+

Matte, 2017 - Google Patents

Wi-Fi tracking: Fingerprinting attacks and counter-measures

Matte, 2017

View PDF
Document ID
13394047564647381256
Author
Matte C
Publication year

External Links

Snippet

The recent spread of everyday-carried Wi-Fi-enabled devices (smartphones, tablets and wearable devices) comes with a privacy threat to their owner, and to society as a whole. These devices continuously emit signals which can be captured by a passive attacker using …
Continue reading at theses.hal.science (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/26Monitoring arrangements; Testing arrangements
    • H04L12/2602Monitoring arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/12Fraud detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access

Similar Documents

Publication Publication Date Title
Matte Wi-Fi tracking: Fingerprinting attacks and counter-measures
Li et al. FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild.
Cunche I know your MAC address: targeted tracking of individual using Wi-Fi
Xiao et al. Proximity-based security techniques for mobile users in wireless networks
Cominelli et al. Even black cats cannot stay hidden in the dark: Full-band de-anonymization of bluetooth classic devices
Mahapatra et al. A survey on secure transmission in internet of things: taxonomy, recent techniques, research requirements, and challenges
US9756461B1 (en) Privacy-preserving large-scale location monitoring
Issoufaly et al. BLEB: Bluetooth Low Energy Botnet for large scale individual tracking
CN105393568A (en) Network discovery and connection using device addresses not correlated to a device
Wu et al. PRAPD: A novel received signal strength–based approach for practical rogue access point detection
Bilogrevic et al. Inferring social ties in academic networks using short-range wireless communications
CN104093145A (en) An Authentication Method Between Adjacent Mobile Terminal Users
Etta et al. [Retracted] Assessment and Test‐case Study of Wi‐Fi Security through the Wardriving Technique
Wilkinson Digital terrestrial tracking: The future of surveillance
Ficara et al. A tutorial on privacy, RCM and its implications in WLAN
Greenstein et al. Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era.
Mishra et al. Public wireless packets anonymously hurt you
Mishra Revealing and exploiting privacy vulnerabilities in users' public wireless packets
Chen et al. Privacy-preserving large-scale location monitoring using bluetooth low energy
Najafi et al. Privacy leaks from Wi-Fi probing
Song et al. Effective opportunistic crowd sensing IoT system for restoring missing objects
Liu et al. The detection of physical attacks against iBeacon transmitters
Nozari et al. CrowdWatch: Privacy-Preserving Monitoring Leveraging Wi-Fi Multiple Access Information
Biehl et al. Anchor of trust: Towards collusion-resistant trusted indoor location for enterprise and industrial use
Sidharthan et al. Internet service via UAV: user centric comprehensive attack surface analysis
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载