WiFi Authentication through Social Networks

نویسندگان

  • Yunus Durmus
  • Koen Langendoen
چکیده

With the proliferation of WiFi-enabled devices, people expect to be able to use them everywhere, be it at work, while commuting, or when visiting friends. In the latter case, home owners are confronted with the burden of controlling the access to their WiFi router, and usually resort to simply sharing the password. Although convenient, this solution breaches basic security principles, and puts the burden on the friends who have to enter the password in each and every of their devices. The use of social networks, specifying the trust relations between people and devices, provides for a more secure and more friendly authentication mechanism. In this paper, we progress the state-of-the-art by abandoning the centralized solution to embed social networks in WiFi authentication; we introduce EAP-SocTLS, a decentralized approach for authentication and authorization of WiFi access points and other devices, exploiting the embedded trust relations. In particular, we address the (quadratic) search complexity when indirect trust relations, like the smartphone of a friend’s kid, are involved. We show that the simple heuristic of limiting the search to friends and devices in physical proximity makes for a scalable solution. Our prototype implementation, which is based on WebID and EAP-TLS, uses WiFi probe requests to determine the pool of neighboring devices and was shown to reduce the search time from 1 minute for the naive policy down to 11 seconds in the case of granting access over an indirect friend. Keywords—Social Devices, WiFi Authentication and Authorization, WebID, EAP-TLS, EAP-SocTLS

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Decentralised Access Control in 802.11 Networks

The current WiFi access control framework descends from solutions conceived in the past for dial-up scenarios. A key difference between the two worlds is mobility: dial-up handles nomadic users, while modern wireless networks support continuous mobility through always-on personal devices. Not surprisingly, WiFi authentication does not exploit mobility in any way; on the contrary, mobility is pe...

متن کامل

AppCracker: Widespread Vulnerabilities in User and Session Authentication in Mobile Apps

A fundamental security principle in developing networked applications is end-to-end security, where the confidentiality and integrity of the data transmitted over the network do not rely on the security of the network. In response to the ever increasing traffic from mobile apps, WiFi networks are spreading fast and widely. Since WiFi networks are unregulated, a passive attacker may eavesdrop on...

متن کامل

Secure Wireless Networks

This paper provides a brief overview of wireless (WiFi) networks and some of the security measures in place today. We further seek to find a secure way to authenticate and enable secure communication between wireless (WiFi) clients and external networks.

متن کامل

Leveraging Smartphone Hardware Capabilities for Alternative Authentication

In this project, we explore two forms of user authentication, alternative to the alpha-numeric password, through utilization of various hardware components in a modern smartphone. These components act as input channels for biometric and geolocative data, which can be used to validate the identity of a user through gesture-based authentication (via the accelerometer and orientation sensor) and l...

متن کامل

A Network Detection and Selection Scheme in Heterogeneous Wireless Network

Next-generation wireless networks will provide different wireless radio access technologies(RAT) like WiFi, WiMAX and GSM to mobile user. It provide seamless mobility with high speed connectivity. Like for phone calls user preffered UMTS and WiFi hotspot for web browsing. To enable connectivity during handoff, all the available networks need to known by mobile user. When multiple access network...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014