EconPapers    
Economics at your fingertips  
 

A secure coverage area expansion scheme for public wireless LAN services

Ryu Watanabe and Toshiaki Tanaka

International Journal of Information Technology and Management, 2010, vol. 9, issue 4, 389-403

Abstract: An ad-hoc network style connection can be utilised to expand the coverage area of public wireless LAN (WLAN) services. By relaying the messages among user nodes, a node can obtain an internet connection, even though the node is located outside the AP's direct wireless communication area. This concept has been realised by using the ad-hoc on-demand distance vector (AODV) routing protocol and mobile IP. However, it has some drawbacks in terms of security. The AODV has no functions for confirming the validity of routing messages; therefore, there are many threats due to faked or forged routing messages. In contrast, if a secure ad-hoc routing protocol is used for message routing in the WLAN service, the message route can be appropriately maintained. However, in order to employ secure ad-hoc routing protocols, a key and IP address have to be securely delivered to each WLAN node in advance. For this purpose, in this paper, the authors propose a secure address and public key certificate allocation scheme for WLAN services.

Keywords: wireless LAN; public WLAN; WLAN services; secure ad-hoc routing; public key infrastructure; PKI; privacy protection; security; local area networks; ad hoc networks; AODV routing protocol; mobile IP; secure address; public key certificate allocation. (search for similar items in EconPapers)
Date: 2010
References: Add references at CitEc
Citations:

Downloads: (external link)
http://www.inderscience.com/link.php?id=35461 (text/html)
Access to full text is restricted to subscribers.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:ids:ijitma:v:9:y:2010:i:4:p:389-403

Access Statistics for this article

More articles in International Journal of Information Technology and Management from Inderscience Enterprises Ltd
Bibliographic data for series maintained by Sarah Parker ().

 
Page updated 2025-03-19
Handle: RePEc:ids:ijitma:v:9:y:2010:i:4:p:389-403