Advertisement

Socio-technical Security Analysis of Wireless Hotspots

  • Ana Ferreira
  • Jean-Louis Huynen
  • Vincent Koenig
  • Gabriele Lenzini
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8533)

Abstract

We present a socio-technical analysis of security of Hotspot and Hotspot 2.0. The analysis focuses is user-centric, and aim at understanding which user action can compromise security in presence of a attacker. We identify research questions about possible factors that may affect user’s security decisions, and propose experiments to answer them.

Keywords

socio-technical security analysis hotspot ceremonies 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Chenoweth, T., Minch, R., Tabor, S.: Wireless insecurity: examining user security behavior on public networks. Commun. ACM 53(2), 134–138 (2010)CrossRefGoogle Scholar
  2. 2.
    Stakenburg, D., Crampton, J.: Underexposed risks of public wi-fi hotspots (2013), http://ComputerWeekly.Com (accessed April 23, 2014)
  3. 3.
    W.-F. Alliance. Wi-fi certified passpoint: A new program from the wi-fi alliance to enable seamless wi-fi access in hotspots (June 2012), http://www.wi-fi.org (accessed April 23, 2014)
  4. 4.
    802.11u-2011–Amendment 9: Interworking with External Networks, IEEE Std., http://standards.ieee.org/findstds/standard/802.11u-2011.html (accessed April 23, 2014)
  5. 5.
    Brodkin, J.: Nfl to block mobile streaming video in super bowl stadium (January 2014), http://arstechnica.com/information-technology/2014/01/nfl-to-block-mobile-streaming-video-in-super-bowl-stadium (accessed April 23, 2014)
  6. 6.
    Klasnja, P., Consolvo, S., Jung, J., Greenstein, B.M., LeGrand, L., Powledge, P., Wetherall, D.: ”When I am on Wi-Fi, I am Fearless”: privacy concerns & practices in everyday wi-fi use. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI 2009, pp. 1993–2002. ACM, New York (2009)Google Scholar
  7. 7.
    Bella, G., Coles-Kemp, L.: Layered Analysis of Security Ceremonies. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IFIP AICT, vol. 376, pp. 273–286. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  8. 8.
    Ferreira, A., Huynen, J.-L., Koenig, V., Lenzini, G., Rivas, S.: Socio-technical study on the effect of trust and context when choosing wifi names. In: Accorsi, R., Ranise, S. (eds.) STM 2013. LNCS, vol. 8203, pp. 131–143. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  9. 9.
    Ferreira, A., Giustolisi, R., Huynen, J., Koenig, V., Lenzini, G.: Studies in Socio-Technical Security Analysis: Authentication of Identities with TLS Certificates. In: Proc. of the 12th IEEE TrustComm 2013, pp. 1553–1558 (2013)Google Scholar
  10. 10.
    Bella, G., Giustolisi, R., Lenzini, G.: Socio-Technical Formal Analysis of TLS Certificate Validation in Modern Browsers. In: Proc. of PST 2013. IFIP, pp. 309–316 (2013)Google Scholar
  11. 11.
    3GPP Technical Specification 24;312 Access Network Discovery and Selection Function (ANDSF) Management Object (MO), 3GPP Std., Rev. 12.3.0 (December 2013), http://www.3gpp.org/DynaReport/24312.htm (accessed April 23, 2014)
  12. 12.
    Cisco, Cisco context-aware service configuration guide - 7.3, http://www.cisco.com/ (accessed April 23, 2014)

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Ana Ferreira
    • 1
    • 2
  • Jean-Louis Huynen
    • 1
    • 2
  • Vincent Koenig
    • 1
    • 2
  • Gabriele Lenzini
    • 2
  1. 1.Institute of Cognitive Science and AssessmentUniv. of LuxembourgLuxembourg
  2. 2.Interdisciplinary Centre for Security Reliability and TrustUniv. of LuxembourgLuxembourg

Personalised recommendations