WIRELESS NETWORK AND CLASSICAL CRYPTOGRAPHY

Tinatin Mshvidobadze, Gori  University(Georgia)

Professor, Doctor of Technical Sciences

tinikomshvidobadze@gmail.com

 


Abstract: This paper explores on the aspect of application  of  quantum  cryptography  in  wireless  networks.  In  this  paper  we  present  a  methodology  for integrating quantum cryptography and security of IEEE 802.11 wireless networks in terms of distribution of the encryption keys.  Quantum cryptography provides a solution towards absolute communication security over the network by encoding information as polarized photons, which can be sent through the air. Present  use NS2 simulation  for  designing wireless  networks and  using  Cryptography algorithm as  to  security information. 

 

Key words: Network Security, Quantum Cryptography, Wireless Network, IEEE 802.11, Key Distribution.

 

INTRODUCTION

 

     Wireless  networks  generate  large  amount  of  data,  which  often  is  sensitive  and  vulnerable  to interceptions  than  wired  networks.  This  has  increased  the  risk  for  users  significantly  and  to combat  this  consideration,  wireless  networks  users  may  choose  to  utilize  various  encryption methodologies.  Encryption  is  the  key  to  keep  information  secure  online  in  a  Wi- Fi  network.

     When information is encrypted, it’s scrambled into a code so others can’t get it. Thus, due to the high probability of information compromise associated with Wi-Fi networks, various encryption methods have been developed. However, commonly utilized encryption methods are known to have weaknesses and are susceptible to attackers thereby compromising confidentiality. 

     In  order  to  make  secure  communications  around  a  wireless  network,  communication  between nodes (users) and base station (BS) to other nodes should be handled carefully by means of an efficient  key  management  protocol.  Quantum  Key  Distribution  (QKD)  using  quantum cryptography is a new method   in key distribution scheme, which allows broadcast of a network key  with  absolute  confidentiality. 

 

Related Works

     Quantum  cryptography  is  described  as  a  point- to - point  secure  key  generation  technology  that has  emerged  in  recent  times  in  providing  absolute  security.  Researchers  have  started  studying new  innovative  approaches  to  exploit  the  security  of  QKD  for  a  large- scale  communication system. A number of approaches and models for utilization of QKD for secure communication have been developed.  The uncertainty principle in quantum mechanics created a new paradigm for QKD [1]. One of the  approaches  for  use  of  QKD  involved  network  fashioned  security.  BBN  DARPA  quantum network is an example of such network.   Researchers   at Boston, Harvard University, and BBN technologies jointly developed the DARPA Quantum Network   in 2004 [2]. The main go al was point- to - point  Quantum  network  that  exploited  QKD  technology  for  end - to - end  network security via high speed QKD. 

 

 Wireless Networks

     In  today’s  era,  everyone  wants  their  necessary  data  to  be  handy,  portable  and  accessible  from almost  every  place  they  visit  throughout  the  day  and  this  is  made  possible  by  using  wireless  networks.  Wireless  networks,  as  the  name  suggests,  are  those  networks  that  are  not connected by any physical means such as Ethernet cables and thus provide the user with great mobility  and  convenience.  Also,  it  saves  one  from  the  expenses  on  the  cables  that  would  be required if wired network is chosen as well as makes it easier for moving the base of the devices from location to another by just moving the machine along with the wireless network card. 

     A  wired  network  helps  in  point  to  point  transfer,  that  is,  sends  data  between  any  two  devices that are connected with each other through an Ethernet cable but in case of wireless networks, the transfer of data is a broadcast service where the data is sent to all possible directions in the medium  within  a  limited  range  as  the  medium  of  data  transfer  is  air  here  and  not  cables.

     Wireless  networks  consist  of  four  basic  components:  Transmission  of  data  using  air  waves, access points (AP) to establish a connection to the public or private (organization)  network and the  wireless  client  operated  by  the  user.

 

 Security Issues in Wireless Networks 

     Wireless  networks  do  not  promise  quality  of  service  during  transmission  and  chances  of intrusion  into  such  networks  are very  high  since  the  transmission  here  takes  place  through  the  medium of air and not cables. So, it doesn’t only require protection against uninvited users from  accessing the network but also needs to secure the users’ private data that is being transmitted.  The general security issues for wireless networks are as follows [3]: 

ü      Confidentiality;

ü      Integrity;

ü      Availability;

ü      Eavesdropping and

ü      Authentication; 

ü      Blue Snaring or Blue jacking;

ü      War  Driver.

 

  Overview of Classical Cryptography

     Cryptology  is  defined  as  the  practice  and  study  of  techniques  for  secure  communications  in presence  of  adversaries  (third parties), which underpin  cryptography  and  cryptanalysis. 

Cryptography is composed of two major goals:

   Information privacy:   For keeping information transmitted via a network private without giving any information to a third party and  

   Authentication: To check the integrity of the message received by the user from another party connected via the same network. 

     Data  security  depends  entirely  on  the  secrecy  of  the  key.  Classically  cryptography  algorithms are divided into two forms depending on key distribution techniques: 

i.   Symmetric Key Algorithms - Cryptosystems  that  make  use  of  symmetric  key  distribution  use  same  key  for  encryption  and decryption.  This  method  is  also  known  as  secret  key  cryptography.  Secure  communication channel  in  key  management  is  achieved  only  if  the  symmetric  keys  are  pre- distributed  in  to  every pai r of interactive systems.

ii.   Asymmetric Key Algorithms -  Cryptosystems  that  make  use  of  asymmetric  key  distribution  use  a  public  key  system  that consists of two parts: a Private key, which is kept secret and a Public key, which is distributed over  the  network.  The  sender  encrypts  the  message  using  the  public  key  of  the  receiver.  The receiver makes use of its private key to decrypt the message. In such a distribution the private key is never in transit and hence less vulnerable to security issues[4] .

Figure 1. Process of Cryptography

     Cryptanalysis  on  the  other  hand  refers  to  study  of  cryptosystems  with  a  view  to  finding weaknesses  in  them  that  will  permit  retrieval  of  the  original  message  from  the  encrypted message, without the knowledge of the key or the algorithm used. 

 

 Overview of Quantum Cryptography 

    Quantum  cryptography [5]  is  an  evolving  technology  that  provides  safety  and  security  for network communication by performing cryptographic tasks using quantum mechanical effects.

     Quantum Key Distribution (QKD) is a technique that is an application of quantum cryptography  that has gained popularity recently since it overcomes the flaws of conventional cryptography. QKD  makes  the  secure  distribution  of  the  key  among  different  parties  possible  by  using properties of physics. 

     The  quantum  states  of  photons  are  used  and  the  security  key  information  is  transmitted  via polarized  photons  that  contain  the  message  denoted  by  bits  (0  or  1)  and  each  photon  contains one  bit  of  quantum  information  called   as  “Qubit”.  The  sender  sends  the  polarized  photon  to  the receiver. At the receiver end, the user determines the photon polarization by passing it through a filter and checks for any modifications in the received bits of photons when compared to the bits measured by the receiver. Any modifications found would show that there has been an intrusion from  a  third  party  because  the  intrusion  would  irreversibly  change  the  encoded  data  in  the photon  of  either  the  sender  or  the  receiver.       This  method  is  based  on  the  Heisenberg’s uncertainty principle that states that the quantum state can’t be measured without disturbing the  state  of  either  the  sender  or  the  receiver  and  hence  introducing  an  anomaly  in  the  quantum  system that can be noticed by users as an intrusion. 

     Thus, Quantum cryptography applies the principles of physics governed by the laws of quantum mechanics  for  distributing  the  secret  cryptographic  key  among  the  parties  involved  in  the cryptosystem in a manner that makes it next to impossible for a third party  to eavesdrop. 

 

 BB84 QKD Protocol 

     I n order to facilitate QKD many protocols exist such as: BB84 [6], B92, Six - State, SARG04 [7], Ekert91.  Among  these  protocols,  BB84  is  the  most  popular  and  widely  used  protocol  for  key distribution in practical systems .  

 Bennett  and  Brassard  proposed  BB84  protocol  in  1984.  The  protocol  consists  of  two  main channels used for transmission: 

1) Quantum channel: One- Way communication.

2) Classical channel: Two- way communication.

    BB84 allows two parties conventionally a Sender and a Receiver to establish communication by a common key sequence using polarized photons. Key exchange and key sifting are done as follows.

Using Classical channel (Key Sifting):

   Receiver  informs  the  Sender  what  bases  he  used  to  measure  the  photons  and  Sender

responds by saying if it matched the bases used. 

   Both  agree  on  to  the  correct matching  of  the  bases  used  and  without  announcing  the actual value of information. After discarding all the data on the polarizer bases that did not  match,  both  are  left  with  two  key  strings  of  shorter  sequences,  known  as  the  raw keys. 

 

 IEEE 802.11 WLANs 

     The main objective of this paper is to offer secure key distribution in wireless networks making  use of Quantum Cryptography.  In order to properly facilitate the functioning of QKD it is found that IEEE 802.11 family best suits to be integrated with QKD.   Fig. 8. Shows the architecture of IEEE 802.11.  

     Some  of  the  characteristic s  of  802.11  WLANs  that  give  it  the  proper  environment  for incorporating QKD are as follows:   

1)   Usage:  802.11  WLANs  are  mainly  used  in  office  and  campus  infrastructure,  which facilitates the deployment of QKD network with a high density of quantum apparatus  if necessary.

2)   Capacity: Terminals present in a 802.11 WLAN have more computational capacity and more energy as compared to those in cellular networks.

3)   Connection:  802.11  WLANs  are  used  to  provide  access  to  the  Internet  through  an  AP installed in an organization, which is beneficial for QKD integration.   

     In order to facilitate efficient authentication and management of keys between access point and client,  along  with  user  traffic  control  802.11  networks  employs  Extensible  Authentication Protocol  (EAP)  [8] .  EAP  provides  an  authentication  framework,  which  will  be  used  in  the current  work.  The  security  of  802.11  WLANs  is  based  on  the  WEP  protocol,  with  enhanced security being provided by the MAC layer. As specified earlier WEP presents security problems in  a  wireless  network. 

 

 4 -Way Handshaking

     The  4- Way  handshake  performs  the  authentication  process  in  IEEE  802.11  networks.  The process allows the AP and the BS to generate the key hierarchy in order to provide encryption for  secure  communication.  Since  the  keys  are  generated  using  a  pseudorandom  function,  in order  to  further  randomize  data  two  random  nonce  values  are  transmitted  between  the  AP (ANonce) and BS (SNonce).

      4 - way handshake itself has some flaws that inhibit secure communication in a network. Some of the vulnerabilities are   [9]: 

1)   Security  Attacks:  Vulnerable  to  attacks  like  DoS  in  which  intruders  can  torrent message to the BS after the handshake is completed.

2)   Response  Time:   BS  will  disassociate  and  de-authenticate  AP  if  data  flow  not received within the expected time interval after a successful handshake.

3)   Air  cracking:  Keys  can  be  recovered  using  this  program  once  enough  data  packets have been captured. 

      In order to overcome these weaknesses we propose an integration of quantum cryptography in this key distribution mechanism as presented in the following subsection. 

 

Wireless Network Based On NS2

     Design of wireless Network uses NS2, as a base on Security  evaluation, and describes the  proposed model of the system and  complete  description  of  the  Simulations  and  software program needed for  implementing  the  Network.  Ns-2  is  a widely  used  tool  to simulate  of  networks. 

     NS2 (Network Simulator version2): NS2 is a discrete event simulator  targeted  at  networking  research.  It  provides support  for  simulation  of  TCP,  routing,  and  multicast protocols  over  all  networks  wireless.NS2  can  be  employed in  most UNIX systems  and windows  (XP,  VESTA and  7).  Most  procedure processes of  the  NS2  code are  written in  C++.  It  uses  TCL as  its  scripting  language,  OTcl adds  object  orientation  to TCL.NS  (version  2)  is  an  object  oriented,  discrete  event driven  network simulator that is freely distributed and open source.

 

Program language in NS2

     The reason for having two programming languages from the aims  to  have  an  easy  to  use,  yet  fast  and  powerful simulator. C++ forms an efficient class hierarchy core of ns-2  that  takes  care  of  handling  packets,  headers  and algorithms.  Object  Tcl,  or  OTcl,  is  also  an  object oriented programming language utilized in ns-2 for network scenario creation,  allowing  fast  modifications  to  scenario  scripts.

     OTcl  and  C++  interact  with  each  other  through Tcl/C++interface called Tcl/C++ as depicted in figure 2:

 

Figure 2.  C++ and OTcl Communication

 

     OTcl  in  ns-2  enables  full  control  over  simulation  setup, configuration,  and  occasional  actions  (e.g.  creating  newTCP flows). It is a language that compromise between speed and abstraction  level  offered  to  the  user[10]. 

 

 

RC5 Algorithm

     To design  wireless  network  using  RC5 algorithm  to  security  of information,  RC5  algorithm was developed by Ronald Rivest in 1995 as a parameterized symmetric encryption.  RC  stands  for  "Rivest  Cipher",  or alternatively,  "Ron's Code". RC5  parameters are: a variable block  size  (w),  a  variable  number  of  rounds  (r),  and  a variable  key  size  (k).Allowable  choices  for  the block  size (w)  are  32,  64  and  128  bits.  The  number  of rounds  range from  0  to  255 bits, and  the key  size  range  from  0 to  2040 bits  in  size.  RC5  has  three  modules:  key-expansion, encryption  and  decryption  units.

     Data-dependent  rotation  (RC5  incorporates  rotations)  whose  amount  is  data  dependent.  The RC5 algorithm is designed to have the following objectives:

(a). Symmetric block cipher.

(b). Suitable for hardware and software.

(c). Fast (RC5 is simple algorithm and is word oriented, the basic operations work on full words of data at a time).

(d). Variable –length cryptography key(k) (0 -2040)bits.

(e). Adaptable to processors of different word-length.

