RSSI Indoor Outdoor Personal Localization: A Study to Found Targeted Social Engineering Victim by Attacker Via Wireless Methods

Ahmad Firdausi, Galang P. N. Hakim

Abstract


Social engineering is a common method to collect more information from victim trough socialization. This method employs human psychology to manipulate other people. In cyber society today, the attacker could use various methods to tapping into victim smartphone, and after that the attacker can get victim persona profiling information. The attacker can select random victim and then using wireless localization methods, the attacker could found its victim. After the random victim has been found the attacker can start social engineering directly to the victim based on persona profiling information, to gain trust and more personal information that can lead inflicting damage to the victim. In this paper, we demonstrate to localize victim using green obaidat calibrate Path loss Propagation models and $4 dollar device based on victim Smartphone RSSI Wi-Fi Signal. With this device we could localize a person within 15 meter with just only 0.64 dbm in difference between our RSSI measurement and simulation.

Keywords


wireless localization; RSSI signal; Pathloss Model

Full Text:

PDF

References


K. Krombholz, H. Hobel, M. Huber, and E. Weippl, “Social engineering attacks on the knowledge worker,” Proceedings of the 6th International Conference on Security of Information and Networks - SIN ’13, pp. 28–35, 2013, doi: 10.1145/2523514.2523596.

K. Krombholz, H. Hobel, M. Huber, and E. Weippl, “ScienceDirect Advanced social engineering attacks *,” Journal of Information Security and Applications, vol. 22, pp. 113–122, 2014, doi: 10.1016/j.jisa.2014.09.005.

F. Mouton, M. M. Malan, L. Leenen, and H. S. Venter, “Social engineering attack framework,” 2014, doi: 10.1109/ISSA.2014.6950510.

C. Hadnagy, “Social Engineering: The Art of Human Hacking,” The Art of Human Hacking, 2010.

F. Salahdine and N. Kaabouch, “Social Engineering Attacks: A Survey,” Future Internet, vol. 11, no. 4, p. 89, 2019, doi: 10.3390/fi11040089.

A. Kumar, M. Chaudhary, and N. Kumar, “Social Engineering Threats and Awareness: A Survey,” European Journal of Advances in Engineering and Technology, vol. 2, no. 11, pp. 15–19, 2015, [Online]. Available: www.ejaet.com.

S. D. Applegate, “Social engineering: Hacking the wetware!,” Information Security Journal, 2009, doi: 10.1080/19393550802623214.

M. Chinta, J. Alaparthi, and E. Kodali, “A Study on Social Engineering Attacks and Defence Mechanisms,” International Journal of Computer Science and Information Security (IJCSIS), vol. 14, no. Icetcse, pp. 225–231, 2016.

A. Eboka and A. A. Ojugo, “A Social Engineering Detection Model for the Mobile Smartphone Clients,” African Journal of Computing, vol. 7, no. September 2014, 2018.

Y. Zhou, X. Zhang, X. Jiang, and V. W. Freeh, “Taming information-stealing smartphone applications (on android),” 2011, doi: 10.1007/978-3-642-21599-5_7.

S. Allam, S. V. Flowerday, and E. Flowerday, “Smartphone information security awareness: A victim of operational pressures,” Computers and Security, 2014, doi: 10.1016/j.cose.2014.01.005.

D. Ariu, E. Frumento, and G. Fumera, “Social Engineering 2.0: A Foundational Work,” in ACM International Conference on Computing Frontiers 2019, 2017, no. July, pp. 1–7, doi: 10.1145/123.

C. Bermejo and P. Hui, “Steal Your Life Using 5 Cents: Hacking Android Smartphones with NFC Tags,” arXiv Computer Science Cryptography and Security, 2017, [Online]. Available: http://arxiv.org/abs/1705.02081.

P. Frigo, C. Giuffrida, and H. Bos, “Grand Pwning Unit: Accelerating microarchitectural attacks with the GPU,” 2018.

Q. A. Chen, Z. Qian, and Z. M. Mao, “Peeking into your app without actually seeing it: Ui state inference and novel android attacks,” Proceedings of the 23rd USENIX Security Symposium, no. August, pp. 1037–1052, 2014.

K. Al Zaabi, “Android device hacking tricks and countermeasures,” 2016 IEEE International Conference on Cybercrime and Computer Forensic, ICCCF 2016, 2016, doi: 10.1109/ICCCF.2016.7740441.

K. Chintalapudi, A. P. Iyer, and V. N. Padmanabhan, “Indoor localization without the pain,” 2010, doi: 10.1145/1859995.1860016.

A. S. Paul and E. A. Wan, “RSSI-Based indoor localization and tracking using sigma-point kalman smoothers,” IEEE Journal on Selected Topics in Signal Processing, 2009, doi: 10.1109/JSTSP.2009.2032309.

N. Kohtake and S. Morimoto, “Indoor and Outdoor Seamless Positioning using Indoor Messaging System and GPS,” 2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN), 2011.

D. Rountree, “Organizational and Operational Security,” in Security for Microsoft Windows System Administrators, 2010, pp. 135–159.

M. Junger, L. Montoya, and F. J. Overink, “Priming and warnings are not effective to prevent social engineering attacks,” Computers in Human Behavior, 2017, doi: 10.1016/j.chb.2016.09.012.

A. R. Kulaib, R. M. Shubair, M. A. Al-Qutayri, and J. W. P. Ng, “An overview of localization techniques for wireless sensor networks,” 2011 International Conference on Innovations in Information Technology, IIT 2011, pp. 167–172, 2011, doi: 10.1109/INNOVATIONS.2011.5893810.

D. B. Green and A. S. Obaidat, “An accurate line of sight propagation performance model for ad-hoc 802.11 wireless LAN (WLAN) devices,” Proceedings of IEEE International Conference on Communications (IEEE ICC ’02), vol. 5, pp. 3424–3428, 2002, doi: 10.1109/ICC.2002.997466.

G. P. N. Hakim, M. Alaydrus, and R. B. Bahaweres, “Empirical Approach of Ad hoc Path Loss Propagation Model in Realistic Forest Environments,” International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications, ICRAMET, vol. 978-1–5090, pp. 1–5, 2016.

T. Chandra and F. Bachruddin, “RANCANG-BANGUN ALAT PENGUKUR JARAK BERDASARKAN SINYAL RSSI WIFI YANG DI TERIMA,” 2016.

M. Yonathan and F. Bachruddin, “ANALISA ALAT PENGUKUR JARAK BERDASARKAN SINYAL RSSI WIFI IEEE 802.11 b/g/n,” 2016.

E. Datasheet, “ESP8266 Serial Esp-01 WIFI Wireless,” ESP8266 Serial Esp-01 WIFI Wireless, 2004.

A. S. Wardoyo and M. Alaydrus, “Degradation of Shielding Performance of Metallic Sheet due to Aperture Configuration and Dimension at 2.4 GHz,” Jurnal Elektronika dan Telekomunikasi, vol. 18, no. 1, p. 9, 2018, doi: 10.14203/jet.v18.9-14.

G. P. N. Hakim, A. Firdausi, and M. Alaydrus, “A low cost electromagnetic sensor for detecting holes in metallic sheet,” Telkomnika, vol. 17, no. 5, 2019, doi: http://dx.doi.org/10.12928/telkomnika.v17i5.12684.

S. Celozzi, R. Araneo, and G. Lovat, Electromagnetic Shielding. Wiley Interscience, 2018.


Article Metrics

Abstract view : 26 times
PDF - 19 times

Refbacks

  • There are currently no refbacks.


Copyright (c) 2020 Journal of Robotics and Control (JRC)

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

_____________________________________________________________________

Abstracted/Indexed by:

 

 

 

_____________________________________________________________________


Journal of Robotics and Controls (JRC)
P-ISSN: 2715-5056 || E-ISSN: 2715-5072
Organized by Lembaga Penelitian, Publikasi & Pengabdian Masyarakat UMY, Yogyakarta, Indonesia
Published by Universitas Muhammadiyah Yogyakarta, Yogyakarta, Indonesia
Website: http://journal.umy.ac.id/index.php/jrc
Email: jrc@umy.ac.id || jrcofumy@gmail.com
_____________________________________________________________________

Creative Commons License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

 

View JRC Stats