Trust-Based Fast Authentication for Multiowner Wireless Networks

In multiowner wireless networks, access points (APs) are owned and operated by different administrations, leading to significant authentication delays during handoff between APs. We propose to exploit the trust between the owners of neighboring APs for reducing the authentication delay. In the proposed authentication scheme, neighboring APs that trust each other share the security key for the visiting node to avoid lengthy authentication routines each time the visiting node switches APs. The performance of the proposed trust-based authentication scheme is evaluated using a Markov model. Using numerical experiments, we first study a basic scenario where mobile nodes are not aware of the trust networks that exist in a given neighborhood. Subsequently, we consider an advanced scenario where a mobile node functionality is augmented to discover the trust network so as to minimize roaming beyond the trusted APs. We find that, even with the basic implementation, the average number of full authentications needed for a roaming mobile reduces linearly as the likelihood of two neighboring APs trusting each other increases. With the advanced implementation, our experiments show that quadratic reduction is achieved. The Markov model is validated using discrete event simulation.

[1]  Joanna Samprakou,et al.  AN OPTIMIZED HANDOFF SCHEME FOR IP MOBILITY SUPPORT IN IEEE 802 . 11 WLANS , 2004 .

[2]  Suman Banerjee,et al.  Eliminating handoff latencies in 802.11 WLANs using multiple radios: applications, experience, and evaluation , 2005, IMC '05.

[3]  Gunnar Karlsson,et al.  Load balancing in overlapping wireless LAN cells , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[4]  Albert Y. Zomaya,et al.  Titan: a new paradigm in wireless internet access based on community collaboration , 2006, IWCMC '06.

[5]  Ali Esmaili,et al.  Probability and Random Processes , 2005, Technometrics.

[6]  Tzi-cker Chiueh,et al.  Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[7]  K. Raza Juniper Networks , 2009 .

[8]  Ilenia Tinnirello,et al.  Improving load balancing mechanisms in wireless packet networks , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).

[9]  Tzi-cker Chiueh,et al.  Low-latency mobile IP handoff for infrastructure-mode wireless LANs , 2004, IEEE Journal on Selected Areas in Communications.

[10]  Haiyun Luo,et al.  Flow Scheduling for End-Host Multihoming , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[11]  William A. Arbaugh,et al.  Proactive key distribution using neighbor graphs , 2004, IEEE Wireless Communications.

[12]  Ravi Kumar,et al.  Extracting Large-Scale Knowledge Bases from the Web , 1999, VLDB.

[13]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.

[14]  Christopher R. Palmer,et al.  Generating network topologies that obey power laws , 2000, Globecom '00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137).

[15]  Lada A. Adamic,et al.  Evolutionary Dynamics of the World Wide Web , 1999 .

[16]  Roger Karrer,et al.  Enabling large-scale wireless broadband , 2004, Comput. Commun. Rev..

[17]  Christos Bouras,et al.  Fast IP handoff support for VoIP and multimedia applications in 802.11 WLANs , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

[18]  Jan-Ming Ho,et al.  Bi-directional route optimization in mobile IP over wireless LAN , 2002, Proceedings IEEE 56th Vehicular Technology Conference.

[19]  Stefan Savage,et al.  SyncScan: practical fast handoff for 802.11 infrastructure networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[20]  Pat R. Calhoun,et al.  RADIUS Extensions , 2000, RFC.

[21]  Michalis Faloutsos,et al.  On power-law relationships of the Internet topology , 1999, SIGCOMM '99.

[22]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 1997, RFC.