1 Yue Qiao, Ouyang Zhang, Wenjie Zhou, Kannan Srinivasan and Anish Arora Department of Computer Science and Engineering PhyCloak: Obfuscating Sensing from.

Slides:



Advertisements
Similar presentations
Chorus: Collision Resolution for Efficient Wireless Broadcast Xinyu Zhang, Kang G. Shin University of Michigan 1.
Advertisements

Analog Network Coding Sachin Katti Shyamnath Gollakota and Dina Katabi.
Whole-Home Gesture Recognition Using Wireless Signals —— MobiCom’13 Author: Qifan Pu et al. University of Washington Presenter: Yanyuan Qin & Zhitong Fei.
BBN: Throughput Scaling in Dense Enterprise WLANs with Blind Beamforming and Nulling Wenjie Zhou (Co-Primary Author), Tarun Bansal (Co-Primary Author),
MIMO As a First-Class Citizen in Kate C.-J. Lin Academia Sinica Shyamnath Gollakota and Dina Katabi MIT.
Network Coding Testbed Using Software-Defined Radio Abstract In current generation networks, network nodes operate by replicating and forwarding the packets.
Interference Centric Wireless Networks Sachin Katti Assistant Professor EE&CS, Stanford University.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Leveraging Interleaved Signal Edges for Concurrent Backscatter by Pan Hu, Pengyu.
FHSS vs. DSSS Presented by Ali Alhajhouj. Presentation Outline Introduce the issues involved in the system behaviors for FHSS and DSSS systems used in.
Topology Control for Effective Interference Cancellation in Multi-User MIMO Networks E. Gelal, K. Pelechrinis, T.S. Kim, I. Broustis Srikanth V. Krishnamurthy,
University of Kansas Department of Electrical Engineering and Computer Science 1 Radar Systems and Remote Sensing Lab Information and Telecommunication.
Turbocharging Ambient Backscatter Communication Aaron Parks Angli Liu Shyamnath Gollakota Joshua R. Smith 1.
Volkan Cevher, Marco F. Duarte, and Richard G. Baraniuk European Signal Processing Conference 2008.
7: MIMO I: Spatial Multiplexing and Channel Modeling Fundamentals of Wireless Communication, Tse&Viswanath 1 7. MIMO: Spatial Multiplexing and Channel.
#7 1 Victor S. Frost Dan F. Servey Distinguished Professor Electrical Engineering and Computer Science University of Kansas 2335 Irving Hill Dr. Lawrence,
Distance-decreasing attack in GPS Final Presentation Horacio Arze Prof. Jean-Pierre Hubaux Assistant: Marcin Poturalski January 2009 Security and Cooperation.
DAC: Distributed Asynchronous Cooperation for Wireless Relay Networks 1 Xinyu Zhang, Kang G. Shin University of Michigan.
DAISY Data Analysis and Information SecuritY Lab
Wireless communication channel
Muhammad Imadur Rahman1, Klaus Witrisal2,
Multiantenna-Assisted Spectrum Sensing for Cognitive Radio
RCTC: Rapid Concurrent Transmission Coordination in Full Duplex Wireless Networks Wenjie Zhou, Kannan Srinivasan, Prasun Sinha Department of Computer Science.
King Fahd University of Petroleum & Minerals  Electrical Engineering Department EE 578 Simulation of Wireless Systems Code Division Multiple Access Transmission.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
RobinHood: Sharing the Happiness in a Wireless Jungle Tarun Bansal, Wenjie Zhou, Kannan Srinivasan and Prasun Sinha Department of Computer Science and.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Cooperative Molecular Communication for Nanonetwork Liang Hong 1, Wei Chen 1, Feng Liu 2 1 College of Engineering, Tennessee State University, U.S.A. 2.
Full-duplex Backscatter for
1 Cooperative Wireless Networking Elza Erkip Department of Electrical and Computer Engineering Polytechnic Institute of New York University.
AutoMAC : Rateless Wireless Concurrent Medium Access Aditya Gudipati, Stephanie Pereira, Sachin Katti Stanford University.
Symphony: Orchestrating Collisions in Enterprise Wireless Networks Tarun Bansal (Co-Primary Author), Bo Chen (Co-Primary Author), Prasun Sinha and Kannan.
MZig: Enabling Multi-Packet Reception in ZigBee Linghe Kong, Xue Liu McGill University MobiCom 2015.
Support WiFi and LTE Co-existence
BBN: Throughput Scaling in Dense Enterprise WLANs with Blind Beamforming and Nulling Wenjie Zhou (Co-Primary Author), Tarun Bansal (Co-Primary Author),
1 Yue Qiao Computer Science and Engineering Sep AirExpress: Enabling Seamless In-band.
EELE 5490, Fall, 2009 Wireless Communications Ali S. Afana Department of Electrical Engineering Class 5 Dec. 4 th, 2009.
May 7, 2014, Florence, Italy Retrospective Interference Alignment for the 3-user MIMO Interference Channel with.
Multiuser Detection (MUD) Combined with array signal processing in current wireless communication environments Wed. 박사 3학기 구 정 회.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
Securing Wireless Medical Implants Shyamnath Gollakota Haitham Hassanieh Benjamin Ransford Dina Katabi Kevin Fu.
S MART A NTENNA B.GANGADHAR 08QF1A1209. ABSTRACT One of the most rapidly developing areas of communications is “Smart Antenna” systems. This paper deals.
ECE External Research Board Meeting Wireless Network and Communications Tan F. Wong Wireless Information and Networking Group
1 Blind Channel Identification and Equalization in Dense Wireless Sensor Networks with Distributed Transmissions Xiaohua (Edward) Li Department of Electrical.
SenProbe: Path Capacity Estimation in Wireless Sensor Networks Tony Sun, Ling-Jyh Chen, Guang Yang M. Y. Sanadidi, Mario Gerla.
Center for Excellence in Engineering Education Photonic Generation of Millimeter Wave Signals for Wireless Applications Mehdi Shadaram Department of Electrical.
Multiuser Receiver Aware Multicast in CDMA-based Multihop Wireless Ad-hoc Networks Parmesh Ramanathan Department of ECE University of Wisconsin-Madison.
Interference in MANETs: Friend or Foe? Andrea Goldsmith
Mayank Jain, Jung Il Choi Tae Min Kim, Dinesh Bharadia, Siddharth Seth, Kannan Srinivasan, Philip Levis, Sachin Katti, Prasn Sinha MobiCom 2011.
mZig: Enabling Multi-Packet Reception in ZigBee
A Simple Transmit Diversity Technique for Wireless Communications -M
A Reliability-oriented Transmission Service in Wireless Sensor Networks Yunhuai Liu, Yanmin Zhu and Lionel Ni Computer Science and Engineering Hong Kong.
Acoustic Eavesdropping through Wireless Vibrometry University of Wisconsin – Madison, Chinese Academy of Sciences School of Electronic Information and.
Mobicom 2015 Paper Discussion Wenguang Mao. Wireless Sensing Detect the location/motion/gesture/shape information of a human/object based on a variety.
Security Vulnerability and Countermeasures of Frequency Offset Correction in a Systems Hanif Rahbari, Marwan Krunz, and Loukas Lazos Department of.
Teng Wei and Xinyu Zhang
B2W2 N-Way Concurrent Communication for IoT Devices
Achieving Single Channel, Full Duplex Wireless Communication
Practical, Real-time, Full Duplex Wireless
Full Duplex Benefits and Challenges
Characterizations and Modeling of the Wireless Channel
Channel Spoofer: Defeating Channel Variability and Unpredictability
Null Space Learning in MIMO Systems
Underwater wireless communication
Intelligent Antenna Sharing in Wireless Networks
Acoustic Eavesdropping through Wireless Vibrometry
Keystroke Recognition using Wi-Fi Signals
Denial-of-Service Jammer Detector Training Course Worldsensing
Achieving Single Channel, Full Duplex Wireless Communication
Full Duplex Benefits and Challenges
Terminologies in Wireless Communication Group Members Munib Ahmed Rehan Khan.
Presentation transcript:

1 Yue Qiao, Ouyang Zhang, Wenjie Zhou, Kannan Srinivasan and Anish Arora Department of Computer Science and Engineering PhyCloak: Obfuscating Sensing from Communication Signals

2 RF Based Sensing Tx Sensor Multipath propagation Channel distortion RF based sensing Rx Reflection plane Target

3 A New Threat Target Tx Sensor Target Data Tx Data Rx sensor Traditional RF sensing Comm-based RF sensing

4 Adib et al., See through walls with wifi!, Sigcomm'13 θ Direction One antenna Time (seconds) θ θ Antenna array Gonzalez-Ruiz et al., an integrated framework for obstacle mapping with see-through capabilities using laser and wireless channel measurements, Sensors Journal, IEEE, Rich signature, rich fine-grained information Privacy is leaked from communication sign als! Wang, et al. E-eyes: device-free location-oriented activity identification using fine-grained wifi signatures, Mobicom'14 Comm-based Sensing: Examples Pu et al., whole home gesture recognition using wireless signals, Mobicom'13

5 Problem Statement Eve Target Alice data communication Illegitimate sensing Bob Obfuscate illegitimate sensing Jammer Obfuscator A stand-alone black-box obfuscator: Obfuscate all illegitimate single-antenna sensors No knowledge of the sensing technique Not degrade any wireless data receivers No knowledge of the data transmission protocol

6 Requirements 1. Obfuscate all sensors without knowing their techniques? 2. Do not degrade data links no matter what transmission protocols are being used?

7 Three Degrees of Freedom Alice Bob Target Obfuscating the 3 DoFs is sufficient!

8 Effect of Superposition passive reflected copy actively reflected copy Eve Alice Ox Obfuscate illegitimate sensing Time domain (amplitude and phase) Instantaneously obfuscated Frequency domain (Doppler shift) Still distinguishable after superposition

9 The granularity of the spectralgrams decreases as the Doppler shifts change from every 1s to every 0.05s How Often to Change PhyCloak: change the three DoF every 0.1 s

10 Full-duplex Operation Eve Target Alice data communication Obfuscation Illegitimate sensing Bob Ox Instantaneously forward the received copy Full-duplex forwarding: transmit and receive simultaneously Eve: obfuscator Bob: relay

11 Requirements 1. Obfuscate all sensor without knowing their techniques? 2. Do not degrade data links no matter what transmission protocols are being used?

12 Self-channel Estimation Self-channel training takes air time Compete for channel access via MAC? A novel scheme: parallel self- channel training and external data transmission External data transmission TX RX Ox Alice H Self-interference cancellation: R - S*H received self-channel estimate transmitted Self-channel Every 100 ms!

13 Self-channel Estimation Training without external interference B = A x H Received samples Training sequence Channel coefficients Training with external interference B = A x H + S x H' C Basic idea: Oversample to make external interference constant over several slots T R A B H S H' Ox Alice

14 Self-channel Estimation B = A x H + C

15 A Special Training Sequence Unique solution Minimum interference to external transmission

16 Cancellation Performance 4-time oversampling is sufficient TX RX Ox Alice

17 Analog cancellation Tx RxRx -- Conventional fullduplex design Obfuscation Digital cancellation Eve Target Alice data communication Illegitimate sensing Bob PhyCloak Ox

18 Evaluation

19 Illegitimate Sensing Alice 1 1 Eve 0x Eve 0x 1 1 Alice Alice's location is known: the closer to Alice, the better Alice's location is unknown: the closer to Eve, the better

20 Throughput The average throughput increases with the help of PhyCloak

21 Analog cancellation Tx RxRx -- Conventional fullduplex design Obfuscation Clean signals used for legitimate sensing Digital cancellation Eve Target Alice data communication legitimate sensing Illegitimate sensing Bob Legitimate Sensing || Ox Carol Sensing

22 Legitimate Sensing Squarewave based training preserves legitimate sensing

23 Cancellation under Varying Interference External interference variation does not affect cancellation performance TX RX Ox Alice Interference caused by Alice Self-interference before cancellation Residual self-interference after cancellation

24 Conclusions and Future Work Conclusion: The first protection system against comm-based sensing Obfuscate illegitimate single-antenna sensing, not degrade data throughput, and preserve legitimate sensing Implementation on SDR platform Future work: Obfuscate multi-antenna sensors using multi antenna obfuscators? Coverage provided by obfuscators? Cooperation among multiple obfuscators?

25 Q&A Thanks