{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T15:54:47Z","timestamp":1718726087512},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,4,22]],"date-time":"2020-04-22T00:00:00Z","timestamp":1587513600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,22]],"date-time":"2020-04-22T00:00:00Z","timestamp":1587513600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["UID\/CEC\/00127\/2013","UID\/CEC\/00127\/2019"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s11277-020-07298-y","type":"journal-article","created":{"date-parts":[[2020,4,22]],"date-time":"2020-04-22T08:02:31Z","timestamp":1587542551000},"page":"1891-1915","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["EAP-SH: An EAP Authentication Protocol to Integrate Captive Portals in the 802.1X Security Architecture"],"prefix":"10.1007","volume":"113","author":[{"given":"Nuno","family":"Marques","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9745-4361","authenticated-orcid":false,"given":"Andr\u00e9","family":"Z\u00faquete","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5029-6191","authenticated-orcid":false,"given":"Jo\u00e3o Paulo","family":"Barraca","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,22]]},"reference":[{"key":"7298_CR1","unstructured":"LAN\/MAN Standards\u00a0Committee of\u00a0the IEEE Computer\u00a0Society. Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, amendment 6: Medium access control (MAC) security enhancements. IEEE Std 802.11i, July 2004."},{"key":"7298_CR2","unstructured":"LAN\/MAN Standards\u00a0Committee of\u00a0the IEEE Computer\u00a0Society. Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, amendment 4: Protected management frames. IEEE Std 802.11w, July 2009."},{"key":"7298_CR3","unstructured":"LAN\/MAN Standards\u00a0Committee of\u00a0the IEEE Computer\u00a0Society. IEEE Standard for local and metropolitan area networks: Port-based network access control. IEEE Std 802.1X-2010, February 2010."},{"key":"7298_CR4","doi-asserted-by":"crossref","unstructured":"Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., & Levkowetz, H. (2004). Extensible authentication protocol (EAP). RFC 3748 (Proposed Standard), June 2004.","DOI":"10.17487\/rfc3748"},{"issue":"3","key":"7298_CR5","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.csi.2006.04.001","volume":"29","author":"R Dantu","year":"2007","unstructured":"Dantu, R., Clothier, G., & Atri, A. (2007). EAP methods for wireless networks. Computer Standards & Interfaces, 29(3), 289\u2013301.","journal-title":"Computer Standards & Interfaces"},{"key":"7298_CR6","unstructured":"Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2017\u20132022. Cisco White Paper, February 2019. Retrieved from https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/white-paper-c11-738429.pdf."},{"key":"7298_CR7","unstructured":"Captive portal and the new security paradigm: Options for handling redirection problems caused by certificate mismatches. Nomadix. (2013). Retrieved from https:\/\/www.anixter.com\/content\/dam\/Suppliers\/nomadix\/SSL_Redirection.pdf."},{"key":"7298_CR8","unstructured":"wififreak. Captive portals. IETF HTTP Working Group Wiki, February 2016. Retrieved from https:\/\/github.com\/httpwg\/wiki\/wiki\/Captive-Portals."},{"key":"7298_CR9","unstructured":"Captive portal and HSTS difficulties. WirelessPhreak, May 2017. Retrieved from https:\/\/www.wirelessphreak.com\/2017\/05\/captive-portal-and-hsts-issues.html."},{"key":"7298_CR10","doi-asserted-by":"crossref","unstructured":"Kindberg, T. (2008). Measuring trust in Wi-Fi hotspots. In Proceedings of the 2008 conference on human factors in computing systems (CHI 2008) (pp. 173\u2013182). Florence, Italy.","DOI":"10.1145\/1357054.1357084"},{"key":"7298_CR11","doi-asserted-by":"crossref","unstructured":"Klasnja, P., Consolvo, S., Jung, J., Greenstein, B. M., LeGrand, L., Powledge, P., & Wetherall, D. (2009). \u201cWhen I am on Wi-Fi, i am fearless\u201d: Privacy concerns & practices in everyday Wi-Fi use. In Proceedings of the 2009 conference on human factors in computing systems (CHI 2009) (pp. 1993\u20132002). Boston, MA, USA.","DOI":"10.1145\/1518701.1519004"},{"key":"7298_CR12","doi-asserted-by":"crossref","unstructured":"Consolvo, S., Jung, J., Greenstein, B., Powledge, P., Maganis, G. & Avrahami, D. (2010). The Wi-Fi privacy ticker: Improving awareness & control of personal information exposure on Wi-Fi. In Proceedings of the 12th ACM international conference on ubiquitous computing (UbiComp \u201910) (pp. 321\u2013330). Copenhagen, Denmark.","DOI":"10.1145\/1864349.1864398"},{"key":"7298_CR13","unstructured":"The future of hotspots: Making Wi-Fi as secure and easy to use as cellular. Cisco White Paper (2011). Retrieved from https:\/\/www.webtorials.com\/main\/resource\/papers\/cisco\/paper177\/Future-of-Hotspots.pdf."