Matte, 2017 - Google Patents
Wi-Fi tracking: Fingerprinting attacks and counter-measuresMatte, 2017
View PDF- Document ID
- 13394047564647381256
- Author
- Matte C
- Publication year
External Links
Snippet
The recent spread of everyday-carried Wi-Fi-enabled devices (smartphones, tablets and wearable devices) comes with a privacy threat to their owner, and to society as a whole. These devices continuously emit signals which can be captured by a passive attacker using …
- 230000000295 complement 0 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/12—Fraud detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W74/00—Wireless channel access, e.g. scheduled or random access
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Matte | Wi-Fi tracking: Fingerprinting attacks and counter-measures | |
| Li et al. | FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild. | |
| Cunche | I know your MAC address: targeted tracking of individual using Wi-Fi | |
| Xiao et al. | Proximity-based security techniques for mobile users in wireless networks | |
| Cominelli et al. | Even black cats cannot stay hidden in the dark: Full-band de-anonymization of bluetooth classic devices | |
| Mahapatra et al. | A survey on secure transmission in internet of things: taxonomy, recent techniques, research requirements, and challenges | |
| US9756461B1 (en) | Privacy-preserving large-scale location monitoring | |
| Issoufaly et al. | BLEB: Bluetooth Low Energy Botnet for large scale individual tracking | |
| CN105393568A (en) | Network discovery and connection using device addresses not correlated to a device | |
| Wu et al. | PRAPD: A novel received signal strength–based approach for practical rogue access point detection | |
| Bilogrevic et al. | Inferring social ties in academic networks using short-range wireless communications | |
| CN104093145A (en) | An Authentication Method Between Adjacent Mobile Terminal Users | |
| Etta et al. | [Retracted] Assessment and Test‐case Study of Wi‐Fi Security through the Wardriving Technique | |
| Wilkinson | Digital terrestrial tracking: The future of surveillance | |
| Ficara et al. | A tutorial on privacy, RCM and its implications in WLAN | |
| Greenstein et al. | Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era. | |
| Mishra et al. | Public wireless packets anonymously hurt you | |
| Mishra | Revealing and exploiting privacy vulnerabilities in users' public wireless packets | |
| Chen et al. | Privacy-preserving large-scale location monitoring using bluetooth low energy | |
| Najafi et al. | Privacy leaks from Wi-Fi probing | |
| Song et al. | Effective opportunistic crowd sensing IoT system for restoring missing objects | |
| Liu et al. | The detection of physical attacks against iBeacon transmitters | |
| Nozari et al. | CrowdWatch: Privacy-Preserving Monitoring Leveraging Wi-Fi Multiple Access Information | |
| Biehl et al. | Anchor of trust: Towards collusion-resistant trusted indoor location for enterprise and industrial use | |
| Sidharthan et al. | Internet service via UAV: user centric comprehensive attack surface analysis |