DocumentCode :
1955282
Title :
Quantum Wireless Secure Communication Protocol
Author :
Tien-Sheng Lin ; Lin, Tien-Sheng ; Kuo, Sy-Yen
Author_Institution :
Electr. Eng. Nat. Taiwan Univ. Taipei, Taipei
fYear :
2007
fDate :
8-11 Oct. 2007
Firstpage :
146
Lastpage :
155
Abstract :
In the wireless communication network, transmitting messages from sender to receiver may traverse several intermediate nodes. Any eavesdropper can attack in the communication channel, and any malicious intermediate node can act as receiver to intercept the message. The secure routing path must solve channel attacks and attacks in the malicious node. In the classical field, the solution of the channel attacks is conditional security and we can not provide secure communication in the routing path from sender to receiver. In the quantum field, the security of the authentication protocol is based on the laws of nature, including no-cloning theorem and quantum teleportation. According to the property of no-cloning theorem and quantum teleportation, we can use the shared quantum entangled particles between communicators for liar detection problem. In the quantum cryptography, the security of the authentication protocol is unconditional security. This paper designs the two-way secure communication protocol, which can set up the secure routing path from sender to receiver. The two-way secure communication protocol includes the sender oriented checking and the receiver oriented checking. By using quantum sharing table, these checking schemes investigate whether the routing path is secure or not. In the beginning, the sender and receiver pre-share a quantum sharing table to detect all the dishonest nodes. The quantum sharing table acts as a quantum key distribution which can not be stolen by any Eve. Furthermore, the protocol can teleport a quantum state from sender to receiver to identify whether the communication channel and the intermediate nodes are honest or not. Then, the protocol can achieve the secure routing path to verify the real sender and receiver and confirm that all intermediate nodes are honest. Based on this mechanism, we can achieve high liar detection probability.
Keywords :
quantum cryptography; routing protocols; telecommunication channels; telecommunication security; authentication protocol; channel attacks; quantum cryptography; quantum key distribution; quantum sharing table; quantum wireless secure communication protocol; receiver oriented checking; sender oriented checking; two way secure communication protocol; Authentication; Communication channels; Communication system security; Cryptographic protocols; Quantum entanglement; Quantum mechanics; Routing; Teleportation; Wireless application protocol; Wireless communication; No-Cloning Theorem; Quantum Entangled Particles; Quantum Teleportation; Two-Way Secure Communication Protocols;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security Technology, 2007 41st Annual IEEE International Carnahan Conference on
Conference_Location :
Ottawa, Ont.
Print_ISBN :
978-1-4244-1129-0
Type :
conf
DOI :
10.1109/CCST.2007.4373482
Filename :
4373482
Link To Document :
بازگشت