【24h】

Wifi authentication through social networks — A decentralized and context-aware approach

机译:通过社交网络进行Wifi身份验证-一种分散的,上下文相关的方法

获取原文

摘要

With the proliferation of WiFi-enabled devices, people expect to be able to use them everywhere, be it at work, while commuting, or when visiting friends. In the latter case, home owners are confronted with the burden of controlling the access to their WiFi router, and usually resort to simply sharing the password. Although convenient, this solution breaches basic security principles, and puts the burden on the friends who have to enter the password in each and every of their devices. The use of social networks, specifying the trust relations between people and devices, provides for a more secure and more friendly authentication mechanism. In this paper, we progress the state-of-the-art by abandoning the centralized solution to embed social networks in WiFi authen-tication; we introduce EAP-SocTLS, a decentralized approach for authentication and authorization of WiFi access points and other devices, exploiting the embedded trust relations. In particular, we address the (quadratic) search complexity when indirect trust relations, like the smartphone of a friend's kid, are involved. We show that the simple heuristic of limiting the search to friends and devices in physical proximity makes for a scalable solution. Our prototype implementation, which is based on WebID and EAP-TLS, uses WiFi probe requests to determine the pool of neighboring devices and was shown to reduce the search time from 1 minute for the naive policy down to 11 seconds in the case of granting access over an indirect friend.
机译:随着具有WiFi功能的设备的泛滥,人们期望能够在任何地方使用它们,无论是在工作中,通勤时还是在拜访朋友时。在后一种情况下,房主面临着控制对其WiFi路由器的访问的负担,并且通常只能简单地共享密码。尽管方便,但该解决方案违反了基本的安全原则,并给必须在其每个设备中输入密码的朋友增加了负担。社交网络的使用指定了人与设备之间的信任关系,从而提供了一种更安全,更友好的身份验证机制。在本文中,我们放弃了将社交网络嵌入WiFi身份验证的集中式解决方案,从而实现了最新技术。我们介绍EAP-SocTLS,这是一种利用嵌入式信任关系对WiFi接入点和其他设备进行身份验证和授权的分散式方法。特别是,当涉及间接信任关系(例如朋友孩子的智能手机)时,我们解决了(二次)搜索复杂性的问题。我们证明了将搜索限制在物理上邻近的朋友和设备上的简单启发式方法可提供可扩展的解决方案。我们基于WebID和EAP-TLS的原型实现使用WiFi探测请求来确定相邻设备的池,并被证明可以将天真的策略的搜索时间从1分钟减少到11秒(在授予访问权限的情况下)间接的朋友。

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号