Aegis: An Interference-Negligible RF Sensing Shield

Researchers have demonstrated the feasibility of detecting human motion behind the wall with radio frequency (RF) sensing techniques. With these techniques, an eavesdropper can monitor people's behavior from outside of the room without the need to access the room. This introduces a severe privacy-leakage issue. To address this issue, we propose Aegis, an interference-negligible RF sensing shield that i) incapacitates the RF sensing of eavesdroppers that work at any unknown locations outside of the protected area; ii) has minimum interference to the ongoing WiFi communication; and iii) preserves authorized RF sensing inside the private region. Our extensive evaluation shows that when Aegis is activated, it i) has a negligible impact on the legitimate sensing system; ii) effectively prevents the illegitimate sensing system from sensing human motions. Moreover, the ongoing data communication throughput is even increased.

[1]  Bo Yang,et al.  Multi-target device-free tracking using radio frequency tomography , 2011, 2011 Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing.

[2]  Jie Xiong,et al.  ArrayTrack: A Fine-Grained Indoor Location System , 2011, NSDI.

[3]  Wei Wang,et al.  Understanding and Modeling of WiFi Signal Based Human Activity Recognition , 2015, MobiCom.

[4]  Kaishun Wu,et al.  WiFall: Device-free fall detection by wireless networks , 2017, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[5]  Wei Xu,et al.  Context-Centric Target Localization with Optimal Anchor Deployments , 2015, 2015 IEEE 23rd International Conference on Network Protocols (ICNP).

[6]  Jin Zhang,et al.  WiFi-ID: Human Identification Using WiFi Signal , 2016, 2016 International Conference on Distributed Computing in Sensor Systems (DCOSS).

[7]  Shwetak N. Patel,et al.  Whole-home gesture recognition using wireless signals , 2013, MobiCom.

[8]  Donald F. Towsley,et al.  A secure energy routing mechanism for sharing renewable energy in smart microgrid , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[9]  Jie Yang,et al.  E-eyes: device-free location-oriented activity identification using fine-grained WiFi signatures , 2014, MobiCom.

[10]  Fadel Adib,et al.  See through walls with WiFi! , 2013, SIGCOMM.

[11]  Wei Wang,et al.  Keystroke Recognition Using WiFi Signals , 2015, MobiCom.

[12]  Jie Xiong,et al.  Phaser: enabling phased array signal processing on commodity WiFi access points , 2014, MobiCom.

[13]  Ossi Kaltiokallio,et al.  Non-invasive respiration rate monitoring using a single COTS TX-RX pair , 2014, IPSN-14 Proceedings of the 13th International Symposium on Information Processing in Sensor Networks.

[14]  Khaled A. Harras,et al.  WiGest demo: A ubiquitous WiFi-based gesture recognition system , 2015, 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[15]  Imrich Chlamtac,et al.  Indoor location tracking using RSSI readings from a single Wi-Fi access point , 2007, Wirel. Networks.

[16]  Wei Xu,et al.  Fingerprint-free tracking with dynamic enhanced field division , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[17]  Sukhan Lee,et al.  Indoor human localization with orientation using WiFi fingerprinting , 2014, ICUIMC.

[18]  Wei Xu,et al.  A Three-Dimensional Wireless Indoor Localization System , 2014, J. Electr. Comput. Eng..

[19]  Ting Zhu,et al.  Using Wi-Fi Signals to Characterize Human Gait for Identification and Activity Monitoring , 2016, 2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE).

[20]  Kate Ching-Ju Lin,et al.  WiFi action recognition via vision-based methods , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[21]  Frédo Durand,et al.  Capturing the human figure through a wall , 2015, ACM Trans. Graph..

[22]  Ming Yu,et al.  NIS02-4: A Secure Quality of Service Routing Protocol for Wireless Ad Hoc Networks , 2006, IEEE Globecom 2006.

[23]  Jianhua Li,et al.  Green firewall: An energy-efficient intrusion prevention mechanism in wireless sensor network , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[24]  Youngwook Kim,et al.  Human Activity Classification Based on Micro-Doppler Signatures Using a Support Vector Machine , 2009, IEEE Transactions on Geoscience and Remote Sensing.

[25]  Jianhua Li,et al.  A denial of service attack in advanced metering infrastructure network , 2014, 2014 IEEE International Conference on Communications (ICC).

[26]  Dan Wang,et al.  Tracking with Unreliable Node Sequences , 2009, IEEE INFOCOM 2009.

[27]  Ting Zhu,et al.  Shepherd: sharing energy for privacy preserving in hybrid AC-DC microgrids , 2016, e-Energy.

[28]  Kannan Srinivasan,et al.  PhyCloak: Obfuscating Sensing from Communication Signals , 2016, USENIX Annual Technical Conference.

[29]  Peng Zhang,et al.  A traffic anomaly detection approach in communication networks for applications of multimedia medical devices , 2016, Multimedia Tools and Applications.

[30]  Gerhard Tröster,et al.  The telepathic phone: Frictionless activity recognition from WiFi-RSSI , 2014, 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[31]  Ting Zhu,et al.  Harmony: Exploiting coarse-grained received signal strength from IoT devices for human activity recognition , 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP).

[32]  Ting Zhu,et al.  Gait-Based Wi-Fi Signatures for Privacy-Preserving , 2016, AsiaCCS.

[33]  Khaled A. Harras,et al.  Wigest: A Ubiquitous Wifi-based Gesture Recognition System , 2014 .

[34]  Donald F. Towsley,et al.  Reliability analysis for cryptographic key management , 2014, 2014 IEEE International Conference on Communications (ICC).