SlideShare une entreprise Scribd logo
Wi-Fi Sensing:
Attack on Privacy &Countermeasures
Advanced Networking Systems, DII
University of Brescia – Italy
https://ans.unibs.it/
Renato Lo Cigno
with the fundamental contribution of
• Francesco Gringoli
• Marco Cominelli
• Lorenzo Ghiro
Outline& Goals
• Wi-Fi Fundamentals
• CSI-based Wi-Fi Localization & Sensing
• Learning positions with CNNs fingerprinting
• Obfuscation through CSI randomization
• Proper manipulation of the CSI at the transmitter or with and intelligent ambient can
hide position information & maintain communication performance
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
1
Outline& Goals
• Wi-Fi Fundamentals
• CSI-based Wi-Fi Localization & Sensing
• Learning positions with CNNs fingerprinting
• Obfuscation through CSI randomization
• Proper manipulation of the CSI at the transmitter or with and intelligent ambient can
hide position information & maintain communication performance
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
2
Common view of Wi-Fi
But we are interested in Wi-Fi
packets and signals, not the network!
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
3
AP
AP
AP Wired LAN / Eth Switch
AP: Access Point
"INTERNET"
Router
Wi-Fi packets & signals - 1
• 802.11 comes in many flavors: g/a/h/ac/ax ...
• They define different packet formats and transmission technologies,
including MIMO
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
4
h11
h22
Wi-Fi packets & signals - 2
• 802.11 comes in many flavors: g/a/h/ac/ax ...
• Some fields in the packets remain fixed and are used to help the correct
reception
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
5
L-STF
L-LTF
L-SIG
VHT-SIG-A
VHT-STF
VHT-LTF
VHT-SIG-B
DATA
8µs 8µs 4µs 8µs 4µs 4µs 8µs 4µs 4µs
...
20MHz
20MHz
20MHz
20MHz
256
carriers
80MHz
IDFT X
{...,SIN
n,...}
I/Q samples
central
carrier
modulated signal s(t)
to antenna
{...,Sout
n,...}
randomizer
Wi-Fi packets & signals - 3
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
6
• 802.11 comes in many flavors: g/a/h/ac/ax ...
• All versions use OFDM as modulation technique
Wi-Fi ChannelStateInformation(CSI)
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
7
• Packet decoding happens
thanks to the knowledge
of the distortion
introduced by the channel
(multipath, refractions, ...)
• This knowledge (CSI) is
obtained thanks analyzing
known portions of the
packets
Outline& Goals
• Wi-Fi Fundamentals
• CSI-based Wi-Fi Localization & Sensing
• Learning positions with CNNs fingerprinting
• Obfuscation through CSI randomization
• Proper manipulation of the CSI at the transmitter or with and intelligent ambient can
hide position information & maintain communication performance
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
8
Wi-Fi PositionSensing
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
9
input
filter
sampling
equalizer
decoding
localization
system
received
bits
estimated
position
CSI extraction
input
filter
sampling
equalizer
decoding
received
bits
CSI extraction
RX1
RX2
U
• CSI is essential for equalization and high
throughput
• Once extracted the CSI can also be used
to sense & probe the environment
• People (& objects) change the
channel response
Wi-Fi PositionSensing
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
10
• CSI most evident
characteristic is the
amplitude change
in frequency
• Amplitude heatmap
with the same person
in two different positions in our lab
• Question: how to exploit this information?
CNN Fingerprinting
• Most recent "trend" is using supervised learning with a Convolutional Neural Network
• CSI I/Q samples are fed to the CNN that returns a position classification
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
11
Conv.
Layer
1
Conv.
Layer
2
Fully-Conn.
Layer
1
Fully-Conn.
Layer
2
Fully-Conn.
Layer
3
CNN
CSI
values
(real
/
imag)
8
Indoor
Locations
• It works, we'll see
results
• Still fragile, but AI is
improving VERY fast
Localization
• Tracking a person without her/his consent
• Violate privacy
• Often violate laws / rules
• Channel State Information (CSI) carries
details on the propagation environment
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
12
6.60 m
Tx
Rx2
7.00
m
P1
P2
P3
P8
P4
P7
P6
P5
Rx5
Rx1
Rx3
Rx4
`
BIG BROTHER IS
SENSING YOU
Localization
• Big Brother
• Controls one (or more) receivers
• Knows the position of Tx (e.g., an Access Point)
• The victim
• Is unaware of the system
• Does not need to hold a Wi-Fi device
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
13
6.60 m
Tx
Rx2
7.00
m
P1
P2
P3
P8
P4
P7
P6
P5
Rx5
Rx1
Rx3
Rx4
`
BIG BROTHER IS
SENSING YOU
Outline& Goals
• Wi-Fi Fundamentals
• CSI-based Wi-Fi Localization & Sensing
• Learning positions with CNNs fingerprinting
• Obfuscation through CSI randomization
• Proper manipulation of the CSI at the transmitter or with and intelligent ambient
can hide position information & maintain communication performance
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
14
CSI Randomization
• Proper manipulation at the
transmitter "blur" the fingerprints
• Different manipulations result in
different "blurring"
• Manipulation should not hamper
communication
performance
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
15
ManipulationPrinciples
1. Do not alter power emission
2. Guarantee that the pre-distortion random changes are compatible with
human (time correlation)
3. Guarantee that the pre-distortion random changes in frequency are
compatible with the real channel
4. Hide distortion information to prevent reverse
engineering within a reasonable time horizon
5. Do not change the communication performance
of the system
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
16
Basic Manipulation
• Multiply the samples amplitude by a Uniform-Markov random process
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
17
Localization Results
• Performance of single receivers
Percentage of correct decision: random choice = 12.5%
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
18
6.60 m
Tx
Rx2
7.00
m
P1
P2
P3
P8
P4
P7
P6
P5
Rx5
Rx1
Rx3
Rx4
Rx1 Rx2 Rx3 Rx4 Rx5
Clean 90.6 89.6 93.1 83.1 67.6
Obfuscate 17.6 41.9 15.4 33.6 15.6
C&F, nm 12.9 57.4 30.6 60.5 21.4
F&C 8.8 28.0 7.4 15.2 0.0
F&Cm nm 24.5 37.8 22.1 44.9 22.6
Localization Results
• Majority vote with Nr receivers, average of all
combinations
• Correct decision (not decided)
Percentage of correct (not decided) localization
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
19
6.60 m
Tx
Rx2
7.00
m
P1
P2
P3
P8
P4
P7
P6
P5
Rx5
Rx1
Rx3
Rx4
Nr=2 Nr = 3 Nr = 4 Nr = 54
Clean 71.1 (28.9) 95.7 ( 4.3) 99.1 ( 0.1) 100.0 ( 0.0)
Obfuscate 8.7 (72.5) 18.1 (39.1) 19.2 (22.9) 18.2 (20.1)
C&F, nm 13.7 (75.0) 29.8 (42.0) 36.4 (24.4) 34.0 (23.0)
F&C 1.1 (70.2) 3.1 (35.9) 2.6 (23.2) 1.5 (31.2)
F&Cm nm 18.2 (60.6) 25.4 (33.1) 27.3 (23.9) 31.4 (16.5)
Packet Delivery Rate
• PDR is influenced by
manipulation
MedComNet'21- PassiveDevice Free... marco.cominelli@unibs.it
20
0 1 2 3 4 5 6 7 8 9
MCS
0
20
40
60
80
100
PDR
[%]
Clean
Packet Delivery Rate
• PDR is influenced by
manipulation
MedComNet'21- PassiveDevice Free... marco.cominelli@unibs.it
21
0 1 2 3 4 5 6 7 8 9
MCS
0
20
40
60
80
100
PDR
[%]
Clean
Filter & Clip
Filter & Clip no Max
Packet Delivery Rate
• PDR is influenced by
manipulation
• Proper analysis of the
properties can reduce
the impact
MedComNet'21- PassiveDevice Free... marco.cominelli@unibs.it
22
0 1 2 3 4 5 6 7 8 9
MCS
0
20
40
60
80
100
PDR
[%]
Clean
Filter & Clip
Filter & Clip no Max
Clip & Filter
Clip & Filter no Max
Wi-Fi Sensing:
Attack on Privacy &Countermeasures
Advanced Networking Systems, DII
University of Brescia – Italy
https://ans.unibs.it/
Renato Lo Cigno
¡Thanks for theAttention!

Contenu connexe

Similaire à Wi-Fi Sensing: Attack on Privacy & Countermeasures

Sigfox Makers Tour - Mexico City
Sigfox Makers Tour - Mexico CitySigfox Makers Tour - Mexico City
Sigfox Makers Tour - Mexico City
Nicolas Lesconnec
 
Coco co-desing and co-verification of masked software implementations on cp us
Coco   co-desing and co-verification of masked software implementations on cp usCoco   co-desing and co-verification of masked software implementations on cp us
Coco co-desing and co-verification of masked software implementations on cp us
RISC-V International
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
ijcsa
 
Ingrid moerman isbo ng wi nets - overview of the project
Ingrid moerman   isbo ng wi nets - overview of the projectIngrid moerman   isbo ng wi nets - overview of the project
Ingrid moerman isbo ng wi nets - overview of the project
imec.archive
 
DEF CON 23 - Desfigies Brierton Islam - guests n goblins
DEF CON 23 - Desfigies Brierton Islam - guests n goblinsDEF CON 23 - Desfigies Brierton Islam - guests n goblins
DEF CON 23 - Desfigies Brierton Islam - guests n goblins
Felipe Prado
 
Wardiving and Network-Sniffing
Wardiving and Network-SniffingWardiving and Network-Sniffing
Wardiving and Network-Sniffing
An Dy L
 
Adaptable AES Implementation with Power-Gating Support
Adaptable AES Implementation with Power-Gating SupportAdaptable AES Implementation with Power-Gating Support
Adaptable AES Implementation with Power-Gating Support
MDC_UNICA
 
Global Azure Bootcamp 2017 - Azure IoT Hub with LoRa Connectivity
Global Azure Bootcamp 2017 - Azure IoT Hub with LoRa ConnectivityGlobal Azure Bootcamp 2017 - Azure IoT Hub with LoRa Connectivity
Global Azure Bootcamp 2017 - Azure IoT Hub with LoRa Connectivity
Andri Yadi
 
Gigabit Fidelity: The next generation wireless technology
Gigabit Fidelity: The next generation wireless technologyGigabit Fidelity: The next generation wireless technology
Gigabit Fidelity: The next generation wireless technology
Nimisha Radhakrishnan
 
I Pv6 Presentation 310510 V4
I Pv6 Presentation 310510 V4I Pv6 Presentation 310510 V4
I Pv6 Presentation 310510 V4
Chaesub Lee
 
NI_Wireless_Research_Handbook_May_2016_FINAL
NI_Wireless_Research_Handbook_May_2016_FINALNI_Wireless_Research_Handbook_May_2016_FINAL
NI_Wireless_Research_Handbook_May_2016_FINAL
binjon
 
Sub10 presentation
Sub10 presentationSub10 presentation
Sub10 presentation
Advantec Distribution
 
Sub10 presentation
Sub10 presentationSub10 presentation
Sub10 presentation
Advantec Distribution
 
IRJET- Underground Cable Fault Detection and Transmission of Intimation t...
IRJET-  	  Underground Cable Fault Detection and Transmission of Intimation t...IRJET-  	  Underground Cable Fault Detection and Transmission of Intimation t...
IRJET- Underground Cable Fault Detection and Transmission of Intimation t...
IRJET Journal
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
deepak171991
 
2-3-IoT Deployments: Smart City Case Study - Marc Nader
2-3-IoT Deployments: Smart City Case Study - Marc Nader2-3-IoT Deployments: Smart City Case Study - Marc Nader
2-3-IoT Deployments: Smart City Case Study - Marc Nader
Electrical Consultant Engineers Branch - Order of Engineers & Architects - Beirut
 
Towards Telepresence
Towards TelepresenceTowards Telepresence
Towards Telepresence
Larry Smarr
 
Telecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenesTelecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenes
PositiveTechnologies
 
The Locator Framework for Detecting Movement Indoors
The Locator Framework for Detecting Movement IndoorsThe Locator Framework for Detecting Movement Indoors
The Locator Framework for Detecting Movement Indoors
TELKOMNIKA JOURNAL
 
