RSSI Indoor Outdoor Personal Localization: A Study to Found Targeted Social Engineering Victim by Attacker Via Wireless Methods
Abstract
Keywords
Full Text:
PDFReferences
K. Krombholz, H. Hobel, M. Huber, and E. Weippl, “Social engineering attacks on the knowledge worker,” Proceedings of the 6th International Conference on Security of Information and Networks - SIN ’13, pp. 28–35, 2013, doi: 10.1145/2523514.2523596.
K. Krombholz, H. Hobel, M. Huber, and E. Weippl, “ScienceDirect Advanced social engineering attacks *,” Journal of Information Security and Applications, vol. 22, pp. 113–122, 2014, doi: 10.1016/j.jisa.2014.09.005.
F. Mouton, M. M. Malan, L. Leenen, and H. S. Venter, “Social engineering attack framework,” 2014, doi: 10.1109/ISSA.2014.6950510.
C. Hadnagy, “Social Engineering: The Art of Human Hacking,” The Art of Human Hacking, 2010.
F. Salahdine and N. Kaabouch, “Social Engineering Attacks: A Survey,” Future Internet, vol. 11, no. 4, p. 89, 2019, doi: 10.3390/fi11040089.
A. Kumar, M. Chaudhary, and N. Kumar, “Social Engineering Threats and Awareness: A Survey,” European Journal of Advances in Engineering and Technology, vol. 2, no. 11, pp. 15–19, 2015, [Online]. Available: www.ejaet.com.
S. D. Applegate, “Social engineering: Hacking the wetware!,” Information Security Journal, 2009, doi: 10.1080/19393550802623214.
M. Chinta, J. Alaparthi, and E. Kodali, “A Study on Social Engineering Attacks and Defence Mechanisms,” International Journal of Computer Science and Information Security (IJCSIS), vol. 14, no. Icetcse, pp. 225–231, 2016.
A. Eboka and A. A. Ojugo, “A Social Engineering Detection Model for the Mobile Smartphone Clients,” African Journal of Computing, vol. 7, no. September 2014, 2018.
Y. Zhou, X. Zhang, X. Jiang, and V. W. Freeh, “Taming information-stealing smartphone applications (on android),” 2011, doi: 10.1007/978-3-642-21599-5_7.
S. Allam, S. V. Flowerday, and E. Flowerday, “Smartphone information security awareness: A victim of operational pressures,” Computers and Security, 2014, doi: 10.1016/j.cose.2014.01.005.
D. Ariu, E. Frumento, and G. Fumera, “Social Engineering 2.0: A Foundational Work,” in ACM International Conference on Computing Frontiers 2019, 2017, no. July, pp. 1–7, doi: 10.1145/123.
C. Bermejo and P. Hui, “Steal Your Life Using 5 Cents: Hacking Android Smartphones with NFC Tags,” arXiv Computer Science Cryptography and Security, 2017, [Online]. Available: http://arxiv.org/abs/1705.02081.
P. Frigo, C. Giuffrida, and H. Bos, “Grand Pwning Unit: Accelerating microarchitectural attacks with the GPU,” 2018.
Q. A. Chen, Z. Qian, and Z. M. Mao, “Peeking into your app without actually seeing it: Ui state inference and novel android attacks,” Proceedings of the 23rd USENIX Security Symposium, no. August, pp. 1037–1052, 2014.
K. Al Zaabi, “Android device hacking tricks and countermeasures,” 2016 IEEE International Conference on Cybercrime and Computer Forensic, ICCCF 2016, 2016, doi: 10.1109/ICCCF.2016.7740441.
K. Chintalapudi, A. P. Iyer, and V. N. Padmanabhan, “Indoor localization without the pain,” 2010, doi: 10.1145/1859995.1860016.
A. S. Paul and E. A. Wan, “RSSI-Based indoor localization and tracking using sigma-point kalman smoothers,” IEEE Journal on Selected Topics in Signal Processing, 2009, doi: 10.1109/JSTSP.2009.2032309.
N. Kohtake and S. Morimoto, “Indoor and Outdoor Seamless Positioning using Indoor Messaging System and GPS,” 2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN), 2011.
D. Rountree, “Organizational and Operational Security,” in Security for Microsoft Windows System Administrators, 2010, pp. 135–159.
M. Junger, L. Montoya, and F. J. Overink, “Priming and warnings are not effective to prevent social engineering attacks,” Computers in Human Behavior, 2017, doi: 10.1016/j.chb.2016.09.012.
A. R. Kulaib, R. M. Shubair, M. A. Al-Qutayri, and J. W. P. Ng, “An overview of localization techniques for wireless sensor networks,” 2011 International Conference on Innovations in Information Technology, IIT 2011, pp. 167–172, 2011, doi: 10.1109/INNOVATIONS.2011.5893810.
D. B. Green and A. S. Obaidat, “An accurate line of sight propagation performance model for ad-hoc 802.11 wireless LAN (WLAN) devices,” Proceedings of IEEE International Conference on Communications (IEEE ICC ’02), vol. 5, pp. 3424–3428, 2002, doi: 10.1109/ICC.2002.997466.
G. P. N. Hakim, M. Alaydrus, and R. B. Bahaweres, “Empirical Approach of Ad hoc Path Loss Propagation Model in Realistic Forest Environments,” International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications, ICRAMET, vol. 978-1–5090, pp. 1–5, 2016.
T. Chandra and F. Bachruddin, “RANCANG-BANGUN ALAT PENGUKUR JARAK BERDASARKAN SINYAL RSSI WIFI YANG DI TERIMA,” 2016.
M. Yonathan and F. Bachruddin, “ANALISA ALAT PENGUKUR JARAK BERDASARKAN SINYAL RSSI WIFI IEEE 802.11 b/g/n,” 2016.
E. Datasheet, “ESP8266 Serial Esp-01 WIFI Wireless,” ESP8266 Serial Esp-01 WIFI Wireless, 2004.
A. S. Wardoyo and M. Alaydrus, “Degradation of Shielding Performance of Metallic Sheet due to Aperture Configuration and Dimension at 2.4 GHz,” Jurnal Elektronika dan Telekomunikasi, vol. 18, no. 1, p. 9, 2018, doi: 10.14203/jet.v18.9-14.
G. P. N. Hakim, A. Firdausi, and M. Alaydrus, “A low cost electromagnetic sensor for detecting holes in metallic sheet,” Telkomnika, vol. 17, no. 5, 2019, doi: http://dx.doi.org/10.12928/telkomnika.v17i5.12684.
S. Celozzi, R. Araneo, and G. Lovat, Electromagnetic Shielding. Wiley Interscience, 2018.
DOI: https://doi.org/10.18196/jrc.24101
Refbacks
- There are currently no refbacks.
Copyright (c) 2020 Journal of Robotics and Control (JRC)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Journal of Robotics and Control (JRC)
P-ISSN: 2715-5056 || E-ISSN: 2715-5072
Organized by Peneliti Teknologi Teknik Indonesia
Published by Universitas Muhammadiyah Yogyakarta in collaboration with Peneliti Teknologi Teknik Indonesia, Indonesia and the Department of Electrical Engineering
Website: http://journal.umy.ac.id/index.php/jrc
Email: jrcofumy@gmail.com