Analysis of Network Performance Using Aspect of Quantum Cryptography
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33090
Analysis of Network Performance Using Aspect of Quantum Cryptography

Authors: Nisarg A. Patel, Hiren B. Patel

Abstract:

Quantum cryptography is described as a point-to-point secure key generation technology that has emerged in recent times in providing absolute security. Researchers have started studying new innovative approaches to exploit the security of Quantum Key Distribution (QKD) for a large-scale communication system. A number of approaches and models for utilization of QKD for secure communication have been developed. The uncertainty principle in quantum mechanics created a new paradigm for QKD. One of the approaches for use of QKD involved network fashioned security. The main goal was point-to-point Quantum network that exploited QKD technology for end-to-end network security via high speed QKD. Other approaches and models equipped with QKD in network fashion are introduced in the literature as. A different approach that this paper deals with is using QKD in existing protocols, which are widely used on the Internet to enhance security with main objective of unconditional security. Our work is towards the analysis of the QKD in Mobile ad-hoc network (MANET).

Keywords: QKD, cryptography, quantum cryptography, network performance.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.3461992

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 944

References:


[1] Mohammed Moizuddin1, Dr. Joy Winston, and Mohammed Qayyum, “A Comprehensive Survey: Quantum Cryptography” IEEE International Conference on Advanced Computing, 2017.
[2] Ms. V. Padmavathi, Dr. B. Vishnu Vardhan, and Dr. A. V. N. Krishna, “Quantum Cryptography and Quantum Key Distribution Protocols: A Survey” IEEE 6th International Conference on Advanced Computing, 2016.
[3] S. Meier, C. Cremers, and D. Basin, “Efficient Construction of Machine-Checked Symbolic Protocol Security Proofs,” J. Computer Security, vol. 21, no. 1, 2013, pp. 41–87.
[4] B. Schmidt et al., “Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties,” Proc. 25th IEEE Computer Security Foundations Symp. (CSF), 2012, pp. 78–94.
[5] Hidema Tanaka, Security Analysis of Generalized Confidential Modulation for Quantum Communication International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013.
[6] R. Lalu Naik, Dr. P. Chenna Reddy, U. Sathish Kumar, Dr. Y. V. Narayana, “Provely Secure Quantum Key distribution protocol in 802.11Wireless Networks”, International Journal of Computer Science and Information Technologies, Vol. 2 (6), PP.2811-2815, 2011.
[7] H. K. Kalita and A. Kar, "Wireless sensor network security analysis," International Journal of Next-Generation Networks (IJNGN), vol. 1, pp. 1-10, 2009.
[8] Symmetric key cryptography using random key generator, A. Nath, S. Ghosh, M.A. Mallik, Proceedings of International conference on SAM-2010 held at Las Vegas (USA) 12-15 July, 2010, Vol-2, P-239-244.
[9] Nur Atiqah Muhamad and Zuriati Ahmad Zukarnain, "Implemetation of BB84 Quantum Key Distribution Protocol's with Attacks", European Journal of Scientific Research, Vol.32, No.4, 2009, pp. 460-466.
[10] IEEE Std 802.11, IEEE Standard for Information Technology – Telecommunication and Information exchange between systems – Local and metropolitan area networks – Specific requirements. Part 11: Wireless LAN Medium Access Control O(MAC) and Physical Layer (PHY) specifications, Amendment 6: Medium Access Control (MAC) Security Enhancements, 2007.
[11] ANSI/IEEE 802.11, 1999 Edition (R2003), Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications.
[12] IEEE 802.1X, IEEE Standard for Local and Metropolitan Area Networks, Port-Based Network Access Control, December 2004.
[13] IEEE Std 802.11, IEEE Standard for Information Technology – Telecommunication and Information exchange between systems – Local and metropolitan area networks – Specific requirements. Part 11: Wireless LAN Medium Access Control O(MAC) and Physical Layer (PHY) specifications, Amendment 6: Medium Access Control (MAC) Security Enhancements, 2007.
[14] Floriano De Rango, Dionogi Lentini, Salvatore Marano, Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i, EURASIP Journal on Wireless Communications and Networking archive, Volume 2006 Issue 2, April 2006.
[15] Ghernaouti-Helie, S., et al., Using quantum key distribution within IPSEC to secure MAN communications. MAN 2005 conference, 2005.
[16] Nguyen, T. M. T., M. A. Sfaxi, and S. Ghernaouti-Hélie, 802.11i Encryption Key Distribution Using Quantum Cryptography. Journal Of Networks, 2006. 1(5): p. 9.
[17] Le, Q. C. and P. Bellot, Enhancement of AGT Telecommunication Security using Quantum Cryptography. Research, Innovation and Vision for the Future, 2006 International Conference on, 2006: p. 7-16.
[18] Elliott, C., “The DARPA Quantum Network”, Quantum Communications and Cryptography, 2006.
[19] Bhagyavati, Wayne C. Summers, Anthony DeJoie;"Wireless Security Techniques: An Overview"; InfoSec Conference, September 2004.
[20] J.-C. Chen, M.-C. Jiang, and Y.-W. Liu, "Wireless LAN Security and IEEE 802.11i", IEEE Wireless Commun., vol. 12, pp.27 -36 2005.
[21] Nur Atiqah Muhamad and Zuriati Ahmad Zukarnain, "Implemetation of BB84 Quantum Key Distribution Protocol's with Attacks", European Journal of Scientific Research, Vol.32, No.4, 2009, pp. 460-466.
[22] Symmetric key cryptography using random key generator, A. Nath, S. Ghosh, M.A. Mallik, Proceedings of International conference on SAM-2010 held at Las Vegas (USA) 12-15 July, 2010, Vol-2, P-.