[HTML][HTML] Your WiFi is leaking: What do your mobile apps gossip about you?

JS Atkinson, JE Mitchell, M Rio, G Matich - Future Generation Computer …, 2018 - Elsevier
This paper describes how mobile device apps can inadvertently broadcast personal
information through their use of wireless networks despite the correct use of encryption …

A dynamic method to protect user privacy against traffic-based attacks on smart home

BV Dos Santos, A Vergütz, RT Macedo, M Nogueira - Ad Hoc Networks, 2023 - Elsevier
Abstract The Internet of Things (IoT) has revolutionized how people interact with their living
spaces. However, attackers can perform traffic-based attacks to reveal the behavior of …

Analysis of wi-fi probe requests towards information element fingerprinting

L Pintor, L Atzori - GLOBECOM 2022-2022 IEEE Global …, 2022 - ieeexplore.ieee.org
In the past decade, several algorithms have been proposed to monitor people's mobility
based on the analysis of management messages generated by Wi-Fi devices and which rely …

Analysing the privacy policies of Wi-Fi trackers

L Demir, M Cunche, C Lauradoux - … of the 2014 workshop on physical …, 2014 - dl.acm.org
Wi-Fi-based tracking systems have recently appeared. By collecting radio signals emitted by
Wi-Fi enabled devices, those systems are able to track individuals. They basically rely on the …

[PDF][PDF] Wireless network security using Raspberry Pi

C BouSaba, T Kazar, WC Pizio - 2016 ASEE Annual Conference & …, 2016 - sftp.asee.org
This educational project uses a second generation Raspberry Pi that runs multiple Open
Source software packages, to perform network penetration testing and to analyze the results …

Automatic Attendance Taking: A Proof of Concept on Privacy Concerns in 802.11 MAC Address Probing

Y Aun, ML Gan, YMJ Khaw - … Conference on Advances in Cyber Security, 2019 - Springer
Modern data communication paradigm involves many unsolicited data transmissions that
poses privacy issues given the proliferation of big data and artificial intelligence (AI). In 802 …

How talkative is your mobile device? An experimental study of Wi-Fi probe requests

J Freudiger - Proceedings of the 8th ACM Conference on Security & …, 2015 - dl.acm.org
The IEEE 802.11 standard defines Wi-Fi probe requests as a active mechanism with which
mobile devices can request information from access points and accelerate the Wi-Fi …

De-Randomization of MAC Addresses Using Fingerprints and RSSI with ML for Wi-Fi Analytics

A Pérez-Hernández, MN Barreras-Martín… - IEEE …, 2024 - ieeexplore.ieee.org
Media Access Control (MAC) address randomization causes significant distortion and data
loss in Wi-Fi analytics systems, becoming a real challenge for building services based on …

On the implementation of location obfuscation in openwifi and its performance

L Ghiro, M Cominelli, F Gringoli… - 2022 20th …, 2022 - ieeexplore.ieee.org
Wi-Fi sensing as a side-effect of communications is opening new opportunities for smart
services integrating communications with environmental properties, first and foremost the …

A Novel Traffic Obfuscation Technology for Smart Home

S Zhang, F Shen, Y Liu, Z Yang, X Lv - Electronics, 2023 - mdpi.com
With the widespread popularity of smart home devices and the emergence of smart home
integration platforms such as Google, Amazon, and Xiaomi, the smart home industry is in a …