DAISY Data Analysis and Information SecuritY Lab

Slides:



Advertisements
Similar presentations
Wide Area Wi-Fi Sam Bhoot. Wide Area Wi-Fi  Definition: Wi-Fi (Wireless Fidelity) n. – popular term for high frequency wireless local area networks operating.
Advertisements

Whole-Home Gesture Recognition Using Wireless Signals —— MobiCom’13 Author: Qifan Pu et al. University of Washington Presenter: Yanyuan Qin & Zhitong Fei.
Sensor-Based Abnormal Human-Activity Detection Authors: Jie Yin, Qiang Yang, and Jeffrey Junfeng Pan Presenter: Raghu Rangan.
ParkSense: A Smartphone Based Sensing System For On-Street Parking
A Novel Approach of Assisting the Visually Impaired to Navigate Path and Avoiding Obstacle-Collisions.
FM-BASED INDOOR LOCALIZATION TsungYun 1.
Sensor Network 教育部資通訊科技人才培育先導型計畫. 1.Introduction General Purpose  A wireless sensor network (WSN) is a wireless network using sensors to cooperatively.
Doc.: IEEE /0604r1 Submission May 2014 Slide 1 Modeling and Evaluating Variable Bit rate Video Steaming for ax Date: Authors:
Doorjamb: Unobtrusive Room-level Tracking of People in Homes using Doorway Sensors Timothy W. Hnat, Erin Griffiths, Ray Dawson, Kamin Whitehouse U of Virginia.
Tracking Fine-grain Vehicular Speed Variations by Warping Mobile Phone Signal Strengths Presented by Tam Vu Gayathri Chandrasekaran*, Tam Vu*, Alexander.
Characterization of Wireless Networks in the Home Mark Yarvis, Konstantina Papagiannaki, and W. Steven Conner Presented by Artur Janc, Eric Stein.
Challenges: Device-free Passive Localization for Wireless Environments Moustafa Youssef, Matthew Mah, Ashok Agrawala University of Maryland College Park.
CS218 – Final Project A “Small-Scale” Application- Level Multicast Tree Protocol Jason Lee, Lih Chen & Prabash Nanayakkara Tutor: Li Lao.
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks Authors: Wenyuan XU, Wade Trappe, Yanyong Zhang and Timothy Wood Wireless.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha Presented by Ray Lam Oct 23, 2004.
1 Prototype Hierarchy Based Clustering for the Categorization and Navigation of Web Collections Zhao-Yan Ming, Kai Wang and Tat-Seng Chua School of Computing,
WINLAB SCPL: Indoor Device-Free Multi-Subject Counting and Localization Using Radio Signal Strength Rutgers University Chenren Xu Joint work with Bernhard.
Rutgers: Gayathri Chandrasekaran, Tam Vu, Marco Gruteser, Rich Martin,
RFID and Positioning. Outline RFID Introduction Indoor Localization RFID positioning Algorithm – LANDMARC – RFID-Based 3-D Positioning Schemes RFID application.
I AM THE ANTENNA: ACCURATE OUTDOOR AP LOCATION USING SMARTPHONES ZENGBIN ZHANG, XIA ZHOU, WEILE ZHANG, YUANYANG ZHANG GANG WANG, BEN Y. ZHAO, HAITAO ZHENG.
Intrusion and Anomaly Detection in Network Traffic Streams: Checking and Machine Learning Approaches ONR MURI area: High Confidence Real-Time Misuse and.
Towards a Scalable and Secure VoIP Infrastructure Towards a Scalable and Secure VoIP Infrastructure Lab for Advanced Networking Systems Director: David.
Sidewinder A Predictive Data Forwarding Protocol for Mobile Wireless Sensor Networks Matt Keally 1, Gang Zhou 1, Guoliang Xing 2 1 College of William and.
Christian Le, Intel (Rahul Khanna, Intel and Huaping Liu, OSU)
SCPL: Indoor Device-Free Multi-Subject Counting and Localization Using Radio Signal Strength Chenren Xu†, Bernhard Firner†, Robert S. Moore ∗, Yanyong.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
Tracking with Unreliable Node Sequences Ziguo Zhong, Ting Zhu, Dan Wang and Tian He Computer Science and Engineering, University of Minnesota Infocom 2009.
Snooping Keystrokes with mm-level Audio Ranging on a Single Phone
Keystroke Recognition using WiFi Signals
Who Is Peeping at Your Passwords at Starbucks? To Catch an Evil Twin Access Point DSN 2010 Yimin Song, Texas A&M University Chao Yang, Texas A&M University.
Experimental Results ■ Observations:  Overall detection accuracy increases as the length of observation window increases.  An observation window of 100.
