Requirements for High-speed Internet Access in Public

Download Report

Transcript Requirements for High-speed Internet Access in Public

Requirements for Internet Access in
Public Places
Anand Balachandran
University of California, San Diego
http://www-cse.ucsd.edu/users/abalacha
Collaborators
Anand Balachandran (UCSD)
Allen Miu (MIT)
Geoff Voelker (UCSD)
03/20/2001
50th IETF Meeting, Minneapolis
Computing in Public Places
Current trend in Internet access
– Ubiquitous network connectivity infrastructure
• Not restricted to offices and homes
• Access at airports, shopping malls, convention centers
– Multiple access technologies (Ethernet, Wireless
LANs, Bluetooth, DSL modems etc.)
– Proliferation of lightweight portable mobile devices
– Use and pay model; “shopping” for access
03/20/2001
50th IETF Meeting, Minneapolis
Security in Public-area Networks
Current Schemes
– MAC-level Filtering
• No protection against hardware address spoofing; does not
scale
– WEP Key Security
• Keys are hard-wired and cannot be changed flexibly
• WEP keys can be broken over time
• OK for small enterprises, but does not scale well
– IEEE 802.1x port-based access control
• Access dependent – does not support APs that are not
IEEE compliant (e.g. HIPERLAN, HomeRF, Bluetooth)
• Requires changes to existing AP hardware and software
• TLS-based authentication requires user certificates
03/20/2001
50th IETF Meeting, Minneapolis
Our Vision
A protocol for network access should be:
– Hardware agnostic
• independent of access technology
– IP-version agnostic
• Works with both IPv4 and IPv6
– Individual-centric
• Allow network operators to track who is using the network and how it is
being used
• Give user a choice on how they are authenticated -- protect their
privacy
– Support multiple authentication schemes
• AAA (DIAMETER), Global authenticators, E-cash systems (MasterCard,
Visa)
• Support users who do not have a “home” domain
– Enables “free” access
• Payment is implicit – drives resident business for the host organization
03/20/2001
50th IETF Meeting, Minneapolis
Service Models
• Model 1: Free access to local resources
– Does not require authentication but needs a valid IP
address
– Allow access to the Intranet
• e.g. Mall portal, splash screens, indoor navigation service,
Starbucks coffee ordering etc.
• Model 2: Authenticate and pay
– Allow access to the Internet
– Allow applications like location-based buddy list,
spontaneous sales that are based on profiles etc.
– Differentiated charging
03/20/2001
50th IETF Meeting, Minneapolis
Scope of Our Access Protocol
• User-network Interaction
–
–
–
–
–
–
–
User automatically discovers the existence of the network
User gets a valid IP address (e.g. through DHCP)
User verifies authenticity of the server (e.g. certificates)
User provides personal credentials to authentication server
Server provides user with a “key” upon successful authentication
Key is time bounded (e.g. access limited to 30 minutes.)
Protocol is not tied to any single encryption scheme
• Protocol is decoupled from routing and location
updates for mobile hosts
– Can use Mobile IP for this
03/20/2001
50th IETF Meeting, Minneapolis
Research Fallout
• User Registration and Authentication Protocol
•
•
•
•
Multiple modes of authentication possible (including TLS)
Handles simple aspects of user-network interaction
Provides mutual client-server authentication
Key management and renewal
• Network discovery
• Protocol agnostic mechanism based on broadcast
beacons
• Complements existing standards
• mobility management and routing (mobile IP)
• AAA-type functionality on the NNI
Network deployed and operational in a mall
03/20/2001
50th IETF Meeting, Minneapolis
Experiences
Mall deployment
– Operational for 7 months
– Provides basic Internet access and location-based services
Ongoing efforts for campus deployment at UCSD
Related publications
– A. Miu and P. Bahl, “Dynamic Host Configuration for Managing
Mobility between Private and Public Networks,” In Proc. 3rd Usenix
Symposium on Internet Technologies and Systems (USITS’01),
San Francisco, CA, March 2001, to appear.
– P. Bahl, A. Balachandran, and S. Venkatachary, “Secure Broadband
Wireless Internet Access in Public Places,” In Proc. IEEE
International Conference on Communications (ICC’01), Helsinki,
Finland, June 2001, to appear.
03/20/2001
50th IETF Meeting, Minneapolis
Existing (Partial) Solutions for Access
• Mobile IP
– Essentially a routing protocol; integrates the tasks of
configuration and routing for mobile users in a
foreign domain
• AAA
– Addresses interaction between registration agents
in different administrative domains (NNI)
• Authenticated DHCP (UC Berkeley)
– Similar to port-based access control at Layer-3
• Netbar System at CMU and InSite at Michigan
– Hardware centric approaches
03/20/2001
50th IETF Meeting, Minneapolis
Network Architecture
Internet
Host Organization's Subnet
verifier 1
verifier 2
AP 1
verifier n
Authorizer
verifier 1 verifier 2
verifier m
Authorizer
AP 2
AP n
AP 1
AP 2
AP m
MN
MN
MN
MN
MN
MN
MN
MN
PANS Client
03/20/2001
Wireless Subnet 1
50th IETF Meeting, Minneapolis
MN
MN
Wireless Subnet 2
Discovery Protocol
Detects the existence of the network service
– Decouple discovery from configuration protocol
• Remain protocol-agnostic
– Server broadcasts service beacons in the local
network
• Passive approach to avoid unwanted solicitation
messages in the private network
• Better alternative to client polling (saves network
bandwidth, especially the air interface)
• Beaconing can be used for network-wide load-balancing,
fail-over, and location services
03/20/2001
50th IETF Meeting, Minneapolis