Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Is this your smart phone?: On connecting MAC-addresses to a specific individual using access point data
Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
2015 (English)Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

Context. The potential to track individuals become greater and greater in the society today. We want to develop a method that is easy to understand so more people can participate in the discussion about the collection, and storing, of seemingly non-invasive device data and personal integrity.

Objectives. In this work we investigate the potential to connect a WiFi enabled device to a known individual by analysing log files. Since we want to keep the method as simple as possible we choose to not use machine learning because this might add unnecessary layers of complexity.

Methods. The conducted experiments were performed against a test group consisting of six persons. The dataset used consisted of authentication logs from a university WiFi-network collected during a month and data acquired by capturing WiFi-traffic.

Results. We were able to connect 67% of the targeted test persons to their smart phones and 60% to their laptops.

Conclusions. In this work we conclude that a device identifier in combination with data that can tie it to a location at a given time is to be seen as sensitive information with regard to personal integrity. We also conclude that it is possible to create and use an easy method to connect a device to a given person.

Place, publisher, year, edition, pages
2015. , p. 59
Keywords [en]
Surveillance mechanisms, Network privacy and anonymity, Social aspects of security and privacy, Mobile devices
National Category
Communication Systems Computer Sciences
Identifiers
URN: urn:nbn:se:bth-10379OAI: oai:DiVA.org:bth-10379DiVA, id: diva2:839278
Subject / course
DV2524 Degree Project in Computer Science for Engineers
Educational program
DVACD Master of Science in Computer Security
Supervisors
Examiners
Available from: 2015-08-04 Created: 2015-07-02 Last updated: 2018-01-11Bibliographically approved

Open Access in DiVA

Is this your smart phone?(2739 kB)884 downloads
File information
File name FULLTEXT02.pdfFile size 2739 kBChecksum SHA-512
56476b02ba8324df014f522d2c1a157b7ce2bb34a83eef9c44f282cde50671561a61647ac4a9a100481036b280fe71710d15fd160b2ebd015a8b3f82be67da12
Type fulltextMimetype application/pdf

By organisation
Department of Computer Science and Engineering
Communication SystemsComputer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 884 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 766 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf