Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
6873347 | Future Generation Computer Systems | 2018 | 17 Pages |
Abstract
Finally, avenues for improvement and the limitations of this approach are identified. We discuss potential applications, strategies to prevent these leaks, and consider the effort required for an observer to present a practical privacy threat to the everyday WiFi user. This paper presents and demonstrates a nuanced and difficult to solve privacy vulnerability that cannot not be mitigated without considerable changes to current- and next-generation wireless communication protocols.
Related Topics
Physical Sciences and Engineering
Computer Science
Computational Theory and Mathematics
Authors
John S. Atkinson, John E. Mitchell, Miguel Rio, George Matich,