Skip to main content
Log in

Abstract

In recent years, wireless Internet service providers (WISPs) have established Wi-Fi hotspots in increasing numbers at public venues, providing local coverage to traveling users and empowering them with the ability to access email, Web, and other Internet applications on the move. In this paper, we observe that while the mobile computing landscape has changed both in terms of number and type of hotspot venues, there are several technological and deployment challenges remaining before hotspots can become an ubiquitous infrastructure. These challenges include authentication, security, coverage, management, location services, billing, and interoperability. We discuss existing research, the work of standards bodies, and the experience of commercial hotspot providers in these areas, and then describe compelling open research questions that remain.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. B. Aboba, IEEE 802.1X pre-authentication, Presentation to 802.11 WGi (July 2002).

  2. A. Ahmad, R. Chandler, A.A. Dharmadhikari and U. Sengupta, SIM-based WLAN authentication for open platforms. Technology at Intel Magazine (August 2003).

  3. J. Ala-Laurila, J. Mikkonen and J. Rinnemaa, Wireless LAN access network architecture for mobile operators, IEEE Communications Magazine 39(11) (2001).

  4. G. Appenzeller, M. Roussopoulos and M. Baker, User-friendly access control for public network ports, in: Proc. IEEE INFOCOM’99 (1999).

  5. W.A. Arbaugh, N. Shankar and J. Wang, Your 802.11 network has no clothes, in: Proc. IEEE International Conference on Wireless LANs and Home Networks (Dec. 2001) pp. 131–144.

  6. Aruba Networks. www.arubanetworks.com.

  7. P. Bahl, A. Balachandran, A. Miu, W. Russell, G.M. Voelker and Y.-M. Wang, PAWNs: Satisfying the need for secure ubiquitous connectivity and location services. IEEE Wireless Communications Magazine, Special Issue on Future Wireless Applications (2002) pp. 40–48.

  8. P. Bahl, A. Balachandran and S. Venkatachary, Secure wireless internet access in public places, in: Proc. IEEE ICC’01 (June 2001) pp. 3271–3275.

  9. P. Bahl and V. N. Padmanabhan, RADAR: An in-building RF-based user location and tracking system, in: Proc. IEEE INFOCOM’00 (April 2000).

  10. V. Bahl, P. Bahl and R. Chandra, MultiNet: Connecting to Multiple IEEE 802.11 networks using a single wireless card, Technical Report MSR-TR-2003-46, Microsoft Research (July 2003).

  11. A. Balachandran, G.M. Voelker and P. Bahl, Hot-spot congestion relief in public-area wireless networks, in: Proc. Workshop on Mobile Computing Systems and Applications, WMCSA’02 (June 2002) pp. 70–80.

  12. A. Balachandran, G.M. Voelker, P. Bahl and P.V. Rangan, Characterizing user behavior and network performance in a public wireless lan, in: Proc. ACM SIGMETRICS’02 (June 2002) pp. 195–205.

  13. M. Balazinska and P. Castro, Characterizing mobility and network usage in a corporate wireless local-area network, in: Proc. MobiSys’03, (May 2003) pp. 303–316.

  14. J. Bellardo and S. Savage, 802.11 Denial-of-service attacks: Real vulnerabilities and practical solutions, in: Proc. USENIX Security Symposium, (Aug. 2003).

  15. N. Borisov, I. Goldberg and D. Wagner, Intercepting mobile communications: The insecurity of 802.11, (Jan 2001). www.isaac.cs.berkeley.edu/isaac/wep-faq.html

  16. M. Buddhikot, G. Chandramenon, S. Han, Y.W. Lee, S. Miller and L. Salgarelli, Integration of 802.11 and third-generation wireless data networks, in: Proc. IEEE Infocom 2003 (April 2003).

  17. M. Buddhikot, G. Chandramenon, S. Han, Y.W. Lee, S. Miller and L. Salgarelli, Design and implementation of a WLAN/CDMA2000 interworking architecture, in: IEEE Communications Magazine, (Nov. 2003).

