Abstract
Wireless roaming means that a mobile device is able to switch from one network cell to another while keeping the link to active services. Recent researches [13] showed that it increases the security to establish an authenticated and confidential tunnel directly to a home network which then acts as service provider respectively proxy server for further external services. In this paper we extend the trust assumptions and formal security goals for wireless roaming via tunnels (WRT) that were given by Manulis et al.[7].
Additonally, we propose an efficient protocol that realizes the authentication and key agreement for establishing the secure tunnel, whereby considering the delay restrictions that are given by current multimedia services like VoIP or video streaming.
Furthermore we discuss the accounting problem and present a solution that ensures a fair accounting for the foreign network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: Extensible Authentication Protocol (EAP). RFC 3748 (Proposed Standard), Updated by RFC 5247 (June 2004)
Rackoff, C., Simon, D.R.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433–444. Springer, Heidelberg (1992)
Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing 17, 281–308 (1988)
Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531–545. Springer, Heidelberg (2000)
Bellare, M., Kilian, J., Rogaway, P.: Security of the cipher block chaining message authentication code. Journal of Computer and System Sciences 61(3), 362–399 (2000)
Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication
Manulis, M., Leroy, D., Koeune, F., Bonaventure, O., Quisquater, J.-J.: Authenticated wireless roaming via tunnels: Making mobile guests feel at home. Cryptology ePrint Archive, Report 2008/382 (2008), http://eprint.iacr.org/
Manulis, M., Sadeghi, A.-R., Schwenk, J.: Linkable democratic group signatures
Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)
Noack, A.: Efficient authenticated wireless roaming via tunnels. Technical Report, Ruhr-University Bochum (2009), http://nds.hgi.rub.de/noack/No_EAWRT_full.pdf
Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 371–388. Springer, Heidelberg (2004)
Pointcheval, D., Stern, J.: Provably secure blind signature schemes, pp. 252–265. Springer, Heidelberg (1996)
Sastry, N., Sollins, K., Crowcroft, J.: Architecting citywide ubiquitous wi-fi access. In: HotNets-VI (2007), http://conferences.sigcomm.org/hotnets/2007/papers/hotnets6-final88.pdf
Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004/332 (2004), http://eprint.iacr.org/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Noack, A. (2009). Efficient Authenticated Wireless Roaming via Tunnels. In: Bartolini, N., Nikoletseas, S., Sinha, P., Cardellini, V., Mahanti, A. (eds) Quality of Service in Heterogeneous Networks. QShine 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 22. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10625-5_47
Download citation
DOI: https://doi.org/10.1007/978-3-642-10625-5_47
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10624-8
Online ISBN: 978-3-642-10625-5
eBook Packages: Computer ScienceComputer Science (R0)