Thursday, April 25, 2024
HomePythonAnalysis Writeup: Deanonymization and Proximity Detection Utilizing Wi-Fi

Analysis Writeup: Deanonymization and Proximity Detection Utilizing Wi-Fi


Hello everybody! When you’ve got been following my weblog for some time you’ll know that I did analysis at Colgate College over the summers. My analysis was on Wi-Fi and the way I can do some attention-grabbing stuff utilizing it. The college simply printed its annual catalogue of all of the analysis tasks which occurred over the summer season. My analysis was completed underneath the mentorship of Aaron Gember-Jacobson. I couldn’t have requested for a greater advisor. Right here is the writeup of my challenge:

In keeping with RAINN (Rape, Abuse & Incest Nationwide Community), 23.1% of feminine and 5.4% of male undergraduate college students expertise rape or sexual assault, with solely a minute proportion reporting their assault to legislation enforcement1. In sure instances, survivors can neglect who the perpetrator was attributable to trauma and/or intoxication. I wish to use expertise to counter this downside. My hope is to scale back the variety of potential culprits when such an incident happens to make it simpler for the survivor to determine the perpetrator.

This may be made potential through the use of a tool that most individuals carry always – a smartphone. The thought is to save lots of the machine identifier and the space between your cellphone and that of every one that comes close to you in a searchable database. This permits you, the person, to seek for which machine was close to you at a selected time. The analysis is additional divided into two elements. The primary concerned discovering a technique to successfully calculate the relative distance between two smartphones and the second concerned info storage and querying. I centered primarily on the primary half, which turned out to be tougher and concerned than I anticipated.

The cornerstone of this concept is Wi-Fi and the knowledge your smartphone emits when the Wi-Fi is turned on, although not essentially related to an entry level. The formal necessities of this technique are as follows: it must be passive so that you don’t should actively monitor it; it shouldn’t require different individuals’s smartphones to run any particular utility; the error in distance estimation must be lower than 1 meter so the algorithm can precisely determine a human interplay; the system must work in NLOS (Non-line-of-sight) eventualities since individuals typically have their smartphones of their pockets; lastly, it shouldn’t require greater than three gadgets, together with your smartphone, a close-by smartphone, and a Wi-Fi Entry Level to which each telephones are related, as a result of the system must be transportable.

Earlier analysis in relative distance estimation presents various ranges of precision. One technique includes utilizing RSSI (Obtained Sign Power Indication) readings from a number of entry factors (4+ for accuracy) and triangulating smartphone place based mostly on that. We can’t use this technique as a result of 4+ gadgets are required. One other technique includes utilizing Time-of-Flight (ToF) measurements. There are a number of variations of this technique, however the fundamental thought is to ship knowledge out of your machine to the machine being localized, and recording the time taken for the info to journey from one machine to a different and for an acknowledgment to be obtained. Primarily based on this timing measurement and the required time delay (generally known as SIFS, or Brief Interframe Area) between a tool receiving knowledge and sending an acknowledgement, we will estimate the space between two gadgets. This provides the most effective accuracy however isn’t straight relevant to this case, as a result of it requires a direct connection between the 2 smartphones.

Image

I sought to develop a modified model of the ToF technique, as a result of it presents the most effective precision and requires the least variety of gadgets to work successfully. The tactic I developed was to ship unsolicited management packets (a particular sort of information body) to the goal cellular machine and drive it to ship an acknowledgement (see determine). The most important analysis query is: how can we drive the goal machine to ship an acknowledgement even when we’re not straight related to it?

I arrange a testbed with three desktops geared up with Wi-Fi playing cards and working Ubuntu Linux. I used Scapy (a Python program for producing community packets) to generate and ship management packets from one desktop to a different and tcpdump on the third desktop to observe and analyze the wi-fi communication happening. I used to be in a position to ship the management packets and solicit an acknowledgment from the goal cellular (Ubuntu desktop) with out being straight related to it.

Nevertheless, there was a bug within the networking drivers of Ubuntu that generated acknowledgments even in instances the place no acknowledgment was alleged to be despatched by the goal machine. At the moment, I’m investigating the bug and attempting to determine essentially the most appropriate approach ahead. By this analysis, I discovered that the method of distance estimation is extra ****sophisticated than it appears. There are a number of variables and timing points that have to be taken into consideration. Sooner or later, I plan on discovering a workaround for this bug, with the eventual aim of constructing this technique usable in on a regular basis life.

When you’ve got any questions on my analysis or something generally please write them within the feedback beneath. Wanting ahead to listening to your views! Have an awesome day/night time! 🙂

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments