By Topic

Design and Implementation of a Secure Public Wireless Internet Service Model Using Host Identity Protocol

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Takahashi, A. ; Grad. Sch. of Inf., Kyoto Univ., Kyoto, Japan ; Maeda, T. ; Okabe, Y.

In an ideal ubiquitous network, everyone can access the Internet when some connectivity exists there. A network administrator is supposed to provide a connection to public visitors securely. In this paper, we propose a secure public wireless Internet service model using Host identity Protocol (HIP). Services based on the model allow everyone to provide a connection. We give some consideration to its risks. Our goal is to implement and evaluate the model. The network administrator is responsible for tracing malicious users who attempt to access a global network. We call this traceability ensurance. In conventional Internet access services, a malicious user who has attacked someone can make excuses and may put the blame on the network administrator. The network administrator wants to prove that he himself has not committed malicious accesses, and to make sure that the malicious user cannot put the blame on others, that is, nonrepudiation should be ensured. To authenticate users, the network administrator needs to manage many accounts and take logs. If a malicious user attacks a correspondent, he or she may raise a complaint to the administrator. They are the burden for the network administrator. Our model ensures the traceability of users and the nonrepudiation. Our model also reduces the management work of network administrators. Installation cost of our model is low because we apply HIP without any modification, thus the network administrator can provide and the users can use the network securely without adopting a complex system. To protect from some attacks, we implement a gateway system. As a qualitative evaluation, we confirm that the system works in the real environment.

Published in:

Applications and the Internet (SAINT), 2012 IEEE/IPSJ 12th International Symposium on

Date of Conference:

16-20 July 2012