kth.sePublications KTH
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Over-the-Air Runtime Wi-Fi MAC Address Re-randomization
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Software and Computer systems, SCS. (Networked Systems Security Group)ORCID iD: 0000-0003-2022-3976
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Software and Computer systems, SCS. (Networked Systems Security Group)ORCID iD: 0000-0002-3267-5374
2024 (English)In: WiSec 2024 - Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Association for Computing Machinery (ACM) , 2024, p. 8-13Conference paper, Published paper (Refereed)
Abstract [en]

Medium Access Control (MAC) address randomization is a key component for privacy protection in Wi-Fi networks. Current proposals periodically change the mobile device MAC addresses when it disconnects from the Access Point (AP). This way frames cannot be linked across changes, but the mobile device presence is exposed as long as it remains connected: all its communication is trivially linkable by observing the randomized yet same MAC address throughout the connection. Our runtime MAC re-randomization scheme addresses this issue, reducing or eliminating Wi-Fi frames linkability without awaiting for or requiring a disconnection. Our MAC re-randomization is practically 'over-the-air': MAC addresses are re-randomized just before transmission, while the protocol stacks (at the mobile and the AP) maintain locally the original connection MAC addresses - making our MAC layer scheme transparent to upper layers. With an implementation and a set of small-scale experiments with off-the-shelf devices, we show the feasibility of our scheme and the potential towards future deployment.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM) , 2024. p. 8-13
Keywords [en]
mac spoofing, mix-zone, privacy, unlinkability
National Category
Communication Systems
Identifiers
URN: urn:nbn:se:kth:diva-350709DOI: 10.1145/3643833.3656122ISI: 001239860900002Scopus ID: 2-s2.0-85198055874OAI: oai:DiVA.org:kth-350709DiVA, id: diva2:1884675
Conference
17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Korea, May 27 2024 - May 29 2024
Note

 Part of ISBN 9798400705823

QC 20240719

Available from: 2024-07-17 Created: 2024-07-17 Last updated: 2024-08-12Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Jin, HongyuPapadimitratos, Panos

Search in DiVA

By author/editor
Jin, HongyuPapadimitratos, Panos
By organisation
Software and Computer systems, SCS
Communication Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 266 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf