Reduce to the MACs -- Privacy Friendly Generic Probe Requests

Read original: arXiv:2405.09230 - Published 5/16/2024 by Johanna Ansohn McDougall, Alessandro Brighente, Anne Kunstmann, Niklas Zapatka, Hannes Federrath
Total Score

0

Reduce to the MACs -- Privacy Friendly Generic Probe Requests

Sign in to get full access

or

If you already have an account, we'll log you in

Overview

  • This paper presents a new approach called "Reduce to the MACs" that aims to improve the privacy of wireless devices by using generic probe requests instead of device-specific ones.
  • The proposed method reduces the amount of identifying information transmitted during the wireless network discovery process, making it more difficult for adversaries to track individual devices.
  • The authors evaluate the effectiveness of their approach through experiments and analysis, demonstrating its potential benefits for preserving user privacy.

Plain English Explanation

The paper focuses on a common issue in wireless networking: when your device searches for available wireless networks, it sends out "probe requests" that can be used to identify and track your device. This can be a privacy concern, as it allows others to monitor your movements and activities.

The researchers have developed a new technique called "Reduce to the MACs" that addresses this problem. Instead of using device-specific probe requests, their approach uses more generic, less identifying probe requests. This makes it much harder for anyone to figure out which specific device is performing the network search.

Through experiments and analysis, the researchers show that their "Reduce to the MACs" method can significantly improve user privacy without sacrificing the core functionality of wireless network discovery. This is an important step in addressing privacy concerns in wireless communications, and could benefit users concerned about their online privacy.

Technical Explanation

The paper presents a new protocol called "Reduce to the MACs" that aims to improve the privacy of wireless devices during the network discovery process. Traditionally, wireless devices send out "probe requests" that contain unique identifiers like the device's MAC address, which can be used to track the device's movements and activities.

To address this privacy issue, the "Reduce to the MACs" approach replaces the device-specific probe requests with more generic probe requests that do not contain unique identifiers. The authors evaluate the effectiveness of this approach through experiments and analysis, demonstrating that it can significantly reduce the amount of identifying information transmitted without compromising the functionality of network discovery.

The researchers also discuss how their method could be integrated with existing wireless access control methods and fairness-aware resource allocation protocols to provide a more comprehensive privacy-preserving solution for wireless networks.

Critical Analysis

The paper presents a well-designed and thorough evaluation of the "Reduce to the MACs" approach, including experiments that validate its effectiveness in reducing the amount of identifying information transmitted during network discovery. The authors also acknowledge some potential limitations, such as the possibility of adversaries using other techniques (e.g., signal-based tracking) to identify devices.

One area that could merit further exploration is the potential impact of the "Reduce to the MACs" approach on other aspects of wireless network performance, such as communication and sensing capabilities. Additionally, the authors could consider investigating the feasibility of deploying their solution in real-world wireless networks and the potential challenges that may arise during implementation.

Conclusion

The "Reduce to the MACs" approach presented in this paper is a promising step towards improving the privacy of wireless devices during the network discovery process. By replacing device-specific probe requests with more generic ones, the method significantly reduces the amount of identifying information transmitted, making it more difficult for adversaries to track individual devices.

The thorough evaluation and analysis provided in the paper demonstrate the potential benefits of this approach, which could be further enhanced by integrating it with other privacy-preserving techniques for wireless networks. As wireless technology continues to play an increasingly important role in our lives, solutions like "Reduce to the MACs" will be crucial in addressing the growing concerns around user privacy and security.



This summary was produced with help from an AI and may contain inaccuracies - check out the links to read the original source documents!

Follow @aimodelsfyi on 𝕏 →

Related Papers

Reduce to the MACs -- Privacy Friendly Generic Probe Requests
Total Score

0

Reduce to the MACs -- Privacy Friendly Generic Probe Requests

Johanna Ansohn McDougall, Alessandro Brighente, Anne Kunstmann, Niklas Zapatka, Hannes Federrath

Abstract. Since the introduction of active discovery in Wi-Fi networks, users can be tracked via their probe requests. Although manufacturers typically try to conceal Media Access Control (MAC) addresses using MAC address randomisation, probe requests still contain Information Elements (IEs) that facilitate device identification. This paper introduces generic probe requests: By removing all unnecessary information from IEs, the requests become indistinguishable from one another, letting single devices disappear in the largest possible anonymity set. Conducting a comprehensive evaluation, we demonstrate that a large IE set contained within undirected probe requests does not necessarily imply fast connection establishment. Furthermore, we show that minimising IEs to nothing but Supported Rates would enable 82.55% of the devices to share the same anonymity set. Our contributions provide a significant advancement in the pursuit of robust privacy solutions for wireless networks, paving the way for more user anonymity and less surveillance in wireless communication ecosystems.

Read more

5/16/2024

Over-the-Air Runtime Wi-Fi MAC Address Re-randomization
Total Score

0

Over-the-Air Runtime Wi-Fi MAC Address Re-randomization

Hongyu Jin, Panos Papadimitratos

Medium Access Control (MAC) address randomization is a key component for privacy protection in Wi-Fi networks. Current proposals periodically change the mobile device MAC addresses when it disconnects from the Access Point (AP). This way frames cannot be linked across changes, but the mobile device presence is exposed as long as it remains connected: all its communication is trivially linkable by observing the randomized yet same MAC address throughout the connection. Our runtime MAC re-randomization scheme addresses this issue, reducing or eliminating Wi-Fi frames linkability without awaiting for or requiring a disconnection. Our MAC re-randomization is practically 'over-the-air': MAC addresses are re-randomized just before transmission, while the protocol stacks (at the mobile and the AP) maintain locally the original connection MAC addresses - making our MAC layer scheme transparent to upper layers. With an implementation and a set of small-scale experiments with off-the-shelf devices, we show the feasibility of our scheme and the potential towards future deployment.

Read more

5/27/2024

Surveilling the Masses with Wi-Fi-Based Positioning Systems
Total Score

310

Surveilling the Masses with Wi-Fi-Based Positioning Systems

Erik Rye, Dave Levin

Wi-Fi-based Positioning Systems (WPSes) are used by modern mobile devices to learn their position using nearby Wi-Fi access points as landmarks. In this work, we show that Apple's WPS can be abused to create a privacy threat on a global scale. We present an attack that allows an unprivileged attacker to amass a worldwide snapshot of Wi-Fi BSSID geolocations in only a matter of days. Our attack makes few assumptions, merely exploiting the fact that there are relatively few dense regions of allocated MAC address space. Applying this technique over the course of a year, we learned the precise locations of over 2 billion BSSIDs around the world. The privacy implications of such massive datasets become more stark when taken longitudinally, allowing the attacker to track devices' movements. While most Wi-Fi access points do not move for long periods of time, many devices -- like compact travel routers -- are specifically designed to be mobile. We present several case studies that demonstrate the types of attacks on privacy that Apple's WPS enables: We track devices moving in and out of war zones (specifically Ukraine and Gaza), the effects of natural disasters (specifically the fires in Maui), and the possibility of targeted individual tracking by proxy -- all by remotely geolocating wireless access points. We provide recommendations to WPS operators and Wi-Fi access point manufacturers to enhance the privacy of hundreds of millions of users worldwide. Finally, we detail our efforts at responsibly disclosing this privacy vulnerability, and outline some mitigations that Apple and Wi-Fi access point manufacturers have implemented both independently and as a result of our work.

Read more

5/27/2024

Characterizing Encrypted Application Traffic through Cellular Radio Interface Protocol
Total Score

0

Characterizing Encrypted Application Traffic through Cellular Radio Interface Protocol

Md Ruman Islam (University of Nebraska Omaha), Raja Hasnain Anwar (University of Massachusetts Amherst), Spyridon Mastorakis (University of Notre Dame), Muhammad Taqi Raza (University of Massachusetts Amherst)

Modern applications are end-to-end encrypted to prevent data from being read or secretly modified. 5G tech nology provides ubiquitous access to these applications without compromising the application-specific performance and latency goals. In this paper, we empirically demonstrate that 5G radio communication becomes the side channel to precisely infer the user's applications in real-time. The key idea lies in observing the 5G physical and MAC layer interactions over time that reveal the application's behavior. The MAC layer receives the data from the application and requests the network to assign the radio resource blocks. The network assigns the radio resources as per application requirements, such as priority, Quality of Service (QoS) needs, amount of data to be transmitted, and buffer size. The adversary can passively observe the radio resources to fingerprint the applications. We empirically demonstrate this attack by considering four different categories of applications: online shopping, voice/video conferencing, video streaming, and Over-The-Top (OTT) media platforms. Finally, we have also demonstrated that an attacker can differentiate various types of applications in real-time within each category.

Read more

7/23/2024