Internet of Things (IoT): Micro-location and Smart Buildings
Internet of Things (IoT): Micro-location and Smart BuildingsInternet of Things (IoT): Micro-location and Smart Buildings
Internet of Things (IoT): Micro-location and Smart Buildings
Faheem Zafari
 

Similaire à Wi-Fi Sensing: Attack on Privacy & Countermeasures (20)

Sigfox Makers Tour - Mexico City
Sigfox Makers Tour - Mexico CitySigfox Makers Tour - Mexico City
Sigfox Makers Tour - Mexico City
 
Coco co-desing and co-verification of masked software implementations on cp us
Coco   co-desing and co-verification of masked software implementations on cp usCoco   co-desing and co-verification of masked software implementations on cp us
Coco co-desing and co-verification of masked software implementations on cp us
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
 
Ingrid moerman isbo ng wi nets - overview of the project
Ingrid moerman   isbo ng wi nets - overview of the projectIngrid moerman   isbo ng wi nets - overview of the project
Ingrid moerman isbo ng wi nets - overview of the project
 
DEF CON 23 - Desfigies Brierton Islam - guests n goblins
DEF CON 23 - Desfigies Brierton Islam - guests n goblinsDEF CON 23 - Desfigies Brierton Islam - guests n goblins
DEF CON 23 - Desfigies Brierton Islam - guests n goblins
 
Wardiving and Network-Sniffing
Wardiving and Network-SniffingWardiving and Network-Sniffing
Wardiving and Network-Sniffing
 
Adaptable AES Implementation with Power-Gating Support
Adaptable AES Implementation with Power-Gating SupportAdaptable AES Implementation with Power-Gating Support
Adaptable AES Implementation with Power-Gating Support
 
Global Azure Bootcamp 2017 - Azure IoT Hub with LoRa Connectivity
Global Azure Bootcamp 2017 - Azure IoT Hub with LoRa ConnectivityGlobal Azure Bootcamp 2017 - Azure IoT Hub with LoRa Connectivity
Global Azure Bootcamp 2017 - Azure IoT Hub with LoRa Connectivity
 
Gigabit Fidelity: The next generation wireless technology
Gigabit Fidelity: The next generation wireless technologyGigabit Fidelity: The next generation wireless technology
Gigabit Fidelity: The next generation wireless technology
 
I Pv6 Presentation 310510 V4
I Pv6 Presentation 310510 V4I Pv6 Presentation 310510 V4
I Pv6 Presentation 310510 V4
 
NI_Wireless_Research_Handbook_May_2016_FINAL
NI_Wireless_Research_Handbook_May_2016_FINALNI_Wireless_Research_Handbook_May_2016_FINAL
NI_Wireless_Research_Handbook_May_2016_FINAL
 
Sub10 presentation
Sub10 presentationSub10 presentation
Sub10 presentation
 
Sub10 presentation
Sub10 presentationSub10 presentation
Sub10 presentation
 
IRJET- Underground Cable Fault Detection and Transmission of Intimation t...
IRJET-  	  Underground Cable Fault Detection and Transmission of Intimation t...IRJET-  	  Underground Cable Fault Detection and Transmission of Intimation t...
IRJET- Underground Cable Fault Detection and Transmission of Intimation t...
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
2-3-IoT Deployments: Smart City Case Study - Marc Nader
2-3-IoT Deployments: Smart City Case Study - Marc Nader2-3-IoT Deployments: Smart City Case Study - Marc Nader
2-3-IoT Deployments: Smart City Case Study - Marc Nader
 
Towards Telepresence
Towards TelepresenceTowards Telepresence
Towards Telepresence
 
Telecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenesTelecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenes
 
The Locator Framework for Detecting Movement Indoors
The Locator Framework for Detecting Movement IndoorsThe Locator Framework for Detecting Movement Indoors
The Locator Framework for Detecting Movement Indoors
 
Internet of Things (IoT): Micro-location and Smart Buildings
Internet of Things (IoT): Micro-location and Smart BuildingsInternet of Things (IoT): Micro-location and Smart Buildings
Internet of Things (IoT): Micro-location and Smart Buildings
 

Plus de Speck&Tech

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Dati aperti: un diritto digitale, da rivendicare e da alimentare
Dati aperti: un diritto digitale, da rivendicare e da alimentareDati aperti: un diritto digitale, da rivendicare e da alimentare
Dati aperti: un diritto digitale, da rivendicare e da alimentare
Speck&Tech
 
