Academia.eduAcademia.edu

Outline

SWISH: Secure WiFi sharing

2011, Computer Networks

https://doi.org/10.1016/J.COMNET.2011.01.012

Abstract

The fast increase of mobile Internet use motivates the need for WiFi sharing solutions, where a mobile user connects to the Internet via a nearby foreign network while its home network is far away. This situation creates security challenges which are only partially solved by existing solutions like VPNs. Such solutions neglect the security of the visited network, and private users or organizations are thus reluctant to share their connection. In this paper, we present and implement SWISH, an efficient, full scale solution to this problem. SWISH is based on establishing a tunnel from the visited network to the user's home network. All the data from the mobile is then forwarded through this tunnel. Internet access is therefore provided without endangering the visited network. We also propose protocol extensions that allow the visited network to charge for the data it forwards, and to protect the privacy of the mobile user while preventing abuse. SWISH was successfully deployed on university networks, demonstrating that it can be conveniently implemented in existing networks with a minimal impact on performance.

References (37)

  1. Devicescape Wi-Fi Report -Q2, 2009. <http://www.device scape.com/assets/docs/DevicescapeQ22009Wi-FiReportFinal.pdf>.
  2. J. Sharkey, At Hotels, Making Wi-Fi as Standard as a Bed, May 2010. <http://www.nytimes.com/2010/05/06/business/06CONNECT.html>.
  3. M.S. Daithi, Law in the last mile: sharing Internet access through WIFI, in: SCRIPT-ed, vol. 6, 2009.
  4. R.V. Hale, WiFi liability: potential legal risks in accessing and operating wireless Internet, Santa Clara Computer and High Technology Law Journal 21 (2005) 543.
  5. M. Hines, Worried about Wi-Fi security? January 2005. <http:// news.cnet.com/Worried-about-Wi-Fi-security/2100-7347_3-5540969. html>.
  6. M. Varsavsky, Why do some Foneros disconnect their Fonera WiFi router? 2008. http://english.martinvarsavsky.net/general/why-do- some-foneros-disconnect-their-fonera-wifi-router.html.
  7. M. Manulis, D. Leroy, F. Koeune, O. Bonaventure, J. Quisquater, Authenticated wireless roaming via tunnels: making mobile guests feel at home, in: Proceedings of the ACM Symposium on Information, Computer and Communication Security (ASIACCS), 2009, pp. 92-103.
  8. K. Egevang, P. Francis, The IP Network Address Translator (NAT), RFC 1631, IETF, May 1994.
  9. K. Swiat, The travelling menace: rogue hotspots, Computer Fraud & Security 2006 (12) (2006) 13-15.
  10. H. Bidgoli, Handbook of information security: information warfare, social, legal, International Issues and Security Foundations, vol. 2, John Wiley and Sons, 2005. pp. 83-93.
  11. E. Messmer, How Wi-Fi attackers are poisoning Web browsers, February 2010. <http://www.networkworld.com/news/2010/020 310-black-hat-wi-fi-attackers.html>.
  12. P. Gralla, Don't fall victim to the 'Free Wi-Fi' scam, January 2007. <http://www.computerworld.com/s/article/9008399/Don_t_fall_ victim_to_the_Free_Wi_Fi_scam>.
  13. FON. <http://www.fon.com>.
  14. P. Funk, S. Blake-Wilson, Extensible Authentication Protocol Tunneled Transport Layer Security Authenticated Protocol Version 0 (EAP-TTLSv0), RFC 5281, IETF, August 2008.
  15. C. Rigney, S. Willens, A. Rubens, W. Simpson, Remote Authentication Dial In User Service (RADIUS), RFC 2865, IETF, June 2000.
  16. Eduroam, <http://www.eduroam.org>.
  17. N. Sastry, K. Sollins, J. Crowcroft, Architecting citywide ubiquitous Wi-Fi access, in: Proceedings of the HotNets-VI, 2007.
