University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home

Manulis, M, Leroy, D, Koeune, F, Bonaventure, O and Quisquater, J-J (2009) Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home In: ACM Symposium on Information, Computer and Communications Security (ASIACCS 2009), 2009-03-10 - 2009-03-12, Sydney, Australia.

[img]
Preview
PDF
MaLeKoBoQu_ASIACCS09.pdf
Available under License : See the attached licence file.

Download (358kB)
[img]
Preview
PDF (licence)
SRI_deposit_agreement.pdf

Download (33kB)

Abstract

In wireless roaming a mobile device obtains a service from some foreign network while being registered for the similar service at its own home network. However, recent proposals try to keep the service provider role behind the home network and let the foreign network create a tunnel connection through which all service requests of the mobile device are sent to and answered directly by the home network. Such Wireless Roaming via Tunnels (WRT) offers several (security) benefits but states also new security challenges on authentication and key establishment, as the goal is not only to protect the end-to-end communication between the tunnel peers but also the tunnel itself. In this paper we formally specify mutual authentication and key establishment goals for WRT and propose an efficient and provably secure protocol that can be used to secure such roaming session. Additionally, we describe some modular protocol extensions to address resistance against DoS attacks, anonymity of the mobile device and unlinkability of its roaming sessions, as well as the accounting claims of the foreign network in commercial scenarios.

Item Type: Conference or Workshop Item (Conference Paper)
Divisions : Faculty of Engineering and Physical Sciences > Computing Science
Authors :
AuthorsEmailORCID
Manulis, MUNSPECIFIEDUNSPECIFIED
Leroy, DUNSPECIFIEDUNSPECIFIED
Koeune, FUNSPECIFIEDUNSPECIFIED
Bonaventure, OUNSPECIFIEDUNSPECIFIED
Quisquater, J-JUNSPECIFIEDUNSPECIFIED
Date : 2009
Identification Number : 10.1145/1533057.1533072
Contributors :
ContributionNameEmailORCID
PublisherACM Press, UNSPECIFIEDUNSPECIFIED
Additional Information : Copyright 2009 ACM. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS’09)http://dx.doi.org/10.1145/1533057.1533072
Depositing User : Symplectic Elements
Date Deposited : 11 Jun 2013 18:15
Last Modified : 23 Sep 2013 20:01
URI: http://epubs.surrey.ac.uk/id/eprint/755169

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year


Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800