Session C: ChannelsInternational audience—The majority of smart devices used nowadays (e.g., smartphones, laptops, tablets) is capable of both Wi-Fi and Bluetooth wireless communications. Both network interfaces are identified by a unique 48-bits MAC address, assigned during the manufacturing process and unique worldwide. Such addresses, fundamental for link-layer communications and contained in every frame transmitted by the device, can be easily collected through packet sniffing and later used to perform higher level analysis tasks (user tracking, crowd density estimation, etc.). In this work we propose a system to pair the Wi-Fi and Bluetooth MAC addresses belonging to a physical unique device, starting from packets captured through a ne...
To improve city services, local administrators need to have a deep understanding of how the citizens...
International audienceWe present several novel techniques to track (unassociated) mobile devices by ...
We present several novel techniques to track (unassociated) mobile devices by abusing features of th...
International audienceBluetooth devices naturally emit many public signals. It opens new paths for p...
This paper firstly presents the benefits and critical challenges on the use of Bluetooth and Wi-Fi f...
Bluetooth is a short-range wireless technology that provides audio and data links between personal s...
International audienceThis work is about wireless communications technologies embedded in portable d...
International audienceThis work is about wireless communications technologies embedded in portable d...
Bluetooth Low Energy (BLE) is a pervasive wireless technology all around us today. It is included in...
xiv, 99 p. : ill. ; 30 cm.PolyU Library Call No.: [THS] LG51 .H577P COMP 2013 WangYMedical applicati...
Collecting the real human movement has drawn significant attention from research community since a b...
Research has shown that counting WiFi packets called probe requests (PRs) implicitly provides a prox...
Abstract—The continuing proliferation of smartphones makes them an effective means to monitor the nu...
Bluetooth Classic (BT) remains the de facto connectivity technology in car stereo systems, wireless ...
The focus on privacy-related measures regarding wireless networks grew in last couple of years. This...
To improve city services, local administrators need to have a deep understanding of how the citizens...
International audienceWe present several novel techniques to track (unassociated) mobile devices by ...
We present several novel techniques to track (unassociated) mobile devices by abusing features of th...
International audienceBluetooth devices naturally emit many public signals. It opens new paths for p...
This paper firstly presents the benefits and critical challenges on the use of Bluetooth and Wi-Fi f...
Bluetooth is a short-range wireless technology that provides audio and data links between personal s...
International audienceThis work is about wireless communications technologies embedded in portable d...
International audienceThis work is about wireless communications technologies embedded in portable d...
Bluetooth Low Energy (BLE) is a pervasive wireless technology all around us today. It is included in...
xiv, 99 p. : ill. ; 30 cm.PolyU Library Call No.: [THS] LG51 .H577P COMP 2013 WangYMedical applicati...
Collecting the real human movement has drawn significant attention from research community since a b...
Research has shown that counting WiFi packets called probe requests (PRs) implicitly provides a prox...
Abstract—The continuing proliferation of smartphones makes them an effective means to monitor the nu...
Bluetooth Classic (BT) remains the de facto connectivity technology in car stereo systems, wireless ...
The focus on privacy-related measures regarding wireless networks grew in last couple of years. This...
To improve city services, local administrators need to have a deep understanding of how the citizens...
International audienceWe present several novel techniques to track (unassociated) mobile devices by ...
We present several novel techniques to track (unassociated) mobile devices by abusing features of th...