C. Matte, M. Cunche, F. Rousseau, and M. Vanhoef, Defeating MAC Address Randomization Through Timing Attacks, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec '16, pp.1520-2016
DOI : 10.1145/2766498.2766517

URL : https://hal.archives-ouvertes.fr/hal-01330476

C. Matte and M. Cunche, DEMO, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec '16, pp.209211-2016
DOI : 10.1145/2426656.2426685

URL : https://hal.archives-ouvertes.fr/hal-01330479

M. Vanhoef, C. Matte, and M. Cunche, Leonardo Cardoso, and Frank Piessens. Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms, AsiaCCS, 2016.

C. Matte, J. Prasad-achara, and M. Cunche, Device-to-identity linking attack using targeted Wi-Fi geolocation spoong, Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec), pp.20-2015
DOI : 10.1145/2766498.2766521

C. Matte, Transfert de style : et si Van Gogh peignait Tux ? GNU/Linux Magazine France, 2017.

N. Abedi, A. Bhaskar, and E. Chung, Bluetooth and Wi-Fi MAC address based crowd data collection and monitoring: benets, challenges and enhancement, Bibliography In Australasian Transport Research Forum (ATRF), vol.36, 2013.

J. Prasad-achara, G. Acs, and C. Castelluccia, On the unicity of smartphone applications, Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, p.2736, 2015.

V. Acuna, A. Kumbhar, E. Vattapparamban, I. Rajabli, and . Guvenc, Localization of wi devices using probe requests captured at unmanned aerial vehicles, Wireless Communications and Networking Conference (WCNC), 2017 IEEE, p.16, 2017.

B. Agr, K. Huguenin, U. Hengartner, and J. Hubaux, On the privacy implications of location semantics, Proceedings on Privacy Enhancing Technologies, 2015.

M. Alaggan, M. Cunche, and M. Minier, Privacy-preserving tincidence for wi-based mobility analytics, 7e Atelier sur la Protection de la Vie Privée (APVP'16), 2016.

J. Wahhab-albazrqaoe, G. Huang, and . Xing, Practical bluetooth trac sning: Systems and privacy implications, Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, p.333345

T. Allmer, A critical contribution to theoretical foundations of privacy studies, Journal of Information, Communication and Ethics in Society, vol.9, issue.2, p.83101, 2011.
DOI : 10.2307/3478805

M. Anderson, Technology device ownership, 2015.

U. General and A. , Universal declaration of human rights, 1948.

T. Aura, J. Lindqvist, M. Roe, and A. Mohammed, Chattering Laptops, International Symposium on Privacy Enhancing Technologies Symposium, p.167186, 2008.
DOI : 10.1007/978-3-540-70630-4_11

P. Bahl, N. Venkata, and . Padmanabhan, RADAR: an in-building RF-based user location and tracking system, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), p.775784, 2000.
DOI : 10.1109/INFCOM.2000.832252

M. Barbeau, E. Hall, and . Kranakis, Detection of rogue devices in bluetooth networks using radio frequency ngerprinting, proceedings of the 3rd IASTED International Conference on Communications and Computer Networks, CCN, p.46, 2006.

J. Perta and . Stefa, CRAWDAD dataset sapienza/probe-requests (v. 2013-09- 10) Retrieved, 2013.

V. Marco, A. Barbera, A. Epasto, . Mei, C. Vasile et al., Signals from the crowd: uncovering social relationships through smartphone probes, Proceedings of the 2013 conference on Internet measurement conference, p.265276, 2013.

B. Berendt, O. Günther, and S. Spiekermann, Privacy in e-commerce, Communications of the ACM, vol.48, issue.4, p.101106, 2005.
DOI : 10.1145/1053291.1053295

C. Bernardos, J. C. Zú«iga, O. Piers, and . Hanlon, Wi-Fi internet connectivity and privacy: Hiding your tracks on the wireless Internet, 2015 IEEE Conference on Standards for Communications and Networking (CSCN), 2015.
DOI : 10.1109/CSCN.2015.7390443

B. Bloessl, C. Sommer, F. Dressler, and D. Eckho, The scrambler attack: A robust physical layer attack on location privacy in vehicular networks, 2015 International Conference on Computing, Networking and Communications (ICNC), 2015.
DOI : 10.1109/ICCNC.2015.7069376

S. Bratus, C. Cornelius, D. Kotz, and D. Peebles, Active behavioral ngerprinting of wireless devices, Proceedings of the rst ACM conference on Wireless network security, p.5661, 2008.

L. Breiman, J. Friedman, J. Charles, . Stone, A. Richard et al., Classication and regression trees, 1984.

M. Brennan, S. Afroz, and R. Greenstadt, Adversarial stylometry, ACM Transactions on Information and System Security, vol.15, issue.3, p.12, 2012.
DOI : 10.1145/2382448.2382450

V. Brik, S. Banerjee, M. Gruteser, and S. Oh, Wireless device identication with radiometric signatures, MobiCom, 2008.
DOI : 10.1145/1409944.1409959

URL : http://www.cs.wisc.edu/~suman/pubs/paradis.pdf

G. Bugher, Detecting bluetooth surveillance systems, In DEFCON, 2014.

J. Cache, Fingerprinting 802.11 implementations via statistical analysis of the duration eld, Uninformed. org, vol.5, 2006.

C. Insights, The store of the future: 150+ startups transforming brick-and-mortar retail in one infographic, 2017.

C. Cerrudo, Hacking us trac control systems, In DEFCON, 2014.

Y. Cheng, Mean shift, mode seeking, and clustering, IEEE transactions on pattern analysis and machine intelligence, vol.17, issue.8, p.790799, 1995.

Y. Chon, S. Kim, S. Lee, D. Kim, Y. Kim et al., Sensing wi packets in the air: practicality and implications in urban mobility monitoring, Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, p.189200, 2014.

S. Cliord and Q. Hardy, Attention, Shoppers: Store Is Tracking Your Cellbusiness/attention-shopper- stores-are-tracking-your-cell, 2013.

C. Corbett, R. Beyah, and J. Copeland, A passive approach to wireless nic identication, Communications, 2006. ICC'06. IEEE International Conference on, p.23292334, 2006.

L. Cherita, . Corbett, A. Raheem, . Beyah, A. John et al., Passive classication of wireless nics during rate switching, EURASIP Journal on Wireless Communications and Networking, vol.2008, issue.1, p.495070, 2007.

L. Cherita, . Corbett, A. Raheem, . Beyah, A. John et al., Passive classication of wireless nics during active scanning, International Journal of Information Security, vol.7, issue.5, p.335348, 2008.

M. Cristea and B. Groza, Fingerprinting Smartphones Remotely via ICMP Timestamps, IEEE Communications Letters, vol.17, issue.6, p.10811083, 2013.
DOI : 10.1109/LCOMM.2013.040913.130419

M. Cunche, I know your MAC address: targeted tracking of individual using Wi-Fi, Journal of Computer Virology and Hacking Techniques, vol.10, issue.4, p.19, 2013.
DOI : 10.1007/s11416-013-0196-1

URL : https://hal.archives-ouvertes.fr/hal-00923467

M. A. Mathieu-cunche, R. Kaafar, and . Boreli, I know who you will meet this evening! linking wireless devices using Wi-Fi probe requests, World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, p.19, 2012.

J. C. Mathieu-cunche, M. Zuniga, C. Vanhoef, and . Matte, Privacy issues in 802.11 networks, 2016.

A. Dino, . Dai-zovi, A. Shane, and . Macaulay, Attacking automatic wireless network selection, Information Assurance Workshop, 2005. IAW'05. Proceedings from the Sixth Annual IEEE SMC, p.365372, 2005.

B. Danev, D. Zanetti, and S. Capkun, On physical-layer identication of wireless devices, ACM Computing Surveys (CSUR), vol.45, issue.1, p.6, 2012.

D. Dardari, P. Closas, M. Petar, and . Djuri¢, Indoor Tracking: Theory, Methods, and Technologies, IEEE Transactions on Vehicular Technology, vol.64, issue.4, p.12631278, 2015.
DOI : 10.1109/TVT.2015.2403868

A. Das, N. Borisov, and M. Caesar, Do You Hear What I Hear?, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, p.441452, 2014.
DOI : 10.1007/978-3-642-21599-5_7

. Datatilsynet, Tracking in public spaces, 2016.

Y. De-montjoye, A. César, M. Hidalgo, . Verleysen, D. Vincent et al., Unique in the crowd: The privacy bounds of human mobility Scientic reports, p.1376, 2013.

L. Demir, M. Cunche, and C. Lauradoux, Analysing the privacy policies of Wi-Fi trackers, Proceedings of the 2014 workshop on physical analytics, WPA '14, 2014.
DOI : 10.1145/2611264.2611266

URL : https://hal.archives-ouvertes.fr/hal-00968585

S. Depatla, A. Muralidharan, and Y. Mosto, Occupancy estimation using only wi power measurements, IEEE Journal on Selected Areas in Communications, vol.33, issue.7, p.13811393, 2015.
DOI : 10.1109/jsac.2015.2430272

C. Loh-chin, C. Desmond, T. C. Chia-yuan, R. Pheng, and . Lee, Identifying unique devices through wireless ngerprinting, Proceedings of the rst ACM conference on Wireless network security, p.4655, 2008.

A. Di-luzio, A. Mei, and J. Stefa, Mind your probes: De-anonymization of large crowds through smartphone WiFi probe requests, IEEE INFOCOM 2016, The 35th Annual IEEE International Conference on Computer Communications, p.19, 2016.
DOI : 10.1109/INFOCOM.2016.7524459

P. Eckersley, How unique is your web browser? In Privacy Enhancing Technologies, 2010.

P. Jonathan, N. Ellch, . Post-graduate, . School, and . Ca, Fingerprinting 802.11 devices, 2006.

K. Emara, W. Woerndl, and J. Schlichter, CAPS, Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec '15, p.21, 2015.
DOI : 10.1145/2030613.2030630

T. Engel, SS7: Locate. track. manipulate, Chaos Communication Congress, 2014.

M. Ester, H. Kriegel, J. Sander, and X. Xu, A density-based algorithm for discovering clusters in large spatial databases with noise, Kdd, p.226231, 1996.

B. Daniel, . Faria, R. David, and . Cheriton, Detecting identity-based attacks in wireless networks using signalprints, Proceedings of the 5th ACM workshop on Wireless security, p.4352, 2006.

Z. Fasel and E. Jacobs, I ght for the users, episode i -attacks against top consumer products, 2016.

K. Fawaz, K. Kim, G. Kang, and . Shin, Abstract, Proceedings on Privacy Enhancing Technologies, p.102122, 2016.
DOI : 10.1145/2382196.2382263

D. Förster, F. Kargl, and H. Löhr, A framework for evaluating pseudonym strategies in vehicular ad-hoc networks, Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec '15, p.19, 2015.
DOI : 10.1016/j.comnet.2011.05.004

M. Foucault, Surveiller et punir. Naissance de la prison, Editions Gallimard, 2014.

I. Atec and . France, Evaluations simultanées de diérentes technologies innovantes de recueil de données trac pour le calcul de temps de parcours en temps réel, 2015.

J. Franklin, D. Mccoy, P. Tabriz, V. Neagoe, J. V. Randwyk et al., Passive data link layer 802.11 wireless device driver ngerprinting, USENIX Security, 2006.

J. Freudiger, How talkative is your mobile device? An experimental study of Wi-Fi probe requests, WiSec, 2015.

P. Hubaux, Mix-zones for location privacy in vehicular networks, ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiN- ITS), 2007.

C. Fuchs, Towards an alternative concept of privacy, Journal of Information, Communication and Ethics in Society, vol.9, issue.4, p.220237, 2011.
DOI : 10.2307/1321160

Y. Fukuzaki, M. Mochizuki, K. Murao, and N. Nishio, A pedestrian ow analysis system using Wi-Fi packet sensors to a real environment

B. Fung, Wi-Fi tracking in retail stores. http://www.washingtonpost.com/ blogs/the-switchhow-stores-use-your-phones-wifi-to- track-your-shopping-habits, 2013.

S. Gallagher, Hands-on: Blue hydra can expose the all-too-unhidden world of bluetooth. https://arstechnica.com/information-technology/2016/ 09/hands-on-blue-hydra-can-expose-the-all-too-unhidden-world-of- bluetooth, p.2017, 2016.

K. Gao, C. Corbett, and R. Beyah, A passive approach to wireless device ngerprinting, Dependable Systems and Networks (DSN) 2010 IEEE/IFIP International Conference on, p.383392, 2010.

B. Gellman and A. Soltani, NSA tracking cellphone locations worldwide, Snowden documents show

D. Gentry and A. Pennarun, Passive taxonomy of wi clients using mlme frame contents. arXiv preprint, 2016.

R. Genuer, J. Poggi, and C. Tuleau-malot, Variable selection using random forests, Pattern Recognition Letters, vol.31, issue.14, p.3122252236, 2010.
DOI : 10.1016/j.patrec.2010.03.014

URL : https://hal.archives-ouvertes.fr/hal-00755489

M. Geuss, Creepy but legal phone-tracking company gets wrist slap for empty privacy promise. https://arstechnica.com/tech-policy/2015/04/creepy- but-legal-phone-tracking-company-gets-wrist-slap-for-empty-privacypromise, 2015.

F. Gont, A method for generating semantically opaque interface identiers with ipv6 stateless address autoconguration (slaac), RFC, vol.7217, p.2014

K. Gopinath, P. Bhagwat, and K. Gopinath, An empirical analysis of heterogeneity in IEEE 802.11 MAC protocol implementations and its implications, Proceedings of the 1st international workshop on Wireless network testbeds, experimental evaluation & characterization , WiNTECH '06, p.8087, 2006.
DOI : 10.1145/1160987.1161002

B. Greenstein, R. Gummadi, J. Pang, Y. Mike, T. Chen et al., Can ferris bueller still have his day o ? protecting privacy in the wireless era, HotOS, 2007.

B. Greenstein, D. Mccoy, J. Pang, T. Kohno, S. Seshan et al., Improving wireless privacy with an identier-free link layer protocol, Proceedings of the 6th international conference on Mobile systems, applications, and services, p.4053, 2008.
DOI : 10.1145/1378600.1378607

G. Grolleau, La captation bluetooth au service des aménagements urbains, 2015.

E. Grumbach, iwlwi: mvm: support random MAC address for scanning, Linux commit effd05ac479b, 2014.

M. Gruteser and D. Grunwald, Enhancing location privacy in wireless LAN through disposable interface identiers: A quantitative analysis, Mobile Networks and Applications, p.315325, 2005.

F. Guo and T. Chiueh, Sequence Number-Based MAC Address Spoof Detection, Recent Advances in Intrusion Detection, p.309329, 2006.
DOI : 10.1007/11663812_16

J. Hall, M. Barbeau, and E. Kranakis, Enhancing intrusion detection in wireless networks using radio frequency ngerprinting, Communications, Internet, and Information Technology, p.201206, 2004.

D. Halperin, W. Hu, A. Sheth, and D. Wetherall, Tool release, ACM SIGCOMM Computer Communication Review, vol.41, issue.1, p.5353, 2011.
DOI : 10.1145/1925861.1925870

Q. Hardy, Technology turns to tracking people oine. https

P. Higgins and L. Tien, Mobile tracking code of conduct falls short of protecting consumers. https://www.eff.org/deeplinks/2013/10/mobile-tracking- code-conduct-falls-short-protecting-consumers, 2013.

A. Hilts, C. Parsons, and J. Knockel, Every step you fakea comparative analysis of tness tracker privacy and security, Open Eect Report, 2016.

K. Tin and . Ho, Random decision forests, Document Analysis and Recognition Proceedings of the Third International Conference on, pp.278-282, 1995.

G. Hogben, Changes to device identiers in android o. https

B. Hoh and M. Gruteser, Protecting location privacy through path confusion, Security and Privacy for Emerging Areas in Communications Networks, 2005. SecureComm 2005. First International Conference on, p.194205, 2005.

R. Holeman, The bluetooth device database, DEFCON, 2013.

B. Huang and E. Snowden, Against the law: Countering lawful abuses of digital surveillance, 2016.

J. Huang, W. Albazrqaoe, and G. Xing, BlueID: A practical system for Bluetooth device identification, IEEE INFOCOM 2014, IEEE Conference on Computer Communications, p.28492857, 2014.
DOI : 10.1109/INFOCOM.2014.6848235

L. Huang, K. Matsuura, H. Yamane, and K. Sezaki, Enhancing wireless location privacy using silent period, Wireless Communications and Networking Conference, p.11871192, 2005.

C. Huitema, Experience with MAC address randomization in Windows 10, 93th Internet Engineering Task Force Meeting (IETF), 2015.

. Insee, Tableaux de l'économie française, 2017.

T. Issoufaly and P. U. Tournoux, BLEB: Bluetooth Low Energy Botnet for large scale individual tracking, 2017 1st International Conference on Next Generation Computing Applications (NextComp), p.115120, 2017.
DOI : 10.1109/NEXTCOMP.2017.8016185

R. Van-jacobson, D. Braden, and . Borman, Tcp extensions for high performance, RFC, vol.1323, 1992.
DOI : 10.17487/rfc1323

S. Jain, M. Javed, and V. Paxson, Towards mining latent client identiers from network trac, Proceedings on Privacy Enhancing Technologies, pp.100-114, 2016.
DOI : 10.1515/popets-2016-0007

URL : https://doi.org/10.1515/popets-2016-0007

S. Jamil, S. Khan, A. Basalamah, and A. Lbath, Classifying smartphone screen on/o state based on wi probe patterns, Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, p.301304, 2016.

S. Jana and S. Kumar-kasera, On fast and accurate detection of unauthorized wireless access points using clock skews, MobiCom, 2008.

T. Jiang, H. J. Wang, and Y. Hu, Preserving location privacy in wireless lans, Proceedings of the 5th international conference on Mobile systems, applications and services , MobiSys '07, p.246257, 2007.
DOI : 10.1145/1247660.1247689

R. Victor and J. , Most secret war. Penguin UK, 2009.

M. Kamp, C. Kopp, M. Mock, M. Boley, and M. , Privacy-Preserving Mobility Monitoring Using Sketches of Stationary Sensor Readings
DOI : 10.1007/978-3-642-40994-3_24

D. Kaplan, M. David, and . Stanhope, Waveform collection for use in wireless telephone identication, US Patent, vol.5, p.999806, 1999.

L. George and K. , Voiceprint identication, Nature, vol.196, issue.4861, p.12531257, 1962.

Y. Kim, Y. Tian, T. Le, P. Nguyen, and . Tague, LAPWiN: Location-aided probing for protecting user privacy in Wi-Fi networks, 2014 IEEE Conference on Communications and Network Security, p.427435, 2014.
DOI : 10.1109/CNS.2014.6997512

T. Kohno, A. Broido, C. Kimberly, and . Clay, Remote physical device ngerprinting. Dependable and Secure Computing, IEEE Transactions on, vol.2, issue.2, pp.93-108, 2005.
DOI : 10.1109/sp.2005.18

URL : http://www.cs.washington.edu/homes/yoshi/papers/PDF/KoBrCl05PDF-lowres.pdf

V. Pavlovich and C. , Random allocations, 1978.

E. Constantine, N. Kontokosta, and . Johnson, Urban phenology: Toward a real-time census of the city using Wi-Fi data, Computers, Environment and Urban Systems, vol.64, p.144153, 2017.

K. Henning-siitonen, Securing near eld communication, 2009.

B. Sotiris, . Kotsiantis, P. Zaharakis, and . Pintelas, Supervised machine learning: A review of classication techniques, 2007.

B. Kowitz and L. Cranor, Peripheral privacy notications for wireless networks, Proceedings of the 2005 ACM workshop on Privacy in the electronic society, p.9096, 2005.

. Krowdthink, They know where you are -an investigation into the contracts, policies and practices of mobile and Wi-Fi service providers in relation to location tracking, 2016.

A. Kumar, Security and Privacy of Hash-Based Software Applications, 2016.
URL : https://hal.archives-ouvertes.fr/tel-01385488

V. Labatut and H. Cheri, Evaluation of performance measures for classiers comparison. arXiv preprint, 2011.

M. Langheinrich, Privacy by designprinciples of privacy-aware ubiquitous systems, International conference on Ubiquitous Computing, p.273291

P. Leach, M. Mealling, and R. Salz, A universally unique identier (UUID) URN namespace, RFC, vol.4122, 2005.
DOI : 10.17487/rfc4122

Y. Li and T. Zhu, Gait-Based Wi-Fi Signatures for Privacy-Preserving, Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, ASIA CCS '16, p.571582, 2016.
DOI : 10.1145/2742647.2742648

URL : http://dl.acm.org/ft_gateway.cfm?id=2897909&type=pdf

J. Liao and J. Li, Eectively changing pseudonyms for privacy protection in vanets, Pervasive Systems, Algorithms, and Networks (ISPAN) 10th International Symposium on, p.648652, 2009.

R. Lim, M. Zimmerling, and L. Thiele, Passive, privacy-preserving real-time counting of unmodied smartphones via zigbee interference, Distributed Computing in Sensor Systems (DCOSS), 2015 International Conference on, p.115126, 2015.

J. Lindqvist, T. Aura, G. Danezis, T. Koponen, A. Myllyniemi et al., Privacy-preserving 802.11 access-point discovery, Proceedings of the second ACM conference on Wireless network security, WiSec '09, 2009.
DOI : 10.1145/1514274.1514293

L. Lu, R. Wang, J. Ding, W. Mao, W. Chen et al., FastID: An undeceived router for real-time identification of WiFi terminals, 2015 IFIP Networking Conference (IFIP Networking), p.19, 2015.
DOI : 10.1109/IFIPNetworking.2015.7145328

A. Luber, M. Junghans, S. Bauer, and J. Schulz, On measuring trac with Wi-Fi and Bluetooth, 18th ITS World Congress, 2011.

J. Macqueen, Some methods for classication and analysis of multivariate observations, Proceedings of the fth Berkeley symposium on mathematical statistics and probability, p.281297, 1967.

J. Martin, T. Mayberry, C. Donahue, L. Foppe, L. Brown et al., A study of MAC address randomization in mobile devices and when it fails. arXiv preprint, 2017.

J. Martin, D. Rhame, R. Beverly, and J. Mceachen, Correlating gsm and 802.11 hardware identiers, Military Communications Conference, p.13981403, 2013.
DOI : 10.1109/milcom.2013.237

J. Martin, E. Rye, and R. Beverly, Decomposition of MAC address structure for granular device inference, Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC '16, p.7888, 2016.
DOI : 10.1016/j.clsr.2009.11.008

J. Martinez, Franken still unsatised with Euclid's privacy prac- tices. http://thehill.com/policy/technology/291299-franken-still- unsatisfied-with-euclids-privacy-practices, 2013.

C. Matte, Fingerprinting de smartphones : votre téléphone est-il traçable ? MISC -Multi-Systems & Internet Security Cookbook, 2015.

C. Matte, Transfert de style : et si Van Gogh peignait Tux ? GNU/Linux Magazine France, 2017.

C. Matte, J. Prasad-achara, and M. Cunche, Device-to-identity linking attack using targeted Wi-Fi geolocation spoong, Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec), p.20, 2015.
DOI : 10.1145/2766498.2766521

C. Matte and M. Cunche, Beam me up, Scotty: identifying the individual behind a MAC address using Wi-Fi geolocation spoong, 1er Colloque sur la Conance Numérique en Auvergne, 2014.

C. Matte and M. Cunche, Beam me up, Scotty: identifying the individual behind a MAC address using Wi-Fi geolocation spoong, Atelier sur la Protection de la Vie Privée, 2014.

C. Matte and M. Cunche, DEMO, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec '16, p.209211, 2016.
DOI : 10.1145/2426656.2426685

URL : https://hal.archives-ouvertes.fr/hal-01330479

C. Matte and M. Cunche, Traçage Wi-Fi : applications et contremesures . GNU/Linux Magazine France, HS, vol.84, 2016.

C. Matte and M. Cunche, Wombat: An experimental Wi-Fi tracking system, Atelier sur la Protection de la Vie Privée, 2017.

C. Matte, M. Cunche, F. Rousseau, and M. Vanhoef, Defeating MAC Address Randomization Through Timing Attacks, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec '16, p.1520, 2016.
DOI : 10.1145/2766498.2766517

URL : https://hal.archives-ouvertes.fr/hal-01330476

C. Matte, M. Cunche, and V. Toubiana, Does disabling Wi-Fi prevent my Android phone from sending Wi-Fi frames? Research Report RR-9089, Inria -Research Centre Grenoble Rhône-Alpes, 2017.

C. Matte, M. Minier, M. Cunche, and F. Rousseau, Poster: Privacy-preserving Wi-Fi tracking systems, CITI Lab. PhD Day, 2015.

J. Mayer, A. Narayanan, and S. Stamm, Do Not Track: A Universal Third-Party Web Tracking Opt Out. Internet-Draft draft-mayer-do-not-track-00, 2011.

W. Melicher, M. Sharif, J. Tan, L. Bauer, M. Christodorescu et al., Abstract, Proceedings on Privacy Enhancing Technologies, p.2016135154, 2016.
DOI : 10.1509/jmr.11.0503

M. Mirza, P. Barford, X. Zhu, S. Banerjee, and M. Blodgett, Fingerprinting 802.11 rate adaption algorithms, 2011 Proceedings IEEE INFOCOM, p.11611169, 2011.
DOI : 10.1109/INFCOM.2011.5934893

J. Steven and . Murdoch, Hot or not: Revealing hidden services by their clock skew, Proceedings of the 13th ACM conference on Computer and communications security, p.2736, 2006.

A. Musa and J. Eriksson, Tracking unmodied smartphones using Wi-Fi monitors, Proceedings of the 10th ACM conference on embedded network sensor systems, p.281294, 2012.
DOI : 10.1145/2426656.2426685

URL : http://www.cs.uic.edu/~jakob/papers/musa-sensys12.pdf

C. Neumann, O. Heen, and S. Onno, An empirical study of passive 802.11 device ngerprinting, Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on, p.593602, 2012.

L. Newman, An open-source toolkit to help patch cell networks' critical aw. https://www.wired.com/story/ss7-flaw-open-source-toolkit, 2017.

L. Nguyen, Y. S. Kim, P. Tague, and J. Zhang, IdentityLink, Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '14 Adjunct, 2014.
DOI : 10.1145/2632048.2636072

O. James and . Malley, Here's what t learned from tracking your phone on the tube. http://www.gizmodo.co.uk/2017/02/heres-what-tfl-learned-from- tracking-your-phone-on-the-tube, p.2017, 2017.

A. Jonathan, A. Obar, and . Oeldorf-hirsch, The biggest lie on the internet: Ignoring the privacy policies and terms of service policies of social networking services

O. Brendan and . Connor, CreepyDOL: Cheap, distributed stalking, BlackHat, 2013.

O. Piers, R. Hanlon, L. Borgaonkar, and . Hirschi, Mobile subscriber wi privacy. arXiv preprint, 2017.

J. Pang, B. Greenstein, S. Seshan, and D. Wetherall, Tryst: The case for condential service discovery, HotNets, 2007.

R. Pang, M. Allman, V. Paxson, and J. Lee, The devil and packet trace anonymization, ACM SIGCOMM Computer Communication Review, vol.36, issue.1, p.2938, 2006.
DOI : 10.1145/1111322.1111330

C. Patel, D. Shah, and A. Patel, Automatic Number Plate Recognition System (ANPR): A Survey, International Journal of Computer Applications, vol.69, issue.9, p.2013
DOI : 10.5120/11871-7665

URL : http://research.ijcaonline.org/volume69/number9/pxc3887665.pdf

N. Patwari, K. Sneha, and . Kasera, Robust location distinction using temporal link signatures, Proceedings of the 13th annual ACM international conference on Mobile computing and networking , MobiCom '07, p.111122, 2007.
DOI : 10.1145/1287853.1287867

URL : http://www.cs.utah.edu/~kasera/myPapers/mobicom07.pdf

R. Pew and . Center, Mobile fact sheet, 2017.

C. Adam, S. Polak, . Dolatshahi, L. Dennis, and . Goeckel, Identifying wireless users via transmitter imperfections, IEEE Journal on Selected Areas in Communications, vol.29, issue.7, p.14691479, 2011.

J. Postel, Rfc 792: Internet control message protocol, RFC, vol.792, 1981.

. Punkingmonkey, The road less surreptitiously traveled, DEFCON, 2013.

L. Rainie and K. Zickhur, Americans' views on mobile etiquette, 2015.

A. E. , C. Redondi, D. Sanvito, and M. Cesana, Passive classication of Wi-Fi enabled devices, Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, p.5158, 2016.

R. Reitman, China deputizes smart phones to spy on beijing residents' real-time location, 2011.

P. Robyns, B. Bonné, P. Quax, and W. Lamotte, POSTER, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec '16, p.217218
DOI : 10.1145/1129582.1129588

P. Robyns, B. Bonné, P. Quax, and W. Lamotte, Noncooperative 802.11 MAC layer ngerprinting and tracking of mobile devices, 2017.

M. Rodrig, C. Reis, R. Mahajan, D. Wetherall, J. Zahorjan et al., CRAWDAD dataset uw/sigcomm2004 (v. 2006-10-17) Downloaded from http, 2006.

P. Sapiezynski, R. Gatej, A. Mislove, and S. Lehmann, Opportunities and Challenges in Crowdsourced Wardriving, Proceedings of the 2015 ACM Conference on Internet Measurement Conference, IMC '15, p.267273, 2015.
DOI : 10.1145/2030613.2030626

URL : http://orbit.dtu.dk/en/publications/opportunities-and-challenges-in-crowdsourced-wardriving(294ed7f6-764e-4525-94e0-65054eb52488).html

J. Scahill and G. Greenwald, The NSA's secret role in the U.S. assassination program. The Intercept, 2014.

L. Schauer, M. Werner, and P. Marcus, Estimating crowd densities and pedestrian ows using Wi-Fi and bluetooth, Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp.171177-2014
DOI : 10.4108/icst.mobiquitous.2014.257870

B. Schneier, Csec surveillance analysis of ip and user data, 2014.

H. Seiwert, isni gps: Passive sning tool for capturing and visualising wi location data disclosed by ios devices. https://github.com/hubert3/iSniff-GPS, 2012.

S. Sevignani, The problem of privacy in capitalism and the alternative social networking site diaspora. tripleC: Communication, Capitalism & Critique, Open Access Journal for a Global Sustainable Information Society, vol.10, issue.2, p.600617, 2012.

K. Sharad and G. Danezis, An Automated Social Graph De-anonymization Technique, Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES '14, p.4758, 2014.
DOI : 10.1145/2068816.2068825

E. Shari, M. Hamedi, A. Haghani, and H. Sadrsadat, Analysis of vehicle detection rate for bluetooth trac sensors: A case study in maryland and delaware, 18th World Congress on on Intelligent Transport Systems, 2011.

Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, Detecting 802.11 MAC layer spoong using received signal strength, INFOCOM 2008. The 27th Conference on Computer Communications. IEEE. IEEE, 2008.

S. Siby, R. Ranjan-maiti, and N. Tippenhauer, IoTScanner, Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, IoTPTS '17, 2017.
DOI : 10.1145/1023646.1023660

K. Skinner and J. Novak, Privacy and your app, Apple Worldwide Dev. Conf. (WWDC), 2015.

A. Soltani, Technological overview. https://www.ftc.gov/system/files/ documents/public _ events/182251/mobiledevicetrackingseminar-slides.pdf, 2014.

A. Soltani, Privacy trade-os in retail tracking. https://www.ftc.gov/news- events/blogs/techftc/2015/04/privacy-trade-offs-retail-tracking, 2015.

C. Spensky, J. Stewart, A. Yerukhimovich, R. Shay, A. Trachtenberg et al., Abstract, Proceedings on Privacy Enhancing Technologies, p.201696116, 2016.
DOI : 10.1515/popets-2016-0018

. Statista, Share of adults in the united states who owned a smartphone from 2011 to 2013, by household income. https://www.statista.com/statistics/195006/ percentage-of-us-smartphone-owners-by-household-income, 2013.

J. Toonstra and W. Kinsner, A radio transmitter ngerprinting system odo-1, Electrical and Computer Engineering, p.6063, 1996.
DOI : 10.1109/ccece.1996.548038

J. Turow, J. King, C. J. Hoofnagle, A. Bleakley, and M. Hennessy, Americans Reject Tailored Advertising and Three Activities that Enable It, SSRN Electronic Journal, 2009.
DOI : 10.2139/ssrn.1478214

O. Ureten and N. Serinken, Wireless security through rf ngerprinting, Canadian Journal of Electrical and Computer Engineering, vol.32, issue.1, p.2733, 2007.
DOI : 10.1109/cjece.2007.364330

N. Van-dijk, Property, privacy and personhood in a world of ambient intelligence, Ethics and Information Technology, vol.743, issue.957, p.5769, 2010.
DOI : 10.1145/1107548.1107550

M. Vanhoef, C. Matte, and M. Cunche, Leonardo Cardoso, and Frank Piessens. Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms, AsiaCCS, 2016.

M. Vanhoef, C. Matte, M. Cunche, L. Cardoso, and F. Piessens, Why MAC Address Randomization is not Enough, Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, ASIA CCS '16, 2016.
DOI : 10.1109/ISSPIT.2006.270915

URL : https://hal.archives-ouvertes.fr/hal-01282900

M. Vanhoef, C. Matte, and M. Cunche, Leonardo Cardoso, and Frank Piessens. Why MAC address randomization is not enough: An analysis of Wi-Fi network discovery mechanisms, CITI Lab. PhD Day, 2016.

T. Dang-vo-huu, T. Dang-vo-huu, and G. Noubir, Fingerprinting Wi-Fi devices using software dened radios, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, p.314, 2016.

O. Waltari and J. Kangasharju, The Wireless Shark, Proceedings of the First Workshop on Mobile Data, MobiData '16, p.16, 2016.
DOI : 10.1145/1866307.1866318

B. Wang, S. Omatu, and T. Abe, Identication of the defective transmission devices using the wavelet transform, IEEE transactions on pattern analysis and machine intelligence, vol.27, issue.6, p.919928, 2005.

W. Wang, Wireless networking in Windows 10, Windows Hardware Engineering Community conference (WinHEC), 2015.

D. Samuel, . Warren, D. Louis, and . Brandeis, Privacy Rights, Harvard law review, p.193220, 1890.
DOI : 10.4135/9781412952446.n484

M. Weigand, M. Renderman, and . Kershaw, Build your own UAV 2.0 wireless mayhem from the heavens, DEFCON, 2010.

J. Weppner, B. Bischke, and P. Lukowicz, Monitoring crowd condition in public spaces by tracking mobile consumer devices with wi interface, Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, p.13631371, 2016.

J. Weppner, P. Lukowicz, U. Blanke, and G. Tröster, Participatory Bluetooth Scans Serving as Urban Crowd Probes, IEEE Sensors Journal, vol.14, issue.12, pp.4196-4206, 2014.
DOI : 10.1109/JSEN.2014.2360123

F. Alan and . Westin, Privacy and freedom, Washington and Lee Law Review, vol.25, issue.1, p.166, 1968.

. Wi-fi-alliance, Wi-Fi Simple Conguration Protocol and Usability Best Practices for the Wi-Fi Protected Setup Program, 2011.

B. Wiedersheim, Z. Ma, F. Kargl, and P. Papadimitratos, Privacy in inter-vehicular networks: Why simple pseudonym change is not enough, 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS)
DOI : 10.1109/WONS.2010.5437115

G. Wilkinson, Digital terrestrial tracking: The future of surveillance, p.22, 2014.

M. Woolley, Bluetooth technology protecting your privacy. https

J. David, A. Wu, A. Taly, D. Shankar, and . Boneh, Privacy, discovery, and authentication for the internet of things, European Symposium on Research in Computer Security, p.301319, 2016.

. Freesense, Indoor human identication with Wi-Fi signals, Global Communications Conference (GLOBECOM), 2016 IEEE, p.17, 2016.

Q. Xu, R. Zheng, W. Saad, and Z. Han, Device ngerprinting in wireless networks: Challenges and opportunities, IEEE Communications Surveys & Tutorials, vol.18, issue.1, p.94104, 2016.

S. Young, Bluetooth trac detectors for use as permanently installed travel time instruments. State Highway Administration Research Report, 2013.

Z. Bin-zan, M. Sun, X. Gruteser, and . Ban, Linking anonymous location traces through driving characteristics, Proceedings of the third ACM conference on Data and application security and privacy, p.293300, 2013.

Y. Zeng, H. Parth, P. Pathak, and . Mohapatra, Analyzing shopper's behavior through wi signals, Proceedings of the 2nd workshop on Workshop on Physical Analytics, p.1318, 2015.