skip to main content
10.1145/1161023.1161030acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

Authentication, authorization and accounting (AAA) in hybrid ad hoc hotspot's environments

Published:29 September 2006Publication History

ABSTRACT

Wireless LAN (WLAN) is rapidly growing as a popular technology for ubiquitous communication, where Internet access is being a standard commodity. The growing demand in WLAN technological development is to provide high quality and secure Internet access to mobile users using their portable devices. Nevertheless, WLAN is still restrictive, as it requires the presence of mobile users in the communication range of access points. Moreover, the security of this network is posing a major challenge for its usage. Hybrid ad hoc networks appear as an attractive solution in public hotspots applications, allowing mobile users to achieve WLAN access independent of their existence in access points communication ranges. Since effective Authentication, Authorization and Accounting (AAA) are of great importance for secure mobile wireless access, in this paper we propose a novel architecture that provides efficient AAA and secure communication among mobile clients in WLAN hotspots applications. Our solution uses the hybrid ad hoc network concept and considers the service provider as the single point of contact for all AAA transactions. We adapt the IEEE 802.11i standard to the hybrid ad hoc network environment in order to set up authenticated links on layer 2, achieving secure wireless access as well as confidential data transfer. Since IEEE 802.11i necessitates the existence of a fixed infrastructure between the WLAN and the authentication server, we introduce a cross-layer interaction with the ad hoc routing layer in order to provide a virtual infrastructure among the mobile clients through employing a clustering mechanism. We validate our proposed solution through simulation. Through analyzing the obtained results, we give some performance estimates and we show the advantages of using the hybrid ad hoc networks approach.

References

  1. IEEE Std. 802.11i, Amendment 6: Medium Access Control (MA) Security Enhancements. July 2004.Google ScholarGoogle Scholar
  2. Jurca, D., Hubeaux, J. P., Joint Synchronization, Routing and Energy Saving in CSMA/CA Multi-Hop Hybrid Networks. EPFL Technical Report: IC/2004/35, 2004.Google ScholarGoogle Scholar
  3. Ingelrest, F., Simplot-Ryl, D., Stojmenovis, I., Broadcasting in Hybrid Ad hoc Networks. Wireless On-demand Network Systems and Services (WONS 2005), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Nilson, A., Garcia-Luna-Aceves, J.J., Spohn, M., Routing in Hybrid Ad hoc Networks using Service Points. IEEE Vehicular Technology Conference (VTC-fall 2003), 2003.Google ScholarGoogle Scholar
  5. Campos, G., Elias., G., Performance Issues of Ad hoc Routing protocols in a Network Scenario used for Videophone Application. The 38th IEEE Hawaii International Conference on System Sciences (HICSS), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Mitsianis, J., Free Trade for Hybrid Multihop Wireless Networks. IEEE International Conference on Performance, Computing, and Communications, 2004.Google ScholarGoogle Scholar
  7. Zhang, J., Li, J., Weinstein, S., Tu, N., Virtual Operator based AAA in Wireless LAN Hotspots with Ad hoc Networking Support. Mobile Computing and Communications Review, Volume 6, Number 3, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Yubi, S., Aiqun, H., The Authentication in Public WLAN when Access Controller Deployed. IEEE Int. Conf. Neural Networks and Signal Processing, 2003.Google ScholarGoogle Scholar
  9. Shaer, Y., Kayssi, A., Chehab, A., SERAX: Secure Range Extensions in IEEE 802.11i. 2nd International Conference on Innovations in Information Technology (IIT'05), 2005.Google ScholarGoogle Scholar
  10. Aboba, B., Simon, D., PPP EAP TLS Authentication Protocol. RFC 2716, October 1999 Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Aboba, B., Calhoun, P., RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication protocol (EAP). RFC 3579, September 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Rigney, C., Willens, S., Rubins, A., Simpson, W., Remote Authentication Dial in User Service (RADIUS). RFC 2865, June 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Aboba, B., Vollbrecht, J., Proxy Chaining and Policy Implementation in Roaming. RFC 2607, June 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. AiroSpace Technology, White Paper, http://www.airospace.com/technolog/technote_auth_enc_wla n.phpGoogle ScholarGoogle Scholar
  15. Rigney, C., Willats, W., Cahloun, P., RADIUS Extensions. RFC 2869, June 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Zorn, G., Microsoft Vendor-specific RADIUS Attributes. RFC 2548, March 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Fall, K., Varadhan, K., NS Notes and Documentation. The VINT project, UC Berkeley, LBL, USC/ISI, and Xerox PARC, May 1998. Work in progress.Google ScholarGoogle Scholar
  18. Johnson, D., Maltz, D., Dynamic Source Routing in Ad hoc Wireless Networks. Mobile Computing, T. Imielinski and H. Korth, Eds. Norwell, MA: Kluwer, 1996.Google ScholarGoogle Scholar
  19. Bettstetter, C., Hartenstein, H., Pèrez-Costa, X., Stochastic Properties of the Random Waypoint Mobility Model: Epoch Length, Direction Distribution, and Cell Change Rate. ACM MSWIM'02,2002. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Authentication, authorization and accounting (AAA) in hybrid ad hoc hotspot's environments

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      WMASH '06: Proceedings of the 4th international workshop on Wireless mobile applications and services on WLAN hotspots
      September 2006
      116 pages
      ISBN:1595934707
      DOI:10.1145/1161023

      Copyright © 2006 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 29 September 2006

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader