skip to main content
10.1145/3495243.3560530acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

Non-cooperative wi-fi localization & its privacy implications

Published:14 October 2022Publication History

ABSTRACT

We present Wi-Peep - a new location-revealing privacy attack on non-cooperative Wi-Fi devices. Wi-Peep exploits loopholes in the 802.11 protocol to elicit responses from Wi-Fi devices on a network that we do not have access to. It then uses a novel time-of-flight measurement scheme to locate these devices. Wi-Peep works without any hardware or software modifications on target devices and without requiring access to the physical space that they are deployed in. Therefore, a pedestrian or a drone that carries a Wi-Peep device can estimate the location of every Wi-Fi device in a building. Our Wi-Peep design costs $20 and weighs less than 10 g. We deploy it on a lightweight drone and show that a drone flying over a house can estimate the location of Wi-Fi devices across multiple floors to meter-level accuracy. Finally, we investigate different mitigation techniques to secure future Wi-Fi devices against such attacks.

References

  1. Ali Abedi and Omid Abari. 2020. WiFi Says" Hi!" Back to Strangers!. In Proceedings of the 19th ACM Workshop on Hot Topics in Networks. 132--138.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Ali Abedi and Tim Brecht. 2017. Conducting Repeatable Experiments in Highly Variable Cloud Computing Environments. In ICPE.Google ScholarGoogle Scholar
  3. Ali Abedi, Andrew Heard, and Tim Brecht. 2015. Conducting Repeatable Experiments and Fair Comparisons Using 802.11n MIMO Networks. SIGOPS Operating Systems Review (2015).Google ScholarGoogle Scholar
  4. Fadel Adib, Zachary Kabelac, and Dina Katabi. 2015. Multi-person Localization via RF Body Reflections (NSDI).Google ScholarGoogle Scholar
  5. Victor Bahl and Venkat Padmanabhan. 2000. RADAR: An In-Building RF-based User Location and Tracking System (INFOCOM).Google ScholarGoogle Scholar
  6. Gerald Combs. 2020. Wireshark. https://www.wireshark.org/.Google ScholarGoogle Scholar
  7. DJI 2022. DJI Mini 2. DJI. https://www.dji.com/ca/mini-2/specs.Google ScholarGoogle Scholar
  8. DJI 2022. PHANTOM 4 RTK. DJI. https://www.dji.com/ca/phantom-4-rtk/info.Google ScholarGoogle Scholar
  9. Espressif Systems 2019. ESP32 datasheet. Espressif Systems. https://www.espressif.com/sites/default/files/documentation/\esp32_datasheet_en.pdf.Google ScholarGoogle Scholar
  10. Espressif Systems 2020. ESP8266 datasheet. Espressif Systems. https://www.espressif.com/sites/default/files/documentation/0a-esp8266ex_datasheet_en.pdf.Google ScholarGoogle Scholar
  11. Julien Freudiger. 2015. How Talkative is Your Mobile Device? An Experimental Study of Wi-Fi Probe Requests. In Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec '15).Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Domenico Giustiniano, Theodoros Bourchas, Maciej Bednarek, and Vincent Lenders. 2015. Deep Inspection of the Noise in WiFi Time-of-Flight Echo Techniques. In MSWiM. 5--12.Google ScholarGoogle Scholar
  13. Jon Gjengset, Jie Xiong, Graeme McPhillips, and Kyle Jamieson. 2014. Phaser: Enabling Phased Array Signal Processing on Commodity Wi-Fi Access Points. MobiCom (2014).Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Omar Hashem, Moustafa Youssef, and Khaled A. Harras. 2020. WiNar: RTT-based Sub-meter Indoor Localization using Commercial Devices. In IEEE International Conference on Pervasive Computing and Communications (PerCom).Google ScholarGoogle Scholar
  15. Suining He and S.-H. Gary Chan. 2016. Wi-Fi Fingerprint-Based Indoor Positioning: Recent Advances and Comparisons. IEEE Communications Surveys Tutorials 18, 1 (2016), 466--490. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Baik Hoh, Marco Gruteser, Hui Xiong, and Ansaf Alrabady. 2007. Preserving Privacy in Gps Traces via Uncertainty-Aware Path Cloaking (ACM CCS).Google ScholarGoogle Scholar
  17. Berthold K.P. Horn. 2020. Doubling the Accuracy of Indoor Positioning: Frequency Diversity. Sensors (2020).Google ScholarGoogle Scholar
  18. Mohamed Ibrahim, Hansi Liu, Minitha Jawahar, Viet Nguyen, Marco Gruteser, Richard Howard, Bo Yu, and Fan Bai. 2018. Verification: Accuracy Evaluation of WiFi Fine Time Measurements on an Open Platform. In Annual International Conference on Mobile Computing and Networking (ACM MobiCom).Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Tao Jiang, Helen J. Wang, and Yih-Chun Hu. 2007. Preserving Location Privacy in Wireless Lans (ACM MobiSys).Google ScholarGoogle Scholar
  20. S. S. Kolahi and A. A. Almatrook. 2017. Impact of security on bandwidth and latency in IEEE 802.11ac client-to-server WLAN. In 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN). 893--897.Google ScholarGoogle Scholar
  21. Manikanta Kotaru, Kiran Joshi, Dinesh Bharadia, and Sachin Katti. 2015. SpotFi: Decimeter Level Localization Using Wi-Fi (SIGCOMM).Google ScholarGoogle Scholar
  22. Swarun Kumar, Stephanie Gil, Dina Katabi, and Daniela Rus. 2014. Accurate Indoor Localization with Zero Start-up Cost (MobiCom).Google ScholarGoogle Scholar
  23. P. Li, S. S. Kolahi, M. Safdari, and M. Argawe. 2011. Effect of WPA2 Security on IEEE 802.11n Bandwidth and Round Trip Time in Peer-Peer Wireless Local Area Networks. In 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications. 777--782.Google ScholarGoogle Scholar
  24. Andreas Marcaletti, Maurizio Rea, Domenico Giustiniano, Vincent Lenders, and Aymen Fakhreddine. 2014. Filtering Noisy 802.11 Time-of-Flight Ranging Measurements. In CoNEXT. 13--20.Google ScholarGoogle Scholar
  25. Alex T. Mariakakis, Souvik Sen, Jeongkeun Lee, and Kyu-Han Kim. 2014. SAIL: Single Access Point-Based Indoor Localization. In Annual International Conference on Mobile Systems, Applications, and Services (ACM MobiSys).Google ScholarGoogle Scholar
  26. Monolithic Power Systems Inc. 2011. MP1584 Step-Down Converter. Monolithic Power Systems Inc. https://www.monolithicpower.com/en/documentview/productdocument/index/version/2/document_type/Datasheet/lang/en/sku/MP1584EN-LF-Z/document_id/204/.Google ScholarGoogle Scholar
  27. Michał Nowicki and Jan Wietrzykowski. 2017. Low-effort place recognition with WiFi fingerprints using deep learning. In International Conference Automation. Springer, 575--584.Google ScholarGoogle ScholarCross RefCross Ref
  28. Anshul Rai, Krishna Kant Chintalapudi, Venkata N. Padmanabhan, and Rijurekha Sen. 2012. Zee: Zero-effort Crowdsourcing for Indoor Localization (MobiCom).Google ScholarGoogle Scholar
  29. Maurizio Rea and Domenico Giustiniano. 2021. Location-aware Wireless Resource Allocation in Industrial-like Environment. IEEE Transactions on Mobile Computing (2021).Google ScholarGoogle ScholarCross RefCross Ref
  30. Mohammad Saleh, Jaafar Gaber, and Maxim Wack. 2017. Sensor Networks Applications Performance Measures for IEEE802.11n WiFi Security Protocols. In Proceedings of the International Conference on Future Networks and Distributed Systems (ICFNDS '17). Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Domien Schepers, Aanjhan Ranganathan, and Mathy Vanhoef. 2022. On the Robustness of Wi-Fi Deauthentication Countermeasures (WiSec '22). 245--256.Google ScholarGoogle Scholar
  32. B. Schilit, J. Hong, and M. Gruteser. 2003. Wireless location privacy protection. IEEE Computer (2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Reza Shokri, George Theodorakopoulos, Panos Papadimitratos, Ehsan Kazemi, and Jean-Pierre Hubaux. 2014. Hiding in the Mobile Crowd: LocationPrivacy through Collaboration. IEEE Transactions on Dependable and Secure Computing (2014).Google ScholarGoogle Scholar
  34. Reza Shokri, George Theodorakopoulos, Carmela Troncoso, Jean-Pierre Hubaux, and Jean-Yves Le Boudec. 2012. Protecting Location Privacy: Optimal Strategy against Localization Attacks (ACM CCS).Google ScholarGoogle Scholar
  35. Ivan Vasilevski, Dobre Blazhevski, Veno Pachovski, and Irena Stojmenovska. 2019. Five Years Later: How Effective Is the MAC Randomization in Practice? The No-at-All Attack. In ICT Innovations 2019. Big Data Processing and Mining, Sonja Gievska and Gjorgji Madjarov (Eds.). Springer International Publishing.Google ScholarGoogle ScholarCross RefCross Ref
  36. Deepak Vasisht, Swarun Kumar, and Dina Katabi. 2016. Decimeter-Level Localization with a Single Wi-Fi Access Point (NSDI).Google ScholarGoogle Scholar
  37. Jue Wang and Dina Katabi. 2013. Dude, Where's My Card?: RFID Positioning That Works with Multipath and Non-line of Sight (SIGCOMM).Google ScholarGoogle Scholar
  38. Yaxiong Xie, Jie Xiong, Mo Li, and Kyle Jamieson. 2018. mD-Track: Leveraging Multi-Dimensionality in Passive Indoor Wi-Fi Tracking. arXiv preprint arXiv:1812.03103 (2018).Google ScholarGoogle Scholar
  39. Jie Xiong and Kyle Jamieson. 2013. ArrayTrack: A Fine-grained Indoor Location System (NSDI).Google ScholarGoogle Scholar
  40. Jie Xiong, Kyle Jamieson, and Karthikeyan Sundaresan. 2014. Synchronicity: Pushing the Envelope of Fine-grained Localization with Distributed Mimo. In HotWireless.Google ScholarGoogle Scholar
  41. Jie Xiong, Karthikeyan Sundaresan, and Kyle Jamieson. 2015. ToneTrack: Leveraging Frequency-Agile Radios for Time-Based Indoor Wireless Localization (MobiCom).Google ScholarGoogle Scholar
  42. Moustafa Youssef and Ashok Agrawala. 2005. The Horus WLAN Location Determination System (MobiSys).Google ScholarGoogle Scholar
  43. Yanzi Zhu, Zhujun Xiao, Yuxin Chen, Zhijing Li, Max Liu, Ben Y. Zhao, and Haitao Zheng. 2020. Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors. Network and Distributed Systems Security (NDSS) Symposium (2020).Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    MobiCom '22: Proceedings of the 28th Annual International Conference on Mobile Computing And Networking
    October 2022
    932 pages
    ISBN:9781450391818
    DOI:10.1145/3495243

    Copyright © 2022 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 14 October 2022

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    Overall Acceptance Rate440of2,972submissions,15%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader