Improving Identity Protection over Wireless Networks Through Protocol Specifications

Guardado en:
Detalles Bibliográficos
Publicado en:ProQuest Dissertations and Theses (2025)
Autor principal: Tucker, Tyler
Publicado:
ProQuest Dissertations & Theses
Materias:
Acceso en línea:Citation/Abstract
Full Text - PDF
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!

MARC

LEADER 00000nab a2200000uu 4500
001 3258876863
003 UK-CbPIL
020 |a 9798297610781 
035 |a 3258876863 
045 2 |b d20250101  |b d20251231 
084 |a 66569  |2 nlm 
100 1 |a Tucker, Tyler 
245 1 |a Improving Identity Protection over Wireless Networks Through Protocol Specifications 
260 |b ProQuest Dissertations & Theses  |c 2025 
513 |a Dissertation/Thesis 
520 3 |a Mobile devices, now numbered in the billions, constantly communicate over wireless networking protocols to facilitate human communication. Our reliance on this technology has led to complex user identities, namely that dozens of digital identifiers are now linked to a single individual. While many such identifiers such as a phone number or an email address are known to the user, many more are used transparently by personal devices in networks we rely on to communicate with each other or other devices we own.Wireless network protocols (e.g., Bluetooth, cellular protocols) use these transparent identifiers to function properly with minimal user involvement. They achieve this by providing network tasks found “underneath the application layer,” or beneath the logical layer at which application-specific data is specified and handled. Consequently, application developers and end users often have little or no access to configure or monitor communication at these layers. Unfortunately, adversaries can take advantage of this abstraction to track users and, in some cases, gain access to their resources without their consent or knowledge.Due to the maturity, popularity, and interoperability of pervasive wireless networking protocols, they cannot be fundamentally changed in response to the public disclosure of a vulnerability. Known threats taking advantage of design flaws within their specifications, therefore, can persist even after they are disclosed to the relevant party. Nevertheless, defensive measures can limit the efficacy of adversarial tracking efforts on devices implementing these protocols, and therefore their users.In this dissertation, we explore how the relationship between a manual review of written protocol specifications and other factors such as measurement on real wireless networks and an inevitably evolving threat model can be used to mitigate persistent privacy threats against users of wireless networks. Specifically, we will discuss our techniques in developing attacks and defenses against Bluetooth networks, as well as uncovering evidence of rogue cellular base station usage in the wild, the latter substantiated by statistical analysis for the first time in academia. Finally, we review our work in providing the first analysis of a commercial rogue base station in academia. 
653 |a Computer science 
653 |a Computer engineering 
653 |a Electrical engineering 
773 0 |t ProQuest Dissertations and Theses  |g (2025) 
786 0 |d ProQuest  |t ProQuest Dissertations & Theses Global 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3258876863/abstract/embedded/L8HZQI7Z43R0LA5T?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3258876863/fulltextPDF/embedded/L8HZQI7Z43R0LA5T?source=fedsrch