Quantifying Interference-Assisted Signal Strength Surveillance of Sound Vibrations

作者: Neal Patwari , Sneha Kumar Kasera , Alemayehu Solomon Abrar

DOI:

关键词:

摘要: A malicious attacker could, by taking control of internet-of-things devices, use them to capture received signal strength (RSS) measurements and perform surveillance on a person's vital signs, activities, sound in their environment. This article considers an who looks for subtle changes the RSS order eavesdrop vibrations. The challenge adversary is that vibrations cause very low amplitude RSS, typically quantized with significantly larger step size. contributes lower bound attacker's monitoring performance as function size sampling frequency so designer can understand relationship. Our little-known counter-intuitive fact improve sinusoidal parameter estimates making some devices transmit add interference power into measurements. We demonstrate this capability experimentally. As we show, typical transceivers, monitor remarkable accuracy. New mitigation strategies will be required prevent attacks.

参考文章(33)
Guevara Noubir, On connectivity in ad hoc networks under jamming using directional antennas and mobility wired wireless internet communications. pp. 186- 200 ,(2004) , 10.1007/978-3-540-24643-5_17
Xiaohua Li, E.P. Ratazzi, MIMO transmissions with information-theoretic secrecy for secret-key agreement in wireless networks military communications conference. pp. 1353- 1359 ,(2005) , 10.1109/MILCOM.2005.1605866
Ruth Ravichandran, Elliot Saba, Ke-Yu Chen, Mayank Goel, Sidhant Gupta, Shwetak N. Patel, WiBreathe: Estimating respiration rate using wireless signals in natural settings in the home ieee international conference on pervasive computing and communications. pp. 131- 139 ,(2015) , 10.1109/PERCOM.2015.7146519
Jian Liu, Yan Wang, Yingying Chen, Jie Yang, Xu Chen, Jerry Cheng, Tracking Vital Signs During Sleep Leveraging Off-the-shelf WiFi mobile ad hoc networking and computing. pp. 267- 276 ,(2015) , 10.1145/2746285.2746303
Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi, Kevin Fu, They can hear your heartbeats: non-invasive security for implantable medical devices acm special interest group on data communication. ,vol. 41, pp. 2- 13 ,(2011) , 10.1145/2018436.2018438
Stephan Sigg, Ulf Blanke, Gerhard Troster, The telepathic phone: Frictionless activity recognition from WiFi-RSSI ieee international conference on pervasive computing and communications. pp. 148- 155 ,(2014) , 10.1109/PERCOM.2014.6813955
D. Rife, R. Boorstyn, Single tone parameter estimation from discrete-time observations IEEE Transactions on Information Theory. ,vol. 20, pp. 591- 598 ,(1974) , 10.1109/TIT.1974.1055282
Ossi Kaltiokallio, Maurizio Bocca, Neal Patwari, Follow @grandma: Long-term device-free localization for residential monitoring 37th Annual IEEE Conference on Local Computer Networks -- Workshops. pp. 991- 998 ,(2012) , 10.1109/LCNW.2012.6424092
Kamran Ali, Alex X. Liu, Wei Wang, Muhammad Shahzad, Keystroke Recognition Using WiFi Signals acm/ieee international conference on mobile computing and networking. pp. 90- 102 ,(2015) , 10.1145/2789168.2790109
A. Tomko, C. Rieser, L. Buell, Physical-Layer Intrusion Detection in Wireless Networks military communications conference. pp. 1040- 1046 ,(2006) , 10.1109/MILCOM.2006.302476