Et tu alexa? when commodity wifi devices turn into adversarial motion sensors

Y Zhu, Z Xiao, Y Chen, Z Li, M Liu, BY Zhao… - arXiv preprint arXiv …, 2018 - arxiv.org
Our work demonstrates a new set of silent reconnaissance attacks, which leverages the
presence of commodity WiFi devices to track users inside private homes and offices, without …

Users are closer than they appear: Protecting user location from WiFi APs

R Ayyalasomayajula, A Arun, W Sun… - Proceedings of the 24th …, 2023 - dl.acm.org
WiFi-based indoor localization has now matured for over a decade. Most of the current
localization algorithms rely on the WiFi access points (APs) in the enterprise network to …

A Novel Covert Channel for IEEE 802.11 Networks Utilizing MAC Address Randomization

G Teca, M Natkaniec - Applied Sciences, 2023 - mdpi.com
Vendors implement the MAC address randomization technique to prevent IEEE 802.11
client station devices from being tracked. Although it conceals device identity, it cannot hide …

[PDF][PDF] Evolution of the Use of Random MAC Addresses in Public Wi-Fi Networks.

CA Gomez, LJ Guerrero, LF Pedraza - Journal of Engineering Science & …, 2022 - jestr.org
The use of random MAC addresses is considered as an important tool to improve a user's
privacy on a Wi-Fi network. Although this technique was proposed since 2014, its …

[PDF][PDF] Adversarial wifi sensing

Y Zhu, Z Xiao, Y Chen, Z Li, M Liu… - arXiv preprint arXiv …, 2018 - autoblog.suumitsu.eu
Wireless devices are everywhere, at home, at the office, and on the street. Devices are
bombarding us with transmissions across a wide range of RF frequencies from a few …

Review of survey methods in events management research

R Fletcher, J Bostock - Event Management, 2020 - ingentaconnect.com
Questionnaire-based surveys are a common data collection tool in events research as
established by earlier reviews of methods within the literature. This article examines and …

Is that traffic light tracking you? A case study on a municipal surveillance technology in seattle

C Spiess - IEEE Transactions on Technology and Society, 2021 - ieeexplore.ieee.org
WiFi/Bluetooth MAC address collection can be used for the purpose of real-time travel
calculations for traffic engineering. Seattle is one such city to have deployed this technology …

[PDF][PDF] Adversarial WiFi sensing using a single smartphone

Y Zhu, Z Xiao, Y Chen, Z Li, M Liu, BY Zhao… - arXiv preprint arXiv …, 2018 - academia.edu
Wireless devices are everywhere, at home, at the office, and on the street. Devices are
bombarding us with transmissions across a wide range of RF frequencies. Many of these …

Urban Crowd Estimation via WiFi Probe Analysis

G Perrone - 2024 - webthesis.biblio.polito.it
Nowadays, cities are places where data streams are continuously and ubiquitously
exchanged between smartphones, IoT devices, and other modern technologies. The …

UNVEIL: capture and visualise WiFi data leakages

S Jain, E Bensaid, YA de Montjoye - The World Wide Web Conference, 2019 - dl.acm.org
In the past few years, numerous privacy vulnerabilities have been discovered in the WiFi
standards and their implementations for mobile devices. These vulnerabilities allow an …