Unveiling Wireless Users' Locations via Modulation Classification-based Passive Attack

πŸ“… 2025-02-26
πŸ“ˆ Citations: 0
✨ Influential: 0
πŸ“„ PDF
πŸ€– AI Summary
This paper addresses location privacy threats arising from the open broadcast nature of wireless communications by proposing a novel passive localization attack. The method pioneers the use of deep learning-based modulation classification to parse downlink MCS tables, enabling construction of a β€œpseudo-ranging ring” that narrows the spatial search space; it further integrates multi-feature geometric modeling of uplink channels to achieve precise line-of-sight (LoS) user localization. Key contributions include: (1) the first modulation-recognition-driven passive localization paradigm; (2) the pseudo-ranging ring mechanism, drastically reducing reliance on specialized hardware and prior knowledge; and (3) a scalable localization framework compatible with digital twin maps. Evaluated on Release 16–20 cellular and WiFi systems, the approach achieves sub-hundred-meter accuracy for LoS users, exposing a pervasive privacy vulnerability across standardized wireless protocols.

Technology Category

Application Category

πŸ“ Abstract
The broadcast nature of the wireless medium and openness of wireless standards, e.g., 3GPP releases 16-20, invite adversaries to launch various active and passive attacks on cellular and other wireless networks. This work identifies one such loose end of wireless standards and presents a novel passive attack method enabling an eavesdropper (Eve) to localize a line of sight wireless user (Bob) who is communicating with a base station or WiFi access point (Alice). The proposed attack involves two phases. In the first phase, Eve performs modulation classification by intercepting the downlink channel between Alice and Bob. This enables Eve to utilize the publicly available modulation and coding scheme (MCS) tables to do pesudo-ranging, i.e., the Eve determines the ring within which Bob is located, which drastically reduces the search space. In the second phase, Eve sniffs the uplink channel, and employs multiple strategies to further refine Bob's location within the ring. Towards the end, we present our thoughts on how this attack can be extended to non-line-of-sight scenarios, and how this attack could act as a scaffolding to construct a malicious digital twin map.
Problem

Research questions and friction points this paper is trying to address.

Localize wireless users passively
Utilize modulation classification for ranging
Refine location through uplink channel analysis
Innovation

Methods, ideas, or system contributions that make the work stand out.

Modulation classification for localization
Pseudo-ranging using MCS tables
Uplink channel sniffing refinement
πŸ”Ž Similar Papers
No similar papers found.
A
Ali Hanif
Department of Electrical and Computer Engineering, CEMSE Division, King Abdullah University of Science and Technology (KAUST), Saudi Arabia
A
Abdulrahman Katranji
Department of Electrical and Computer Engineering, CEMSE Division, King Abdullah University of Science and Technology (KAUST), Saudi Arabia
Nour Kouzayha
Nour Kouzayha
Research Scientist, King Abdullah University of Science and Technology
Stochastic geometryInternet of ThingsWireless communicationsUAVs networks
M
Muhammad Mahboob Ur Rahman
Department of Electrical and Computer Engineering, CEMSE Division, King Abdullah University of Science and Technology (KAUST), Saudi Arabia
T
Tareq Y. Al-Naffouri
Department of Electrical and Computer Engineering, CEMSE Division, King Abdullah University of Science and Technology (KAUST), Saudi Arabia