Decentralised Access Control in 802.11 Networks

  • Marco Domenico Aime
  • Antonio Lioy
  • Gianluca Ramunno
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3677)


The current WiFi access control framework descends from solutions conceived in the past for dial-up scenarios. A key difference between the two worlds is mobility: dial-up handles nomadic users, while modern wireless networks support continuous mobility through always-on personal devices. Not surprisingly, WiFi authentication does not exploit mobility in any way; on the contrary, mobility is perceived as a problem to be fixed by some fast-handoff solution. Though fast-handoff is indeed an open issue, mobility may even help to build security systems. The paper describes a decentralised access control framework for WiFi networks that exploits mobility to avoid a central authority to be always online.


Access Control Medium Access Control Terminal Mobility Central Authority Embedding Strategy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    IEEE: Std 802.11i/d7.0, part 11: Wireless medium access control (MAC) and physical layer (PHY) specifications: Medium access control (MAC) security enhancements (2003)Google Scholar
  2. 2.
    IEEE: P802.11f/d5, recommended practice for multi-vendor access point interoperability via an inter-access point protocol across distribution systems supporting IEEE 802.11 operation (2003)Google Scholar
  3. 3.
    Mishra, A., Shin, M., Arbaugh, W.A.: Proactive key distribution to support fast and secure roaming. Submission to IEEE 802.11 Working Group 802.11-03/084r0 (2003)Google Scholar
  4. 4.
    Mishra, A., Shin, M., Arbaugh, W.A.: Pro-active key distribution using neighbor graphs. Technical report, Department of Computer Science, University of Maryland College Park, MD, USA (2003)Google Scholar
  5. 5.
    Capkun, S., Hubaux, J.P., Buttyan, L.: Mobility helps security in ad hoc networks. In: Proc. of the 4th ACM international symposium on Mobile Ad Hoc Networking & Computing (MobiHoc), pp. 46–56 (2003)Google Scholar
  6. 6.
    Wohlmacher, P.: Digital certificates: a survey of revocation methods. In: Proc. of the 2000 ACM workshops on Multimedia, pp. 111–114 (2000)Google Scholar
  7. 7.
    Rivest, R.L.: Can we eliminate certificate revocation lists? In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 178–183. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  8. 8.
    Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 61–76. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  9. 9.
    Newman, M.E.J.: The structure and function of complex networks. SIAM Review 45(2), 167–256 (2003)MathSciNetCrossRefzbMATHGoogle Scholar
  10. 10.
    Wang, Y., Chakrabarti, D., Wang, C., Faloutsos, C.: Epidemic spreading in real networks: An eigenvalue viewpoint. In: 22nd Symposium on Reliable Distributed Systems (SRDS), pp. 25–34 (2003)Google Scholar
  11. 11.
    Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: EuroCr # 2001, pp. 93–117 (2001)Google Scholar
  12. 12.
    Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: Authentication in ad-hoc wireless networks. In: Proc. of Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA (2002)Google Scholar
  13. 13.
    Stajano, F., Anderson, R.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Proc. of the 7th International Workshop on Security Protocols, Cambridge, UK, pp. 172–194 (2000)Google Scholar
  14. 14.
    Cooper, D.A.: A more efficient use of delta-CRLs. In: IEEE Symposium on Security and Privacy (S&P), pp. 190–202 (2000)Google Scholar
  15. 15.
    Benaloh, J., de Mare, M.: One-way accumulators: A decentralized alternative to digital signatures. In: EuroCr # 93, pp. 274–285 (1994)Google Scholar
  16. 16.
    Watts, D., Strogatz, S.: Collective dynamics of ’small-world’ networks. Nature 393, 440–442 (1998)CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2005

Authors and Affiliations

  • Marco Domenico Aime
    • 1
  • Antonio Lioy
    • 1
  • Gianluca Ramunno
    • 1
  1. 1.Dipartimento di Automatica e InformaticaPolitecnico di TorinoTorinoItaly

Personalised recommendations