Decentralised Access Control in 802.11 Networks

  • Marco Domenico Aime
  • Antonio Lioy
  • Gianluca Ramunno
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3677)


The current WiFi access control framework descends from solutions conceived in the past for dial-up scenarios. A key difference between the two worlds is mobility: dial-up handles nomadic users, while modern wireless networks support continuous mobility through always-on personal devices. Not surprisingly, WiFi authentication does not exploit mobility in any way; on the contrary, mobility is perceived as a problem to be fixed by some fast-handoff solution. Though fast-handoff is indeed an open issue, mobility may even help to build security systems. The paper describes a decentralised access control framework for WiFi networks that exploits mobility to avoid a central authority to be always online.


  1. 1.
    IEEE: Std 802.11i/d7.0, part 11: Wireless medium access control (MAC) and physical layer (PHY) specifications: Medium access control (MAC) security enhancements (2003)Google Scholar
  2. 2.
    IEEE: P802.11f/d5, recommended practice for multi-vendor access point interoperability via an inter-access point protocol across distribution systems supporting IEEE 802.11 operation (2003)Google Scholar
  3. 3.
    Mishra, A., Shin, M., Arbaugh, W.A.: Proactive key distribution to support fast and secure roaming. Submission to IEEE 802.11 Working Group 802.11-03/084r0 (2003)Google Scholar
  4. 4.
    Mishra, A., Shin, M., Arbaugh, W.A.: Pro-active key distribution using neighbor graphs. Technical report, Department of Computer Science, University of Maryland College Park, MD, USA (2003)Google Scholar
  5. 5.
    Capkun, S., Hubaux, J.P., Buttyan, L.: Mobility helps security in ad hoc networks. In: Proc. of the 4th ACM international symposium on Mobile Ad Hoc Networking & Computing (MobiHoc), pp. 46–56 (2003)Google Scholar
  6. 6.
    Wohlmacher, P.: Digital certificates: a survey of revocation methods. In: Proc. of the 2000 ACM workshops on Multimedia, pp. 111–114 (2000)Google Scholar
  7. 7.
    Rivest, R.L.: Can we eliminate certificate revocation lists? In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 178–183. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  8. 8.
    Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 61–76. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  9. 9.
    Newman, M.E.J.: The structure and function of complex networks. SIAM Review 45(2), 167–256 (2003)MathSciNetCrossRefMATHGoogle Scholar
  10. 10.
    Wang, Y., Chakrabarti, D., Wang, C., Faloutsos, C.: Epidemic spreading in real networks: An eigenvalue viewpoint. In: 22nd Symposium on Reliable Distributed Systems (SRDS), pp. 25–34 (2003)Google Scholar
  11. 11.
    Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: EuroCr # 2001, pp. 93–117 (2001)Google Scholar
  12. 12.
    Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: Authentication in ad-hoc wireless networks. In: Proc. of Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA (2002)Google Scholar
  13. 13.
    Stajano, F., Anderson, R.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Proc. of the 7th International Workshop on Security Protocols, Cambridge, UK, pp. 172–194 (2000)Google Scholar
  14. 14.
    Cooper, D.A.: A more efficient use of delta-CRLs. In: IEEE Symposium on Security and Privacy (S&P), pp. 190–202 (2000)Google Scholar
  15. 15.
    Benaloh, J., de Mare, M.: One-way accumulators: A decentralized alternative to digital signatures. In: EuroCr # 93, pp. 274–285 (1994)Google Scholar
  16. 16.
    Watts, D., Strogatz, S.: Collective dynamics of ’small-world’ networks. Nature 393, 440–442 (1998)CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2005

Authors and Affiliations

  • Marco Domenico Aime
    • 1
  • Antonio Lioy
    • 1
  • Gianluca Ramunno
    • 1
  1. 1.Dipartimento di Automatica e InformaticaPolitecnico di TorinoTorinoItaly

Personalised recommendations