1 / 28

Use of QKD in Wi-Fi Networks

Contents. Aim of the projectIntroductionIEEE 802.11 StandardSecurity of IEEE 802.11 StandardQuantum Key Distribution (QKD)Implementing QKD in Wi-FiProposed ProtocolModifications to existing framesState Machine ProceduresResearch ConclusionsWork SummaryWork done and future workList of Papers Published .

khanh
Download Presentation

Use of QKD in Wi-Fi Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. Use of QKD in Wi-Fi Networks Shirantha Wijesekera (PhD student) Supervisors: Associate Professor Xu Huang Professor Dharmendra Sharma

    2. Contents Aim of the project Introduction IEEE 802.11 Standard Security of IEEE 802.11 Standard Quantum Key Distribution (QKD) Implementing QKD in Wi-Fi Proposed Protocol Modifications to existing frames State Machine Procedures Research Conclusions Work Summary Work done and future work List of Papers Published

    3. Aim of the Project To establish a secure communication with the use of Quantum Key Distribution (QKD) in IEEE 802.11 (Wi-Fi) networks.

    4. IEEE 802.11 Standard IEEE 802.11 is a set of standards carrying out wireless local area network (WLAN) computer communication. One of the popular wireless networks with over one million hot spots around the world.

    5. Security of IEEE 802.11 Security of 802.11 is defined by Wired Equivalent Privacy (WEP). However, WEP was identified by cryptanalysts to have severe security weaknesses during authentication process. An amendment to the IEEE 802.11 called IEEE 802.11i was approved in 2004. But still wireless networks are vulnerable to security attacks due to the fact that communication takes place in wireless medium.

    6. Quantum Key Distribution Quantum cryptography allows exchange of cryptographic key between two remote parties with unconditional security. This key exchange is know as Quantum Key Distribution (QKD). Popular QKD protocols: BB84, B92, 6 state, SARG04. Lots of research work in progress in this area and even commercial fibre optic QKD networks exits now.

    7. Quantum Key Distribution Continued.... QKD process

    8. Why QKD in Wi-Fi ? Wireless networks are vulnerable to attacks than wired networks. Use of QKD in Wi-Fi networks would enhance the security as QKD offer “unconditional security”. Wi-Fi is limited to around 100m, hence matches well with QKD.

    9. How to implement QKD in Wi-Fi Key exchange in present IEEE 802.11i happens via “4-way handshake” process. Instead of using 4-way handshake, we use QKD for key exchange in Wi-Fi. This is implemented by modifying the existing IEEE 802.11 protocol.

    10. IEEE 802.11i Key Hierarchy

    11. Proposed QKD Protocol Existing IEEE 802.11i Protocol

    12. Modifying existing IEEE 802.11 protocol Necessary fields of existing IEEE 802.11 protocol needed to be modified have been identified. The modifications are done in such a way that they will not disturb the existing frame formats. The fields that used for 4-way handshake have been used for QKD protocol.

    13. Beacon Frame Body (only the first 10 fields are shown)

    17. Changes to EAPOL-Key frame QKD Phase values: 0000 0001 : Send/Receive bases. Used to indicate when the Supplicant is sending the bases used during the quantum transmission. 0000 0011 : Error estimation. Used to indicate that the EAPOL frame contains set of sample bits for comparison to estimate the errors introduced during the quantum transmission. 0000 0101 : Reconciliation. Used to indicate the reconciliation phase of QKD is in progress. 0000 0111 : Privacy Amplification.

    18. Changes to EAPOL-Key frame – Continued.... Key Information value changes: Quantum Transmission Re-attempt (Key Type) 0 : Default value 1 : Restart quantum transmission Key Ack Set if a response is expected to the message being sent and clear otherwise. Error Estimation Result (Install) 0 : Error estimation Failure 1 : Error estimation Success

    19. “Key Data” Field values during Reconciliation “Key Data” field carries parity check information during reconciliation phase. QKD Phase = 0000 0101 <Block Number | Sub-Block Level | Parity Check Results>

    20. Authenticator State machine procedures ReceivePhotons() PMK = TRUE // Receive photons qcTransmissions++   if (QCFinished and qcTransmissions) <= qcTransmissionsThreshold then basesRecorded = TRUE else if QCTimeOutEvt then EAPOL(reattemptTransmission) Else QCError // unable to setup // quantum transmission end if

    21. Supplicant State machine procedures SendPhotons() PMK = TRUE // send photons   if QCFinished or attemptTransmission then // send photons basesRecorded = TRUE end if

    22. Implementing the full IEEE protocol with new modifications are not possible during the project time frame. Hence used Simulink for simulations. Each of the main QKD components have been coded using C++. Used Simulink S-Functions for simulation.

    23. Simulink Model

    24. Research Conclusion QKD matches well with IEEE 802.11 networks. Minimal changes to existing IEEE 802.11 protocol. Existing frame changes are needed. If any of the participant is not supporting QKD, they can still proceed with existing protocol.

    25. Work Summary Major Contributions Integration of QKD in IEEE 802.11 Novel protocol to distribute the key securely Work Done Implementation of novel QKD protocol in IEEE 802.11 Packet level changes to IEEE 802.11 Explore future enhancements Work in progress Simulation of the solution Thesis writing Time Schedule for Rest of the Project Complete Simulation : April 2010 Thesis writing : May 2010 Publish another research paper: May 2010

    26. Papers Published 1 Shirantha Wijesekera, Xu Huang, and Dharmendra Sharma, “A Novel Protocol using Quantum Cryptography for Secure Communication in 802.11 Networks,” IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM 2009), Kos, Greece, June 15-18, 2009.. 2 Shirantha Wijesekera, Xu Huang, and Dharmendra Sharma, “Multi-Agent Based Approach for Quantum Key Distribution in WiFi Networks,” 3rd International KES Symposium on Agents and Multi-agent Systems-Technologies and Applications, Uppsala, Sweden, 3-5 June 2009. Proceeding, KES-AMSTA 2009, pp293-303. 3 Xu Huang, Shirantha Wijesekera, and Dharmendra Sharma, “Agent-Oriented Novel Quantum Key Distribution Protocol for the Security in Wireless Network,” Multiagent Systems, Edited by Salman Ahmed and Mohd Non Karsiti, published by In-Tec, ISBN 978-3-902613-51-6, Vienna , Austria, pp261- 276, 2009. 4 Xu Huang, Shirantha Wijesekera, and Dharmendra Sharma, “Fuzzy Dynamic Switching in QKD of Wi-Fi Networks,” the 5th International Conference on Natural Computation and the 6th International Conference on Fuzzy Systems and Knowledge Discovery ICNC’09-FSKD’09 Tianjing, China. 14-16 August, 2009. 5 Xu Huang, Shirantha Wijesekera, and Dharmendra Sharma, “Novel Protocol and Its Implementation QKD in Wi-Fi Networks,” 8th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2009), June 1-3 2009, Shanghai China. 6 Xu Huang, Shirantha Wijesekera, and Dharmendra Sharma, “Quantum Cryptography for Wireless Network Communications,” IEEE International Symposium on Wireless and Pervasive Computing, 11-13th February 2009, Melbourne, Australia, ISBN: 978-1-4244-2966-0, Security pp.1-pp5. 7 Xu Huang, Shirantha Wijesekera and Dharmendra Sharma, “Novel Protocol for Quantum Cryptography of Secure in Wireless Communications,” the IEEE 11th International Conference on Advanced Communication Technology, February 15-18, 2009, Phoenix Park, Korea. ISBN: 978-89-5519-139-4, pp 913-918. 8 Xu Huang, Shirantha Wijesekera, and Dharmendra Sharma, “Implementation of QKD in 802.11 Networks,” IEEE 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009), 25-26 April 2009 in Wuhan, Hubei, China. Proceedings Vol 2, pp.125. 9 Xu Huang, Shirantha Wijesekera, and Dharmendra Sharma, “Implementation of Quantum Key Distribution in Wi-Fi (IEEE 802.11) Wireless Networks,” IEEE the 10th International Conference on Advanced Communication Technology, Feb 17-20, 2008 Phoenix Park, Korea. Proceedings ISSN 1738-9445, ISBN 978-89-5519-135-6, Vol. II, p865. 10 Shirantha Wijesekera, Sajal Palit, Bala Balachandran, “Software Development for B92 Quantum Key Distribution Communication Protocol”, 6th IEEE/ACIS International Conference on Computer and Information Science, Melbourne, ISBN 0-7695-2841-4, 2007.

    27. Innovation Patent No: 2010100115 Granted on 04th February 2010

    28. Thank You

    29. Questions ?

More Related