Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless &Amp; Mobile Networks 2014
DOI: 10.1145/2627393.2627418
|View full text |Cite
|
Sign up to set email alerts
|

Violating privacy through walls by passive monitoring of radio windows

Abstract: We investigate the ability of an attacker to passively use an otherwise secure wireless network to detect moving people through walls. We call this attack on privacy of people a "monitoring radio windows" (MRW) attack. We design and implement the MRW attack methodology to reliably detect when a person crosses the link lines between the legitimate transmitters and the attack receivers, by using physical layer measurements. We also develop a method to estimate the direction of movement of a person from the seque… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(20 citation statements)
references
References 26 publications
0
20
0
Order By: Relevance
“…PinLoc gathered location dependent CSI value distributions to localize a target with accuracy of several centimeters [23]. MRW used CSI or Received Signal Strength (RSS) values to monitor the presence of human movement behind a concrete wall [4]. CARM used CSI-speed model to extract human movement speeds from CSI signal [31].…”
Section: Activity Recognition Using Wifi Signalsmentioning
confidence: 99%
“…PinLoc gathered location dependent CSI value distributions to localize a target with accuracy of several centimeters [23]. MRW used CSI or Received Signal Strength (RSS) values to monitor the presence of human movement behind a concrete wall [4]. CARM used CSI-speed model to extract human movement speeds from CSI signal [31].…”
Section: Activity Recognition Using Wifi Signalsmentioning
confidence: 99%
“…Similarly, an earlier work [17] detects the presence of a user when she disturbs the direct path between a WiFi access point (AP) and a sniffer. Again, the attacker must obtain AP locations a priori, and must deploy multiple sniffers around the target area to detect user presence (see Figure 1b).…”
Section: Active Sensingmentioning
confidence: 99%
“…Along these lines, our proposed attack only requires a single commodity WiFi receiver (with a single antenna) outside of the target area ( Figure 1c). As we will explain in §IV, this is made possible by building a new model to detect motion using dynamics of multipath signal propagation from each anchor to the sniffer, rather than those of the direct path as in [63], [17].…”
Section: Key Observationmentioning
confidence: 99%
See 2 more Smart Citations