Proceedings 2020 Network and Distributed System Security Symposium 2020
DOI: 10.14722/ndss.2020.23053
|View full text |Cite
|
Sign up to set email alerts
|

Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors

Abstract: Our work demonstrates a new set of silent reconnaissance attacks, which leverages the presence of commodity WiFi devices to track users inside private homes and offices, without compromising any WiFi network, data packets, or devices. We show that just by sniffing existing WiFi signals, an adversary can accurately detect and track movements of users inside a building. This is made possible by our new signal model that links together human motion near WiFi transmitters and variance of multipath signal propagati… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
42
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(52 citation statements)
references
References 78 publications
0
42
0
Order By: Relevance
“…With a particular focus on privacy violations, Banerjee et al [5] and Zhu et al [32] studied Wi-Fi-based physicallayer attacks to infer human motion from channel observations by eavesdropping packets. In both papers, the authors utilized a sliding-window standard deviation or variance as a measure of temporal channel variation.…”
Section: B Smart Radio Environmentsmentioning
confidence: 99%
See 3 more Smart Citations
“…With a particular focus on privacy violations, Banerjee et al [5] and Zhu et al [32] studied Wi-Fi-based physicallayer attacks to infer human motion from channel observations by eavesdropping packets. In both papers, the authors utilized a sliding-window standard deviation or variance as a measure of temporal channel variation.…”
Section: B Smart Radio Environmentsmentioning
confidence: 99%
“…In both papers, the authors utilized a sliding-window standard deviation or variance as a measure of temporal channel variation. While [5] focused on detecting LOS crossings, [32] pursues monitoring of entire environments for motion, including differentiation of motion in specific parts of the target environment. The authors of [5] employed Wi-Fi routers with MIMO functionality to implement the attack and [32] presented a smartphone-based implementation.…”
Section: B Smart Radio Environmentsmentioning
confidence: 99%
See 2 more Smart Citations
“…As RSS is the combination of many subcarriers, this gives a fairly poor resolution when examining the environments effect on the channel state. CSI is conventionally used to improve the reliability of communication, but being able to view subcarrier level effects caused by the environment has led to improvements in the fields of localization [41,43,47], device-free activity recognition [13,28,48], fall detection and health monitoring [46], smartphone gesture recognition [30], and cross-technology communication [16].…”
Section: Technical Backgroundmentioning
confidence: 99%