Integration of the Captive Portal paradigm with the 802.1X architecture

08/26/2019
by   Nuno Marques, et al.
0

In a scenario where hotspot wireless networks are increasingly being used, and given the amount of sensitive information exchanged on Internet interactions, there is the need to implement security mechanisms that guarantee data confidentiality and integrity in such networks, as well as the authenticity of the hotspot providers. However, many hotspots today use Captive Portals, which rely on authentication through Web pages (thus, an application-level authentication approach) instead of a link-layer approach. The consequence of this is that there is no security in the wireless link to the hotspot (it has to be provided at upper protocol layers), and is cumbersome to manage wireless access profiles (we need special applications or browsers' add-ons to do that). This work exposes the weaknesses of the Captive Portals' paradigm, which does not follow a unique nor standard approach, and describes a solution that intends to suppress them, based on the 802.1X architecture. This solution uses a new EAP-compliant protocol that is able to integrate an HTTP-based registration or authentication with a Captive Portal within the 802.1X authentication framework.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/12/2022

Zero-Knowledge Authentication

In the thesis we focus on designing an authentication system to authenti...
research
12/21/2017

A ReRAM Physically Unclonable Function (ReRAM PUF)-based Approach to Enhance Authentication Security in Software Defined Wireless Networks

The exponentially increasing number of ubiquitous wireless devices conne...
research
03/07/2019

JSON Web Token (JWT) based client authentication in Message Queuing Telemetry Transport (MQTT)

This paper is an overview of JSON Web Token (JWT) and Transport Layer Se...
research
06/25/2023

Universal Session Protocol: A Novel Approach to Session Management

Currently, the TCP/IP model enables exploitation of vulnerabilities anon...
research
04/11/2018

KRB-CCN: Lightweight Authentication & Access Control for Private Content-Centric Networks

Content-Centric Networking (CCN) is an internetworking paradigm that off...
research
12/07/2020

Impact of Network and Host Characteristics on the Keystroke Pattern in Remote Desktop Sessions

Authentication based on keystroke dynamics is a convenient biometric app...
research
12/16/2020

A novel Two-Factor HoneyToken Authentication Mechanism

The majority of systems rely on user authentication on passwords, but pa...

Please sign up or login with your details

Forgot password? Click here to reset