Abstract
After the vulnerabilities found in the WEP protocol, providing secure wireless network access has been shown to be a complicated task. This paper describes the specification of a two-protocol architecture that provides secure, flexible, and convenient Internet access. Mutual authentication between mobile clients and access points is performed using public keys tied to domain names while confidentiality, sender authentication and replay detection are provided on a per-frame basis, using per-client dynamic session keys. Designed for the mobile environment, the architecture also provides users with mobility between networks with different address prefixes.
- N. Borisov, I. Goldberg, and D. Wagner. Intercepting mobile communications: The insecurity of 802.11. In Proceedings of the Seventh Annual ACM/IEEE International Conference on Mobile Computing and Networking - Mobicom'01, pages 180--189, July 2001.]] Google ScholarDigital Library
- D. B. Faria and D. R. Cheriton. DoS and Authentication in Wireless Public Access Networks. In Proceedings of the First ACM Workshop on Wireless Security (WiSe'02), pages 47--56, Sept. 2002.]] Google ScholarDigital Library
- S. Fluhrer, I. Mantin, and A. Shamir. Weaknesses in the key scheduling algorithm of RC4. In Eighth Annual Workshop on Selected Areas in Cryptography, August 2001.]] Google ScholarDigital Library
- A. Stubblefield, J. Ioannidis, and A. D. Rubin. Using the Fluhrer, Mantin, and Shamir attack to break WEP. Technical Report TD-4ZCPZZ, AT&T Labs Research, Aug. 2001.]]Google Scholar
- D. Tang and M. Baker. Analysis of a local-area wireless network. In Proceedings of the Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networking - Mobicom'00, pages 1--10, Boston, MA, USA, Aug. 2000.]] Google ScholarDigital Library
- K. Thompson, G. Miller, and R. Wilder. Wide-area internet traffic patterns and characteristics. IEEE Network, 11(6):10--23, Nov. 1997.]]Google ScholarDigital Library
Recommendations
MobiCom poster: IP paging in mobile multihop networks
The IP paging architecture in globally-connected mobile ad-hoc network is presented. Motivated by the energy-efficient design requirement in global-connected mobile ad-hoc network context, we design IP paging support in ad-hoc networks that is ...
Poster: a certificateless proxy re-encryption scheme for cloud-based data sharing
CCS '11: Proceedings of the 18th ACM conference on Computer and communications securityWe propose CL-PRE, a certificateless proxy re-encryption scheme for data sharing with cloud. In CL-PRE, a data owner encrypts shared data in cloud with an encryption key, which is further encrypted and transformed by cloud, and then distributed to ...
MobiCom poster: optimized fast-handoff schemes for application layer mobility management
In order to ensure proper quality of service for real-time communication in a mobile wireless Internet environment, it is essential to minimize the transient packet loss when the mobile host (MH) is moving between different cells (subnets) within a ...
Comments