On Detecting Hidden Wireless Cameras: A Traffic Pattern-based Approach

Wireless cameras are widely deployed in surveillance systems for security guarding. However, the privacy concerns associated with unauthorized videotaping, are drawing increasing attention recently. Existing detection methods for unauthorized wireless cameras are either limited by their detection accuracy or requiring dedicated devices. In this paper, we propose <monospace>DeWiCam</monospace>, a lightweight and effective detection mechanism using smartphones. The basic idea of <monospace>DeWiCam</monospace> is to utilize the intrinsic traffic patterns of flows from wireless cameras. Compared with traditional traffic pattern analysis, <monospace>DeWiCam</monospace> is more challenging because it cannot access the encrypted information in the data packets. Yet, <monospace>DeWiCam</monospace> overcomes the difficulty and can detect nearby wireless cameras reliably. To further identify whether a camera is in an interested room, we propose a human-assisted identification model. Extension functions of <monospace>DeWiCam</monospace> further enable the video resolution and audio channel inference to provide extra protection. We implemented <monospace>DeWiCam</monospace> on the Android platform and evaluated it with extensive experiments on 20 cameras. The evaluation results show that <monospace>DeWiCam</monospace> can detect cameras with an accuracy of 99 percent within <inline-formula><tex-math notation="LaTeX">$2.7\;\mathrm {s}$</tex-math><alternatives><mml:math><mml:mrow><mml:mn>2</mml:mn><mml:mo>.</mml:mo><mml:mn>7</mml:mn><mml:mspace width="0.277778em"/><mml:mi mathvariant="normal">s</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href="cheng-ieq1-2900919.gif"/></alternatives></inline-formula>.

[1]  David J. Crandall,et al.  PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces , 2014, NDSS.

[2]  Ashwin Ashok,et al.  Do not share!: invisible light beacons for signaling preferences to privacy-respecting cameras , 2014, VLCS@MobiCom.

[3]  Pierre Geurts,et al.  Extremely randomized trees , 2006, Machine Learning.

[4]  Xiaodong Lin,et al.  Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems , 2009, IEEE Journal on Selected Areas in Communications.

[5]  Louis Dunn Fielder,et al.  ISO/IEC MPEG-2 Advanced Audio Coding , 1997 .

[6]  Andrew W. Moore,et al.  A Machine Learning Approach for Efficient Traffic Classification , 2007, 2007 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems.

[7]  H. Lilliefors On the Kolmogorov-Smirnov Test for Normality with Mean and Variance Unknown , 1967 .

[8]  Wenyuan Xu,et al.  DeWiCam: Detecting Hidden Wireless Cameras via Smartphones , 2018, AsiaCCS.

[9]  Dario Rossi,et al.  Revealing skype traffic: when randomness plays with you , 2007, SIGCOMM '07.

[10]  A. M. Abdullah,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .

[11]  Danny Bradbury Hacking wifi the easy way , 2011, Netw. Secur..

[12]  Shuang-Hua Yang,et al.  Ipb-frame adaptive mapping mechanism for video transmission over IEEE 802.11e WLANs , 2014, CCRV.

[13]  Heiko Schwarz,et al.  Overview of the Scalable Video Coding Extension of the H.264/AVC Standard , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[14]  Sebastian Zander,et al.  A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification , 2006, CCRV.

[15]  Giuseppe Anastasi,et al.  QoS provided by the IEEE 802.11 wireless LAN to advanced data applications: a simulation analysis , 2000, Wirel. Networks.

[16]  Jun Huang,et al.  Detecting Wireless Spy Cameras Via Stimulating and Probing , 2018, MobiSys.

[17]  Minqiang Jiang,et al.  Improved frame-layer rate control for H.264 using MAD ratio , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[18]  Marco Mellia,et al.  Revealing skype traffic: when randomness plays with you , 2007, SIGCOMM 2007.

[19]  Chi Zhang,et al.  Automating Visual Privacy Protection Using a Smart LED , 2017, MobiCom.

[20]  Arash Habibi Lashkari,et al.  A survey on wireless security protocols (WEP, WPA and WPA2/802.11i) , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[21]  David J. Crandall,et al.  Enhancing Lifelogging Privacy by Detecting Screens , 2016, CHI.