ABSTRACT
Nowadays, roaming individuals require ubiquitous, effortless, secure and private "on-the-go" connectivity for their Mobile Device (MD). At the same time, WiFi Access Networks (ANs) need to offer connectivity to MDs in an accountable and credible manner to avoid compromising their security policies. Our approach efficiently satisfies these conflicting requirements, and presents a solution where the MD does not have to disclose its identity when requesting network access. At the same time, the AN has a uniquely identifying alias for the MD, to account and profile for the connectivity it provides to it. The evaluation of our implementation on a live experimental testbed, demonstrates that our solution's overhead is remarkably low for the benefits it provides, and highlights its applicability and efficiency for real world deployment in the current Internet infrastructure.
- B. Aboba, M. Beadles, J. Arkko, and P. Eronen. The Network Access Identifier. IETF RFC 4282, Dec 2005.Google Scholar
- F. Adrangi, A. Lior, J. Korhonen, and J. Loughney. Chargeable User Identity. IETF RFC 4372, Jan 2006.Google Scholar
- V. Devarapalli, R. Wakikawa, A. Petrescu, and P. Thubert. NEMO Basic Support Protocol. IETF RFC 3963, Jan 2005.Google Scholar
- T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2. IETF RFC 5246, Aug 2008.Google Scholar
- D. Forsberg, Y. Ohba, B. Patil, H. Tschofenig, and A. Yegin. Protocol for Carrying Authentication for Network Access (PANA). IETF RFC 5191, May 2008.Google Scholar
- P. Georgopoulos, B. McCarthy, and C. Edwards. Towards a Secure and Seamless Host Mobility for the real world. In 8th Annual Conference on Wireless On demand Network Systems and Services (WONS 2011), Italy, Jan 2011.Google ScholarCross Ref
- P. Georgopoulos, B. McCarthy, and C. Edwards. A Collaborative AAA Architecture to Enable Secure Real-World Network Mobility. In 10th International Conference on Networking (Networking 2011), volume 6640 of LNCS, pages 212--226, Valencia, Spain, May 2011. Springer. Google ScholarDigital Library
- C. Laat, G. Gross, L. Gommans, J. Vollbrecht, and D. Spence. Generic AAA Architecture. IETF RFC 2903, Aug 2000. Google ScholarDigital Library
- C. Perkins and D. Johnson. Mobility Support in IPv6. In Proceedings of the 2nd Annual International Conference on Mobile Computing and Networking, ACM MobiCom '96, pages 27--37, New York, NY, USA, 1996. ACM. Google ScholarDigital Library
- C. Rigney, S. Willens, A. Rubens, and W. Simpson. Remote Authentication Dial In User Service (RADIUS). IETF RFC 2865, Jun 2000. Google ScholarDigital Library
- D. Simon, B. Aboba, and R. Hurst. The EAP-TLS Authentication Protocol. IETF RFC 5216, Mar 2008.Google Scholar
Index Terms
- Providing secure and accountable privacy to roaming 802.11 mobile devices
Recommendations
New mutual agreement protocol to secure mobile RFID-enabled devices
AbstractThe design of a secure communication scheme for Radio Frequency IDentification (RFID) systems has been extensively studied in recent years in view of the awareness of individual privacy and the requirement of robust system security. ...
Mobility management across hybrid wireless networks: Trends and challenges
Future generation wireless networks are envisioned to be a combination of diverse but complementary access technologies. Internetworking these types of networks will provide mobile users with ubiquitous connectivity across a wide range of networking ...
Mobile virtual private networks with dynamic MIP home agent assignment: Research Articles
Mobile IPThis paper presents the dynamic external Home Agent (x-HA) assignment in mobile Virtual Private Networks (VPNs). The proposed architecture is based on the mobile VPN proposed by the IETF, which adopts Mobile IP and IPsec. The IETF solution, however, ...
Comments