The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - March (2012 vol.11)
pp: 377-389
Xinwen Fu , University of Massachusetts Lowell, Lowell
Nan Zhang , The George Washington University, Washington DC
Aniket Pingley , The George Washington University, Washington DC
Wei Yu , Towson University, Towson
Jie Wang , University of Massachusetts Lowell, Lowell
Wei Zhao , University of Macau, Macau
ABSTRACT
"The Marauder's Map,” a magical map in J.K. Rowling's fantasy series Harry Potter and the Prisoner of Azkaban [CHECK END OF SENTENCE], can be used as a surveillance tool to show all moving objects within the boundary of "Hogwarts School of Witchcraft and Wizardry” at a spell. In this paper, we introduce a similar forensic surveillance tool for wireless networks. Our system, the digital Marauder's map, can reveal the locations of WiFi-enabled mobile devices within the coverage area of a high-gain antenna. The digital Marauder's map is built solely with off-the-shelf wireless equipments, and features a mobile design that can be quickly deployed to a new location for instant usage without training. We present a comprehensive set of theoretical analysis and experimental results which demonstrate the coverage and localization accuracy of the digital Marauder's map.
INDEX TERMS
Wireless communication, mobile communication systems, abuse and crime involving computers.
CITATION
Xinwen Fu, Nan Zhang, Aniket Pingley, Wei Yu, Jie Wang, Wei Zhao, "The Digital Marauder's Map: A WiFi Forensic Positioning Tool", IEEE Transactions on Mobile Computing, vol.11, no. 3, pp. 377-389, March 2012, doi:10.1109/TMC.2011.70
REFERENCES
[1] Agere Systems Inc., “WDS (Wireless Distribution System),” http://www.pafree.net/mediaTB-046.pdf, 2002.
[2] “How to Change a MAC Address,” http://www.topbits.com how-to-change-a-mac-address.html , 2010.
[3] P. Enge and P. Misra, “Special Issue on Global Positioning System,” Proc. IEEE, vol. 87, no. 1, pp. 3-15, Jan. 1999.
[4] A. Harter, A. Hopper, P. Steggles, A. Ward, and P. Webster, “The Anatomy of a Context-Aware Application,” Proc. ACM MobiCom, Aug. 1999.
[5] R. Want, A. Hopper, V. Falcao, and J. Gibbons, “The Active Badge Location System,” ACM Trans. Information Systems, vol. 10, no. 1, pp. 91-102, Jan. 1992.
[6] N.B. Priyantha, A. Chakraborty, and H. Balakrishnan, “The Cricket Location-Support System,” Proc. ACM MobiCom, Aug. 2000.
[7] L.M. Ni, Y.L. Yiu, C. Lau, and A.P. Patil, “LANDMARC: Indoor Location Sensing Using Active RFID,” Proc. First IEEE Int'l Conf. Pervasive Computing and Comm., Mar. 2003.
[8] K. Römer, “The Lighthouse Location System for Smart Dust,” Proc. MobiSys, May 2003.
[9] D. Niculescu and B. Nath, “VOR Base Stations for Indoor 802.11 Positioning,” Proc. ACM MobiCom, Sept. 2004.
[10] D. Cvrcek, M. Kumpost, V. Matyas, and G. Danezis, “A Study on the Value of Location Privacy,” Proc. Fifth ACM Workshop Privacy in Electronic Soc., Oct. 2006.
[11] A. Haeberlen, E. Flannery, A.M. Ladd, A. Rudys, D.S. Wallach, and L.E. Kavraki, “Practical Robust Localization over Large-Scale 802.11 Wireless Networks,” Proc. ACM MobiCom, Sept./Oct. 2004.
[12] V. Otsason, A. Varshavsky, A. Lamarca, and E.D. Lara, “Accurate GSM Indoor Localization,” Proc. Seventh Int'l Conf. Ubiquitous Computing (UbiComp '05), Sept. 2005.
[13] Arkasha and Bobzilla, “WiGLE - Wireless Geographic Logging Engine - Plotting WiFi on Maps,” http:/www.wigle.net, 2008.
[14] M. Gast, 802.11 Wireless Networks: The Definitive Guide, second ed. O'Reilly Media, Apr. 2005.
[15] N. Husted and S. Myers, “Mobile Location Tracking in Metro Areas: Malnets and Others,” Proc. 17th ACM Conf. Computer and Comm. Security (CCS '10), 2010.
[16] Y.-Q. Chen, Y.-K. Kim, and S.-J. Yoo, “Accurate Sensor Position Estimation for Wireless Sensor Networks Using Neighborhood Relationship,” IEICE Trans. Comm., vol. E91-B, no. 9, pp. 2907-2916, Sept. 2008.
[17] C. Han and Y. Yang, “Proactive Attacker Localization in Wireless Lan,” ACM Computer Comm. Rev., vol. 39, no. 2, pp. 27-33, 2009.
[18] J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall, “802.11 User Fingerprinting,” Proc. ACM MobiCom, Sept. 2007.