AI nel diritto penale, dalle indagini alla redazione delle sentenze
AI nel diritto penale, dalle indagini alla redazione delle sentenzeAI nel diritto penale, dalle indagini alla redazione delle sentenze
AI nel diritto penale, dalle indagini alla redazione delle sentenze
Speck&Tech
 
Vecchi e nuovi diritti per l'intelligenza artificiale
Vecchi e nuovi diritti per l'intelligenza artificialeVecchi e nuovi diritti per l'intelligenza artificiale
Vecchi e nuovi diritti per l'intelligenza artificiale
Speck&Tech
 
What should 6G be? - 6G: bridging gaps, connecting futures
What should 6G be? - 6G: bridging gaps, connecting futuresWhat should 6G be? - 6G: bridging gaps, connecting futures
What should 6G be? - 6G: bridging gaps, connecting futures
Speck&Tech
 
Creare il sangue artificiale: "buon sangue non mente"
Creare il sangue artificiale: "buon sangue non mente"Creare il sangue artificiale: "buon sangue non mente"
Creare il sangue artificiale: "buon sangue non mente"
Speck&Tech
 
AWS: gestire la scalabilità su larga scala
AWS: gestire la scalabilità su larga scalaAWS: gestire la scalabilità su larga scala
AWS: gestire la scalabilità su larga scala
Speck&Tech
 
Praticamente... AWS - Amazon Web Services
Praticamente... AWS - Amazon Web ServicesPraticamente... AWS - Amazon Web Services
Praticamente... AWS - Amazon Web Services
Speck&Tech
 
Data Sense-making: navigating the world through the lens of information design
Data Sense-making: navigating the world through the lens of information designData Sense-making: navigating the world through the lens of information design
Data Sense-making: navigating the world through the lens of information design
Speck&Tech
 
Data Activism: data as rhetoric, data as power
Data Activism: data as rhetoric, data as powerData Activism: data as rhetoric, data as power
Data Activism: data as rhetoric, data as power
Speck&Tech
 
Delve into the world of the human microbiome and metagenomics
Delve into the world of the human microbiome and metagenomicsDelve into the world of the human microbiome and metagenomics
Delve into the world of the human microbiome and metagenomics
Speck&Tech
 
Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...
Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...
Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...
Speck&Tech
 
Monitorare una flotta di autobus: architettura di un progetto di acquisizione...
Monitorare una flotta di autobus: architettura di un progetto di acquisizione...Monitorare una flotta di autobus: architettura di un progetto di acquisizione...
Monitorare una flotta di autobus: architettura di un progetto di acquisizione...
Speck&Tech
 
Why LLMs should be handled with care
Why LLMs should be handled with careWhy LLMs should be handled with care
Why LLMs should be handled with care
Speck&Tech
 
Building intelligent applications with Large Language Models
Building intelligent applications with Large Language ModelsBuilding intelligent applications with Large Language Models
Building intelligent applications with Large Language Models
Speck&Tech
 
Privacy in the era of quantum computers
Privacy in the era of quantum computersPrivacy in the era of quantum computers
Privacy in the era of quantum computers
Speck&Tech
 
Machine learning with quantum computers
Machine learning with quantum computersMachine learning with quantum computers
Machine learning with quantum computers
Speck&Tech
 
Give your Web App superpowers by using GPUs
Give your Web App superpowers by using GPUsGive your Web App superpowers by using GPUs
Give your Web App superpowers by using GPUs
Speck&Tech
 
From leaf to orbit: exploring forests with technology
From leaf to orbit: exploring forests with technologyFrom leaf to orbit: exploring forests with technology
From leaf to orbit: exploring forests with technology
Speck&Tech
 
Innovating Wood
Innovating WoodInnovating Wood
Innovating Wood
Speck&Tech
 

Plus de Speck&Tech (20)

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Dati aperti: un diritto digitale, da rivendicare e da alimentare
Dati aperti: un diritto digitale, da rivendicare e da alimentareDati aperti: un diritto digitale, da rivendicare e da alimentare
Dati aperti: un diritto digitale, da rivendicare e da alimentare
 
AI nel diritto penale, dalle indagini alla redazione delle sentenze
AI nel diritto penale, dalle indagini alla redazione delle sentenzeAI nel diritto penale, dalle indagini alla redazione delle sentenze
AI nel diritto penale, dalle indagini alla redazione delle sentenze
 
Vecchi e nuovi diritti per l'intelligenza artificiale
Vecchi e nuovi diritti per l'intelligenza artificialeVecchi e nuovi diritti per l'intelligenza artificiale
Vecchi e nuovi diritti per l'intelligenza artificiale
 
What should 6G be? - 6G: bridging gaps, connecting futures
What should 6G be? - 6G: bridging gaps, connecting futuresWhat should 6G be? - 6G: bridging gaps, connecting futures
What should 6G be? - 6G: bridging gaps, connecting futures
 
Creare il sangue artificiale: "buon sangue non mente"
Creare il sangue artificiale: "buon sangue non mente"Creare il sangue artificiale: "buon sangue non mente"
Creare il sangue artificiale: "buon sangue non mente"
 
AWS: gestire la scalabilità su larga scala
AWS: gestire la scalabilità su larga scalaAWS: gestire la scalabilità su larga scala
AWS: gestire la scalabilità su larga scala
 
Praticamente... AWS - Amazon Web Services
Praticamente... AWS - Amazon Web ServicesPraticamente... AWS - Amazon Web Services
Praticamente... AWS - Amazon Web Services
 
Data Sense-making: navigating the world through the lens of information design
Data Sense-making: navigating the world through the lens of information designData Sense-making: navigating the world through the lens of information design
Data Sense-making: navigating the world through the lens of information design
 
Data Activism: data as rhetoric, data as power
Data Activism: data as rhetoric, data as powerData Activism: data as rhetoric, data as power
Data Activism: data as rhetoric, data as power
 
Delve into the world of the human microbiome and metagenomics
Delve into the world of the human microbiome and metagenomicsDelve into the world of the human microbiome and metagenomics
Delve into the world of the human microbiome and metagenomics
 
Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...
Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...
Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...
 
Monitorare una flotta di autobus: architettura di un progetto di acquisizione...
Monitorare una flotta di autobus: architettura di un progetto di acquisizione...Monitorare una flotta di autobus: architettura di un progetto di acquisizione...
Monitorare una flotta di autobus: architettura di un progetto di acquisizione...
 
Why LLMs should be handled with care
Why LLMs should be handled with careWhy LLMs should be handled with care
Why LLMs should be handled with care
 
Building intelligent applications with Large Language Models
Building intelligent applications with Large Language ModelsBuilding intelligent applications with Large Language Models
Building intelligent applications with Large Language Models
 
Privacy in the era of quantum computers
Privacy in the era of quantum computersPrivacy in the era of quantum computers
Privacy in the era of quantum computers
 
Machine learning with quantum computers
Machine learning with quantum computersMachine learning with quantum computers
Machine learning with quantum computers
 
Give your Web App superpowers by using GPUs
Give your Web App superpowers by using GPUsGive your Web App superpowers by using GPUs
Give your Web App superpowers by using GPUs
 
From leaf to orbit: exploring forests with technology
From leaf to orbit: exploring forests with technologyFrom leaf to orbit: exploring forests with technology
From leaf to orbit: exploring forests with technology
 
Innovating Wood
Innovating WoodInnovating Wood
Innovating Wood
 

Dernier

GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 

Dernier (20)

GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 

Wi-Fi Sensing: Attack on Privacy & Countermeasures

  • 1. Wi-Fi Sensing: Attack on Privacy &Countermeasures Advanced Networking Systems, DII University of Brescia – Italy https://ans.unibs.it/ Renato Lo Cigno with the fundamental contribution of • Francesco Gringoli • Marco Cominelli • Lorenzo Ghiro
  • 2. Outline& Goals • Wi-Fi Fundamentals • CSI-based Wi-Fi Localization & Sensing • Learning positions with CNNs fingerprinting • Obfuscation through CSI randomization • Proper manipulation of the CSI at the transmitter or with and intelligent ambient can hide position information & maintain communication performance Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 1
  • 3. Outline& Goals • Wi-Fi Fundamentals • CSI-based Wi-Fi Localization & Sensing • Learning positions with CNNs fingerprinting • Obfuscation through CSI randomization • Proper manipulation of the CSI at the transmitter or with and intelligent ambient can hide position information & maintain communication performance Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 2
  • 4. Common view of Wi-Fi But we are interested in Wi-Fi packets and signals, not the network! Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 3 AP AP AP Wired LAN / Eth Switch AP: Access Point "INTERNET" Router
  • 5. Wi-Fi packets & signals - 1 • 802.11 comes in many flavors: g/a/h/ac/ax ... • They define different packet formats and transmission technologies, including MIMO Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 4 h11 h22
  • 6. Wi-Fi packets & signals - 2 • 802.11 comes in many flavors: g/a/h/ac/ax ... • Some fields in the packets remain fixed and are used to help the correct reception Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 5 L-STF L-LTF L-SIG VHT-SIG-A VHT-STF VHT-LTF VHT-SIG-B DATA 8µs 8µs 4µs 8µs 4µs 4µs 8µs 4µs 4µs ... 20MHz 20MHz 20MHz 20MHz 256 carriers 80MHz IDFT X {...,SIN n,...} I/Q samples central carrier modulated signal s(t) to antenna {...,Sout n,...} randomizer
  • 7. Wi-Fi packets & signals - 3 Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 6 • 802.11 comes in many flavors: g/a/h/ac/ax ... • All versions use OFDM as modulation technique
  • 8. Wi-Fi ChannelStateInformation(CSI) Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 7 • Packet decoding happens thanks to the knowledge of the distortion introduced by the channel (multipath, refractions, ...) • This knowledge (CSI) is obtained thanks analyzing known portions of the packets
  • 9. Outline& Goals • Wi-Fi Fundamentals • CSI-based Wi-Fi Localization & Sensing • Learning positions with CNNs fingerprinting • Obfuscation through CSI randomization • Proper manipulation of the CSI at the transmitter or with and intelligent ambient can hide position information & maintain communication performance Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 8
  • 10. Wi-Fi PositionSensing Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 9 input filter sampling equalizer decoding localization system received bits estimated position CSI extraction input filter sampling equalizer decoding received bits CSI extraction RX1 RX2 U • CSI is essential for equalization and high throughput • Once extracted the CSI can also be used to sense & probe the environment • People (& objects) change the channel response
  • 11. Wi-Fi PositionSensing Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 10 • CSI most evident characteristic is the amplitude change in frequency • Amplitude heatmap with the same person in two different positions in our lab • Question: how to exploit this information?
  • 12. CNN Fingerprinting • Most recent "trend" is using supervised learning with a Convolutional Neural Network • CSI I/Q samples are fed to the CNN that returns a position classification Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 11 Conv. Layer 1 Conv. Layer 2 Fully-Conn. Layer 1 Fully-Conn. Layer 2 Fully-Conn. Layer 3 CNN CSI values (real / imag) 8 Indoor Locations • It works, we'll see results • Still fragile, but AI is improving VERY fast
  • 13. Localization • Tracking a person without her/his consent • Violate privacy • Often violate laws / rules • Channel State Information (CSI) carries details on the propagation environment Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 12 6.60 m Tx Rx2 7.00 m P1 P2 P3 P8 P4 P7 P6 P5 Rx5 Rx1 Rx3 Rx4 ` BIG BROTHER IS SENSING YOU
