Abstract
We have studied the case of deploying services in public wireless networks based on IEEE802.11 standard. Due to low cost, easy deployment, cost effectiveness and high performance, this technology appears as a very attractive solution for providing internet access and services in public places called hotspot like airports, hotels, train stations... etc Actually, there are numerous solutions that allow user management in WLAN networks. However, most of them do not support multiple service providers and provide all users with the same level of services to Internet access. In our paper, we propose a new software management architecture for hotspot networks, which is based on policy-based management principles introduced as a result of collaboration with the IETF. Our solution enables multiple service provider support and it allows user and service differentiation in hotspot networks. It provides efficient, flexible and scalable user management solution by implementing coherent combination of AAA functions, quality of service guarantee and security assurance for hotspot operators and service providers. For policy configuration, XML schemes have been defined, offering open, easy and customizable management architecture. Moreover, since our solution is layer 2 agnostic, it can be extended to different access technologies such as DSL, PLC... This management architecture has been implemented, tested and validated on the 6WINDGateTM routers and it can easily be ported onto other software architectures and open standard platforms.
Chapter PDF
References
References
IEEE. 802.11b/d3.0 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, August 1999.
Junbiao Zhang and al, “Virtual Operator based AAA in Wireless LAN Hot Spots with Ad-hoc Networking Support”, Mobile Computing and Communications Review, Volume 6, Number 3.
TerrySchmidt andAnthonyTownsend, “Why WI-FI Wants to be free”, Communications of the ACM, Vol. 46, N° 5, May 2003.
Joseph W.Graham II, “Authenticating Public Access networking”, SIGUCCS’02, November 20–23, 2002, Providence, Rhode Island, USA.
Upkar Varshney and Ron Vetter, “Emerging Mobile and Wireless Networks”, Communications of the ACM, Vol. 43, N°. 6, June 2000.
Rajeswari Malladi and Dharma P. Agrawal, “Current and Future Applications of Mobile and Wireless Networks”, Communications of the ACM, Vol. 45, N°. 10, October 2002.
IEEE Daft P802.1X/D11: Standard for Port based Network Access Control, LAN MAN Standards Committee of the IEEE Computer Society, March 27,2001.
Pekka Nikander, “Authorization and charging in public WLANs using Free BSD and 802”. Ix, USENIX annual technical conference, June 10–1 2002.
Jim Martin, and Arne Nilson, “On Service Level Agreements for IP Networks”, IEEE Infocom Conference, June 2002.
S. Salsano et al., “Definition and usage of SLS in the AQUILA Consortium”, Internet Draft, November 2000.
Bob Moore, Ed Ellesson, John Strassner, and Andrea Westerinen, “RFC 3060: Policy Core Information Model — version 1 Specification”. IETF, February 2001.
J Jason, L Rafalow, and E Vyncke, “IPsec Configuration Policy Model”, Internet draft, November 2001.
Y Snir, Y Ramberg, J Strassner, R Cohen, and B Moore, “Policy QoS Information Model”, Internet draft, November 2001.
Raj Yvatkar, Dimitrios Pendarakis, and Rocj Guerin, “RFC 2753: A Framework for Policy-Based Admission Control”. IETF, Informational, January 2000.
A. Westrinen and al, “RFC 3198: Terminology for Policy Based Management”, IETF, November 2001.
David Kosiur, “Understanding Policy-Based Networking”. Wiley Computer Publishing, 2001.
L. Blunk and J. Vollbrecht, “RFC 2284: PPP Extensible Authentication Protocol (EAP)”. IETF, March 1998.
C. Rigney, S. Willens, A. Rubens, and W. Simpson, “RFC 2865: Remote Authentic ation Dial in User Service (Radius)”, IETF, June 2000.
Alper E. Yegin, Yoshihiro Ohba, Reinaldo Penno, George Tsirtsis and Cliff Wang, “Protocol for Carrying Authentication for Network Access (PANA) Requirements”, Internet Draft , June 2003.
P. Kalhoun and al., “Light Weight Access Point Protocol”, Internet Draft, June 2003.
S. Kent, and R. Atkinson, “RFC 2401: Security Architecture for the Internet Protocol”,IETF, November 1998.
INFRADIO Project: http://rp.ljp6.fr/infradio/
Charny, B. (2002c). Want Wi-Fi? Verizon takes it home. CNETNews.com, October 9.
A. Mahler and C. Steinfield The Evolving Hot Spot Market for Broadband Access “ITU Telecom World 2003 Forum panel on Technologies for Broadband, Geneva, October 2003”
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 IFIP International Federation for Information Processing
About this paper
Cite this paper
Fodil, I., Jardin, V. (2004). Security and Differentiated Hotspot Services Through Policy-Based Management Architecture. In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds) Security and Protection in Information Processing Systems. SEC 2004. IFIP — The International Federation for Information Processing, vol 147. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8143-X_34
Download citation
DOI: https://doi.org/10.1007/1-4020-8143-X_34
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-8016-1
Online ISBN: 978-1-4020-8143-9
eBook Packages: Springer Book Archive