Abstract
Cross-domain roaming in Wi-Fi networks is ubiquitous and the frequency of global roaming of users has increased dramatically in recent years. To ensure network security, it is important to authenticate users belonging to different domains. Existing solutions like eduroam leverage a centralized and hierarchical architecture to authenticate users, which leads to serious performance and security issues in practice. In this paper, we propose Trustroam, a novel cross-domain authentication scheme in Wi-Fi networks based on blockchain. Different from traditional hierarchical solutions, Trustroam authenticates users and servers in a distributed and anonymous manner, avoiding several serious problems such as single point of failure and privacy leakage. Through the distributed consensus mechanism and mutual authentication, our scheme is highly fault tolerant to handle compromised server attacks. We implemented the Trustroam prototype in a real testbed. Experimental and evaluation results show that our scheme is superior to existing hierarchical solutions in terms of scalability, security and privacy preserving. Besides, Trustroam is an effective solution that can be conveniently and incrementally deployed in practical environments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Eduroam. https://www.eduroam.org/wp-content/uploads/2016/05/The-Global-Village.pdf. Accessed 19 Jan 2019
Eduroam. https://www.eduroam.org. Accessed 17 Jan 2019
Wierenga, K., Winter, S., Wolniewicz, T.: The Eduroam architecture for network roaming. RFC 7593, September 2015
Rigney, C., Rubens, A., Simpson, W., Willens, S.: Remote authentication dial in user service (RADIUS). RFC 2865, June 2000
Brenza, S., Pawlowski, A., Pöpper, C.: A practical investigation of identity theft vulnerabilities in Eduroam. In: Proceedings of ACM WiSec 2015, New York City, USA, June 2015
Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly Media Inc., Newton (2015)
Sanda, T., Inaba, H.: Proposal of new authentication method in Wi-Fi access using bitcoin 2.0. In: Proceedings of IEEE GCCE 2016, Kyoto, Japan, December 2016
Liu, D., Li, D., Liu, X., Ma L., Yu, H., Zhang, H.: Research on a cross-domain authentication scheme based on consortium blockchain in V2G networks of smart grid. In: Proceedings of IEEE EI2 2018, Beijing, China, October 2018
Winter, S., McCauley, M., Venaas, S., Wierenga, K.: Transport layer security (TLS) encryption for RADIUS. RFC 6614, May 2012
Liu, H., Goto, H.: Certificate-based, disruption-tolerant authentication system with automatic CA certificate distribution for Eduroam. In: 2014 IEEE 38th International Computer Software and Applications Conference Workshops (COMPSACW), Vasteras, Sweden, September 2014
Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139–147. Springer, Heidelberg (1993). https://doi.org/10.1007/3-540-48071-4_10
Buterin, V.: What proof of stake is and why it matters, August 2013
EOSIO White Paper v2. https://github.com/EOSIO/Documentation/blob/master. Accessed 27 Jan 2019
Ethereum. https://www.ethereum.org. Accessed 29 Jan 2019
Ethereum White Paper. https://github.com/ethereum/wiki/wiki/White-Paper. Accessed 19 Jan 2019
Open vSwitch. https://www.openvswitch.org. Accessed 5 Jan 2019
Acknowledgement
This work is supported by the National Key Research and Development Plan of China (2017YFB0801702).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Li, C., Wu, Q., Li, H., Liu, J. (2019). Trustroam: A Novel Blockchain-Based Cross-Domain Authentication Scheme for Wi-Fi Access. In: Biagioni, E., Zheng, Y., Cheng, S. (eds) Wireless Algorithms, Systems, and Applications. WASA 2019. Lecture Notes in Computer Science(), vol 11604. Springer, Cham. https://doi.org/10.1007/978-3-030-23597-0_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-23597-0_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-23596-3
Online ISBN: 978-3-030-23597-0
eBook Packages: Computer ScienceComputer Science (R0)