Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1024733.1024738acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

Reputation-based Wi-Fi deployment protocols and security analysis

Published: 01 October 2004 Publication History
  • Get Citation Alerts
  • Abstract

    In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet users access to email, web or other Internet service. However, two major problems still slow down the deployment of this kind of networks: the lack of a seamless roaming scheme and the variable quality of service experienced by the users. This paper provides a response to these two problems: We present a solution that, on the one hand, allows a mobile node to connect to a foreign WISP in a secure way while preserving its anonymity and, on the other hand, encourages the WISPs to provide the users with good QoS. We analyse the robustness of our solution against various attacks and we prove by means of simulations that our reputation model indeed encourages the WISPs to behave correctly.

    References

    [1]
    P. Bahl, A. Balachandran, A. Miu, W. Russell, G. Voelker, and Y.M. Wang. PAWNs: Satisfying the Need for Ubiquitous Connectivity and Location Services. IEEE Personal Communications Magazine, 9(1), 2002.
    [2]
    N. Ben Salem, J.-P. Hubaux, and M. Jakobsson. Fuelling WiFi deployment: A reputation-based solution. In Proceedings of WiOpt, 2004.
    [3]
    S. Buchegger and J.-Y. Le Boudec. Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes - Fairness In Distributed Ad Hoc NeTworks. In Proceedings of MobiHOC, 2002.
    [4]
    L. Buttyán. Removing the Financial Incentive to Cheat in Micropayment Schemes. IEE Electronics Letters, January 2000.
    [5]
    C. Dellacrocas and P. Resnick. Online Reputation Mechanisms - A Roadmap for Future Research. In 1st Interdisciplinary Symposium on Online Reputation Mechanism, 2003.
    [6]
    Z. Despotovic and K. Aberer. Trust and Reputation in P2P networks. In 1st Interdisciplinary Symposium on Online Reputation Mechanism, 2003.
    [7]
    E.C. Efstathiou and G.C. Polyzos. A Peer-to-Peer Approach to Wireless LAN Roaming. In Proceedings of WMASH, 2003.
    [8]
    D. Houser and J. Wooders. Reputation in Auctions: Theory, and Evidence from eBay. Working Paper 00-01, University of Arizona, 2001.
    [9]
    http://www.boingo.com/.
    [10]
    http://www.isi.edu/nsnam/ns/.
    [11]
    http://www.rsasecurity.com/products/securid/.
    [12]
    IEEE 802.11 WG, Draft Supplement to Standard for Telecommunications and Information Exchange between Systems-LAN/MAN Specific Requirements- Part 11: Wireless LAN MAC and Physical Layer (PHY) Specifications: Medium Access Control (MAC), Enhancements for QoS, 802.11e Draft 4.1, February 2003.
    [13]
    A. K. Lenstra and E. R. Verheul. Selecting Cryptographic Key Sizes. Journal of Cryptology: the journal of the International Association for Cryptologic Research, 14(4), 2001.
    [14]
    P. Michiardi and R.Molva. Core: A Collaborative Reputation Mechanism To Enforce Node Cooperation In Mobile AD HOC Networks. In Proceedings of The 6th IFIP Communications and Multimedia Security Conference, 2002.
    [15]
    A. Miu and P. Bahl. Dynamic Host Configuration for Managing Mobility between Public and Private Networks. In The 3rd Usenix Internet Technical Symposium, 2001.
    [16]
    Boingo Wi-Fi Industry~White Paper. Towards Ubiquitous Wireless Broadband. http://www.boingo.com/wi-fi_industry_basics.pdf, 2003.
    [17]
    B. Patel and J. Crowcroft. Ticket based Service Access for the Mobile User. In Proceedings of MobiCom, 1997.
    [18]
    P. Resnick and R. Zeckhauser. Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay's Reputation System. In NBER workshop on empirical studies of electronic commerce, 2001.
    [19]
    P. Resnick, R. Zeckhauser, J. Swanson, and K. Lockwood. The Value of Reputation on eBay: A Controlled Experiment. In ESA Conference, 2002.
    [20]
    R. Rivest and A. Shamir. PayWord and MicroMint: Two simple micro-payment schemes. Technical report, MIT Laboratory for Computer Science, 1996.
    [21]
    N. Ben Salem and M. Jakobsson L. Buttyan, J.P. Hubaux. A charging and rewarding scheme for packet forwarding. In Proceedings of MobiHoc, 2003.
    [22]
    J. Zhang, J. Li, S. Weinstein, and N. Tu. Virtual Operator Based AAA in Wireless LAN Hot Spots with Ad Hoc Networking Support. Mobile Computing and Communications Review, 6(13), 2002.

    Cited By

    View all

    Index Terms

    1. Reputation-based Wi-Fi deployment protocols and security analysis

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM Conferences
          WMASH '04: Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots
          October 2004
          156 pages
          ISBN:1581138776
          DOI:10.1145/1024733
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Sponsors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 01 October 2004

          Permissions

          Request permissions for this article.

          Check for updates

          Author Tags

          1. QoS
          2. WiFi networks
          3. billing
          4. protocols
          5. reputation systems
          6. roaming
          7. security

          Qualifiers

          • Article

          Conference

          WMASH04
          Sponsor:

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)4
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 27 Jul 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2015)SiAcWireless Networks10.1007/s11276-015-0923-221:7(2425-2452)Online publication date: 1-Oct-2015
          • (2010)Intentional networkingProceedings of the sixteenth annual international conference on Mobile computing and networking10.1145/1859995.1860005(73-84)Online publication date: 20-Sep-2010
          • (2010)Wifi-ReportsIEEE Transactions on Mobile Computing10.1109/TMC.2010.1519:12(1713-1731)Online publication date: 1-Dec-2010
          • (2009)Wifi-reportsProceedings of the 7th international conference on Mobile systems, applications, and services10.1145/1555816.1555830(123-136)Online publication date: 22-Jun-2009
          • (2009)The case for intentional networkingProceedings of the 10th workshop on Mobile Computing Systems and Applications10.1145/1514411.1514418(1-6)Online publication date: 23-Feb-2009
          • (2009)Game Theory and Cognitive Radio Based Wireless NetworksProceedings of the Third KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications10.1007/978-3-642-01665-3_81(803-812)Online publication date: 30-May-2009
          • (2006)A framework for incentive compatible topology control in non-cooperative wireless multi-hop networksProceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks10.1145/1160972.1160976(9-18)Online publication date: 26-Sep-2006
          • (2006)Improved access point selectionProceedings of the 4th international conference on Mobile systems, applications and services10.1145/1134680.1134705(233-245)Online publication date: 19-Jun-2006
          • (2006)Exploiting Mobility for Key EstablishmentProceedings of the Seventh IEEE Workshop on Mobile Computing Systems & Applications10.1109/WMCSA.2006.9(61-68)Online publication date: 6-Apr-2006
          • (2006)"Word-of-Mouth" in Radio Access Markets2006 IEEE 63rd Vehicular Technology Conference10.1109/VETECS.2006.1682927(761-766)Online publication date: 2006
          • Show More Cited By

          View Options

          Get Access

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media