• DocumentCode
    571479
  • Title

    Design and Implementation of a Secure Public Wireless Internet Service Model Using Host Identity Protocol

  • Author

    Takahashi, Akihiro ; Maeda, Tomotaka ; Okabe, Yasuo

  • Author_Institution
    Grad. Sch. of Inf., Kyoto Univ., Kyoto, Japan
  • fYear
    2012
  • fDate
    16-20 July 2012
  • Firstpage
    19
  • Lastpage
    28
  • Abstract
    In an ideal ubiquitous network, everyone can access the Internet when some connectivity exists there. A network administrator is supposed to provide a connection to public visitors securely. In this paper, we propose a secure public wireless Internet service model using Host identity Protocol (HIP). Services based on the model allow everyone to provide a connection. We give some consideration to its risks. Our goal is to implement and evaluate the model. The network administrator is responsible for tracing malicious users who attempt to access a global network. We call this traceability ensurance. In conventional Internet access services, a malicious user who has attacked someone can make excuses and may put the blame on the network administrator. The network administrator wants to prove that he himself has not committed malicious accesses, and to make sure that the malicious user cannot put the blame on others, that is, nonrepudiation should be ensured. To authenticate users, the network administrator needs to manage many accounts and take logs. If a malicious user attacks a correspondent, he or she may raise a complaint to the administrator. They are the burden for the network administrator. Our model ensures the traceability of users and the nonrepudiation. Our model also reduces the management work of network administrators. Installation cost of our model is low because we apply HIP without any modification, thus the network administrator can provide and the users can use the network securely without adopting a complex system. To protect from some attacks, we implement a gateway system. As a qualitative evaluation, we confirm that the system works in the real environment.
  • Keywords
    Internet; computer network security; protocols; radio networks; HIP; host identity protocol; malicious accesses; malicious user; network administrator; public visitors; secure public wireless Internet service model; ubiquitous network; Authentication; Communication system security; Hip; Internet; Servers; Web and internet services; Wireless communication; Network topology; Security; Ubiquitous computing; Wireless LAN;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Applications and the Internet (SAINT), 2012 IEEE/IPSJ 12th International Symposium on
  • Conference_Location
    Izmir
  • Print_ISBN
    978-1-4673-2001-6
  • Electronic_ISBN
    978-0-7695-4737-4
  • Type

    conf

  • DOI
    10.1109/SAINT.2012.13
  • Filename
    6305257