1,059 research outputs found

    Fingerprinting Smart Devices Through Embedded Acoustic Components

    Full text link
    The widespread use of smart devices gives rise to both security and privacy concerns. Fingerprinting smart devices can assist in authenticating physical devices, but it can also jeopardize privacy by allowing remote identification without user awareness. We propose a novel fingerprinting approach that uses the microphones and speakers of smart phones to uniquely identify an individual device. During fabrication, subtle imperfections arise in device microphones and speakers which induce anomalies in produced and received sounds. We exploit this observation to fingerprint smart devices through playback and recording of audio samples. We use audio-metric tools to analyze and explore different acoustic features and analyze their ability to successfully fingerprint smart devices. Our experiments show that it is even possible to fingerprint devices that have the same vendor and model; we were able to accurately distinguish over 93% of all recorded audio clips from 15 different units of the same model. Our study identifies the prominent acoustic features capable of fingerprinting devices with high success rate and examines the effect of background noise and other variables on fingerprinting accuracy

    The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis

    Full text link
    In recent years, mobile devices (e.g., smartphones and tablets) have met an increasing commercial success and have become a fundamental element of the everyday life for billions of people all around the world. Mobile devices are used not only for traditional communication activities (e.g., voice calls and messages) but also for more advanced tasks made possible by an enormous amount of multi-purpose applications (e.g., finance, gaming, and shopping). As a result, those devices generate a significant network traffic (a consistent part of the overall Internet traffic). For this reason, the research community has been investigating security and privacy issues that are related to the network traffic generated by mobile devices, which could be analyzed to obtain information useful for a variety of goals (ranging from device security and network optimization, to fine-grained user profiling). In this paper, we review the works that contributed to the state of the art of network traffic analysis targeting mobile devices. In particular, we present a systematic classification of the works in the literature according to three criteria: (i) the goal of the analysis; (ii) the point where the network traffic is captured; and (iii) the targeted mobile platforms. In this survey, we consider points of capturing such as Wi-Fi Access Points, software simulation, and inside real mobile devices or emulators. For the surveyed works, we review and compare analysis techniques, validation methods, and achieved results. We also discuss possible countermeasures, challenges and possible directions for future research on mobile traffic analysis and other emerging domains (e.g., Internet of Things). We believe our survey will be a reference work for researchers and practitioners in this research field.Comment: 55 page

    Analysis and evaluation of Wi-Fi indoor positioning systems using smartphones

    Get PDF
    This paper attempts to analyze the main algorithms used in Machine Learning applied to the indoor location. New technologies are facing new challenges. Satellite positioning has become a typical application of mobile phones, but stops working satisfactorily in enclosed spaces. Currently there is a problem in positioning which is unresolved. This circumstance motivates the research of new methods. After the introduction, the first chapter presents current methods of positioning and the problem of positioning indoors. This part of the work shows globally the current state of the art. It mentions a taxonomy that helps classify the different types of indoor positioning and a selection of current commercial solutions. The second chapter is more focused on the algorithms that will be analyzed. It explains how the most widely used of Machine Learning algorithms work. The aim of this section is to present mathematical algorithms theoretically. These algorithms were not designed for indoor location but can be used for countless solutions. In the third chapter, we learn gives tools work: Weka and Python. the results obtained after thousands of executions with different algorithms and parameters showing main problems of Machine Learning shown. In the fourth chapter the results are collected and the conclusions drawn are shown

    A Meta-Review of Indoor Positioning Systems

    Get PDF
    An accurate and reliable Indoor Positioning System (IPS) applicable to most indoor scenarios has been sought for many years. The number of technologies, techniques, and approaches in general used in IPS proposals is remarkable. Such diversity, coupled with the lack of strict and verifiable evaluations, leads to difficulties for appreciating the true value of most proposals. This paper provides a meta-review that performed a comprehensive compilation of 62 survey papers in the area of indoor positioning. The paper provides the reader with an introduction to IPS and the different technologies, techniques, and some methods commonly employed. The introduction is supported by consensus found in the selected surveys and referenced using them. Thus, the meta-review allows the reader to inspect the IPS current state at a glance and serve as a guide for the reader to easily find further details on each technology used in IPS. The analyses of the meta-review contributed with insights on the abundance and academic significance of published IPS proposals using the criterion of the number of citations. Moreover, 75 works are identified as relevant works in the research topic from a selection of about 4000 works cited in the analyzed surveys

    Indoor Positioning for Monitoring Older Adults at Home: Wi-Fi and BLE Technologies in Real Scenarios

    Get PDF
    This paper presents our experience on a real case of applying an indoor localization system formonitoringolderadultsintheirownhomes. Sincethesystemisdesignedtobeusedbyrealusers, therearemanysituationsthatcannotbecontrolledbysystemdevelopersandcanbeasourceoferrors. This paper presents some of the problems that arise when real non-expert users use localization systems and discusses some strategies to deal with such situations. Two technologies were tested to provide indoor localization: Wi-Fi and Bluetooth Low Energy. The results shown in the paper suggest that the Bluetooth Low Energy based one is preferable in the proposed task

    Wi-Fi Fingerprinting for Indoor Positioning

    Get PDF
    Wireless Fidelity (Wi-Fi) Fingerprinting is a remarkable approach developed by modern science to detect the user’s location efficiently. Today, the Global Positioning System (GPS) is used to keep track of our current location for outdoor positioning. In GPS technology, satellite signals cannot reach indoor environments as they are shielded from obstructions so that indoor environments with a lack of Line of Sight (LoS) do not provide enough satellite signal accuracy. Since indoor environments are very difficult to track, thus, a wide variety of techniques for dealing with them have been suggested. The best way to offer an indoor positioning service with the current technology is Wi-Fi since the most commercial infrastructure is well equipped with Wi-Fi routers. For indoor positioning systems (IPS), Wi-Fi fingerprinting approaches are being extremely popular. In this paper, all the approaches for Wi-Fi fingerprinting have been reviewed for indoor position localization. Related to Wi-Fi fingerprinting, most of the algorithms have been interpreted and the previous works of other researchers have been critically analyzed in this paper to get a clear view of the Wi-Fi fingerprinting process

    IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT

    Full text link
    With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT devices have become prominent. Several vendors are producing IP-connected devices for home and small office networks that often suffer from flawed security designs and implementations. They also tend to lack mechanisms for firmware updates or patches that can help eliminate security vulnerabilities. Securing networks where the presence of such vulnerable devices is given, requires a brownfield approach: applying necessary protection measures within the network so that potentially vulnerable devices can coexist without endangering the security of other devices in the same network. In this paper, we present IOT SENTINEL, a system capable of automatically identifying the types of devices being connected to an IoT network and enabling enforcement of rules for constraining the communications of vulnerable devices so as to minimize damage resulting from their compromise. We show that IOT SENTINEL is effective in identifying device types and has minimal performance overhead
    • …
    corecore