{"created":"2025-01-19T01:36:01.357591+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00234274","sets":["581:11492:11498"]},"path":["11498"],"owner":"44499","recid":"234274","title":["Disruption-tolerant Local Authentication Method for Network Roaming Systems"],"pubdate":{"attribute_name":"公開日","attribute_value":"2024-05-15"},"_buckets":{"deposit":"9c4db34f-1df0-46e9-9f9c-a17710ab6556"},"_deposit":{"id":"234274","pid":{"type":"depid","value":"234274","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"Disruption-tolerant Local Authentication Method for Network Roaming Systems","author_link":["638191","638192"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Disruption-tolerant Local Authentication Method for Network Roaming Systems"},{"subitem_title":"Disruption-tolerant Local Authentication Method for Network Roaming Systems","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[一般論文] network roaming, isolated network, disaster-affected areas, in-flight Wi-Fi, local authentication","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2024-05-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Cyberscience Center, Tohoku University"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Cyberscience Center, Tohoku University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/234274/files/IPSJ-JNL6505009.pdf","label":"IPSJ-JNL6505009.pdf"},"date":[{"dateType":"Available","dateValue":"2026-05-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL6505009.pdf","filesize":[{"value":"2.2 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"5"},{"tax":["include_tax"],"price":"0","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"3b8ba84d-6802-4544-bd34-cd8dd346423a","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2024 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Hideaki, Goto"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Hideaki, Goto","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_publisher_15":{"attribute_name":"公開者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"A network roaming system allows users to join the wireless or wired networks at various places where they visit. Authentication is a necessary process in the roaming system not only to restrict non-eligible users from network use but also to protect users from malicious activities by attackers. Since the authentication process is provided by remote servers in the current roaming systems, some use cases such as Public Wi-Fi in disaster-affected areas and In-Flight Wi-Fi on passenger aircrafts suffer from service interruption due to network disruptions. We developed earlier a disruption-tolerant system for Public Wi-Fi in order to realize secure user authentication and to maintain local network use in temporarily isolated areas affected by natural disasters. Following its underlying idea and architecture, we have developed two practical schemes of local authentication for large-scale Wi-Fi roaming systems, and designed a framework for In-Flight Wi-Fi. One is certificate-based local authentication using digital certificates. The other utilizes HMAC (Hash-based Message Authentication Code) and benefits from the simplicity of conventional ID/password-based authentication methods. The functionalities are tested using Proof-of-Concept systems.\n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.32(2024) (online)\nDOI http://dx.doi.org/10.2197/ipsjjip.32.407\n------------------------------","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"A network roaming system allows users to join the wireless or wired networks at various places where they visit. Authentication is a necessary process in the roaming system not only to restrict non-eligible users from network use but also to protect users from malicious activities by attackers. Since the authentication process is provided by remote servers in the current roaming systems, some use cases such as Public Wi-Fi in disaster-affected areas and In-Flight Wi-Fi on passenger aircrafts suffer from service interruption due to network disruptions. We developed earlier a disruption-tolerant system for Public Wi-Fi in order to realize secure user authentication and to maintain local network use in temporarily isolated areas affected by natural disasters. Following its underlying idea and architecture, we have developed two practical schemes of local authentication for large-scale Wi-Fi roaming systems, and designed a framework for In-Flight Wi-Fi. One is certificate-based local authentication using digital certificates. The other utilizes HMAC (Hash-based Message Authentication Code) and benefits from the simplicity of conventional ID/password-based authentication methods. The functionalities are tested using Proof-of-Concept systems.\n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.32(2024) (online)\nDOI http://dx.doi.org/10.2197/ipsjjip.32.407\n------------------------------","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicIssueDates":{"bibliographicIssueDate":"2024-05-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"5","bibliographicVolumeNumber":"65"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"links":{},"id":234274,"updated":"2025-01-19T09:50:38.663488+00:00"}