期刊文献+

Secure Application-Aware Service Differentiation in Public Area Wireless Networks

Secure Application-Aware Service Differentiation in Public Area Wireless Networks
原文传递
导出
摘要 We are witnessing the increasing demand for pervasive Internet access from public area wireless networks (PAWNs). As their popularity grows, the inherent untrusted nature of public places and the diverse service requirements of end users are two key issues that need to be addressed. We have proposed two approaches to address these issues. First, the Home-based Authentication Protocol (HAP) that provides a framework by which to establish trust between a nomadic client and a service provider using a trusted third party (home). Second, we argue that the best-effort-based service model provided by many access points is not enough to satisfy the end user fairness and to maximize the wireless link utilization for a diverse user population. We have proposed an application-aware service differentiation (AASD) mechanism that takes both application semantics and user requirements into consideration. Our analysis of this framework shows several fruitful results. The total authentication latency increases with the number of clients but at a rate that is much less than linear increasing latency. Also, in comparison with two other bandwidth allocation approaches, the best effort and static access control, our proposed application-aware service differentiation method, outperforms them in terms of the client fairness and wireless bandwidth utilization. We are witnessing the increasing demand for pervasive Internet access from public area wireless networks (PAWNs). As their popularity grows, the inherent untrusted nature of public places and the diverse service requirements of end users are two key issues that need to be addressed. We have proposed two approaches to address these issues. First, the Home-based Authentication Protocol (HAP) that provides a framework by which to establish trust between a nomadic client and a service provider using a trusted third party (home). Second, we argue that the best-effort-based service model provided by many access points is not enough to satisfy the end user fairness and to maximize the wireless link utilization for a diverse user population. We have proposed an application-aware service differentiation (AASD) mechanism that takes both application semantics and user requirements into consideration. Our analysis of this framework shows several fruitful results. The total authentication latency increases with the number of clients but at a rate that is much less than linear increasing latency. Also, in comparison with two other bandwidth allocation approaches, the best effort and static access control, our proposed application-aware service differentiation method, outperforms them in terms of the client fairness and wireless bandwidth utilization.
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2005年第5期676-688,共13页 计算机科学技术学报(英文版)
关键词 mutual authentication service differentiation public-area wireless network mutual authentication, service differentiation, public-area wireless network
  • 相关文献

参考文献24

  • 1Bahl P, Russell W, Wang Yet al. PAWNs: Satisfying the need for ubiquitous secure connectivity and location services.IEEE Personal Communications Magazine, February 2002,9(1): 40-48.
  • 2Public-Key Infrastructure (X.509). http://www.ieft.org/html.charters/pkix-charter.html.
  • 3IEEE Stci 802.11 - Wireless LAN medium access control(MAC) and physical layer (PHY) specifications, 1997.
  • 4Zhang L, Deering S, Estrin D. RSVP: A new resource ReSer-Vation protocol. IEEE Network, September 1993, 7(5): 8-18.
  • 5Breslau L, Knightly E, Shenker Set al. Endpoint admission control: Architectural issues and performance. In Proc. SIGCOMM. Stockholm, Sweden, September 2000, pp.57-69.
  • 6B Clifford Neumann, T Ts'o. Kerberos: An authentication service for computer networks. IEEE Communications Magazine, September 1994, 32(9): 33-38.
  • 7Balachanciran A, Voelker G, Bahl P, Rangan V. Characterizing user behavior and network performance in a public wireless LAN. In Proc. ACM SIGMETRICS 2002, Marina Del Rey, CA, June 2002.
  • 8Barford P, Crovella M E. Generating representative web workloads for network and server performance evaluation. In Proc. Perforvnance'98/ACM SIGMETRICS '98, Madison,WI, July, 1998.
  • 9Zhu Z, Mao Y, Shi W. Workload characterization of uncacheable web content. In Proc. the 4th Int. Conf. Web Enqineering (ICWE'04), Munich, Germany, July 2004.
  • 10Krishnamurthy B, Rexford J. Web Protocols and Practice:HTTP/1.1, Networking Protocols, Caching and Traffic Measurement. Addison-Wesley, Inc, 2001.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部