All Posts
Enhancing IoT Privacy: Why DNS-over-HTTPS Alone Falls Short?
Samuel Pélissier, Gianluca Anselmi, Abhishek Kumar, Anna Maria Mandalari, Mathieu Cunche
Recent years have seen widespread adoption of consumer Internet of Things (IoT) devices, offering diverse benefits to end-users, from smart homes to healthcare monitoring, but raising serious privacy...
read articleFingerprinting connected Wi-Fi devices using per-network MAC addresses
Abhishek Kumar Mishra, Samuel Pélissier, Mathieu Cunche
Wi-Fi stands out as one of the most prominent and widespread wireless technologies in use today. Smartphones and various other Wi-Fi-enabled devices employ management frames called probe-requests to...
read articlePrivacy-preserving pseudonyms for LoRaWAN
Samuel Pélissier, Jan Aalmoes, Abhishek Kumar Mishra, Mathieu Cunche, Vincent Roca, Didier Donsez
LoRaWAN, a widely deployed LPWAN protocol, raises privacy concerns due to metadata exposure, particularly concerning the exploitation of stable device identifiers. For the first time in literature, we...
read articleDevice re-identification in LoRaWAN through messages linkage
Samuel Pélissier, Mathieu Cunche, Vincent Roca, Didier Donsez
In LoRaWAN networks, devices are identified by two identifiers: a globally unique and stable one called DevEUI, and an ephemeral and randomly assigned pseudonym called DevAddr. The association between...
read articleShadow Banning in Browser-based Volunteering Computing
Samuel Pélissier, Lucas Dupont, Dorian Lefeuvre, Nicolas Guillois
Browser-based volunteering computing projects are mainly used to perform scientific computations in heterogeneous clusters at a low cost. As for every community-driven approach, saboteurs can try to...
read article