Advertisement

Investigation on Unauthorized Human Activity Watching Through Leveraging Wi-Fi Signals

  • Md Zakirul Alam Bhuiyan
  • Md. Monirul Islam
  • Guojun Wang
  • Tian Wang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11342)

Abstract

Wireless signals, including Wi-Fi signals have become ubiquitous. Recent advancement shows that such signals can be leveraged for many applications including healthcare and people motion monitoring. An interesting question would be what if Wi-Fi signals can also be used in monitoring human activities in unauthorized and unauthenticated manner. In this paper, we study of watching human activities through leveraging Wi-Fi signals and discuss a few application prototypes. These prototypes are used to detect, track, and identify any moving objects, including those behind obstacles using multiple-input Multiple-output (MIMO) technology to calculate the change in frequency reception. We attempt to learn whether or not our Wi-Fi router is not watching our Internet activity as well as physical activities. With all new technologies, one must be aware that unauthorized use of these technology can be used by criminals to their advantage, and we discuss some of the countermeasures to mitigate this risks.

Keywords

Wi-Fi signals Signal compromise Unauthorized human activity monitoring Wi-Fi based security attack Risk 

References

  1. 1.
    Adib, F., Katabi, D.: See through walls with Wi-Fi. In: Proceedings of ACM SIGCOMM 2013, pp. 75–86 (2013)Google Scholar
  2. 2.
    Xin, T., Guo, B., Wang, Z., Li, M., Yu, Z., Zhou, X.: FreeSense: indoor human identification with Wi-Fi signals. In: Proceedings of IEEE GLOBECOM 2016, pp. 1–6 (2016)Google Scholar
  3. 3.
    Wang, G., Zou, Y., Zhou, Z., Wu, K., Ni, L.: We can hear you with Wi-Fi. In: Proceedings of ACM MobiCom, pp. 2907–2920 (2014)Google Scholar
  4. 4.
    Ali, K., Liu, A., Wang, W., Shahzad, M.: Keystroke recognition using Wi-Fi signals. In: Proceedings ACM of MOBICOM, pp. 90–102 (2015)Google Scholar
  5. 5.
    Bennett, J.: Researchers use Wi-Fi to invent real X-ray vision. Popular Mechanics, pp. 1–8 (2017)Google Scholar
  6. 6.
    Atkinson, J., Mitchell, J., Rio, M., Matich, G.: Your WiFi is leaking: what do your mobile apps gossip about you? Future Gener. Comput. Syst. 80, 546–557 (2018)CrossRefGoogle Scholar
  7. 7.
    Jessey, B.: Decrypting TLS, capturing USB, keyloggers, and network graphing. In: Shimonski, R. (ed.) Wireshark\(^{\textregistered }\) for Security Professionals. LNCS, vol. 9999, pp. 199–219. Springer, Heidelberg (2016)Google Scholar
  8. 8.
    Henry, A.: How to Tap Your Network and See Everything that Happens on it. http://lifehacker.com/how-to-tap-your-network-and-see-everything-that-happens-1649292940. Accessed 22 Oct 2017
  9. 9.
    Vanhoef, M., Piessens, F.: Key reinstallation attacks. In: Proceedings of ACM, CCS 2017, pp. 1313–1328 (2017)Google Scholar
  10. 10.
    How to Hack Wi-Fi: Getting Started with the Aircrack-Ng Suite of Wi-Fi Hacking Tools. null-byte.wonderhowto.com/how-to/hack-wi-fi-getting-started-with-aircrack-ng-suite-wi-fi-hacking-tools-0147893/. Accessed 22 Oct 2017
  11. 11.
    M’Raihi, D., Machani, S., Pei, M., Rydell, J.: TOTP: time-based one-time password algorithm. IETF Tools. https://tools.ietf.org/html/rfc6238. Accessed 27 Nov 2017
  12. 12.
    Khang, M.F., Wang, G., Bhuiyan, M., Li, X.: Wi-Fi signal coverage distance estimation in collapsed structures. In: Proceedings of IEEE ISPA 2017, pp. 1–8 (2017)Google Scholar
  13. 13.
    Khang, M.F., Wang, G., Bhuiyan, M., Xing, X.: Towards Wi-Fi radar in collapsed structures. In: Proceedings of IEEE UIC 2018, pp. 1–8 (2018)Google Scholar
  14. 14.
    Khang, M.F., Wang, G., Bhuiyan, M., Xing, X., Tao, P.: Wi-Fi halow signal coverage estimation in collapsed structures. In: Proceedings of IEEE DASC 2018, pp. 1–8 (2018)Google Scholar
  15. 15.
    Wang, T., Bhuiyan, M., Wang, G., Rahman, A., Wu, J., Cao, J.: Big data reduction for smart city’s critical infrastructural health monitoring. IEEE Commun. Mag. 56(3), 128–133 (2018)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  1. 1.Department of Computer and Information SciencesFordham UniversityNew YorkUSA
  2. 2.School of Computer Science and TechnologyGuangzhou UniversityGuangzhouChina
  3. 3.Department of Computer and Information SciencesHuaqiao UniversityQuanzhouChina

Personalised recommendations