Exploration of user privacy in 802.11 probe requests with MAC address randomization using temporal pattern analysis

T Bravenec, J Torres-Sospedra, M Gould… - arXiv preprint arXiv …, 2022 - arxiv.org
Wireless networks have become an integral part of our daily lives and lately there is
increased concern about privacy and protecting the identity of individual users. In this paper …

Defeating MAC address randomization through timing attacks

C Matte, M Cunche, F Rousseau… - Proceedings of the 9th …, 2016 - dl.acm.org
MAC address randomization is a common privacy protection measure deployed in major
operating systems today. It is used to prevent user-tracking with probe requests that are …

What your wearable devices revealed about you and possibilities of non-cooperative 802.11 presence detection during your last IPIN visit

T Bravenec, J Torres-Sospedra… - 2022 IEEE 12th …, 2022 - ieeexplore.ieee.org
The focus on privacy-related measures regarding wireless networks grew in last couple of
years. This is especially important with technologies like Wi-Fi or Bluetooth, which are all …

Reduce to the MACs--Privacy Friendly Generic Probe Requests

JA McDougall, A Brighente, A Kunstmann… - arXiv preprint arXiv …, 2024 - arxiv.org
Since the introduction of active discovery in Wi-Fi networks, users can be tracked via their
probe requests. Although manufacturers typically try to conceal Media Access Control (MAC) …

Self-supervised association of Wi-Fi probe requests under MAC address randomization

T He, J Tan, SHG Chan - IEEE Transactions on Mobile …, 2022 - ieeexplore.ieee.org
Wi-Fi-on devices such as smartphones search for network availability by periodically
broadcasting probe requests which encapsulate MAC addresses as device identifiers. To …

[PDF][PDF] On wi-fi tracking and the pitfalls of mac address randomization

M Cunche, C Matte - Proceedings of IDO 2016, 2016 - ido2016.sciencesconf.org
Wi-Fi has imposed itself as one of the key radio technology in portable devices such as
smartphones, tablets, and other wearable devices. Because they periodically scan for …

How talkative is your mobile device? An experimental study of Wi-Fi probe requests

J Freudiger - Proceedings of the 8th ACM Conference on Security & …, 2015 - dl.acm.org
The IEEE 802.11 standard defines Wi-Fi probe requests as a active mechanism with which
mobile devices can request information from access points and accelerate the Wi-Fi …

Automatic Attendance Taking: A Proof of Concept on Privacy Concerns in 802.11 MAC Address Probing

Y Aun, ML Gan, YMJ Khaw - … Conference on Advances in Cyber Security, 2019 - Springer
Modern data communication paradigm involves many unsolicited data transmissions that
poses privacy issues given the proliferation of big data and artificial intelligence (AI). In 802 …

Know thy quality: Assessment of device detection by wifi signals

T Rütermann, A Benabbas… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Broadcasted WiFi traffic of mobile devices is the foundation of several estimation techniques
like location tracking or crowd counting. Many pervasive applications use these techniques …

Wi-fi user profiling via access point honeynets

F Ryan, M Schukat - 2019 30th Irish Signals and Systems …, 2019 - ieeexplore.ieee.org
Until recently Wi-Fi-based user profiling and passive surveillance of the public was straight
forward and caused therefore huge privacy concerns. Here Wi-Fi probe request bursts …