Skip to main content

Investigation on Unauthorized Human Activity Watching Through Leveraging Wi-Fi Signals

  • Conference paper
  • First Online:
Book cover Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2018)

Abstract

Wireless signals, including Wi-Fi signals have become ubiquitous. Recent advancement shows that such signals can be leveraged for many applications including healthcare and people motion monitoring. An interesting question would be what if Wi-Fi signals can also be used in monitoring human activities in unauthorized and unauthenticated manner. In this paper, we study of watching human activities through leveraging Wi-Fi signals and discuss a few application prototypes. These prototypes are used to detect, track, and identify any moving objects, including those behind obstacles using multiple-input Multiple-output (MIMO) technology to calculate the change in frequency reception. We attempt to learn whether or not our Wi-Fi router is not watching our Internet activity as well as physical activities. With all new technologies, one must be aware that unauthorized use of these technology can be used by criminals to their advantage, and we discuss some of the countermeasures to mitigate this risks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Adib, F., Katabi, D.: See through walls with Wi-Fi. In: Proceedings of ACM SIGCOMM 2013, pp. 75–86 (2013)

    Google Scholar 

  2. Xin, T., Guo, B., Wang, Z., Li, M., Yu, Z., Zhou, X.: FreeSense: indoor human identification with Wi-Fi signals. In: Proceedings of IEEE GLOBECOM 2016, pp. 1–6 (2016)

    Google Scholar 

  3. Wang, G., Zou, Y., Zhou, Z., Wu, K., Ni, L.: We can hear you with Wi-Fi. In: Proceedings of ACM MobiCom, pp. 2907–2920 (2014)

    Google Scholar 

  4. Ali, K., Liu, A., Wang, W., Shahzad, M.: Keystroke recognition using Wi-Fi signals. In: Proceedings ACM of MOBICOM, pp. 90–102 (2015)

    Google Scholar 

  5. Bennett, J.: Researchers use Wi-Fi to invent real X-ray vision. Popular Mechanics, pp. 1–8 (2017)

    Google Scholar 

  6. Atkinson, J., Mitchell, J., Rio, M., Matich, G.: Your WiFi is leaking: what do your mobile apps gossip about you? Future Gener. Comput. Syst. 80, 546–557 (2018)

    Article  Google Scholar 

  7. Jessey, B.: Decrypting TLS, capturing USB, keyloggers, and network graphing. In: Shimonski, R. (ed.) Wireshark\(^{\textregistered }\) for Security Professionals. LNCS, vol. 9999, pp. 199–219. Springer, Heidelberg (2016)

    Google Scholar 

  8. Henry, A.: How to Tap Your Network and See Everything that Happens on it. http://lifehacker.com/how-to-tap-your-network-and-see-everything-that-happens-1649292940. Accessed 22 Oct 2017

  9. Vanhoef, M., Piessens, F.: Key reinstallation attacks. In: Proceedings of ACM, CCS 2017, pp. 1313–1328 (2017)

    Google Scholar 

  10. How to Hack Wi-Fi: Getting Started with the Aircrack-Ng Suite of Wi-Fi Hacking Tools. null-byte.wonderhowto.com/how-to/hack-wi-fi-getting-started-with-aircrack-ng-suite-wi-fi-hacking-tools-0147893/. Accessed 22 Oct 2017

  11. M’Raihi, D., Machani, S., Pei, M., Rydell, J.: TOTP: time-based one-time password algorithm. IETF Tools. https://tools.ietf.org/html/rfc6238. Accessed 27 Nov 2017

  12. Khang, M.F., Wang, G., Bhuiyan, M., Li, X.: Wi-Fi signal coverage distance estimation in collapsed structures. In: Proceedings of IEEE ISPA 2017, pp. 1–8 (2017)

    Google Scholar 

  13. Khang, M.F., Wang, G., Bhuiyan, M., Xing, X.: Towards Wi-Fi radar in collapsed structures. In: Proceedings of IEEE UIC 2018, pp. 1–8 (2018)

    Google Scholar 

  14. Khang, M.F., Wang, G., Bhuiyan, M., Xing, X., Tao, P.: Wi-Fi halow signal coverage estimation in collapsed structures. In: Proceedings of IEEE DASC 2018, pp. 1–8 (2018)

    Google Scholar 

  15. Wang, T., Bhuiyan, M., Wang, G., Rahman, A., Wu, J., Cao, J.: Big data reduction for smart city’s critical infrastructural health monitoring. IEEE Commun. Mag. 56(3), 128–133 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Guojun Wang or Tian Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bhuiyan, M.Z.A., Islam, M.M., Wang, G., Wang, T. (2018). Investigation on Unauthorized Human Activity Watching Through Leveraging Wi-Fi Signals. In: Wang, G., Chen, J., Yang, L. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2018. Lecture Notes in Computer Science(), vol 11342. Springer, Cham. https://doi.org/10.1007/978-3-030-05345-1_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-05345-1_44

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-05344-4

  • Online ISBN: 978-3-030-05345-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics