Skip to main content
Top
Published in: Wireless Personal Communications 2/2017

12-11-2016

Enhancing the Security of IEEE 802.11i Standard by Integrating a Quantum Scheme for Authentication and Encryption Key Distribution

Authors: Aymen Ghilen, Mostafa Azizi, Ridha Bouallegue

Published in: Wireless Personal Communications | Issue 2/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

According to the principles of quantum mechanics, quantum cryptography provides the necessary means to establish a secret and perfectly random key material between two parties. However, classical cryptography suffers from several vulnerabilities that make it unsecure against impersonation attacks or enemy with an unbounded computing power. Improving the contemporary cryptographic methods, based only on computational security, by integrating a quantum cryptographic solution becomes an interesting prospect worth exploring. In this paper, we introduce a quantum scheme, for mutual authentication and key establishment, which will be integrated within IEEE 802.11 networks to reach absolute security. The key issued from the quantum algorithm is a fundamental parameter for authenticating the participating parties and for building the Pairwise key and the Group key hierarchies. To inspect the security of our approach, a formal verification of some security properties is performed using the Model Checking technique.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference IEEE Standard 802.11-2012. (2012). Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Standard 802.11-2012. (2012). Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications.
2.
go back to reference Gopalakrishnan, S. (2014). A survey of wireless network security. International Journal of Computer Science and Mobile Computing, 3(1), 53–68. Gopalakrishnan, S. (2014). A survey of wireless network security. International Journal of Computer Science and Mobile Computing, 3(1), 53–68.
3.
go back to reference Kumar, U., & Gambhir, S. (2014). A literature review of security threats to wireless networks. International Journal of Future Generation Communication and Networking, 7(4), 25–34.CrossRef Kumar, U., & Gambhir, S. (2014). A literature review of security threats to wireless networks. International Journal of Future Generation Communication and Networking, 7(4), 25–34.CrossRef
4.
go back to reference Daemen, J., & Rijmen, V. (2002). The design of Rijndael: AES-the advanced encryption standard. Berlin: Springer.CrossRefMATH Daemen, J., & Rijmen, V. (2002). The design of Rijndael: AES-the advanced encryption standard. Berlin: Springer.CrossRefMATH
5.
go back to reference Peikert, C. (2014). Lattice cryptography for the Internet. In Proceedings of the 6th International Conference on Post-Quantum Cryptography (PQCrypto) 2014, LNCS. Springer. Peikert, C. (2014). Lattice cryptography for the Internet. In Proceedings of the 6th International Conference on Post-Quantum Cryptography (PQCrypto) 2014, LNCS. Springer.
6.
go back to reference Ghilen, A., Azizi, M., Bouallegue, R., & Belmabrouk, H. (2013). Quantum Authentication based on entangled states. In Proceedings of World Congress on Multimedia and Computer Science (pp. 75–78). Hammamet, Tunisia. Ghilen, A., Azizi, M., Bouallegue, R., & Belmabrouk, H. (2013). Quantum Authentication based on entangled states. In Proceedings of World Congress on Multimedia and Computer Science (pp. 75–78). Hammamet, Tunisia.
7.
go back to reference Patel, K. A., et al. (2014). Quantum key distribution for 10 Gb/s dense wavelength division multiplexing networks. Applied Physics Letters, 104(5), 051123.CrossRef Patel, K. A., et al. (2014). Quantum key distribution for 10 Gb/s dense wavelength division multiplexing networks. Applied Physics Letters, 104(5), 051123.CrossRef
8.
9.
go back to reference Wei, T. S., Tsai, C. W., & Hwang, T. (2011). Comment on Quantum Key Distribution and Quantum Authentication based on entangled state. International Journal of Theoretical Physics, 50, 2703–2707.MathSciNetCrossRefMATH Wei, T. S., Tsai, C. W., & Hwang, T. (2011). Comment on Quantum Key Distribution and Quantum Authentication based on entangled state. International Journal of Theoretical Physics, 50, 2703–2707.MathSciNetCrossRefMATH
10.
go back to reference Ghilen, A., Azizi, M., & Bouallegue, R. (2015). Integration and formal security analysis of a quantum key distribution scheme within CHAP protocol. In Accepted in the Proceedings of the 12th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), Marrakech/Morocco, November 2015. Ghilen, A., Azizi, M., & Bouallegue, R. (2015). Integration and formal security analysis of a quantum key distribution scheme within CHAP protocol. In Accepted in the Proceedings of the 12th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), Marrakech/Morocco, November 2015.
11.
go back to reference Ghilen, A., Azizi, M., & Bouallegue, R. (2015). Q-OpenVPN: A new extension of OpenVPN based on a Quantum scheme for Authentication and key distribution. In Proceedings of the 14th International Conference, CANS 2015, Marrakesh, Morocco, December 2015 (pp. 238–247). Ghilen, A., Azizi, M., & Bouallegue, R. (2015). Q-OpenVPN: A new extension of OpenVPN based on a Quantum scheme for Authentication and key distribution. In Proceedings of the 14th International Conference, CANS 2015, Marrakesh, Morocco, December 2015 (pp. 238–247).
12.
go back to reference IEEE Std 802.1X-2004. (2004). 802.1X IEEE Standard for Local and metropolitan area networks, Port-Based Network Access Control, Revision of IEEE Std 802.1X-2001, IEEE. IEEE Std 802.1X-2004. (2004). 802.1X IEEE Standard for Local and metropolitan area networks, Port-Based Network Access Control, Revision of IEEE Std 802.1X-2001, IEEE.
13.
go back to reference Djellab, R. (2009). New scheme of integrating quantum key distribution in 802.11i. In ICMCS ’09, April 2009 (pp. 46–50). Djellab, R. (2009). New scheme of integrating quantum key distribution in 802.11i. In ICMCS ’09, April 2009 (pp. 46–50).
14.
go back to reference Ghilen, A., Azizi, M., & Belmabrouk, H. (2015). Incorporation and model checking of a quantum authentication and key distribution scheme in EAP-TLS. In Proceedings of the Mediterranean Conference on Information & Communication Technologies’ 2015 MedICT 2015, May 2015. Ghilen, A., Azizi, M., & Belmabrouk, H. (2015). Incorporation and model checking of a quantum authentication and key distribution scheme in EAP-TLS. In Proceedings of the Mediterranean Conference on Information & Communication Technologies’ 2015 MedICT 2015, May 2015.
15.
go back to reference Huang, X., & Sharma, D. (2008). Quantum key distribution for Wi-Fi network security, circuits and systems for communications, 2008. In ICCSC 2008. 4th IEEE International Conference on, Shanghai, 2008 (pp. 85–89). Huang, X., & Sharma, D. (2008). Quantum key distribution for Wi-Fi network security, circuits and systems for communications, 2008. In ICCSC 2008. 4th IEEE International Conference on, Shanghai, 2008 (pp. 85–89).
16.
17.
go back to reference Nguyen, T. M. T., Sfaxi, M. A., & Ghernaouti-Hélie, S. (2006). Integration of quantum cryptography in 802.11 networks. In Proceedings of 1st International Conference on Availability, Reliability and Security (ARES’06), Vienna, Austria, 2006. Nguyen, T. M. T., Sfaxi, M. A., & Ghernaouti-Hélie, S. (2006). Integration of quantum cryptography in 802.11 networks. In Proceedings of 1st International Conference on Availability, Reliability and Security (ARES’06), Vienna, Austria, 2006.
18.
go back to reference Nguyen, T. M. T., Sfaxi, M. A., & Ghernaouti-Hélie, S. (2006). 802.11i encryption key distribution using quantum cryptography. Journal of Networks, 1(5), 9–20.CrossRef Nguyen, T. M. T., Sfaxi, M. A., & Ghernaouti-Hélie, S. (2006). 802.11i encryption key distribution using quantum cryptography. Journal of Networks, 1(5), 9–20.CrossRef
19.
go back to reference Bhatia, P., & Sumbaly, R. (2014). Framework for wireless network security using quantum cryptography. International Journal of Computer Networks & Communications (IJCNC), 6(6), 45–61.CrossRef Bhatia, P., & Sumbaly, R. (2014). Framework for wireless network security using quantum cryptography. International Journal of Computer Networks & Communications (IJCNC), 6(6), 45–61.CrossRef
20.
go back to reference Scarani, V., Acin, A., Ribordy, G., & Gisin, N. (2004). Quantum cryptography protocols Robust against photon number splitting attacks for weak laser pulse implementations. Physical Review Letters, 92, 057901.CrossRef Scarani, V., Acin, A., Ribordy, G., & Gisin, N. (2004). Quantum cryptography protocols Robust against photon number splitting attacks for weak laser pulse implementations. Physical Review Letters, 92, 057901.CrossRef
21.
go back to reference Sharma, A., Ojha, V., & Lenka, S.K. (2010). Quantum key distribution in WLAN 802.11 networks. In 2010 International Conference on Networking & Information Technology (ICNIT); 2010 (pp. 402–405). Sharma, A., Ojha, V., & Lenka, S.K. (2010). Quantum key distribution in WLAN 802.11 networks. In 2010 International Conference on Networking & Information Technology (ICNIT); 2010 (pp. 402–405).
22.
go back to reference Priyanka, B., & Ronak, S. (2014). Framework for wireless network security using quantum cryptography. IJCNC, 6(6), 45–61.CrossRef Priyanka, B., & Ronak, S. (2014). Framework for wireless network security using quantum cryptography. IJCNC, 6(6), 45–61.CrossRef
24.
25.
go back to reference Kwiatkowska, M. (2015). Probabilistic model checking with PRISM. In POPL 2015 tutorial, Mumbai, January 2015. Kwiatkowska, M. (2015). Probabilistic model checking with PRISM. In POPL 2015 tutorial, Mumbai, January 2015.
26.
go back to reference Norman, G., et al. (2013). Model checking for probabilistic timed automata. Formal Methods in System Design, 43(2), 164–190.CrossRefMATH Norman, G., et al. (2013). Model checking for probabilistic timed automata. Formal Methods in System Design, 43(2), 164–190.CrossRefMATH
27.
go back to reference Schreiner, W. (2014). Analyzing cluster scheduling schemes by probabilistic model checking. Linz, Austria: Research Institute for Symbolic Computation (RISC), Johannes Kepler University. Technical report, September 2014. Schreiner, W. (2014). Analyzing cluster scheduling schemes by probabilistic model checking. Linz, Austria: Research Institute for Symbolic Computation (RISC), Johannes Kepler University. Technical report, September 2014.
28.
go back to reference Premlata, S., & Leena, R. (2013). Quantum cryptography with key distribution in wireless network. IJACTE, 2(6), 74–79. Premlata, S., & Leena, R. (2013). Quantum cryptography with key distribution in wireless network. IJACTE, 2(6), 74–79.
29.
go back to reference Bennett, C., & Brassard, G. (1984). Quantum cryptography: Public key distribution and coin tossing. In International Conference on Computers, Systems & Signal Processing, India (pp. 175–179). Bennett, C., & Brassard, G. (1984). Quantum cryptography: Public key distribution and coin tossing. In International Conference on Computers, Systems & Signal Processing, India (pp. 175–179).
Metadata
Title
Enhancing the Security of IEEE 802.11i Standard by Integrating a Quantum Scheme for Authentication and Encryption Key Distribution
Authors
Aymen Ghilen
Mostafa Azizi
Ridha Bouallegue
Publication date
12-11-2016
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2017
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3873-9

Other articles of this Issue 2/2017

Wireless Personal Communications 2/2017 Go to the issue