skip to main content
article

MobiCom poster: public-key-based secure Internet access

Published:01 January 2003Publication History
Skip Abstract Section

Abstract

After the vulnerabilities found in the WEP protocol, providing secure wireless network access has been shown to be a complicated task. This paper describes the specification of a two-protocol architecture that provides secure, flexible, and convenient Internet access. Mutual authentication between mobile clients and access points is performed using public keys tied to domain names while confidentiality, sender authentication and replay detection are provided on a per-frame basis, using per-client dynamic session keys. Designed for the mobile environment, the architecture also provides users with mobility between networks with different address prefixes.

References

  1. N. Borisov, I. Goldberg, and D. Wagner. Intercepting mobile communications: The insecurity of 802.11. In Proceedings of the Seventh Annual ACM/IEEE International Conference on Mobile Computing and Networking - Mobicom'01, pages 180--189, July 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. B. Faria and D. R. Cheriton. DoS and Authentication in Wireless Public Access Networks. In Proceedings of the First ACM Workshop on Wireless Security (WiSe'02), pages 47--56, Sept. 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Fluhrer, I. Mantin, and A. Shamir. Weaknesses in the key scheduling algorithm of RC4. In Eighth Annual Workshop on Selected Areas in Cryptography, August 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. Stubblefield, J. Ioannidis, and A. D. Rubin. Using the Fluhrer, Mantin, and Shamir attack to break WEP. Technical Report TD-4ZCPZZ, AT&T Labs Research, Aug. 2001.]]Google ScholarGoogle Scholar
  5. D. Tang and M. Baker. Analysis of a local-area wireless network. In Proceedings of the Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networking - Mobicom'00, pages 1--10, Boston, MA, USA, Aug. 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. K. Thompson, G. Miller, and R. Wilder. Wide-area internet traffic patterns and characteristics. IEEE Network, 11(6):10--23, Nov. 1997.]]Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image ACM SIGMOBILE Mobile Computing and Communications Review
    ACM SIGMOBILE Mobile Computing and Communications Review  Volume 7, Issue 1
    January 2003
    114 pages
    ISSN:1559-1662
    EISSN:1931-1222
    DOI:10.1145/881978
    Issue’s Table of Contents

    Copyright © 2003 Authors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 1 January 2003

    Check for updates

    Qualifiers

    • article
  • Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)1

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader