probe request
Recently Published Documents


TOTAL DOCUMENTS

16
(FIVE YEARS 2)

H-INDEX

3
(FIVE YEARS 0)

Sensors ◽  
2021 ◽  
Vol 21 (11) ◽  
pp. 3863
Author(s):  
Mario Vega-Barbas ◽  
Manuel Álvarez-Campana ◽  
Diego Rivera ◽  
Mario Sanz ◽  
Julio Berrocal

Estimating the number of people present in a given venue in real-time is extremely useful from a security, management, and resource optimization perspective. This article presents the architecture of a system based on the use of Wi-Fi sensor devices that allows estimating, almost in real-time, the number of people attending an event that is taking place in a venue. The estimate is based on the analysis of the “probe request” messages periodically transmitted by smartphones to determine the existence of Wi-Fi access points in the vicinity. The method considers the MAC address randomization mechanisms introduced in recent years in smartphones, which prevents the estimation of the number of devices by simply counting different MAC addresses. To solve this difficulty, our Wi-Fi sensors analyze other fields present in the header of the IEEE 802.11 frames, the information elements, to extract a unique fingerprint from each smartphone. The designed system was tested in a set of real scenarios, obtaining an estimate of attendance at different public events with an accuracy close to 95%.



Sensors ◽  
2020 ◽  
Vol 20 (16) ◽  
pp. 4620
Author(s):  
Xiaolin Gu ◽  
Wenjia Wu ◽  
Xiaodan Gu ◽  
Zhen Ling ◽  
Ming Yang ◽  
...  

Wi-Fi network has an open nature so that it needs to face greater security risks compared to wired network. The MAC address represents the unique identifier of the device, and is easily obtained by an attacker. Therefore MAC address randomization is proposed to protect the privacy of devices in a Wi-Fi network. However, implicit identifiers are used by attackers to identify user’s device, which can cause the leakage of user’s privacy. We propose device identification based on 802.11ac probe request frames. Here, a detailed analysis on the effectiveness of 802.11ac fields is given and a novel device identification method based on deep learning whose average f1-score exceeds 99% is presented. With a purpose of preventing attackers from obtaining relevant information by the device identification method above, we design a novel defense mechanism based on stream cipher. In that case, the original content of probe request frame is hidden by encrypting probe request frames and construction of probe request is reserved to avoid the finding of attackers. This defense mechanism can effectively reduce the performance of the proposed device identification method whose average f1-score is below 30%. In general, our research on attack and defense mechanism can preserve device privacy better.



IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 98579-98588 ◽  
Author(s):  
Luiz Oliveira ◽  
Daniel Schneider ◽  
Jano De Souza ◽  
Weiming Shen
Keyword(s):  


2017 ◽  
Vol 2017 ◽  
pp. 1-10 ◽  
Author(s):  
Lin Sun ◽  
Sinong Chen ◽  
Zengwei Zheng ◽  
Longyang Xu

This paper presents a novel passive mobile device localization mode based on IEEE 802.11 Probe Request frames. In this approach, the listener can discover mobile devices by receiving the Probe Request frames and localize them on his walking path. The unique location of the mobile device is estimated on a geometric diagram and right-angled walking path. In model equations, site-related parameter, that is, path loss exponent, is eliminated to make the approach site-independent. To implement unique localization, the right-angled walking path is designed and the optimal location is estimated from the optional points. The performance of our method has been evaluated inside the room, outside the room, and in outdoor scenarios. Three kinds of walking paths, for example, horizontal, vertical, and slanted, are also tested.



Author(s):  
Hao Chen ◽  
Yifan Zhang ◽  
Wei Li ◽  
Ping Zhang
Keyword(s):  


Author(s):  
Woramate Pattanusorn ◽  
Itthisek Nilkhamhang ◽  
Somsak Kittipiyakul ◽  
Kittipong Ekkachai ◽  
Atsushi Takahashi


Sign in / Sign up

Export Citation Format

Share Document