A large-scale analysis of Wi-Fi passwords

被引:4
|
作者
Veroni, Eleni [1 ]
Ntantogian, Christoforos [2 ]
Xenakis, Christos [1 ]
机构
[1] Univ Piraeus, Dept Digital Syst, Piraeus, Greece
[2] Ionian Univ, Dept Informat, Corfu, Greece
关键词
Wi-Fi networks; Passwords; Password characteristics; Measurements; Security; Access control; SECURITY;
D O I
10.1016/j.jisa.2022.103190
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Passwords remain the most common method of authentication in computers and networks. Thus, passwords have been the prime targets of attackers, and the number of data breaches in the last few years proves the high value of passwords. A detailed analysis of such data can provide insight on password trends and patterns users follow when they create a password. While there is a wealth of research investigating online password choices, to the best of our knowledge, there are no studies specifically designed to capture user behavior towards Wi-Fi passwords. In this paper, we perform a large-scale analysis of Wi-Fi passwords categorizing them as public Wi-Fi passwords created for Wi-Fi hotspots and private Wi-Fi passwords created for private/home Wi-Fi installations. First, we analyze public Wi-Fi passwords by collecting and analyzing a corpus of more than one million passwords of Wi-Fi hotspots. The aim of the analysis of public Wi-Fi passwords is to reveal password characteristics and compare them against web account passwords, to discover similarities and differences between them. While comparing the collected dataset with a set of popular leaked web password databases, several similarities between them can be identified, despite the fact that these password categories serve different purposes. Secondly, we explore through an online survey, the characteristics of passwords in private/home Wi-Fi installations. The aim is to give greater insight into private Wi-Fi password selection of users and highlight password trends when it comes to context, length, strength and architecture. Results reveal that users follow several poor security practices when selecting their private Wi-Fi passwords and tend to underestimate their importance with regards to their security and privacy. To the best of the authors' knowledge, this is the first work to examine Wi-Fi passwords characteristics and shed light on how users choose them in terms of structure and composition.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] Wi-Fi calling - Extending the reach of VoLTE to Wi-Fi
    Norell, Lennart
    Lundström, Anders
    Österlund, Håkan
    Johansson, Henrik
    Nilsson, Daniel
    Ericsson Review (English Edition), 2015, 92 (01): : 62 - 69
  • [32] Wi-Fi Sensing - The Next Big Evolution of Wi-Fi
    Manku, Taj
    Kravets, Oleksiy
    MICROWAVE JOURNAL, 2023, 66 (07) : 54 - 56
  • [33] Augmented Wi-Fi: An AI-based Wi-Fi Management Framework for Wi-Fi/LTE Coexistence
    Soto, Paola
    Camelo, Miguel
    Fontaine, Jaron
    Girmay, Merkebu
    Shahid, Adnan
    Maglogiannis, Vasilis
    De Poorter, Eli
    Moerman, Ingrid
    Botero, Juan F.
    Latre, Steven
    2020 16TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2020,
  • [34] A Flow-Level Wi-Fi Model for Large Scale Network Simulation
    Courageux-Sudan, Clement
    Guegan, Loic
    Orgerie, Anne-Cecile
    Quinson, Martin
    PROCEEDINGS OF THE 25TH ACM INTERNATIONAL CONFERENCE ON MODELING ANALYSIS AND SIMULATION OF WIRELESS AND MOBILE SYSTEMS, MSWIM 2022, 2022, : 111 - 119
  • [35] SCaNME: Location tracking system in large-scale campus Wi-Fi environment using unlabeled mobility map
    Zhou, Mu
    Tian, Zengshan
    Xu, Kunjie
    Yu, Xiang
    Hong, Xia
    Wu, Haibo
    EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (07) : 3429 - 3443
  • [36] How much can Wi-Fi offload? - A Large-scale Dense-urban Indoor Deployment Study
    Hu, Liang
    Coletti, Claudio
    Nguyen Huan
    Mogensen, Preben
    Elling, Jan
    2012 IEEE 75TH VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2012,
  • [37] A hierarchical auxiliary deep neural network architecture for large-scale indoor localization based on Wi-Fi fingerprinting
    Cha, Jaehoon
    Lim, Enggee
    APPLIED SOFT COMPUTING, 2022, 120
  • [38] Comparative Analysis of Wi-Fi and WiMAX
    Selvarani, D. Roselin
    Ravi, T. N.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [39] 查看Wi-Fi密码与Wi-Fi的连接
    王荣桂
    电脑知识与技术(经验技巧), 2016, (08) : 24 - 25