Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era

  title={Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era},
  author={Ben Greenstein and Ramakrishna Gummadi and Jeffrey Pang and Mike Y. Chen and Tadayoshi Kohno and Srinivasan Seshan and David Wetherall},
Today’s rich and varied wireless environment, including mobile phones, Wi-Fi-enabled laptops, and Bluetooth headsets, poses threats to our privacy that cannot be addressed with existing protocols. By considering 802.11 as a case study and analyzing publicly available 802.11 traces, we show that a device can be identified and tracked over time through its persistent link-layer address, list o f known networks (SSIDs), and other protocol and physical layer characteristics. We argue that it is in… CONTINUE READING
Highly Cited
This paper has 38 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.


Publications citing this paper.
Showing 1-10 of 27 extracted citations

Human Behavior and Challenges of Anonymizing WLAN Traces

GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference • 2009
View 4 Excerpts
Highly Influenced

I know your MAC address: targeted tracking of individual using Wi-Fi

Journal of Computer Virology and Hacking Techniques • 2013
View 4 Excerpts
Highly Influenced

SSIDs in the wild: Extracting semantic information from WiFi SSIDs

2015 IEEE 40th Conference on Local Computer Networks (LCN) • 2015
View 3 Excerpts

Wi-Fi Privacy : Vulnerabilities and Defense Mechanisms

Anirudh Ekambaranathan
View 2 Excerpts


Publications referenced by this paper.
Showing 1-10 of 25 references

Wireless Geographic Logging Engine: Making maps of wireless networks

Wigle. URL
View 2 Excerpts
Highly Influenced

RFID security and privacy: a research survey

IEEE Journal on Selected Areas in Communications • 2006

Access control to people location information

ACM Trans. Inf. Syst. Secur. • 2005
View 1 Excerpt

Remote Physical Device Fingerprinting

IEEE Symposium on Security and Privacy • 2005
View 1 Excerpt

Similar Papers

Loading similar papers…