},{"key":"7298_CR14","unstructured":"Seigneur, J.-M. (2015). Wi-trust: Improving Wi-Fi hotspots trustworthiness with computational trust management. In 2015 ITU kaleidoscope: Trust in the information society (K-2015) (pp. 1\u20136). Barcelona, Spain."},{"key":"7298_CR15","doi-asserted-by":"crossref","unstructured":"Sombatruang, N., Angela Sasse, M., & Baddeley, M. (2016). Why do people use unsecure public Wi-Fi?: An investigation of behaviour and factors driving decisions. In Proceedings of the 6th workshop on socio-technical aspects in security and trust (STAST \u201916) (pp. 61\u201372). Los Angeles, California.","DOI":"10.1145\/3046055.3046058"},{"key":"7298_CR16","doi-asserted-by":"crossref","unstructured":"Sombatruang, N., Onwuzurike, L., Angela Sasse, M., & Baddeley, M. (2019). factors influencing users to use unsecured Wi-Fi networks: Evidence in the wild. In Proceedings of the 12th conference on security and privacy in wireless and mobile networks (WiSec \u201919) (pp. 203\u2013213). Miami, Florida, USA.","DOI":"10.1145\/3317549.3323412"},{"key":"7298_CR17","unstructured":"Stakenburg, D., & Crampton, J. (2013). Underexposed risks of public Wi-Fi hotspots. Retrieved from https:\/\/www.computerweekly.com\/ehandbook\/Underexposed-risks-of-public-Wi-Fi-hotspots."},{"key":"7298_CR18","unstructured":"Duhn, J. E. (2015). Are public Wi-Fi hotspots a security risk? Security risks of using public Wi-Fi explained. Computerworld UK, August 2015. Retrieved from https:\/\/www.computerworlduk.com\/security\/are-public-wi-fi-hotspots-really-major-security-risk-3623447."},{"key":"7298_CR19","unstructured":"10 steps to staying secure on public Wi-Fi. WeLiveSecurity, September 2015. Retrieved from https:\/\/www.welivesecurity.com\/2015\/09\/02\/10-steps-staying-secure-public-wi-fi."},{"key":"7298_CR20","unstructured":"Rivera, D. (2017). Are captive portals a security challenge? Intraway, May 2017. Retrieved from https:\/\/thinkincredible.intraway.com\/blog-post\/captive-portals-security-challenge."},{"key":"7298_CR21","doi-asserted-by":"crossref","unstructured":"Rescorla, E. (2018). The transport layer security (TLS) protocol version 1.3. RFC 8446 (proposed standard), August 2018.","DOI":"10.17487\/RFC8446"},{"key":"7298_CR22","doi-asserted-by":"crossref","unstructured":"Rigney, C., Willens, S., Rubens, A., & Simpson, W. (2000). Remote authentication dial in user service (RADIUS). RFC 2865 (draft standard), June 2000.","DOI":"10.17487\/rfc2865"},{"key":"7298_CR23","doi-asserted-by":"crossref","unstructured":"Simon, D., Aboba, B., & Hurst, R. (2008). The EAP-TLS authentication protocol. RFC 5216 (proposed standard), March 2008.","DOI":"10.17487\/rfc5216"},{"key":"7298_CR24","unstructured":"Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., & Polk, W. (2008). Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile. RFC 5280 (proposed standard), updated by RFC 6818, May 2008."},{"key":"7298_CR25","unstructured":"Prytuluk, M. (2017). Two new security categories: DNS tunneling VPN and potentially harmful. Cisco Umbrella, November 2017. Retrieved from https:\/\/support.umbrella.com\/hc\/en-us\/articles\/115001077988-Two-New-Security-Categories-DNS-tunneling-VPN-and-Potentially-Harmful."},{"key":"7298_CR26","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-642-01244-0_5","volume-title":"Emerging challenges for security, privacy and trust","author":"L Nussbaum","year":"2009","unstructured":"Nussbaum, L., Neyron, P., & Richard, O. (2009). On robust covert channels inside DNS. In D. Gritzalis & J. Lopez (Eds.), Emerging challenges for security, privacy and trust (pp. 51\u201362). Berlin: Springer."},{"key":"7298_CR27","doi-asserted-by":"crossref","unstructured":"Xia, H., & Brustoloni, J. (2004). Detecting and blocking unauthorized access in Wi-Fi networks. In Proceedings of the third IFIP-TC6 international conference on research in networking (Networking 2004), May 2004, Athens, Greece.","DOI":"10.1007\/978-3-540-24693-0_65"},{"key":"7298_CR28","doi-asserted-by":"crossref","unstructured":"Abu-Nimeh, S., & Nair, S. (2008). Bypassing security toolbars and phishing filters via DNS poisoning. In IEEE global telecommunications conference (IEEE GLOBECOM 2008), November 2008, New Orleans, LA, USA.","DOI":"10.1109\/GLOCOM.2008.ECP.386"},{"key":"7298_CR29","doi-asserted-by":"crossref","unstructured":"Dabrowski, A., Merzdovnik, G., Kommenda, N., & Weippl, E. (2016). Browser history stealing with captive Wi-Fi portals. In IEEE security and privacy workshops (SPW 2016) (pp. 234\u2013240), May 2016, San Jose, CA, USA.","DOI":"10.1109\/SPW.2016.42"},{"key":"7298_CR30","unstructured":"i\u00a0Sprint. (2000). AccessMatrix UAM: Common security platform for enterprise applications. Retrieved from https:\/\/www.i-sprint.com\/brochure\/uam_en.pdf."},{"key":"7298_CR31","doi-asserted-by":"crossref","unstructured":"Nottingham, M., & Fielding, R. (2012). Additional HTTP status codes. RFC 6585 (proposed standard), April 2012.","DOI":"10.17487\/rfc6585"},{"key":"7298_CR32","doi-asserted-by":"crossref","unstructured":"Frankel, S., & Krishnan, S. (2011). IP security (IPsec) and internet key exchange (IKE) document roadmap. RFC 6071 (informational), February 2011.","DOI":"10.17487\/rfc6071"},{"key":"7298_CR33","doi-asserted-by":"crossref","unstructured":"Godber, A., & Dasgupta, P. (2002). Secure wireless gateway. In Proceedings of 1st ACM workshop on wireless security (Wise \u201902) (pp. 41\u201346), Atlanta, GA, USA.","DOI":"10.1145\/570681.570686"},{"key":"7298_CR34","doi-asserted-by":"crossref","unstructured":"Choi, J., Chang, S. Y., Ko, D., & Hu Y. C. (2011). Secure MAC-layer protocol for captive portals in wireless hotspots. In 2011 IEEE international conference on communications (ICC) (pp. 1\u20135). IEEE.","DOI":"10.1109\/icc.2011.5963508"},{"key":"7298_CR35","unstructured":"Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Advances in cryptology: CRYPTO \u201984 (LNCS 196) (vol.\u00a084, pp. 47\u201353). Springer."},{"key":"7298_CR36","unstructured":"Wi-Fi Alliance. (2016). Hotspot 2.0 (release 2) technical specification."},{"key":"7298_CR37","unstructured":"LAN\/MAN Standards\u00a0Committee of\u00a0the IEEE Computer\u00a0Society. Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, amendment 9: Interworking with external networks. IEEE Std 802.11u, February 2011."},{"key":"7298_CR38","doi-asserted-by":"crossref","unstructured":"Ferreira, A., Huynen, J.-L., Koenig, V., & Lenzini, G. (2014). Socio-technical security analysis of wireless hotspots. In Proceedings of the international conference on human aspects of information security, privacy, and trust (pp. 306\u2013317). Los Angeles, CA, USA.","DOI":"10.1007\/978-3-319-07620-1_27"},{"key":"7298_CR39","unstructured":"Aruba Networks. (2012). Apple captive network assistant bypass with Amigopod, version 1.0. Retrieved from https:\/\/www.arubanetworks.com\/vrd\/ACNAAppNote\/wwhelp\/wwhimpl\/js\/html\/wwhelp.htm."},{"key":"7298_CR40","doi-asserted-by":"crossref","unstructured":"Kumari, W., Gudmundsson, O., Ebersman, P., & Sheng, S. (2015). Captive-portal identification using DHCP or router advertisements (RAs). RFC 7710 (proposed standard), December 2015.","DOI":"10.17487\/RFC7710"},{"key":"7298_CR41","unstructured":"Thurston, R. (2010). WISPr 2.0 boosts roaming between 3G and Wi-Fi. ZDNet, June 2010. Retrieved from https:\/\/www.zdnet.com\/article\/wispr-2-0-boosts-roaming-between-3g-and-wi-fi."},{"key":"7298_CR42","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1002\/0471478237","volume-title":"The world wide Wi-Fi: Technological trends and business strategies","author":"TK Tan","year":"2003","unstructured":"Tan, T. K., & Bing, B. (2003). Wi-Fi hotspots. The world wide Wi-Fi: Technological trends and business strategies (pp. 75\u201395). Hoboken: Wiley."