Authenticating privately over public Wi-Fi hotspots

Aldo Cassola, Erik Oliver Blass, Guevara Noubir

Producción científica: Capítulo del libro/informe/acta de congresoContribución a la conferenciarevisión exhaustiva

8 Citas (Scopus)

Resumen

Wi-Fi connectivity using open hotspots hosted on untrusted Access Points (APs) has been a staple of mobile network deployments for many years as mobile providers seek to offload smartphone traffic to Wi-Fi. Currently, the available hotspot solutions allow for mobility patterns and client identities to be monitored by the parties hosting the APs as well as by the underlying service provider. We propose a protocol and system that allows a service provider to authenticate its clients, and hides the client identity from both AP and service provider at the time of authentication. Particularly, the client is guaranteed that either the provider cannot do better than to guess their identity randomly or they obtain proof that the provider is trying to reveal their identity by using different keys. Our protocol is based on Private Information Retrieval (PIR) with an augmented cheating detection mechanism based on our extensions to the NTRU encryption scheme. The somewhat-homomorphic encryption makes auditing of multiple rows in a single query possible, and optimizes PIR for highly parallel GPU computations with the use of the Fast Fourier Transform (FFT). In this work we lay out the operation of our protocol in detail, its security analysis, and propose an implementation compatible with the Wi-Fi Extensible Authentication Protocol (EAP) along with optimizations for deployments of over 10 million clients. We evaluate the performance of its mobile and provider components, and show that a client can be authenticated in 43.9 milliseconds on a GPU platform, giving an end-to-end authentication of 1.12 seconds.

Idioma originalInglés
Título de la publicación alojadaCCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
EditorialAssociation for Computing Machinery
Páginas1346-1357
Número de páginas12
ISBN (versión digital)9781450338325
DOI
EstadoPublicada - 12 oct. 2015
Evento22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015 - Denver, Estados Unidos
Duración: 12 oct. 201516 oct. 2015

Serie de la publicación

NombreProceedings of the ACM Conference on Computer and Communications Security
Volumen2015-October
ISSN (versión impresa)1543-7221

Conferencia

Conferencia22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015
País/TerritorioEstados Unidos
CiudadDenver
Período12/10/1516/10/15

Huella

Profundice en los temas de investigación de 'Authenticating privately over public Wi-Fi hotspots'. En conjunto forman una huella única.

Citar esto