skip to main content
10.1145/2470654.2466208acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

MultiNet: reducing interaction overhead in domestic wireless networks

Authors Info & Claims
Published:27 April 2013Publication History

ABSTRACT

We present MultiNet, a novel method for securely associating devices with a domestic wireless network. We show that MultiNet has usability benefits over currently deployed commercial solutions while being backwards compatible with existing devices. MultiNet reduces the interaction overhead of secure association by focusing on users' interactions rather than the network's requirements. This leads to a novel architectural arrangement of the home network infrastructure: the network is dynamically re-configured to accept each pre-configured device, rather than the current norm where each device is configured to be acceptable to the pre-configured network. Assuming devices are pre-configured for a unique, device-specific network name and passphrase, MultiNet constructs an out-of-band visual channel via an intermediary network controller device to convey the device's configuration to the network. This makes the interaction to join a device to the wireless network lightweight and identical across all devices, considerably reducing the interaction overheads for users.

References

  1. Aboba, B., and Simon, D. Extensible Authentication Protocol (EAP) Key Management Framework. RFC 5247, IETF, Aug. 2008.Google ScholarGoogle Scholar
  2. Balfanz, D., Durfee, G., and Grinter, R. E. Network-in-a-box: how to set up a secure wireless network in under a minute. In Proc. 13th USENIX Security Symposium, USENIX Association (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Balfanz, D., Smetters, D. K., and Stewart, P. Talking to strangers: Authentication in ad-hoc wireless networks. In Proc. NDSS (2002).Google ScholarGoogle Scholar
  4. Bangor, A., Kortum, P. T., and Miller, J. T. An Empirical Evaluation of the System Usability Scale. International Journal of Human-Computer Interaction 24, 6 (July 2008), 574--594.Google ScholarGoogle ScholarCross RefCross Ref
  5. Brooke, J. SUS -- a quick and dirty usability scale. Usability evaluation in industry 189 (1996), 194.Google ScholarGoogle Scholar
  6. Goodrich, M., Sirivianos, M., Solis, J., Tsudik, G., and Uzun, E. Loud and clear: Human-verifiable authentication based on audio. In Proc. IEEE 26th ICDCS (2006), 10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Grinter, R. E., Edwards, W. K., Newman, M. W., and Ducheneaut, N. The work to make a home network work. In ECSCW 2005. Springer Netherlands, 2005, 469--488. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Ho, J. T., and Dearman, D. Improving users' security choices on home wireless networks. In Proc. 6th SOUPS, ACM (2010), 1--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Klasnja, P., Consolvo, S., Jung, J., Greenstein, B. M., LeGrand, L., and Powledge. "when i am on wi-fi, i am fearless": privacy concerns & practices in everyday wi-fi use. In Proc. 27th ACM CHI, ACM (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Kobsa, A., Sonawalla, R., Tsudik, G., Uzun, E., and Wang, Y. Serial hook-ups: a comparative usability study of secure device pairing methods. In Proc. 5th SOUPS, ACM (2009), 1--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Kumar, A., Saxena, N., Tsudik, G., and Uzun, E. Caveat emptor: A comparative study of secure device pairing methods. In Proc. IEEE PerCom (Mar. 2009), 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Kuo, C., Walker, J., and Perrig, A. Low-cost manufacturing, usability, and security: An analysis of Bluetooth simple pairing and Wi-Fi protected setup. In Proc. FC'07/USEC'07, Springer-Verlag (2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. McCune, J., Perrig, A., and Reiter, M. Seeing-is-believing: Using camera phones for human-verifiable authentication. In Proc. IEEE Symposium on Security and Privacy (May 2005), 110--124. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. O'Brien, J., and Rodden, T. Interactive systems in domestic environments. In Proc. 2nd DIS, ACM (1997), 247--259. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Petersen, M. G. Remarkable computing: The challenge of designing for the home. In CHI '04, ACM (2004), 1445--1448. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Poole, E. S., Chetty, M., Grinter, R. E., and Edwards, W. K. More than meets the eye: transforming the user experience of home network management. DIS '08, ACM (2008), 455--464. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Sasse, M. A., Brostoff, S., and Weirich, D. Transforming the 'weakest link' -- a human/computer interaction approach to usable and effective security. BT Technology Journal 19 (2001), 122--131. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Saxena, N., Ekberg, J.-E., and Kostiainen, K. Secure Device Pairing Based on a Visual Channel: Design and Usability Study. IEEE Trans. Information Forensics and Security 6, 1 (2011), 28--38. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Shehan, E., and Edwards, W. K. Home networking and HCI: What hath God wrought? In Proc. ACM CHI, ACM (2007), 547--556. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Soriente, C., Tsudik, G., and Uzun, E. Hapadep: Human-assisted pure audio device pairing. In Information Security, vol. 5222 of Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Stajano, F., and Anderson, R. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Security Protocols, vol. 1796 of Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Tasoluk, B., and Tanrikulu, Z. A weakest chain approach to assessing the overall effectiveness of the 802.11 wireless network security. CoRR abs/1103.0464 (2011).Google ScholarGoogle Scholar
  23. Tolmie, P., Crabtree, A., Rodden, T., Greenhalgh, C., and Benford, S. Making the home network at home: Digital housekeeping. In ECSCW 2007. Springer London, 2007, 331--350.Google ScholarGoogle ScholarCross RefCross Ref
  24. Wi-Fi Alliance. Frequently Asked Questions : Wi-Fi Protected Setup. http://www.wi-fi.org/files/WFAWi-FiProtectedSetupFAQ.pdf, 2006.Google ScholarGoogle Scholar
  25. Wi-fi Alliance. Wi-Fi CERTIFIED Wi-Fi Protected Setup: Easing the User Experience for Home and Small Office Wi-Fi Networks. http://www.wi-fi.org/knowledge-center/white-papers/, 2010.Google ScholarGoogle Scholar
  26. Yang, J., and Edwards, W. Icebox: Toward easy-to-use home networking. In Human-Computer Interaction INTERACT 2007, vol. 4663 of Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2007, 197--210. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. MultiNet: reducing interaction overhead in domestic wireless networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI '13: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
      April 2013
      3550 pages
      ISBN:9781450318990
      DOI:10.1145/2470654

      Copyright © 2013 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 27 April 2013

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CHI '13 Paper Acceptance Rate392of1,963submissions,20%Overall Acceptance Rate6,199of26,314submissions,24%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader