Commit b127f30f authored by Mohammad Imran Syed's avatar Mohammad Imran Syed
Browse files


parent a904d8ff
......@@ -18,6 +18,7 @@ The tool takes two traces (in csv or txt format) as input and then performs the
You can use the following tshark command to extract the above mentioned fields from a pcap file.
tshark -r pcap_input_file -Y '!_ws.malformed and' -T fields -E header=y -E separator=/t -e frame.number -e frame.time_epoch -e wlan.fixed.timestamp -e wlan_radio.signal_dbm -e -e wlan.fc.type -e wlan.fc.type_subtype -e wlan.fc.retry -e wlan.fcs -e -e wlan.seq -e wlan.frag > csv_or_txt_output_file
**It is, however, essential to clearly define which data one can sniff depending on the location of the measurement campaign to preserve the privacy of the users. It is also necessary to carry out hashing of MAC addresses to preserve the privacy.**
......@@ -29,10 +30,13 @@ The beacons are the closest representatives of real-time clocks. We use these fr
**How to run to tool:**
It is preferable to use Python3.
Python3 -h will also show you the information on how to operate the tool.
The tool has to positional arguments and those are the two traces:
trace1: trace to be synchronized
trace2: reference trace
- trace1: trace to be synchronized
- trace2: reference trace
There are several optional arguments but you have to tell the tool which one you want to use. You can use only one optional argument at a time. The arguments are given below:
- -U : extract unique frames
- -R : extract unique reference frames
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment