Browse > Article
http://dx.doi.org/10.7840/kics.2015.40.3.497

PS-Net : Personalized Secure Wi-Fi Networks  

Lee, Nam-Seh (Kangwon National University Department of Computer Engineering)
Lee, Ju-Ho (Kangwon National University Department of Computer Engineering)
Jeong, Choong-Kyo (Kangwon National University Department of Computer Engineering)
Abstract
Existing Wi-Fi networks require users to follow network settings of the AP (Access Point), resulting in inconveniences for users, and the password of the AP is shared by all users connected to the AP, causing security information leaks as time goes by. We propose, in this work, a personalized secure Wi-Fi network, in which each user is assigned her own virtual Wi-Fi network. One virtual Wi-Fi per user makes the user-centric network configuration possible. A user sets a pair of her own SSID and password on her device a priori, and the AP publishes its public key in a suitable way. The AP also maintains an open Wi-Fi channel, to which users can connect anytime. On user's request, the user device sends a connection request message containing a pair of SSID and password encrypted with the AP's public key. Receiving the connection request message, the AP instantiates a new virtual AP secured with the pair of SSID and password, which is dedicated to that single user device. This virtual network is securer because the password is not shared among users. It is more convenient because the network adapts itself to the user device. Experiments show that these advantages are obtained with negligible degradation in the throughput performance.
Keywords
virtual network; wi-fi; access point; QR code; public key;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 T. Rowan, "Negotiating wifi security," Network Security, vol. 2010, no. 2, pp. 8-12, Feb. 2010.   DOI
2 H. Jahankhani, D. L. Watson, and G. Me, Wi-fi security, Handbook of Electronic Security and Digital Forensics, World Scientific Publishing Company, pp. 83-92, Nov. 2009.
3 D. O. Shin, J. Kang, D. H. Nyang, S. Lee, and K. H. Lee, "A method of authenticating WLAN APs for smartphones," J. KICS, vol. 39B, No. 01, pp. 17-28, Jan. 2014.   DOI
4 J. Park, M. Park, and S. Jung, "A whitelist-based scheme for detecting and preventing unauthorized AP access using mobile device," J. KICS, vol. 38B, No. 08, pp. 632-640, Sept. 2013.   DOI
5 Wi-Fi Alliance, Introducing Wi-Fi Protected $Setup^{TM}$(2007), Retrieved Jan. 18. 2015, from http://www.wi-fi.org/
6 Wi-Fi Alliance, The State of $Wi-Fi^{(R)}$ Security(2012), Retrieved Jan. 18. 2015. from http://www.wi-fi.org/
7 R. Chandra and P. Bahl, "MultiNet: Connecting to multiple IEEE 802.11 networks using a single wireless card," in INFOCOM 23rd Annu. Joint Conf. IEEE Comput. and Commun. Societies., vol. 2, 2004.
8 L. Xia, S. Kumar, X. Yang, P. Gopalakrishnan, Y. Liu, S. Schoenberg, and X. Guo, "Virtual WiFi: Bring virtualization from wired to wireless," ACM SIGPLAN Notices, vol. 46, no. 7, pp. 181-192, Jul. 2011.   DOI
9 A. Brown, R. Mortier, and T. Rodden "MultiNet: usable and secure WiFi device association," ACM SIGCOMM Comput. Commun. Rev., vol. 42. no. 4 pp. 275-276, Oct. 2012.   DOI
10 J. Kim and Y.-B. Ko, "On the AP Virtualization of IEEE 802.11 WLANs," Int. Conf. Green and Human Inf. Technol., Ho Chi Minh City, Vietnam, 2014.
11 T. Kim, H.-Y. Seo, and J.-D. Kim, "Design and Implementation of a Multi-Interface Access Point with Inter-interface Dynamic Load Balancing," J. KICS, vol. 37A, no. 05, pp. 348-357, May 2012.
12 Malinen, Jouni. hostapd: IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator(2013), Retrieved Jan. 18. 2015. from http://w1.fi/hostapd/
13 E. Upton and G. Halfacree, Raspberry Pi user guide, John Wiley & Sons Inc., 2013.
14 S. Monk, Programming the Raspberry Pi: Getting Started with Python, Mcgraw-hill, 2013.
15 EFM Networks, ipTime N150UA(2014), Retrieved Jan. 18. 2015, from http://www.iptime.co.kr/-iptime/prd.php?pf=9&page=&pt=42&pd=1
16 A. Kurniawan, Raspberry Pi System Programming for Beginner, PE Press, 2014.
17 Dnsmasq, Dnsmasq(2014), Retrieved Jan. 18. 2015, from http://www.thekelleys.org.uk/dnsmasq/docs/dnsmasq-man.html
18 L. Richardson and S. Ruby, RESTful web services, O'Reilly Media, Inc., 2008.
19 Iperf, Iperf(2014), Retrieved Jan. 18. 2015, from https://iperf.fr/
20 Benchbee, Benchbee mobile(2014), Retrieved Jan. 18. 2015, from http://www.benchbee.co.kr/09center/mobile/