2022 IEEE 19th Annual Consumer Communications &Amp; Networking Conference (CCNC) 2022
DOI: 10.1109/ccnc49033.2022.9700674
|View full text |Cite
|
Sign up to set email alerts
|

WiFi-based IoT Devices Profiling Attack based on Eavesdropping of Encrypted WiFi Traffic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 17 publications
0
8
0
1
Order By: Relevance
“…Even though the RF is a sufficient model in regression [30] and multi-classification applications [39], it is not commonly used for image classifications because images have a large number of pixels, resulting in high-dimensional feature spaces. In addition, image processing is computationally expensive and time-consuming during training.…”
Section: Discussionmentioning
confidence: 99%
“…Even though the RF is a sufficient model in regression [30] and multi-classification applications [39], it is not commonly used for image classifications because images have a large number of pixels, resulting in high-dimensional feature spaces. In addition, image processing is computationally expensive and time-consuming during training.…”
Section: Discussionmentioning
confidence: 99%
“…Additionally, its effectiveness and performance were assessed. Alyami et al 37 showed that fingerprinting devices of IoT systems are possible without joining the WiFi network of IoT devices. And also they discussed potential defenses to mitigate the attack.…”
Section: Background Conceptsmentioning
confidence: 99%
“…But still, data will be eavesdropped in its encrypted form. We can modify the WiFi network to secure our network 37 Search wireless signal attack: If the WiFi network is not properly encrypted, then the devices searching them might be attacked by hackers.…”
Section: Background Conceptsmentioning
confidence: 99%
“…Analysis of network traffic can reveal private information, for example, Alyami et al [5] studied a privacy attack in which the profiling is performed using IoT devices' network traffic monitored from out-of-network. With regards to voice conversation, the analysis can be divided into active (i.e., probing) attack and passive (i.e., eavesdropping).…”
Section: B Traffic Analysismentioning
confidence: 99%