{"title":"低成本无线网络的分布式认证","authors":"S. Machiraju, Hao Chen, J. Bolot","doi":"10.1145/1411759.1411774","DOIUrl":null,"url":null,"abstract":"Cost is one of the key challenges facing the deployment of wireless networks. Though 802.11-based networks have shown that costly, licensed spectrum is not always necessary, the costs of other components especially backhaul and network equipment continue to impede the growth of mobile wireless networks. In this paper, we provide some insights into how such costs can be reduced by designing a novel, low-cost authentication infrastructure for wireless networks. Our authentication scheme relies on base stations to collectively store authentication information. Thus, it eliminates the need to maintain costly infrastructure required by the traditional centralized scheme. Moreover, our scheme is optimized for mobility-induced handover \"re-authentication\" and, hence, reduces the authentication overhead.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"36 1","pages":"55-59"},"PeriodicalIF":0.0000,"publicationDate":"2008-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Distributed authentication for low-cost wireless networks\",\"authors\":\"S. Machiraju, Hao Chen, J. Bolot\",\"doi\":\"10.1145/1411759.1411774\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cost is one of the key challenges facing the deployment of wireless networks. Though 802.11-based networks have shown that costly, licensed spectrum is not always necessary, the costs of other components especially backhaul and network equipment continue to impede the growth of mobile wireless networks. In this paper, we provide some insights into how such costs can be reduced by designing a novel, low-cost authentication infrastructure for wireless networks. Our authentication scheme relies on base stations to collectively store authentication information. Thus, it eliminates the need to maintain costly infrastructure required by the traditional centralized scheme. Moreover, our scheme is optimized for mobility-induced handover \\\"re-authentication\\\" and, hence, reduces the authentication overhead.\",\"PeriodicalId\":88972,\"journal\":{\"name\":\"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications\",\"volume\":\"36 1\",\"pages\":\"55-59\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-02-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/1411759.1411774\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1411759.1411774","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Distributed authentication for low-cost wireless networks
Cost is one of the key challenges facing the deployment of wireless networks. Though 802.11-based networks have shown that costly, licensed spectrum is not always necessary, the costs of other components especially backhaul and network equipment continue to impede the growth of mobile wireless networks. In this paper, we provide some insights into how such costs can be reduced by designing a novel, low-cost authentication infrastructure for wireless networks. Our authentication scheme relies on base stations to collectively store authentication information. Thus, it eliminates the need to maintain costly infrastructure required by the traditional centralized scheme. Moreover, our scheme is optimized for mobility-induced handover "re-authentication" and, hence, reduces the authentication overhead.