Abstract
We present a socio-technical analysis of security of Hotspot and Hotspot 2.0. The analysis focuses is user-centric, and aim at understanding which user action can compromise security in presence of a attacker. We identify research questions about possible factors that may affect user’s security decisions, and propose experiments to answer them.
Chapter PDF
Similar content being viewed by others
References
Chenoweth, T., Minch, R., Tabor, S.: Wireless insecurity: examining user security behavior on public networks. Commun. ACM 53(2), 134–138 (2010)
Stakenburg, D., Crampton, J.: Underexposed risks of public wi-fi hotspots (2013), http://ComputerWeekly.Com (accessed April 23, 2014)
W.-F. Alliance. Wi-fi certified passpoint: A new program from the wi-fi alliance to enable seamless wi-fi access in hotspots (June 2012), http://www.wi-fi.org (accessed April 23, 2014)
802.11u-2011–Amendment 9: Interworking with External Networks, IEEE Std., http://standards.ieee.org/findstds/standard/802.11u-2011.html (accessed April 23, 2014)
Brodkin, J.: Nfl to block mobile streaming video in super bowl stadium (January 2014), http://arstechnica.com/information-technology/2014/01/nfl-to-block-mobile-streaming-video-in-super-bowl-stadium (accessed April 23, 2014)
Klasnja, P., Consolvo, S., Jung, J., Greenstein, B.M., LeGrand, L., Powledge, P., Wetherall, D.: ”When I am on Wi-Fi, I am Fearless”: privacy concerns & practices in everyday wi-fi use. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI 2009, pp. 1993–2002. ACM, New York (2009)
Bella, G., Coles-Kemp, L.: Layered Analysis of Security Ceremonies. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IFIP AICT, vol. 376, pp. 273–286. Springer, Heidelberg (2012)
Ferreira, A., Huynen, J.-L., Koenig, V., Lenzini, G., Rivas, S.: Socio-technical study on the effect of trust and context when choosing wifi names. In: Accorsi, R., Ranise, S. (eds.) STM 2013. LNCS, vol. 8203, pp. 131–143. Springer, Heidelberg (2013)
Ferreira, A., Giustolisi, R., Huynen, J., Koenig, V., Lenzini, G.: Studies in Socio-Technical Security Analysis: Authentication of Identities with TLS Certificates. In: Proc. of the 12th IEEE TrustComm 2013, pp. 1553–1558 (2013)
Bella, G., Giustolisi, R., Lenzini, G.: Socio-Technical Formal Analysis of TLS Certificate Validation in Modern Browsers. In: Proc. of PST 2013. IFIP, pp. 309–316 (2013)
3GPP Technical Specification 24;312 Access Network Discovery and Selection Function (ANDSF) Management Object (MO), 3GPP Std., Rev. 12.3.0 (December 2013), http://www.3gpp.org/DynaReport/24312.htm (accessed April 23, 2014)
Cisco, Cisco context-aware service configuration guide - 7.3, http://www.cisco.com/ (accessed April 23, 2014)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Ferreira, A., Huynen, JL., Koenig, V., Lenzini, G. (2014). Socio-technical Security Analysis of Wireless Hotspots. In: Tryfonas, T., Askoxylakis, I. (eds) Human Aspects of Information Security, Privacy, and Trust. HAS 2014. Lecture Notes in Computer Science, vol 8533. Springer, Cham. https://doi.org/10.1007/978-3-319-07620-1_27
Download citation
DOI: https://doi.org/10.1007/978-3-319-07620-1_27
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07619-5
Online ISBN: 978-3-319-07620-1
eBook Packages: Computer ScienceComputer Science (R0)