Abstract | This paper concerns the problem of phishing attacks in ubiquitous computing environments. The embedding of ubiquitous services into our everyday environments may make fake services seem plausible but it also enables us to authenticate them with respect to those environments. We propose physical and virtual linkage as two types of authenticating evidence in ubiquitous environments and two protocols based on them. We describe an experiment to test hypotheses concerning user responses to physical and virtual linkage with respect to fake Wi-Fi hotspots. Based on our experience we derive an improved protocol for authenticating spontaneously accessed ubiquitous services.

Associated Project
Cityware: Urban Design and Pervasive Systems
DOI
https://doi.org/10.1145/1620545.1620565
Citation
Kindberg, T., Bevan, C., O'Neill, E., Mitchell, J., Grimmett, J., & Woodgate, D. (2009). Authenticating ubiquitous services: a study of wireless hotspot access. Proceedings of the 11th International Conference on Ubiquitous Computing (pp. 115–124). New York, NY, USA: ACM. URL: http://doi.acm.org/10.1145/1620545.1620565, doi:10.1145/1620545.1620565
@inproceedings{Kindberg:2009:AUS:1620545.1620565, author = {Kindberg, Tim and Bevan, Chris and O'Neill, Eamonn and Mitchell, James and Grimmett, Jim and Woodgate, Dawn}, title = {Authenticating Ubiquitous Services: A Study of Wireless Hotspot Access}, booktitle = {Proceedings of the 11th International Conference on Ubiquitous Computing}, series = {UbiComp '09}, year = {2009}, isbn = {978-1-60558-431-7}, location = {Orlando, Florida, USA}, pages = {115--124}, numpages = {10}, url = {http://doi.acm.org/10.1145/1620545.1620565}, doi = {10.1145/1620545.1620565}, acmid = {1620565}, publisher = {ACM}, address = {New York, NY, USA}, keywords = {authentication, phishing, ubiquitous services, wi-fi}, }