2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks &Amp; Workshops 2009
DOI: 10.1109/wowmom.2009.5282469
|View full text |Cite
|
Sign up to set email alerts
|

Distributed user authentication in wireless LANs

Abstract: Abstract-An increasing number of mobile devices, including smartphones, use WLAN for accessing the Internet. Existing WLAN authentication mechanisms are either disruptive, such as presenting a captive web page prompting for password, or unreliable, enabling a malicious user to attack a part of operator's infrastructure. In this paper, we present a distributed authentication architecture for WLAN users providing instant network access without manual interactions. It supports terminal mobility across WLAN access… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0
1

Year Published

2010
2010
2023
2023

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 25 publications
0
7
0
1
Order By: Relevance
“…Kuptsov et al use HIP to implement a Wi-Fi authentication system that allows HIP clients to connect to a single HIP relay in a city-wide Wi-Fi system [16]. Similar to PiSA and PiSA-SA, the authors use our HIP middlebox authentication extension [6], developed for PiSA.…”
Section: Related Workmentioning
confidence: 99%
“…Kuptsov et al use HIP to implement a Wi-Fi authentication system that allows HIP clients to connect to a single HIP relay in a city-wide Wi-Fi system [16]. Similar to PiSA and PiSA-SA, the authors use our HIP middlebox authentication extension [6], developed for PiSA.…”
Section: Related Workmentioning
confidence: 99%
“…A solução deste estudo, além de registrar os logs das conexões da rede da instituição, armazena todos os logs de acesso à Internet feitos pelos usuários, o que não é abordado no estudo supracitado. Kuptsov, Khurri and Gurtov (2009) apresentam um esquema de autenticação distribuída para hosts baseado em Host Indentity Protocol (HIP), IETF/RFC 4423, implementado em uma WLAN pública na cidade de Oulu, na Finlândia. Em cada AP da rede, foi configurado um firewall compatível que se comunica com um servidor de proxy HIP central.…”
Section: Discussionunclassified
“…WLAN users are vulnerable to malicious attacks against standard encryption protocol, e.g., WPA (Wi-Fi Protected Access) was cracked several years ago [11], [12].…”
Section: Securitymentioning
confidence: 99%
“…In addition, Host Identity Protocol (HIP) was tested because it offers end-to-end security and resistance to previous list of attacks [12]. The overhead due to security for intra-vehicular communication inside a tunnel is discussed in this paper describing briefly the protocols used.…”
Section: Securitymentioning
confidence: 99%