DocumentCode
571479
Title
Design and Implementation of a Secure Public Wireless Internet Service Model Using Host Identity Protocol
Author
Takahashi, Akihiro ; Maeda, Tomotaka ; Okabe, Yasuo
Author_Institution
Grad. Sch. of Inf., Kyoto Univ., Kyoto, Japan
fYear
2012
fDate
16-20 July 2012
Firstpage
19
Lastpage
28
Abstract
In an ideal ubiquitous network, everyone can access the Internet when some connectivity exists there. A network administrator is supposed to provide a connection to public visitors securely. In this paper, we propose a secure public wireless Internet service model using Host identity Protocol (HIP). Services based on the model allow everyone to provide a connection. We give some consideration to its risks. Our goal is to implement and evaluate the model. The network administrator is responsible for tracing malicious users who attempt to access a global network. We call this traceability ensurance. In conventional Internet access services, a malicious user who has attacked someone can make excuses and may put the blame on the network administrator. The network administrator wants to prove that he himself has not committed malicious accesses, and to make sure that the malicious user cannot put the blame on others, that is, nonrepudiation should be ensured. To authenticate users, the network administrator needs to manage many accounts and take logs. If a malicious user attacks a correspondent, he or she may raise a complaint to the administrator. They are the burden for the network administrator. Our model ensures the traceability of users and the nonrepudiation. Our model also reduces the management work of network administrators. Installation cost of our model is low because we apply HIP without any modification, thus the network administrator can provide and the users can use the network securely without adopting a complex system. To protect from some attacks, we implement a gateway system. As a qualitative evaluation, we confirm that the system works in the real environment.
Keywords
Internet; computer network security; protocols; radio networks; HIP; host identity protocol; malicious accesses; malicious user; network administrator; public visitors; secure public wireless Internet service model; ubiquitous network; Authentication; Communication system security; Hip; Internet; Servers; Web and internet services; Wireless communication; Network topology; Security; Ubiquitous computing; Wireless LAN;
fLanguage
English
Publisher
ieee
Conference_Titel
Applications and the Internet (SAINT), 2012 IEEE/IPSJ 12th International Symposium on
Conference_Location
Izmir
Print_ISBN
978-1-4673-2001-6
Electronic_ISBN
978-0-7695-4737-4
Type
conf
DOI
10.1109/SAINT.2012.13
Filename
6305257
Link To Document