Skip to main content

Trustroam: A Novel Blockchain-Based Cross-Domain Authentication Scheme for Wi-Fi Access

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2019)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 11604))

Abstract

Cross-domain roaming in Wi-Fi networks is ubiquitous and the frequency of global roaming of users has increased dramatically in recent years. To ensure network security, it is important to authenticate users belonging to different domains. Existing solutions like eduroam leverage a centralized and hierarchical architecture to authenticate users, which leads to serious performance and security issues in practice. In this paper, we propose Trustroam, a novel cross-domain authentication scheme in Wi-Fi networks based on blockchain. Different from traditional hierarchical solutions, Trustroam authenticates users and servers in a distributed and anonymous manner, avoiding several serious problems such as single point of failure and privacy leakage. Through the distributed consensus mechanism and mutual authentication, our scheme is highly fault tolerant to handle compromised server attacks. We implemented the Trustroam prototype in a real testbed. Experimental and evaluation results show that our scheme is superior to existing hierarchical solutions in terms of scalability, security and privacy preserving. Besides, Trustroam is an effective solution that can be conveniently and incrementally deployed in practical environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Eduroam. https://www.eduroam.org/wp-content/uploads/2016/05/The-Global-Village.pdf. Accessed 19 Jan 2019

  2. Eduroam. https://www.eduroam.org. Accessed 17 Jan 2019

  3. Wierenga, K., Winter, S., Wolniewicz, T.: The Eduroam architecture for network roaming. RFC 7593, September 2015

    Google Scholar 

  4. Rigney, C., Rubens, A., Simpson, W., Willens, S.: Remote authentication dial in user service (RADIUS). RFC 2865, June 2000

    Google Scholar 

  5. Brenza, S., Pawlowski, A., Pöpper, C.: A practical investigation of identity theft vulnerabilities in Eduroam. In: Proceedings of ACM WiSec 2015, New York City, USA, June 2015

    Google Scholar 

  6. Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly Media Inc., Newton (2015)

    Google Scholar 

  7. Sanda, T., Inaba, H.: Proposal of new authentication method in Wi-Fi access using bitcoin 2.0. In: Proceedings of IEEE GCCE 2016, Kyoto, Japan, December 2016

    Google Scholar 

  8. Liu, D., Li, D., Liu, X., Ma L., Yu, H., Zhang, H.: Research on a cross-domain authentication scheme based on consortium blockchain in V2G networks of smart grid. In: Proceedings of IEEE EI2 2018, Beijing, China, October 2018

    Google Scholar 

  9. Winter, S., McCauley, M., Venaas, S., Wierenga, K.: Transport layer security (TLS) encryption for RADIUS. RFC 6614, May 2012

    Google Scholar 

  10. Liu, H., Goto, H.: Certificate-based, disruption-tolerant authentication system with automatic CA certificate distribution for Eduroam. In: 2014 IEEE 38th International Computer Software and Applications Conference Workshops (COMPSACW), Vasteras, Sweden, September 2014

    Google Scholar 

  11. Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139–147. Springer, Heidelberg (1993). https://doi.org/10.1007/3-540-48071-4_10

    Google Scholar 

  12. Buterin, V.: What proof of stake is and why it matters, August 2013

    Google Scholar 

  13. EOSIO White Paper v2. https://github.com/EOSIO/Documentation/blob/master. Accessed 27 Jan 2019

  14. Ethereum. https://www.ethereum.org. Accessed 29 Jan 2019

  15. Ethereum White Paper. https://github.com/ethereum/wiki/wiki/White-Paper. Accessed 19 Jan 2019

  16. Open vSwitch. https://www.openvswitch.org. Accessed 5 Jan 2019

Download references

Acknowledgement

This work is supported by the National Key Research and Development Plan of China (2017YFB0801702).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hewu Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, C., Wu, Q., Li, H., Liu, J. (2019). Trustroam: A Novel Blockchain-Based Cross-Domain Authentication Scheme for Wi-Fi Access. In: Biagioni, E., Zheng, Y., Cheng, S. (eds) Wireless Algorithms, Systems, and Applications. WASA 2019. Lecture Notes in Computer Science(), vol 11604. Springer, Cham. https://doi.org/10.1007/978-3-030-23597-0_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-23597-0_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-23596-3

  • Online ISBN: 978-3-030-23597-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics