MILCOM 2012 - 2012 IEEE Military Communications Conference 2012
DOI: 10.1109/milcom.2012.6415713
|View full text |Cite
|
Sign up to set email alerts
|

Inferring user relationship from hidden information in WLANs

Abstract: Abstract-With ever increasing usage of handheld devices and vast deployment of wireless networks, we observe that it is possible to collect data from mobile devices and reveal personal relationships of their owners. In the paper, we exploit the hidden information collected from WLAN devices and infer individual relationships between device pairs based on three observation dimensions: network association history, physical proximity and spatio-temporal behavior. By measuring WLAN data, we demonstrate that device… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 32 publications
(20 citation statements)
references
References 17 publications
(15 reference statements)
0
20
0
Order By: Relevance
“…Apps can get information about the user's current network or can collect a snapshot of networks user's have connected in the past by accessing the preferred network list [5] and that enables building a user profile instantly. Some WiFi enabled smartphones send out probe requests to the networks they have connected in the past [7], [8], [9] and an adversary who monitors the wireless channel can easily collect this information.…”
Section: Discussion and Concluding Remarks A Privacy Threats To Smmentioning
confidence: 99%
See 2 more Smart Citations
“…Apps can get information about the user's current network or can collect a snapshot of networks user's have connected in the past by accessing the preferred network list [5] and that enables building a user profile instantly. Some WiFi enabled smartphones send out probe requests to the networks they have connected in the past [7], [8], [9] and an adversary who monitors the wireless channel can easily collect this information.…”
Section: Discussion and Concluding Remarks A Privacy Threats To Smmentioning
confidence: 99%
“…Multiple work have studied privacy leakages related to WiFi connectivity in Smartphones [7], [8], [9], [5]. Greenstein et al [7] presented the privacy issues of 802.11 service discovery, that results in the device MAC address as well as the identifiers (SSID) of previously connected networks being leaked on the wireless channels.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Cheng et al show in [21] how to detect relationships among users by parsing the PNL inside probe request messages and resorting to Wigle for geo-localizing APs.…”
Section: Users/device Profilingmentioning
confidence: 99%
“…Possibly one of the most concerning privacy-related inferences using technology-device metadata is that proposed in Cunche et al [2] and expanded on later in Cheng et al [25] and Barbera et al [3]. These research articles exploit the fact that wireless-enabled devices, such as smartphones, often use active WiFi probe requests in their search for familiar networks.…”
Section: Related Workmentioning
confidence: 99%