SlideShare uma empresa Scribd logo
1 de 22
Baixar para ler offline
Providing Security for Wireless Community
Networks
Milena Radenkovic, Heidi Howard, Jon Crowcroft,
Murray Goulden, Christian Greiffenhagen,
Derek McAuley, Richard Mortier
Workshop on Participatory Networks and Privacy:
New Research Issues - 12th September 2013
Global Digital Divide
Figure: Internet penetration as a percentage of a country’s population
(ITU, June 2012)
National Digital Divide
13 % of people in UK do not have internet access, but why?
Reason Percent
Don’t need the internet 54
Lack of Skills 22
Equipment cost too high 15
Other 15
Access costs too high 14
Internet access elsewhere 8
Privacy/Security concerns 4
Disability 3
Figure: Reasons for households not having Internet access (Office for
National Statistics, August 2012)
Local Digital Divide
Figure: Internet penetration as a percentage of a country’s population
(Nottingham Citizens Survey, 2011)
Local Digital Divide
Figure: Proportion of respondents to citizens survey with access to the
internet (Nottingham Citizens Survey, 2012)
Local Digital Divide
Figure: Methods of accessing the internet (Nottingham Citizens Survey,
2012)
Lowest Cost Denominator Network
Lowest Cost Denominator Networking introduces a new level of
basic access, bridging the gap between no access and full access.
Offering less than best effort access to all
Wireless Community Networks
Co-operates where you share your WiFi and in turn can use other’s
WiFi. Fon is the most popular WCN, with 11.6 million Fon
hotspots worldwide.
Fon members share their broadband via a
dedicated Fon router: either purchased from
Fon or provided by the ISP
Fon router replaces home router, providing 2
VWANs: an encrypted one for the home user
and an open one for Fon members, priority is
given to the home users
Wireless Community Networks
Fon members connect to the open
“FON” network and enter credentials
into a web-based captive gateway or via
a mobile app.
Fon demonstrates that people are
willing to share their internet connection
but this doesn’t help with digital
exclusion.
Introducing PAWS
Public Access Wifi Service (PAWS) is a WCN, enabling members
of the community to share their unused broadband capacity with
neighbours over WiFi, this part is simple, the challenge is providing:
Confidentiality, Integrity &
Availability
Ease of Use
Priority
Authentication, Authorization
& Accounting
Scalability
Ease of Use
How can we enable sharers to open up their networks? Challenges:
Home routers are provided by ISPs, plugged in and left on
default settings
Sharers may have forgotten admin passwords
Sharers will not want to reconnect all their devices
Sharers have a range of routers, some act as modems
Approaches:
Re-configure sharer’s home router
Replace the sharer’s router
Add a dedicated router to the sharer’s network
Software solution such as Whisper or Wi-sh
We use a dedicated Netgear WNDR3800 router running OpenWRT
Priority
We need to give capacity to PAWS users, with minimal disruption
to the sharers.
Challenges:
Our router is not the gateway router
Fluctuation in network capacity over time
Wide range of networks with very difference characteristics,
e.g. Fiber Vs ADSL
Data usage caps
Approaches:
Actively measure network capacity at all times, dynamically
throttle at PAWS access point
Work with ISPs and use Quality of Service
We used Project BISmark developed at Georgia Tech to measure
capacity visible to the PAWS access point and statically set
throttling at the PAWS access point
Authentication
Users need to be able to authenticate themselves to the PAWS
network at any of the PAWS access points
Challenges:
Supporting a range of user devices
Many devices OSes (such as Android and iOS) limit the
application API
Aim for support for roaming between PAWS developments
Ease of use is key
User may share/lose passwords, choose weak passwords, use
same passwords for other applications
Approaches:
WPA, WPA2, WPA Enterprise
MAC address filtering
Captive portal with user credentials
We use user credentials, authenticated by local RADIUS servers for
each deployment, this could be linked to the 3rd party
authentication servers
Authentication
Figure: RADIUS Authentication, within a hotspot deployment
Accountability & Authorization
PAWS user traffic needs to have a separate public IP address from
the sharer. Sharers must not be held accountable for users’ actions
online
Challenges:
Sharers need to feel secure
Legal issues
Approaches:
Work with ISPs to provide sharers with dual IPs
Keep logs of all traffic sent, MAC associations with the PAWS
access point
VPN traffic somewhere else, to alter source IP
Using a VPN to a secure endpoint so all PAWS network traffic has
a source IP distinct from the sharer’s.
Confidentiality
Challenges:
Traffic passes through the sharer’s home router
WiFi Encryption often provides weak security
End-to-end encryption often not available
Fake PAWS hotspots
Approaches:
WiFi Encryption
VPN
Limit access only to hosts with end-to-end encryption i.e.
HTTPS only
SSL encryption
We already get this fixed for free with VPN to the user’s devices
Scalability
When travelling, authentication is directed to your home
authentication server and the nearest VPN server
PAWS
Router
VPN
Server
RADIUS
Server
Nottingham
External
RADIUS
Server
User
Device
PAWS
Router
VPN
Server
RADIUS
Server
London
External
RADIUS
Server
User
Device
PAWS
Router
VPN
Server
RADIUS
Server
Manchester
External
RADIUS
Server
User
Device
User
Device
1
2 3
4
5
67
8
123
4 7
5
6
8 9 10
Figure: RADIUS Authentication, across a hotspot deployments
Limitations
VPN setup on some client devices is difficult
The most widely supported VPN is PPTP, but it’s been
proven insecure
Some home routers block VPN traffic by default
PAWS Routers currently cost £110 each
Single point of failure, all traffic routed though VPN server
Little incentive to share
Throttling being too conservative
Legal & ISPs Terms of Service
Research in the wild: Aspley, Nottingham
3 month trial
1/3 without internet access
50 new internet users 50 sharers
Figure: War drive data from Aspley
Research in the wild: Aspley, Nottingham
Figure: Architecture of Aspley deployment
Future Work
Two tier system, where users who are also sharers get more
bandwidth
For users who are also sharers, use their PAWS box as the
VPN endpoint instead
VPN from PAWS AP instead of client devices, combined with
WPA Enterprise from the device to PAWS AP
Client apps to map coverage, automatically connect to VPN
Implement fallback in PAWS access points
Dynamic Throttling
Discussion

Mais conteúdo relacionado

Mais procurados

High level architecture of isp .55
High level architecture of isp .55High level architecture of isp .55
High level architecture of isp .55
myrajendra
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
Abhinav Dwivedi
 
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...
TELKOMNIKA JOURNAL
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
Yogesh Kumar
 

Mais procurados (20)

Vpn rsvp
Vpn rsvpVpn rsvp
Vpn rsvp
 
High level architecture of isp .55
High level architecture of isp .55High level architecture of isp .55
High level architecture of isp .55
 
Wi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE ConceptWi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE Concept
 
Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558
 
Wireless Fidelity
Wireless FidelityWireless Fidelity
Wireless Fidelity
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Wi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank SaxenaWi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank Saxena
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
 
Implementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/OrganizationsImplementing VPN Virtual Private Networks for Small Offices/Organizations
Implementing VPN Virtual Private Networks for Small Offices/Organizations
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALA
 
WIFI Technology
WIFI TechnologyWIFI Technology
WIFI Technology
 
VPN
VPNVPN
VPN
 
All About VPN
All About VPNAll About VPN
All About VPN
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...
 
Wireless Fidelity ppt
Wireless Fidelity pptWireless Fidelity ppt
Wireless Fidelity ppt
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
Virtual private network, vpn presentation
Virtual private network, vpn presentationVirtual private network, vpn presentation
Virtual private network, vpn presentation
 
wi-fi ppt
wi-fi pptwi-fi ppt
wi-fi ppt
 

Semelhante a Providing Security for Wireless Community Networks (PAWS)

Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.
igede tirtanata
 
Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.
igede tirtanata
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpn
jadeja dhanraj
 
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P Ns
AamirAziz
 
Wireless security
Wireless securityWireless security
Wireless security
paripec
 

Semelhante a Providing Security for Wireless Community Networks (PAWS) (20)

Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.
 
Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.
 
VPN
VPN VPN
VPN
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 
Remote access connection
Remote access connection Remote access connection
Remote access connection
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Ruckus brief customer_Medley
Ruckus brief customer_MedleyRuckus brief customer_Medley
Ruckus brief customer_Medley
 
Wlan security
Wlan securityWlan security
Wlan security
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpn
 
Allaboutvpn
AllaboutvpnAllaboutvpn
Allaboutvpn
 
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P Ns
 
PAWS Architecture
PAWS ArchitecturePAWS Architecture
PAWS Architecture
 
Wireless security
Wireless securityWireless security
Wireless security
 
Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit Bhatia
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
Acit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsAcit Mumbai - understanding vpns
Acit Mumbai - understanding vpns
 
The vpn
The vpnThe vpn
The vpn
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Vpn alternative whitepaper
Vpn alternative whitepaperVpn alternative whitepaper
Vpn alternative whitepaper
 

Mais de Heidi Howard

Mais de Heidi Howard (7)

Flexible Paxos: Reaching agreement without majorities
Flexible Paxos: Reaching agreement without majorities Flexible Paxos: Reaching agreement without majorities
Flexible Paxos: Reaching agreement without majorities
 
Distributed Consensus: Making Impossible Possible [Revised]
Distributed Consensus: Making Impossible Possible [Revised]Distributed Consensus: Making Impossible Possible [Revised]
Distributed Consensus: Making Impossible Possible [Revised]
 
Distributed Consensus: Making Impossible Possible
Distributed Consensus: Making Impossible PossibleDistributed Consensus: Making Impossible Possible
Distributed Consensus: Making Impossible Possible
 
Reaching reliable agreement in an unreliable world
Reaching reliable agreement in an unreliable worldReaching reliable agreement in an unreliable world
Reaching reliable agreement in an unreliable world
 
Pyland - 3 minute intro
Pyland - 3 minute intro Pyland - 3 minute intro
Pyland - 3 minute intro
 
Introducing Project Zygote
Introducing Project ZygoteIntroducing Project Zygote
Introducing Project Zygote
 
Signposts
SignpostsSignposts
Signposts
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

Providing Security for Wireless Community Networks (PAWS)

