ABSTRACT
In this paper, we show how secret sharing can be used to address a number of shortcomings in state-of-the-art public-key-based inter-provider roaming. In particular, the new concept does not require costly operations for certificate validation by the mobile device. It furthermore eliminates the need for a secure channel between providers upon roaming. We demonstrate the new approach by introducing a new protocol, EAP-TLS-KS, for roaming between 802.11i-protected WLANs. In addition, we show that the properties of EAP-TLS-KS allow for an efficient integration of a micropayment scheme.
- Personal Communication with L. Buttyán, May 2005.]]Google Scholar
- B. Aboba and D. Simon. PPP EAP TLS Authentication protocol. RFC 2716, October 1999.]] Google ScholarDigital Library
- N. Adachi, S. Aoki, and Y. Komano. The security problems of Rivest and Shamir's PayWord scheme. In Proceedings of IEEE CEC'03, 2003.]]Google ScholarCross Ref
- R. J. Anderson, C. Manifavas, and C. Sutherland. NetCard - A practical electronic-cash system. In Security Protocols, volume 1180 of LNCS, 1997.]] Google ScholarDigital Library
- B. Anton, B. Bullock, and J. Short. Best current practice for wireless internet service provider (WISP) roaming. Wi-Fi Alliance - Wireless ISP Roaming (WISPr), February 2003.]]Google Scholar
- G. Appenzeller, M. Roussopoulus, and M. Baker. User-friendly access control for public network ports. In Proceedings of IEEE INFOCOM'99, 1999.]]Google ScholarCross Ref
- N. Asokan, P. Janson, M. Steiner, and M. Waidner. State of the art in electronic payment systems. IEEE Computers, (30), September 1999.]] Google ScholarDigital Library
- P. Bahl, A. Balachandran, and S. Venkatachary. Secure wireless internet access in public places. In Proceedings of IEEE ICC'01, 2001.]]Google ScholarCross Ref
- A. Balachandran and G. M. Voelker. Wireless hotspots: Current challenges and future directions. In Proceedings of ACM WMASH'03, 2003.]] Google ScholarDigital Library
- K. Bayarou, M. Enzmann, E. Giessler, M. Haisch, B. Hunter, M. Ilyas, S. Rohr, and M. Schneider. Towards certificate-based authentication for future mobile communications. Wireless Personal Communications, 29, June 2004.]] Google ScholarDigital Library
- L. Blunk and J. Vollbrecht. PPP Extensible Authentication Protocol (EAP). RFC 2284, March 1998.]] Google ScholarDigital Library
- D. Boneh, X. Ding, and G. Tsudik. Fine-grained control of security capabilities. ACM Transactions of Internet Technology, 4(1), February 2003.]] Google ScholarDigital Library
- C. Boyd. Digitial multisignatures. In Conference on Cryptography and Coding, 1986.]]Google Scholar
- L. Buttyan and J.-P. Hubaux. Accountable anonymous access to services in mobile communication systems. In Symposium on Reliable Distributed Systems, 1999.]] Google ScholarDigital Library
- T. Clancy and W. Arbaugh. EAP Password Authenticated Exchange (EAP-PAX). Internet Society draft-clancy-eap-pax-03, April 2005.]]Google Scholar
- T. Dierks and C. Allen. The TLS protocol version 1.0. RFC 2246, January 1999.]] Google ScholarDigital Library
- Y. Frankel. A practical protocol for large group oriented networks. In Advances in Cryptology - EUROCRYPT'89, LNCS, 1989.]] Google ScholarDigital Library
- E. Gabber and A. Silberschatz. Agora: A minimal distributed protocol for electronic commerce. In Proceedings of the USENIX Workshop on Electronic Commerce, 1996.]] Google ScholarDigital Library
- D. Geer and M. Yung. Split-and-delegate: Threshold cryptography for the masses. In Proceedings of FC'02, volume 2357 of LNCS, 2002.]]Google Scholar
- R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust threshold DSS signatures. In Advances in Cryptology - EUROCRYPT'96, volume 1070 of LNCS, 1996.]]Google Scholar
- J. Gu, S. Park, O. Song, L. J., J. Nah, and S. Sohn. Mobile PKI: A PKI-based authentication framework for the next generation mobile communications. In Proceedings of ACISP'03, volume 2727 of LNCS, 2003.]]Google Scholar
- H. Haverinen and J. Salowey. Extensible Authentication Protocol method for GSM Subscriber Identity Modules (EAP-SIM). Internet Society, draft-haverinen-pppext-eap-sim-16.txt, December 2004.]]Google Scholar
- G. Horn and B. Preneel. Authentication and payment in future mobile systems. In Proceedings of ESORICS'98, volume 1485 of LNCS, 1998.]] Google ScholarDigital Library
- IEEE. IEEE 802.1X - Port-based network access control, June 2001.]]Google Scholar
- IEEE. IEEE 802.11i - Specification for enhanced security, July 2004.]]Google Scholar
- M. Jakobsson, J.-P. Hubaux, and L. Buttyán. A micro-payment scheme encouraging collaboration in multi-hop cellular networks. In Proceedings of FC'03, volume 2742 of LNCS, 2003.]]Google Scholar
- S. Jarecki and A. Odlyzko. An efficient micropayment system based on probabilistic polling. In Proceedings of FC'97, volume 1318 of LNCS, 1997.]] Google ScholarDigital Library
- S. K. Langford. Threshold DSS signatures without a trusted party. In Advances in Cryptology - CRYPTO'95, volume 963 of LNCS, 1995.]] Google ScholarDigital Library
- R. J. Lipton and R. Ostrovsky. Micropayments via efficient coin-flipping. In Proceedings of FC'98, volume 1465 of LNCS, 1998.]] Google ScholarDigital Library
- P. MacKenzie and M. K. Reiter. Networked cryptographic devices resilient to capture. In Proceedings of IEEE Symposium on Security and Privacy, 2001.]] Google ScholarDigital Library
- P. MacKenzie and M. K. Reiter. Two-party generation of DSA signatures. In Advances in Cryptology - CRYPTO'01, volume 2139 of LNCS, 2001.]] Google ScholarDigital Library
- E. Martinez-Moro, J. Mozo-Fernandez, and C. Munuera. Compounding secret sharing schemes. Australian Journal of Combinatorics, 30, September 2004.]]Google Scholar
- Y. Matsunaga, A. S. Merino, T. Suzuki, and R. H. Katz. Secure authentication system for public WLAN roaming. In Proceedings of ACM WMASH'03, September 2003.]] Google ScholarDigital Library
- A. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996.]] Google ScholarDigital Library
- S. Micali and R. Rivest. Micropayments revisited. In Proceedings of CT-RSA'02, 2002.]] Google ScholarDigital Library
- Microsoft passport network. http://www.passport.com.]]Google Scholar
- T. Okamoto and S. Uchiyama. A new public-key cryptosystem, as secure as factoring. In Advances in Cryptology - EUROCRYPT'98, volume 1403 of LNCS, 1998.]]Google ScholarCross Ref
- P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology, EUROCRYPT'99, volume 1592 of LNCS, 1999.]]Google Scholar
- T. P. Pedersen. Electronic payments of small amounts. In Security Protocols, volume 1180 of LNCS, 1996.]] Google ScholarDigital Library
- C. Rigney, S. Willens, A. Rubens, and W. Simpson. Remote Authentication Dial in User Services (RADIUS). RFC 2865, June 2000.]] Google ScholarDigital Library
- R. L. Rivest. Electronic lottery tickets as micropayments. In Proceedings of FC'97, volume 1318 of LNCS, 1997.]] Google ScholarDigital Library
- R. L. Rivest. Peppercoin micropayments. In Proceedings of FC'04, volume 3110 of LNCS, 2004.]]Google Scholar
- R. L. Rivest and A. Shamir. PayWord and MicroMint: Two simple micropayment schemes. In Security Protocols, volume 1180 of LNCS, 1996.]] Google ScholarDigital Library
- N. B. Salem, J. P. Hubaux, and M. Jakobsson. Reputation-based Wi-Fi deployment protocols and security analysis. In Proceedings of ACM WMASH'04, 2004.]] Google ScholarDigital Library
- L. Salgarelli, M. Buddhikot, J. Garay, S. Patel, and S. Miller. Efficient authentication and key distribution in wireless IP networks. IEEE Wireless Communications Magazine, 2003.]]Google Scholar
- H. Wang, R. Prasad, A., P. Schoo, M. Bayarou, K., and S. Rohr. Security mechanisms and security analysis: Hotspot WLANs and inter-operator roaming. In Proceedings of ACM WMASH'04, 2004.]]Google ScholarCross Ref
Index Terms
- An approach to enhance inter-provider roaming through secret sharing and its application to WLANs
Recommendations
Security architectures for B3G mobile networks
This paper analyzes the security architectures employed in the interworking model that integrates third-generation (3G) mobile networks and Wireless Local Area Networks (WLANs), materializing Beyond 3G (B3G) networks. Currently, B3G networks are ...
Strong (n,t,n) verifiable secret sharing scheme
A (t,n) secret sharing divides a secret into n shares in such a way that any t or more than t shares can reconstruct the secret; but fewer than t shares cannot reconstruct the secret. In this paper, we extend the idea of a (t,n) secret sharing scheme ...
Fair secret reconstruction in (t, n) secret sharing
In Shamir's (t, n) threshold secret sharing scheme, one secret s is divided into n shares by a dealer and all shares are shared among n shareholders, such that knowing t or more than t shares can reconstruct this secret; but knowing fewer than t shares ...
Comments