2014
DOI: 10.5121/ijcnc.2014.6604
|View full text |Cite
|
Sign up to set email alerts
|

Framework for Wireless Network Security Using Quantum Cryptography

Abstract: ABSTRACT

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…Miralem Mohic et al 5 described a simulated environment of a quantum key distribution network with several nodes and links. In this approach several routing protocols, packet delivery ratio and routing packets are analyzed to find a best solution to the large amount of routing data flowing through the WSN through the QKD network.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Miralem Mohic et al 5 described a simulated environment of a quantum key distribution network with several nodes and links. In this approach several routing protocols, packet delivery ratio and routing packets are analyzed to find a best solution to the large amount of routing data flowing through the WSN through the QKD network.…”
Section: Related Workmentioning
confidence: 99%
“…The WSN environment has many security issues being unable to secure the privacy of user data. One of the most serious security issues with WSN, which is vulnerable to a variety of privacy threatening attacks, one of which is a quantum computer attack that has occurred as a result of rapid advances in the use of quantum physics to break many than traditional algorithms 5 .…”
Section: Introductionmentioning
confidence: 99%
“…Encryption is the key to keep information more secure in a Wi-Fi network. However, commonly utilized known encryption techniques have big weaknesses and are susceptible by attackers via compromising confidentiality and risks [2]. WEP transfer data as 64 bit or 128 bit [3] but the actual transmission keys are 40 bits and 104 bits long where the other 24 bits is an Initialization Vector (IV) to send in the packet along with the data [4].…”
Section: Introductionmentioning
confidence: 99%
“…This logic composed of fuzzy sets, provides the concept of degrees of membership, which increases the number of possibilities that can be subject to research. This logic is perfect deal with uncertain risk come in project management [2].…”
Section: Related Workmentioning
confidence: 99%
“…Thus, due to the high probability of information compromise associated with Wi-Fi networks, various encryption methods have been developed. However, commonly utilized encryption methods are known to have weaknesses and are susceptible to attackers thereby compromising confidentiality [2].…”
Section: Introductionmentioning
confidence: 99%