A Comparative Study to Evaluate the Usability of Context-Based Wi-Fi Access Mechanisms

  • Matthias Budde
  • Till Riedel
  • Marcel Köpke
  • Matthias Berning
  • Michael Beigl
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8515)

Abstract

This paper presents a comparative study of six different tag and context based authentication schemes for open Wi-Fi access. All of the implemented methods require only a smartphone and an HTML5 capable webbrowser, making them interchangeable and easy to incorporate into existing infrastructure. We recruited 22 participants for the study and used two standardized questionnaires as well as additional metrics to assess whether further investment in a systematic usability analysis seems prudent. The evaluation shows that suitable alternatives for Wi-Fi authentication exist and points out their limitations and opportunities.

Keywords

Universal Access Practical Security Usability User Experience User Study Interfaces Device Association Authentication Wi-Fi Smart Environments Context 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Brooke, J.: SUS - A quick and dirty usability scale. Usability Evaluation in Industry 189 (1996)Google Scholar
  2. 2.
    Budde, M., Berning, M., Baumgärtner, C., Kinn, F., Kopf, T., Ochs, S., Reiche, F., Riedel, T., Beigl, M.: Point & Control – Interaction in Smart Environments: You Only Click Twice. In: UbiComp 2013 Adjunct., pp. 303–306. ACM (2013)Google Scholar
  3. 3.
    Budde, M., Köpke, M., Berning, M., Riedel, T., Beigl, M.: Using a 2DST waveguide for usable, physically constrained out-of-band Wi-Fi authentication. In: 2013 ACM Conference on Pervasive and Ubiquitous Computing, pp. 221–224. ACM (2013)Google Scholar
  4. 4.
    Faria, D.B., Cheriton, D.R.: No long-term secrets: Location-based security in overprovisioned wireless lans. In: Hot Topics in Networks (HotNets-III) (2004)Google Scholar
  5. 5.
    Hauber, M., Bachmann, A., Budde, M., Beigl, M.: jActivity: Supporting Mobile Web Developers with HTML5/JavaScript Based Human Activity Recognition. In: 12th International Conference on Mobile and Ubiquitous Multimedia. ACM (2013)Google Scholar
  6. 6.
    Holmquist, L., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.: Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. Ubicomp, p. 116. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  7. 7.
    Ion, I., Langheinrich, M., Kumaraguru, P., Čapkun, S.: Influence of User Perception, Security Needs, and Social Factors on Device Pairing Method Choices. In: SOUPS 2010. ACM (2010)Google Scholar
  8. 8.
    Kainda, R., Flechais, I., Roscoe, A.W.: Usability and security of out-of-band channels in secure device pairing protocols. In: SOUPS 2009 (2009)Google Scholar
  9. 9.
    Kostiainen, K., Rantapuska, O., Moloney, S., Roto, V., Holmstrom, U., Karvonen, K.: Usable access control inside home networks. In: WOWMOM, pp. 1–6 (2007)Google Scholar
  10. 10.
    Kumar, A., Saxena, N., Tsudik, G., Uzun, E.: A comparative study of secure device pairing methods. Pervasive and Mobile Computing 5(6), 734–749 (2009)CrossRefGoogle Scholar
  11. 11.
    Laugwitz, B., Held, T., Schrepp, M.: Construction and evaluation of a user experience questionnaire. In: Holzinger, A. (ed.) USAB 2008. LNCS, vol. 5298, pp. 63–76. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  12. 12.
    Mayrhofer, R., Gellersen, H.-W.: Shake well before use: Authentication based on accelerometer data. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 144–161. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  13. 13.
    Schrepp, M., Olschner, S., Schubert, U.: User Experience Questionnaire Benchmark Praxiserfahrungen zum Einsatz im Business-Umfeld. In: Usability Professionals 2013 (2013)Google Scholar
  14. 14.
    Sheth, A., Seshan, S., Wetherall, D.: Geo-fencing: Confining Wi-Fi coverage to physical boundaries. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol. 5538, pp. 274–290. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  15. 15.
    Sigg, S., Budde, M., Ji, Y., Beigl, M.: Entropy of Audio Fingerprints for Unobtrusive Device Authentication. In: Beigl, M., Christiansen, H., Roth-Berghofer, T.R., Kofod-Petersen, A., Coventry, K.R., Schmidtke, H.R. (eds.) CONTEXT 2011. LNCS, vol. 6967, pp. 296–299. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  16. 16.
    Sigg, S., Schuermann, D., Ji, Y.: PINtext: A Framework for Secure Communication Based on Context. In: Puiatti, A., Gu, T. (eds.) MobiQuitous 2011. LNICST, vol. 104, pp. 314–325. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  17. 17.
    Tullis, T., Albert, W.: Measuring the User Experience: Collecting, Analyzing, and Presenting Usability Metrics. Elsevier Science (2010)Google Scholar
  18. 18.
    Uzun, E., Karvonen, K., Asokan, N.: Usability analysis of secure pairing methods. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 307–324. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  19. 19.
    Viehböck, S.: Brute forcing Wi-Fi Protected Setup. Wi-Fi Protected Setup (2011)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Matthias Budde
    • 1
  • Till Riedel
    • 1
  • Marcel Köpke
    • 1
  • Matthias Berning
    • 1
  • Michael Beigl
    • 1
  1. 1.TECOKarlsruhe Institute of Technology (KIT)KarlsruheGermany

Personalised recommendations