SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Downloaden Sie, um offline zu lesen
Building secure,
privacy aware,
quality Wi-Fi coverage
via cooperation
Karri Huhtanen
Arch Red Oy &
Open System Consultants Pty Ltd
22.9.2015
quality and the
traditional way of
building coverage
Photo by Karl-Ludwig G. Poggemann
In the beginning...
already a lot of separate,
overlapping Wi-Fi
networks interfering
with each other
Map by OpenStreetMap
already a lot of separate,
overlapping Wi-Fi
networks interfering
with each other
+
one more, the new
common Wi-Fi
network
Then...
Map by OpenStreetMap
So this is bad, because...
• more overlapping Wi-Fi networks => more radio
interference => all Wi-Fi network users suffer
• providing additional coverage, capacity and
bandwidth always generates costs to someone
• maintaining, upgrading and repairing additional
network always generates costs to someone
• often the additional coverage is also provided
outdoors and from outside => which means
excellent Wi-Fi coverage for magpies during
Finnish winters
Photo by Andrew King
What to do?
Photo by Sean Hobson
Try cooperation...
Photo by Sean Hobson
Instead of this...
Map by OpenStreetMap
Let’s try this...
Map by OpenStreetMap
unification
via
cooperation
We must be realistic...
• Somebody has to cover the costs of providing coverage, capacity,
bandwidth and maintaining, upgrading and repairing network =>
Dividing work and costs makes sense => Let everyone handle and
control their part of the network
• We need unified policies for network configuration, authentication,
access filtering, IP addressing etc. => Let’s just choose open
standard interfaces and policies, no specific vendors or service
providers
• There will still be overlapping private networks, home networks
etc. => interference cannot be removed but it can be reduced
• Coverage is not really needed everywhere, it is needed where the
existing networks already are => with unified network settings
around it is easier to access Internet in various places
So how can this be done?
Photo by Sean Hobson
two options
“Easy” “Proper”
Scale by winnifredxoxo
“Easy”
• use common but original Wi-Fi network name for all
cooperating networks, make the name neutral so that it is
easier to adopt
• leave Wi-Fi network without authentication or encryption
or specify common WPA2 pre-shared secret, share this
secret to everyone
• have and enforce a common policy for Internet filtering
and IP addressing everywhere
• wish for the best and believe in the goodness of the people
• that’s it: everyone controls and is responsible of their own
part of network and partially what happens through it
Photo by RobbyVan Moor
For few reasons “easy” option
has not catched on
• People want to have unauthenticated, unencrypted and unfiltered
networks to use, but very few want to provide such ones
themselves.
• People still want to have curtains for privacy, doors for access
control, pin codes for credit cards and mobile phones.
• People responsible of what happens in or through their networks
are even more careful.
• “easy” networks are often filtered so heavily that instead of ‘open’
they often should be called ‘broken’.
• Access and capacity control, monitoring and network
management are still needed, even in so called ‘open’ networks.
Photo by Thomas Guine
Photo by RobbyVan Moor
“Proper”
• use common but original Wi-Fi network name for all
cooperating networks, make the name neutral so that it is
easier to adopt
• use WPA2 Enterprise encryption and authentication for
everyone and every network, connect networks into coverage
area by authentication federation
• have and enforce a common policy for Internet filtering, IP
addressing and network configuration everywhere
• that’s it: everyone controls and is responsible of their own
part of network and partially what happens through it,
visitors leave trails that can be followed, device and visitor
access can be controlled
But has this then catched on?
• Short answer: Yes.
• eduroam(tm) (www.eduroam.org), the global authentication
federation for universities and research organisations is the world’s
3rd most advertised Wi-Fi network and the roaming standard of
academic world
• eduroam(tm) technologies and architecture have been applied in
Wireless Tampere community network and its successor roam.fi,
which is used already in Tampere and neighboring cities
• Belnet has started a pilot in Belgium about government roaming
called govroam(tm) (www.govroam.be)
• The architecture is compatible with operator roaming and
technologies such as SIM card or certificate authentication, elliptic
curves etc. in addition to traditional username and password
What are the additional benefits?
• A common Wi-Fi network with same network configuration
accessible everywhere securely with home organisation credentials
but at the same time protecting the user privacy.
• Access to the network, used capacity and traffic can be controlled
and prioritized. Trail of accountability exists.
• The core infrastructure and architecture is field tested, it has already
been used and developed for over 10 years by operators, by eduroam
etc.
• The core infrastructure can be extended and evolved as
authentication and network technologies develop, in most times even
without changes to the core.
• All technologies and interfaces used are open standards, defined
mostly in IETF. There exists both open source and commercial
options for components and services from several suppliers.
What now and in the
future?
• All the components for building this kind of cooperative
Wi-Fi authentication federation exists.
• Together with Centre of Open Systems and Solutions
(COSS ry), already 2 operators and several cities and
organisations, Wireless Tampere model is migrated and
rebranded to roam.fi concept.
• roam.fi aims to be eduroam for any organisation, city,
company or operator, not just academic organisations
• If interested, come and discuss with me or COSS about
details.
Thank you. Questions?
Karri Huhtanen
https://www.twitter.com/khuhtanen
https://plus.google.com/+KarriHuhtanen/
these and more slides:
http://www.slideshare.net/khuhtanen/
Additional Slides
for technical and non-technical questions
Federated RADIUS Roaming
Federation Top-Level

roam.fi RADIUS (proxy)
Home Organisation

homeorg.fi RADIUS
Visited Organisation

visitedorg.fi RADIUS
home organisation
roam.fi Wi-Fi
network
visited organisation
roam.fi Wi-Fi
network
RADIUS connections
Authentication in Home Network
Federation Top-Level

roam.fi RADIUS (proxy)
Home Organisation

homeorg.fi RADIUS
Visited Organisation

visitedorg.fi RADIUS
home organisation
roam.fi Wi-Fi
network
visited organisation
roam.fi Wi-Fi
network
secure
authentication
directly to home
RADIUS
username@homeorg.fi +
password
Authentication in Visited Network
Federation Top-Level

roam.fi RADIUS (proxy)
Home Organisation

homeorg.fi RADIUS
Visited Organisation

visitedorg.fi RADIUS
home organisation
roam.fi Wi-Fi
network
visited organisation
roam.fi Wi-Fi
network
Authentication is
tunnelled with TLS
directly to home
RADIUS.
Even Visited
Organisation
cannot see the
actual credentials.
same

username@homeorg.fi + password, 

no change to network settings
WPA2 Enterprise
Authentication
real identity+credentials can
always be secure inside TLS
tunnel
Access
Controller
e.g. Wi-Fi
controller or
access point
RADIUS
authentication
service
RADIUS protocol
+ TLS tunnel
WPA2 Enterprise
Authentication
outer identity needs only identify
home organisation, otherwise
anonymous identity allowed
Inside EAP message multiple methods of authentication and
credentials can be used in parallel in same federated Wi-Fi networks.
Home organisation capabilities are the only limiting factor.
What about electromagnetic
radiation, Wi-Fi and children?
• There is no scientific evidence or research results,
which would prove that Wi-Fi is in anyway
harmful.
• If additional discussion is needed, author strongly
recommends discussion with for example Vesa
Linja-aho, Lilja Tamminen, or scientists with actual
degrees from relevant fields (physics, medicine, etc.)

Weitere ähnliche Inhalte

Was ist angesagt?

Beyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoaming
Beyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoamingBeyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoaming
Beyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoamingKarri Huhtanen
 
All access Wi-Fi around CEAT
All access Wi-Fi around CEATAll access Wi-Fi around CEAT
All access Wi-Fi around CEATShayne Galo
 
SOHO Network Setup Tutorial
SOHO Network Setup Tutorial SOHO Network Setup Tutorial
SOHO Network Setup Tutorial junaidahmedsaba
 
The "Universal" IP Network for Videoconferencing
The "Universal" IP Network for VideoconferencingThe "Universal" IP Network for Videoconferencing
The "Universal" IP Network for VideoconferencingVideoguy
 
wi-fi technology
 wi-fi technology wi-fi technology
wi-fi technologysai kumar R
 
The simplification of the campus network Juniper - Networkshop44
The simplification of the campus network Juniper - Networkshop44The simplification of the campus network Juniper - Networkshop44
The simplification of the campus network Juniper - Networkshop44Jisc
 
Evolution Network
Evolution NetworkEvolution Network
Evolution NetworkAPNIC
 
Wi fi and it’s applications
Wi fi and it’s applicationsWi fi and it’s applications
Wi fi and it’s applicationsSaad Mazhar
 
Public wifi architecture_12072017
Public wifi architecture_12072017Public wifi architecture_12072017
Public wifi architecture_12072017Saurabh Verma
 
How do the 802.11u and HotSpot 2.0 work?
How do the 802.11u and HotSpot 2.0 work?How do the 802.11u and HotSpot 2.0 work?
How do the 802.11u and HotSpot 2.0 work?Michal Jarski
 
Cloud Based Identity Management
Cloud Based Identity ManagementCloud Based Identity Management
Cloud Based Identity ManagementKarri Huhtanen
 

Was ist angesagt? (17)

Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
Beyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoaming
Beyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoamingBeyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoaming
Beyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoaming
 
All access Wi-Fi around CEAT
All access Wi-Fi around CEATAll access Wi-Fi around CEAT
All access Wi-Fi around CEAT
 
What is soho network
What is soho networkWhat is soho network
What is soho network
 
Wireless Fidelity ppt
Wireless Fidelity pptWireless Fidelity ppt
Wireless Fidelity ppt
 
SOHO Network Setup Tutorial
SOHO Network Setup Tutorial SOHO Network Setup Tutorial
SOHO Network Setup Tutorial
 
The "Universal" IP Network for Videoconferencing
The "Universal" IP Network for VideoconferencingThe "Universal" IP Network for Videoconferencing
The "Universal" IP Network for Videoconferencing
 
VM_requisiti_eng
VM_requisiti_engVM_requisiti_eng
VM_requisiti_eng
 
wi-fi technology
 wi-fi technology wi-fi technology
wi-fi technology
 
The simplification of the campus network Juniper - Networkshop44
The simplification of the campus network Juniper - Networkshop44The simplification of the campus network Juniper - Networkshop44
The simplification of the campus network Juniper - Networkshop44
 
Wi fi
Wi fiWi fi
Wi fi
 
Evolution Network
Evolution NetworkEvolution Network
Evolution Network
 
972003
972003972003
972003
 
Wi fi and it’s applications
Wi fi and it’s applicationsWi fi and it’s applications
Wi fi and it’s applications
 
Public wifi architecture_12072017
Public wifi architecture_12072017Public wifi architecture_12072017
Public wifi architecture_12072017
 
How do the 802.11u and HotSpot 2.0 work?
How do the 802.11u and HotSpot 2.0 work?How do the 802.11u and HotSpot 2.0 work?
How do the 802.11u and HotSpot 2.0 work?
 
Cloud Based Identity Management
Cloud Based Identity ManagementCloud Based Identity Management
Cloud Based Identity Management
 

Ähnlich wie Building secure, privacy aware, quality Wi-Fi coverage via cooperation

Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentationAbhishek Das
 
Siyavuyisa Township Networks 2011
Siyavuyisa Township Networks 2011Siyavuyisa Township Networks 2011
Siyavuyisa Township Networks 2011siyavuyisa
 
2 1 internet services and connections
2 1 internet services and connections2 1 internet services and connections
2 1 internet services and connectionsQondileRamokgadi
 
How Mobility Has Transformed the Classroom
How Mobility Has Transformed the ClassroomHow Mobility Has Transformed the Classroom
How Mobility Has Transformed the ClassroomStuart Melnitsky
 
Cellular Data Offloading Through WIFI Mesh Network Utilizing White Space Freq...
Cellular Data Offloading Through WIFI Mesh Network Utilizing White Space Freq...Cellular Data Offloading Through WIFI Mesh Network Utilizing White Space Freq...
Cellular Data Offloading Through WIFI Mesh Network Utilizing White Space Freq...Roger Filomeno
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technologyZul Fikri
 
Things Manchester Presentation for Leeds Digital Festival
Things Manchester Presentation for Leeds Digital FestivalThings Manchester Presentation for Leeds Digital Festival
Things Manchester Presentation for Leeds Digital FestivalOpen Data Manchester
 
Wi fi network
Wi fi networkWi fi network
Wi fi networkcamerons4
 
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Internetwork Engineering (IE)
 
Digital communication protocols, methods and devices
Digital communication protocols, methods and devicesDigital communication protocols, methods and devices
Digital communication protocols, methods and devicesbrownjordan
 
Info2 unit 4_-_communications__networks
Info2 unit 4_-_communications__networksInfo2 unit 4_-_communications__networks
Info2 unit 4_-_communications__networkssaltashict
 
Li-Fi (Light - Fedility) Technology New Version 2017
Li-Fi (Light - Fedility) Technology New Version 2017Li-Fi (Light - Fedility) Technology New Version 2017
Li-Fi (Light - Fedility) Technology New Version 2017Ajith Kumar Ravi
 
Wi-Fi vs Bluetooth
Wi-Fi vs BluetoothWi-Fi vs Bluetooth
Wi-Fi vs BluetoothArun ACE
 

Ähnlich wie Building secure, privacy aware, quality Wi-Fi coverage via cooperation (20)

wi-fi.pptx
wi-fi.pptxwi-fi.pptx
wi-fi.pptx
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentation
 
Siyavuyisa Township Networks 2011
Siyavuyisa Township Networks 2011Siyavuyisa Township Networks 2011
Siyavuyisa Township Networks 2011
 
Wifi (2)
Wifi (2)Wifi (2)
Wifi (2)
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
2 1 internet services and connections
2 1 internet services and connections2 1 internet services and connections
2 1 internet services and connections
 
Wi fi
Wi fiWi fi
Wi fi
 
Li fi
Li fiLi fi
Li fi
 
How Mobility Has Transformed the Classroom
How Mobility Has Transformed the ClassroomHow Mobility Has Transformed the Classroom
How Mobility Has Transformed the Classroom
 
Cellular Data Offloading Through WIFI Mesh Network Utilizing White Space Freq...
Cellular Data Offloading Through WIFI Mesh Network Utilizing White Space Freq...Cellular Data Offloading Through WIFI Mesh Network Utilizing White Space Freq...
Cellular Data Offloading Through WIFI Mesh Network Utilizing White Space Freq...
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Things Manchester Presentation for Leeds Digital Festival
Things Manchester Presentation for Leeds Digital FestivalThings Manchester Presentation for Leeds Digital Festival
Things Manchester Presentation for Leeds Digital Festival
 
Wi fi network
Wi fi networkWi fi network
Wi fi network
 
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
 
Digital communication protocols, methods and devices
Digital communication protocols, methods and devicesDigital communication protocols, methods and devices
Digital communication protocols, methods and devices
 
Info2 unit 4_-_communications__networks
Info2 unit 4_-_communications__networksInfo2 unit 4_-_communications__networks
Info2 unit 4_-_communications__networks
 
Li-Fi (Light - Fedility) Technology New Version 2017
Li-Fi (Light - Fedility) Technology New Version 2017Li-Fi (Light - Fedility) Technology New Version 2017
Li-Fi (Light - Fedility) Technology New Version 2017
 
It 241 Week 1 Cp Essay
It 241 Week 1 Cp EssayIt 241 Week 1 Cp Essay
It 241 Week 1 Cp Essay
 
Wi-Fi vs Bluetooth
Wi-Fi vs BluetoothWi-Fi vs Bluetooth
Wi-Fi vs Bluetooth
 
Lecture-1.pptx
Lecture-1.pptxLecture-1.pptx
Lecture-1.pptx
 

Mehr von Karri Huhtanen

Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and Privacy
Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and PrivacyDisobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and Privacy
Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and PrivacyKarri Huhtanen
 
Wi-Fi Roaming Security and Privacy
Wi-Fi Roaming Security and PrivacyWi-Fi Roaming Security and Privacy
Wi-Fi Roaming Security and PrivacyKarri Huhtanen
 
OpenRoaming and CapPort
OpenRoaming and CapPortOpenRoaming and CapPort
OpenRoaming and CapPortKarri Huhtanen
 
Suomen eduroam-juuripalvelun uudistukset
Suomen eduroam-juuripalvelun uudistuksetSuomen eduroam-juuripalvelun uudistukset
Suomen eduroam-juuripalvelun uudistuksetKarri Huhtanen
 
Adding OpenRoaming to existing IdP and roaming federation service
Adding OpenRoaming to existing IdP and roaming federation serviceAdding OpenRoaming to existing IdP and roaming federation service
Adding OpenRoaming to existing IdP and roaming federation serviceKarri Huhtanen
 
OpenRoaming -- Wi-Fi Roaming for All
OpenRoaming -- Wi-Fi Roaming for AllOpenRoaming -- Wi-Fi Roaming for All
OpenRoaming -- Wi-Fi Roaming for AllKarri Huhtanen
 
Routing host certificates in eduroam/govroam
Routing host certificates in eduroam/govroamRouting host certificates in eduroam/govroam
Routing host certificates in eduroam/govroamKarri Huhtanen
 
Cooperative labs, testbeds and networks
Cooperative labs, testbeds and networksCooperative labs, testbeds and networks
Cooperative labs, testbeds and networksKarri Huhtanen
 
Privacy and traceability in Wi-Fi networks
Privacy and traceability in Wi-Fi networksPrivacy and traceability in Wi-Fi networks
Privacy and traceability in Wi-Fi networksKarri Huhtanen
 
EAP-TLS (extended version)
EAP-TLS (extended version)EAP-TLS (extended version)
EAP-TLS (extended version)Karri Huhtanen
 
Security issues in RADIUS based Wi-Fi AAA
Security issues in RADIUS based Wi-Fi AAASecurity issues in RADIUS based Wi-Fi AAA
Security issues in RADIUS based Wi-Fi AAAKarri Huhtanen
 
What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?Karri Huhtanen
 
What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?Karri Huhtanen
 
Connecting the Dots: Integrating RADIUS to Network Measurement and Monitoring
Connecting the Dots: Integrating RADIUS to Network Measurement and MonitoringConnecting the Dots: Integrating RADIUS to Network Measurement and Monitoring
Connecting the Dots: Integrating RADIUS to Network Measurement and MonitoringKarri Huhtanen
 
Using NoSQL databases to store RADIUS and Syslog data
Using NoSQL databases to store RADIUS and Syslog dataUsing NoSQL databases to store RADIUS and Syslog data
Using NoSQL databases to store RADIUS and Syslog dataKarri Huhtanen
 
Open WiFi or Broken WiFi?
Open WiFi or Broken WiFi?Open WiFi or Broken WiFi?
Open WiFi or Broken WiFi?Karri Huhtanen
 
eduroam ennen, nyt ja tulevaisuudessa
eduroam ennen, nyt ja tulevaisuudessaeduroam ennen, nyt ja tulevaisuudessa
eduroam ennen, nyt ja tulevaisuudessaKarri Huhtanen
 
Joukkoliikennedatan ongelmat ja ratkaisuja
Joukkoliikennedatan ongelmat ja ratkaisujaJoukkoliikennedatan ongelmat ja ratkaisuja
Joukkoliikennedatan ongelmat ja ratkaisujaKarri Huhtanen
 

Mehr von Karri Huhtanen (20)

Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and Privacy
Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and PrivacyDisobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and Privacy
Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and Privacy
 
Wi-Fi Roaming Security and Privacy
Wi-Fi Roaming Security and PrivacyWi-Fi Roaming Security and Privacy
Wi-Fi Roaming Security and Privacy
 
OpenRoaming and CapPort
OpenRoaming and CapPortOpenRoaming and CapPort
OpenRoaming and CapPort
 
Suomen eduroam-juuripalvelun uudistukset
Suomen eduroam-juuripalvelun uudistuksetSuomen eduroam-juuripalvelun uudistukset
Suomen eduroam-juuripalvelun uudistukset
 
Adding OpenRoaming to existing IdP and roaming federation service
Adding OpenRoaming to existing IdP and roaming federation serviceAdding OpenRoaming to existing IdP and roaming federation service
Adding OpenRoaming to existing IdP and roaming federation service
 
OpenRoaming -- Wi-Fi Roaming for All
OpenRoaming -- Wi-Fi Roaming for AllOpenRoaming -- Wi-Fi Roaming for All
OpenRoaming -- Wi-Fi Roaming for All
 
Routing host certificates in eduroam/govroam
Routing host certificates in eduroam/govroamRouting host certificates in eduroam/govroam
Routing host certificates in eduroam/govroam
 
Cooperative labs, testbeds and networks
Cooperative labs, testbeds and networksCooperative labs, testbeds and networks
Cooperative labs, testbeds and networks
 
Privacy and traceability in Wi-Fi networks
Privacy and traceability in Wi-Fi networksPrivacy and traceability in Wi-Fi networks
Privacy and traceability in Wi-Fi networks
 
EAP-TLS (extended version)
EAP-TLS (extended version)EAP-TLS (extended version)
EAP-TLS (extended version)
 
EAP-TLS
EAP-TLSEAP-TLS
EAP-TLS
 
Security issues in RADIUS based Wi-Fi AAA
Security issues in RADIUS based Wi-Fi AAASecurity issues in RADIUS based Wi-Fi AAA
Security issues in RADIUS based Wi-Fi AAA
 
TLS and Certificates
TLS and CertificatesTLS and Certificates
TLS and Certificates
 
What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?
 
