Architecting Citywide Ubiquitous Wi-Fi Access
Nishanth Sastry (University of Cambridge, MIT), Jon
Crowcroft (University of
Cambridge), and Karen Sollins (MIT)
Q: In this solution we push
legitimacy issues to the home agent. If we can identify the host then
we can get rid of this architecture, right?
A: Right but host identity is not here yet!
Q: Why don’t we just put the users in the separate
A: The guest is untrusted, we must tunnel it.
Q: HB: A system called wibiki, apparently used MAC
address based authentication. Is your approach comparable to it?
A: Wibiki seems to be gone... What happened to
Wibiki required reflashing the APs, which voided the warranty.