메뉴 건너뛰기




Volumn , Issue , 2008, Pages 40-53

Improving wireless privacy with an identifier-free link layer protocol

Author keywords

Anonymity; Privacy; Wireless. 802.11

Indexed keywords

802.11 PROTOCOLS; ANONYMITY; ATHEROS; DATA DELIVERIES; IN PACKETS; LINK LAYER PROTOCOLS; MAC ADDRESSES; PRIVACY; PROTOCOL FIELDS; SET-UPS; SYMMETRIC KEY ENCRYPTIONS; SYMMETRIC KEYS; WIRELESS LINK LAYERS; WIRELESS. 802.11;

EID: 57349141867     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1378600.1378607     Document Type: Conference Paper
Times cited : (61)

References (34)
  • 1
    • 33846272939 scopus 로고    scopus 로고
    • Hostap driver. http://hostap.epitest.fi/.
    • Hostap driver
  • 2
    • 57349084351 scopus 로고    scopus 로고
    • libgcrypt. http://directory.fsf.org/project/libgcrypt/.
    • libgcrypt. http://directory.fsf.org/project/libgcrypt/.
  • 4
    • 57349193944 scopus 로고    scopus 로고
    • roofnet. http://pdos.csail.mit.edu/roofnet/doku.php.
    • roofnet. http://pdos.csail.mit.edu/roofnet/doku.php.
  • 6
    • 57349100545 scopus 로고    scopus 로고
    • Ieee 802.11i-2004 amendment to ieee std 802.11, 2004. standards.ieee.org/getieee802/download/802.lli-2004.pdf
    • Ieee 802.11i-2004 amendment to ieee std 802.11, 2004. standards.ieee.org/getieee802/download/802.lli-2004.pdf.
  • 7
    • 4043116941 scopus 로고    scopus 로고
    • Abadi, M., and Fournet, C. Private authentication. Theor. Cam-put. Sci. 322, 3 (2004), 427-476.
    • Abadi, M., and Fournet, C. Private authentication. Theor. Cam-put. Sci. 322, 3 (2004), 427-476.
  • 8
    • 34548314470 scopus 로고    scopus 로고
    • Armknecht, F., Girão, J., Matos, A., and AguiAR, R. L. Who said that? privacy at link layer. In INFOCOM (2007), IEEE.
    • Armknecht, F., Girão, J., Matos, A., and AguiAR, R. L. Who said that? privacy at link layer. In INFOCOM (2007), IEEE.
  • 9
    • 57349125375 scopus 로고    scopus 로고
    • Bellare, M., Boldyreva, A., Desai, A., and PoINTCHEVAL, D. Key-privacy in public-key encryption. In ASIA CRYPT (2001).
    • Bellare, M., Boldyreva, A., Desai, A., and PoINTCHEVAL, D. Key-privacy in public-key encryption. In ASIA CRYPT (2001).
  • 10
    • 57349121390 scopus 로고    scopus 로고
    • Forward-security in private-key cryptography. Topics in Cryptology - CT-RSA'03
    • BELLARE, M., AND Yee, B. Forward-security in private-key cryptography. Topics in Cryptology - CT-RSA'03, LNCS 2612 (2003).
    • (2003) LNCS , vol.2612
    • BELLARE, M.1    Yee, B.2
  • 11
    • 57349160902 scopus 로고    scopus 로고
    • Chandra, R., Mahajan, R., Padmanabhan, V., and Zhang, M. CRAWDAD data set microsoft/osdi2006 (v. 2007-05-23). http://crawdad.cs.dartmouth.edu.
    • Chandra, R., Mahajan, R., Padmanabhan, V., and Zhang, M. CRAWDAD data set microsoft/osdi2006 (v. 2007-05-23). http://crawdad.cs.dartmouth.edu.
  • 12
    • 57349160900 scopus 로고    scopus 로고
    • Cheng, Y.-C., Bellardo, J., Benko;, P., Snoeren, A. C, Voelker, G. M., and Savage, S. Jigsaw: solving the puzzle of enterprise 802.11 analysis. SIGCOMM CCR (2006).
    • Cheng, Y.-C., Bellardo, J., Benko;, P., Snoeren, A. C, Voelker, G. M., and Savage, S. Jigsaw: solving the puzzle of enterprise 802.11 analysis. SIGCOMM CCR (2006).
  • 13
    • 35448936042 scopus 로고    scopus 로고
    • Cox, L. P., Dalton, A., and Marupadi, V. SmokeScreen: Flexible privacy controls for presence-sharing. In MobiSys (2007).
    • Cox, L. P., Dalton, A., and Marupadi, V. SmokeScreen: Flexible privacy controls for presence-sharing. In MobiSys (2007).
  • 14
    • 85084161366 scopus 로고    scopus 로고
    • Dingledine, R., Mathewson, N., and Syverson, P. Tor: The second-generation onion router. In USENIX Security (2004).
    • Dingledine, R., Mathewson, N., and Syverson, P. Tor: The second-generation onion router. In USENIX Security (2004).
  • 15
    • 85092666359 scopus 로고    scopus 로고
    • Greenstein, B., Gummadi, R., Pang, J.. Chen, M. Y., Kohno, T., Seshan, S., and Wetherall, D. Can Ferris Bueller Still Have His Day Off? Protecting Privacy in an Era of Wireless Devices. In HotOS XI (2007).
    • Greenstein, B., Gummadi, R., Pang, J.. Chen, M. Y., Kohno, T., Seshan, S., and Wetherall, D. Can Ferris Bueller Still Have His Day Off? Protecting Privacy in an Era of Wireless Devices. In HotOS XI (2007).
  • 16
    • 23944520444 scopus 로고    scopus 로고
    • Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis
    • GRUTESER, M., AND GRUNWALD, D. Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis. A CM MONET 10 (2005).
    • (2005) A CM MONET , vol.10
    • GRUTESER, M.1    GRUNWALD, D.2
  • 17
    • 34247389249 scopus 로고    scopus 로고
    • A framework for location privacy in wireless networks
    • April
    • Hu, Y.-C, AND WANG, H. J. A framework for location privacy in wireless networks. In SIGCOMM Asia Workshop (April 2005).
    • (2005) SIGCOMM Asia Workshop
    • Hu, Y.-C.1    WANG, H.J.2
  • 18
    • 35449007284 scopus 로고    scopus 로고
    • Jiang, T., Wang, H., and Hu, Y.-C. Preserving location privacy in wireless LANs. In MobiSys (2007).
    • Jiang, T., Wang, H., and Hu, Y.-C. Preserving location privacy in wireless LANs. In MobiSys (2007).
  • 21
    • 37749006403 scopus 로고    scopus 로고
    • Pang, J., Greenstein, B., Gummadi, R., Seshan, S., and Wetherall, D. 802.11 user fingerprinting. In MobiCom (Sept. 2007).
    • Pang, J., Greenstein, B., Gummadi, R., Seshan, S., and Wetherall, D. 802.11 user fingerprinting. In MobiCom (Sept. 2007).
  • 23
    • 37749047975 scopus 로고    scopus 로고
    • Robust location distinction using temporal link signatures
    • Patwari, N., AND Kasera, S. K. Robust location distinction using temporal link signatures. In MobiCom (2007).
    • (2007) MobiCom
    • Patwari, N.1    Kasera, S.K.2
  • 24
    • 36849068013 scopus 로고    scopus 로고
    • Measurement-based models of delivery and interference in static wireless networks
    • Reis, C., Mahajan, R., Rodrig, M., Wetherall, D., AND ZAHORJAN, J. Measurement-based models of delivery and interference in static wireless networks. SIGCOMM CCR 36, 4 (2006).
    • (2006) SIGCOMM CCR , vol.36 , pp. 4
    • Reis, C.1    Mahajan, R.2    Rodrig, M.3    Wetherall, D.4    ZAHORJAN, J.5
  • 25
    • 57349143038 scopus 로고    scopus 로고
    • Rodrig, M., Reis, C., Mahajan, R., Wetherall, D., Zahorjan, J., and Lazowska, E. CRAWDAD data set uw/sigcomm2004 (v. 2006-10-17). http://crawdad.cs.dartmouth. edu.
    • Rodrig, M., Reis, C., Mahajan, R., Wetherall, D., Zahorjan, J., and Lazowska, E. CRAWDAD data set uw/sigcomm2004 (v. 2006-10-17). http://crawdad.cs.dartmouth. edu.
  • 27
    • 34247328638 scopus 로고    scopus 로고
    • Location privacy in wireless personal area networks
    • SINGELÉE, D., AND Preneel, B. Location privacy in wireless personal area networks. In WiSe (2006).
    • (2006) WiSe
    • SINGELÉE, D.1    Preneel, B.2
  • 28
    • 85084161110 scopus 로고    scopus 로고
    • Song, D. X., Wagner, D., and Tian, X. Timing analysis of keystrokes and timing attacks on ssh. In USENIX Security (2001).
    • Song, D. X., Wagner, D., and Tian, X. Timing analysis of keystrokes and timing attacks on ssh. In USENIX Security (2001).
  • 29
    • 57349149762 scopus 로고    scopus 로고
    • Song, J.. Poovendran, R., Lee, J., and Iwata, T. The AES-CMAC algorithm. RFC 4493, June 2006.
    • Song, J.. Poovendran, R., Lee, J., and Iwata, T. The AES-CMAC algorithm. RFC 4493, June 2006.
  • 30
    • 84864253438 scopus 로고    scopus 로고
    • Sun, Q., Simon, D. R., Wang, Y.-M., Russell, W., Padmanabhan, V. N., and Qiu, L. Statistical identification of encrypted web browsing traffic. In IEEE Security and Privacy (2002).
    • Sun, Q., Simon, D. R., Wang, Y.-M., Russell, W., Padmanabhan, V. N., and Qiu, L. Statistical identification of encrypted web browsing traffic. In IEEE Security and Privacy (2002).
  • 31
    • 38149097247 scopus 로고    scopus 로고
    • Security associations in personal networks: A comparative analysis
    • Tech. Rep. NRC-TR-2007-004, Nokia Research Center, Jan
    • SUOMALAINEN, J., VALKONEN, J., AND ASOKAN, N. Security associations in personal networks: A comparative analysis. Tech. Rep. NRC-TR-2007-004, Nokia Research Center, Jan. 2007.
    • (2007)
    • SUOMALAINEN, J.1    VALKONEN, J.2    ASOKAN, N.3
  • 32
    • 57349183424 scopus 로고    scopus 로고
    • Tao, P., Rudys, A., Ladd, A., and Wallach, D. Wireless LAN location sensing for security application. In WISE (2003).
    • Tao, P., Rudys, A., Ladd, A., and Wallach, D. Wireless LAN location sensing for security application. In WISE (2003).
  • 33
    • 50249161557 scopus 로고    scopus 로고
    • Wright, C, Ballard, L., Monrose, F., and MASSON, G. Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob? In USENIX Security (Aug. 2007).
    • Wright, C, Ballard, L., Monrose, F., and MASSON, G. Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob? In USENIX Security (Aug. 2007).
  • 34
    • 33845735523 scopus 로고    scopus 로고
    • Wright, C., Monrose, F., and Masson, G. On inferring application protocol behaviors in encrypted network traffic. Journal of Machine Learning Research (Aug. 2006).
    • Wright, C., Monrose, F., and Masson, G. On inferring application protocol behaviors in encrypted network traffic. Journal of Machine Learning Research (Aug. 2006).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.