skip to main content
10.1145/2181196.2181204acmconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedingsconference-collections
research-article

Providing secure and accountable privacy to roaming 802.11 mobile devices

Published:10 April 2012Publication History

ABSTRACT

Nowadays, roaming individuals require ubiquitous, effortless, secure and private "on-the-go" connectivity for their Mobile Device (MD). At the same time, WiFi Access Networks (ANs) need to offer connectivity to MDs in an accountable and credible manner to avoid compromising their security policies. Our approach efficiently satisfies these conflicting requirements, and presents a solution where the MD does not have to disclose its identity when requesting network access. At the same time, the AN has a uniquely identifying alias for the MD, to account and profile for the connectivity it provides to it. The evaluation of our implementation on a live experimental testbed, demonstrates that our solution's overhead is remarkably low for the benefits it provides, and highlights its applicability and efficiency for real world deployment in the current Internet infrastructure.

References

  1. B. Aboba, M. Beadles, J. Arkko, and P. Eronen. The Network Access Identifier. IETF RFC 4282, Dec 2005.Google ScholarGoogle Scholar
  2. F. Adrangi, A. Lior, J. Korhonen, and J. Loughney. Chargeable User Identity. IETF RFC 4372, Jan 2006.Google ScholarGoogle Scholar
  3. V. Devarapalli, R. Wakikawa, A. Petrescu, and P. Thubert. NEMO Basic Support Protocol. IETF RFC 3963, Jan 2005.Google ScholarGoogle Scholar
  4. T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2. IETF RFC 5246, Aug 2008.Google ScholarGoogle Scholar
  5. D. Forsberg, Y. Ohba, B. Patil, H. Tschofenig, and A. Yegin. Protocol for Carrying Authentication for Network Access (PANA). IETF RFC 5191, May 2008.Google ScholarGoogle Scholar
  6. P. Georgopoulos, B. McCarthy, and C. Edwards. Towards a Secure and Seamless Host Mobility for the real world. In 8th Annual Conference on Wireless On demand Network Systems and Services (WONS 2011), Italy, Jan 2011.Google ScholarGoogle ScholarCross RefCross Ref
  7. P. Georgopoulos, B. McCarthy, and C. Edwards. A Collaborative AAA Architecture to Enable Secure Real-World Network Mobility. In 10th International Conference on Networking (Networking 2011), volume 6640 of LNCS, pages 212--226, Valencia, Spain, May 2011. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. C. Laat, G. Gross, L. Gommans, J. Vollbrecht, and D. Spence. Generic AAA Architecture. IETF RFC 2903, Aug 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. C. Perkins and D. Johnson. Mobility Support in IPv6. In Proceedings of the 2nd Annual International Conference on Mobile Computing and Networking, ACM MobiCom '96, pages 27--37, New York, NY, USA, 1996. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. C. Rigney, S. Willens, A. Rubens, and W. Simpson. Remote Authentication Dial In User Service (RADIUS). IETF RFC 2865, Jun 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Simon, B. Aboba, and R. Hurst. The EAP-TLS Authentication Protocol. IETF RFC 5216, Mar 2008.Google ScholarGoogle Scholar

Index Terms

  1. Providing secure and accountable privacy to roaming 802.11 mobile devices

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MPM '12: Proceedings of the First Workshop on Measurement, Privacy, and Mobility
        April 2012
        55 pages
        ISBN:9781450311632
        DOI:10.1145/2181196
        • Program Chairs:
        • Hamed Haddadi,
        • Eiko Yoneki

        Copyright © 2012 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 10 April 2012

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate6of20submissions,30%
      • Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader