Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
156 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

UJI Probes: Dataset of Wi-Fi Probe Requests (2308.04435v2)

Published 20 Jul 2023 in cs.NI and cs.CR

Abstract: This paper focuses on the creation of a new, publicly available Wi-Fi probe request dataset. Probe requests belong to the family of management frames used by the 802.11 (Wi-Fi) protocol. As the situation changes year by year, and technology improves probe request studies are necessary to be done on up-to-date data. We provide a month-long probe request capture in an office environment, including work days, weekends, and holidays consisting of over 1 400 000 probe requests. We provide a description of all the important aspects of the dataset. Apart from the raw packet capture we also provide a Radio Map (RM) of the office to ensure the users of the dataset have all the possible information about the environment. To protect privacy, user information in the dataset is anonymized. This anonymization is done in a way that protects the privacy of users while preserving the ability to analyze the dataset to almost the same level as raw data. Furthermore, we showcase several possible use cases for the dataset, like presence detection, temporal Received Signal Strength Indicator (RSSI) stability, and privacy protection evaluation.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (27)
  1. “Tracking Unmodified Smartphones Using wi-fi Monitors” In Proceedings of the 10th ACM conference on embedded network sensor systems, 2012
  2. “Signals from the Crowd: Uncovering Social Relationships Through Smartphone Probes” In Proceedings of the 2013 conference on Internet measurement conference, 2013
  3. “CRAWDAD sapienza/probe-requests” IEEE Dataport, 2013 DOI: 10.15783/C76C7Z
  4. Mathieu Cunche, Mohamed-Ali Kaafar and Roksana Boreli “Linking wireless devices using information contained in Wi-Fi probe requests” In Pervasive and Mobile Computing 11 Elsevier, 2014
  5. “Characterizing privacy leakage of public wifi networks for users on travel” In 2013 Proceedings IEEE INFOCOM, 2013
  6. Lee Hutchinson “iOS 8 to Stymie Trackers and Marketers with MAC Address Randomization” In Ars Technica, 2014 URL: https://arstechnica.com/gadgets/2014/06/ios8-to-stymie-trackers-and-marketers-with-mac-address-randomization/
  7. Jeremy Martin, Erik Rye and Robert Beverly “Decomposition of MAC Address Structure for Granular Device Inference” In Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
  8. Julien Freudiger “How Talkative is Your Mobile Device? An Experimental Study of Wi-Fi Probe Requests” In Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
  9. Adriano Di Luzio, Alessandro Mei and Julinda Stefa “Mind your probes: De-anonymization of large crowds through smartphone WiFi probe requests” In IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, 2016 IEEE
  10. “Defeating MAC Address Randomization Through Timing Attacks” In Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
  11. “Three Years Later: A Study of MAC Address Randomization in Mobile Devices and When it Succeeds” In Proceedings on Privacy Enhancing Technologies 2021.3, 2021
  12. “A Study of MAC Address Randomization in Mobile Devices and When it Fails” In arXiv preprint arXiv:1703.02874, 2017
  13. “IEEE 802.11aq-2018 - IEEE Standard for Information technology–Telecommunications and information exchange between systems Local and metropolitan area networks–Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 5: Preassociation Discovery” URL: https://standards.ieee.org/standard/802˙11aq-2018.html
  14. WiGLE “WiGLE: Wireless Network Mapping”, 2023 URL: https://wigle.net/
  15. Google “Google Developers: Geolocation API”, 2022 Google URL: https://developers.google.com/maps/documentation/geolocation/
  16. Google “Google Support: Control Access Point Inclusion in Google’s Location Services”, 2022 URL: https://support.google.com/maps/answer/1725632?hl=en
  17. “CRAWDAD hasselt/glimps2015” IEEE Dataport, 2015 DOI: 10.15783/c7sd19
  18. Basem Abdulrahem “CRAWDAD nile/probe-requests” IEEE Dataport, 2021 DOI: 10.15783/s9mm-z673
  19. “Supplementary Materials for ”What Your Wearable Devices Revealed About You and Possibilities of Non-Cooperative 802.11 Presence Detection During Your Last IPIN Visit”” Zenodo, 2022 DOI: 10.5281/zenodo.6798302
  20. “What Your Wearable Devices Revealed About You and Possibilities of Non-Cooperative 802.11 Presence Detection During Your Last IPIN Visit” In 2022 IEEE 12th International Conference on Indoor Positioning and Indoor Navigation (IPIN), 2022 IEEE
  21. “Exploration of User Privacy in 802.11 Probe Requests with MAC Address Randomization Using Temporal Pattern Analysis” In arXiv e-prints, 2022, pp. arXiv–2206
  22. Tomas Fryza, Tomas Bravenec and Zdenek Kohl “Security and Reliability of Room Occupancy Detection Using Probe Requests in Smart Buildings” In 2023 33st International Conference Radioelektronika (RADIOELEKTRONIKA), 2023 IEEE
  23. Tomáš Bravenec “ESP32 Probe Sniffer”, 2022 URL: https://gitlab.com/tbravenec/esp32-probe-sniffer
  24. “Radiotap” URL: http://www.radiotap.org/
  25. “Occupancy Counting with Burst and Intermittent Signals in Smart Buildings” In IEEE Internet of Things Journal 5.2 IEEE, 2017
  26. IEEE “IEEE Standards - OUI/MA-L” URL: https://standards-oui.ieee.org/
  27. “Supplementary Materials for ”UJI Probes: Dataset of Wi-Fi Probe Requests” ” Zenodo, 2022 DOI: 10.5281/zenodo.7801798
Citations (3)

Summary

We haven't generated a summary for this paper yet.