CFP last date
21 October 2024
Reseach Article

Effective User Authentication using Quantum Key Distribution for Wireless Mesh Network

by G. Murali, R. Sivaram Prasad, K.v. Bhaskar Rao
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 42 - Number 4
Year of Publication: 2012
Authors: G. Murali, R. Sivaram Prasad, K.v. Bhaskar Rao
10.5120/5679-7715

G. Murali, R. Sivaram Prasad, K.v. Bhaskar Rao . Effective User Authentication using Quantum Key Distribution for Wireless Mesh Network. International Journal of Computer Applications. 42, 4 ( March 2012), 7-12. DOI=10.5120/5679-7715

@article{ 10.5120/5679-7715,
author = { G. Murali, R. Sivaram Prasad, K.v. Bhaskar Rao },
title = { Effective User Authentication using Quantum Key Distribution for Wireless Mesh Network },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 42 },
number = { 4 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 7-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume42/number4/5679-7715/ },
doi = { 10.5120/5679-7715 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:30:52.365742+05:30
%A G. Murali
%A R. Sivaram Prasad
%A K.v. Bhaskar Rao
%T Effective User Authentication using Quantum Key Distribution for Wireless Mesh Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 42
%N 4
%P 7-12
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Quantum key distribution can provide sophisticated solution for efficient authentication in wireless mesh networks. In quantum cryptography, the key is created during the process of key distribution, where as in classical key distribution a predetermined key is transmitted to the legitimate user. The most important contribution of quantum key distribution is the detection of eavesdropping.

References
  1. "A Survey of Quantum Key Distribution Protocols" Mobin Javed and Khurram Aziz NUST School of Electrical Engineering and Computer Science
  2. "Authentication in Wireless Mesh Networks", Raphael Frank
  3. "Man-in-the-middle in tunneled authentication protocols", N. Asokan, Valtteri Niemi, Kaisa Nyberg. .
  4. "A Symmetric Key Cryptographic Algorithm", Ayushi, Lecturer, Hindu College of Engineering
  5. "Public Key Cryptography Applications Algorithms and Mathematical Explanations", Anoop MS
  6. "Wireless mesh networks: a survey" Ian F. Akyildiz a, Xudong Wang b, Weilin Wang b
  7. "Quantum Key Distribution Protocols and Applications", Sheila Cobourne
  8. " Quantum cryptography: Public-key distribution and coin tossing". Bennett, C. H. and Brassard, G. 1984. In Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, December 1984, pp. 175 - 179.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Bb84 Protocol Cryptography Eap-tls Eap-ttls Quantum Key Distribution Wmn