skip to main content
10.1145/2942358.2942373acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
research-article

How can I guard my AP?: non-intrusive user identification for mobile devices using WiFi signals

Published:05 July 2016Publication History

ABSTRACT

With the development and popularization of WiFi, surfing on the Internet with mobile devices has become an indispensable part of people's daily life. However, as an infrastructure, WiFi APs are easily connected by some undesired users nearby. In this paper, we propose NiFi, a non-intrusive WiFi user identification system based on WiFi signals that enables AP to automatically identify legitimate users in indoor environment such as home, office and hotel. The core idea is that legitimate and undesired users may have different physical constraints, e.g., moving area, walking path, etc, leading to different signal sequences. NiFi analyzes and exploits the characteristics of signal sequences generated by mobile devices. NiFi proposes a practical and effective method to extract useful features and measure similarity for signal sequences, while not relying on precise user location information. We implement NiFi on Commercial Off-The-Shelf (COTS) APs, and the implementation does not require any modification to user devices. The experiment results demonstrate that NiFi is able to achieve an average identification accuracy at 90.83% with true positive rate at 98.89%.

References

  1. Chinese Network Security Report of Rising Antivirus in the first half of 2014. http://www.rising.com.cn/about/news/rising/2014-07-30/2014report-s.pdf.Google ScholarGoogle Scholar
  2. Devices that are supported by OpenWrt. http://wiki.openwrt.org/toh/start.Google ScholarGoogle Scholar
  3. RB912UAG-5HPnD routerboard info. http://routerboard.com/RB912UAG-5HPnD.Google ScholarGoogle Scholar
  4. Tools for Kolmogorov-Smirnov test. http://www.physics.csbsju.edu/stats/KS-test.html.Google ScholarGoogle Scholar
  5. WiFi Chip Shipment. https://www.abiresearch.com/press/wi-fi-chipset-shipments-will-near-18-billion-chips/.Google ScholarGoogle Scholar
  6. WiFi Master Key. http://en.wifi.com/#firstPage/.Google ScholarGoogle Scholar
  7. WiFi Security. http://www.bj.xinhuanet.com/bjyw/2014-08/20/c_1112148691_2.htm.Google ScholarGoogle Scholar
  8. H. Abdelnasser, M. Youssef, and K. A. Harras. Wigest: A ubiquitous wifi-based gesture recognition system. In 2015 IEEE Conference on Computer Communications, INFOCOM 2015, Kowloon, Hong Kong, April 26-May 1, 2015, pages 1472--1480, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  9. F. Adib, Z. Kabelac, and D. Katabi. Multi-person localization via rf body reflections. In Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation, pages 279--292. USENIX Association, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. K. Ali, A. X. Liu, W. Wang, and M. Shahzad. Keystroke recognition using wifi signals. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, pages 90--102. ACM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. P. Bahl and V. N. Padmanabhan. Radar: An in-building rf-based user location and tracking system. In INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, volume 2, pages 775--784. Ieee, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  12. L. R. R. F. Ieee. A tutorial on hidden markov models and selected applications in speech recognition. Proceedings of the IEEE, 77(2):257--286, 1989.Google ScholarGoogle ScholarCross RefCross Ref
  13. A. A. Mahimkar, H. H. Song, Z. Ge, A. Shaikh, J. Wang, J. Yates, Y. Zhang, and J. Emmons. Detecting the performance impact of upgrades in large operational networks. ACM SIGCOMM Computer Communication Review, 41(4):303--314, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. Nandakumar, K. K. Chintalapudi, and V. N. Padmanabhan. Centaur: locating devices in an office environment. In Proceedings of the 18th annual international conference on Mobile computing and networking, pages 281--292. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. R. Nandakumar, B. Kellogg, and S. Gollakota. Wi-fi gesture recognition on existing devices. CoRR, abs/1411.5394, 2014.Google ScholarGoogle Scholar
  16. J.-g. Park, B. Charrow, D. Curtis, J. Battat, E. Minkov, J. Hicks, S. Teller, and J. Ledlie. Growing an organic indoor location system. In Proceedings of the 8th international conference on Mobile systems, applications, and services, pages 271--284. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Q. Pu, S. Gupta, S. Gollakota, and S. Patel. Whole-home gesture recognition using wireless signals. In The 19th Annual International Conference on Mobile Computing and Networking, MobiCom'13, Miami, FL, USA, September 30-October 04, 2013, pages 27--38, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. Rai, K. K. Chintalapudi, V. N. Padmanabhan, and R. Sen. Zee: zero-effort crowdsourcing for indoor localization. In Proceedings of the 18th annual international conference on Mobile computing and networking, pages 293--304. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. S. Sen, J. Lee, K.-H. Kim, and P. Congdon. Avoiding multipath to revive inbuilding wifi localization. In Proceeding of the 11th annual international conference on Mobile systems, applications, and services, pages 249--262. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Sigg, M. Scholz, S. Shi, Y. Ji, and M. Beigl. Rf-sensing of activities from non-cooperative subjects in device-free recognition systems using ambient and local signals. IEEE Trans. Mob. Comput., 13(4):907--920, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. S. Sigg, S. Shi, F. Büsching, Y. Ji, and L. C. Wolf. Leveraging rf-channel fluctuation for activity recognition: Active and passive systems, continuous and rssi-based signal features. In The 11th International Conference on Advances in Mobile Computing & Multimedia, MoMM '13, Vienna, Austria, December 2-4, 2013, page 43, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. D. Vasisht, S. Kumar, and D. Katabi. Decimeter-level localization with a single wifi access point. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16), pages 165--178, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. G. Wang, Y. Zou, Z. Zhou, K. Wu, and L. M. Ni. We can hear you with wi-fi! In The 20th Annual International Conference on Mobile Computing and Networking, MobiCom'14, Maui, HI, USA, September 7-11, 2014, pages 593--604, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. H. Wang, S. Sen, A. Elgohary, M. Farid, M. Youssef, and R. R. Choudhury. No need to war-drive: unsupervised indoor localization. In Proceedings of the 10th international conference on Mobile systems, applications, and services, pages 197--210. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. J. Wang, D. Vasisht, and D. Katabi. Rf-idraw: virtual touch screen in the air using RF signals. In ACM SIGCOMM 2014 Conference, SIGCOMM'14, Chicago, IL, USA, August 17-22, 2014, pages 235--246, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. L. S. Z. Z. Y. L. Xiaolong Zheng, Jiliang Wang. Smokey: Ubiquitous smoking detection with commercial wifi infrastructures. INFOCOM, 2016.Google ScholarGoogle Scholar
  27. J. Xiong and K. Jamieson. Arraytrack: A fine-grained indoor location system. In NSDI, pages 71--84, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. J. Xiong and K. Sundaresan. Tonetrack: Leveraging frequency-agile radios for time-based indoor wireless localization.Google ScholarGoogle Scholar
  29. Z. Yang, C. Wu, and Y. Liu. Locating in fingerprint space: wireless indoor localization with little human intervention. In Proceedings of the 18th annual international conference on Mobile computing and networking, pages 269--280. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. M. Youssef and A. Agrawala. The horus wlan location determination system. In Proceedings of the 3rd international conference on Mobile systems, applications, and services, pages 205--218. ACM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. How can I guard my AP?: non-intrusive user identification for mobile devices using WiFi signals

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MobiHoc '16: Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing
      July 2016
      421 pages
      ISBN:9781450341844
      DOI:10.1145/2942358

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 5 July 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate296of1,843submissions,16%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader