diff --git a/README.md b/README.md index 17024cdb493e4000a75ccb1d8c52c52682da4cb3..74ac4a6236acb924ddb3705777d5f0e7fd04ecae 100644 --- a/README.md +++ b/README.md @@ -2,12 +2,14 @@ The MITIK project proposal is to carry out non-intrusive passive measurements to analyze the mobility of users through contacts while they are moving. For that, the goal is to use probe request packets from off-the-shelf mobile devices with wireless communication (specifically Wi-Fi). To ensure GPDR compliance, a data anonymization/sanitization process is carried out so that probe requests are received by the _sniffers_ [4]. The system, as a whole, is composed of an architecture that comprises three phases, as shown in Figure 1. -<div style="text-align:center"> -<figure> - <img src="https://gitlab.inria.fr/fmorlano/mitik_management/-/raw/main/Figures/architecture.png" alt="mitik_architecture"/> - <figcaption>Figure 1. Functional architecture of Mitik project [4].</figcaption> -</figure> -</div> + + +<img style="display: block; margin: auto;" +src="https://gitlab.inria.fr/fmorlano/mitik_management/-/raw/main/Figures/architecture.png"> + +<p style="text-align: center;"> +This is an image +</p> The **Sniffing engine** comprises the raw data capture through wireless antennas. Data can be Stored in pcap files or in a trace format defined for all packets captured. Besides that, the data anonymization implements security algorithms on the raw data captured to ensure privacy of the sniffed users. For that, cryptographic algorithms are used to hash and truncate the MAC address of the mobile devices from users. Some developments have been forwarded [1], [2], [5].