Handoff all your privacy: A review of apple's bluetooth low energy continuity protocol

J Martin, D Alpuche, K Bodeman, L Brown… - arXiv preprint arXiv …, 2019 - arxiv.org
We investigate Apple's Bluetooth Low Energy (BLE) Continuity protocol, designed to support
interoperability and communication between iOS and macOS devices, and show that the …

Collecting, processing and secondary using personal and (pseudo) anonymized data in smart cities

S Sampaio, PR Sousa, C Martins, A Ferreira… - Applied Sciences, 2023 - mdpi.com
Smart cities, leveraging IoT technologies, are revolutionizing the quality of life for citizens.
However, the massive data generated in these cities also poses significant privacy risks …

How talkative is your mobile device? An experimental study of Wi-Fi probe requests

J Freudiger - Proceedings of the 8th ACM Conference on Security & …, 2015 - dl.acm.org
The IEEE 802.11 standard defines Wi-Fi probe requests as a active mechanism with which
mobile devices can request information from access points and accelerate the Wi-Fi …

Signals from the crowd: uncovering social relationships through smartphone probes

MV Barbera, A Epasto, A Mei, VC Perta… - Proceedings of the 2013 …, 2013 - dl.acm.org
The ever increasing ubiquitousness of WiFi access points, coupled with the diffusion of
smartphones, suggest that Internet every time and everywhere will soon (if not already has) …

Mobile device detection through WiFi probe request analysis

L Oliveira, D Schneider, J De Souza, W Shen - IEEE Access, 2019 - ieeexplore.ieee.org
Estimation of the presence of people in real time is extremely useful for businesses in
providing better services while saving money. In this paper, we propose a technique for …

WiFiPi: Involuntary tracking of visitors at mass events

B Bonné, A Barzan, P Quax… - 2013 IEEE 14th …, 2013 - ieeexplore.ieee.org
To simulate crowds at mass events, realistic movement data of people is required. Despite
their limited capacity for approximating real human mobility, synthetic movement models are …

Linking wireless devices using information contained in Wi-Fi probe requests

M Cunche, MA Kaafar, R Boreli - Pervasive and Mobile Computing, 2014 - Elsevier
Active service discovery in Wi-Fi involves wireless stations broadcasting their Wi-Fi
fingerprint, ie the SSIDs of their preferred wireless networks. The content of those Wi-Fi …

Mind your probes: De-anonymization of large crowds through smartphone WiFi probe requests

A Di Luzio, A Mei, J Stefa - IEEE INFOCOM 2016-The 35th …, 2016 - ieeexplore.ieee.org
Whenever our smartphones have their WiFi radio interface on, they periodically try to
connect to known wireless APs (networks the user has connected to in the past). This is …

Accurate occupancy estimation with WiFi and bluetooth/BLE packet capture

E Longo, AEC Redondi, M Cesana - Computer Networks, 2019 - Elsevier
The capillary spread of personal devices equipped with wireless communication capabilities
has enabled a series of high level services which build on capturing and processing the …

Socialprobe: Understanding social interaction through passive wifi monitoring

H Hong, C Luo, MC Chan - … of the 13th international conference on …, 2016 - dl.acm.org
In this paper, we present an approach to extract social behavior and interaction patterns of
mobile users by passively monitoring WiFi probe requests and null data frames that are sent …