SWISH: Secure WiFi sharing

被引:12
|
作者
Leroy, Damien [1 ]
Detal, Gregory [1 ]
Cathalo, Julien [2 ]
Manulis, Mark [3 ]
Koeune, Francois [2 ]
Bonaventure, Olivier [1 ]
机构
[1] Catholic Univ Louvain, IP Networking Lab, B-1348 Louvaine La Neuve, Belgium
[2] Catholic Univ Louvain, UCL Crypto Grp, B-1348 Louvaine La Neuve, Belgium
[3] Tech Univ Darmstadt, Dept Comp Sci, Cryptog Protocols Grp, Darmstadt, Germany
关键词
WiFi sharing; Roaming; Security; Protocol;
D O I
10.1016/j.comnet.2011.01.012
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The fast increase of mobile Internet use motivates the need for WiFi sharing solutions, where a mobile user connects to the Internet via a nearby foreign network while its home network is far away. This situation creates security challenges which are only partially solved by existing solutions like VPNs. Such solutions neglect the security of the visited network, and private users or organizations are thus reluctant to share their connection. In this paper, we present and implement SWISH, an efficient, full scale solution to this problem. SWISH is based on establishing a tunnel from the visited network to the user's home network. All the data from the mobile is then forwarded through this tunnel. Internet access is therefore provided without endangering the visited network. We also propose protocol extensions that allow the visited network to charge for the data it forwards, and to protect the privacy of the mobile user while preventing abuse. SWISH was successfully deployed on university networks, demonstrating that it can be conveniently implemented in existing networks with a minimal impact on performance. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:1614 / 1630
页数:17
相关论文
共 50 条
  • [41] SECURE MULTIOWNER DATA SHARING IN THE CLOUD
    Deepika, K. S.
    Balakrishnan, Ranjith
    [J]. 2015 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2015,
  • [42] Framework design of secure sensor sharing
    Li, Ruidong
    Inoue, Masugi
    [J]. IEEE International Conference on Communications, 2011,
  • [43] SeDaSC: Secure Data Sharing in Clouds
    Ali, Mazhar
    Dhamotharan, Revathi
    Khan, Eraj
    Khan, Samee U.
    Vasilakos, Athanasios V.
    Li, Keqin
    Zomaya, Albert Y.
    [J]. IEEE SYSTEMS JOURNAL, 2017, 11 (02): : 395 - 404
  • [44] Reencryption Scheme for Secure Data Sharing
    Muthusenthil, B.
    Nivetha, D.
    Kim, Hyunsung
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), VOL. 1, 2016, : 1170 - 1174
  • [45] Secure Cloud Storage and File Sharing
    Rawal, Bharat S.
    Vivek, S. Sree
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2017, : 78 - 83
  • [46] Computationally Secure Secret Image Sharing
    Ahmadian, Amir M.
    Amirmazlaghani, Maryam
    [J]. 2017 25TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2017, : 2217 - 2222
  • [47] Application of homomorphism to secure image sharing
    Islam, Naveed
    Puech, William
    Hayat, Khizar
    Brouzet, Robert
    [J]. OPTICS COMMUNICATIONS, 2011, 284 (19) : 4412 - 4429
  • [48] Secure Device-to-Device Communications over WiFi Direct
    Shen, Wenlong
    Yin, Bo
    Cao, Xianghui
    Cai, Lin X.
    Cheng, Yu
    [J]. IEEE NETWORK, 2016, 30 (05): : 4 - 9
  • [49] A Secure and Efficient Handover Procedure Between WiFi and WiMAX Network
    Chen, Shuai-min
    Zheng, Xin-ying
    Wu, Mu-en
    Chen, Chien-ming
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER, NETWORK SECURITY AND COMMUNICATION ENGINEERING (CNSCE 2014), 2014, : 618 - 624
  • [50] Secure Data Sharing in Public Cloud
    Kanaparti, Venkataramana
    Kumar, Naveen R.
    Tatekalva, Sandhya
    Padmavathamma, M.
    [J]. FOURTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2012), 2012, 8334