[19] J. Wang, Y. Chen, X. Fu, J. Wang, W. Yu, and N. Zhang, “3DLoc: Three Dimensional Wireless Localization Toolkit,” Proc. 30th Int'l Conf. Distributed Computing Systems (ICDCS '10), June 2010.
[20] R. Ryan, Z. Anderson, and A. Chiesa, “Anatomy of a Subway Hack,” http://tech.mit.edu/V128/N30/subwayDefcon_ Presentation.pdf , 2008.
[21] “NetStumbler,” http:/www.netstumbler.com, 2008.
[22] M. Kershaw, “Kismet,” http:/www.kismetwireless.net, 2008.
[23] Google, “What Is the Google Maps API?” http://code.google. com/apismaps, Oct. 2008.
[24] J. Zyren and A. Petrick, “Tutorial on Basic Link Budget Analysis,” http://sss-mag.com/pdfan9804.pdf, June 1998.
[25] E. Perahia and S. Li, “p802.11n Coexistence Assurance Document,” doc.:IEEE 802.11-06/0338r03, http://www.ieee802.org/19/pub/200611-06-0338-03-000n-p802-11n-ca-document.doc , Mar. 2006.
[26] RF-Lambda, Inc., “Low Noise Amplifiers - Narrow Band,” http://www.rflambda.comproduct_list.jsp?catalog=62 , Oct. 2008.
[27] M.F. Mokbel, C.-Y. Chow, and W.G. Aref, “The New Casper: Query Processing for Location Services without Compromising Privacy,” Proc. Int'l Conf. Very Large Data Bases (VLDB '06), Sept. 2006.
[28] P.S. Reddy and D.H. Paulraj, “Anonymous Usage of Location-Based Services through Spacial and Temporal Cloaking,” Proc. Fourth Int'l Conf. Wireless Comm., Networking and Mobile Computing (WiCOM '08), Aug. 2008.
[29] “Porcupine,” http:/porcupine.iu.edu, 2004.
[30] V. Gupta, “A Characterization of Wireless Network Interface Card Active Scanning Algorithms,” master's thesis, Georgia State Univ., 2006.
[31] M. Kershaw and J. Wright, “802.11b Firmware-Level Attacks,” http://code.google.com/apismaps, Sept. 2006.
[32] J. Bellardo and S. Savage, “802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions,” Proc. 12th Conf. USENIX Security Symp. (SEC '03), Aug. 2003.
[33] “Aireplay,” http://www.aircrack-ng.orgdoku.php?id= aireplay-ng , 2010.
[34] “Aircrack,” http:/www.aircrack-ng.org, 2010.
[35] Metrix Communication LLC, “Ubiquiti Networks SRC PCMCIA/Cardbus 300mw 802.11 a/b/g,” http://metrix.netubiquiti- networks-src-pcmciacardbus-300mw-80211-abg-p-4.html , 2008.
[36] N. Bulusu, J. Heidemann, and D. Estrin, “GPS-Less Low Cost Outdoor Localization for Very Small Devices,” IEEE Personal Comm. Magazine, vol. 7, no. 5, pp. 28-34, http://lecs.cs.ucla.edu/~bulusu/papersBulusu00a.html , Oct. 2000.
[37] P. Bahl and V.N. Padmanabhan, “RADAR: An In-Building RF-Based User Location and Tracking System,” Proc. IEEE INFOCOM, Mar. 2000.
[38] M. Gruteser and D. Grunwald, “Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking,” Proc. MobiSys, May 2003.
[39] B. Gedik and L. Liu, “Location-Privacy in Mobile Systems: A Personalized Anonymization Model,” Proc. Int'l Conf. Distributed Computing Systems (ICDCS '05), June 2005.
[40] A.R. Beresford and F. Stajano, “Location Privacy in Pervasive Computing,” Proc. Information Hiding Workshop, Mar./Apr. 2003.
[41] Y.-C. Hu and H.J. Wang, “Location Privacy in Wireless Networks,” Proc. ACM SIGCOMM, Apr. 2005.
[42] T. Jiang, H.J. Wang, and Y.-C. Hu, “Location Privacy in Wireless Networks,” Proc. MobiSys, June 2007.
[43] D. Singelée and B. Preneel, “Location Privacy in Wireless Personal Area Networks,” Proc. Fifth ACM Workshop Wireless Security (WiSe '06), Aug. 2006.
[44] T. He, C. Huang, B.M. Blum, J.A. Stankovic, and T. Abdelzaher, “Range-Free Localization Schemes for Large Scale Sensor Networks,” Proc. ACM MobiCom, Sept. 2003.
[45] J. Hwang, Y. Gu, T. He, and Y. Kim, “Realistic Sensing Area Modeling,” Proc. IEEE INFOCOM, May 2007.
[46] J.K. Rowling, Harry Potter and the Prisoner of Azkaban. Scholastic Paperbacks, 2001.
25 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool