Research Article

Effective User Authentication using Quantum Key Distribution for Wireless Mesh Network

by  G. Murali, R. Sivaram Prasad, K.V. Bhaskar Rao
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 42 - Issue 4
Published: March 2012
Authors: G. Murali, R. Sivaram Prasad, K.V. Bhaskar Rao
10.5120/5679-7715
PDF

G. Murali, R. Sivaram Prasad, K.V. Bhaskar Rao . Effective User Authentication using Quantum Key Distribution for Wireless Mesh Network. International Journal of Computer Applications. 42, 4 (March 2012), 7-12. DOI=10.5120/5679-7715

                        @article{ 10.5120/5679-7715,
                        author  = { G. Murali,R. Sivaram Prasad,K.V. Bhaskar Rao },
                        title   = { Effective User Authentication using Quantum Key Distribution for Wireless Mesh Network },
                        journal = { International Journal of Computer Applications },
                        year    = { 2012 },
                        volume  = { 42 },
                        number  = { 4 },
                        pages   = { 7-12 },
                        doi     = { 10.5120/5679-7715 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2012
                        %A G. Murali
                        %A R. Sivaram Prasad
                        %A K.V. Bhaskar Rao
                        %T Effective User Authentication using Quantum Key Distribution for Wireless Mesh Network%T 
                        %J International Journal of Computer Applications
                        %V 42
                        %N 4
                        %P 7-12
                        %R 10.5120/5679-7715
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Quantum key distribution can provide sophisticated solution for efficient authentication in wireless mesh networks. In quantum cryptography, the key is created during the process of key distribution, where as in classical key distribution a predetermined key is transmitted to the legitimate user. The most important contribution of quantum key distribution is the detection of eavesdropping.

References
  • "A Survey of Quantum Key Distribution Protocols" Mobin Javed and Khurram Aziz NUST School of Electrical Engineering and Computer Science
  • "Authentication in Wireless Mesh Networks", Raphael Frank
  • "Man-in-the-middle in tunneled authentication protocols", N. Asokan, Valtteri Niemi, Kaisa Nyberg. .
  • "A Symmetric Key Cryptographic Algorithm", Ayushi, Lecturer, Hindu College of Engineering
  • "Public Key Cryptography Applications Algorithms and Mathematical Explanations", Anoop MS
  • "Wireless mesh networks: a survey" Ian F. Akyildiz a, Xudong Wang b, Weilin Wang b
  • "Quantum Key Distribution Protocols and Applications", Sheila Cobourne
  • " Quantum cryptography: Public-key distribution and coin tossing". Bennett, C. H. and Brassard, G. 1984. In Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, December 1984, pp. 175 - 179.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Authentication Bb84 Protocol Cryptography Eap-tls Eap-ttls Quantum Key Distribution Wmn

Powered by PhDFocusTM