On physical-layer identification of wireless devices

B Danev, D Zanetti, S Capkun - ACM Computing Surveys (CSUR), 2012 - dl.acm.org
Physical-layer device identification aims at identifying wireless devices during radio
communication by exploiting unique characteristics of their analog (radio) circuitry. This work …

Privacy in mobile technology for personal healthcare

S Avancha, A Baxi, D Kotz - ACM Computing Surveys (CSUR), 2012 - dl.acm.org
Information technology can improve the quality, efficiency, and cost of healthcare. In this
survey, we examine the privacy requirements of mobile computing technologies that have …

Iot sentinel: Automated device-type identification for security enforcement in iot

M Miettinen, S Marchal, I Hafeez… - 2017 IEEE 37th …, 2017 - ieeexplore.ieee.org
With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT
devices have become prominent. Several vendors are producing IP-connected devices for …

Behavioral fingerprinting of iot devices

B Bezawada, M Bachani, J Peterson, H Shirazi… - Proceedings of the …, 2018 - dl.acm.org
The Internet-of-Things (IoT) has brought in new challenges in device identification--what the
device is, and authentication--is the device the one it claims to be. Traditionally, the …

A study of MAC address randomization in mobile devices and when it fails

J Martin, T Mayberry, C Donahue, L Foppe… - arXiv preprint arXiv …, 2017 - arxiv.org
MAC address randomization is a privacy technique whereby mobile devices rotate through
random hardware addresses in order to prevent observers from singling out their traffic or …

Wireless device identification with radiometric signatures

V Brik, S Banerjee, M Gruteser, S Oh - Proceedings of the 14th ACM …, 2008 - dl.acm.org
We design, implement, and evaluate a technique to identify the source network interface
card (NIC) of an IEEE 802.11 frame through passive radio-frequency analysis. This …

[PDF][PDF] AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable.

S Dey, N Roy, W Xu, RR Choudhury, S Nelakuditi - NDSS, 2014 - Citeseer
As mobile begins to overtake the fixed Internet access, ad networks have aggressively
sought methods to track users on their mobile devices. While existing countermeasures and …

Tracking unmodified smartphones using wi-fi monitors

ABM Musa, J Eriksson - Proceedings of the 10th ACM conference on …, 2012 - dl.acm.org
Smartphones with Wi-Fi enabled periodically transmit Wi-Fi messages, even when not
associated to a network. In one 12-hour trial on a busy road (average daily traffic count …

Why MAC address randomization is not enough: An analysis of Wi-Fi network discovery mechanisms

M Vanhoef, C Matte, M Cunche, LS Cardoso… - Proceedings of the 11th …, 2016 - dl.acm.org
We present several novel techniques to track (unassociated) mobile devices by abusing
features of the Wi-Fi standard. This shows that using random MAC addresses, on its own …

Estimating crowd densities and pedestrian flows using wi-fi and bluetooth

L Schauer, M Werner, P Marcus - Proceedings of the 11th International …, 2014 - dl.acm.org
The rapid deployment of smartphones as all-purpose mobile computing systems has led to a
wide adoption of wireless communication systems such as Wi-Fi and Bluetooth in mobile …