Zhiqing Luo1, Wei Wang1, Jiang Xiao1,

Slides:



Advertisements
Similar presentations
Timo Kasper Crete, Greece May 10, 2007 An Embedded System for Practical Security Analysis of Contactless Smartcards Timo Kasper, Dario Carluccio and Christof.
Advertisements

Serverless Search and Authentication Protocols for RFID Chiu C. Tan, Bo Sheng and Qun Li Department of Computer Science College of William and Mary.
Finding objects. Prepared by: Laial Al Jeans Mais Dabous Supervised by: A.Jammal Kharoshah.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Leveraging Interleaved Signal Edges for Concurrent Backscatter by Pan Hu, Pengyu.
Advanced Topics in Next- Generation Wireless Networks Qian Zhang Department of Computer Science HKUST Wireless Radio.
I Am the Antenna: Accurate Outdoor AP Location using Smartphones
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Can we get Wi-Fi connectivity for 15 µW? Bryce Kellogg.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
IT-101 Section 001 Lecture #15 Introduction to Information Technology.
Physical-layer Identification of RFID Devices Authors: Boris Danev, Thomas S. Heyde-Benjamin, and Srdjan Capkun Presented by Zhitao Yang 1.
McGraw-Hill/Irwin © The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
Project supported by YESS 2009 Young Engineering Scientist Symposium « Identity Management » Cryptography for the Security of Embedded Systems Ambient.
Presented by: Arpit Jain Guided by: Prof. D.B. Phatak.
Radio Communication SL – Option F.1. Radio communication includes any form of communication that uses radio (EM) waves to transfer information –TV, mobile.
Presentation by: K.G.P.Srikanth. CONTENTS  Introduction  Components  Working  Applications.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
Submitted by:- Vinay kr. Gupta Computer Sci. & Engg. 4 th year.
Tracking with Unreliable Node Sequences Ziguo Zhong, Ting Zhu, Dan Wang and Tian He Computer Science and Engineering, University of Minnesota Infocom 2009.
S MART A NTENNA B.GANGADHAR 08QF1A1209. ABSTRACT One of the most rapidly developing areas of communications is “Smart Antenna” systems. This paper deals.
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Security of the Internet of Things: perspectives and challenges
UWave: Accelerometer-based personalized gesture recognition and its applications Tae-min Hwang.
Fundamentals of Communications. Communication System Transmitter: originates the signal Receiver: receives transmitted signal after it travels over the.
TBAS: Enhancing Wi-Fi Authentication by Actively Eliciting Channel State Information Muye Liu, Avishek Mukherjee, Zhenghao Zhang, and Xiuwen Liu Florida.
Radio Communication SL/HL – Option F.1. Radio communication includes any form of communication that uses radio (EM) waves to transfer information –TV,
IT-101 Section 001 Lecture #15 Introduction to Information Technology.
WI-VI Presented by, ASWATHI.N.R Roll No;22 S3EC.
Teng Wei and Xinyu Zhang
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals Warren Yeu When CSI Meets Public Wifi.
5 G.
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals Adekemi Adedokun May 2, 2017.
B2W2 N-Way Concurrent Communication for IoT Devices
I Am the Antenna: Accurate Outdoor AP Location using Smartphones
1.Smart Security System Using Arm And Zigbee For Boarder Areas
Hala Esawi Hana Masri Shorouq Abu Assab Supervised by: Dr.Yousef Dama
CS434/534: Topics in Networked (Networking) Systems Mobile Networking System: Making Connections: Backscatter Geng Li Computer Science Department Yale.
Wireless Technologies
Challenge/Response Authentication
Casey O’Leary – Washington State University
Wireless Local Area Network (WLAN)
Introduction to Wireless Technology
#6 Name W, Period The complete range of electromagnetic waves placed in order of increasing frequency is _________________.
Overview Communication is the transfer of information from one place to another. This should be done - as efficiently as possible - with as much fidelity/reliability.
Apple Pay Research on NFC and the security threat
Aziz Nasridinov and Young-Ho Park*
Smart Security System Using ARM And XBee For Boarder Areas
Internet of Things (IoT)
WiFinger: Talk to Your Smart Devices with Finger-grained Gesture
Channel Spoofer: Defeating Channel Variability and Unpredictability
N-Guard: a Solution to Secure Access to NFC tags
Combating Tag Cloning with COTS RFID Devices
Good afternoon everyone. My name is Jinlong Yang
Radio AIM: To understand the parts of a simple A.M. radio and appreciate the purpose of modulation. PRIOR KNOWLEDGE: Frequency and Amplitude
Wireless Communications Chapter 4
2N Access Unit 2.0 Multi-technology access control readers.
Which of the following is a digital communications mode?
Protocols.
Team North Star + Lockheed Martin
QGesture: Quantifying Gesture Distance and Direction with WiFi Signals
(Digital Modulation Basics)
3.3 Mobile Digital Communication
5G TECHNOLOG Y. CONTENTS Abstract 5g evolution Comparison Speeds of generations An overview of 3g Leaders in adapting 5g What 5g will provide?? Features.
5G TECHNOLOG Y. TRANSITION FROM 1G TO 5G COMPARISON OF 1G TO 5G.
Security in Wide Area Networks
Protocols.
PaperID: A Technique for Drawing Functional Battery-Free Wireless Interfaces on Paper 此页可以删除 陈以恒 2019年5月.
Presentation transcript:

Authenticating On-Body Backscatter by Exploiting Propagation Signatures Zhiqing Luo1, Wei Wang1, Jiang Xiao1, Qianyi Huang2, Tao Jiang1, Qian Zhang2 1Huazhong University of Science and Technology 2Hong Kong University of Science and Technology Good afternoon everyone. My name is Zhiqing Luo and I am from Hust. It is my great honor to present our work here today. The title of our paper is

Backscatter Communication Technologies Ambient backscatter WiFi backscatter First, we will start from a simple introduction of backscatter communication. Backscatter communication, this low-power technology, origins from RFID technologies. However, different from RFID the advantage of backscatter is that it is not need a dedicate and expensive Reader. It transmits data by reflecting the ambient signals, such as the signals from a TV tower, access point or a cell phone. HitchHike FS backscatter

Backscatter for On-body Devices Smart Watch Smartphone Low-power backscatter can be used to transmit data by reflecting on-body signals Commercial on-body devices Backscatter communications As the development of backscatter communication, backscatter has been successfully used to reflect WiFi, BLE and Zigbee protocol. On the other hand, most of on-body devices , such as smart watch, mobile phone are using these protocols , which makes it possible for backscatter to transmit data by reflecting the signals of the on-body devices. For example, we can use backscatter tag as the implanted devices to transmit the data of our health. On-body backscatter Backscatter for healthcare

Security Problem of On-body Backscatter Active attacker Constant power attacker: launch power to imitate the on-body tag Powerful attacker: transmit varying powers to imitate the tag Tag attacker The same scheme as on-body tag Previous works have focused on the communication dimension, while the security dimension remains vulnerable. It has been demonstrated that wireless connectivity can be exploited to send unauthorized commands or fake messages that result in device malfunctioning. For example, an active attacker can imitate the on-body tag by transmitting constant or varying intermittently. On the other hand, an attacker can use a tag that has the same construction as the on-body tag to spoofing the receiver. Therefore, the receiver should authenticate whether Whether the received signals are from my tag?

Limitations of Traditional Methods Limited by power and hardware Touch and gesture Complex encryption Password input Traditional methods to solve such authentication problems may rely on Complex encryption , touch or gesture recognition and password, However, because of the simple design , backscatter tag cannot support these methods. So we want to ask, Can we authenticate the on-body tag without large power consumption and hardware change? Can we authenticate the on-body tag without large power consumption and hardware change?

On-body Radio Propagation On-body propagation is dominated by creeping waves Easily affected by body surface movement Easily affected by on-body device antenna movement In this paper, we consider using the on-body propagation signatures to authenticate the on-body tag. As show in this picture, previous works have proof the electromagnetic (EM) waves mainly propagate around the human body surface via diffraction. On-body propagation is dominated by creeping waves. As a result, these on-body radios Easily affected by body surface movement, and on-body device antenna movement.

Our Observation On-body receiver Off-body receiver To verify this observation, we conduct an experiment. In particular, we First, we keep the human body stay static. Then, we move the antenna of the transmitter back and forth for several periods. Finally, we plot the received signal strength of the on-body receiver. On-body receiver and on-body tag propagation are affected by transmitter movement On-body tag

Idea: Authenticate by Radio Propagation Move the on-body transmitter Authenticate by detecting and matching the RSS changes of backscatter signal and source signal Thus, the idea of our paper is to

An Overview of Our System Here, is an overview of our system. Which contains three key parts. First , we collect and make some pre-process of the raw data from the on-body receiver; second, we extract the RSS trace of the source signal from transmitter to receiver to determine the variation states of transmitter movement. Besides, we will decode the backscatter signals of tag from the raw data, and then segment the backscatter signals by matching the RSS trace.; finally, we authenticate the on-body tag by comparing the RSS variations of these segments. Now, we will demonstrate each step of our system. Data collection Movement determination On-body authenticating

Trace Extraction Raw data Noise existing Variation state First of all, Receive the raw data from on-body receiver Extract the source signal trace Smooth the trace Calculate the slope to determine the variation states

Backscatter Signal Segmentation

On-body Authentication If the backscatter signals vary fast, they should be from an active attacker If the backscatter signals vary slow, we compare the segments in each cluster

Implementation Implemented on GNUradio/USRP platform. Place the antennas of them on the body and they operate at 900 MHz or 2.4GHz. Evaluated at static and dynamic environments.

Evaluation –Static Environment We keep the human body stay static Place the active attacker at different distances from body

Evaluation –Dynamic Environment We keep the human body do some motions We ask two people to walk around

Conclusion We show that on-body propagation signatures can be leveraged to authenticate on-body tag; We develop SecureScatter, an on-body backscatter authentication framework that requires no extra process or hardware at the backscatter tag; We test SecureScatter under different static and dynamic environments to defend against active and tag attackers.

Research Interests Major Research Interests Major Research Projects 5 National Science Fund for Distinguished Young Scholars 5 G Mobile Communications Excellent Youth Foundation of Hubei Scientific Committee Green Communications National Natural Science Foundation of China (General Program, Key Program, and Major Program) Multimedia and Caching Program for New Century Excellent Talents in University Big Data and Security OFDM / FBMC and MIMO 863 and 973 Program Huawei's major strategic cooperation project Artificial Intelligence

Thank you! Thank you