scholarly journals SSID Oracle Attack on Undisclosed Wi-Fi Preferred Network Lists

2018 ◽  
Vol 2018 ◽  
pp. 1-15 ◽  
Author(s):  
Ante Dagelić ◽  
Toni Perković ◽  
Bojan Vujatović ◽  
Mario Čagalj

User’s location privacy concerns have been further raised by today’s Wi-Fi technology omnipresence. Preferred Network Lists (PNLs) are a particularly interesting source of private location information, as devices are storing a list of previously used hotspots. Privacy implications of a disclosed PNL have been covered by numerous papers, mostly focusing on passive monitoring attacks. Nowadays, however, more and more devices no longer transmit their PNL in clear, thus mitigating passive attacks. Hidden PNLs are still vulnerable against active attacks whereby an attacker mounts a fake SSID hotspot set to one likely contained within targeted PNL. If the targeted device has this SSID in the corresponding PNL, it will automatically initiate a connection with the fake hotspot thus disclosing this information to the attacker. By iterating through different SSIDs (from a predefined dictionary) the attacker can eventually reveal a big part of the hidden PNL. Considering user mobility, executing active attacks usually has to be done within a short opportunity window, while targeting nontrivial SSIDs from user’s PNL. The existing work on active attacks against hidden PNLs often neglects both of these challenges. In this paper we propose a simple mathematical model for analyzing active SSID dictionary attacks, allowing us to optimize the effectiveness of the attack under the above constraints (limited window of opportunity and targeting nontrivial SSIDs). Additionally, we showcase an example method for building an effective SSID dictionary using top-N recommender algorithm and validate our model through simulations and extensive real-life tests.

2016 ◽  
Vol 2016 (4) ◽  
pp. 102-122 ◽  
Author(s):  
Kassem Fawaz ◽  
Kyu-Han Kim ◽  
Kang G. Shin

AbstractWith the advance of indoor localization technology, indoor location-based services (ILBS) are gaining popularity. They, however, accompany privacy concerns. ILBS providers track the users’ mobility to learn more about their behavior, and then provide them with improved and personalized services. Our survey of 200 individuals highlighted their concerns about this tracking for potential leakage of their personal/private traits, but also showed their willingness to accept reduced tracking for improved service. In this paper, we propose PR-LBS (Privacy vs. Reward for Location-Based Service), a system that addresses these seemingly conflicting requirements by balancing the users’ privacy concerns and the benefits of sharing location information in indoor location tracking environments. PR-LBS relies on a novel location-privacy criterion to quantify the privacy risks pertaining to sharing indoor location information. It also employs a repeated play model to ensure that the received service is proportionate to the privacy risk. We implement and evaluate PR-LBS extensively with various real-world user mobility traces. Results show that PR-LBS has low overhead, protects the users’ privacy, and makes a good tradeoff between the quality of service for the users and the utility of shared location data for service providers.


Author(s):  
Yang Gao ◽  
Yincheng Jin ◽  
Seokmin Choi ◽  
Jiyang Li ◽  
Junjie Pan ◽  
...  

Accurate recognition of facial expressions and emotional gestures is promising to understand the audience's feedback and engagement on the entertainment content. Existing methods are primarily based on various cameras or wearable sensors, which either raise privacy concerns or demand extra devices. To this aim, we propose a novel ubiquitous sensing system based on the commodity microphone array --- SonicFace, which provides an accessible, unobtrusive, contact-free, and privacy-preserving solution to monitor the user's emotional expressions continuously without playing hearable sound. SonicFace utilizes a pair of speaker and microphone array to recognize various fine-grained facial expressions and emotional hand gestures by emitted ultrasound and received echoes. Based on a set of experimental evaluations, the accuracy of recognizing 6 common facial expressions and 4 emotional gestures can reach around 80%. Besides, the extensive system evaluations with distinct configurations and an extended real-life case study have demonstrated the robustness and generalizability of the proposed SonicFace system.


