All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Misuse of Wi-Fi Data to Analyze User Behaviour

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27240%2F24%3A10257328" target="_blank" >RIV/61989100:27240/24:10257328 - isvavai.cz</a>

  • Result on the web

    <a href="https://ieeexplore.ieee.org/document/10557020" target="_blank" >https://ieeexplore.ieee.org/document/10557020</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1109/ELEKTRO60337.2024.10557020" target="_blank" >10.1109/ELEKTRO60337.2024.10557020</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Misuse of Wi-Fi Data to Analyze User Behaviour

  • Original language description

    There has been a huge increase in the number of mobile devices over the past few years. Many mobile users own more than one mobile device. Compared to conventional laptops, mobile devices are constantly active and their users use them outdoors more often than personal computers. Compared to desktop computers, mobile devices accompany their owners on their travels and therefore there is a significant risk of tracking and eavesdropping on user data without a user being aware of it. This paper describes techniques how the attacker could track users by using the Wireless Fidelity (Wi-Fi) network. Every mobile device generates traffic that can be divided into &apos;Automatic&apos; and &apos;User&apos;. When&apos; Automatic&apos; traffic is generated, the device can be found because of its pattern. The paper also describes how the attacker can get into the victim&apos;s Wi-Fi network without being in its range. When breaching the Wi-Fi network security, the attacker can connect to the victim&apos;s network during his first appearance in range of this network. Security pre-cautions and possible directions of future work are discussed at the end of this paper.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

  • OECD FORD branch

    20203 - Telecommunications

Result continuities

  • Project

  • Continuities

    S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2024

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    15th International Conference Elektro 2024, ELEKTRO 2024 : Proceedings

  • ISBN

    979-8-3503-7235-9

  • ISSN

    2691-0616

  • e-ISSN

    2691-0616

  • Number of pages

    6

  • Pages from-to

    1-6

  • Publisher name

    IEEE

  • Place of publication

    Piscataway

  • Event location

    Zakopané

  • Event date

    May 20, 2024

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article