Skip to main navigation Skip to search Skip to main content

Practical hash-based anonymity for MAC addresses

  • Junade Ali
  • , Vladimir Dyo
  • Cloudflare, Inc.

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

8 Citations (Scopus)
2 Downloads (Pure)

Abstract

Given that a MAC address can uniquely identify a person or a vehicle, continuous tracking over a large geographical scale has raised serious privacy concerns amongst governments and the general public. Prior work has demonstrated that simple hash-based approaches to anonymization can be easily inverted due to the small search space of MAC addresses. In particular, it is possible to represent the entire allocated MAC address space in 39 bits and that frequency-based attacks allow for 50% of MAC addresses to be enumerated in 31 bits. We present a practical approach to MAC address anonymization using both computationally expensive hash functions and truncating the resulting hashes to allow for k-anonymity. We provide an expression for computing the percentage of expected collisions, demonstrating that for digests of 24 bits it is possible to store up to 168,617 MAC addresses with the rate of collisions less than 1%. We experimentally demonstrate that a rate of collision of 1% or less can be achieved by storing data sets of 100 MAC addresses in 13 bits, 1,000 MAC addresses in 17 bits and 10, 000 MAC addresses in 20 bits.
Original languageEnglish
Title of host publicationnan
PublisherSciTePress
ISBN (Print)9789897584466
DOIs
Publication statusPublished - 18 Jun 2020
EventThe 17th International Conference on Security and Cryptography (SECRYPT 2020) - Lieusant, Paris
Duration: 8 Jul 202010 Jul 2020
http://www.secrypt.icete.org/Home.aspx

Conference

ConferenceThe 17th International Conference on Security and Cryptography (SECRYPT 2020)
CityLieusant, Paris
Period8/07/2010/07/20
OtherThe 17th International Conference on Security and Cryptography (SECRYPT 2020) (08/07/2020-10/07/2020, Lieusant, Paris)
Internet address

Keywords

  • Applied Sciences
  • privacy
  • tracking

Fingerprint

Dive into the research topics of 'Practical hash-based anonymity for MAC addresses'. Together they form a unique fingerprint.

Cite this