eduroam network

19
Smt. Kashibai Navale College Of Engineering Pune 411041 Eduroam network” Created by : Bittu kumar A Seminar on SINHGAD TECHNICAL EDUCATION SOCIETY’S

Upload: bittu-kumar

Post on 13-Apr-2017

111 views

Category:

Engineering


0 download

TRANSCRIPT

Page 1: Eduroam network

Smt. Kashibai Navale College Of Engineering Pune 411041

“Eduroam network”

Created by : Bittu kumar

A Seminar on

SINHGAD TECHNICAL EDUCATION SOCIETY’S

Page 2: Eduroam network

Content Introduction Motivation Principle Architecture Working Application Future work Conclusion References

Page 3: Eduroam network

Introduction

eduroam (education roaming) is the secure, world-wide network access service for roaming users, developed by the international research and education community – where authenticated log in is a pre-requisite.

Page 4: Eduroam network

Continued… Eduroam (Education roaming)

Secure

Allows roaming end users access

It is based on IEEE 802.11 reference model

Page 5: Eduroam network

Continued…

It is and its logo is a registered trademark of TERENA

Eduroam relies on a worldwide federation of Radius server

Page 6: Eduroam network

Motivation  Students come with own mobile devices expecting to

connect

  Visiting scholars, researchers bound by complex policies at institutions

  Overseas campuses access in another languages or require

data roaming.   Regulations, complexity, cost and wasting resources .

Page 7: Eduroam network

Eduroam principle

The eduroam principle is based on the fact that the user's authentication is done by the user's home institution,whereas the authorisation decision allowing access to the network resources is done by the visited network.

Page 8: Eduroam network

Eduroam Architecture

Page 9: Eduroam network

How does eduroam work? When a user tries to log on to the wireless network of a visited

eduroam-enabled institution, the user's authentication request is sent to the user's home institution.

This is done via a hierarchical system of RADIUS servers.

The user's home institution verifies the user's credentials and sends to the visited institution the result of such a verification.

Page 10: Eduroam network

Continued…..

Page 11: Eduroam network

Which technology does eduroam use?

User's home institution is based on IEEE 802.1X standard for communication between access points.

802.1x includes the use of EAP, the Extensible

Authentication protocol, which allows for different authentication methods.

Page 12: Eduroam network

EAP-TLS

Benefits• Trusted security model• Validate end user device and Infrastructure• Phishing is harder

Drawbacks• Require public key infrastructure

Page 13: Eduroam network

What does eduroam do - for the user?

Eduroam network service is assured to support a wide set of applications(web, e-mail, vpn, ftp).

User logon is secured using EAP based authentication

Provide mobility

Page 14: Eduroam network

Advantages of Eduroam• Reduce the overhead to create new user account

• Eduroam is based on reliable and secure technology for authentication

• Provide freedom to access the internet everywhere, the service is enabled

• Compatibility across the world

Page 15: Eduroam network

Disadvantages

• Increasing no of users on network comes at a cost in terms of bandwidth

• Users are fear to connect to the network of other institution

Page 16: Eduroam network

New opportunities  Eduroam beyond the campus :–  On boats – city –  On buses – Brisbane buses –  On Islands – Sharke Island, Sydney –  At Health sites – 7+ hospitals for medical researcher access

  Leveraging mobile devices (iphone etc)

  Futures :–  Integrate with 3G/4G/5G providers

Page 17: Eduroam network

Conclusion Eduroam is scalable, secure and successful

service

More and more countries should participate in eduroam network which is beneficial for participants institutes

Page 18: Eduroam network

References Kismet (http://www.kismetwireless.net/) 802.11 layer2

wireless network detector, sniffer, and intrusion detection system.

TERENA Task Force on Mobility, http://www.terena.nl/tech/task-forces/tf-mobility.

Airsnort (http://airsnort.shmoo.com/), WLAN system to recover encryption keys.

Dantu, R., Clothier, G., & Atri, A. (2007). ‘EAP methods for wireless networks’.

http://www.grangenet.net/index.html http://www.geant2.net

Page 19: Eduroam network

Thank You