2010 Proceedings of 19th International Conference on Computer Communications and Networks 2010
DOI: 10.1109/icccn.2010.5560103
|View full text |Cite
|
Sign up to set email alerts
|

PiSA-SA: Municipal Wi-Fi Based on Wi-Fi Sharing

Abstract: Large-scale municipal wireless networks are currently being established all around the world. These networks provide a rich set of local services, such as tourist guides, environmental information, pedestrian navigation, and local shopping guides. As recent financial failures of prominent municipal wireless networks show, it is economically challenging to achieve the bandwidth and coverage that is necessary for such a network. At the same time, Wi-Fi-sharing communities achieve high bandwidth and good coverage… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

1
3
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 7 publications
1
3
0
Order By: Relevance
“…Since HITs remain fixed during the communication, IP addresses can be changed / added transparently to the application. The HIP based architecture provided by Heer et al [13] is very close to the OSA architecture we proposed. However, HIP suffers from two drawbacks: (1) Communications are always IPsec protected and (2) HIP breaks the current IP oriented communications.…”
Section: Introductionsupporting
confidence: 61%
“…Since HITs remain fixed during the communication, IP addresses can be changed / added transparently to the application. The HIP based architecture provided by Heer et al [13] is very close to the OSA architecture we proposed. However, HIP suffers from two drawbacks: (1) Communications are always IPsec protected and (2) HIP breaks the current IP oriented communications.…”
Section: Introductionsupporting
confidence: 61%
“…The trust point thus acts as a representative of the sensor owner. Introducing a trusted entity similar to our trust point has successfully been proposed for different scenarios in the past, e.g., in the context of Wi-Fi-sharing communities [31] or for intelligent energy networks in Germany [32].…”
Section: Trust-point-based Security Architecturementioning
confidence: 99%
“…As a result simultaneous mobility of the nodes is not possible with E2E. [29] is quite close to E2E architecture, as specific applications benefit from an HIP end-to-end communication with security and MM features. The remaining communications are tunnelled to a Security Gateway located in the EU private network rather than in its ISP's core network.…”
Section: Introductionmentioning
confidence: 96%