Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1377))

Abstract

The increasing deployment of public wireless access points (hotspots) and the rise of wireless computing devices such as tablets and mobiles have made it easier for people to access information on the Internet. Though convenient, such networks have potential security and privacy risks. However, most users are neglecting the privacy threats because currently there is no way for them to know to what extent their privacy is revealed. This paper has two goals, the first goal examine the users’ awareness of privacy leakage in public hotspots from activities such as web browsing, search engine querying, and use Social Networking, the second goal for this paper help the university decision-makers to consider the interests of public Wi-Fi users to open or close those frequently searched sites within the university’s domain and to make the ideal use of university resources. We have collected real data for 7295 users from three public Wi-Fi points distributed in the range of Minia University, as it covers the large range of the university. After analyzing the collected data and classify all visited website using machine learning model, we discover that 85% from the users use an unwanted links category, Which may cause his/her device’s information and privacy to be leaked, and 90% of the users use Social Network category, and 60% from the users use search engine category.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ali, S., Osman, T., Mannan, M., Youssef, A.:On privacy risks of public WiFi captive portals. In: Data Privacy Management, Cryptocurrencies and Blockchain Technology, pp. 80-98 (2019)

    Google Scholar 

  2. Cisco, V.: Cisco visual networking index: Forecast and trends, 2017–2022 White Paper, vol. 1 ,p. 1 (2018)

    Google Scholar 

  3. Fang, Z., Fu, B., Qin, Z., Zhang, F., Zhang, D.: PrivateBus: privacy identification and protection in large-scale bus WiFi syste In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, vol. 4 , pp. 1–23 (2020)

    Google Scholar 

  4. Cheng, N., Wang, O., Cheng, M., Prasant, S., Aruna, : Characterizing privacy leakage of public wifi networks for users on travel. In: 2013 Proceedings IEEE INFOCOM, pp. 2769–2777 (2013)

    Google Scholar 

  5. Sombatruang, N., Kadobayashi, Y., Sasse, M., Baddeley, M., Miyamoto, D.: The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST), pp. 1–11 (2018)

    Google Scholar 

  6. Google: HTTPS encryption on the web. https://transparencyreport.google.com/https/overview?hl=en. Accessed (2020)

  7. Englehardt, S., Narayanan, A.: Online tracking: a 1-million-site measurement and analysis. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1388–1401 (2016)

    Google Scholar 

  8. Brookman, J., Rouge, A., Aaron, Y., Christina: Cross-device tracking: measurement and disclosures. Proc. Priv. Enhancing Technol. 2017, 133–148 (2017)

    Article  Google Scholar 

  9. Binns, R., Zhao, J., Kleek, M., Shadbolt, N.: Measuring third-party tracker power across web and mobile. ACM Trans. Internet Technol. (TOIT) 18, 1–22 (2018)

    Article  Google Scholar 

  10. Jain, S., Bensaid, E., de Montjoye, Y.:UNVEIL: capture and visualise WiFi data leakages. In: The World Wide Web Conference, pp. 3550–3554 (2019)

    Google Scholar 

  11. Vattapparamban, E., Çiftler, S., Güvenç, I., Akkaya, K., Kadri, A.: Indoor occupancy tracking in smart buildings using passive sniffing of probe requests. In: 2016 IEEE International Conference on Communications Workshops (ICC), pp. 38–44 (2016)

    Google Scholar 

  12. Atkinson, S., Mitchell, E., Rio, M., Matich, G.: Your WiFi is leaking: what do your mobile apps gossip about you? Future Gener. Comput. Syst. 80, 546–557 (2018)

    Article  Google Scholar 

  13. O’hanlon, P., Borgaonkar, R., Hirschi, L.: Mobile subscriber wifi privacy. In: 2017 IEEE Security and Privacy Workshops (SPW), pp. 169–178 (2017)

    Google Scholar 

  14. Klasnja, P., Consolvo, S., Jung, J., Greenstein, M., LeGrand, L., Powledge, P., Wetherall, D.:When I am on Wi-Fi, I am fearless privacy concerns & practices in eeryday Wi-Fi use. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1993–2002 (2009)

    Google Scholar 

  15. Sombatruang, N., Sasse, A., Baddeley, M.: Why do people use unsecure public Wi-Fi? An investigation of behaviour and factors driving decisions. In: Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, pp. 61–72 (2016)

    Google Scholar 

  16. Justin, d.: Cyber-criminals ‘hack into free wi-fi hotspots to get bank details’ (2016). https://www.standard.co.uk/news/crime/cybercriminals-hack-into-free-wifi-hotspots-to-get-bank-details-a3151736.html

  17. Zheleva, E., Getoor, L.: To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In: Proceedings of the 18th International Conference On World Wide Web, pp. 531–540 (2009)

    Google Scholar 

  18. Krishnamurthy, B., Wills, E.: Characterizing privacy in online social networks. In: Proceedings of the First Workshop On Online Social Networks, pp.37–42 (2008)

    Google Scholar 

  19. Krishnamurthy, B., Wills, C.: Privacy diffusion on the web: a longitudinal perspective. In: Proceedings of the 18th International Conference On World Wide Web, pp. 541–550 (2009)

    Google Scholar 

  20. Backes, M., Kate, A., Maffei, M., Pecina, K.: Obliviad: provably secure and practical online behavioral advertising. In: 2012 IEEE Symposium on Security and Privacy, pp. 257–271 (2012)

    Google Scholar 

  21. (2020). https://github.com/domantasm96/URL-categorization-using-machine-learning

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ahmed Y. Lotfy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lotfy, A.Y., Zaki, A.M., Abd-El-Hafeez, T., Mahmoud, T.M. (2021). Privacy Issues of Public Wi-Fi Networks. In: Hassanien, A.E., et al. Proceedings of the International Conference on Artificial Intelligence and Computer Vision (AICV2021). AICV 2021. Advances in Intelligent Systems and Computing, vol 1377. Springer, Cham. https://doi.org/10.1007/978-3-030-76346-6_58

Download citation

Publish with us

Policies and ethics