I Always Feel Like Somebody's Sensing Me! A Framework to Detect, Identify, and Localize Clandestine Wireless Sensors

Author(s): Singh, Akash Deep | Advisor(s): Srivastava, Mani B | Abstract: The increasing ubiquity of low-cost wireless sensors in smart homes and buildings has enabled users to easily deploy systems to remotely monitor and control their environments. However, this raises privacy concerns for third-party occupants, such as a hotel room guest who may be unaware of deployed clandestine sensors. Previous methods focused on specific modalities such as detecting cameras but do not provide a generalizable and comprehensive method to capture arbitrary sensors which may be "spying" on a user. In this work, we seek to determine whether one can walk in a room and detect any wireless sensor monitoring an individual. As such, we propose SnoopDog, a framework to not only detect wireless sensors that are actively monitoring a user, but also classify and localize each device. SnoopDog works by establishing causality between patterns in observable wireless traffic and a trusted sensor in the same space, e.g., an inertial measurement unit (IMU) that captures a user's movement. Once causality is established, SnoopDog performs packet inspection to inform the user about the monitoring device. Finally, SnoopDog localizes the clandestine device in a 2D plane using a novel trial-based localization technique. We evaluated SnoopDog across several devices and various modalities and were able to detect causality 96.6% percent of the time, classify suspicious devices with 100% accuracy, and localize devices to a sufficiently reduced sub-space.

[1]  Franck Le,et al.  DeviceMien: network device behavior modeling for identifying unknown IoT devices , 2019, IoTDI.

[2]  Christine Julien,et al.  Comparative evaluation of Received Signal-Strength Index (RSSI) based indoor localization techniques for construction jobsites , 2011, Adv. Eng. Informatics.

[3]  Kevin Wu,et al.  Do You See What I See?Detecting Hidden Streaming Cameras Through Similarity of Simultaneous Observation , 2019, 2019 IEEE International Conference on Pervasive Computing and Communications (PerCom.

[4]  Sebastián García,et al.  Spy vs. Spy: A modern study of microphone bugs operation and detection , 2017 .

[5]  Adi Shamir,et al.  Drones' Cryptanalysis - Smashing Cryptography with a Flicker , 2019, 2019 IEEE Symposium on Security and Privacy (SP).

[6]  Ahmad-Reza Sadeghi,et al.  IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[7]  Jun Huang,et al.  Detecting Wireless Spy Cameras Via Stimulating and Probing , 2018, MobiSys.

[8]  Veton Kepuska,et al.  Next-generation of virtual personal assistants (Microsoft Cortana, Apple Siri, Amazon Alexa and Google Home) , 2018, 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC).

[9]  Yuval Elovici,et al.  ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis , 2017, SAC.

[10]  Haitao Wu,et al.  Footprint: cellular assisted Wi-Fi AP discovery on mobile phones for energy saving , 2009, WINTECH '09.

[11]  Jaap C. Haartsen,et al.  The Bluetooth radio system , 2000, IEEE Personal Communications.

[12]  Cynthia Fraser,et al.  Intimate Partner Violence, Technology, and Stalking , 2007, Violence against women.

[13]  Rajarshi Gupta,et al.  All Things Considered: An Analysis of IoT Devices on Home Networks , 2019, USENIX Security Symposium.

[14]  Jonathan D. Fuller,et al.  Misuse-based detection of Z-Wave network attacks , 2017, Comput. Secur..

[15]  Charles V. Wright,et al.  Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[16]  D. G. Green,et al.  Sinusoidal flicker characteristics of the color-sensitive mechanisms of the eye. , 1969, Vision research.

[17]  H. Haas,et al.  Pedestrian Dead Reckoning : A Basis for Personal Positioning , 2006 .

[18]  S. R. Jondhale,et al.  Issues and challenges in RSSI based target localization and tracking in wireless sensor networks , 2016, 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT).

[19]  Kegen Yu,et al.  Improved Wi-Fi RSSI Measurement for Indoor Localization , 2017, IEEE Sensors Journal.

[20]  Haipeng Li,et al.  I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers , 2019, 2019 IEEE Conference on Communications and Network Security (CNS).

[21]  Nick Feamster,et al.  IoT Inspector: Crowdsourcing Labeled Network Traffic from Smart Home Devices at Scale , 2019, ArXiv.

[22]  Konstantin Beznosov,et al.  Android Rooting: Methods, Detection, and Evasion , 2015, SPSM@CCS.

[23]  Ben Y. Zhao,et al.  Adversarial Localization against Wireless Cameras , 2018, HotMobile.

[24]  Wenyuan Xu,et al.  DeWiCam: Detecting Hidden Wireless Cameras via Smartphones , 2018, AsiaCCS.

[25]  Aaron Striegel,et al.  Is There WiFi Yet?: How Aggressive Probe Requests Deteriorate Energy and Throughput , 2015, Internet Measurement Conference.

[26]  Nick Feamster,et al.  Enhancing Transparency: Internet Video Quality Inference from Network Traffic , 2018 .

[27]  C. Granger Investigating causal relations by econometric models and cross-spectral methods , 1969 .

[28]  Mani Srivastava,et al.  RadHAR: Human Activity Recognition from Point Clouds Generated through a Millimeter-wave Radar , 2019, mmNets.

[29]  Siyang Cao,et al.  Real-Time Human Motion Behavior Detection via CNN Using mmWave Radar , 2019, IEEE Sensors Letters.

[30]  Stephan Wenger,et al.  H.264/AVC over IP , 2003, IEEE Trans. Circuits Syst. Video Technol..

[31]  Ke Gao,et al.  A passive approach to wireless device fingerprinting , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).

[32]  Nick Feamster,et al.  Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping , 2018, Proc. Priv. Enhancing Technol..

[33]  Maurizio Dusi,et al.  Traffic classification through simple statistical fingerprinting , 2007, CCRV.

[34]  Yuxiang Sun,et al.  WiFi signal strength-based robot indoor localization , 2014, 2014 IEEE International Conference on Information and Automation (ICIA).

[35]  Muneer Bani Yassein,et al.  Smart homes automation using Z-wave protocol , 2016, 2016 International Conference on Engineering & MIS (ICEMIS).

[36]  Raheem A. Beyah,et al.  Information Leakage in Encrypted IP Video Traffic , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[37]  Zhiqiang Lin,et al.  Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps , 2019, CCS.