
http://www.idquantique.com/ id Quantique, Quantum Cryptography
New Scientist, Quantum ATM rules out fraudulent web purchases, November 10 (2007)
Appleby, Steward: Mobile Software Agents for Control in Telecommunications Networks. BT Technological Journal 12(2), 1040113 (1994)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Huang, X., Sharma, D. (2009). Multi-Agent Systems in Quantum Security for Modern Wireless Networks. In: Velásquez, J.D., RÃos, S.A., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based and Intelligent Information and Engineering Systems. KES 2009. Lecture Notes in Computer Science(), vol 5712. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04592-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-04592-9_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04591-2
Online ISBN: 978-3-642-04592-9
eBook Packages: Computer ScienceComputer Science (R0)