From 5bf09d354521a5c25b6f5cd1ab4911ebcb230251 Mon Sep 17 00:00:00 2001 From: MOLANO ORTIZ Fernando <fernando.molano-ortiz@inria.fr> Date: Sat, 11 May 2024 12:32:04 +0200 Subject: [PATCH] Update file README.md --- README.md | 14 ++++++++------ 1 file changed, 8 insertions(+), 6 deletions(-) diff --git a/README.md b/README.md index 17024cd..74ac4a6 100644 --- a/README.md +++ b/README.md @@ -2,12 +2,14 @@ The MITIK project proposal is to carry out non-intrusive passive measurements to analyze the mobility of users through contacts while they are moving. For that, the goal is to use probe request packets from off-the-shelf mobile devices with wireless communication (specifically Wi-Fi). To ensure GPDR compliance, a data anonymization/sanitization process is carried out so that probe requests are received by the _sniffers_ [4]. The system, as a whole, is composed of an architecture that comprises three phases, as shown in Figure 1. -<div style="text-align:center"> -<figure> - <img src="https://gitlab.inria.fr/fmorlano/mitik_management/-/raw/main/Figures/architecture.png" alt="mitik_architecture"/> - <figcaption>Figure 1. Functional architecture of Mitik project [4].</figcaption> -</figure> -</div> + + +<img style="display: block; margin: auto;" +src="https://gitlab.inria.fr/fmorlano/mitik_management/-/raw/main/Figures/architecture.png"> + +<p style="text-align: center;"> +This is an image +</p> The **Sniffing engine** comprises the raw data capture through wireless antennas. Data can be Stored in pcap files or in a trace format defined for all packets captured. Besides that, the data anonymization implements security algorithms on the raw data captured to ensure privacy of the sniffed users. For that, cryptographic algorithms are used to hash and truncate the MAC address of the mobile devices from users. Some developments have been forwarded [1], [2], [5]. -- GitLab