What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?
 
Connecting the Dots: Integrating RADIUS to Network Measurement and Monitoring
Connecting the Dots: Integrating RADIUS to Network Measurement and MonitoringConnecting the Dots: Integrating RADIUS to Network Measurement and Monitoring
Connecting the Dots: Integrating RADIUS to Network Measurement and Monitoring
 
Using NoSQL databases to store RADIUS and Syslog data
Using NoSQL databases to store RADIUS and Syslog dataUsing NoSQL databases to store RADIUS and Syslog data
Using NoSQL databases to store RADIUS and Syslog data
 
Open WiFi or Broken WiFi?
Open WiFi or Broken WiFi?Open WiFi or Broken WiFi?
Open WiFi or Broken WiFi?
 
eduroam ennen, nyt ja tulevaisuudessa
eduroam ennen, nyt ja tulevaisuudessaeduroam ennen, nyt ja tulevaisuudessa
eduroam ennen, nyt ja tulevaisuudessa
 
Joukkoliikennedatan ongelmat ja ratkaisuja
Joukkoliikennedatan ongelmat ja ratkaisujaJoukkoliikennedatan ongelmat ja ratkaisuja
Joukkoliikennedatan ongelmat ja ratkaisuja
 

Kürzlich hochgeladen

pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样ayvbos
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptxAsmae Rabhi
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolinonuriaiuzzolino1
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsMonica Sydney
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样ayvbos
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxgalaxypingy
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoilmeghakumariji156
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasDigicorns Technologies
 

Kürzlich hochgeladen (20)

pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 

Building secure, privacy aware, quality Wi-Fi coverage via cooperation

  • 1. Building secure, privacy aware, quality Wi-Fi coverage via cooperation Karri Huhtanen Arch Red Oy & Open System Consultants Pty Ltd 22.9.2015
  • 2. quality and the traditional way of building coverage Photo by Karl-Ludwig G. Poggemann
  • 3. In the beginning... already a lot of separate, overlapping Wi-Fi networks interfering with each other Map by OpenStreetMap
  • 4. already a lot of separate, overlapping Wi-Fi networks interfering with each other + one more, the new common Wi-Fi network Then... Map by OpenStreetMap
  • 5. So this is bad, because... • more overlapping Wi-Fi networks => more radio interference => all Wi-Fi network users suffer • providing additional coverage, capacity and bandwidth always generates costs to someone • maintaining, upgrading and repairing additional network always generates costs to someone • often the additional coverage is also provided outdoors and from outside => which means excellent Wi-Fi coverage for magpies during Finnish winters Photo by Andrew King
  • 6. What to do? Photo by Sean Hobson
  • 8. Instead of this... Map by OpenStreetMap
  • 9. Let’s try this... Map by OpenStreetMap unification via cooperation
  • 10. We must be realistic... • Somebody has to cover the costs of providing coverage, capacity, bandwidth and maintaining, upgrading and repairing network => Dividing work and costs makes sense => Let everyone handle and control their part of the network • We need unified policies for network configuration, authentication, access filtering, IP addressing etc. => Let’s just choose open standard interfaces and policies, no specific vendors or service providers • There will still be overlapping private networks, home networks etc. => interference cannot be removed but it can be reduced • Coverage is not really needed everywhere, it is needed where the existing networks already are => with unified network settings around it is easier to access Internet in various places
  • 11. So how can this be done? Photo by Sean Hobson
  • 13. “Easy” • use common but original Wi-Fi network name for all cooperating networks, make the name neutral so that it is easier to adopt • leave Wi-Fi network without authentication or encryption or specify common WPA2 pre-shared secret, share this secret to everyone • have and enforce a common policy for Internet filtering and IP addressing everywhere • wish for the best and believe in the goodness of the people • that’s it: everyone controls and is responsible of their own part of network and partially what happens through it Photo by RobbyVan Moor
  • 14. For few reasons “easy” option has not catched on • People want to have unauthenticated, unencrypted and unfiltered networks to use, but very few want to provide such ones themselves. • People still want to have curtains for privacy, doors for access control, pin codes for credit cards and mobile phones. • People responsible of what happens in or through their networks are even more careful. • “easy” networks are often filtered so heavily that instead of ‘open’ they often should be called ‘broken’. • Access and capacity control, monitoring and network management are still needed, even in so called ‘open’ networks.
  • 15. Photo by Thomas Guine Photo by RobbyVan Moor “Proper” • use common but original Wi-Fi network name for all cooperating networks, make the name neutral so that it is easier to adopt • use WPA2 Enterprise encryption and authentication for everyone and every network, connect networks into coverage area by authentication federation • have and enforce a common policy for Internet filtering, IP addressing and network configuration everywhere • that’s it: everyone controls and is responsible of their own part of network and partially what happens through it, visitors leave trails that can be followed, device and visitor access can be controlled
  • 16. But has this then catched on? • Short answer: Yes. • eduroam(tm) (www.eduroam.org), the global authentication federation for universities and research organisations is the world’s 3rd most advertised Wi-Fi network and the roaming standard of academic world • eduroam(tm) technologies and architecture have been applied in Wireless Tampere community network and its successor roam.fi, which is used already in Tampere and neighboring cities • Belnet has started a pilot in Belgium about government roaming called govroam(tm) (www.govroam.be) • The architecture is compatible with operator roaming and technologies such as SIM card or certificate authentication, elliptic curves etc. in addition to traditional username and password
  • 17. What are the additional benefits? • A common Wi-Fi network with same network configuration accessible everywhere securely with home organisation credentials but at the same time protecting the user privacy. • Access to the network, used capacity and traffic can be controlled and prioritized. Trail of accountability exists. • The core infrastructure and architecture is field tested, it has already been used and developed for over 10 years by operators, by eduroam etc. • The core infrastructure can be extended and evolved as authentication and network technologies develop, in most times even without changes to the core. • All technologies and interfaces used are open standards, defined mostly in IETF. There exists both open source and commercial options for components and services from several suppliers.
  • 18. What now and in the future? • All the components for building this kind of cooperative Wi-Fi authentication federation exists. • Together with Centre of Open Systems and Solutions (COSS ry), already 2 operators and several cities and organisations, Wireless Tampere model is migrated and rebranded to roam.fi concept. • roam.fi aims to be eduroam for any organisation, city, company or operator, not just academic organisations • If interested, come and discuss with me or COSS about details.
  • 19. Thank you. Questions? Karri Huhtanen https://www.twitter.com/khuhtanen https://plus.google.com/+KarriHuhtanen/ these and more slides: http://www.slideshare.net/khuhtanen/
  • 20. Additional Slides for technical and non-technical questions
  • 21. Federated RADIUS Roaming Federation Top-Level roam.fi RADIUS (proxy) Home Organisation homeorg.fi RADIUS Visited Organisation visitedorg.fi RADIUS home organisation roam.fi Wi-Fi network visited organisation roam.fi Wi-Fi network RADIUS connections
  • 22. Authentication in Home Network Federation Top-Level roam.fi RADIUS (proxy) Home Organisation homeorg.fi RADIUS Visited Organisation visitedorg.fi RADIUS home organisation roam.fi Wi-Fi network visited organisation roam.fi Wi-Fi network secure authentication directly to home RADIUS username@homeorg.fi + password
  • 23. Authentication in Visited Network Federation Top-Level roam.fi RADIUS (proxy) Home Organisation homeorg.fi RADIUS Visited Organisation visitedorg.fi RADIUS home organisation roam.fi Wi-Fi network visited organisation roam.fi Wi-Fi network Authentication is tunnelled with TLS directly to home RADIUS. Even Visited Organisation cannot see the actual credentials. same username@homeorg.fi + password, no change to network settings
  • 24. WPA2 Enterprise Authentication real identity+credentials can always be secure inside TLS tunnel Access Controller e.g. Wi-Fi controller or access point RADIUS authentication service RADIUS protocol + TLS tunnel WPA2 Enterprise Authentication outer identity needs only identify home organisation, otherwise anonymous identity allowed Inside EAP message multiple methods of authentication and credentials can be used in parallel in same federated Wi-Fi networks. Home organisation capabilities are the only limiting factor.
  • 25. What about electromagnetic radiation, Wi-Fi and children? • There is no scientific evidence or research results, which would prove that Wi-Fi is in anyway harmful. • If additional discussion is needed, author strongly recommends discussion with for example Vesa Linja-aho, Lilja Tamminen, or scientists with actual degrees from relevant fields (physics, medicine, etc.)