  18. B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, H. Levkowetz, Extensible Authentication Protocol (EAP), RFC 3748, IETF, June 2004.
  19. D. Leroy, G. Detal, Technical Report: RAKE payload format, Tech. Rep., November 2010. <http://inl.info.ucl.ac.be/techrep-rake>.
  20. M. Belshe, A client-side argument for changing TCP slow start, January 2010. <http://www.chromium.org/spdy/An_Argument_For_ Changing_TCP_Slow_Start.pdf>.
  21. The Network Simulator NS-2. <http://www.isi.edu/nsnam/ns/>.
  22. M. Bellare, C. Namprempre, Authenticated encryption: relations among notions and analysis of the generic composition paradigm, Journal of Cryptology 21 (4) (2008) 469-491.
  23. S. Kent, IP Authentication Header, RFC 4302, IETF, December 2005.
  24. S. Kent, IP Encapsulating Security Payload (ESP), RFC 4303, IETF, December 2005.
  25. M.L. Gress, L. Johnson, Deploying and troubleshooting Cisco wireless LAN controllers, first ed., Cisco Press, 2009.
  26. A. Botta, A. Dainotti, A. Pescape, Multi-protocol and multi-platform traffic generation and measurement, in: IEEE INFOCOM 2007 Demo Session, vol. 45, 2007, pp. 526-532.
  27. D. Leroy, M. Manulis, O. Bonaventure, Enhanced wireless roaming security using three-party authentication and tunnels, in: Proceedings of the ACM Workshop on User-Provided Networking (U-Net), 2009.
  28. S. Kremer, O. Markowitch, J. Zhou, An intensive survey of fair non- repudiation protocols, Computer Communications 25 (2002) 1606- 1621.
  29. H. Hasan, B. Stiller, Non-repudiation of consumption of mobile Internet services with privacy support, in: Proceedings of the IEEE International Conference on Wireless & Mobile Computing, Networking & Communications (WiMob), 2005.
  30. S. Goldberg, D. Xiao, E. Tromer, B. Barak, J. Rexford, Path-quality monitoring in the presence of adversaries, in: Proceedings of the ACM SIGMETRICS, 2008, pp. 193-204.
  31. D. Balfanz, G. Durfee, N. Shankar, D.K. Smetters, J. Staddon, H.-C. Wong, Secret handshakes from pairing-based key agreements, in: Proceedings of the IEEE Symposium on Security and Privacy, 2003, pp. 180-196.
  32. C. Perkins, IP Mobility Support for IPv4, RFC 3344, IETF, August 2002.
  33. H. Soliman, Mobile IPv6: Mobility in a Wireless Internet, Addison- Wesley Professional, 2004.
  34. T. Heer, S. Götz, E. Weingärtner, K. Wehrle, Secure Wi-Fi sharing on global scales, in: Proceedings of the 15th International Conference on Telecommunication (ICT '08), 2008.
  35. R. Moskowitz, P. Nikander, Host Identity Protocol (HIP) Architecture, RFC 4423, IETF, May 2006.
  36. A. Noack, Efficient Authenticated Wireless Roaming via Tunnels, in: Proceedings of the QSHINE, 2009.
  37. Damien Leroy is currently a Ph.D. Student in the IP Networking Lab at Universite catholiq- ue de Louvain (UCL) in Belgium. In 2006, he received the Alcatel Bell M.Sc. Thesis Award for his master's thesis on firewalls. He first worked on IPv6 transition and IP renumbering issue. His current research topics are about WiFi sharing and network security. Gregory Detal received his M.S. degree in Computer Science Engineering from the Uni- versite catholique de Louvain (UCL), Belgium, in 2009. He is currently a Ph.D. candidate in the IP Networking Lab at the Universite catholique de Louvain. In October 2009, Gregory was awarded the Alcatel-Lucent Bel- gium MSc Thesis Award for his work, ''On monitoring large-scale Wireless Mesh Net- works''. Its current research interests are in the areas of WiFi roaming, wireless mesh networks and wireless sensor networks.