skip to main content
10.1145/1287853.1287898acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

Authentication on the edge: distributed authentication for a global open wi-fi network

Published: 09 September 2007 Publication History

Abstract

A global-scale low cost outdoor Internet access infrastructure is finally attainable. Emerging projects are leveraging the proliferation of private Wi-Fi networks to build a global-scale ubiquitous access infrastructure from autonomous, independently owned Internet connections at homes and other private properties. To ensure the trace ability and accountability required by the broadband ISPs and private owners of these Wi-Fi networks, reliable authentication and authorization are needed. This paper describes authentication on the edge, a localized and distributed authentication method for open Wi-Fi networks. Three main ideas are used to adapt to the variability and unreliability of these networks: the use of certificate-based authentication, the distribution of a segmented certificate revocation list to all entities and the self organization of access points into a social lookup network. These methods achieve the scalability needed for the overwhelming size and volume of a global network and increase resiliency against temporary failures in the infrastructure.

References

[1]
802.1x. http://standards.ieee.org/getieee802/download/802.1X-2004.pdf.
[2]
Abitcool wi-fi community. http://www.abitcool.com/.
[3]
Boingo wireless service. http://boingo.com/.
[4]
Extended HotSpots. http://www.extended-hotspots.net/opencms/opencms/index.html?_locale=en.
[5]
Fon. http://www.fon.com/.
[6]
June 2006 bandwidth report. http://www.websiteoptimization.com/bw/0606/.
[7]
T-mobile hotspots. http://hotspot.t-mobile.com/.
[8]
Wi-Fi Surpasses Ethernet for Home Networking. http://www.parksassociates.com/press/press_releases/2005/gdl2.html.
[9]
M. Bina and G. Giaglis. Emerging issues in researching community-based wlans. Journal of Computer Information Systems, Fall 2005.
[10]
P. Bose, P. Morin, I. Stojmenovic, and J. Urrutia. Routing with guaranteed delivery in ad hoc wireless networks. Wireless Networks, 7(6):609--616, 2001.
[11]
R. Chakravorty, S. Agarwal, S. Banerjee, and I. Pratt. Mob: a mobile bazaar for wide-area wireless services. In Proceedings of ACM MobiCom, 2005.
[12]
E. Edvardsen. Fixed and mobile convergence. In Proceedings of BroadBand Europe, 2004.
[13]
E. C. Efstathiou, P. A. Frangoudis, and G. C. Polyzos. Stimulating participation in wireless community networks. In Proceedings of IEEE INFOCOM, 2006.
[14]
M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams. Online certificate status protocol -- OCSP. IETF Request For Comments (RFC2560), 1999.
[15]
D. Stanley, J. Walker, and B. Aboba. RFC 4017: Extensible authentication protocol (EAP) method requirements for wireless LANs, Mar. 2005.
[16]
N. Thompson, G. He, and H. Luo. Flow scheduling for end-host multihoming. In Proceedings of IEEE INFOCOM, 2006.

Cited By

View all
  • (2020)Security and Privacy Issues in Fog/Edge/Pervasive ComputingFog, Edge, and Pervasive Computing in Intelligent IoT Driven Applications10.1002/9781119670087.ch20(369-387)Online publication date: 7-Dec-2020
  • (2011)Reorganized and Compact DFA for Efficient Regular Expression Matching2011 IEEE International Conference on Communications (ICC)10.1109/icc.2011.5963291(1-5)Online publication date: Jun-2011
  • (2011)Distributed Transmit Beamforming Based on Frequency Scanning2011 IEEE International Conference on Communications (ICC)10.1109/icc.2011.5963084(1-5)Online publication date: Jun-2011
  • Show More Cited By

Index Terms

  1. Authentication on the edge: distributed authentication for a global open wi-fi network

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        MobiCom '07: Proceedings of the 13th annual ACM international conference on Mobile computing and networking
        September 2007
        370 pages
        ISBN:9781595936813
        DOI:10.1145/1287853
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 09 September 2007

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. EAP-AGE
        2. Wi-Fi networks
        3. authentication
        4. social network

        Qualifiers

        • Article

        Conference

        MobiCom/MobiHoc '07
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 440 of 2,972 submissions, 15%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)2
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 12 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2020)Security and Privacy Issues in Fog/Edge/Pervasive ComputingFog, Edge, and Pervasive Computing in Intelligent IoT Driven Applications10.1002/9781119670087.ch20(369-387)Online publication date: 7-Dec-2020
        • (2011)Reorganized and Compact DFA for Efficient Regular Expression Matching2011 IEEE International Conference on Communications (ICC)10.1109/icc.2011.5963291(1-5)Online publication date: Jun-2011
        • (2011)Distributed Transmit Beamforming Based on Frequency Scanning2011 IEEE International Conference on Communications (ICC)10.1109/icc.2011.5963084(1-5)Online publication date: Jun-2011
        • (2011)A One-Pass Key Establishment Protocol for Anonymous Wireless Roaming with PFS2011 IEEE International Conference on Communications (ICC)10.1109/icc.2011.5962523(1-5)Online publication date: Jun-2011
        • (2011)An exploration of user-generated wireless broadband infrastructures in digital citiesTelematics and Informatics10.1016/j.tele.2010.08.00328:3(163-175)Online publication date: 1-Aug-2011
        • (2010)ARBORProceedings of the 29th conference on Information communications10.5555/1833515.1833712(1352-1360)Online publication date: 14-Mar-2010
        • (2010)Global Grassroots WiFi Sharing2010 IEEE Wireless Communication and Networking Conference10.1109/WCNC.2010.5506697(1-6)Online publication date: Apr-2010
        • (2009)PPAB: A Privacy-Preserving Authentication and Billing Architecture for Metropolitan Area Sharing NetworksIEEE Transactions on Vehicular Technology10.1109/TVT.2008.200798358:5(2529-2543)Online publication date: 2009
        • (2008)100% organicProceedings of the 9th workshop on Mobile computing systems and applications10.1145/1411759.1411768(27-32)Online publication date: 25-Feb-2008

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media