On the Feasibility of Attribute-Based Encryption for WLAN Access Control

被引:0
作者
Pisa, Claudio [1 ]
Dargahi, Tooska [1 ]
Caponi, Alberto [1 ]
Bianchi, Giuseppe [1 ]
Blefari-Melazzi, Nicola [1 ]
机构
[1] Univ Roma Tor Vergata, CNIT, Rome, Italy
来源
2017 IEEE 13TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB) | 2017年
关键词
WLAN Access Control; Attribute-Based Access Control; Multi-Authority Attribute-Based Encryption; Embedded Device;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
User authentication at Wi-Fi Access Points (APs) is becoming an important issue. Wi-Fi APs are indeed ubiquitous, but existing authentication methods such as WPA/WPA2 static pre-shared secret key (PSK), or 802. IX-based online authentication services (e.g., RADIUS servers/proxies) have their theoretical or practical limitations. In a previous work, we proposed WI-FAB, a new authentication mechanism which neither requires online backend access control infrastructure, nor relies on a static pre-shared secret key. In this paper, we extend WI-FAB by removing the need for having a central authority for user authentication and credential issuing. Our main contribution is twofold: (i) adopting decentralized multi-authority CP-ABE, we support the users who have authentication/authorization credentials from multiple authorities. We decouple the user credentials issuing from the management of the WPA2-PSK, so that neither the credential issuing authority can track the users, nor the AP can access the real identity of the users. Considering an extensive attack model, we show that the proposed approach is secure and preserves the privacy of the users. (ii) We provide a real-world implementation of the proposed approach on off-the-shelf embedded hardware to demonstrate its feasibility and efficiency.
引用
收藏
页码:783 / 790
页数:8
相关论文
共 28 条
[1]  
Ambrosin M., 2016, IEEE MICRO
[2]  
[Anonymous], 2016, P 8 ACM INT WORKSHOP, DOI DOI 10.1145/2944789.2949546
[3]  
[Anonymous], 2002, P 9 ACM C COMP COMM
[4]  
[Anonymous], 2016, OAUTH ABC ATTACK ALI
[5]  
[Anonymous], 2017, Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2016-2021 White Paper
[6]  
[Anonymous], P 14 ACM C COMP COMM
[7]  
[Anonymous], 2010, IEEE Standard for Information TechnologyLocal and Metropolitan Area NetworksSpecific RequirementsPart 11: Wireless LAN Medium Access Control (mac) and Physical Layer (PHY) Specifications Amendment 6: Wireless access in Vehicular Environments, DOI DOI 10.1109/IEEESTD.2010.5514475
[8]  
Arana P., 2006, INFS, V612, P1
[9]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[10]  
Boland H., 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513), P333, DOI 10.1109/CCECE.2004.1345023