The Digital Marauder's Map: A WiFi Forensic Positioning Tool

"The Marauder's Map,” a magical map in J.K. Rowling's fantasy series Harry Potter and the Prisoner of Azkaban [CHECK END OF SENTENCE], can be used as a surveillance tool to show all moving objects within the boundary of "Hogwarts School of Witchcraft and Wizardry” at a spell. In this paper, we introduce a similar forensic surveillance tool for wireless networks. Our system, the digital Marauder's map, can reveal the locations of WiFi-enabled mobile devices within the coverage area of a high-gain antenna. The digital Marauder's map is built solely with off-the-shelf wireless equipments, and features a mobile design that can be quickly deployed to a new location for instant usage without training. We present a comprehensive set of theoretical analysis and experimental results which demonstrate the coverage and localization accuracy of the digital Marauder's map.

[1]  Vaibhav Gupta A Characterization of Wireless Network Interface Card Active Scanning Algorithms , 2006 .

[2]  Andreas Haeberlen,et al.  Practical robust localization over large-scale 802.11 wireless networks , 2004, MobiCom '04.

[3]  Srinivasan Seshan,et al.  802.11 user fingerprinting , 2007, MobiCom '07.

[4]  Tarek F. Abdelzaher,et al.  Range-free localization schemes for large scale sensor networks , 2003, MobiCom '03.

[5]  Andy Hopper,et al.  The active badge location system , 1992, TOIS.

[6]  Pierangela Samarati,et al.  Location privacy in pervasive computing , 2008 .

[7]  George Danezis,et al.  A study on the value of location privacy , 2006, WPES '06.

[8]  Sang-Jo Yoo,et al.  Accurate Sensor Position Estimation for Wireless Sensor Networks Using Neighborhood Relationship , 2008, IEICE Trans. Commun..

[9]  Siyu Zhan,et al.  Proactive attacker localization in wireless LAN , 2009, CCRV.

[10]  Walid G. Aref,et al.  Casper*: Query processing for location services without compromising privacy , 2006, TODS.

[11]  Marco Gruteser,et al.  Location Privacy in Wireless Networks , 2011, Encyclopedia of Cryptography and Security.

[12]  Steven Myers,et al.  Mobile location tracking in metro areas: malnets and others , 2010, CCS '10.

[13]  Per Enge,et al.  Special Issue on Global Positioning System , 1999, Proc. IEEE.

[14]  Hari Balakrishnan,et al.  6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .

[15]  Xinwen Fu,et al.  3DLoc: Three Dimensional Wireless Localization Toolkit , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.

[16]  Paramvir Bahl,et al.  RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[17]  Matthew S. Gast,et al.  802.11 Wireless Networks: The Definitive Guide , 2002 .

[18]  Helen J. Wang,et al.  Preserving location privacy in wireless lans , 2007, MobiSys '07.

[19]  Andy Hopper,et al.  The Anatomy of a Context-Aware Application , 1999, Wirel. Networks.

[20]  B. R. Badrinath,et al.  VOR base stations for indoor 802.11 positioning , 2004, MobiCom '04.

[21]  Bart Preneel,et al.  Location privacy in wireless personal area networks , 2006, WiSe '06.

[22]  Eyal de Lara,et al.  Accurate GSM Indoor Localization , 2005, UbiComp.

[23]  Kay Römer The Lighthouse Location System for Smart Dust , 2003, MobiSys '03.

[24]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[25]  Deborah Estrin,et al.  GPS-less low-cost outdoor localization for very small devices , 2000, IEEE Wirel. Commun..

[26]  Yunhao Liu,et al.  LANDMARC: Indoor Location Sensing Using Active RFID , 2004, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[27]  Marco Gruteser,et al.  USENIX Association , 1992 .

[28]  J. Zyren,et al.  Tutorial on Basic Link Budget Analysis , 1998 .

[29]  Tian He,et al.  Realistic Sensing Area Modeling , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[30]  Ling Liu,et al.  Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).