Home networking and HCI: what hath god wrought?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The work to make a home network work
ECSCW'05 Proceedings of the ninth conference on European Conference on Computer Supported Cooperative Work
Network-in-a-box: how to set up a secure wireless network in under a minute
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
RelBAC: Relation Based Access Control
SKG '08 Proceedings of the 2008 Fourth International Conference on Semantics, Knowledge and Grid
Enforcing access control in Web-based social networks
ACM Transactions on Information and System Security (TISSEC)
ICEbox: toward easy-to-use home networking
INTERACT'07 Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction - Volume Part II
Relationship-based access control: protection model and policy language
Proceedings of the first ACM conference on Data and application security and privacy
D-FOAF: distributed identity management with access rights delegation
ASWC'06 Proceedings of the First Asian conference on The Semantic Web
Hi-index | 0.00 |
Effective security on home wireless networks remains an elusive goal. The most prevalent method uses a single pre-shared key to enforce access control, but the requirement for convenience often results in poorly chosen keys which rarely change over time. Furthermore, since there is no way to maintain control of the key once it is distributed, there is no way to know who is actually on the network. Methods already exist which provide better security (e.g. EAP-TLS), but few users have the knowledge or experience to deploy them. We propose a new paradigm which brings access control to the average user's level. Our idea is to leverage online social networks to identify relationships between the owner of a home wireless network and its potential users. Rather than being responsible for the distribution and control of a single all-powerful key, the wireless owner simply declares the set of users and relationships which they trust to access their network. From the perspective of the wireless user, authentication is as simple as logging into the online social networking service like normal.