Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Dartmouth College

2010

Wireless

Articles 1 - 3 of 3

Full-Text Articles in Physical Sciences and Mathematics

A Correlation Attack Against User Mobility Privacy In A Large-Scale Wlan Network, Keren Tan, Guanhua Yan, Jihwang Yeo, David Kotz Sep 2010

A Correlation Attack Against User Mobility Privacy In A Large-Scale Wlan Network, Keren Tan, Guanhua Yan, Jihwang Yeo, David Kotz

Dartmouth Scholarship

User association logs collected from real-world wireless LANs have facilitated wireless network research greatly. To protect user privacy, the common practice in sanitizing these data before releasing them to the public is to anonymize users' sensitive information such as the MAC addresses of their devices and their exact association locations. In this work,we demonstrate that these sanitization measures are insufficient in protecting user privacy from a novel type of correlation attack that is based on CRF (Conditional Random Field). In such a correlation attack, the adversary observes the victim's AP (Access Point) association activities for a short period of time …


Saluki: A High-Performance Wi-Fi Sniffing Program, Keren Tan, David Kotz May 2010

Saluki: A High-Performance Wi-Fi Sniffing Program, Keren Tan, David Kotz

Dartmouth Scholarship

Building a campus-wide wireless LAN measurement system faces many efficiency, scalability and security challenges. To address these challenges, we developed a distributed Wi-Fi sniffing program called Saluki. Compared to our previous implementation and to other available sniffing programs, Saluki has the following advantages: (1) its small footprint makes it suitable for a resource-constrained Linux platform, such as those in commercial Wi-Fi access points; (2) the frame-capture rate increased more than three-fold over tcpdump with minimal frame loss; (3) all traffic between this sniffer and the back-end server was secured using 128-bit encryption; and (4) the traffic load on the backbone …


On The Reliability Of Wireless Fingerprinting Using Clock Skews, Chrisil Arackaparambil, Sergey Bratus, Anna Shubina, David Kotz Mar 2010

On The Reliability Of Wireless Fingerprinting Using Clock Skews, Chrisil Arackaparambil, Sergey Bratus, Anna Shubina, David Kotz

Dartmouth Scholarship

No abstract provided.