HCI 2007: Human-Computer Interaction. Interaction Design and Usability pp 549-558 | Cite as
Usability Improvements for WLAN Access
Abstract
Wireless Local Area Networks (WLANs) have become commonplace addition to the normal environments surrounding us. Based on IEEE 802.11 technology, WLANs can now be found in the working place, at homes, and in many cities’ central district area as open or commercial services. These access points in the public areas are called “hotspots”. They provide Internet access in various types of public places such as shopping districts, cafés, airports, and shops. As the hotspots are being used by a growing user base that is also quite heterogeneous, their usability is becoming evermore important. As hotspots can be accessed by a number of devices differing in their capabilities, size, and user interfaces, achieving good usability in accessing the services is not straightforward. This paper reports a user study and usability analysis on WLAN access to discover user’s needs and suggest enhancements to fight the usability problems in WLAN access.
Keywords
WLAN Usability user interface design security accessibility authenticationPreview
Unable to display preview. Download preview PDF.
References
- 1.Ackerman, M.S.: Privacy in pervasive environments: next generation labeling protocols. Pers. Ubiq. Comput. 8(6), 234–240 (2004)Google Scholar
- 2.Anon: [Aircrack-ng]: Referenced (15.2.2007) Web page http://www.aircrack-ng.org/doku.php
- 3.Anon: The Official WorldWide Wardrive (Referenced 16.2.2007), Web page available at http://www.worldwidewardrive.org/wwwdstats.html
- 4.Anon: Wardriving Tools, Wardriving Software, Wardriving Utilities (Referenced 16.2.2007), Web page available at http://www.wardrive.net/wardriving/tools
- 5.Balachandran, A., Voelker, G.M., Bahl, P.: Wireless hotspots: current challenges and future directions. In: WMASH ’03: Proc. of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots, pp. 1–9. ACM Press, New York (2003)CrossRefGoogle Scholar
- 6.Balachandran, A., Voelker, G.M., Bahl, P., Rangan, P.V.: Characterizing user behavior and network performance in a public wireless lan. In: SIGMETRICS ’02: Proc. of the 2002 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, pp. 195–205. ACM Press, New York (2002)CrossRefGoogle Scholar
- 7.Balachandran, A., Voelker, G.M., Bahl, P.: Wireless hotspots: current challenges and future directions. Mob. Netw. Appl. 10(3), 265–274 (2005)CrossRefGoogle Scholar
- 8.Berghel, H.: Wireless infidelity I: war driving. Comm. ACM. 47(9), 21–26 (2004)CrossRefGoogle Scholar
- 9.Blinn, D.P., Henderson, T., Kotz, D.: Analysis of a wi-fi hotspot network. In: Proc. of the 2005 workshop on Wireless traffic measurements and modeling, pp. 1–6. USENIX Association, Berkeley, CA, USA (2005)Google Scholar
- 10.Burak, A., Sharon, T.: Analyzing usage of location based services. In: Proc.of Human factors in computing systems, pp. 970–971. ACM Press, New York (2003)CrossRefGoogle Scholar
- 11.Damsgaard, J., Parikh, M.A., Rao, B.: Wireless commons perils in the common good. Commun. ACM 49(2), 104–109 (2006)CrossRefGoogle Scholar
- 12.Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the Key Scheduling Algorithm in RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, Springer, Heidelberg (2001)Google Scholar
- 13.Gruteser, M., Grunwald, D.: Enhancing location privacy in wireless lan through disposable interface identifiers: a quantitative analysis. In: Proc. of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots, pp. 46–55. ACM Press, New York, USA (2003)CrossRefGoogle Scholar
- 14.Henderson, T., Kotz, D., Abyzov, L.: The changing usage of a mature campus-wide wireless network. In: Proc. of the 10th annual international conference on Mobile computing and networking, pp. 187–201. ACM Press, New York, USA (2004)CrossRefGoogle Scholar
- 15.Hong, J.I., Ng, J.D., Lederer, S., Landay, J.A.: Proc. of the 2004 conference on Designing interactive systems: processes, practices, methods, and techniques, pp. 91–100. ACM Press, New York, USA (2004)CrossRefGoogle Scholar
- 16.IEEE: 802.11-1999 Information technology. Telecommunications and information exchange between systems- Local and metropolitan area networks. Spec. req. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE New York (1999)Google Scholar
- 17.IEEE: 802.11i-2004 IEEE Standard for Information technology- Telecommunications and information exchange between systems- Local and metropolitan area networks. Spec. req. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 6: Medium Access Control (MAC) Security Enhancements. IEEE New York (2004)Google Scholar
- 18.Kanter, T.G.: Going wireless, enabling an adaptive and extensible environment. Mob. Netw. Appl. 8(1), 37–50 (2003)CrossRefGoogle Scholar
- 19.Koskela, T., Väänänen-Vainio-Mattila, K.: Evolution towards smart home environments: empirical evaluation of three user interfaces. Personal Ubiquitous Comput. 8 (2004)Google Scholar
- 20.Lederer, S., Mankoff, J., Dey, A.K.: Who wants to know what when? privacy preference determinants in ubiquitous computing. In: CHI’03: extended abstracts on Human factors in computing systems, pp. 724–725. ACM Press, New York, USA (2003)Google Scholar
- 21.Lederer, S., Hong, I., Dey, K., Landay, A.: Personal privacy through understanding and action: five pitfalls for designers. Pers. and Ubiq. Comp. 8(6), 440–454 (2004)CrossRefGoogle Scholar
- 22.Lehikoinen, J.T., Kaikkonen, A.: PePe field study: constructing meanings for locations in the context of mobile presence. In: Proceedings of the 8th Conference on Human-Computer interaction with Mobile Devices and Services MobileHCI ’06, vol. 159, pp. 53–60. ACM Press, New York (2006)CrossRefGoogle Scholar
- 23.Matsunaga, Y., Merino, A.S., Suzuki, T., Katz, R.H.: Services: Secure authentication system for public WLAN roaming. In: Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots WMASH ’03, ACM Press, New York, USA (2003)Google Scholar
- 24.McNett, M., Voelker, G.M.: Access and mobility of wireless pda users. SIGMOBILE Mob. Comput. Commun. Rev. 7(4), 55–57 (2003)CrossRefGoogle Scholar
- 25.Mitseva, A., Imine, M., Prasad, N.R.: Context-aware privacy protection with profile management. In: Proc. of the 4th international Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, pp. 53–61. ACM Press, NY (2006)CrossRefGoogle Scholar
- 26.Nicholson, A.J., Chawathe, Y., Chen, M.Y., Noble, B.D., Wetherall, D.: Improved access point selection. In: Proc. of the 4th international conference on Mobile systems, applications and services, pp. 233–245. ACM Press, New York (2006)CrossRefGoogle Scholar
- 27.Nielsen, J.: Usability engineering. Academic Press, Inc. Boston, USA (1993)MATHGoogle Scholar
- 28.Palmieri, A., Sigona, F.: A QoS management system for multimedia applications in IEEE 802.11 wireless LAN. In: Proc. of the 5th international Conference on Mobile and Ubiquitous Multimedia MUM ’06,, vol. 193, ACM Press, New York, USA (2006)Google Scholar
- 29.Potter, B.: Wireless hotspots: petri dish of wireless security. Comm. ACM 49(6), 5 (2006)CrossRefGoogle Scholar
- 30.Päykkänen, K., Räisänen, H., Isomäki, H.: Mobile studying and social usability on a wireless campus. In: Proc. of the 8th Conference on Human-Computer interaction with Mobile Devices and Services, vol. 159, pp. 269–270. ACM Press, New York (2006)CrossRefGoogle Scholar
- 31.Roto, V., Laakso, K.: Mobile guides for locating network hotspots. In: Workshop on HCI in Mobile Guides (2005)Google Scholar
- 32.Ryan, C., Gonsalves, A.: The effect of context and application type on mobile usability: an empirical study. In: Proc. of the Twenty-eighth Australasian conference on Computer Science, Australian Computer Society, Inc. pp. 115–124 ( 2005)Google Scholar
- 33.Stubblefield, A., Ioannidis, J., Rubin, A.D.: Using the Fluhrer, Mantin, and Sharmit Attack to Break WEP. In: Proc. of the Network and Distributed System Security Symposium, Internet Society (2002)Google Scholar
- 34.Tang, D., Baker, M.: Analysis of a local-area wireless network. In: Proc of the 6th annual international conference on Mobile computing and networking, pp. 1–10. ACM Press, NY, USA (2000)CrossRefGoogle Scholar
- 35.Venkatesh, V., Ramesh, V., Massey, A.P.: Understanding usability in mobile commerce. Commun. ACM. 46(12), 53–56 (2003)CrossRefGoogle Scholar
- 36.Whitten, A., Tygar, J.D.: Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0, In: Proc. of the 8th USENIX Security Symposium, USENIX (1999)Google Scholar