2021
DOI: 10.3390/s21165665
|View full text |Cite
|
Sign up to set email alerts
|

Physical Tampering Detection Using Single COTS Wi-Fi Endpoint

Abstract: This paper proposes a practical physical tampering detection mechanism using inexpensive commercial off-the-shelf (COTS) Wi-Fi endpoint devices with a deep neural network (DNN) on channel state information (CSI) in the Wi-Fi signals. Attributed to the DNN that identifies physical tampering events due to the multi-subcarrier characteristics in CSI, our methodology takes effect using only one COTS Wi-Fi endpoint with a single embedded antenna to detect changes in the relative orientation between the Wi-Fi infras… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(12 citation statements)
references
References 40 publications
0
2
0
Order By: Relevance
“…For passive positioning systems, the AP-Sniffer network is specifically designed for positioning so the physical locations must be robust to physical tampering to ensure optimal Wi-Fi-based positioning. The method of previous studies [ 39 , 40 , 41 ], which monitors abnormal CSI waveforms, can be used by this study to detect any physical tampering with Sniffers to maintain good performance.…”
Section: Discussionmentioning
confidence: 99%
“…For passive positioning systems, the AP-Sniffer network is specifically designed for positioning so the physical locations must be robust to physical tampering to ensure optimal Wi-Fi-based positioning. The method of previous studies [ 39 , 40 , 41 ], which monitors abnormal CSI waveforms, can be used by this study to detect any physical tampering with Sniffers to maintain good performance.…”
Section: Discussionmentioning
confidence: 99%
“…A mildly related work is also [19], where the authors goal is to identify attacks against the Wi-Fi sensing infrastructure using CSI-based analysis. The goal of the paper is clearly different from sensing obfuscation; however, they introduce and discuss techniques to monitor and protect Wi-Fi infrastructures, which is an important topic also to move further on to systems that allow legitimate Wi-Fi sensing and prevent illegitimate use.…”
Section: Related Workmentioning
confidence: 99%
“…It is essential to note that protection against non-invasive attacks begins during the device's design and construction phase. Designers take specific measures to protect the device and prevent such attacks [11]. This paper provides a comprehensive review of the scientific literature and patents describing hardware-based protection methods against invasive and non-invasive attacks.…”
Section: Introductionmentioning
confidence: 99%