Probing for Passwords – Privacy Implications of SSIDs in Probe Requests

06/08/2022
by   Johanna Ansohn McDougall, et al.
0

Probe requests help mobile devices discover active Wi-Fi networks. They often contain a multitude of data that can be used to identify and track devices and thereby their users. The past years have been a cat-and-mouse game of improving fingerprinting and introducing countermeasures against fingerprinting. This paper analyses the content of probe requests sent by mobile devices and operating systems in a field experiment. In it, we discover that users (probably by accident) input a wealth of data into the SSID field and find passwords, e-mail addresses, names and holiday locations. With these findings we underline that probe requests should be considered sensitive data and be well protected. To preserve user privacy, we suggest and evaluate a privacy-friendly hash-based construction of probe requests and improved user controls.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/20/2023

UJI Probes: Dataset of Wi-Fi Probe Requests

This paper focuses on the creation of a new, publicly available Wi-Fi pr...
research
05/19/2018

MAC Address De-Anonymisation

This project is an exploration into analysing WiFi probe requests, a man...
research
02/05/2020

Understanding Crowd Behaviors in a Social Event by Passive WiFi Sensing and Data Mining

Understanding crowd behaviors in a large social event is crucial for eve...
research
07/15/2018

Improving the Performance of WLANs by Reducing Unnecessary Active Scans

We consider the problem of excessive and unnecessary active scans in hea...
research
07/18/2019

Preserving ON-OFF Privacy for Past and Future Requests

We study the ON-OFF privacy problem. At each time, the user is intereste...
research
04/19/2021

Monitoring Data Requests in Decentralized Data Storage Systems: A Case Study of IPFS

Decentralized data storage systems like the Interplanetary Filesystem (I...
research
07/30/2019

A Federated Learning Approach for Mobile Packet Classification

In order to improve mobile data transparency, a number of network-based ...

Please sign up or login with your details

Forgot password? Click here to reset