2016
DOI: 10.1109/mits.2016.2573341
|View full text |Cite
|
Sign up to set email alerts
|

Towards Privacy-Preserving Wi-Fi Monitoring for Road Traffic Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(14 citation statements)
references
References 5 publications
0
14
0
Order By: Relevance
“…To the best of our knowledge, this is the first work that studies persistent traffic measurement (as defined in Section 2.1) through vehicle-to-infrastructure communications. There are prior privacy-preserving approaches for measuring point-to-point traffic [30], [32] or measuring travel time [7]. But there is no prior work that measures persistent point-to-point traffic under the same model in Section 2.2.…”
Section: Simulationmentioning
confidence: 99%
“…To the best of our knowledge, this is the first work that studies persistent traffic measurement (as defined in Section 2.1) through vehicle-to-infrastructure communications. There are prior privacy-preserving approaches for measuring point-to-point traffic [30], [32] or measuring travel time [7]. But there is no prior work that measures persistent point-to-point traffic under the same model in Section 2.2.…”
Section: Simulationmentioning
confidence: 99%
“…Demir [9] proposed a multiple hashing of MAC addresses. Fuxjäger et al [10] show that brute-force attacks on just hashed MAC addresses are quite simple, and, thus suggest a truncated and hashed MAC address approach with a higher level of privacy. Finally, Martin et al [4] recently showed that even the more advanced technique of MAC address randomization can be attacked with a 100 % success ratio.…”
Section: Related Workmentioning
confidence: 99%
“…Fuxjäger et al [10] report on traffic jam analysis experiments on Austrian roads, but they used a more expensive equipment with external antennae.…”
Section: Related Workmentioning
confidence: 99%
“…However (Marx et al, 2018) notes that due to a small pre-image space for MAC addresses, all SHA256 hashed MAC addresses could be recovered in 13 minutes 22 seconds. Despite MAC addresses containing a 48-bit search space, with only 0.1% of OUI manufacturer prefixes for MAC addresses being allocated (Fuxjaeger et al, 2016) it is possible to represent all MAC addresses in a digest of 39 bits. Furthermore, due to the unequal usage of various OUI prefixes (Demir et al, 2014), it is possible to represent 50% coverage in 31 bits, 90% coverage in 33 bits and 99% coverage in 34 bits respectively.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, due to the unequal usage of various OUI prefixes (Demir et al, 2014), it is possible to represent 50% coverage in 31 bits, 90% coverage in 33 bits and 99% coverage in 34 bits respectively. Hence, (Fuxjaeger et al, 2016) proposes simply removing the OUI manufacturer prefix from MAC address before storage. However, (Martin et al, 2016) finds that contiguous address blocks are allocated to specific devices meaning the residual NIC suffix of the MAC address can similarly be used for identification attacks.…”
Section: Introductionmentioning
confidence: 99%