Misuse of Wi-Fi Data to Analyze User Behaviour
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27240%2F24%3A10257328" target="_blank" >RIV/61989100:27240/24:10257328 - isvavai.cz</a>
Výsledek na webu
<a href="https://ieeexplore.ieee.org/document/10557020" target="_blank" >https://ieeexplore.ieee.org/document/10557020</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1109/ELEKTRO60337.2024.10557020" target="_blank" >10.1109/ELEKTRO60337.2024.10557020</a>
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Misuse of Wi-Fi Data to Analyze User Behaviour
Popis výsledku v původním jazyce
There has been a huge increase in the number of mobile devices over the past few years. Many mobile users own more than one mobile device. Compared to conventional laptops, mobile devices are constantly active and their users use them outdoors more often than personal computers. Compared to desktop computers, mobile devices accompany their owners on their travels and therefore there is a significant risk of tracking and eavesdropping on user data without a user being aware of it. This paper describes techniques how the attacker could track users by using the Wireless Fidelity (Wi-Fi) network. Every mobile device generates traffic that can be divided into 'Automatic' and 'User'. When' Automatic' traffic is generated, the device can be found because of its pattern. The paper also describes how the attacker can get into the victim's Wi-Fi network without being in its range. When breaching the Wi-Fi network security, the attacker can connect to the victim's network during his first appearance in range of this network. Security pre-cautions and possible directions of future work are discussed at the end of this paper.
Název v anglickém jazyce
Misuse of Wi-Fi Data to Analyze User Behaviour
Popis výsledku anglicky
There has been a huge increase in the number of mobile devices over the past few years. Many mobile users own more than one mobile device. Compared to conventional laptops, mobile devices are constantly active and their users use them outdoors more often than personal computers. Compared to desktop computers, mobile devices accompany their owners on their travels and therefore there is a significant risk of tracking and eavesdropping on user data without a user being aware of it. This paper describes techniques how the attacker could track users by using the Wireless Fidelity (Wi-Fi) network. Every mobile device generates traffic that can be divided into 'Automatic' and 'User'. When' Automatic' traffic is generated, the device can be found because of its pattern. The paper also describes how the attacker can get into the victim's Wi-Fi network without being in its range. When breaching the Wi-Fi network security, the attacker can connect to the victim's network during his first appearance in range of this network. Security pre-cautions and possible directions of future work are discussed at the end of this paper.
Klasifikace
Druh
D - Stať ve sborníku
CEP obor
—
OECD FORD obor
20203 - Telecommunications
Návaznosti výsledku
Projekt
—
Návaznosti
S - Specificky vyzkum na vysokych skolach
Ostatní
Rok uplatnění
2024
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název statě ve sborníku
15th International Conference Elektro 2024, ELEKTRO 2024 : Proceedings
ISBN
979-8-3503-7235-9
ISSN
2691-0616
e-ISSN
2691-0616
Počet stran výsledku
6
Strana od-do
1-6
Název nakladatele
IEEE
Místo vydání
Piscataway
Místo konání akce
Zakopané
Datum konání akce
20. 5. 2024
Typ akce podle státní příslušnosti
WRD - Celosvětová akce
Kód UT WoS článku
—