{"id":"https://openalex.org/W2884723215","doi":"https://doi.org/10.1155/2018/5153265","title":"SSID Oracle Attack on Undisclosed Wi\u2010Fi Preferred Network Lists","display_name":"SSID Oracle Attack on Undisclosed Wi\u2010Fi Preferred Network Lists","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2884723215","doi":"https://doi.org/10.1155/2018/5153265","mag":"2884723215"},"language":"en","primary_location":{"id":"doi:10.1155/2018/5153265","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/5153265","pdf_url":"http://downloads.hindawi.com/journals/wcmc/2018/5153265.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"http://downloads.hindawi.com/journals/wcmc/2018/5153265.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035558658","display_name":"Ante Dageli\u0107","orcid":"https://orcid.org/0000-0002-8393-783X"},"institutions":[{"id":"https://openalex.org/I92251255","display_name":"University of Split","ror":"https://ror.org/00m31ft63","country_code":"HR","type":"education","lineage":["https://openalex.org/I92251255"]}],"countries":["HR"],"is_corresponding":false,"raw_author_name":"Ante Dageli\u0107","raw_affiliation_strings":["FESB, University of Split, Split"],"raw_orcid":"https://orcid.org/0000-0002-8393-783X","affiliations":[{"raw_affiliation_string":"FESB, University of Split, Split","institution_ids":["https://openalex.org/I92251255"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076566311","display_name":"Toni Perkovi\u0107","orcid":"https://orcid.org/0000-0001-8826-4905"},"institutions":[{"id":"https://openalex.org/I92251255","display_name":"University of Split","ror":"https://ror.org/00m31ft63","country_code":"HR","type":"education","lineage":["https://openalex.org/I92251255"]}],"countries":["HR"],"is_corresponding":true,"raw_author_name":"Toni Perkovi\u0107","raw_affiliation_strings":["University Department of Forensic Sciences, University of Split, Split"],"raw_orcid":"https://orcid.org/0000-0001-8826-4905","affiliations":[{"raw_affiliation_string":"University Department of Forensic Sciences, University of Split, Split","institution_ids":["https://openalex.org/I92251255"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089713732","display_name":"Bojan Vujatovi\u0107","orcid":null},"institutions":[{"id":"https://openalex.org/I92251255","display_name":"University of Split","ror":"https://ror.org/00m31ft63","country_code":"HR","type":"education","lineage":["https://openalex.org/I92251255"]}],"countries":["HR"],"is_corresponding":false,"raw_author_name":"Bojan Vujatovi\u0107","raw_affiliation_strings":["FESB, University of Split, Split"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"FESB, University of Split, Split","institution_ids":["https://openalex.org/I92251255"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003556746","display_name":"Mario \u010cagalj","orcid":"https://orcid.org/0000-0003-0235-7436"},"institutions":[{"id":"https://openalex.org/I92251255","display_name":"University of Split","ror":"https://ror.org/00m31ft63","country_code":"HR","type":"education","lineage":["https://openalex.org/I92251255"]}],"countries":["HR"],"is_corresponding":false,"raw_author_name":"Mario \u010cagalj","raw_affiliation_strings":["FESB, University of Split, Split"],"raw_orcid":"https://orcid.org/0000-0003-0235-7436","affiliations":[{"raw_affiliation_string":"FESB, University of Split, Split","institution_ids":["https://openalex.org/I92251255"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5076566311"],"corresponding_institution_ids":["https://openalex.org/I92251255"],"apc_list":{"value":2300,"currency":"USD","value_usd":2300},"apc_paid":{"value":2300,"currency":"USD","value_usd":2300},"fwci":0.6545,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.71296459,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"2018","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.874007523059845},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.628708004951477},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5709028840065002},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.5517445206642151},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4577248990535736},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3684771656990051},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.06363540887832642},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.05437284708023071}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.874007523059845},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.628708004951477},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5709028840065002},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.5517445206642151},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4577248990535736},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3684771656990051},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.06363540887832642},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.05437284708023071},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2018/5153265","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/5153265","pdf_url":"http://downloads.hindawi.com/journals/wcmc/2018/5153265.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:20a3905dc72a498b84a74d6261ddc7b0","is_oa":false,"landing_page_url":"https://doaj.org/article/20a3905dc72a498b84a74d6261ddc7b0","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Wireless Communications and Mobile Computing, Vol 2018 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2018/5153265","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/5153265","pdf_url":"http://downloads.hindawi.com/journals/wcmc/2018/5153265.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2884723215.pdf","grobid_xml":"https://content.openalex.org/works/W2884723215.grobid-xml"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W1995433912","https://openalex.org/W2007920345","https://openalex.org/W2031500863","https://openalex.org/W2032642084","https://openalex.org/W2039588837","https://openalex.org/W2039749846","https://openalex.org/W2042281163","https://openalex.org/W2061480123","https://openalex.org/W2062880553","https://openalex.org/W2066961254","https://openalex.org/W2142144955","https://openalex.org/W2162056146","https://openalex.org/W2168790756","https://openalex.org/W2206219880","https://openalex.org/W2243701965","https://openalex.org/W2394784643","https://openalex.org/W2411034138","https://openalex.org/W2427398051","https://openalex.org/W2476314115","https://openalex.org/W2519872922","https://openalex.org/W2538802425","https://openalex.org/W2603071509","https://openalex.org/W2618506493","https://openalex.org/W2625800808","https://openalex.org/W2778058189","https://openalex.org/W2785059865"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2073713056","https://openalex.org/W3110702597","https://openalex.org/W2078761926","https://openalex.org/W2110441383","https://openalex.org/W2125620709","https://openalex.org/W1498872724","https://openalex.org/W4233149903","https://openalex.org/W4293864700","https://openalex.org/W2524540579"],"abstract_inverted_index":{"User\u2019s":[0],"location":[1,24],"privacy":[2],"concerns":[3],"have":[4,42],"been":[5,43],"further":[6],"raised":[7],"by":[8,45],"today\u2019s":[9],"Wi\u2010Fi":[10],"technology":[11],"omnipresence.":[12],"Preferred":[13],"Network":[14],"Lists":[15],"(PNLs)":[16],"are":[17,28,73],"a":[18,30,39,83,110,129,137,156,187],"particularly":[19],"interesting":[20],"source":[21],"of":[22,32,38,140,179,203,212],"private":[23],"information,":[25],"as":[26],"devices":[27,59],"storing":[29],"list":[31],"previously":[33],"used":[34],"hotspots.":[35],"Privacy":[36],"implications":[37],"disclosed":[40],"PNL":[41,64],"covered":[44],"numerous":[46],"papers,":[47],"mostly":[48],"focusing":[49],"on":[50,170],"passive":[51,69],"monitoring":[52],"attacks.":[53,70],"Nowadays,":[54],"however,":[55],"more":[56,58],"and":[57,214,234,240],"no":[60],"longer":[61],"transmit":[62],"their":[63],"in":[65,102],"clear,":[66],"thus":[67,116],"mitigating":[68],"Hidden":[71],"PNLs":[72,175],"still":[74],"vulnerable":[75],"against":[76,173],"active":[77,148,171,193],"attacks":[78,149,172],"whereby":[79],"an":[80,221,226],"attacker":[81,133],"mounts":[82],"fake":[84,114],"SSID":[85,101,194,228],"hotspot":[86,115],"set":[87],"to":[88,120,152,199],"one":[89],"likely":[90],"contained":[91],"within":[92,155],"targeted":[93,97],"PNL.":[94,143,166],"If":[95],"the":[96,103,113,121,132,141,201,204,207],"device":[98],"has":[99,151],"this":[100,118,183],"corresponding":[104],"PNL,":[105],"it":[106],"will":[107],"automatically":[108],"initiate":[109],"connection":[111],"with":[112],"disclosing":[117],"information":[119],"attacker.":[122],"By":[123],"iterating":[124],"through":[125,238],"different":[126],"SSIDs":[127,163],"(from":[128],"predefined":[130],"dictionary)":[131],"can":[134],"eventually":[135],"reveal":[136],"big":[138],"part":[139],"hidden":[142,174],"Considering":[144],"user":[145],"mobility,":[146],"executing":[147],"usually":[150],"be":[153],"done":[154],"short":[157],"opportunity":[158,213],"window,":[159],"while":[160],"targeting":[161,215],"nontrivial":[162,216],"from":[164],"user\u2019s":[165],"The":[167],"existing":[168],"work":[169],"often":[176],"neglects":[177],"both":[178],"these":[180],"challenges.":[181],"In":[182],"paper":[184],"we":[185,219],"propose":[186],"simple":[188],"mathematical":[189],"model":[190,237],"for":[191,224],"analyzing":[192],"dictionary":[195,229],"attacks,":[196],"allowing":[197],"us":[198],"optimize":[200],"effectiveness":[202],"attack":[205],"under":[206],"above":[208],"constraints":[209],"(limited":[210],"window":[211],"SSIDs).":[217],"Additionally,":[218],"showcase":[220],"example":[222],"method":[223],"building":[225],"effective":[227],"using":[230],"top\u2010N":[231],"recommender":[232],"algorithm":[233],"validate":[235],"our":[236],"simulations":[239],"extensive":[241],"real\u2010life":[242],"tests.":[243]},"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
