Download Slide 1

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Security-focused operating system wikipedia , lookup

Access control wikipedia , lookup

Computer security wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Deep packet inspection wikipedia , lookup

Security and safety features new to Windows Vista wikipedia , lookup

Distributed firewall wikipedia , lookup

Electronic authentication wikipedia , lookup

Network tap wikipedia , lookup

Authentication wikipedia , lookup

Mobile security wikipedia , lookup

Unix security wikipedia , lookup

Wireless security wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Transcript
Wireless Hotspots: Current
Challenges and Future Directions
CSI5175 Wireless and Mobile Electronic Commerce
Networks and their Applications
Mao Zhang
2009.03.20
1
Content
 Introduction
 An example scenario
 Technological challenges
 Alternative approaches to connectivity
 Conclusions
2
Introduction
 Today, users access the Internet at a variety of places and environments where
they spend a considerable amount of time outside private networks.
 Wireless local area networks (WLANs) have emerged as a promising
networking platform to extend network connectivity to these public places, or
hotspots.
 WISPs have established Wi-Fi hotspots in increasing numbers at public venues.
 Several technological and deployment challenges remaining







3
Can roam anywhere?
Easy configuration?
A common way to authenticate?
Payment and billing?
Get bandwidth required?
Alternative network access technologies?
In summary, problems include authentication, security, coverage, management, location
services, billing, and interoperability.
An example scenario
 A scenario to motivate the vision of widespread Wi-Fi
availability and to explore the various barriers
 Kate needs to travel from San Diego to New York to attend a
business meeting.
 A presentation needs to send to colleagues before the departure
 Register with the meeting venue’sWi-Fi and get the location within the
building to be guided to the meeting room
 During the meeting, retrieve data from San Diego through VPN and
then share with colleagues over an in-room ad hoc wireless network
 Dinner time, CDMA 1xRTT card into Laptop to connect to the Internet
to locate a good restaurant and get driving directions
 Back to hotel, access emails using the hotel Wi-Fi network
4
Technological challenges –
Authenticating to the hotspot provider
 Sometimes, authentication is coupled with wireless-hop security
where only authorized users receive network access.
 Authentication helps the network to establish the users’ identity,
while wireless-hop security ensures data privacy for authenticated
users and protection for the network.
 Repeat authentication at each hotspot location and the process
might be configured differently.
 Research questions:
 Ease of access and mechanism
 Authentication Latency: existing hardware mechanisms such as SIM-Card
based authentication?
 User Identity: existing identities such as those already through other services
 3rd party authenticators?
5
Technological challenges – Wirelesshop security
 Security mechanisms provide data privacy to network users
and also protect the network against malicious use.
 Current approaches include per-user authentication,
authorization of authenticated users through access keys, and
access control, a number of schemes achieve security and
provide authentication at MAC are being deployed in W-Lans
 WEP is simple to manage in environment with known users.
 Port-based network access control: ports are configured to
block all traffic except authentication until the user identity is
established.- IEEE 802.1X
6
Technological challenges – Wirelesshop security - Continued
 Security challenges
 Mutual Trust: e.g., implicit trust in the key distributor inWEP
 Dynamic Key Management: simplified and transparent key exchange
and renew
 Hardware Approaches: Are there ways to provide the robustness of
802.1X through alternative hardware-based approaches?
 Denial-of-Service: Current 802.11Wi-Fi networks are highly
susceptible to denial-of-service (DoS) attacks
 Malicious Attacks: Hotspots are a comparatively open environment for
malicious users
7
Technological challenges – Network
performance and QoS
 The ability to adequately provide capacity and coverage to handle
dynamically-varying, location-dependent user load.
 Understand the users’ behavior
 Adapt to the changing resource availability or changing traffic
characteristics which is not easy
 Suggestion if adaptation is not possible
 Questions for research
 Measurement and Modeling
 Monitoring (measurements of throughput, channel contention, packet errors,
etc.)
 QoS Enforcement: How can MAC protocols be designed to guarantee users a
fair share of the wireless bandwidth and better channel utilization
8
Technological challenges – Location
and context-awareness
 Hotspots has the potential to make location and context-
aware services more valuable and readily accessible to users
 Requires a number of issues to be addressed
 Application scenarios
 Location Privacy and Anonymity: balance
 Sensor Fusion: possibility to integrate multiple location sensing
technologies
 Location Granularity: absolute location vs. relative location
 Location to Place: the capability to translate geographic location
information into a more usable form
9
Technological challenges – Pricing
model
 Wi-Fi revenues are comparatively poor, the networks are at a
disadvantage compared to their cellular counterpart due to
the lack of widespread coverage. But it has the potential to
offer users a higher bits/sec value.
 Related challenges:
 Subscription-based (prepaid) vs. pay-per-use model?
 Central Billing Entity
10
Alternative approaches to connectivity Multihop hotspots
 Multihop access increases the network diameter and allows
clients out of range of access points to receive connectivity.
 Challenges introduction:
 Node Mobility: the number of active nodes in the ad hoc network, the
network topology, and the volume of network traffic is constantly
changing
 Channel Interference: transmissions can cause interference at the access
points, degrading effective throughput and the channel capacity.
 Multiple Network Access: nodes in the multihop hotspot need: a wireless
network adapter with more than one radio; or a wireless network adapter
with the capability to multiplex connections from more than one
network ; or more than one wireless adapter.
11
Alternative approaches to connectivity Interoperation with WAN data services
 Interoperation between cellular and hotspot networks is beneficial
to both wireless carriers and hotspot operators.
 Hardware support: for both services on mobile devices to migrate the
connection across access technologies
 Software ability through sensing to switch to the most resource-efficient mode
of access
 The establishment of roaming relationships and agreements between network
operators for effective packet routing as users switch between them.
TOGEWAnet AG offers a seamless integration of WLAN and GSM GPRS
services and an integrated authentication, security, and billing over a common
infrastructure: www.weroam.com
 Handoff Mechanism
 Location-assisted Roaming
 System Support for Handoff: Is handoff initiated at the user device or by the
network?
 Billing
12
Conclusions
 The continuing rollout of hotspot deployment is being fueled by
the growing requirement for high-speed connectivity in public
areas
 A successful and viable hotspot business model will depend on the
extent that it can provide value for all its stakeholders
 End user: easy to use, economically attractive, and provides fast access
 Hotspot network providers: reliable and robust third-party
authenticating entity, establish peering agreements with other
providers and accommodate the various resource and performance
demands of the users.
 Premise and building owners: establish business agreements with
hotspot network providers to offer network access an everyday utility
for the end user.
13