skip to main content
10.1145/941326.941343acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

Secure authentication system for public WLAN roaming

Published:19 September 2003Publication History

ABSTRACT

A serious impediment for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relationships with individuals and each supporting their own authentication schemes which may vary from one provider to the next. We have designed and implemented a comprehensive single sign-on (SSO) authentication architecture that confederates WLAN service providers through trusted identity providers. Users select the appropriate SSO authentication scheme from the authentication capabilities announced by the WLAN service provider, and can block the exposure of their privacy information while roaming. In addition, we have developed a compound layer 2 and Web authentication scheme that ensures cryptographically protected access while preserving pre-existing public WLAN payment models. Our experimental results, obtained from our prototype system, show the total authentication delay are well within 2 seconds. This is dominated primarily by our use of industry-standard XML-based protocols, yet are still small enough for practical use.

References

  1. HotSpotList.com, http://www.hotspotlist.com/Google ScholarGoogle Scholar
  2. IETF, RFC 2865 "Remote Authentication Dial In User Service (RADIUS)", June 2000.Google ScholarGoogle Scholar
  3. Liberty Alliance Project, "Liberty Architecture Overview", version 1.1, January 2003.Google ScholarGoogle Scholar
  4. Wi-Fi Alliance, "Best Current Practices for Wireless Internet Service Provider (WISP) Roaming", ver. 1.0, 2003.Google ScholarGoogle Scholar
  5. S. Hada and M. Kudo, "Access Control Model with Provisional Actions", IEICE Trans. Fundamentals, Vol. E84-A, No.1, Jan. 2001.Google ScholarGoogle Scholar
  6. OASIS eXtensible Access Control Markup Language, http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=xacml.Google ScholarGoogle Scholar
  7. IEEE Std 802.1X-2001, "Port-Based Network Access Control", June 2001.Google ScholarGoogle Scholar
  8. IEEE Std 802.11i/D4.0, "Medium Access Control (MAC) Security Enhancements", May 2003.Google ScholarGoogle Scholar
  9. IETF, RFC 2716, "PPP EAP TLS Authentication Protocol", Oct. 1999.Google ScholarGoogle Scholar
  10. Internet-Draft, "EAP Tunneled TLS Authentication Protocol", draft-ietf-pppext-eap-ttls-02.txt, work in progress.Google ScholarGoogle Scholar
  11. IETF RFC 2402, "IP Authentication Header", Nov. 1998.Google ScholarGoogle Scholar
  12. D. Jablon, "Strong Password-Only Authenticated Key Exchange", Computer Communication Review, Vol.26, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. http://srp.stanford.edu/Google ScholarGoogle Scholar
  14. V. Bahl, A. Balachandran, S. Venkatachary, "The CHOICE Network: Broadband Wireless Internet Access In Public Places", Microsoft Technical Report, MSR-TR-2000-21, Feb. 2000.Google ScholarGoogle Scholar
  15. OASIS, "Assertions and Protocol for the OASIS Assertion Markup Language (SAML)", Committee Specification 01, May 2002.Google ScholarGoogle Scholar
  16. http://www.open1x.org/Google ScholarGoogle Scholar
  17. N. C-Winget, R. Housley, D. Wagner, J. Walker, "Security flaws in 802.11 data link protocols", Communications of the ACM, 46(5), May 2003, pp. 35--39 Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. Bellardo and S. Savage, "802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions", to appear in Proceedings of the USENIX Security Symposium, August 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. IETF, RFC2759 "Microsoft PPP CHAP Extensions, Version 2", Jan. 2000.Google ScholarGoogle Scholar

Index Terms

  1. Secure authentication system for public WLAN roaming

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WMASH '03: Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
        September 2003
        130 pages
        ISBN:1581137680
        DOI:10.1145/941326

        Copyright © 2003 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 19 September 2003

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader