WEKO3
アイテム
Disruption-tolerant Local Authentication Method for Network Roaming Systems
https://ipsj.ixsq.nii.ac.jp/records/234274
https://ipsj.ixsq.nii.ac.jp/records/23427474469e3e-e23b-4955-99da-2ec844934b40
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]()
2026年5月15日からダウンロード可能です。
|
Copyright (c) 2024 by the Information Processing Society of Japan
|
|
非会員:¥0, IPSJ:学会員:¥0, 論文誌:会員:¥0, DLIB:会員:¥0 |
Item type | Journal(1) | |||||||
---|---|---|---|---|---|---|---|---|
公開日 | 2024-05-15 | |||||||
タイトル | ||||||||
タイトル | Disruption-tolerant Local Authentication Method for Network Roaming Systems | |||||||
タイトル | ||||||||
言語 | en | |||||||
タイトル | Disruption-tolerant Local Authentication Method for Network Roaming Systems | |||||||
言語 | ||||||||
言語 | eng | |||||||
キーワード | ||||||||
主題Scheme | Other | |||||||
主題 | [一般論文] network roaming, isolated network, disaster-affected areas, in-flight Wi-Fi, local authentication | |||||||
資源タイプ | ||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||
資源タイプ | journal article | |||||||
著者所属 | ||||||||
Cyberscience Center, Tohoku University | ||||||||
著者所属(英) | ||||||||
en | ||||||||
Cyberscience Center, Tohoku University | ||||||||
著者名 |
Hideaki, Goto
× Hideaki, Goto
|
|||||||
著者名(英) |
Hideaki, Goto
× Hideaki, Goto
|
|||||||
論文抄録 | ||||||||
内容記述タイプ | Other | |||||||
内容記述 | A network roaming system allows users to join the wireless or wired networks at various places where they visit. Authentication is a necessary process in the roaming system not only to restrict non-eligible users from network use but also to protect users from malicious activities by attackers. Since the authentication process is provided by remote servers in the current roaming systems, some use cases such as Public Wi-Fi in disaster-affected areas and In-Flight Wi-Fi on passenger aircrafts suffer from service interruption due to network disruptions. We developed earlier a disruption-tolerant system for Public Wi-Fi in order to realize secure user authentication and to maintain local network use in temporarily isolated areas affected by natural disasters. Following its underlying idea and architecture, we have developed two practical schemes of local authentication for large-scale Wi-Fi roaming systems, and designed a framework for In-Flight Wi-Fi. One is certificate-based local authentication using digital certificates. The other utilizes HMAC (Hash-based Message Authentication Code) and benefits from the simplicity of conventional ID/password-based authentication methods. The functionalities are tested using Proof-of-Concept systems. ------------------------------ This is a preprint of an article intended for publication Journal of Information Processing(JIP). This preprint should not be cited. This article should be cited as: Journal of Information Processing Vol.32(2024) (online) DOI http://dx.doi.org/10.2197/ipsjjip.32.407 ------------------------------ |
|||||||
論文抄録(英) | ||||||||
内容記述タイプ | Other | |||||||
内容記述 | A network roaming system allows users to join the wireless or wired networks at various places where they visit. Authentication is a necessary process in the roaming system not only to restrict non-eligible users from network use but also to protect users from malicious activities by attackers. Since the authentication process is provided by remote servers in the current roaming systems, some use cases such as Public Wi-Fi in disaster-affected areas and In-Flight Wi-Fi on passenger aircrafts suffer from service interruption due to network disruptions. We developed earlier a disruption-tolerant system for Public Wi-Fi in order to realize secure user authentication and to maintain local network use in temporarily isolated areas affected by natural disasters. Following its underlying idea and architecture, we have developed two practical schemes of local authentication for large-scale Wi-Fi roaming systems, and designed a framework for In-Flight Wi-Fi. One is certificate-based local authentication using digital certificates. The other utilizes HMAC (Hash-based Message Authentication Code) and benefits from the simplicity of conventional ID/password-based authentication methods. The functionalities are tested using Proof-of-Concept systems. ------------------------------ This is a preprint of an article intended for publication Journal of Information Processing(JIP). This preprint should not be cited. This article should be cited as: Journal of Information Processing Vol.32(2024) (online) DOI http://dx.doi.org/10.2197/ipsjjip.32.407 ------------------------------ |
|||||||
書誌レコードID | ||||||||
収録物識別子タイプ | NCID | |||||||
収録物識別子 | AN00116647 | |||||||
書誌情報 |
情報処理学会論文誌 巻 65, 号 5, 発行日 2024-05-15 |
|||||||
ISSN | ||||||||
収録物識別子タイプ | ISSN | |||||||
収録物識別子 | 1882-7764 | |||||||
公開者 | ||||||||
言語 | ja | |||||||
出版者 | 情報処理学会 |