Advertisement

Public WiFi Security Network Protocol Practices in Tourist Destination

  • Sime Lugovic
  • Leo MrsicEmail author
  • Ljiljana Zekanovic Korona
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1080)

Abstract

Paper addresses security issues with public access WiFi networks, with emphasis on networks deployed in touristic places, because of their popularity. Such networks are often poorly administered and guarded whereas tourist-services they support, are massively used by thousands of occasional users daily. With intention to put emphasis on the security awareness of the users, filed research was conducted to investigate current security preferences of wireless computer networks in tourist destination, in the City of Zadar, Croatia. The research was conducted during preparation and early in the tourist season, spring/summer 2018. Hardware research support include AP beacon used a TL-WN722N card with a data rate of 150 Mbps, a 5 db antenna, a chip Atheros AR9271, all powered by Linux operating. Small suite was a passive scan tool for the beacon area. The data set used include the default AP settings that transmits its current SSID every 100 ms. WLAN card was used in the vehicle that was set up in the monitor mode used to collect all the available beacon frames. In addition to field research, we conduct additional survey with aim to investigate the general habits of users of wireless computer networks, from personal perspective. Overall goal was to put attention on WiFi security awareness and to expose security behaviour at router level.

Keywords

Mobile security Mobile applications security Domestic appliances security Identity theft and illicit diffusion of personal data Law enforcement practices and uses of digital forensics tools Online frauds 

References

  1. 1.
    Aime, M.D., Calandriello, G., Lioy, A.: Dependability in wireless networks: can we rely on WiFi? IEEE Secur. Priv. 5(1), 23–29 (2007)CrossRefGoogle Scholar
  2. 2.
    Bachman, R., Saltzman, L.E., Thompson, M.P., Carmody, D.C.: Disentangling the effects of selfprotective behaviors on the risk of injury in assaults against women. J. Quant. Criminol. 18(2), 135–157 (2002)CrossRefGoogle Scholar
  3. 3.
    BT Wi-fi (n.d.a) Find a Hotspot. https://www.btwifi.co.uk/find/
  4. 4.
    BT Wi-fi (n.d.b) Security when Using BT’s Wi-fi Hotspots. https://www.btwifi.co.uk/help/security/index.jsp
  5. 5.
  6. 6.
    BT Wi-fi (n.d.d) Terms and Conditions. BT Wi-fi Acceptable Use Policy (including BT Openzone). http://www.btwifi.com/terms-and-conditions/acceptable-use-policy.jsp
  7. 7.
    Cheng, N., Xinlei, W., Wei, C., Prasant, M., Aruna, S.: Characterizing privacy leakage of public wifi networks for users on travel. In: Proceeding of INFOCOM 2013. IEEE (2013)Google Scholar
  8. 8.
    Guerette, R.T., Santana, S.A.: Explaining victim self-protective behavior effects on crime incident outcomes: a test of opportunity theory. Crime Delinq. 56(2), 198–226 (2010)CrossRefGoogle Scholar
  9. 9.
    Holt, T.J., Bossler, A.M.: An assessment of the current state of cybercrime scholarship. Deviant Behav. 35(1), 20–40 (2014)CrossRefGoogle Scholar
  10. 10.
    Lalonde Lévesque, F., Nsiempba, J., Fernandez, J.M., Chiasson, S., Somayaji, A.: A clinical study of risk factors related to malware infections. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 97–108. ACM (2013)Google Scholar
  11. 11.
    Spacey, R., Cooke, L., Muir, A.: Regulating use of the Internet in public libraries: a review. J. Doc. 70(3), 478–497 (2014)CrossRefGoogle Scholar
  12. 12.
    Castiglione, et al.: Virtual lab: a concrete experience in building multi-purpose virtualized labs for Computer Science Education. In: Proceedings of: SoftCOM 2012, 20th International Conference on Software, Telecommunications and Computer Networks, Split (HR), 11–13 September 2012. IEEE (2012)Google Scholar
  13. 13.
    Catuogno, L., Turchi, S.: The Dark Side of the Interconnection: security and Privacy in the Web of Things (2015).  https://doi.org/10.1109/imis.2015.86
  14. 14.
    Gast, M.S.: 802.11 Wireless Networks: The Definitive Guide: The Definitive Guide, O’Reilly Media, Sebastopol (2005)Google Scholar
  15. 15.
    Lalonde Lévesque, F.L., Fernandez, J.M., Somayaji, A.: Risk prediction of malware victimization based on user behavior. In: Malicious and Unwanted Software: The Americas (MALWARE) (2014)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.University of ZadarZadarCroatia
  2. 2.Algebra University CollegeZagrebCroatia

Personalised recommendations