Research Article

Noncooperative 802.11 MAC Layer Fingerprinting and Tracking of Mobile Devices

Table 4

An overview of the advantages of each technique discussed in Section 4.

Beacon spoofingRTS/Null DataGAS RequestADDBA Request

Response contains current MAC
Response contains implicit identifiers
Immediate reply from device
Can be broadcast
Requires no knowledge about device
Commonly supported

an implementation dependent delay (see [17]) and only if at least one SSID in the device’s PNL is guessed.
dependent.