Reference : Socio-Technical Study On the Effect of Trust and Context when Choosing WiFi Names
Scientific congresses, symposiums and conference proceedings : Paper published in a journal
Engineering, computing & technology : Computer science
http://hdl.handle.net/10993/12569
Socio-Technical Study On the Effect of Trust and Context when Choosing WiFi Names
English
Ferreira, Ana mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Huynen, Jean-Louis mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Koenig, Vincent mailto [University of Luxembourg > Faculty of Language and Literature, Humanities, Arts and Education (FLSHASE) > Educational Measurement and Applied Cognitive Science (EMACS) >]
Lenzini, Gabriele mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Rivas, Salvador mailto [University of Luxembourg > Faculty of Language and Literature, Humanities, Arts and Education (FLSHASE) > >]
2013
Lecture Notes in Computer Science
Springer
8203
131-143
Yes
0302-9743
1611-3349
Berlin
Germany
9th International Workshop, Security & Trust management, STM 2013
from 12-09-2013 to 13-09-2013
Egham
England
[en] We study trust and context as factors influencing how people choose wireless network names. Our approach imagines the mindset of a hypothetical attacker whose goal is to ensnare unsuspecting victims into accessing dishonest WiFi access points. For this purpose, we conducted an online survey. We used two separate forms. The first form asked a random group of participants to rate a list of wireless names according to their preferences (some real and others purposely made-up) and afterwards with implied trust in mind. The second form was designed to assess the effect of context and it asked a different set of respondents to rate the same list of wireless names in relation to four different contexts. Our results provide some evidence confirming the idea that trust and context can be exploited by an attacker by purposely, or strategically, naming WiFi access points with reference to trust or within certain contexts. We suggest, in certain cases, possible defence strategies.
Interdisciplinary Centre for Security, Reliability and Trust - SnT
Fonds National de la Recherche - FnR
http://hdl.handle.net/10993/12569

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Open access
ChoosingWifiNames.pdfAuthor preprint2.99 MBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.