skip to main content
10.1145/2837030.2837032acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaintecConference Proceedingsconference-collections
research-article

Quick- and Easy-to-Deploy Wireless Mesh Network System for WLAN Roaming Services

Published:18 November 2015Publication History

ABSTRACT

In cases of large events such as concerts, conferences, sports events, as well as natural disasters, quick and easy deployment of temporary WLAN systems on-site is very important. In general, deploying WLAN systems requires wiring the cables to the Access Points (APs) and/or switches, and configuring the APs and servers. Although Wireless Mesh Networking (WMN) technologies enable us to reduce the wiring cost, some additional configurations are still required when we deploy a secure user authentication mechanism (e.g. IEEE 802.1X) on WLAN systems. This paper proposes a quickly and easily deployable WMN system working on a secure WLAN roaming system operated by multiple institutions like in eduroam, the worldwide roaming system for research and education institutions. The APs in the system generate authentication paths automatically using RadSec over the WMN to reduce the configuration costs of APs and authentication servers. The APs can perform user authentication and provide local services when they have lost the upper network temporarily or even when the authentication servers they are communicating with are down thanks to the local authentication technique using digital certificates.

References

  1. eduroam. http://www.eduroam.org/.Google ScholarGoogle Scholar
  2. T. Watanabe, S. Kinoshita, Y. Yamasaki, H. Goto, and H. Sone. Flexible Access and Priority Control System Based on 802.1X Authentication in Time of Disaster. In Computer Software and Applications Conference Workshops (COMPSACW), 2013 IEEE 37th Annual, pages 385--390, July 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. IEEE Standard for Local and metropolitan area networks - Port-Based Network Access Control. IEEE Std 802.1X-2010, pages C1--205, Feb 2010.Google ScholarGoogle Scholar
  4. C. Rigney, S. Willens, A. Rubens, and W. Simpson. Remote Authentication Dial In User Service (RADIUS). RFC 2865, June 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. Kinoshita, T. Watanabe, Y. Yamasaki, H. Goto, and H. Sone. Fault-Tolerant Wireless LAN Roaming System Using Client Certificates. In Computer Software and Applications Conference (COMPSAC), 2013 IEEE 37th Annual, pages 822--823, July 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Winter, M. McCauley, S. Venaas, and K. Wierenga. Transport Layer Security (TLS) Encryption for RADIUS. RFC 6614, May 2012.Google ScholarGoogle Scholar
  7. radsecproxy. https://software.uninett.no/radsecproxy/.Google ScholarGoogle Scholar
  8. A. Egners, P. Herrmann, T. Jarmuzek, and U. Meyer. Experiences from security research using a Wireless Mesh Network testbed. In Local Computer Networks (LCN), 2013 IEEE 38th Conference on, pages 340--343, Oct 2013.Google ScholarGoogle ScholarCross RefCross Ref
  9. B.A.T.M.A.N. : Better Approach to Mobile Ad-hoc Networking. http://www.open-mesh.org/projects/open-mesh/wiki/.Google ScholarGoogle Scholar
  10. FreeRADIUS. http://freeradius.org/.Google ScholarGoogle Scholar
  11. hostapd: IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator. https://w1.fi/hostapd/.Google ScholarGoogle Scholar
  12. Linux WPA/WPA2/IEEE 802.1X Supplicant. http://w1.fi/wpa_supplicant/.Google ScholarGoogle Scholar
  13. S. Cheshire, B. Aboba, and E. Guttman. Dynamic Configuration of IPv4 Link-Local Addresses. RFC 3927, May 2005.Google ScholarGoogle Scholar
  14. H. Goto, H. Sone, J. Yamato, and H. Wakayama. Easy-to-deploy eduroam system for hundreds of universities. http://www.apan.net/meetings/kualalumpur2009/proposals/middleware.html, July 2009.Google ScholarGoogle Scholar
  15. Shibboleth. https://shibboleth.net/.Google ScholarGoogle Scholar
  16. M. Anwander, T. Braun, A. Jamakovic, and T. Staub. Authentication and authorisation mechanisms in support of secure access to WMN resources. In World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012 IEEE International Symposium on a, pages 1--6, June 2012.Google ScholarGoogle ScholarCross RefCross Ref
  17. Stefan Winter. radsecproxy - a swiss army knife for eduroam {or: why does eduroam work on the bus?}. https://tnc2009.terena.org/schedule/presentations/showdfcf.html?pres_id=42, July 2009.Google ScholarGoogle Scholar
  18. IEEE Standard for Information Technology--Telecommunications and information exchange between systems--Local and metropolitan area networks--Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 10: Mesh Networking. IEEE Std 802.11s-2011, pages 1--372, Sept 2011.Google ScholarGoogle Scholar

Index Terms

  1. Quick- and Easy-to-Deploy Wireless Mesh Network System for WLAN Roaming Services

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      AINTEC '15: Proceedings of the 11th Asian Internet Engineering Conference
      November 2015
      77 pages
      ISBN:9781450339148
      DOI:10.1145/2837030

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 18 November 2015

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate15of38submissions,39%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader