Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2480362.2480700acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Secure roaming and infrastructure sharing for multi-operator WMNs

Published: 18 March 2013 Publication History

Abstract

Wireless mesh networks consist of a wireless infrastructure of mesh routers which are connected to the Internet via mesh gateways. While previous security research in the area mainly focused single-operator networks, this paper proposes a comprehensive security architecture for multi-operator wireless mesh networks. Our proposal allows for a secure deployment of infrastructure components (routers and gateways) as well as mesh client. The multi-operator support of our architecture does not only cover mesh client roaming, but also the deployment of infrastructure components of one operator in the administrative domain of the other operator. Our architecture is thus - to the best of our knowledge - the first to support secure infrastructure sharing between operators. Note that our solution is based on open standards and protects traffic generated by mesh clients from insider attackers such as compromised mesh routers, mesh routers operated by malicious operators, and curious or malicious routing mesh clients.

References

[1]
Arkko J. Aboba B., Beadles M. and P. Eronen. The Network Access Identifier. Technical report, December 2005.
[2]
L. Buttyan and L. Dora. An Authentication Scheme for QoS-aware Multi-operator maintained Wireless Mesh Networks. In IEEE WoWMoM, 2009.
[3]
Perkins C. IP Mobility Support for IPv4, Revised. Technical report, November 2010.
[4]
Omar Cheikhrouhou, Maryline Laurent-Maknavicius, and Hakima Chaouchi. Security Architecture in a multi-hop Mesh Networks. In SAR, 2006.
[5]
T. Clancy. Secure Handover in Enterprise WLANs: CAPWAP, HOKEY, and IEEE 802.11r. Wireless Communications, IEEE, 2008.
[6]
André Egners, Hendrik Fabelje, and Ulrike Meyer. FSASD: A Framework for Establishing Security Associations for Sequentially Deployed WMN. In IEEE WoWMoM, June 2012.
[7]
Cao Z. et al. EAP Extensions for the EAP Re-authentication Protocol (ERP). Technical report, July 2012.
[8]
Bing He and D. P. Agrawal. An Identity-based Authentication and Key Establishment Scheme for Multi-operator maintained Wireless Mesh Networks. In IEEE MASS, 2010.
[9]
Ohba Y. Hoeper K., Nakhjiri M. Distribution of EAP-Based Keys for Handover and Re-Authentication. Technical Report 5749, March 2010.
[10]
Md. Shariful Islam, Young Yig Yoon, Md. Abdul Hamid, and Choong Seon Hong. A Secure Hybrid Wireless Mesh Protocol for 802.11s Mesh Network. In ICCSA'08.
[11]
Ramanarayana Kandikattu and Lillykutty Jacob. A Secure IPv6-based Urban Wireless Mesh Network (SUMNv6). 2008.
[12]
Jonathan Ledlie, Paul Gardner, and Margo Seltzer. Network Coordinates in the Wild. In USENIX NSDI, 2007.
[13]
Fabio Martignon, Stefano Paris, and Antonio Capone. MobiSEC: A Novel Security Architecture for Wireless Mesh Networks. In Q2SWinet, 2008.
[14]
Kui Ren. A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks. In ICDCS'08.
[15]
Kui Ren, Shucheng Yu, Wenjing Lou, and Yanchao Zhang. PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks. Parallel and Distributed Systems, IEEE Transactions on, 2010.
[16]
C. Rigney, S. Willens, A. Rubens, and W. Simpson. Remote Authentication Dial In User Service (RADIUS). RFC 2865, 2000.
[17]
J. Salowey, L. Dondeti, V. Narayanan, and M. Nakhjiri. Specification for the Derivation of Root Keys from an Extended Master Session Key (EMSK). RFC 5295 (Proposed Standard), August 2008.
[18]
Jinyuan Sun, Chi Zhang, Yanchao Zhang, and Yuguang Fang. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks. Dependable and Secure Computing, IEEE Transactions on, 2011.
[19]
Ze Wang, Maode Ma, Wenju Liu, and Xixi Wei. A Unified Security Framework for Multi-domain Wireless Mesh Networks. In ACM ICICS, 2011.
[20]
Yanchao Zhang. ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks. Selected Areas in Communications'06.

Cited By

View all
  • (2015)Multi-operator wireless mesh networks secured by an all-encompassing security architectureInternational Journal of Information Security10.1007/s10207-014-0244-y14:2(169-186)Online publication date: 1-Apr-2015

Index Terms

  1. Secure roaming and infrastructure sharing for multi-operator WMNs

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SAC '13: Proceedings of the 28th Annual ACM Symposium on Applied Computing
      March 2013
      2124 pages
      ISBN:9781450316569
      DOI:10.1145/2480362
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 18 March 2013

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. EAP
      2. infrastructure sharing
      3. insider attackers
      4. key management
      5. multi-operator
      6. roaming
      7. security
      8. wireless mesh networks

      Qualifiers

      • Research-article

      Conference

      SAC '13
      Sponsor:
      SAC '13: SAC '13
      March 18 - 22, 2013
      Coimbra, Portugal

      Acceptance Rates

      SAC '13 Paper Acceptance Rate 255 of 1,063 submissions, 24%;
      Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

      Upcoming Conference

      SAC '25
      The 40th ACM/SIGAPP Symposium on Applied Computing
      March 31 - April 4, 2025
      Catania , Italy

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 11 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2015)Multi-operator wireless mesh networks secured by an all-encompassing security architectureInternational Journal of Information Security10.1007/s10207-014-0244-y14:2(169-186)Online publication date: 1-Apr-2015

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media