},{"key":"7298_CR43","doi-asserted-by":"crossref","unstructured":"Brunato, M., & Severina, D. (2005). WilmaGate: A new open access gateway for hotspot management. In Proceedings of the 3rd ACM international workshop on wireless mobile applications and services on WLAN hotspots (WMASH \u201905) (pp. 56\u201364). Cologne, Germany.","DOI":"10.1145\/1080730.1080740"},{"key":"7298_CR44","doi-asserted-by":"crossref","unstructured":"Matos, A., Rom\u00e3o, D., & Trezentos, P. (2012). Secure hotspot authentication through a near field communication side-channel. In IEEE 8th international conference on wireless and mobile computing, networking and communications (WiMob), October 2012 (pp. 807\u2013814).","DOI":"10.1109\/WiMOB.2012.6379169"},{"issue":"3","key":"7298_CR45","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MPRV.2011.55","volume":"10","author":"R Want","year":"2011","unstructured":"Want, R. (2011). Near field communication. IEEE Pervasive Computing, 10(3), 4\u20137.","journal-title":"IEEE Pervasive Computing"},{"key":"7298_CR46","unstructured":"Aruba Networks. (2018). WPA3 and enhanced open: Next generation Wi-Fi security. White Paper. Retrieved from https:\/\/www.arubanetworks.com\/assets\/wp\/WP_WPA3-Enhanced-Open.pdf."},{"key":"7298_CR47","doi-asserted-by":"crossref","unstructured":"Harkins, D., & Kumari, W. (2017). Opportunistic wireless encryption. RFC 8110 (informational), March 2017.","DOI":"10.17487\/RFC8110"},{"key":"7298_CR48","unstructured":"Palekar, A., Simon, D., Salowey, J., Zhou, H., Zorn, G., & Josefsson, S. (2004). Protected EAP protocol (PEAP) version 2. Internet draft draft-josefsson-pppext-eap-tls-eap-10, October 2004. Retrieved from https:\/\/tools.ietf.org\/html\/draft-josefsson-pppext-eap-tls-eap-10."},{"key":"7298_CR49","unstructured":"Schaad, J. (2005). Internet X.509 public key infrastructure certificate request message format (CRMF). RFC 4211 (proposed standard), September 2005."},{"key":"7298_CR50","doi-asserted-by":"crossref","unstructured":"Saint-Andre, P., Crocker, D., & Nottingham, M. (2012). Deprecating the \u201cX-\u201d prefix and similar constructs in application protocols. RFC 6648 (best current practice), June 2012.","DOI":"10.17487\/rfc6648"},{"key":"7298_CR51","unstructured":"Martin, J., Mayberry, T., Donahue, C., Foppe, L., Brown, L., Riggins, C., Rye, E. C., & Brown, D. (2017). A study of MAC address randomization in mobile devices and when it fails. arXiv:1703.02874."},{"key":"7298_CR52","doi-asserted-by":"crossref","unstructured":"Moriarty, K., Kaliski, B., Jonsson, J., & Rusch, A. (2016). PKCS #1: RSA cryptography specifications version 2.2. RFC 8017 (informational), November 2016.","DOI":"10.17487\/RFC8017"},{"key":"7298_CR53","unstructured":"Santesson, S., Myers, M., Ankney, R., Malpani, A., Galperin, S., & Adams, C. (2013). X.509 internet public key infrastructure online certificate status protocol\u2014OCSP. RFC 6960 (proposed standard), June 2013."},{"key":"7298_CR54","doi-asserted-by":"crossref","unstructured":"Eastlake, D., 3rd. (2011). Transport layer security (TLS) extensions: Extension definitions. RFC 6066 (proposed standard), January 2011.","DOI":"10.17487\/rfc6066"},{"key":"7298_CR55","doi-asserted-by":"crossref","unstructured":"Funk, P., & Blake-Wilson, S. (2008). Extensible authentication protocol tunneled transport layer security authenticated protocol version 0 (EAP-TTLSv0). RFC 5281 (informational), August 2008.","DOI":"10.17487\/rfc5281"},{"key":"7298_CR56","doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Bellare, M., & Canetti, R. (1997). HMAC: Keyed-hashing for message authentication. RFC 2104 (informational). Updated by RFC 6151, February 1997.","DOI":"10.17487\/rfc2104"},{"key":"7298_CR57","doi-asserted-by":"crossref","unstructured":"Eastlake, D., 3rd., & Jones, P. (2001). US secure hash algorithm 1 (SHA1). RFC 3174 (informational), September 2001. Updated by RFCs 4634, 6234.","DOI":"10.17487\/rfc3174"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07298-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-07298-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07298-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T00:04:46Z","timestamp":1619049886000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-07298-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,22]]},"references-count":57,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["7298"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07298-y","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,22]]},"assertion":[{"value":"22 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}