Research Article

Noncooperative 802.11 MAC Layer Fingerprinting and Tracking of Mobile Devices

Figure 6

An example topology where data transmitted from the tracked station, such as its MAC address and SSIDs, are captured and propagated to other MSs. This information can subsequently be used to spoof PIWNs and to transmit directed Null Data frames, instigating more transmissions from the tracked station.