Download now Free registration required
This paper concerns the problem of phishing attacks in ubiquitous computing environments. The embedding of ubiquitous services into the everyday environments may make fake services seem plausible but it also enables us to authenticate them with respect to those environments. The paper proposes physical and virtual linkage as two types of authenticating evidence in ubiquitous environments and two protocols based on them. This paper describes an experiment to test hypotheses concerning user responses to physical and virtual linkage with respect to fake Wi-Fi hotspots. Based on the experience the authors' derive an improved protocol for authenticating spontaneously accessed ubiquitous services.
- Format: PDF
- Size: 1207.3 KB