Abstract
Wireless signals, including Wi-Fi signals have become ubiquitous. Recent advancement shows that such signals can be leveraged for many applications including healthcare and people motion monitoring. An interesting question would be what if Wi-Fi signals can also be used in monitoring human activities in unauthorized and unauthenticated manner. In this paper, we study of watching human activities through leveraging Wi-Fi signals and discuss a few application prototypes. These prototypes are used to detect, track, and identify any moving objects, including those behind obstacles using multiple-input Multiple-output (MIMO) technology to calculate the change in frequency reception. We attempt to learn whether or not our Wi-Fi router is not watching our Internet activity as well as physical activities. With all new technologies, one must be aware that unauthorized use of these technology can be used by criminals to their advantage, and we discuss some of the countermeasures to mitigate this risks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Adib, F., Katabi, D.: See through walls with Wi-Fi. In: Proceedings of ACM SIGCOMM 2013, pp. 75–86 (2013)
Xin, T., Guo, B., Wang, Z., Li, M., Yu, Z., Zhou, X.: FreeSense: indoor human identification with Wi-Fi signals. In: Proceedings of IEEE GLOBECOM 2016, pp. 1–6 (2016)
Wang, G., Zou, Y., Zhou, Z., Wu, K., Ni, L.: We can hear you with Wi-Fi. In: Proceedings of ACM MobiCom, pp. 2907–2920 (2014)
Ali, K., Liu, A., Wang, W., Shahzad, M.: Keystroke recognition using Wi-Fi signals. In: Proceedings ACM of MOBICOM, pp. 90–102 (2015)
Bennett, J.: Researchers use Wi-Fi to invent real X-ray vision. Popular Mechanics, pp. 1–8 (2017)
Atkinson, J., Mitchell, J., Rio, M., Matich, G.: Your WiFi is leaking: what do your mobile apps gossip about you? Future Gener. Comput. Syst. 80, 546–557 (2018)
Jessey, B.: Decrypting TLS, capturing USB, keyloggers, and network graphing. In: Shimonski, R. (ed.) Wireshark\(^{\textregistered }\) for Security Professionals. LNCS, vol. 9999, pp. 199–219. Springer, Heidelberg (2016)
Henry, A.: How to Tap Your Network and See Everything that Happens on it. http://lifehacker.com/how-to-tap-your-network-and-see-everything-that-happens-1649292940. Accessed 22 Oct 2017
Vanhoef, M., Piessens, F.: Key reinstallation attacks. In: Proceedings of ACM, CCS 2017, pp. 1313–1328 (2017)
How to Hack Wi-Fi: Getting Started with the Aircrack-Ng Suite of Wi-Fi Hacking Tools. null-byte.wonderhowto.com/how-to/hack-wi-fi-getting-started-with-aircrack-ng-suite-wi-fi-hacking-tools-0147893/. Accessed 22 Oct 2017
M’Raihi, D., Machani, S., Pei, M., Rydell, J.: TOTP: time-based one-time password algorithm. IETF Tools. https://tools.ietf.org/html/rfc6238. Accessed 27 Nov 2017
Khang, M.F., Wang, G., Bhuiyan, M., Li, X.: Wi-Fi signal coverage distance estimation in collapsed structures. In: Proceedings of IEEE ISPA 2017, pp. 1–8 (2017)
Khang, M.F., Wang, G., Bhuiyan, M., Xing, X.: Towards Wi-Fi radar in collapsed structures. In: Proceedings of IEEE UIC 2018, pp. 1–8 (2018)
Khang, M.F., Wang, G., Bhuiyan, M., Xing, X., Tao, P.: Wi-Fi halow signal coverage estimation in collapsed structures. In: Proceedings of IEEE DASC 2018, pp. 1–8 (2018)
Wang, T., Bhuiyan, M., Wang, G., Rahman, A., Wu, J., Cao, J.: Big data reduction for smart city’s critical infrastructural health monitoring. IEEE Commun. Mag. 56(3), 128–133 (2018)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Bhuiyan, M.Z.A., Islam, M.M., Wang, G., Wang, T. (2018). Investigation on Unauthorized Human Activity Watching Through Leveraging Wi-Fi Signals. In: Wang, G., Chen, J., Yang, L. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2018. Lecture Notes in Computer Science(), vol 11342. Springer, Cham. https://doi.org/10.1007/978-3-030-05345-1_44
Download citation
DOI: https://doi.org/10.1007/978-3-030-05345-1_44
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-05344-4
Online ISBN: 978-3-030-05345-1
eBook Packages: Computer ScienceComputer Science (R0)