2018 IEEE Wireless Communications and Networking Conference (WCNC) 2018
DOI: 10.1109/wcnc.2018.8377154
|View full text |Cite
|
Sign up to set email alerts
|

Privacy protection and mitigation of unauthorized tracking in 3GPP-WiFi interworking networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Significant previous work exists related to tracking mobile devices via 802.11 Wi-Fi MAC addresses [24,30,39,50,53,55,58], tracking via cellular identifiers [40, 45, 49, 53-55, 61, 63] and attempting to correlate randomized 802.11 MAC addresses to the same physical device [47,55,64]. By contrast, our work fo-cuses on the BLE technology, and specifically uses flaws in Apple's Continuity protocol (Section 2.5) to track devices despite randomization of the Bluetooth hardware identifier.…”
Section: Related Workmentioning
confidence: 99%
“…Significant previous work exists related to tracking mobile devices via 802.11 Wi-Fi MAC addresses [24,30,39,50,53,55,58], tracking via cellular identifiers [40, 45, 49, 53-55, 61, 63] and attempting to correlate randomized 802.11 MAC addresses to the same physical device [47,55,64]. By contrast, our work fo-cuses on the BLE technology, and specifically uses flaws in Apple's Continuity protocol (Section 2.5) to track devices despite randomization of the Bluetooth hardware identifier.…”
Section: Related Workmentioning
confidence: 99%
“…In Ref. [91], the researchers presented a study of an effective privacy preserve and multiple keywords queries (PPMQs) system on the external cloud, which meets the query and location privacies preserving requirements, efficient query, LBS data scalability, and confidentiality concerning users' data. The researchers used linear quadrangle tree techniques to develop a network model for representing locations data in the status of the query and searchability of the index to improve the efficiency of their proposed scheme.…”
Section: Location Privacymentioning
confidence: 99%
“…Existing privacy research on correlating entities based on signaling behavior spans several research areas. Some methods aim to recognize multiple device identifiers as belonging to a single device by linking across network protocols, gleaning details retrieved from upper layer network protocol information [19,17,25,13,23], as well as using signaling-based spatial-temporal attributes [19]. We describe in more detail the general body of work regarding spatio-temporal modeling in Section 2.2.…”
Section: Multi-protocol Entity Resolutionmentioning
confidence: 99%