WINLAB Improving RF-Based Device-Free Passive Localization In Cluttered Indoor Environments Through Probabilistic Classification Methods Rutgers University.
Oct 26, 2007IMC 2007 Understanding the Limitations of Transmit Power Control for Indoor WLANs Vivek Vishal Shrivastava Dheeraj Agrawal Arunesh Mishra Suman.
Sep 27, 2006MobiCom SRC ‘06 On the (In)feasibility of Fine Grained Power Control Vivek Vishal Shrivastava Dheeraj Agrawal Arunesh Mishra Suman Banerjee.
User Fingerprinting Jeffrey Pang 1 Ben Greenstein 2 Ramakrishna Gummadi 3 Srinivasan Seshan 1 David Wetherall 2,4 Presenter: Nan Jiang Most Slides:
Preserving Location Privacy in Wireless LANs Jiang, Wang and Hu MobiSys 2007 Presenter: Bibudh Lahiri.
A Study of Smartphone User Privacy from the Advertiser's Perspective Yan Wang 1, Yingying Chen 1, Fan Ye 2, Jie Yang 3, Hongbo Liu 4 1 Department of Electrical.
Multiuser Receiver Aware Multicast in CDMA-based Multihop Wireless Ad-hoc Networks Parmesh Ramanathan Department of ECE University of Wisconsin-Madison.
Jin Yan Embedded and Pervasive Computing Center
Network/Computer Security Workshop, May 06 The Robustness of Localization Algorithms to Signal Strength Attacks A Comparative Study Yingying Chen, Konstantinos.
L. Xiao, L. Greenstein, N. Mandayam, W. Trappe WINLAB, Dept. ECE, Rutgers University CISS 2008 This work is supported in part.
Project Topics ECE 591. Project 1: Localization through Wi-Fi and Wireless Camera WIFI localization: Wireless Camera: Goal: Understand RF based localization.
Submission doc.: IEEE 19-15/0084r0 Nov 2015 Igal Kotzer, General MotorsSlide 1 On The Intra-Vehicle Channel Model Date: 21-Oct-2015 Authors:
Presenter: Ailane Mohamed Toufik Authors : Jie Yang †, Simon Sidhom †, Gayathri Chandrasekaran ∗, Tam Vu ∗, Hongbo Liu †, Nicolae Cecan ∗, Yingying Chen.
Data Stashing: Energy-Efficient Information Delivery to Mobile Sinks through Trajectory Prediction (IPSN 2010) HyungJune Lee, Martin Wicke, Branislav Kusy,
Leveraging Wearables for Steering and Driver Tracking
1 Yue Qiao, Ouyang Zhang, Wenjie Zhou, Kannan Srinivasan and Anish Arora Department of Computer Science and Engineering PhyCloak: Obfuscating Sensing from.
Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends Prepared by: Ameer Sameer Hamood University of Babylon - Iraq Information.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
WiFi Action Recognition via Vision-based Methods Jen-Yin Chang, Kuan-Ying Lee, Kate Ching-Ju Lin*, Winston Hsu Communication and Multimedia Lab National.
LEMON: An RSS-Based Indoor Localization Technique Israat T. Haque, Ioanis Nikolaidis, and Pawel Gburzynski Computing Science, University of Alberta, Canada.
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals Adekemi Adedokun May 2, 2017.
B2W2 N-Way Concurrent Communication for IoT Devices
MobiCom’13 Jie Xiong and Kyle Jamieson University College London
Keystroke eavesdropping attacks with WiFi signals
(Spot localization using PHY Layer information
Chen Jimena Melisa Parodi Menashe Shalom
Hessam Mohammadmoradi, Shengrong Yin, Omprakash Gnawali
On Optimal Distributed Kalman Filtering in Non-ideal Situations
Northwestern Lab for Internet and Security Technology (LIST) Yan Chen Department of Computer Science Northwestern University.
Visible Light based Activity Sensing using Ceiling Photosensors
A Novel Framework for Software Defined Wireless Body Area Network
Cross-Layer Optimization for State Update in Mobile Gaming
WiFinger: Talk to Your Smart Devices with Finger-grained Gesture
DAISY Friend or Foe? Your Wearable Devices Reveal Your Personal PIN
Keystroke Recognition using Wi-Fi Signals
Accuracy Characterization of Cell Tower Localization
Resource Allocation for Distributed Streaming Applications
QGesture: Quantifying Gesture Distance and Direction with WiFi Signals
On the (In)feasibility of Fine Grained Power Control
Presentation transcript:

DAISY Data Analysis and Information SecuritY Lab E-eyes: Device-free Location-oriented Activity Identification Using Fine-grained WiFi Signatures Presenter: Yan Wang Yan Wang†, Jian Liu†, Yingying Chen†, Marco Gruteser‡, Jie Yang#, Hongbo Liu* †Dept. of ECE, Stevens Institute of Technology ‡ WINLAB, Rutgers University # Dept. of CS, Florida State University * Indiana University-Purdue University Indianapolis MobiCom 2014 Maui, Hawaii Sept. 7th – 11th 2014 1

Motivation and Applications

Our Goal: Low-Cost Fine-Grained Activity Identification Coarse-grained Localization using off-the-shelf WiFi Device-free passive localization RSS-based approach Nonintrusive Intrusive Granularity of the solutions Localization/classification using specialized devices WiSee, WiTrack Localization RTI Our E-eyes Fine-grained Activity sensors Attached sensors Non-attached sensors Optimal solution Low cost High cost Scalability / Infrastructural cost

Intuition and Basic Idea CSI Amplitude Increasing availability of WiFi signals in home environments WiFi provides fine-grained channel state information (CSI) Use CSI to capture changes of multipath environment

Uniqueness of CSI Comparing to RSS CSI Amplitude RSS amplitude

E-eyes System Challenges Profile uniqueness and Robustness Generality to different types of activities Assisting the profile generation and updating

System Overview Increase robustness to real environments Access Point Signal Time Series Data Pre-processing Increase robustness to real environments Activity Identification Coarse Activity Determination Generality to different Activities Assisting the profile generation and updating Profile Construction and Updating User Feedback Walking activity In-place activity Walking Activity Tracking using MD-DTW In-place Activity Identification using EMD Data Fusion Crossing Links Known Activity Unknown Activity Profile matching None Profile Based Construction Adaptive Updating

Coarse Activity Determination CSI Amplitude Time Subcarrier 1 CSI Amplitude Time Subcarrier p CSI Amplitude Time Subcarrier P CSI Amplitude Time In-place activity Walking activity … … … Walking activity Large moving variance due to significant body movements and location changes In-place activity Small moving variance due to smaller body movements

Characteristics of CSI Measurements from Walking Activity Trajectory 1 Trajectory 2 CSI pattern is dominated by walking activities’ path Doorway profile can facilitate walking activity tracking

Walking Activity Tracking CSI measurements CSI Amplitude Time Subcarrier P Subcarrier 1 … Subcarrier p Walking Activity Classifier Activity Profiles Multi-Dimensional Dynamic Time Warping Distance Derivation DTW distance CSI Amplitude Time Subcarrier P Subcarrier 1 … Subcarrier p

Characteristics of CSI Measurements from In-Place Activity Different in-place activities cause different distributions of CSI Different rounds of same in-place activities result in similar distributions of CSI

In-Place Activity Identification CSI measurements CSI Amplitude Time In-place Activity Classifier Distribution of CSI Amplitudes Extraction Activity Profiles Subcarrier Earth Mover’s Distance Derivation Distribution EMD distance

Non-profiling Clustering Activity Identification Profile Construction and Updating Constructing profiles Unknown Activity Non-profiling Clustering Adaptive Updating User Feedback Semi-supervised approach to cluster daily activities and update CSI profiles Construct CSI profiles when our system starts

Questions How robust is the system in typical indoor environments? Can two different activities be distinguished at the same location? Is WiFi traffic in home environment feasible to identify activities?

Experimental Setup WiFi devices Scenarios Intel 5300 NIC + Thinkpad T500 and T 51 Cisco E2500 Scenarios Small apartment with one bedroom Large apartment with two beddoms

How robust is the system in typical indoor environments? Questions How robust is the system in typical indoor environments? Can different activities be distinguished at the same location? Is WiFi traffic in home environment feasible to identify activities? How robust is your system in typical indoor environments with multipath effects?

False positive rate: less than 5% Performance of In-place Activity Identification in Two Different Apartments 1-bedroom apartment 2-bedroom apartment TPR TPR 1-bedroom apartment 2-bedroom apartment Activity types Activity types FNR FNR False positive rate: less than 5% Activity types Activity types

Performance of Walking Activity Tracking and Doorway Identification 1-bedroom apt. A B C D Unknown Door Door1 Door2 Door3 1 0.95 0.05 0.975 0.025 O 0.1 0.9 None 2-bedroom apt. E F G H Unknown Door Door1 Door2 Door3 1 0.15 0.85 0.9 0.1 Door4 0.875 0.125 O 0.05 0.9t None

Questions How robust is the system in typical indoor environments? Can different activities be distinguished at the same location? Is WiFi traffic in home environment feasible to identify activities?

Performance of Identifying Different Activities at the Same Location Four in-place activities Sleeping on the bed Sitting on the bed Receiving calls nearby the sink Washing dishes nearby the sink

Questions How robust is the system in typical indoor environments? Can different activities be distinguished at the same location? Is WiFi traffic in home environment feasible to identify activities?

Performance of Different Packet Rate Packet transmission rate (PTR): 5 pkts/s - 20 pkts/s

Conclusion Show that the channel state information (CSI) from off- the-shelf 802.11n devices can be utilized to identify and distinguish in-place activities inside a home Develop a monitoring framework that can run on a single WiFi AP and use the associated profile matching algorithms to compare amplitude profiles against those from known activities Explore dynamic profile construction to accommodate the movement or replacement of wireless devices and day-to-day profile calibration Extensive experiments in two apartments of different size demonstrates the generality of our approach

Yan Wang ywang48@stevens.edu