Three-Party Authenticated Quantum Key Distribution Protocols based Security in WLANs
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 6
Abstract
This work presents quantum key distribution protocols (QKDPs) to safeguard security in large networks, ushering in new directions in classical cryptography and quantum cryptography. Two three-party QKDPs, one with implicit user authentication and the other with explicit mutual authentication, are proposed to demonstrate the merits of the new combination, which include the following: 1) security against such attacks as man-inthe-middle, eavesdropping and replay, 2) efficiency is improved as the proposed protocols contain the fewest number of communication rounds among existing QKDPs, and 3) two parties can share and use a long-term secret (repeatedly). To prove the security of the proposed schemes, this work also presents a new primitive called the Unbiased-Chosen Basis (UCB) assumption.
Authors and Affiliations
V V S NARAYANA MURTHY KAMINI, Amudala Ratna Raju, M Vamsi Krishna
Scale Down Speculation and Exalt Network Performance
In mobile Ad hoc Networks are having dynamic nature of its network infrastructure and it is vulnerable to all types of attacks. Among these attacks the routing attacks getting more attention because its changing the...
Optimize Energy Consumption with priority forwarder list in Wireless Sensor Networks
Opportunistic routing always useful to increase the network throughput by forwarding the packets to the nodes which are nearer to the destination node. These nodes are called as forwarder listed nodes during the tran...
Optimum Loss Allocation in Radial Distribution Systems
In this paper, the proposed method has the advantage that no assumptions are made in the allocation of real power losses as opposed other algorithms available in the literature. A detailed comparison of the real loss...
To Enable Base Station To Obtain The ‘True’ Estimate Of The Aggregate In The Presence Of The Attack
The sensor nodes appearance a multi-hop network as the base station (BS) proceeds as the central point of control. Wireless sensor networks used in different kinds of applications like Forest monitoring, weather fore...
A Novel Secure On-Demand Routing Protocol for MANET using RSA Triple Key Technique
MANET (Mobile and Ad hoc Networks) are networks in which nodes are mobile and link connectivity might change all the time. In this kind of networks routing, security and key management are the important and complex p...