SWISH: Secure WiFi sharing

被引:12
|
作者
Leroy, Damien [1 ]
Detal, Gregory [1 ]
Cathalo, Julien [2 ]
Manulis, Mark [3 ]
Koeune, Francois [2 ]
Bonaventure, Olivier [1 ]
机构
[1] Catholic Univ Louvain, IP Networking Lab, B-1348 Louvaine La Neuve, Belgium
[2] Catholic Univ Louvain, UCL Crypto Grp, B-1348 Louvaine La Neuve, Belgium
[3] Tech Univ Darmstadt, Dept Comp Sci, Cryptog Protocols Grp, Darmstadt, Germany
关键词
WiFi sharing; Roaming; Security; Protocol;
D O I
10.1016/j.comnet.2011.01.012
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The fast increase of mobile Internet use motivates the need for WiFi sharing solutions, where a mobile user connects to the Internet via a nearby foreign network while its home network is far away. This situation creates security challenges which are only partially solved by existing solutions like VPNs. Such solutions neglect the security of the visited network, and private users or organizations are thus reluctant to share their connection. In this paper, we present and implement SWISH, an efficient, full scale solution to this problem. SWISH is based on establishing a tunnel from the visited network to the user's home network. All the data from the mobile is then forwarded through this tunnel. Internet access is therefore provided without endangering the visited network. We also propose protocol extensions that allow the visited network to charge for the data it forwards, and to protect the privacy of the mobile user while preventing abuse. SWISH was successfully deployed on university networks, demonstrating that it can be conveniently implemented in existing networks with a minimal impact on performance. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:1614 / 1630
页数:17
相关论文
共 50 条
  • [31] Prioritized Resource Sharing in WiMax and WiFi Integrated Networks
    Andrews, Nirmal
    Kondareddy, Yogesh
    Agrawal, Prathima
    [J]. 2010 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2010), 2010,
  • [32] SWISH SYSTEM
    RODIN, AE
    ANGEVINE, DM
    [J]. ARCHIVES OF PATHOLOGY, 1969, 87 (04): : 447 - &
  • [33] Swish of the Kris
    不详
    [J]. LIBRARY JOURNAL, 1936, 61 (13) : 553 - 553
  • [34] On the Resource Consumption of Secure Data Sharing
    Kuehner, Holger
    Hartenstein, Hannes
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 880 - 889
  • [35] Secure and flexible global file sharing
    Miltchev, S
    Prevelakis, V
    Ioannidis, S
    Ioannidis, J
    Keromytis, AD
    Smith, JM
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE FREENIX TRACK, 2003, : 165 - 178
  • [36] Scalable secure file sharing system
    NTT Information Sharing Platform Laboratories, Musashino-shi, 180-8585, Japan
    不详
    不详
    [J]. NTT Tech. Rev., 2006, 10 (60-64):
  • [37] Secure information sharing for grid computing
    Abbadi, Imad M.
    Alawneh, Muntaha
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (06) : 486 - 502
  • [38] A Metadata Calculus for Secure Information Sharing
    Srivatsa, Mudhakar
    Agrawal, Dakshi
    Reidt, Steffen
    [J]. CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 488 - 499
  • [39] Secure Sharing of Data in Cloud Computing
    Tiwari, Deepnarayan
    Gangadharan, G. R.
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 24 - 35
  • [40] Secure Photo Sharing in Social Networks
    Picazo-Sanchez, Pablo
    Pardo, Raul
    Schneider, Gerardo
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2017, 2017, 502 : 79 - 92