  • 14. Localization • Big Brother • Controls one (or more) receivers • Knows the position of Tx (e.g., an Access Point) • The victim • Is unaware of the system • Does not need to hold a Wi-Fi device Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 13 6.60 m Tx Rx2 7.00 m P1 P2 P3 P8 P4 P7 P6 P5 Rx5 Rx1 Rx3 Rx4 ` BIG BROTHER IS SENSING YOU
  • 15. Outline& Goals • Wi-Fi Fundamentals • CSI-based Wi-Fi Localization & Sensing • Learning positions with CNNs fingerprinting • Obfuscation through CSI randomization • Proper manipulation of the CSI at the transmitter or with and intelligent ambient can hide position information & maintain communication performance Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 14
  • 16. CSI Randomization • Proper manipulation at the transmitter "blur" the fingerprints • Different manipulations result in different "blurring" • Manipulation should not hamper communication performance Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 15
  • 17. ManipulationPrinciples 1. Do not alter power emission 2. Guarantee that the pre-distortion random changes are compatible with human (time correlation) 3. Guarantee that the pre-distortion random changes in frequency are compatible with the real channel 4. Hide distortion information to prevent reverse engineering within a reasonable time horizon 5. Do not change the communication performance of the system Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 16
  • 18. Basic Manipulation • Multiply the samples amplitude by a Uniform-Markov random process Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 17
  • 19. Localization Results • Performance of single receivers Percentage of correct decision: random choice = 12.5% Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 18 6.60 m Tx Rx2 7.00 m P1 P2 P3 P8 P4 P7 P6 P5 Rx5 Rx1 Rx3 Rx4 Rx1 Rx2 Rx3 Rx4 Rx5 Clean 90.6 89.6 93.1 83.1 67.6 Obfuscate 17.6 41.9 15.4 33.6 15.6 C&F, nm 12.9 57.4 30.6 60.5 21.4 F&C 8.8 28.0 7.4 15.2 0.0 F&Cm nm 24.5 37.8 22.1 44.9 22.6
  • 20. Localization Results • Majority vote with Nr receivers, average of all combinations • Correct decision (not decided) Percentage of correct (not decided) localization Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 19 6.60 m Tx Rx2 7.00 m P1 P2 P3 P8 P4 P7 P6 P5 Rx5 Rx1 Rx3 Rx4 Nr=2 Nr = 3 Nr = 4 Nr = 54 Clean 71.1 (28.9) 95.7 ( 4.3) 99.1 ( 0.1) 100.0 ( 0.0) Obfuscate 8.7 (72.5) 18.1 (39.1) 19.2 (22.9) 18.2 (20.1) C&F, nm 13.7 (75.0) 29.8 (42.0) 36.4 (24.4) 34.0 (23.0) F&C 1.1 (70.2) 3.1 (35.9) 2.6 (23.2) 1.5 (31.2) F&Cm nm 18.2 (60.6) 25.4 (33.1) 27.3 (23.9) 31.4 (16.5)
  • 21. Packet Delivery Rate • PDR is influenced by manipulation MedComNet'21- PassiveDevice Free... marco.cominelli@unibs.it 20 0 1 2 3 4 5 6 7 8 9 MCS 0 20 40 60 80 100 PDR [%] Clean
  • 22. Packet Delivery Rate • PDR is influenced by manipulation MedComNet'21- PassiveDevice Free... marco.cominelli@unibs.it 21 0 1 2 3 4 5 6 7 8 9 MCS 0 20 40 60 80 100 PDR [%] Clean Filter & Clip Filter & Clip no Max
  • 23. Packet Delivery Rate • PDR is influenced by manipulation • Proper analysis of the properties can reduce the impact MedComNet'21- PassiveDevice Free... marco.cominelli@unibs.it 22 0 1 2 3 4 5 6 7 8 9 MCS 0 20 40 60 80 100 PDR [%] Clean Filter & Clip Filter & Clip no Max Clip & Filter Clip & Filter no Max
  • 24. Wi-Fi Sensing: Attack on Privacy &Countermeasures Advanced Networking Systems, DII University of Brescia – Italy https://ans.unibs.it/ Renato Lo Cigno ¡Thanks for theAttention!

Notes de l'éditeur

  1. - Describe the scenario - How come we can localize people with WiFi? Not everyone knows it. - STRESS the person does not neet to wear a device
  2. - Describe the scenario - How come we can localize people with WiFi? Not everyone knows it. - STRESS the person does not neet to wear a device - Skip detailed description of the lab here, it comes later
  3. - Very quik presentation, refer to the paper for details
  4. - The figure is just for exemplification, doesn't matter if it has not been obtained with the specific technique of this paper – Highlight on the picture that keeping Principle 3 is not trivial - The formula is used only to refer to the paper for the math
  5. Explain that there are collisions due to the missing MAC in the SDR
  6. Highlight that maximum obfuscation obtained with rule of thumb ruins communications, but does not destroy them
  7. Stress that this correction is a first attempt based on the observation that clipping at the very end may introduce high frequency components, and even this "small correction" leads to very good results.