An anonymous and accountable authentication scheme for Wi-Fi hotspot access with the Bitcoin blockchain

Anonymous authentication can protect users' privacy and security when they access public Wi-Fi hotspots. However, most of the existing privacy-enhanced authentication schemes either do not consider users' accountability or they are inherently dependent on trusted third parties, and therefore are undeployable in practical settings. In this paper, we design and implement an access authentication scheme to simultaneously and efficiently provide anonymity and accountability without relying on any trusted third party. Our scheme is inspired by the recent progress of Bitcoin techniques such as Colored Coins and CoinShuffle protocol. We utilize the unmodified Bitcoin blockchain as the powerful platform to manage and determine ownership of access credentials in a peer-to-peer fashion and introduce a completely decentralized Bitcoin mixing protocol that allows users to anonymously exchange their access credentials offline. The verification path of access credentials is designed to support blacklisting and punishing misbehaving anonymous users. Our proposed scheme is compatible with the current Bitcoin system, and its effectiveness and feasibility in Wi-Fi hotspot access scenario are also demonstrated by security analysis and performance evaluation.

[1]  Mohsen Guizani,et al.  An Accountable, Privacy-Preserving, and Efficient Authentication Framework for Wireless Access Networks , 2016, IEEE Transactions on Vehicular Technology.

[2]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[3]  Pedro Moreno-Sanchez,et al.  CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin , 2014, ESORICS.

[4]  Hiroyuki Inaba,et al.  Proposal of new authentication method in Wi-Fi access using Bitcoin 2.0 , 2016, 2016 IEEE 5th Global Conference on Consumer Electronics.

[5]  M. Rosenfeld Overview of Colored Coins , 2013 .

[6]  Bruce Potter Wireless hotspots , 2006, Commun. ACM.

[7]  Sean W. Smith,et al.  Blacklistable anonymous credentials: blocking misbehaving users without ttps , 2007, CCS '07.

[8]  Guevara Noubir,et al.  Authenticating Privately over Public Wi-Fi Hotspots , 2015, CCS.

[9]  Tooska Dargahi,et al.  WI-FAB: attribute-based WLAN access control, without pre-shared keys and backend infrastructures , 2016, HotPOST '16.

[10]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[11]  Jeremy Clark,et al.  SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.

[12]  Massimo Bartoletti,et al.  An Analysis of Bitcoin OP_RETURN Metadata , 2017, Financial Cryptography Workshops.

[13]  Srinivas Devadas,et al.  Catena: Preventing Lies with Bitcoin , 2016, IACR Cryptol. ePrint Arch..

[14]  Björn Scheuermann,et al.  Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.