Sciweavers

Share
HUC
2009
Springer

Authenticating ubiquitous services: a study of wireless hotspot access

9 years 6 months ago
Authenticating ubiquitous services: a study of wireless hotspot access
: © Authenticating Ubiquitous Services: A Study of Wireless Hotspot Access Tim Kindberg, Chris Bevan, Eamonn O'Neill, James Mitchell, Jim Grimmett, Dawn Woodgate HP Laboratories HPL-2009-176 Experimentation, Human Factors, Security. This paper concerns the problem of phishing attacks in ubiquitous computing environments. The embedding of ubiquitous services into our everyday environments may make fake services seem plausible but it also enables us to authenticate them with respect to those environments. We propose physical and virtual linkage as two types of authenticating evidence in ubiquitous environments and two protocols based on them. We describe an experiment to test hypotheses concerning user responses to physical and virtual linkage with respect to fake Wi-Fi hotspots. Based on our experience we derive an improved protocol for authenticating spontaneously accessed ubiquitous services. External Posting Date: August 6, 2009 [Fulltext] Approved for External Publication Inte...
Tim Kindberg, Chris Bevan, Eamonn O'Neill, James M
Added 25 Jul 2010
Updated 25 Jul 2010
Type Conference
Year 2009
Where HUC
Authors Tim Kindberg, Chris Bevan, Eamonn O'Neill, James Mitchell, Jim Grimmett, Dawn Woodgate
Comments (0)
books