7 RELATED RESEARCH
Various small scale wardriving efforts have been
conducted in Leeds, UK: such as a report from 2004
of 66 networks, all reported to be using either WEP
or no encryption (Dlaverty, 2004).
Some other independent work has also analysed
and critiqued the security of the routers provided by
UK ISPs to their customers. For example, the
security of the BT Home Hub router has received
extensive criticism, not only for the choice of
encryption and key length (as discussed herein), but
also for insufficient entropy of pseudo-random
passwords, vulnerabilities in the web interface, and
open ports for management services (Adrian Pastor,
2007). Problems have also been discovered with
Sky's pseudo-random passwords (in this case with
their older Netgear v2 DG934g routers), passwords
can be deduced based on the (public) MAC address
(John Leyden, 2008). These routers are also
vulnerable to an attack that can determine the ADSL
password, when the username is known
(NewsreadeR, 2008).
As far as we are aware, this is the first empirical
study to investigate correlations between security
and ISPs, and how ISPs differ from each other in
terms of the types of security provided to their users.
8 CONCLUSIONS
Analysis of data collected via wardriving in Leeds,
UK, has shown a statistically significant effect on
Wi-Fi security by ISPs, and significant differences
between many individual ISPs. A number of
networks were found to be using WEP, despite this
being known to be a cryptographically broken
encryption method, and these routers were provided
by identifiable ISPs, who are in a position to be able
to keep track of out-of-date routers. We contend that
this highlights the importance of router upgrades,
and have provided a number of recommendations for
ISPs, router manufacturers, and home users that
apply when ISPs provide routers with wireless
access points to customers.
The question of duty of care was raised: should
ISPs be considered responsible for the Wi-Fi
security of their customers when they provide
routers with wireless access points, given that ISPs
often advertise that they provide secure networks,
and many home users are unlikely to reconfigure the
routers provided to them?
REFERENCES
Adrian Pastor, 2007. BT home flub: pwnin the BT Home
Hub [WWW Document]. GNUCITIZEN. URL
http://www.gnucitizen.org/blog/bt-home-flub-pwnin-
the-bt-home-hub/ (accessed 10.28.12).
Bittau, A., Handley, M., Lackey, J., 2006. The final nail in
WEP’s coffin, in: Proceedings of the 2006 IEEE
Symposium on Security and Privacy, SP ’06. IEEE
Computer Society, Washington, DC, USA, pp. 386–
400.
Borisov, N., Goldberg, I., Wagner, D., 2001. Intercepting
mobile communications: the insecurity of 802.11, in:
Proceedings of the 7th Annual International
Conference on Mobile Computing and Networking,
MobiCom ’01. ACM, New York, NY, USA, pp. 180–
189.
Dlaverty, 2004. Open all hours - Wardriving in Leeds,
West Yorkshire, England [WWW Document].
Openxtra. URL http://www.openxtra.co.uk/articles/
wardriving-leeds (accessed 10.28.12).
Fluhrer, S., Mantin, I., Shamir, A., 2001. Weaknesses in
the key scheduling algorithm of RC4, in: Vaudenay,
S., Youssef, A. (Eds.), Selected Areas in
Cryptography, Lecture Notes in Computer Science.
Springer Berlin / Heidelberg, pp. 1–24.
John Leyden, 2008. Sky Broadband puts the fault into
default Wi-Fi security: Users in guess-able random
keys quandary [WWW Document]. The Register.
URL http://www.theregister.co.uk/2008/02/21/sky_
broadband_wi_fi_keys_unpicked/ (accessed 10.28.12).
NewsreadeR, 2008. Is your router secure? [WWW
Document]. Sky User. URL http://www.skyuser.co.uk/
skyinfo/783.html (accessed 10.28.12).
Stefan Viehböck, 2011. Brute forcing Wi-Fi Protected
Setup: When poor design meets poor implementation
[WWW Document]. URL http://packetstorm.foofus.
com/papers/wireless/viehboeck_wps.pdf
Stubblefield, A., Ioannidis, J., Rubin, A.D., 2004. A key
recovery attack on the 802.11b wired equivalent
privacy protocol (WEP). ACM Trans. Inf. Syst. Secur.
7, 319–332.
Tews, E., Beck, M., 2009. Practical attacks against WEP
and WPA, in: Proceedings of the Second ACM
Conference on Wireless Network Security, WiSec ’09.
ACM, New York, NY, USA, pp. 79–86.
Tews, E., Weinmann, R.-P., Pyshkin, A., 2007. Breaking
104 Bit WEP in less than 60 seconds, in: Proceedings
of the 8th International Conference on Information
Security Applications, WISA’07. Springer-Verlag,
Berlin, Heidelberg, pp. 188–202.
NotAllISPsEquallySecureHomeUsers-AnEmpiricalStudyComparingWi-FiSecurityProvidedbyUKISPs
573