Skip to main content

Efficient Authenticated Wireless Roaming via Tunnels

  • Conference paper
Quality of Service in Heterogeneous Networks (QShine 2009)

Abstract

Wireless roaming means that a mobile device is able to switch from one network cell to another while keeping the link to active services. Recent researches [13] showed that it increases the security to establish an authenticated and confidential tunnel directly to a home network which then acts as service provider respectively proxy server for further external services. In this paper we extend the trust assumptions and formal security goals for wireless roaming via tunnels (WRT) that were given by Manulis et al.[7].

Additonally, we propose an efficient protocol that realizes the authentication and key agreement for establishing the secure tunnel, whereby considering the delay restrictions that are given by current multimedia services like VoIP or video streaming.

Furthermore we discuss the accounting problem and present a solution that ensures a fair accounting for the foreign network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: Extensible Authentication Protocol (EAP). RFC 3748 (Proposed Standard), Updated by RFC 5247 (June 2004)

    Google Scholar 

  2. Rackoff, C., Simon, D.R.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433–444. Springer, Heidelberg (1992)

    Google Scholar 

  3. Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing 17, 281–308 (1988)

    Article  MathSciNet  MATH  Google Scholar 

  4. Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531–545. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  5. Bellare, M., Kilian, J., Rogaway, P.: Security of the cipher block chaining message authentication code. Journal of Computer and System Sciences 61(3), 362–399 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  6. Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication

    Google Scholar 

  7. Manulis, M., Leroy, D., Koeune, F., Bonaventure, O., Quisquater, J.-J.: Authenticated wireless roaming via tunnels: Making mobile guests feel at home. Cryptology ePrint Archive, Report 2008/382 (2008), http://eprint.iacr.org/

  8. Manulis, M., Sadeghi, A.-R., Schwenk, J.: Linkable democratic group signatures

    Google Scholar 

  9. Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)

    Google Scholar 

  10. Noack, A.: Efficient authenticated wireless roaming via tunnels. Technical Report, Ruhr-University Bochum (2009), http://nds.hgi.rub.de/noack/No_EAWRT_full.pdf

  11. Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 371–388. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  12. Pointcheval, D., Stern, J.: Provably secure blind signature schemes, pp. 252–265. Springer, Heidelberg (1996)

    MATH  Google Scholar 

  13. Sastry, N., Sollins, K., Crowcroft, J.: Architecting citywide ubiquitous wi-fi access. In: HotNets-VI (2007), http://conferences.sigcomm.org/hotnets/2007/papers/hotnets6-final88.pdf

  14. Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004/332 (2004), http://eprint.iacr.org/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Noack, A. (2009). Efficient Authenticated Wireless Roaming via Tunnels. In: Bartolini, N., Nikoletseas, S., Sinha, P., Cardellini, V., Mahanti, A. (eds) Quality of Service in Heterogeneous Networks. QShine 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 22. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10625-5_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10625-5_47

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10624-8

  • Online ISBN: 978-3-642-10625-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics