ABSTRACT
Wireless LAN (WLAN) is rapidly growing as a popular technology for ubiquitous communication, where Internet access is being a standard commodity. The growing demand in WLAN technological development is to provide high quality and secure Internet access to mobile users using their portable devices. Nevertheless, WLAN is still restrictive, as it requires the presence of mobile users in the communication range of access points. Moreover, the security of this network is posing a major challenge for its usage. Hybrid ad hoc networks appear as an attractive solution in public hotspots applications, allowing mobile users to achieve WLAN access independent of their existence in access points communication ranges. Since effective Authentication, Authorization and Accounting (AAA) are of great importance for secure mobile wireless access, in this paper we propose a novel architecture that provides efficient AAA and secure communication among mobile clients in WLAN hotspots applications. Our solution uses the hybrid ad hoc network concept and considers the service provider as the single point of contact for all AAA transactions. We adapt the IEEE 802.11i standard to the hybrid ad hoc network environment in order to set up authenticated links on layer 2, achieving secure wireless access as well as confidential data transfer. Since IEEE 802.11i necessitates the existence of a fixed infrastructure between the WLAN and the authentication server, we introduce a cross-layer interaction with the ad hoc routing layer in order to provide a virtual infrastructure among the mobile clients through employing a clustering mechanism. We validate our proposed solution through simulation. Through analyzing the obtained results, we give some performance estimates and we show the advantages of using the hybrid ad hoc networks approach.
- IEEE Std. 802.11i, Amendment 6: Medium Access Control (MA) Security Enhancements. July 2004.Google Scholar
- Jurca, D., Hubeaux, J. P., Joint Synchronization, Routing and Energy Saving in CSMA/CA Multi-Hop Hybrid Networks. EPFL Technical Report: IC/2004/35, 2004.Google Scholar
- Ingelrest, F., Simplot-Ryl, D., Stojmenovis, I., Broadcasting in Hybrid Ad hoc Networks. Wireless On-demand Network Systems and Services (WONS 2005), 2005. Google ScholarDigital Library
- Nilson, A., Garcia-Luna-Aceves, J.J., Spohn, M., Routing in Hybrid Ad hoc Networks using Service Points. IEEE Vehicular Technology Conference (VTC-fall 2003), 2003.Google Scholar
- Campos, G., Elias., G., Performance Issues of Ad hoc Routing protocols in a Network Scenario used for Videophone Application. The 38th IEEE Hawaii International Conference on System Sciences (HICSS), 2005. Google ScholarDigital Library
- Mitsianis, J., Free Trade for Hybrid Multihop Wireless Networks. IEEE International Conference on Performance, Computing, and Communications, 2004.Google Scholar
- Zhang, J., Li, J., Weinstein, S., Tu, N., Virtual Operator based AAA in Wireless LAN Hotspots with Ad hoc Networking Support. Mobile Computing and Communications Review, Volume 6, Number 3, 2002. Google ScholarDigital Library
- Yubi, S., Aiqun, H., The Authentication in Public WLAN when Access Controller Deployed. IEEE Int. Conf. Neural Networks and Signal Processing, 2003.Google Scholar
- Shaer, Y., Kayssi, A., Chehab, A., SERAX: Secure Range Extensions in IEEE 802.11i. 2nd International Conference on Innovations in Information Technology (IIT'05), 2005.Google Scholar
- Aboba, B., Simon, D., PPP EAP TLS Authentication Protocol. RFC 2716, October 1999 Google ScholarDigital Library
- Aboba, B., Calhoun, P., RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication protocol (EAP). RFC 3579, September 2003. Google ScholarDigital Library
- Rigney, C., Willens, S., Rubins, A., Simpson, W., Remote Authentication Dial in User Service (RADIUS). RFC 2865, June 2000. Google ScholarDigital Library
- Aboba, B., Vollbrecht, J., Proxy Chaining and Policy Implementation in Roaming. RFC 2607, June 1999. Google ScholarDigital Library
- AiroSpace Technology, White Paper, http://www.airospace.com/technolog/technote_auth_enc_wla n.phpGoogle Scholar
- Rigney, C., Willats, W., Cahloun, P., RADIUS Extensions. RFC 2869, June 2000. Google ScholarDigital Library
- Zorn, G., Microsoft Vendor-specific RADIUS Attributes. RFC 2548, March 1999. Google ScholarDigital Library
- Fall, K., Varadhan, K., NS Notes and Documentation. The VINT project, UC Berkeley, LBL, USC/ISI, and Xerox PARC, May 1998. Work in progress.Google Scholar
- Johnson, D., Maltz, D., Dynamic Source Routing in Ad hoc Wireless Networks. Mobile Computing, T. Imielinski and H. Korth, Eds. Norwell, MA: Kluwer, 1996.Google Scholar
- Bettstetter, C., Hartenstein, H., Pèrez-Costa, X., Stochastic Properties of the Random Waypoint Mobility Model: Epoch Length, Direction Distribution, and Cell Change Rate. ACM MSWIM'02,2002. Google ScholarDigital Library
Index Terms
- Authentication, authorization and accounting (AAA) in hybrid ad hoc hotspot's environments
Recommendations
AAA in vehicular communication on highways with ad hoc networking support: a proposed architecture
VANET '05: Proceedings of the 2nd ACM international workshop on Vehicular ad hoc networksThis paper proposes a novel architecture for vehicular communication on highways, providing an integrated solution considering the benefit of both mobile clients and service providers. Firstly, we define the services offered by the provider, extending ...
Mobility management across hybrid wireless networks: Trends and challenges
Future generation wireless networks are envisioned to be a combination of diverse but complementary access technologies. Internetworking these types of networks will provide mobile users with ubiquitous connectivity across a wide range of networking ...
Topologically-Aware AAA overlay network in mobile IPv6 environment
NETWORKING'06: Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications SystemsIn mobile IPv6 network, AAA mechanism is necessary for administration and security because roaming nodes are permitted and become majority. However, disharmonies are exposed when MIPv6 meets AAA. On one hand, AAA procedures increase the latency of MIPv6 ...
Comments