  18. S.-C. Chan, An overview of smart card security, White Paper (Aug. 1997).

  19. Cometa Networks, www.cometanetworks.com.

  20. D. Deville, A. Galland, G. Grimaud and S. Jean, Smart card operating systems: Past, present, and future, in: Fifth USENIX/NordU Conference (Feb. 2003).

  21. M. Gruteser and D. Grunwald, Anonymous usage of location-based services through spatial and temporal cloaking, in: Proc. First International Conference on Mobile Systems, Applications, and Services (MobiSys’03) (May 2003) pp. 31–42.

  22. E. Gustafsson and A. Jonsson, Always best connected, in: IEEE Wireless Communications Magazine (Feb. 2003).

  23. H.L. Van Trees, Optimum Array Processing (John Wiley & Sons, 2002).

  24. H. Haverinen, J. Mikkonen and T. Takamki, Cellular access control and charging for mobile operator wireless local area networks, in: IEEE Wireless Communications 9(6) (2002).

  25. J. Hightower and G. Boriello, The location stack: A layered model for location in ubiquitous computing, in: Proc. Workshop on Mobile Computing Systems and Applications, WMCSA’02 (June 2002).

  26. G. Hyman. Wi-Fi, Wherefore Art Thou? Wireless Online (April 2002).

  27. IEEE, 802.11b/d3.0 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specification (Aug. 1999).

  28. IEEE, P802.11 http://grouper.ieee.org/groups/802/11 (May 2000).

  29. IEEE 802.1X-2001, IEEE Standards for Local Area Networks: Port-Based Network Access Control, 1999.

  30. ITU-R Rec. M. 1225, Guidelines for Evaluation of Radio Transmission Technologies for IMT-2000.

  31. E.-S. Jung and N. Vaidya, A power control mac protocol for ad hoc networks, in: Proc. ACM MobiCom’02 (Sept. 2002).

  32. D. Kotz and K. Essien, Characterizing usage of a campus-wide wireless network, in: Proc. ACM MobiCom’02, (March 2002) pp. 107–118.

  33. L. Qiu, P. Bahl and A. Adya, The effect of first-hop wireless bandwidth allocation on end-to-end network performance, in: Proc. NOSSDAV’02 (May 2002).

  34. J. Lansford and P. Bahl. The design and implementation of HomeRF: A radio-frequency wireless networking standard for the connected home, in: Proceedings of the IEEE (Nov. 2000).

  35. S. Lu, V. Bhargavan and R. Srikant, Fair scheduling in wireless packet networks, in: Proc. ACM Sigcomm’97 (Aug. 1997) pp. 63–74.

  36. H. Luo, R. Ramjee, P. Sinha, L. Li and S. Lu, UCAN: A unified cellular and ad-hoc network architecture, in: Proc. ACM MobiCom’03 (Sept. 2003).

  37. A. Mishra and W. A. Arbaugh, An initial security analysis of the IEEE 802.1x standard, technical report CS-TR-4328, University of Maryland (Feb. 2002).

  38. Mobilian, http://www.mobilian.com.

  39. N. Haller and C. Metz, A one-time password system, IETF RFC 1938 (May 1996).

  40. E.A. Napjus, Netbar–Carnegie Mellon’s solution to authenticated access for mobile machines, White Paper (August 1989).

  41. R.V. Nee, New high-rate wireless LAN standards, IEEE Communications Magazine (1999) 82–88.

  42. E. Ng, I. Stoica and H. Zhang, Packet fair queuing algorithms for wireless networks with location-dependent errors, in: Proc. IEEE Infocom’98 (March 1998).

  43. NYC Wireless, www.nycwireless.net.

  44. N.B. Priyantha, A. Chakraborty and H. Balakrishnan, The cricket location-support system, in: Proc. ACM MobiCom’00 (July 2000).

  45. C. Rigney, A.C. Rubens, W.A. Simpson and S. Willens, Remote authentication dial-in user service (RADIUS), IETF RFC 2138 (April 1997).

  46. A.K. Salkintzis, C. Fors and R. Pazhyannur, WLAN-GPRS integration for next-generation mobile data networks, IEEE Wireless Communications 9(5) (2002).

  47. M. Satyanarayanan, Pervasive computing: Vision and challenges, IEEE Personal Communications (Aug. 2001).

  48. B. Schilit, G. Boriello, W.G. Griswold, D. McDonald, E. Lazowska, A. Balachandran and V. Iverson, Ubiquitous location-aware computing – the place lab initiative, in: Proc. First ACM Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (Sept. 2003).

  49. Seattle Wireless, www.seattlewireless.com.

  50. J.G. Steiner, G. Neuman and J.I. Schiller, Kerberos: An authentication service for open network systems, in: Proc. Winter 1998 USENIX Technical Conference (Feb. 1988).

  51. T-Mobile, www.tmobile.com.

  52. TOGEWAnet AG, http://www.togewanet.com (July 2002).

  53. Vivato Systems, www.vivato.net.

  54. J. Walker, Unsafe at any key size: An analysis of the wep encapsulation, Technical Report 036288E, IEEE 802.11 Committee (March 2000).

  55. K.-C. Wang and P. Ramanathan, End-to-End Throughput and Delay Assurances in Multihop Wireless Hotspots, in: Proc. First ACM Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH’03) (Sept. 2003).

  56. R. Want, A. Hopper and J. GIbbons, The active badge location system, ACM Transactions on Information Systems 10(1) 1992.

  57. A. Ward, A. Jones and A. Hopper, A new location technique for the active office, IEEE Personal Communications 4(5) (1997).

  58. D.L. Wasley, Authenticating aperiodic connections to the campus network, Technical Report WPR005, U. C. Berkeley (June 1996).

  59. Wayport, www.wayport.net.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anand Balachandran.

Additional information

Anand Balachandran has been a member of the research staff at Intel Research, Seattle since October 2003. His research interests include wireless networking systems, wireless Internet, infrastructure and ad-hoc networks, and mobile and ubiquitous computing. He received his Bachelor of Technology degree from the Indian Institute of Technology, Madras in 1995, his Master’s degree from Columbia University, in 1997, and his Ph.D. degree in Computer Science and Engineering from the University of California at San Diego in 2003.

Geoffrey M. Voelker is an assistant professor at the University of California at San Diego. His research interests include operating systems, distributed systems, networking, and mobile computing. He received a BS degree in Electrical Engineering and Computer Science from the University of California at Berkeley in 1992, and the M.S. and Ph.D. degrees in Computer Science and Engineering from the University of Washington in 1995 and 2000, respectively. In 2000, he received the first Computing Research Association (CRA) Digital Government Fellowship, and in 2002 he received the Hellman Young Faculty Fellowship at UCSD.

Victor Bahl is a Senior Researcher and the Manager of the Networking Group in Microsoft Research. His research interests span a variety of problems in wireless networking. In addition to making many product contributions, he has authored over 65 scientific papers, 44 issued and pending patent applications and several book chapters. He is the co-founder and Chairman of the ACM Special Interest Group in Mobility (SIGMOBILE); the founder and past Editor-in-Chief of ACM Mobile Computing and Communications Review, and the founder and Steering Committee Chair of ACM/USENIX Mobile Systems Conference (MobiSys); He has served on the editorial board of IEEE Journal on Selected Areas in Communications, and is currently serving on the editorial boards of Elsevier’s Adhoc Networking Journal, Kulwer’s Telecommunications Systems Journal, and ACM’s Wireless Networking Journal. He has served as a guest editor for several IEEE and ACM journals and on networking review panels organized by the National Science Foundation (NSF), the National Research Council (NRC) and European Union’s COST. He has served as the General Chairman, Program Chair and Steering Committee member of several IEEE and ACM conferences and on the Technical Program Committee of over 45 international conferences and workshops. He is the recipient of Digital’s Doctoral Engineering Award (1994) and ACM SIGMOBILE’s Distinguished Service Award (2001). He is a Fellow of the ACM, a Senior Member of the IEEE and a past president of the electrical engineering honor society Eta kappa Nu-Zeta Pi. Dr. Bahl received his Ph. D in Computer Systems Engineering from the University of Massachusetts Amherst.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Balachandran, A., Voelker, G.M. & Bahl, P. 2005. Mobile Netw Appl 10, 265–274 (2005). https://doi.org/10.1007/s11036-005-6421-5

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-005-6421-5

Keywords

Navigation