(f).  Variable number of rounds(r)(0-255).

(g). Simple (RC5 simple structure is easy to implement and eases the task of determine the strength of the algorithm.

(h). High Security (It should provide high security when suitable parameter values are chosen).

(i). Low memory requirement’s(This property makes the algorithm suitable for smart cards and other devices with restricted memory).

 

                 

 

Figure 3.: RC5 algorithm encryption

 

 

Simulation Scenario

     Wireless  network  performance  depends mainly  on  the  end  to end.   This presented simulation scenario aimed at activating the network security through network  throughput,  packet  transfer  between  nodes within the scenario by using cryptography algorithms; Simulator    RC5  algorithm    to  cipher  package information that transfer between nodes[11] . 

     Simulation  principles  and strategies  adopting the separated object  model  and  using two  languages  C++  and  tclNS2 fulfills  the  achievement of  simulation for  specific  protocols and  the  configuration nodes and  establishment of  network simulation  environment  respectively. 

figure 4 nam output showing nodes of wireless networks,  Figure  5  refer  to  drop  of  packages when simulation finished.

 

           

      Figure 4.Nam output – Transmission           

   Figure 5. packets are dropped security packets   

   (two Scenario)  

 

CONCLUSION

     The  main  goal  of  this  research  work  is  to  show  a  method  to  improve  the  security  aspect of WLANs.  It  has  been  shown  that  the  integration  of  Quantum  Cryptography  in  Wireless Networks has great prospective in terms of better network security.  

     Key  management  and  distribution  is  difficult  using  classical  cryptographic  algorithms  but  the proposed approach provides a better solution for this problem. Research has shown that use of QKD  to  distribute  network  key  raises  the  security  and  makes  it  harder  for  an  eavesdropper  to interrupt  communication.  With  the  proposed  modification,  this  paper  has  achieved  the  main objective of improving security of WLANs.

     In  this  paper,  the  software  tool  Network  Simulator (Version 2), widely known as ns-2, is described and used for the simulation  of  selected  illustrative  examples  of wireless networks.  In  general,  ns2  provides  users  with  a  way  of specifying  network protocols and simulating  their behavior. The  result  of  the  simulation  are transfer  information  secure between  nodes.

REFERENCES:


[1]   Bennett, Charles H. (1992). Quantum Cryptography using any two  N on- O r t hogonal  S tates . Phys. Rev. Lett., 68:3121 – 3124;

[2]   Elliott,  C.,  “The  DARPA  Quantum  Network”,  Quantum  Communications  and  Cryptography, 2006.

[3]  H.  K.  Kalita  and  A.  Kar,  "Wireless  sensor  network  security  analysis,"  International  Journal  of Next - Generation Networks (IJNGN), vol. 1, pp. 1 - 10, 2009. 

[4]  Symmetric  key  cryptography  using random  key  generator,  A.  Nath,  S.  Ghosh,  M.A.  Mallik, Proceedings  of  International  conference  on  SAM - 2010  held  at  Las  Vegas(USA)  12 - 15  July, 2010, Vol- 2, P - 239 - 244.   

[5]  Bruss,  D.,  Erdelyi,  G.,  Meyer,  T.,  Riege,  T.,  &  Rothe,  J.,  "Quantum  cryptography:  A  survey". ACM Computing Surveys, 39(2), 2007, p. 1 - 27.  

[6] Nur  Atiqah  Muhamad  and  Zuriati  Ahmad  Zukarnain,  "Implemetation  of  BB84  Quantum  Key Distribution  Protocol's  with  Attacks",  European  Journal  of  Scientific  Research,  Vol.32,  No.4, 2009, pp. 460 - 466.  [7]  V. Scarani, A. Acin, G. Ribordy, and N. Gisin, "Quantum cryptography protocols Robust against photon  number  splitting  attacks  for  weak  laser  pulse  implementations,"  Phys.Rew.Lett.  92, 057901, 2004. 

[8]  Bernard  Aboba,  Larry  J.  Blunk,  John  R.  Vollbrecht,  James  Carlson,  and  Henrik  Levkowetz. Extensible Authentication Protocol (EAP). In-   ternet RFC 3748, June 2004. 

[9] Floriano De Rango, Dionogi Lentini, Salvatore Marano, Static and Dynamic 4- Way Handshake Solutions  to  Avoid  Denial  of  Service  Attack  in  Wi- Fi  Protected  Access  and  IEEE  802.11i, EURASIP Journal on Wireless Communications and Networking archive, Volume 2006 Issue 2, April 2006.  

10. NS-2, link: http://www.isi.edu/nsnam/ns/tutorial/ , November  2012

11. Wireless  Communication,  link  http://www.atis.org/, Archived from theoriginal


on 2008-01-02.