Skip to main content

A Multilateral Secure Payment System for Wireless LAN Hotspots

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3592))

Abstract

Beginning with the adoption of the de-facto standard for wireless LAN communications IEEE 802.11 in 1999 we can observe a continuous growth of public wireless LAN hotspots that provide access to the Internet for modern road warriors. Unfortunately, current hotspots still suffer from several security drawbacks. In this paper we analyse how payment schemes used in current hotspot architectures consider the security requirements of both hotspot providers and subscribers. We identify a conflict between subscribers’ wish for privacy and hotspot providers’ interest in prohibiting unlicensed (and thus unpaid) usage of the hotspot as the most challenging security objectives a future payment system has to fulfill. As a solution solving this conflict we propose a multilateral secure payment system for wireless LAN hotspots based on electronic coins invented by David Chaum. As a side effect our approach also supersedes the sophisticated authentication techniques used in current hotspot implementations, thus, simplifying the roaming between different providers’ hotspots.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Stanossek, G.: Hotspots: Nische oder UMTS-Konkurrenz? VDI Nachrichten 41 (2003)

    Google Scholar 

  2. Jamaluddin, J., Doherty, M., Edwards, R., Coulton, P.: A Hybrid Operating Model for Wireless Hotspot Businesses. In: Proceedings of the IEEE Consumer Communications and Networking Conference (CCNC 2004), Las Vegas, Nevada, USA (2004)

    Google Scholar 

  3. Anton, B., Bullock, B., Short, J.: Best Current Practices for Wireless Internet Service Provider (WISP) Roaming. Technical report, Wi-Fi Alliance (2003) (Retrieved February 14, 2005), from http://www.wi-fi.org/opensection/downloads/WISPr_V1.0.pdf

  4. de Laat, C., Gross, G., Gommans, L., Vollbrecht, J.: D.Spence: Generic AAA Architecture. RFC 2903, The Internet Engineering Taskforce, IETF (2000) (Retrieved February 14, 2005), from http://www.ietf.org/rfc/rfc2903.txt

  5. Buchwald, M., Greiber, K., Milosevic, F.: Hotspot Report – Der Praxistest. Industrial study, Detecon International GmbH (2003)

    Google Scholar 

  6. Balachandran, A., Voelker, G.M., Bahl, P.: Wireless Hotspots: Current Challenges and Future Directions. In: Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots. ACM, New York (2003)

    Google Scholar 

  7. Ouyang, Y.C., Chu, C.H.: A Secure Context Transfer Scheme for Integration of UMTS and 802.11 WLANs. In: IEEE International Conference on Networking, Sensing and Control (ICNSC 2004), Taipei, Taiwan (2004)

    Google Scholar 

  8. Chakravorty, R., Vidales, P., Subramanian, K., Pratt, I., Crowcroft, J.: Performance Issues with Vertical Handovers: Experiences from GPRS Cellular and WLAN hot-spots Integration. In: Proceedings of the IEEE Pervasive Communications and Computing Conference (IEEE PerCom 2004) (2004)

    Google Scholar 

  9. Haverinen, H., Mikkonen, J., Takamki, T.: Cellular Access Control and Charging for Mobile Operator Wireless Local Area Networks. IEEE Wireless Communications, 52–60 (2002)

    Google Scholar 

  10. Matsunaga, Y., Merino, A.S., Suzuki, T., Katz, R.H.: Secure authentication system for public WLAN roaming. In: Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots, pp. 113–121. ACM Press, New York (2003)

    Chapter  Google Scholar 

  11. Federrath, H., Jerichow, A., Pfitzmann, A.: MIXes in Mobile Communication Systems: Location Management with Privacy. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 121–135. Springer, Heidelberg (1996)

    Google Scholar 

  12. Beadles, M., Mitton, D.: Criteria for Evaluating Network Access Server Protocols. RFC 3169 (2001) (Retrieved Feburary 14, 2005), from http://www.ietf.org/rfc/rfc3169.txt

  13. Verhoosel, J., Stap, R., Salden, A.: A Generic Business Model for WLAN Hotspots – A Roaming Business Case in the Netherlands. In: Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots. ACM, New York (2003)

    Google Scholar 

  14. Chaum, D.: Blind Signatures for Untraceable Payments. In: Advances in Cryptology - Proceedings of Crypto 1982, pp. 199–203. Plenum Press, New York (1983)

    Google Scholar 

  15. Laurie, B.: Lucre: Anonymous Electronic Tokens v1.8. Technical report (2003) (Retrieved Feburary 16, 2005), from http://anoncvs.aldigital.co.uk/lucre

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Groß, S., Lein, S., Steinbrecher, S. (2005). A Multilateral Secure Payment System for Wireless LAN Hotspots. In: Katsikas, S., López, J., Pernul, G. (eds) Trust, Privacy, and Security in Digital Business. TrustBus 2005. Lecture Notes in Computer Science, vol 3592. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11537878_9

Download citation

  • DOI: https://doi.org/10.1007/11537878_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28224-2

  • Online ISBN: 978-3-540-31796-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics