Skip to main content
Log in

Network Layer Access Control for Context-Aware IPv6 Applications

Wireless Networks Aims and scope Submit manuscript

Abstract

As part of the Lancaster GUIDE II project, we have developed a novel wireless access point protocol designed to support the development of next generation mobile context-aware applications in our local environs. Once deployed, this architecture will allow ordinary citizens secure, accountable and convenient access to a set of tailored applications including location, multimedia and context based services, and the public Internet. Our architecture utilises packet marking and network level packet filtering techniques within a modified Mobile IPv6 protocol stack to perform access control over a range of wireless network technologies. In this paper, we describe the rationale for, and components of, our architecture and contrast our approach with other state-of-the-art systems. The paper also contains details of our current implementation work, including preliminary performance measurements.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

References

  1. G. Appenzeller, M. Roussopoulos and M. Baker, User-friendly access control for public network ports, in: Proceedings of IEEE INFOCOM '99 (March 1999).

  2. W. Arbaugh, N. Shankar and Y.C.J. Wan, Your 802.11 Wireless Network has no clothes, Technical Report, Department of Computer Science, University of Maryland, College Park, MD.

  3. P. Bahl, A. Balachandran and S. Venkatachary, The CHOICE network - broadband wireless Internet access in public places, MSR-TR-2000-21 (February 2000).

  4. S. Björk, J. Falk, R. Hansson and P. Ljungstrand, Pirates! - using the physical world as a game board, in: Interact 2001, IFIP TC.13 Conference on Human-Computer Interaction, Tokyo, Japan (July 9-13, 2001).

  5. J. Broadbent and P. Marti, Location aware mobile interactive guides: usability issues, in: Proceedings of the Fourth International Conference on Hypermedia and Interactivity in Museums (ICHIM97), Paris (September 1997).

  6. P. Calhoun, A. Rubens, H. Akhtar and E. Guttman, Diameter base protocol, Internet Draft, draft-ietf-aaa-diameter-01.txt (March 2001).

  7. P. Calhoun and C.E. Perkins, Diameter mobile IP extensions, Internet Draft, draft-ietf-aaa-diameter-mobileip-01.txt (March 2001).

  8. K. Cheverst, N. Davies, K. Mitchell and A. Friday, The role of connectivity in supporting context-sensitive applications, in: Lecture Notes in Computer Science, Vol. 1707 (Springer, Berlin, 1999) pp. 193-207.

    Google Scholar 

  9. K. Cheverst et al., Developing a context-aware electronic tourist guide: Some issues and experiences, in: Proceedings of CHI '00, Netherlands (April 2000) pp. 17-24.

  10. K. Cheverst, G. Smith, K. Mitchell, A. Friday and N. Davies, The role of shared context in supporting cooperation between city visitors, Computers and Graphics 25(4) (2001) 555-562.

    Google Scholar 

  11. N. Davies, K. Cheverst, K. Mitchell and A. Friday, Caches in the air: Disseminating information in the guide system, in: Proceedings of IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '99), New Orleans, LO (25-26 February 1999).

  12. B. Daviss, Write here, write now, New Scientist (1 December 2001), http://www.newscientist.com/hottopics/phones/ phones.jsp?id=23194900

  13. J. Finney and A. Scott, Implementing Mobile IPv6 for multimedia, in: Proceedings of 1st GEMISIS symposium on Multimedia Network Technology, Salford, UK (May 1998).

  14. J. Finney and G. O'Shea, Mobile 4-in-6: A novel mechanism for IPv4/v6 transitioning, in: Proceedings of Interactive Distributed Multimedia Systems (IDMS '01), UK (September 2001).

  15. Guide II: Services for citizens, Research Project, Lancaster University, EPSRC Grant GR/M82394, 2000.

  16. IEEE Draft P802.1X/D1, Port based network access control (September 1999).

  17. B. Kaliski and J. Staddon, PKCS #1: RSA cryptography specifications, IETF Internet RFC 2437 (October 1998).

  18. J. Kelsey, B. Schneier and N. Ferguson, Yarrow-160: Notes on the design and analysis of the Yarrow cryptographic pseudorandom number generator, in: Selected Areas in Cryptography (Springer, Berlin, 1999) pp. 13-33.

    Google Scholar 

  19. LandMARC (Lancaster and Microsoft Active Research Collaboration), Research Project, Lancaster University (October 1999), http://www.landmarc.net/

  20. O.H. Levkowetz et al., Problem description: Reasons for performing context transfers between nodes in an IP access network, Internet Draft, draft-ietf-seamoby-context-transfer-problem-stat-02.txt (June 2001).

  21. S. Long, R. Kooper, G.D. Abowd and C.G. Atkeson, Rapid prototyping of mobile context-aware applications: The cyberguide case study, in: Proceedings of 2nd ACM International Conference on Mobile Computing, Rye, NY (ACM Press, 1996).

  22. Mobile IPv6 test-bed, Collaboration with Cisco, Microsoft and Orange, Lancaster University (February 2001), http://www. mobileipv6.net/

  23. E.A. Napjus, NetBar - Carnegie Mellon's solution to authenticated access for mobile machines, CMU White Paper, http://www.net. cmu.edu/docs/arch/netbar.html.

  24. Nokia, General Packet Radio Service - GPRS - Nokia's vision for a service platform supporting packet switched applications, White Paper (1998).

  25. B. Patil and S. Das, IETF Protocol for carrying Authentication for Network Access (PANA) Working Group, http://www.ietf.org/ html.charters/pana-charter.html

  26. E. Poger and M. Baker, Secure Public Internet Access Handler (SPINACH), in: Proceedings of the USENIX Symposium on Internet Technologies and Systems (1997).

  27. T.S. Rappaport, Wireless Communications - Principles and Practice (Prentice-Hall, 1996).

  28. S. Schmid, J. Finney, A. Scott and D. Shepherd, Component-based active network architecture, in: Proceedings 6th IEEE Symposium on Computers and Communications (ISCC '01), Hammamet, Tunisia (3- 5 July, 2001).

  29. B. Schneier, Applied Cryptography, 2nd ed. (Wiley, New York, 1995).

    Google Scholar 

  30. M. Stemm and R. Katz, Vertical handoffs in wireless overlay networks, ACM Mobile Networking (MONET) (1997).

  31. D. Subir and A. McAuley, Basic User Registration Protocol (BURP) requirements, Internet Draft, draft-ietf-draft-das-burp-requirements-00.txt (January 2001).

  32. G. Steiner, B.C. Neuman and J.I. Schiller, Kerberos: An authentication service for open network systems, in: Proceedings Winter 1988 Usenix Conference (February 1988), http://web.mit.edu/ kerberos/www/papers.html

  33. D.L. Wasley, Authenticating aperiodic connections to the campus network (June 1996), http://www.ucop.edu/irc/wp/wpReports/wpr005/wpr005_Wasley.html

  34. D. Wheeler and R. Needham, TEA: A Tiny Encryption Algorithm, Technical Report, Computer Laboratory, Cambridge University, England.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Friday, A., Wu, M., Finney, J. et al. Network Layer Access Control for Context-Aware IPv6 Applications. Wireless Networks 9, 299–309 (2003). https://doi.org/10.1023/A:1023639109234

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1023639109234

Navigation