DocumentCode :
139734
Title :
Wifi authentication through social networks — A decentralized and context-aware approach
Author :
Durmus, Yunus ; Langendoen, Koen
Author_Institution :
Delft Univ. of Technol., Delft, Netherlands
fYear :
2014
fDate :
24-28 March 2014
Firstpage :
532
Lastpage :
538
Abstract :
With the proliferation of WiFi-enabled devices, people expect to be able to use them everywhere, be it at work, while commuting, or when visiting friends. In the latter case, home owners are confronted with the burden of controlling the access to their WiFi router, and usually resort to simply sharing the password. Although convenient, this solution breaches basic security principles, and puts the burden on the friends who have to enter the password in each and every of their devices. The use of social networks, specifying the trust relations between people and devices, provides for a more secure and more friendly authentication mechanism. In this paper, we progress the state-of-the-art by abandoning the centralized solution to embed social networks in WiFi authentication; we introduce EAP-SocTLS, a decentralized approach for authentication and authorization of WiFi access points and other devices, exploiting the embedded trust relations. In particular, we address the (quadratic) search complexity when indirect trust relations, like the smartphone of a friend´s kid, are involved. We show that the simple heuristic of limiting the search to friends and devices in physical proximity makes for a scalable solution. Our prototype implementation, which is based on WebID and EAP-TLS, uses WiFi probe requests to determine the pool of neighboring devices and was shown to reduce the search time from 1 minute for the naive policy down to 11 seconds in the case of granting access over an indirect friend.
Keywords :
authorisation; message authentication; search problems; social networking (online); telecommunication security; trusted computing; ubiquitous computing; wireless LAN; EAP-SocTLS; EAP-TLS; WebID; WiFi authentication; WiFi router; WiFi-enabled devices; authentication mechanism; authorization; context-aware approach; decentralized approach; embedded trust relations; heuristic; password; physical proximity; quadratic search complexity; search time reduction; security principles; smartphone; social networks; Authentication; Authorization; IEEE 802.11 Standards; Probes; Protocols; Servers; Social network services; EAP-SocTLS; EAP-TLS; Social Devices; WebID; WiFi Authentication and Authorization;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Pervasive Computing and Communications Workshops (PERCOM Workshops), 2014 IEEE International Conference on
Conference_Location :
Budapest
Type :
conf
DOI :
10.1109/PerComW.2014.6815263
Filename :
6815263
Link To Document :
بازگشت