[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1411759.1411774acmconferencesArticle/Chapter ViewAbstractPublication PageshotmobileConference Proceedingsconference-collections
research-article

Distributed authentication for low-cost wireless networks

Published: 25 February 2008 Publication History

Abstract

Cost is one of the key challenges facing the deployment of wireless networks. Though 802.11-based networks have shown that costly, licensed spectrum is not always necessary, the costs of other components especially backhaul and network equipment continue to impede the growth of mobile wireless networks. In this paper, we provide some insights into how such costs can be reduced by designing a novel, low-cost authentication infrastructure for wireless networks. Our authentication scheme relies on base stations to collectively store authentication information. Thus, it eliminates the need to maintain costly infrastructure required by the traditional centralized scheme. Moreover, our scheme is optimized for mobility-induced handover "re-authentication" and, hence, reduces the authentication overhead.

References

[1]
Captive Portal. http://en.wikipedia.org/wiki/Captive_portal.
[2]
C. de Laat, G. Gross, L. Gommans, J. Vollbrecht, and D. Spence. Generic AAA Architecture, 2000. RFC 2903.
[3]
E. Griffith. Cost of Muni Wi-Fi is High, July 2006. http://www.wi-fiplanet.com/news/article.php/3518071.
[4]
J. T. Kohl, B. Clifford Neuman, and T. Y. T'so. The Evolution of the Kerberos Authentication System. In Proc. of Distributed Open Systems, 1994.
[5]
J. Larsen. Tackling Backhaul Costs, July 2006. http://www.wirelessweek.com/article.aspx?id=112174.
[6]
W. Liang and W. Wang. A Lightweight Authentication Protocol with Local Security Association Control in Mobile Networks. In Proc. of IEEE MILCOM, 2004.
[7]
W. Liang and W. Wang. A Quantitative Study of Authentication and QoS in Wireless IP Networks. In Proc. of IEEE INFOCOM, 2005.
[8]
A. Mishra, M. Shin, N. L. Petroni Jr., T. C. Clancy, and W. Arbaugh. Pro-active Key Distribution using Neighbor Graphs. Wireless Communications Magazine, February 2004.
[9]
H. Moustafa, G. Bourdon, and Y. Gourhant. Authentication, Authorization and Accounting (AAA) in Hybrid Ad-hoc Hotspot's Environments. In Proc. of ACM Mobicom Workshop: WMASH, 2006.
[10]
W. Wang, W. Liang, and A. K. Agarwal. Integration of Authentication and Mobility Management in Third Generation and WLAN Data Networks. Wireless Communications and Mobile Computing, September 2005.

Cited By

View all
  • (2014)TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc NetworksIEEE Systems Journal10.1109/JSYST.2012.22317928:3(749-758)Online publication date: Sep-2014
  • (2014)Distributed anonymous authentication in heterogeneous networks2014 International Wireless Communications and Mobile Computing Conference (IWCMC)10.1109/IWCMC.2014.6906408(505-510)Online publication date: Aug-2014
  • (2012)Enhanced CRA protocol for seamless connectivity in wireless networks2012 International Symposium on Communications and Information Technologies (ISCIT)10.1109/ISCIT.2012.6380852(1075-1079)Online publication date: Oct-2012
  • Show More Cited By

Index Terms

  1. Distributed authentication for low-cost wireless networks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    HotMobile '08: Proceedings of the 9th workshop on Mobile computing systems and applications
    February 2008
    106 pages
    ISBN:9781605581187
    DOI:10.1145/1411759
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 25 February 2008

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. authentication
    2. distributed
    3. token transfer

    Qualifiers

    • Research-article

    Conference

    HotMobile08
    Sponsor:
    HotMobile08: Workshop on Mobile Computing Systems and Applications
    February 25 - 26, 2008
    California, Napa Valley

    Acceptance Rates

    Overall Acceptance Rate 96 of 345 submissions, 28%

    Upcoming Conference

    HOTMOBILE '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 04 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2014)TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc NetworksIEEE Systems Journal10.1109/JSYST.2012.22317928:3(749-758)Online publication date: Sep-2014
    • (2014)Distributed anonymous authentication in heterogeneous networks2014 International Wireless Communications and Mobile Computing Conference (IWCMC)10.1109/IWCMC.2014.6906408(505-510)Online publication date: Aug-2014
    • (2012)Enhanced CRA protocol for seamless connectivity in wireless networks2012 International Symposium on Communications and Information Technologies (ISCIT)10.1109/ISCIT.2012.6380852(1075-1079)Online publication date: Oct-2012
    • (2011)Distributed authentication mechanism for secure channel establishment in ubiquitous medical sensor networksMobile Information Systems10.5555/2592948.25929707:3(189-200)Online publication date: 1-Jul-2011
    • (2011)An EAP Framework for Unified Authentication in Wireless NetworksProceedings of the 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications10.1109/TrustCom.2011.50(389-397)Online publication date: 16-Nov-2011
    • (2009)Towards a Global AAA Framework for InternetProceedings of the 2009 Ninth Annual International Symposium on Applications and the Internet10.1109/SAINT.2009.57(227-230)Online publication date: 20-Jul-2009

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media