2019 ◽  
Vol 6 (3) ◽  
pp. 4472-4481 ◽  
Author(s):  
Lu Zhou ◽  
Le Yu ◽  
Suguo Du ◽  
Haojin Zhu ◽  
Cailian Chen

2018 ◽  
Vol 46 (1) ◽  
pp. 153-169
Author(s):  
Zbigniew Kasprzyk ◽  
Mariusz Rychlicki

Abstract Bluetooth is a type of wireless communication used to transmit voice and data at high speeds using radio waves. It is a standard protocol for short-range radio communications between many different types of devices, including mobile phones, computers and other electronics [1]. The trend of integrating new services in vehicles increases rapidly and Bluetooth is one of the emerging communication technologies for realizing ad-hoc networks. The paper presents the possibility of using Bluetooth to build ad-hoc network suitable for the transmission of sound, in particular voice data using the modulation GSFK. We analyzed the features or problems that Bluetooth offers for transmitting audio data in an ad-hoc network. Some initial results of simulations and real-life tests give an impression of the performance and efficiency this standard for the transmission of voice data in an ad-hoc networks [2].


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Hamisi Ally Mrope ◽  
Yusufu Abeid Chande Jande ◽  
Thomas T. Kivevele

In recent years, advances in using computational fluid dynamics (CFD) software have greatly increased due to its great potential to save time in the design process compared to experimental testing for data acquisition. Additionally, in real-life tests, a limited number of quantities are measured at a time, while in a CFD analysis all desired quantities can be measured at once, and with a high resolution in space and time. This article reviews the advances made regarding CFD modeling and simulation for the design and optimization of crossflow hydro turbines (CFTs). The performance of these turbines depends on various parameters like the number of blades, tip speed ratio, type of airfoil, blade pitch, chord length and twist, and its distribution along the blade span. Technical aspects of the model design, which include boundary conditions, solution of the governing equations of the water flow through CFTS, and the assumptions made during the simulations are thoroughly described. From the review, a clear idea on the suitability of the accuracy CFD applications in the design and optimization of crossflow hydro turbines has been provided. Therefore, this gives an insight that CFD is a useful and effective tool suitable for the design and optimization of CFTs.


2013 ◽  
Vol 14 (2) ◽  
pp. 192-201

In order to assess the influence of reducing the speed limit from 50 km h-1 to 30 km h-1 in one-lane streets in local residential areas in large cities, real traffic tests for pollutant emissions and fuel consumption have been carried out in Madrid city centre. Emission concentration and car activity were simultaneously measured by a Portable Emissions Measurement System. Real life tests carried out at different times and on different days were performed with a turbo-diesel engine light vehicle equipped with an oxidizer catalyst and using different driving styles with a previously trained driver. The results show that by reducing the speed limit from 50 km h-1 to 30 km h-1, using a normal driving style, the time taken for a given trip does not increase, but fuel consumption and NOx, CO and PM emissions are clearly reduced. Therefore, the main conclusion of this work is that reducing the speed limit in some narrow streets in residential and commercial areas or in a city not only increases pedestrian safety, but also contributes to reducing the environmental impact of motor vehicles and reducing fuel consumption. In addition, there is also a reduction in the greenhouse gas emissions resulting from the combustion of the fuel.


2016 ◽  
Vol 2016 ◽  
pp. 1-17 ◽  
Author(s):  
Hyung-Ju Cho ◽  
Rize Jin

Ak-range nearest neighbor (kRNN) query in a spatial network finds thekclosest objects to each point in the query region. The essential nature of thekRNN query is significant in location-based services (LBSs), where location-aware queries with query regions such askRNN queries are frequently used because of the issue of location privacy and the imprecision of the associated positioning techniques. Existing studies focus on reducing computation costs at the server side while processingkRNN queries. They also consider snapshot queries that are evaluated once and terminated, as opposed to moving queries that require constant updating of their results. However, little attention has been paid to evaluating movingkRNN queries in directed and dynamic spatial networks where every edge is directed and its weight changes in accordance with the traffic conditions. In this paper, we propose an efficient algorithm called MORAN that evaluates movingk-range nearest neighbor (MkRNN) queries in directed and dynamic spatial networks. The results of a simulation conducted using real-life roadmaps indicate that MORAN is more effective than a competitive method based on a shared execution approach.


Sign in / Sign up

Export Citation Format

Share Document