ABSTRACT
We present MultiNet, a novel method for securely associating devices with a domestic wireless network. We show that MultiNet has usability benefits over currently deployed commercial solutions while being backwards compatible with existing devices. MultiNet reduces the interaction overhead of secure association by focusing on users' interactions rather than the network's requirements. This leads to a novel architectural arrangement of the home network infrastructure: the network is dynamically re-configured to accept each pre-configured device, rather than the current norm where each device is configured to be acceptable to the pre-configured network. Assuming devices are pre-configured for a unique, device-specific network name and passphrase, MultiNet constructs an out-of-band visual channel via an intermediary network controller device to convey the device's configuration to the network. This makes the interaction to join a device to the wireless network lightweight and identical across all devices, considerably reducing the interaction overheads for users.
- Aboba, B., and Simon, D. Extensible Authentication Protocol (EAP) Key Management Framework. RFC 5247, IETF, Aug. 2008.Google Scholar
- Balfanz, D., Durfee, G., and Grinter, R. E. Network-in-a-box: how to set up a secure wireless network in under a minute. In Proc. 13th USENIX Security Symposium, USENIX Association (2004). Google ScholarDigital Library
- Balfanz, D., Smetters, D. K., and Stewart, P. Talking to strangers: Authentication in ad-hoc wireless networks. In Proc. NDSS (2002).Google Scholar
- Bangor, A., Kortum, P. T., and Miller, J. T. An Empirical Evaluation of the System Usability Scale. International Journal of Human-Computer Interaction 24, 6 (July 2008), 574--594.Google ScholarCross Ref
- Brooke, J. SUS -- a quick and dirty usability scale. Usability evaluation in industry 189 (1996), 194.Google Scholar
- Goodrich, M., Sirivianos, M., Solis, J., Tsudik, G., and Uzun, E. Loud and clear: Human-verifiable authentication based on audio. In Proc. IEEE 26th ICDCS (2006), 10. Google ScholarDigital Library
- Grinter, R. E., Edwards, W. K., Newman, M. W., and Ducheneaut, N. The work to make a home network work. In ECSCW 2005. Springer Netherlands, 2005, 469--488. Google ScholarDigital Library
- Ho, J. T., and Dearman, D. Improving users' security choices on home wireless networks. In Proc. 6th SOUPS, ACM (2010), 1--12. Google ScholarDigital Library
- Klasnja, P., Consolvo, S., Jung, J., Greenstein, B. M., LeGrand, L., and Powledge. "when i am on wi-fi, i am fearless": privacy concerns & practices in everyday wi-fi use. In Proc. 27th ACM CHI, ACM (2009). Google ScholarDigital Library
- Kobsa, A., Sonawalla, R., Tsudik, G., Uzun, E., and Wang, Y. Serial hook-ups: a comparative usability study of secure device pairing methods. In Proc. 5th SOUPS, ACM (2009), 1--12. Google ScholarDigital Library
- Kumar, A., Saxena, N., Tsudik, G., and Uzun, E. Caveat emptor: A comparative study of secure device pairing methods. In Proc. IEEE PerCom (Mar. 2009), 1--10. Google ScholarDigital Library
- Kuo, C., Walker, J., and Perrig, A. Low-cost manufacturing, usability, and security: An analysis of Bluetooth simple pairing and Wi-Fi protected setup. In Proc. FC'07/USEC'07, Springer-Verlag (2007). Google ScholarDigital Library
- McCune, J., Perrig, A., and Reiter, M. Seeing-is-believing: Using camera phones for human-verifiable authentication. In Proc. IEEE Symposium on Security and Privacy (May 2005), 110--124. Google ScholarDigital Library
- O'Brien, J., and Rodden, T. Interactive systems in domestic environments. In Proc. 2nd DIS, ACM (1997), 247--259. Google ScholarDigital Library
- Petersen, M. G. Remarkable computing: The challenge of designing for the home. In CHI '04, ACM (2004), 1445--1448. Google ScholarDigital Library
- Poole, E. S., Chetty, M., Grinter, R. E., and Edwards, W. K. More than meets the eye: transforming the user experience of home network management. DIS '08, ACM (2008), 455--464. Google ScholarDigital Library
- Sasse, M. A., Brostoff, S., and Weirich, D. Transforming the 'weakest link' -- a human/computer interaction approach to usable and effective security. BT Technology Journal 19 (2001), 122--131. Google ScholarDigital Library
- Saxena, N., Ekberg, J.-E., and Kostiainen, K. Secure Device Pairing Based on a Visual Channel: Design and Usability Study. IEEE Trans. Information Forensics and Security 6, 1 (2011), 28--38. Google ScholarDigital Library
- Shehan, E., and Edwards, W. K. Home networking and HCI: What hath God wrought? In Proc. ACM CHI, ACM (2007), 547--556. Google ScholarDigital Library
- Soriente, C., Tsudik, G., and Uzun, E. Hapadep: Human-assisted pure audio device pairing. In Information Security, vol. 5222 of Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2008. Google ScholarDigital Library
- Stajano, F., and Anderson, R. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Security Protocols, vol. 1796 of Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2000. Google ScholarDigital Library
- Tasoluk, B., and Tanrikulu, Z. A weakest chain approach to assessing the overall effectiveness of the 802.11 wireless network security. CoRR abs/1103.0464 (2011).Google Scholar
- Tolmie, P., Crabtree, A., Rodden, T., Greenhalgh, C., and Benford, S. Making the home network at home: Digital housekeeping. In ECSCW 2007. Springer London, 2007, 331--350.Google ScholarCross Ref
- Wi-Fi Alliance. Frequently Asked Questions : Wi-Fi Protected Setup. http://www.wi-fi.org/files/WFAWi-FiProtectedSetupFAQ.pdf, 2006.Google Scholar
- Wi-fi Alliance. Wi-Fi CERTIFIED Wi-Fi Protected Setup: Easing the User Experience for Home and Small Office Wi-Fi Networks. http://www.wi-fi.org/knowledge-center/white-papers/, 2010.Google Scholar
- Yang, J., and Edwards, W. Icebox: Toward easy-to-use home networking. In Human-Computer Interaction INTERACT 2007, vol. 4663 of Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2007, 197--210. Google ScholarDigital Library
Index Terms
- MultiNet: reducing interaction overhead in domestic wireless networks
Recommendations
MultiNet: usable and secure WiFi device association
SIGCOMM '12: Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communicationThis demo presents MultiNet, a novel method for joining devices to a domestic Wi-Fi network. MultiNet dynamically reconfigures the network to accept each device, rather than configuring each device to fit the network as is the norm. It does so by ...
MultiNet: usable and secure WiFi device association
Special october issue SIGCOMM '12This demo presents MultiNet, a novel method for joining devices to a domestic Wi-Fi network. MultiNet dynamically reconfigures the network to accept each device, rather than configuring each device to fit the network as is the norm. It does so by ...
Connecting the things to the internet: an evaluation of four configuration strategies for wi-fi devices with minimal user interfaces
UbiComp '15: Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous ComputingThe availability of low-power Wi-Fi radio modules opens up opportunities to leverage the existing prevalent Wi-Fi infrastructure for large-scale trials and deployments of Ubicomp technology. In this paper we address the challenge of supporting end-users,...
Comments