Skip to main content

Public WiFi Security Network Protocol Practices in Tourist Destination

  • Conference paper
  • First Online:
Pervasive Systems, Algorithms and Networks (I-SPAN 2019)

Abstract

Paper addresses security issues with public access WiFi networks, with emphasis on networks deployed in touristic places, because of their popularity. Such networks are often poorly administered and guarded whereas tourist-services they support, are massively used by thousands of occasional users daily. With intention to put emphasis on the security awareness of the users, filed research was conducted to investigate current security preferences of wireless computer networks in tourist destination, in the City of Zadar, Croatia. The research was conducted during preparation and early in the tourist season, spring/summer 2018. Hardware research support include AP beacon used a TL-WN722N card with a data rate of 150 Mbps, a 5 db antenna, a chip Atheros AR9271, all powered by Linux operating. Small suite was a passive scan tool for the beacon area. The data set used include the default AP settings that transmits its current SSID every 100 ms. WLAN card was used in the vehicle that was set up in the monitor mode used to collect all the available beacon frames. In addition to field research, we conduct additional survey with aim to investigate the general habits of users of wireless computer networks, from personal perspective. Overall goal was to put attention on WiFi security awareness and to expose security behaviour at router level.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html.

  2. 2.

    https://support.microsoft.com/en-us/help/929661/connecting-to-non-broadcast-wireless-networks-in-windows-vista

    .

References

  1. Aime, M.D., Calandriello, G., Lioy, A.: Dependability in wireless networks: can we rely on WiFi? IEEE Secur. Priv. 5(1), 23–29 (2007)

    Article  Google Scholar 

  2. Bachman, R., Saltzman, L.E., Thompson, M.P., Carmody, D.C.: Disentangling the effects of selfprotective behaviors on the risk of injury in assaults against women. J. Quant. Criminol. 18(2), 135–157 (2002)

    Article  Google Scholar 

  3. BT Wi-fi (n.d.a) Find a Hotspot. https://www.btwifi.co.uk/find/

  4. BT Wi-fi (n.d.b) Security when Using BT’s Wi-fi Hotspots. https://www.btwifi.co.uk/help/security/index.jsp

  5. BT Wi-fi (n.d.c) BT Wi-fi Protect. http://www.btwifi.com/Media/pdf/WIFI_PROTECT_250313_wifi.pdf

  6. BT Wi-fi (n.d.d) Terms and Conditions. BT Wi-fi Acceptable Use Policy (including BT Openzone). http://www.btwifi.com/terms-and-conditions/acceptable-use-policy.jsp

  7. Cheng, N., Xinlei, W., Wei, C., Prasant, M., Aruna, S.: Characterizing privacy leakage of public wifi networks for users on travel. In: Proceeding of INFOCOM 2013. IEEE (2013)

    Google Scholar 

  8. Guerette, R.T., Santana, S.A.: Explaining victim self-protective behavior effects on crime incident outcomes: a test of opportunity theory. Crime Delinq. 56(2), 198–226 (2010)

    Article  Google Scholar 

  9. Holt, T.J., Bossler, A.M.: An assessment of the current state of cybercrime scholarship. Deviant Behav. 35(1), 20–40 (2014)

    Article  Google Scholar 

  10. Lalonde Lévesque, F., Nsiempba, J., Fernandez, J.M., Chiasson, S., Somayaji, A.: A clinical study of risk factors related to malware infections. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 97–108. ACM (2013)

    Google Scholar 

  11. Spacey, R., Cooke, L., Muir, A.: Regulating use of the Internet in public libraries: a review. J. Doc. 70(3), 478–497 (2014)

    Article  Google Scholar 

  12. Castiglione, et al.: Virtual lab: a concrete experience in building multi-purpose virtualized labs for Computer Science Education. In: Proceedings of: SoftCOM 2012, 20th International Conference on Software, Telecommunications and Computer Networks, Split (HR), 11–13 September 2012. IEEE (2012)

    Google Scholar 

  13. Catuogno, L., Turchi, S.: The Dark Side of the Interconnection: security and Privacy in the Web of Things (2015). https://doi.org/10.1109/imis.2015.86

  14. Gast, M.S.: 802.11 Wireless Networks: The Definitive Guide: The Definitive Guide, O’Reilly Media, Sebastopol (2005)

    Google Scholar 

  15. Lalonde Lévesque, F.L., Fernandez, J.M., Somayaji, A.: Risk prediction of malware victimization based on user behavior. In: Malicious and Unwanted Software: The Americas (MALWARE) (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Leo Mrsic .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lugovic, S., Mrsic, L., Korona, L.Z. (2019). Public WiFi Security Network Protocol Practices in Tourist Destination. In: Esposito, C., Hong, J., Choo, KK. (eds) Pervasive Systems, Algorithms and Networks. I-SPAN 2019. Communications in Computer and Information Science, vol 1080. Springer, Cham. https://doi.org/10.1007/978-3-030-30143-9_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30143-9_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30142-2

  • Online ISBN: 978-3-030-30143-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics