Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Information Retrieval
X-means: Extending K-means with Efficient Estimation of the Number of Clusters
ICML '00 Proceedings of the Seventeenth International Conference on Machine Learning
Proceedings of the First International Workshop on Information Hiding
Statistical Identification of Encrypted Web Browsing Traffic
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Channel surfing and spatial retreats: defenses against wireless denial of service
Proceedings of the 3rd ACM workshop on Wireless security
VOR base stations for indoor 802.11 positioning
Proceedings of the 10th annual international conference on Mobile computing and networking
Practical robust localization over large-scale 802.11 wireless networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Remote Physical Device Fingerprinting
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Mobile Networks and Applications - Special issue: Wireless mobile wireless applications and services on WLAN hotspots
Measurement-based models of delivery and interference in static wireless networks
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Location privacy in wireless personal area networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Detecting identity-based attacks in wireless networks using signalprints
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Hot or not: revealing hidden services by their clock skew
Proceedings of the 13th ACM conference on Computer and communications security
Inferring the source of encrypted HTTP connections
Proceedings of the 13th ACM conference on Computer and communications security
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Data Mining: Practical Machine Learning Tools and Techniques, Second Edition (Morgan Kaufmann Series in Data Management Systems)
Preserving location privacy in wireless lans
Proceedings of the 5th international conference on Mobile systems, applications and services
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
The Journal of Machine Learning Research
Timing analysis of keystrokes and timing attacks on SSH
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Passive data link layer 802.11 wireless device driver fingerprinting
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Understanding the limitations of transmit power control for indoor wlans
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob?
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Devices that tell on you: privacy trends in consumer ubiquitous computing
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Improving wireless privacy with an identifier-free link layer protocol
Proceedings of the 6th international conference on Mobile systems, applications, and services
Wireless device identification with radiometric signatures
Proceedings of the 14th ACM international conference on Mobile computing and networking
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Securing Wireless Data Networks against Eavesdropping using Smart Antennas
ICDCS '08 Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems
Protecting privacy with protocol stack virtualization
Proceedings of the 7th ACM workshop on Privacy in the electronic society
An improved clock-skew measurement technique for revealing hidden services
SS'08 Proceedings of the 17th conference on Security symposium
Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
On the effectiveness of switched beam antennas in indoor environments
PAM'08 Proceedings of the 9th international conference on Passive and active network measurement
Enhancing privacy with shared Pseudo random sequences
Proceedings of the 13th international conference on Security protocols
Place lab: device positioning using radio beacons in the wild
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Low-cost mitigation of privacy loss due to radiometric identification
VANET '11 Proceedings of the Eighth ACM international workshop on Vehicular inter-networking
k-indistinguishable traffic padding in web applications
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Hi-index | 0.00 |
Recent work has focused on hiding explicit network identifiers such as hardware addresses from the link layer to enable anonymous communications in wireless LANs. These protocols encrypt entire wireless packets, thereby providing unlinkability. However, we find that these protocols neglect to hide identifying information that is preserved within the wireless physical layer. We propose a technique using commodity wireless hardware whereby packets can be linked to their respective transmitters using signal strength information, thus degrading users' anonymity. We discuss possible countermeasures, but ultimately we argue that controlling information leakage at the physical layer is inherently difficult.