Strong password-only authenticated key exchange
ACM SIGCOMM Computer Communication Review
Security flaws in 802.11 data link protocols
Communications of the ACM - Wireless networking security
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Fast authentication methods for handovers between IEEE 802.11 wireless LANs
Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots
An approach to enhance inter-provider roaming through secret sharing and its application to WLANs
Proceedings of the 3rd ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Security analysis on public wireless internet service models
Proceedings of the 3rd ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Improved access point selection
Proceedings of the 4th international conference on Mobile systems, applications and services
Wireless networking security: open issues in trust, management, interoperation and measurement
International Journal of Security and Networks
The case for intentional networking
Proceedings of the 10th workshop on Mobile Computing Systems and Applications
Performance analysis of a cross-layer SSO mechanism for a roaming infrastructure
Journal of Network and Computer Applications
NMACA: a novel methodology for message authentication code algorithms
TELE-INFO'09 Proceedings of the 8th Wseas international conference on Telecommunications and informatics
A dual re-authentication scheme for fast handoff in IEEE 802.11 wireless mesh networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Usability improvements for WLAN access
HCI'07 Proceedings of the 12th international conference on Human-computer interaction: interaction design and usability
Intentional networking: opportunistic exploitation of mobile network diversity
Proceedings of the sixteenth annual international conference on Mobile computing and networking
A multilateral secure payment system for wireless LAN hotspots
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
SP 800-48 Rev. 1. Guide to Securing Legacy IEEE 802.11 Wireless Networks
SP 800-48 Rev. 1. Guide to Securing Legacy IEEE 802.11 Wireless Networks
SP 800-97. Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i
SP 800-97. Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i
Hi-index | 0.00 |
A serious impediment for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relationships with individuals and each supporting their own authentication schemes which may vary from one provider to the next. We have designed and implemented a comprehensive single sign-on (SSO) authentication architecture that confederates WLAN service providers through trusted identity providers. Users select the appropriate SSO authentication scheme from the authentication capabilities announced by the WLAN service provider, and can block the exposure of their privacy information while roaming. In addition, we have developed a compound layer 2 and Web authentication scheme that ensures cryptographically protected access while preserving pre-existing public WLAN payment models. Our experimental results, obtained from our prototype system, show the total authentication delay are well within 2 seconds. This is dominated primarily by our use of industry-standard XML-based protocols, yet are still small enough for practical use.