  • 1. Providing Security for Wireless Community Networks Milena Radenkovic, Heidi Howard, Jon Crowcroft, Murray Goulden, Christian Greiffenhagen, Derek McAuley, Richard Mortier Workshop on Participatory Networks and Privacy: New Research Issues - 12th September 2013
  • 2. Global Digital Divide Figure: Internet penetration as a percentage of a country’s population (ITU, June 2012)
  • 3. National Digital Divide 13 % of people in UK do not have internet access, but why? Reason Percent Don’t need the internet 54 Lack of Skills 22 Equipment cost too high 15 Other 15 Access costs too high 14 Internet access elsewhere 8 Privacy/Security concerns 4 Disability 3 Figure: Reasons for households not having Internet access (Office for National Statistics, August 2012)
  • 4. Local Digital Divide Figure: Internet penetration as a percentage of a country’s population (Nottingham Citizens Survey, 2011)
  • 5. Local Digital Divide Figure: Proportion of respondents to citizens survey with access to the internet (Nottingham Citizens Survey, 2012)
  • 6. Local Digital Divide Figure: Methods of accessing the internet (Nottingham Citizens Survey, 2012)
  • 7. Lowest Cost Denominator Network Lowest Cost Denominator Networking introduces a new level of basic access, bridging the gap between no access and full access. Offering less than best effort access to all
  • 8. Wireless Community Networks Co-operates where you share your WiFi and in turn can use other’s WiFi. Fon is the most popular WCN, with 11.6 million Fon hotspots worldwide. Fon members share their broadband via a dedicated Fon router: either purchased from Fon or provided by the ISP Fon router replaces home router, providing 2 VWANs: an encrypted one for the home user and an open one for Fon members, priority is given to the home users
  • 9. Wireless Community Networks Fon members connect to the open “FON” network and enter credentials into a web-based captive gateway or via a mobile app. Fon demonstrates that people are willing to share their internet connection but this doesn’t help with digital exclusion.
  • 10. Introducing PAWS Public Access Wifi Service (PAWS) is a WCN, enabling members of the community to share their unused broadband capacity with neighbours over WiFi, this part is simple, the challenge is providing: Confidentiality, Integrity & Availability Ease of Use Priority Authentication, Authorization & Accounting Scalability
  • 11. Ease of Use How can we enable sharers to open up their networks? Challenges: Home routers are provided by ISPs, plugged in and left on default settings Sharers may have forgotten admin passwords Sharers will not want to reconnect all their devices Sharers have a range of routers, some act as modems Approaches: Re-configure sharer’s home router Replace the sharer’s router Add a dedicated router to the sharer’s network Software solution such as Whisper or Wi-sh We use a dedicated Netgear WNDR3800 router running OpenWRT
  • 12. Priority We need to give capacity to PAWS users, with minimal disruption to the sharers. Challenges: Our router is not the gateway router Fluctuation in network capacity over time Wide range of networks with very difference characteristics, e.g. Fiber Vs ADSL Data usage caps Approaches: Actively measure network capacity at all times, dynamically throttle at PAWS access point Work with ISPs and use Quality of Service We used Project BISmark developed at Georgia Tech to measure capacity visible to the PAWS access point and statically set throttling at the PAWS access point
  • 13. Authentication Users need to be able to authenticate themselves to the PAWS network at any of the PAWS access points Challenges: Supporting a range of user devices Many devices OSes (such as Android and iOS) limit the application API Aim for support for roaming between PAWS developments Ease of use is key User may share/lose passwords, choose weak passwords, use same passwords for other applications Approaches: WPA, WPA2, WPA Enterprise MAC address filtering Captive portal with user credentials We use user credentials, authenticated by local RADIUS servers for each deployment, this could be linked to the 3rd party authentication servers
  • 14. Authentication Figure: RADIUS Authentication, within a hotspot deployment
  • 15. Accountability & Authorization PAWS user traffic needs to have a separate public IP address from the sharer. Sharers must not be held accountable for users’ actions online Challenges: Sharers need to feel secure Legal issues Approaches: Work with ISPs to provide sharers with dual IPs Keep logs of all traffic sent, MAC associations with the PAWS access point VPN traffic somewhere else, to alter source IP Using a VPN to a secure endpoint so all PAWS network traffic has a source IP distinct from the sharer’s.
  • 16. Confidentiality Challenges: Traffic passes through the sharer’s home router WiFi Encryption often provides weak security End-to-end encryption often not available Fake PAWS hotspots Approaches: WiFi Encryption VPN Limit access only to hosts with end-to-end encryption i.e. HTTPS only SSL encryption We already get this fixed for free with VPN to the user’s devices
  • 17. Scalability When travelling, authentication is directed to your home authentication server and the nearest VPN server PAWS Router VPN Server RADIUS Server Nottingham External RADIUS Server User Device PAWS Router VPN Server RADIUS Server London External RADIUS Server User Device PAWS Router VPN Server RADIUS Server Manchester External RADIUS Server User Device User Device 1 2 3 4 5 67 8 123 4 7 5 6 8 9 10 Figure: RADIUS Authentication, across a hotspot deployments
  • 18. Limitations VPN setup on some client devices is difficult The most widely supported VPN is PPTP, but it’s been proven insecure Some home routers block VPN traffic by default PAWS Routers currently cost £110 each Single point of failure, all traffic routed though VPN server Little incentive to share Throttling being too conservative Legal & ISPs Terms of Service
  • 19. Research in the wild: Aspley, Nottingham 3 month trial 1/3 without internet access 50 new internet users 50 sharers Figure: War drive data from Aspley
  • 20. Research in the wild: Aspley, Nottingham Figure: Architecture of Aspley deployment
  • 21. Future Work Two tier system, where users who are also sharers get more bandwidth For users who are also sharers, use their PAWS box as the VPN endpoint instead VPN from PAWS AP instead of client devices, combined with WPA Enterprise from the device to PAWS AP Client apps to map coverage, automatically connect to VPN Implement fallback in PAWS access points Dynamic Throttling