2014
DOI: 10.1007/978-3-319-07620-1_27
|View full text |Cite
|
Sign up to set email alerts
|

Socio-technical Security Analysis of Wireless Hotspots

Abstract: Abstract. We present a socio-technical analysis of security of Hotspot and Hotspot 2.0. The analysis focuses is user-centric, and aim at understanding which user action can compromise security in presence of a attacker. We identify research questions about possible factors that may affect user's security decisions, and propose experiments to answer them.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
3
2

Relationship

3
5

Authors

Journals

citations
Cited by 10 publications
(13 citation statements)
references
References 6 publications
(3 reference statements)
0
13
0
Order By: Relevance
“…Such trust cannot be ensured by purely technical means because people may be deceived. In this vein, Ferreira et al highlight the pitfalls and subtleties of trusting a name [35]. Also confidentiality becomes a matter of trust when interpreted on a human scale; even messaging a peer over an encrypted channel requires the sender to trust the peer to keep the messages or the encrypting keys from third parties.…”
Section: The Socio-technical Perspectivementioning
confidence: 99%
See 2 more Smart Citations
“…Such trust cannot be ensured by purely technical means because people may be deceived. In this vein, Ferreira et al highlight the pitfalls and subtleties of trusting a name [35]. Also confidentiality becomes a matter of trust when interpreted on a human scale; even messaging a peer over an encrypted channel requires the sender to trust the peer to keep the messages or the encrypting keys from third parties.…”
Section: The Socio-technical Perspectivementioning
confidence: 99%
“…Our ceremony concertina traversal methodology, which has already produced valuable findings [17,35], shall be used to fully address these challenges.…”
Section: Challenge Domainsmentioning
confidence: 99%
See 1 more Smart Citation
“…Unfortunately, most hotspots currently deployed are legacy hotspots and it is going to take time and efforts to change them into Hotspot 2.0-enabled devices. In 2014, Ferreira et al [2] underline regarding Hotspot 2.0 that "although technical security has improved in comparison with the previous hotspot version, many issues still need addressing before its full deployment and usage in parallel with that previous version (which will not quickly disappear)". In addition, even a Hotspot 2.0 may be compromised or controlled by an untrustworthy provider who can carry out different types of man-in-the-middle attacks if the user does not use a VPN.…”
Section: Introductionmentioning
confidence: 99%
“…But as more people use them, and their use does not appear to result in any negative consequence (as far as the average user can tell), the sense of risks associated with the use of the "hotspots" and the internet is reduced [5]. In other words, we may be aware of the risks associated with using mobile devices and wireless network options, but we are also becoming rather blasé about the need to mediate our behaviour and reduce known risks.…”
Section: Introductionmentioning
confidence: 99%