Non-cooperative wi-fi localization and its privacy implications

Ali Abedi, Deepak Vasisht

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We present Wi-Peep-a new location-revealing privacy attack on non-cooperative Wi-Fi devices. Wi-Peep exploits loopholes in the 802.11 protocol to elicit responses from Wi-Fi devices on a network that we do not have access to. It then uses a novel time-of-flight measurement scheme to locate these devices. Wi-Peep works without any hardware or software modifications on target devices and without requiring access to the physical space that they are deployed in. Therefore, a pedestrian or a drone that carries a Wi-Peep device can estimate the location of every Wi-Fi device in a building. Our Wi-Peep design costs $20 and weighs less than 10 g. We deploy it on a lightweight drone and show that a drone flying over a house can estimate the location of Wi-Fi devices across multiple floors to meter-level accuracy. Finally, we investigate different mitigation techniques to secure future Wi-Fi devices against such attacks.

Original languageEnglish (US)
Title of host publicationACM MobiCom 2022 - Proceedings of the 2022 28th Annual International Conference on Mobile Computing and Networking
PublisherAssociation for Computing Machinery
Pages570-582
Number of pages13
ISBN (Electronic)9781450391818
DOIs
StatePublished - Oct 14 2022
Event28th ACM Annual International Conference on Mobile Computing and Networking, MobiCom 2022 - Sydney, Australia
Duration: Oct 17 2202Oct 21 2202

Publication series

NameProceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM

Conference

Conference28th ACM Annual International Conference on Mobile Computing and Networking, MobiCom 2022
Country/TerritoryAustralia
CitySydney
Period10/17/0210/21/02

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Software

Fingerprint

Dive into the research topics of 'Non-cooperative wi-fi localization and its privacy implications'. Together they form a unique fingerprint.

Cite this