RSSI Indoor Outdoor Personal Localization: A Study to Found Targeted Social Engineering Victim by Attacker Via Wireless Methods
DOI:
https://doi.org/10.18196/jrc.24101Keywords:
wireless localization, RSSI signal, Pathloss ModelAbstract
Social engineering is a common method to collect more information from victim trough socialization. This method employs human psychology to manipulate other people. In cyber society today, the attacker could use various methods to tapping into victim smartphone, and after that the attacker can get victim persona profiling information. The attacker can select random victim and then using wireless localization methods, the attacker could found its victim. After the random victim has been found the attacker can start social engineering directly to the victim based on persona profiling information, to gain trust and more personal information that can lead inflicting damage to the victim. In this paper, we demonstrate to localize victim using green obaidat calibrate Path loss Propagation models and $4 dollar device based on victim Smartphone RSSI Wi-Fi Signal. With this device we could localize a person within 15 meter with just only 0.64 dbm in difference between our RSSI measurement and simulation.References
K. Krombholz, H. Hobel, M. Huber, and E. Weippl, “Social engineering attacks on the knowledge worker,” Proceedings of the 6th International Conference on Security of Information and Networks - SIN ’13, pp. 28–35, 2013, doi: 10.1145/2523514.2523596.
K. Krombholz, H. Hobel, M. Huber, and E. Weippl, “ScienceDirect Advanced social engineering attacks *,” Journal of Information Security and Applications, vol. 22, pp. 113–122, 2014, doi: 10.1016/j.jisa.2014.09.005.
F. Mouton, M. M. Malan, L. Leenen, and H. S. Venter, “Social engineering attack framework,” 2014, doi: 10.1109/ISSA.2014.6950510.
C. Hadnagy, “Social Engineering: The Art of Human Hacking,” The Art of Human Hacking, 2010.
F. Salahdine and N. Kaabouch, “Social Engineering Attacks: A Survey,” Future Internet, vol. 11, no. 4, p. 89, 2019, doi: 10.3390/fi11040089.
A. Kumar, M. Chaudhary, and N. Kumar, “Social Engineering Threats and Awareness: A Survey,” European Journal of Advances in Engineering and Technology, vol. 2, no. 11, pp. 15–19, 2015, [Online]. Available: www.ejaet.com.
S. D. Applegate, “Social engineering: Hacking the wetware!,” Information Security Journal, 2009, doi: 10.1080/19393550802623214.
M. Chinta, J. Alaparthi, and E. Kodali, “A Study on Social Engineering Attacks and Defence Mechanisms,” International Journal of Computer Science and Information Security (IJCSIS), vol. 14, no. Icetcse, pp. 225–231, 2016.
A. Eboka and A. A. Ojugo, “A Social Engineering Detection Model for the Mobile Smartphone Clients,” African Journal of Computing, vol. 7, no. September 2014, 2018.
Y. Zhou, X. Zhang, X. Jiang, and V. W. Freeh, “Taming information-stealing smartphone applications (on android),” 2011, doi: 10.1007/978-3-642-21599-5_7.
S. Allam, S. V. Flowerday, and E. Flowerday, “Smartphone information security awareness: A victim of operational pressures,” Computers and Security, 2014, doi: 10.1016/j.cose.2014.01.005.
D. Ariu, E. Frumento, and G. Fumera, “Social Engineering 2.0: A Foundational Work,” in ACM International Conference on Computing Frontiers 2019, 2017, no. July, pp. 1–7, doi: 10.1145/123.
C. Bermejo and P. Hui, “Steal Your Life Using 5 Cents: Hacking Android Smartphones with NFC Tags,” arXiv Computer Science Cryptography and Security, 2017, [Online]. Available: http://arxiv.org/abs/1705.02081.
P. Frigo, C. Giuffrida, and H. Bos, “Grand Pwning Unit: Accelerating microarchitectural attacks with the GPU,” 2018.
Q. A. Chen, Z. Qian, and Z. M. Mao, “Peeking into your app without actually seeing it: Ui state inference and novel android attacks,” Proceedings of the 23rd USENIX Security Symposium, no. August, pp. 1037–1052, 2014.
K. Al Zaabi, “Android device hacking tricks and countermeasures,” 2016 IEEE International Conference on Cybercrime and Computer Forensic, ICCCF 2016, 2016, doi: 10.1109/ICCCF.2016.7740441.
K. Chintalapudi, A. P. Iyer, and V. N. Padmanabhan, “Indoor localization without the pain,” 2010, doi: 10.1145/1859995.1860016.
A. S. Paul and E. A. Wan, “RSSI-Based indoor localization and tracking using sigma-point kalman smoothers,” IEEE Journal on Selected Topics in Signal Processing, 2009, doi: 10.1109/JSTSP.2009.2032309.
N. Kohtake and S. Morimoto, “Indoor and Outdoor Seamless Positioning using Indoor Messaging System and GPS,” 2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN), 2011.
D. Rountree, “Organizational and Operational Security,” in Security for Microsoft Windows System Administrators, 2010, pp. 135–159.
M. Junger, L. Montoya, and F. J. Overink, “Priming and warnings are not effective to prevent social engineering attacks,” Computers in Human Behavior, 2017, doi: 10.1016/j.chb.2016.09.012.
A. R. Kulaib, R. M. Shubair, M. A. Al-Qutayri, and J. W. P. Ng, “An overview of localization techniques for wireless sensor networks,” 2011 International Conference on Innovations in Information Technology, IIT 2011, pp. 167–172, 2011, doi: 10.1109/INNOVATIONS.2011.5893810.
D. B. Green and A. S. Obaidat, “An accurate line of sight propagation performance model for ad-hoc 802.11 wireless LAN (WLAN) devices,” Proceedings of IEEE International Conference on Communications (IEEE ICC ’02), vol. 5, pp. 3424–3428, 2002, doi: 10.1109/ICC.2002.997466.
G. P. N. Hakim, M. Alaydrus, and R. B. Bahaweres, “Empirical Approach of Ad hoc Path Loss Propagation Model in Realistic Forest Environments,” International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications, ICRAMET, vol. 978-1–5090, pp. 1–5, 2016.
T. Chandra and F. Bachruddin, “RANCANG-BANGUN ALAT PENGUKUR JARAK BERDASARKAN SINYAL RSSI WIFI YANG DI TERIMA,” 2016.
M. Yonathan and F. Bachruddin, “ANALISA ALAT PENGUKUR JARAK BERDASARKAN SINYAL RSSI WIFI IEEE 802.11 b/g/n,” 2016.
E. Datasheet, “ESP8266 Serial Esp-01 WIFI Wireless,” ESP8266 Serial Esp-01 WIFI Wireless, 2004.
A. S. Wardoyo and M. Alaydrus, “Degradation of Shielding Performance of Metallic Sheet due to Aperture Configuration and Dimension at 2.4 GHz,” Jurnal Elektronika dan Telekomunikasi, vol. 18, no. 1, p. 9, 2018, doi: 10.14203/jet.v18.9-14.
G. P. N. Hakim, A. Firdausi, and M. Alaydrus, “A low cost electromagnetic sensor for detecting holes in metallic sheet,” Telkomnika, vol. 17, no. 5, 2019, doi: http://dx.doi.org/10.12928/telkomnika.v17i5.12684.
S. Celozzi, R. Araneo, and G. Lovat, Electromagnetic Shielding. Wiley Interscience, 2018.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This journal is based on the work at https://journal.umy.ac.id/index.php/jrc under license from Creative Commons Attribution-ShareAlike 4.0 International License. You are free to:
- Share – copy and redistribute the material in any medium or format.
- Adapt – remix, transform, and build upon the material for any purpose, even comercially.
The licensor cannot revoke these freedoms as long as you follow the license terms, which include the following:
- Attribution. You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- ShareAlike. If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions. You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
• Creative Commons Attribution-ShareAlike (CC BY-SA)
JRC is licensed under an International License