2020
DOI: 10.3390/s20164620
|View full text |Cite
|
Sign up to set email alerts
|

Probe Request Based Device Identification Attack and Defense

Abstract: Wi-Fi network has an open nature so that it needs to face greater security risks compared to wired network. The MAC address represents the unique identifier of the device, and is easily obtained by an attacker. Therefore MAC address randomization is proposed to protect the privacy of devices in a Wi-Fi network. However, implicit identifiers are used by attackers to identify user’s device, which can cause the leakage of user’s privacy. We propose device identification based on 802.11ac probe request frames. Her… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…In fact, only 53 articles contain the words "probe", "mac addr", or "randomized", with a total 597 of citations (for an average of 11.3 citations for each paper). Moreover, several of them focuses on studying the real effects of MAC randomization [93,94] or device de-anonymization [95,96]. There are in the literature some works that leverage PRs, e.g., in crowd detection [97] and behavior [98] or device classification [99], but we believe that there is still room for improvement.…”
Section: Rqmentioning
confidence: 99%
“…In fact, only 53 articles contain the words "probe", "mac addr", or "randomized", with a total 597 of citations (for an average of 11.3 citations for each paper). Moreover, several of them focuses on studying the real effects of MAC randomization [93,94] or device de-anonymization [95,96]. There are in the literature some works that leverage PRs, e.g., in crowd detection [97] and behavior [98] or device classification [99], but we believe that there is still room for improvement.…”
Section: Rqmentioning
confidence: 99%
“…2) Frame-field attacks: Here, an attacker learns the information fields in the frames that are generally sent in the clear to classify and subsequently fingerprint devices [11]. There are flags, client capability information, Manufacturer names, frame-type, etc., which possess the potential of being part of a fingerprint.…”
Section: Privacy Concerns From Public Packetsmentioning
confidence: 99%
“…al [15] do a widespread evaluation of existing frameworks for security pit-holes in probe requests. Probe-request-based device identification on IEEE 802.11ac is reduced considerably after the application of stream cipher-based encryption [11]. They test the solution with Two Dell OptiPlex 3600 mini Workstation are used as a client device and AP.…”
Section: Confidential Packet Information Fieldsmentioning
confidence: 99%
See 2 more Smart Citations